<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet type="text/xsl" href="kerberos-parameters.xsl"?>
<?xml-model href="kerberos-parameters.rng" schematypens="http://relaxng.org/ns/structure/1.0" ?>
<registry xmlns="http://www.iana.org/assignments" id="kerberos-parameters">
  <title>Kerberos Parameters</title>
  <created>2004-06-29</created>
  <updated>2024-12-06</updated>
  <registry id="kerberos-parameters-1">
    <title>Kerberos Encryption Type Numbers</title>
    <xref type="rfc" data="rfc3961"/>
    <registration_rule>Standards Action for standards-track RFCs; non-standards-track 
RFCs must be reviewed by an expert.</registration_rule>
    <expert>Ken Raeburn</expert>
    <note>These are signed values ranging from -2147483648 to 2147483647.  Positive
values should be assigned only for algorithms specified in accordance
with this specification for use with Kerberos or related protocols.
Negative values are for private use; local and experimental algorithms
should use these values.  Zero is reserved and may not be assigned.
    </note>
    <record>
      <value>0</value>
      <description>reserved</description>
      <xref type="rfc" data="rfc6448"/>
    </record>
    <record>
      <value>1</value>
      <description>des-cbc-crc (deprecated)</description>
      <xref type="rfc" data="rfc6649"/>
    </record>
    <record>
      <value>2</value>
      <description>des-cbc-md4 (deprecated)</description>
      <xref type="rfc" data="rfc6649"/>
    </record>
    <record>
      <value>3</value>
      <description>des-cbc-md5 (deprecated)</description>
      <xref type="rfc" data="rfc6649"/>
    </record>
    <record>
      <value>4</value>
      <description>Reserved</description>
      <xref type="rfc" data="rfc3961"/>
    </record>
    <record>
      <value>5</value>
      <description>des3-cbc-md5 (deprecated)</description>
      <xref type="rfc" data="rfc8429"/>
    </record>
    <record>
      <value>6</value>
      <description>Reserved</description>
      <xref type="rfc" data="rfc3961"/>
    </record>
    <record>
      <value>7</value>
      <description>des3-cbc-sha1 (deprecated)</description>
      <xref type="rfc" data="rfc8429"/>
    </record>
    <record>
      <value>8</value>
      <description>Unassigned</description>
    </record>
    <record>
      <value>9</value>
      <description>dsaWithSHA1-CmsOID</description>
      <xref type="rfc" data="rfc4556"/>
    </record>
    <record>
      <value>10</value>
      <description>md5WithRSAEncryption-CmsOID</description>
      <xref type="rfc" data="rfc4556"/>
    </record>
    <record>
      <value>11</value>
      <description>sha1WithRSAEncryption-CmsOID</description>
      <xref type="rfc" data="rfc4556"/>
    </record>
    <record>
      <value>12</value>
      <description>rc2CBC-EnvOID</description>
      <xref type="rfc" data="rfc4556"/>
    </record>
    <record>
      <value>13</value>
      <description>rsaEncryption-EnvOID</description>
      <xref type="rfc" data="rfc4556"/>
      <xref type="text">from PKCS#1 v1.5]</xref>
    </record>
    <record>
      <value>14</value>
      <description>rsaES-OAEP-ENV-OID</description>
      <xref type="rfc" data="rfc4556"/>
      <xref type="text">from PKCS#1 v2.0]</xref>
    </record>
    <record>
      <value>15</value>
      <description>des-ede3-cbc-Env-OID</description>
      <xref type="rfc" data="rfc4556"/>
    </record>
    <record>
      <value>16</value>
      <description>des3-cbc-sha1-kd (deprecated)</description>
      <xref type="rfc" data="rfc8429"/>
    </record>
    <record>
      <value>17</value>
      <description>aes128-cts-hmac-sha1-96</description>
      <xref type="rfc" data="rfc3962"/>
    </record>
    <record>
      <value>18</value>
      <description>aes256-cts-hmac-sha1-96</description>
      <xref type="rfc" data="rfc3962"/>
    </record>
    <record date="2016-09-14">
      <value>19</value>
      <description>aes128-cts-hmac-sha256-128</description>
      <xref type="rfc" data="rfc8009"/>
    </record>
    <record date="2016-09-14">
      <value>20</value>
      <description>aes256-cts-hmac-sha384-192</description>
      <xref type="rfc" data="rfc8009"/>
    </record>
    <record>
      <value>21-22</value>
      <description>Unassigned</description>
    </record>
    <record>
      <value>23</value>
      <description>rc4-hmac (deprecated)</description>
      <xref type="rfc" data="rfc8429"/>
    </record>
    <record>
      <value>24</value>
      <description>rc4-hmac-exp (deprecated)</description>
      <xref type="rfc" data="rfc6649"/>
    </record>
    <record>
      <value>25</value>
      <description>camellia128-cts-cmac</description>
      <xref type="rfc" data="rfc6803"/>
    </record>
    <record>
      <value>26</value>
      <description>camellia256-cts-cmac</description>
      <xref type="rfc" data="rfc6803"/>
    </record>
    <record>
      <value>27-64</value>
      <description>Unassigned</description>
    </record>
    <record>
      <value>65</value>
      <description>subkey-keymaterial</description>
      <xref type="text">(opaque; PacketCable)</xref>
    </record>
    <record>
      <value>66-2147483647</value>
      <description>Unassigned</description>
    </record>
  </registry>

  <registry id="kerberos-parameters-2">
    <title>Kerberos Checksum Type Numbers</title>
    <xref type="rfc" data="rfc3961"/>
    <registration_rule>Standards Action for standards-track RFCs; non-standards-track 
RFCs must be reviewed by an expert.</registration_rule>
    <expert>Ken Raeburn</expert>
    <note>These are signed values ranging from -2147483648 to 2147483647.  Positive
values should be assigned only for algorithms specified in accordance
with this specification for use with Kerberos or related protocols.
