Internet Assigned Numbers Authority
Group Domain of Interpretation (GDOI) Payloads
Created
2003-03-28
Last Updated
2017-12-26
Note
In all cases, new assigned numbers and values must be added due to a
Standards Action as defined in [RFC2434].
Available Formats
[IMG]
XML [IMG]
HTML [IMG]
Plain text
Registries included below
??GDOI ID Payload Type Values
??SA KEK Payload Values
??SA KEK Payload Values - POP Algorithm
??SA KEK Payload Values - KEK Attributes
??SA KEK Payload Values - KEK_MANAGEMENT_ALGORITHM
??SA KEK Payload Values - KEK_ALGORITHM
??SA KEK Payload Values - KEK_KEY_LENGTH
??SA KEK Payload Values - KEK_KEY_LIFETIME
??SA KEK Payload Values - SIG_HASH_ALGORITHM
??SA KEK Payload Values - SIG_ALGORITHM
??SA KEK Payload Values - SIG_KEY_LENGTH
??SA KEK Payload Values - KE_OAKLEY_GROUP
??SA KEK Payload Values - KEK_ACK_REQUESTED
??SA TEK Payload Values
??SA TEK Payload Values - Protocol-ID
??Key Download Type Values
??TEK Download Type
??KEK Download Type
??LKH Download Type
??SID Download Type
??GAP Payload Policy Attributes
??IEC 62351-9 Authentication Values
??IEC 62351-9 Confidentiality Values
??GDOI SA TEK Attributes
??ID Types
??GDOI DOI Exchange Types
GDOI ID Payload Type Values
Registration Procedure(s)
Standards Action
Reference
[RFC3547]
Note
When an ISAKMP identification payload is used with GDOI, the assigned
values for the Identification Type field are interpreted according to
this registry.
The GDOI ID Payload Type is an 8-bit value that is used as a
discriminator for interpretation of the variable-length Identification
Payload. The following table describes ID Payload Types.
Available Formats
[IMG]
CSV
Value ID Type Reference
0-10 Reserved [RFC3547]
11 ID_KEY_ID [RFC3547]
12 Reserved [RFC3547]
13-127 Unassigned
128-255 Private Use [RFC3547]
SA KEK Payload Values
SA KEK Payload Values - POP Algorithm
Registration Procedure(s)
Standards Action
Reference
[RFC3547][RFC6407]
Note
The POP algorithm is a 16-bit value that is used to describe the
encryption algorithm of the POP payload.
Available Formats
[IMG]
CSV
Value Algorithm Type Reference
0 Reserved [RFC3547]
1 POP_ALG_RSA [RFC3547]
2 POP_ALG_DSS [RFC3547]
3 POP_ALG_ECDSS [RFC3547]
4-127 Unassigned
128-255 Private Use [RFC3547]
256-32767 Unassigned
SA KEK Payload Values - KEK Attributes
Registration Procedure(s)
Standards Action
Reference
[RFC3547][RFC6407]
Note
The KEK Attribute consists of a 16-bit type and its associated value.
KEK attributes are used to pass policy from a GCKS to a group member.
Available Formats
[IMG]
CSV
Value ID Class Type Reference
0 Reserved
1 KEK_MANAGEMENT_ALGORITHM B [RFC3547]
2 KEK_ALGORITHM B [RFC3547]
3 KEK_KEY_LENGTH B [RFC3547]
4 KEK_KEY_LIFETIME V [RFC3547]
5 SIG_HASH_ALGORITHM B [RFC3547]
6 SIG_ALGORITHM B [RFC3547]
7 SIG_KEY_LENGTH B [RFC3547]
8 KE_OAKLEY_GROUP B [RFC3547]
9 KEK_ACK_REQUESTED B [RFC8263]
10-127 Unassigned
128-255 Private Use [RFC6407]
256-32767 Unassigned
SA KEK Payload Values - KEK_MANAGEMENT_ALGORITHM
Registration Procedure(s)
Standards Action
Reference
[RFC3547][RFC6407]
Available Formats
[IMG]
CSV
Value KEK Management Type Reference
0 Reserved [RFC3547]
1 LKH [RFC3547]
2-127 Unassigned
128-255 Private Use [RFC3547]
256-65535 Unassigned
SA KEK Payload Values - KEK_ALGORITHM
Registration Procedure(s)
Standards Action
Reference
[RFC3547][RFC6407]
Available Formats
[IMG]
CSV
Value Algorithm Type Reference
0 RESERVED [RFC3547]
1 KEK_ALG_DES [RFC3547]
2 KEK_ALG_3DES [RFC3547]
3 KEK_ALG_AES [RFC3547]
4-127 Unassigned
128-255 Private Use [RFC3547]
256-65535 Unassigned
SA KEK Payload Values - KEK_KEY_LENGTH
Registration Procedure(s)
Standards Action
Reference
[RFC3547]
Note
The KEK_KEY_LENGTH class specifies the KEK Algorithm key
length (in bits).
