Internet Assigned Numbers Authority
Public Notary Transparency
Created
2021-08-04
Last Updated
2021-12-14
Available Formats
[IMG]
XML [IMG]
HTML [IMG]
Plain text
Registries included below
??Hash Algorithms
??Signature Algorithms
??VersionedTransTypes
??Log Artifact Extensions
??Log IDs
??Error Types
Hash Algorithms
Expert(s)
Unassigned
Reference
[RFC9162]
Available Formats
[IMG]
CSV
Range Registration Procedures
0x00-0xDF Specification Required
0xE0-0xEF Experimental Use
0xF0-0xFF Private Use
Value Hash Algorithm OID Reference
0x00 SHA-256 2.16.840.1.101.3.4.2.1 [RFC6234]
0x01-0xDF Unassigned
0xE0-0xEF Reserved for Experimental Use [RFC9162]
0xF0-0xFF Reserved for Private Use [RFC9162]
Signature Algorithms
Expert(s)
Unassigned
Reference
[RFC9162]
Note
This is a subset of the "TLS SignatureScheme" registry, limited to
those algorithms that are appropriate for CT. A major advantage
of this is leveraging the expertise of the TLS Working Group and
its designated expert(s).
Note
The value 0x0403 appears twice. While this may be confusing, it
is okay because the verification process is the same for both
algorithms, and the choice of which to use when generating a
signature is purely internal to the log server.
Available Formats
[IMG]
CSV
Range Registration Procedures
0x0000-0x0807 Specification Required
0x0808-0xFDFF Expert Review
0xFE00-0xFEFF Experimental Use
0xFF00-0xFFFF Private Use
SignatureScheme Value Signature Algorithm Reference
0x0000-0x0402 Unassigned
ecdsa_secp256r1_sha256 (0x0403) ECDSA (NIST P-256) with SHA-256 [FIPS186-4]
ecdsa_secp256r1_sha256 (0x0403) Deterministic ECDSA (NIST P-256) with HMAC-SHA256 [RFC6979]
0x0404-0x0806 Unassigned
ed25519 (0x0807) Ed25519 (PureEdDSA with the edwards25519 curve) [RFC8032]
0x0808-0xFDFF Unassigned
0xFE00-0xFEFF Reserved for Experimental Use [RFC9162]
0xFF00-0xFFFF Reserved for Private Use [RFC9162]
VersionedTransTypes
Expert(s)
Unassigned
Reference
[RFC9162]
Note
The range 0x0000-0x00FF is reserved so that v1 SCTs are
distinguishable from v2 SCTs and other TransItem structures.
Available Formats
[IMG]
CSV
Range Registration Procedures
0x0100-0xDFFF Specification Required
0xE000-0xEFFF Experimental Use
0xF000-0xFFFF Private Use
Value Type and Version Reference
0x0000-0x00FF Reserved [RFC6962]
0x0100 x509_entry_v2 [RFC9162]
0x0101 precert_entry_v2 [RFC9162]
0x0102 x509_sct_v2 [RFC9162]
0x0103 precert_sct_v2 [RFC9162]
0x0104 signed_tree_head_v2 [RFC9162]
0x0105 consistency_proof_v2 [RFC9162]
0x0106 inclusion_proof_v2 [RFC9162]
0x0107-0xDFFF Unassigned
0xE000-0xEFFF Reserved for Experimental Use [RFC9162]
0xF000-0xFFFF Reserved for Private Use [RFC9162]
Log Artifact Extensions
Expert(s)
Unassigned
Reference
[RFC9162]
Available Formats
[IMG]
CSV
Range Registration Procedures
0x0000-0xDFFF Specification Required
0xE000-0xEFFF Experimental Use
0xF000-0xFFFF Private Use
ExtensionType Status Use Reference
0x0000-0xDFFF Unassigned n/a
0xE000-0xEFFF Reserved for Experimental Use n/a [RFC9162]
0xF000-0xFFFF Reserved for Private Use n/a [RFC9162]
Log IDs
Registration Procedure(s)
First Come First Served
Reference
[RFC9162]
Note
All OIDs in the range from 1.3.101.8192 to 1.3.101.16383 have been
set aside for Log IDs. This is a limited resource of 8,192 OIDs,
each of which has an encoded length of 4 octets.
Note
The 1.3.101.80 arc has also been set aside for Log IDs. This is an
unlimited resource, but only the 128 OIDs from 1.3.101.80.0 to
1.3.101.80.127 have an encoded length of only 4 octets.