Negative values are for private use; local and experimental algorithms
should use these values.  Zero is reserved and may not be assigned.
    </note>
    <record>
      <value>0</value>
      <description>Reserved</description>
      <xref type="rfc" data="rfc3961"/>
    </record>
    <record>
      <value>1</value>
      <description>CRC32 (deprecated)</description>
      <size>4</size>
      <xref type="rfc" data="rfc6649"/>
    </record>
    <record>
      <value>2</value>
      <description>rsa-md4 (deprecated)</description>
      <size>16</size>
      <xref type="rfc" data="rfc6649"/>
    </record>
    <record>
      <value>3</value>
      <description>rsa-md4-des (deprecated)</description>
      <size>24</size>
      <xref type="rfc" data="rfc6649"/>
    </record>
    <record>
      <value>4</value>
      <description>des-mac (deprecated)</description>
      <size>16</size>
      <xref type="rfc" data="rfc6649"/>
    </record>
    <record>
      <value>5</value>
      <description>des-mac-k (deprecated)</description>
      <size>8</size>
      <xref type="rfc" data="rfc6649"/>
    </record>
    <record>
      <value>6</value>
      <description>rsa-md4-des-k (deprecated)</description>
      <size>16</size>
      <xref type="rfc" data="rfc6649"/>
    </record>
    <record>
      <value>7</value>
      <description>rsa-md5 (deprecated)</description>
      <size>16</size>
      <xref type="rfc" data="rfc8429"/>
    </record>
    <record>
      <value>8</value>
      <description>rsa-md5-des (deprecated)</description>
      <size>24</size>
      <xref type="rfc" data="rfc6649"/>
    </record>
    <record>
      <value>9</value>
      <description>rsa-md5-des3</description>
      <size>24</size>
    </record>
    <record>
      <value>10</value>
      <description>sha1 (unkeyed)</description>
      <size>20</size>
    </record>
    <record>
      <value>11</value>
      <description>Unassigned</description>
    </record>
    <record>
      <value>12</value>
      <description>hmac-sha1-des3-kd (deprecated)</description>
      <size>20</size>
      <xref type="rfc" data="rfc8429"/>
    </record>
    <record>
      <value>13</value>
      <description>hmac-sha1-des3 (deprecated)</description>
      <size>20</size>
      <xref type="rfc" data="rfc8429"/>
    </record>
    <record>
      <value>14</value>
      <description>sha1 (unkeyed)</description>
      <size>20</size>
    </record>
    <record>
      <value>15</value>
      <description>hmac-sha1-96-aes128</description>
      <size>20</size>
      <xref type="rfc" data="rfc3962"/>
    </record>
    <record>
      <value>16</value>
      <description>hmac-sha1-96-aes256</description>
      <size>20</size>
      <xref type="rfc" data="rfc3962"/>
    </record>
    <record>
      <value>17</value>
      <description>cmac-camellia128</description>
      <size>16</size>
      <xref type="rfc" data="rfc6803"/>
    </record>
    <record>
      <value>18</value>
      <description>cmac-camellia256</description>
      <size>16</size>
      <xref type="rfc" data="rfc6803"/>
    </record>
    <record date="2016-09-14">
      <value>19</value>
      <description>hmac-sha256-128-aes128</description>
      <size>16</size>
      <xref type="rfc" data="rfc8009"/>
    </record>
    <record date="2016-09-14">
      <value>20</value>
      <description>hmac-sha384-192-aes256</description>
      <size>24</size>
      <xref type="rfc" data="rfc8009"/>
    </record>
    <record>
      <value>21-32770</value>
      <description>Unassigned</description>
    </record>
    <record>
      <value>32771</value>
      <description>Reserved</description>
      <xref type="rfc" data="rfc1964"/>
    </record>
    <record>
      <value>32772-2147483647</value>
      <description>Unassigned</description>
    </record>
  </registry>

  <registry id="kerberos-parameters-4">
    <title>Kerberos TCP Extensions</title>
    <xref type="rfc" data="rfc5021"/>
    <range>
      <value>0-29</value>