Value Type Reference
No registrations at this time.
SA KEK Payload Values - KEK_KEY_LIFETIME
Registration Procedure(s)
Standards Action
Reference
[RFC3547]
Value Type Reference
No registrations at this time.
SA KEK Payload Values - SIG_HASH_ALGORITHM
Registration Procedure(s)
Standards Action
Reference
[RFC3547][RFC6407]
Available Formats
[IMG]
CSV
Value Algorithm Type Reference
0 Reserved [RFC3547]
1 SIG_HASH_MD5 [RFC3547]
2 SIG_HASH_SHA1 [RFC3547]
3 SIG_HASH_SHA256 [RFC6407]
4 SIG_HASH_SHA384 [RFC6407]
5 SIG_HASH_SHA512 [RFC6407]
6-127 Unassigned
128-255 Private Use [RFC3547]
256-65535 Unassigned
SA KEK Payload Values - SIG_ALGORITHM
Registration Procedure(s)
Standards Action
Reference
[RFC3547][RFC6407]
Available Formats
[IMG]
CSV
Value Algorithm Type Reference
0 Reserved [RFC3547]
1 SIG_ALG_RSA [RFC3547]
2 SIG_ALG_DSS [RFC3547]
3 SIG_ALG_ECDSS [RFC3547]
4 SIG_ALG_ECDSA-256 [RFC6407]
5 SIG_ALG_ECDSA-384 [RFC6407]
6 SIG_ALG_ECDSA-521 [RFC6407]
7-127 Unassigned
128-255 Private Use [RFC3547]
256-65535 Unassigned
SA KEK Payload Values - SIG_KEY_LENGTH
Registration Procedure(s)
Standards Action
Reference
[RFC3547]
Note
The SIG_KEY_LENGTH class specifies the length of the SIG payload key.
Value Type Reference
No registrations at this time.
SA KEK Payload Values - KE_OAKLEY_GROUP
Registration Procedure(s)
Standards Action
Reference
[RFC3547]
Value Type Reference
No registrations at this time.
SA KEK Payload Values - KEK_ACK_REQUESTED
Registration Procedure(s)
Specification Required
Expert(s)
Brian Weis
Reference
[RFC8263]
Available Formats
[IMG]
CSV
Value Type Reference
0 Reserved [RFC8263]
1 REKEY_ACK_KEK_SHA256 [RFC8263]
2 REKEY_ACK_LKH_SHA256 [RFC8263]
3 REKEY_ACK_KEK_SHA512 [RFC8263]
4 REKEY_ACK_LKH_SHA512 [RFC8263]
5-128 Unassigned
129-255 Private Use
SA TEK Payload Values
SA TEK Payload Values - Protocol-ID
Registration Procedure(s)
Standards Action
Reference
[RFC3547]
Note
The SA_TEK protocol-ID is an 8-bit value that is used to describe the
type of TEK is included in the SA_TEK payload. The following table
defines values for the Security Protocol
Available Formats
[IMG]
CSV
Value Protocol ID Reference
0 RESERVED [RFC3547]
1 GDOI_PROTO_IPSEC_ESP [RFC3547]
2 GDOI_PROTO_IPSEC_AH [RFC6407]
3 GDOI_PROTO_IEC_61850 [RFC8052]
4-127 Unassigned [RFC3547]
128-255 Private Use [RFC3547]
Key Download Type Values
Registration Procedure(s)
Standards Action
Reference
[RFC3547]
Note
The Key Download Type is an 8-bit value that is used as a discriminator
for interpretation of the variable-length Key Packet.
Available Formats
[IMG]
CSV
Value Key Download Type Reference
0 Reserved [RFC3547]
1 TEK [RFC3547]
2 KEK [RFC3547]
3 LKH [RFC3547]
4 SID [RFC6407]
5-127 Unassigned [RFC3547]
128-255 Private Use [RFC3547]
TEK Download Type
Registration Procedure(s)
Standards Action
Reference
[RFC3547][RFC6407]
Available Formats
[IMG]
CSV
Value TEK Class Type Reference
0 RESERVED [RFC3547]
1 TEK_ALGORITHM_KEY V [RFC3547]
2 TEK_INTEGRITY_KEY V [RFC3547]
3 TEK_SOURCE_AUTH_KEY V [RFC3547]
4-127 Unassigned
128-255 Private Use [RFC6407]
256-32767 Unassigned
KEK Download Type
Registration Procedure(s)
Standards Action
Reference
[RFC3547][RFC6407]
Note
The following attributes may be present in a KEK download Type. In the
table, attributes that are defined as TV are marked as Basic (B);
attributes which are defined as TLV are marked as Variable (V).
