ietf-crypto-types

This module defines common YANG types for cryptographic applications. The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'S...

Typedef Base type Abstract
authenticated-data-cms binary A CMS structure whose top-most content type MUST be the authenticated-data content type, as described in Section 9 of RFC 5652.
cms binary A ContentInfo structure, as specified in RFC 5652, encoded using ASN.1 distinguished encoding rules (DER), as specified in ITU-T X.690.
crl binary A CertificateList structure, as specified in RFC 5280, encoded using ASN.1 distinguished encoding rules (DER), as specified in ITU-T X.690.
csr-info binary A CertificationRequestInfo structure, as defined in RFC 2986, encoded using ASN.1 distinguished encoding rules (DER), as specified in ITU-T X.690.
data-content-cms binary A CMS structure whose top-most content type MUST be the data content type, as described in Section 4 of RFC 5652.
digested-data-cms binary A CMS structure whose top-most content type MUST be the digested-data content type, as described in Section 7 of RFC 5652.
encrypted-data-cms binary A CMS structure whose top-most content type MUST be the encrypted-data content type, as described in Section 8 of RFC 5652.
end-entity-cert-cms binary A CMS SignedData structure that MUST contain the end-entity certificate itself and MAY contain any number of intermediate certificates leading up to a trust anchor certificate. The trust anchor certificate MAY be included as well. The CMS MUST contain a single end-entity certificate. The CMS MUST NOT contain any spurious certificates. This CMS structure MAY (as applicable where this type is used) also contain suitably fresh (as defined by local policy) revocation objects with which the device can verify the revocation status of the certificates. This CMS encodes the degenerate form of the SignedData structure (RFC 5652, Section 5.2) that is commonly used to disseminate X.509 certificates and revocation objects (RFC 5280).
end-entity-cert-x509 binary A Certificate structure that MUST encode a certificate that is neither self-signed nor has Basic constraint CA true.
enveloped-data-cms binary A CMS structure whose top-most content type MUST be the enveloped-data content type, as described in Section 6 of RFC 5652.
oscp-request binary A OCSPRequest structure, as specified in RFC 6960, encoded using ASN.1 distinguished encoding rules (DER), as specified in ITU-T X.690.
oscp-response binary A OCSPResponse structure, as specified in RFC 6960, encoded using ASN.1 distinguished encoding rules (DER), as specified in ITU-T X.690.
p10-csr binary A CertificationRequest structure, as specified in RFC 2986, encoded using ASN.1 distinguished encoding rules (DER), as specified in ITU-T X.690.
signed-data-cms binary A CMS structure whose top-most content type MUST be the signed-data content type, as described in Section 5 of RFC 5652.
trust-anchor-cert-cms binary A CMS SignedData structure that MUST contain the chain of X.509 certificates needed to authenticate the certificate presented by a client or end entity. The CMS MUST contain only a single chain of certificates. The client or end-entity certificate MUST only authenticate to the last intermediate CA certificate listed in the chain. In all cases, the chain MUST include a self-signed root certificate. In the case where the root certificate is itself the issuer of the client or end-entity certificate, only one certificate is present. This CMS structure MAY (as applicable where this type is used) also contain suitably fresh (as defined by local policy) revocation objects with which the device can verify the revocation status of the certificates. This CMS encodes the degenerate form of the SignedData structure (RFC 5652, Section 5.2) that is commonly used to disseminate X.509 certificates and revocation objects (RFC 5280).
trust-anchor-cert-x509 binary A Certificate structure that MUST encode a self-signed root certificate.
x509 binary A Certificate structure, as specified in RFC 5280, encoded using ASN.1 distinguished encoding rules (DER), as specified in ITU-T X.690.

© 2024 YumaWorks, Inc. All rights reserved.