      <registration_rule>Standards Action or IESG Approval</registration_rule>
    </range>
    <range>
      <value>30</value>
      <registration_rule>Reserved</registration_rule>
      <note>Standards Action that updates or obsoletes <xref type="rfc" data="rfc5021"/></note>
    </range>
    <record>
      <value>0</value>
      <description>Krb5 over TLS</description>
      <xref type="rfc" data="rfc6251"/>
    </record>
    <record>
      <value>1-29</value>
      <description>Unassigned</description>
    </record>
    <record>
      <value>30</value>
      <description>Reserved</description>
      <xref type="rfc" data="rfc5021"/>
    </record>
  </registry>

  <registry id="pre-authentication">
    <title>Pre-authentication and Typed Data</title>
    <xref type="rfc" data="rfc6113"/>
    <registration_rule>Expert Review</registration_rule>
    <expert>Sam Hartman (primary), Larry Zhu (secondary)</expert>
    <note>The designated expert may find that IETF Review is required. See 
<xref type="rfc" data="rfc6113"/> for more information.
    </note>
    <record>
      <value>1</value>
      <description>PA-TGS-REQ</description>
      <xref type="rfc" data="rfc4120"/>
    </record>
    <record>
      <value>2</value>
      <description>PA-ENC-TIMESTAMP</description>
      <xref type="rfc" data="rfc4120"/>
    </record>
    <record>
      <value>3</value>
      <description>PA-PW-SALT</description>
      <xref type="rfc" data="rfc4120"/>
    </record>
    <record>
      <value>4</value>
      <description>reserved</description>
      <xref type="rfc" data="rfc6113"/>
    </record>
    <record>
      <value>5</value>
      <description>PA-ENC-UNIX-TIME (deprecated)</description>
      <xref type="rfc" data="rfc4120"/>
    </record>
    <record>
      <value>6</value>
      <description>PA-SANDIA-SECUREID</description>
      <xref type="rfc" data="rfc4120"/>
    </record>
    <record>
      <value>7</value>
      <description>PA-SESAME</description>
      <xref type="rfc" data="rfc4120"/>
    </record>
    <record>
      <value>8</value>
      <description>PA-OSF-DCE</description>
      <xref type="rfc" data="rfc4120"/>
    </record>
    <record>
      <value>9</value>
      <description>PA-CYBERSAFE-SECUREID</description>
      <xref type="rfc" data="rfc4120"/>
    </record>
    <record>
      <value>10</value>
      <description>PA-AFS3-SALT</description>
      <xref type="rfc" data="rfc4120"/>
      <xref type="rfc" data="rfc3961"/>
    </record>
    <record>
      <value>11</value>
      <description>PA-ETYPE-INFO</description>
      <xref type="rfc" data="rfc4120"/>
    </record>
    <record>
      <value>12</value>
      <description>PA-SAM-CHALLENGE</description>
      <xref type="draft" data="draft-ietf-cat-kerberos-passwords-04"/>
    </record>
    <record>
      <value>13</value>
      <description>PA-SAM-RESPONSE</description>
      <xref type="draft" data="draft-ietf-cat-kerberos-passwords-04"/>
    </record>
    <record>
      <value>14</value>
      <description>PA-PK-AS-REQ_OLD</description>
      <xref type="draft" data="draft-ietf-cat-kerberos-pk-init-09"/>
    </record>
    <record>
      <value>15</value>
      <description>PA-PK-AS-REP_OLD</description>
      <xref type="draft" data="draft-ietf-cat-kerberos-pk-init-09"/>
    </record>
    <record>
      <value>16</value>
      <description>PA-PK-AS-REQ</description>
      <xref type="rfc" data="rfc4556"/>
    </record>
    <record>
      <value>17</value>
      <description>PA-PK-AS-REP</description>
      <xref type="rfc" data="rfc4556"/>
    </record>
    <record>
      <value>18</value>
      <description>PA-PK-OCSP-RESPONSE</description>
      <xref type="rfc" data="rfc4557"/>
    </record>
    <record>
      <value>19</value>
      <description>PA-ETYPE-INFO2</description>
      <xref type="rfc" data="rfc4120"/>
    </record>
    <record>
      <value>20</value>
      <description>PA-USE-SPECIFIED-KVNO</description>
      <xref type="rfc" data="rfc4120"/>
    </record>
    <record>