Available Formats
[IMG]
CSV
Value KEK Class Type Reference
0 RESERVED [RFC3547]
1 KEK_ALGORITHM_KEY V [RFC3547]
2 SIG_ALGORITHM_KEY V [RFC3547]
3-127 Unassigned
128-255 Private Use [RFC6407]
256-32767 Unassigned
LKH Download Type
Registration Procedure(s)
Standards Action
Reference
[RFC3547]
Available Formats
[IMG]
CSV
Value KEK Class Type Reference
0 Reserved [RFC3547]
1 LKH_DOWNLOAD_ARRAY V [RFC3547]
2 LKH_UPDATE_ARRAY V [RFC3547]
3 SIG_ALGORITHM_KEY V [RFC3547]
4-127 Unassigned
128-255 Private Use [RFC3547]
256-32767 Unassigned
SID Download Type
Registration Procedure(s)
Standards Action
Reference
[RFC6407]
Available Formats
[IMG]
CSV
Value SID Class Type Reference
0 RESERVED [RFC6407]
1 NUMBER_OF_SID_BITS B [RFC6407]
2 SID_VALUE V [RFC6407]
3-128 Unassigned
129-255 Private Use [RFC6407]
256-32767 Unassigned
GAP Payload Policy Attributes
Registration Procedure(s)
Standards Action
Reference
[RFC6407]
Available Formats
[IMG]
CSV
Value Attribute Type Type Reference
0 RESERVED [RFC6407]
1 ACTIVATION_TIME_DELAY B [RFC6407]
2 DEACTIVATION_TIME_DELAY B [RFC6407]
3 SENDER_ID_REQUEST B [RFC6407]
4-127 Unassigned
128-255 Private Use [RFC6407]
256-32767 Unassigned
IEC 62351-9 Authentication Values
Registration Procedure(s)
Expert Review
Expert(s)
Brian Weis, Tero Kivinen
Reference
[RFC8052]
Available Formats
[IMG]
CSV
Value Phase Reference
0 Reserved [RFC8052]
1 NONE [RFC8052]
2 HMAC-SHA256-128 [RFC8052]
3 HMAC-SHA256 [RFC8052]
4 AES-GMAC-128 [RFC8052]
5 AES-GMAC-256 [RFC8052]
6-61439 Unassigned
61440-65535 Reserved for Private Use [RFC8052]
IEC 62351-9 Confidentiality Values
Registration Procedure(s)
Expert Review
Expert(s)
Brian Weis, Tero Kivinen
Reference
[RFC8052]
Available Formats
[IMG]
CSV
Value Name Authenticated Encryption Reference
0 Reserved [RFC8052]
1 NONE [RFC8052]
2 AES-CBC-128 N [RFC8052]
3 AES-CBC-256 N [RFC8052]
4 AES-GCM-128 Y [RFC8052]
5 AES-GCM-256 Y [RFC8052]
6-61439 Unassigned
61440-65535 Reserved for Private Use [RFC8052]
GDOI SA TEK Attributes
Registration Procedure(s)
Expert Review
Expert(s)
Brian Weis, Tero Kivinen
Reference
[RFC8052]
Available Formats
[IMG]
CSV
Value Attribute Type Reference
0 Reserved [RFC8052]
1 SA_ATD V [RFC8052]
2 SA_KDA B [RFC8052]
3-28671 Unassigned
28672-32767 Reserved for Private Use [RFC8052]
ID Types
Registration Procedure(s)
Expert Review
Expert(s)
Brian Weis, Tero Kivinen
Reference
[RFC8052]
Available Formats
[IMG]
CSV
Value Name Reference
0 Reserved [RFC8052]
1 ID_IPV4_ADDR [RFC8052]
2 ID_FQDN [RFC8052]
3 ID_USER_FQDN [RFC8052]
4 ID_IPV4_ADDR_SUBNET [RFC8052]
5 ID_IPV6_ADDR [RFC8052]
6 ID_IPV6_ADDR_SUBNET [RFC8052]
7 ID_IPV4_ADDR_RANGE [RFC8052]
8 ID_IPV6_ADDR_RANGE [RFC8052]
9 ID_DER_ASN1_DN [RFC8052]
10 ID_DER_ASN1_GN [RFC8052]
11 ID_KEY_ID [RFC8052]
12 ID_LIST [RFC8052]
13 ID_OID [RFC8052]
14-61439 Unassigned
61440-65535 Reserved for Private Use [RFC8052]
GDOI DOI Exchange Types
Registration Procedure(s)
Specification Required
Expert(s)
Brian Weis
Reference
[RFC8263]
Available Formats
[IMG]
CSV
Value Phase Reference
GROUPKEY-PULL 32 [RFC6407]
GROUPKEY-PUSH 33 [RFC6407]
Known Unregistered Use 34
GROUPKEY-PUSH-ACK 35 [RFC8263]
Unassigned 36-239
Licensing Terms
Presently we were in a very dark road, and at a point where it dropped suddenly between steep sides we halted in black shadow. A gleam of pale sand, a whisper of deep flowing waters, and a farther glimmer of more sands beyond them challenged our advance. We had come to a "grapevine ferry." The scow was on the other side, the water too shoal for the horses to swim, and the bottom, most likely, quicksand. Out of the blackness of the opposite shore came a soft, high-pitched, quavering, long-drawn, smothered moan of woe, the call of that snivelling little sinner the screech-owl. Ferry murmured to me to answer it and I sent the same faint horror-stricken tremolo back. Again it came to us, from not farther than one might toss his cap, and I followed Ferry down to the water's edge. The grapevine guy swayed