Available Formats
[IMG]
CSV
Log ID Log Base URL Log Operator Reference
1.3.101.8192-1.3.101.16383 Unassigned Unassigned
1.3.101.80.0-1.3.101.80.* Unassigned Unassigned
Error Types
Registration Procedure(s)
Specification Required
Expert(s)
Unassigned
Reference
[RFC9162]
Available Formats
[IMG]
CSV
Identifier Meaning Reference
malformed The request could not be parsed. [RFC9162]
badSubmission submission is neither a valid certificate nor a valid precertificate. [RFC9162]
badType type is neither 1 nor 2. [RFC9162]
badChain The first element of chain is not the certifier of the submission, or the second element does not certify the first, [RFC9162]
etc.
badCertificate One or more certificates in the chain are not valid (e.g., not properly encoded). [RFC9162]
unknownAnchor The last element of chain (or, if chain is an empty array, the submission) is not, and nor is it certified by, an [RFC9162]
accepted trust anchor.
shutdown The log is no longer accepting submissions. [RFC9162]
firstUnknown first is before the latest known STH but is not from an existing STH. [RFC9162]
secondUnknown second is before the latest known STH but is not from an existing STH. [RFC9162]
secondBeforeFirst second is smaller than first. [RFC9162]
hashUnknown hash is not the hash of a known leaf (may be caused by skew or by a known certificate not yet merged). [RFC9162]
treeSizeUnknown hash is before the latest known STH but is not from an existing STH. [RFC9162]
startUnknown start is greater than the number of entries in the Merkle Tree. [RFC9162]
endBeforeStart start cannot be greater than end. [RFC9162]
Licensing Terms
Presently we were in a very dark road, and at a point where it dropped suddenly between steep sides we halted in black shadow. A gleam of pale sand, a whisper of deep flowing waters, and a farther glimmer of more sands beyond them challenged our advance. We had come to a "grapevine ferry." The scow was on the other side, the water too shoal for the horses to swim, and the bottom, most likely, quicksand. Out of the blackness of the opposite shore came a soft, high-pitched, quavering, long-drawn, smothered moan of woe, the call of that snivelling little sinner the screech-owl. Ferry murmured to me to answer it and I sent the same faint horror-stricken tremolo back. Again it came to us, from not farther than one might toss his cap, and I followed Ferry down to the water's edge. The grapevine guy swayed at our side, we heard the scow slide from the sands, and in a few moments, moved by two videttes, it touched our shore. Soon we were across, the two videttes riding with us, and beyond a sharp rise, in an old opening made by the swoop of a hurricane, we entered the silent unlighted bivouac of Ferry's scouts. Ferry got down and sat on the earth talking with Quinn, while the sergeants quietly roused the sleepers to horse. Plotinus is driven by this perplexity to reconsider the whole theory of Matter.477 He takes Aristotle¡¯s doctrine as the groundwork of his investigation. According to this, all existence is divided into Matter and Form. What we know of things¡ªin other words, the sum of their differential characteristics¡ªis their Form. Take away this, and the unknowable residuum is their Matter. Again, Matter is the vague indeterminate something out of which particular Forms are developed. The two are related as Possibility to Actuality, as the more generic to the more specific substance through every grade of classification and composition. Thus there are two Matters, the one sensible and the other intelligible. The former constitutes the common substratum of bodies, the other the common element of ideas.478 The general distinction between Matter and Form was originally suggested to Aristotle by Plato¡¯s remarks on the same subject; but he differs325 from his master in two important particulars. Plato, in his Timaeus, seems to identify Matter with space.479 So far, it is a much more positive conception than the ?λη of the Metaphysics. On the other hand, he constantly opposes it to reality as something non-existent; and he at least implies that it is opposed to absolute good as a principle of absolute evil.480 Thus while the Aristotelian world is formed by the development of Power into Actuality, the Platonic world is composed by the union of Being and not-Being, of the Same and the Different, of the One and the Many, of the Limit and the Unlimited, of Good and Evil, in varying proportions with each other. The Lawton woman had heard of an officer's family at Grant, which was in need of a cook, and had gone there. [See larger version] On the 8th of July an extraordinary Privy Council was summoned. All the members, of whatever party, were desired to attend, and many were the speculations as to the object of their meeting. The general notion was that it involved the continuing or the ending of the war. It turned out to be for the announcement of the king's intended marriage. The lady selected was Charlotte, the second sister of the Duke of Mecklenburg-Strelitz. Apart from the narrowness of her education, the young princess had a considerable amount of amiability, good sense, and domestic taste. These she shared with her intended husband, and whilst they made the royal couple always retiring, at the same time they caused them to give, during their lives, a moral air to their court. On the 8th of September Charlotte arrived at St. James's, and that afternoon the marriage took place, the ceremony being performed by the Archbishop of Canterbury. On the 22nd the coronation took place with the greatest splendour. Mother and girls were inconsolable, for each had something that they were sure "Si would like," and would "do him good," but they knew Josiah Klegg, Sr., well enough to understand what was the condition when he had once made up his mind. CHAPTER V. THE YOUNG RECRUITS Si proceeded to deftly construct a litter out of the two guns, with some sticks that he cut with a knife, and bound with pawpaw strips. His voice had sunk very low, almost to sweetness. A soft flurry of pink went over her face, and her eyelids drooped. Then suddenly she braced herself, pulled herself taut, grew combative again, though her voice shook. HoME²Ô¾®Ïè̫ʲôÐÇ×ù
ENTER NUMBET 0016www.hpup.com.cn
www.fbklqm.com.cn
lj1bt.net.cn
hzmsj.com.cn
jqchain.com.cn
ggjdggjd.com.cn
www.wangqin2.com.cn
www.sxfkch.com.cn
ujijia.com.cn
spylkj.net.cn