      <value>20</value>
      <description>PA-SVR-REFERRAL-INFO</description>
      <xref type="rfc" data="rfc6806"/>
    </record>
    <record>
      <value>21</value>
      <description>PA-SAM-REDIRECT</description>
      <xref type="draft" data="draft-ietf-krb-wg-kerberos-sam-03"/>
    </record>
    <record>
      <value>22</value>
      <description>PA-GET-FROM-TYPED-DATA</description>
      <xref type="text">(embedded in typed data)</xref>
      <xref type="rfc" data="rfc4120"/>
    </record>
    <record>
      <value>22</value>
      <description>TD-PADATA</description>
      <xref type="text">(embeds padata)</xref>
      <xref type="rfc" data="rfc4120"/>
    </record>
    <record>
      <value>23</value>
      <description>PA-SAM-ETYPE-INFO</description>
      <xref type="text">(sam/otp)</xref>
      <xref type="draft" data="draft-ietf-krb-wg-kerberos-sam-03"/>
    </record>
    <record>
      <value>24</value>
      <description>PA-ALT-PRINC</description>
      <xref type="draft" data="draft-ietf-krb-wg-hw-auth-04"/>
    </record>
    <record>
      <value>25</value>
      <description>PA-SERVER-REFERRAL</description>
      <xref type="draft" data="draft-ietf-krb-wg-kerberos-referrals-11"/>
    </record>
    <record>
      <value>26-29</value>
      <description>Unassigned</description>
    </record>
    <record>
      <value>30</value>
      <description>PA-SAM-CHALLENGE2</description>
      <xref type="draft" data="draft-ietf-krb-wg-kerberos-sam-03"/>
    </record>
    <record>
      <value>31</value>
      <description>PA-SAM-RESPONSE2</description>
      <xref type="draft" data="draft-ietf-krb-wg-kerberos-sam-03"/>
    </record>
    <record>
      <value>32-40</value>
      <description>Unassigned</description>
    </record>
    <record>
      <value>41</value>
      <description>PA-EXTRA-TGT</description>
      <xref type="text">Reserved extra TGT</xref>
      <xref type="rfc" data="rfc6113"/>
    </record>
    <record>
      <value>42-100</value>
      <description>Unassigned</description>
    </record>
    <record>
      <value>101</value>
      <description>TD-PKINIT-CMS-CERTIFICATES</description>
      <xref type="rfc" data="rfc4556"/>
    </record>
    <record>
      <value>102</value>
      <description>TD-KRB-PRINCIPAL</description>
      <xref type="text">PrincipalName</xref>
      <xref type="rfc" data="rfc6113"/>
    </record>
    <record>
      <value>103</value>
      <description>TD-KRB-REALM</description>
      <xref type="text">Realm</xref>
      <xref type="rfc" data="rfc6113"/>
    </record>
    <record>
      <value>104</value>
      <description>TD-TRUSTED-CERTIFIERS</description>
      <xref type="rfc" data="rfc4556"/>
    </record>
    <record>
      <value>105</value>
      <description>TD-CERTIFICATE-INDEX</description>
      <xref type="rfc" data="rfc4556"/>
    </record>
    <record>
      <value>106</value>
      <description>TD-APP-DEFINED-ERROR</description>
      <xref type="text">Application specific</xref>
      <xref type="rfc" data="rfc6113"/>
    </record>
    <record>
      <value>107</value>
      <description>TD-REQ-NONCE</description>
      <xref type="text">INTEGER</xref>
      <xref type="rfc" data="rfc6113"/>
    </record>
    <record>
      <value>108</value>
      <description>TD-REQ-SEQ</description>
      <xref type="text">INTEGER</xref>
      <xref type="rfc" data="rfc6113"/>
    </record>
    <record>
      <value>109</value>
      <description>TD_DH_PARAMETERS</description>
      <xref type="rfc" data="rfc4556"/>
    </record>
    <record>
      <value>110</value>
      <description>Unassigned</description>
    </record>
    <record> 
      <value>111</value>
      <description>TD-CMS-DIGEST-ALGORITHMS</description>
      <xref type="rfc" data="rfc8636"/>
    </record>
    <record>
      <value>112</value>
      <description>TD-CERT-DIGEST-ALGORITHMS</description>
      <xref type="rfc" data="rfc8636"/>
    </record>
    <record>
      <value>113-127</value>