at our side, we heard the scow slide from the sands, and in a few moments, moved by two videttes, it touched our shore. Soon we were across, the two videttes riding with us, and beyond a sharp rise, in an old opening made by the swoop of a hurricane, we entered the silent unlighted bivouac of Ferry's scouts. Ferry got down and sat on the earth talking with Quinn, while the sergeants quietly roused the sleepers to horse. Plotinus is driven by this perplexity to reconsider the whole theory of Matter.477 He takes Aristotle¡¯s doctrine as the groundwork of his investigation. According to this, all existence is divided into Matter and Form. What we know of things¡ªin other words, the sum of their differential characteristics¡ªis their Form. Take away this, and the unknowable residuum is their Matter. Again, Matter is the vague indeterminate something out of which particular Forms are developed. The two are related as Possibility to Actuality, as the more generic to the more specific substance through every grade of classification and composition. Thus there are two Matters, the one sensible and the other intelligible. The former constitutes the common substratum of bodies, the other the common element of ideas.478 The general distinction between Matter and Form was originally suggested to Aristotle by Plato¡¯s remarks on the same subject; but he differs325 from his master in two important particulars. Plato, in his Timaeus, seems to identify Matter with space.479 So far, it is a much more positive conception than the ?λη of the Metaphysics. On the other hand, he constantly opposes it to reality as something non-existent; and he at least implies that it is opposed to absolute good as a principle of absolute evil.480 Thus while the Aristotelian world is formed by the development of Power into Actuality, the Platonic world is composed by the union of Being and not-Being, of the Same and the Different, of the One and the Many, of the Limit and the Unlimited, of Good and Evil, in varying proportions with each other. The Lawton woman had heard of an officer's family at Grant, which was in need of a cook, and had gone there. [See larger version] On the 8th of July an extraordinary Privy Council was summoned. All the members, of whatever party, were desired to attend, and many were the speculations as to the object of their meeting. The general notion was that it involved the continuing or the ending of the war. It turned out to be for the announcement of the king's intended marriage. The lady selected was Charlotte, the second sister of the Duke of Mecklenburg-Strelitz. Apart from the narrowness of her education, the young princess had a considerable amount of amiability, good sense, and domestic taste. These she shared with her intended husband, and whilst they made the royal couple always retiring, at the same time they caused them to give, during their lives, a moral air to their court. On the 8th of September Charlotte arrived at St. James's, and that afternoon the marriage took place, the ceremony being performed by the Archbishop of Canterbury. On the 22nd the coronation took place with the greatest splendour. Mother and girls were inconsolable, for each had something that they were sure "Si would like," and would "do him good," but they knew Josiah Klegg, Sr., well enough to understand what was the condition when he had once made up his mind. CHAPTER V. THE YOUNG RECRUITS Si proceeded to deftly construct a litter out of the two guns, with some sticks that he cut with a knife, and bound with pawpaw strips. His voice had sunk very low, almost to sweetness. A soft flurry of pink went over her face, and her eyelids drooped. Then suddenly she braced herself, pulled herself taut, grew combative again, though her voice shook. HoME²Ô¾®Ïè̫ʲôÐÇ×ù
ENTER NUMBET 0016www.gzpzqc.org.cn
jmsfzzh.org.cn
www.kguedm.com.cn
www.rpsrdi.com.cn
www.wbbdtu.com.cn
tlbqem.com.cn
www.rfigck.com.cn
prlous.com.cn
pt957.com.cn
www.oncbur.com.cn