      <description>Unassigned</description>
    </record>
    <record>
      <value>128</value>
      <description>PA-PAC-REQUEST</description>
      <xref type="text">MSKILE</xref>
      <xref type="uri" data="http://msdn2.microsoft.com/en-us/library/cc206927.aspx"/>
    </record>
    <record>
      <value>129</value>
      <description>PA-FOR_USER</description>
      <xref type="text">MSKILE</xref>
      <xref type="uri" data="http://msdn2.microsoft.com/en-us/library/cc206927.aspx"/>
    </record>
    <record>
      <value>130</value>
      <description>PA-FOR-X509-USER</description>
      <xref type="text">MSKILE</xref>
      <xref type="uri" data="http://msdn2.microsoft.com/en-us/library/cc206927.aspx"/>
    </record>
    <record>
      <value>131</value>
      <description>PA-FOR-CHECK_DUPS</description>
      <xref type="text">MSKILE</xref>
      <xref type="uri" data="http://msdn2.microsoft.com/en-us/library/cc206927.aspx"/>
    </record>
    <record>
      <value>132</value>
      <description>PA-AS-CHECKSUM</description>
      <xref type="text">MSKILE</xref>
      <xref type="uri" data="http://msdn2.microsoft.com/en-us/library/cc206927.aspx"/>
    </record>
    <record>
      <value>133</value>
      <description>PA-FX-COOKIE</description>
      <xref type="rfc" data="rfc6113"/>
    </record>
    <record>
      <value>134</value>
      <description>PA-AUTHENTICATION-SET</description>
      <xref type="rfc" data="rfc6113"/>
    </record>
    <record>
      <value>135</value>
      <description>PA-AUTH-SET-SELECTED</description>
      <xref type="rfc" data="rfc6113"/>
    </record>
    <record>
      <value>136</value>
      <description>PA-FX-FAST</description>
      <xref type="rfc" data="rfc6113"/>
    </record>
    <record>
      <value>137</value>
      <description>PA-FX-ERROR</description>
      <xref type="rfc" data="rfc6113"/>
    </record>
    <record>
      <value>138</value>
      <description>PA-ENCRYPTED-CHALLENGE</description>
      <xref type="rfc" data="rfc6113"/>
    </record>
    <record>
      <value>139-140</value>
      <description>Unassigned</description>
    </record>
    <record>
      <value>141</value>
      <description>PA-OTP-CHALLENGE</description>
      <xref type="rfc" data="rfc6560"/>
    </record>
    <record>
      <value>142</value>
      <description>PA-OTP-REQUEST</description>
      <xref type="rfc" data="rfc6560"/>
    </record>
    <record>
      <value>143</value>
      <description>PA-OTP-CONFIRM (OBSOLETED)</description>
      <xref type="rfc" data="rfc6560"/>
    </record>
    <record>
      <value>144</value>
      <description>PA-OTP-PIN-CHANGE</description>
      <xref type="rfc" data="rfc6560"/>
    </record>
    <record>
      <value>145</value>
      <description>PA-EPAK-AS-REQ</description>
      <xref type="text">(sshock@gmail.com)</xref>
      <xref type="rfc" data="rfc6113"/>
    </record>
    <record>
      <value>146</value>
      <description>PA-EPAK-AS-REP</description>
      <xref type="text">(sshock@gmail.com)</xref>
      <xref type="rfc" data="rfc6113"/>
    </record>
    <record>
      <value>147</value>
      <description>PA_PKINIT_KX</description>
      <xref type="rfc" data="rfc8062"/>
    </record>
    <record>
      <value>148</value>
      <description>PA_PKU2U_NAME</description>
      <xref type="draft" data="draft-zhu-pku2u-09"/>
    </record>
    <record>
      <value>149</value>
      <description>PA-REQ-ENC-PA-REP</description>
      <xref type="rfc" data="rfc6806"/>
    </record>
    <record>
      <value>150</value>
      <description>PA_AS_FRESHNESS</description>
      <xref type="rfc" data="rfc8070"/>
    </record>
    <record date="2018-01-24">
      <value>151</value>
      <description>PA-SPAKE</description>
      <xref type="rfc" data="rfc9588"/>
    </record>
    <record date="2021-11-29">
      <value>152</value>
      <description>PA-REDHAT-IDP-OAUTH2</description>
      <xref type="person" data="Pavel_Březina"/>
    </record>
    <record date="2023-03-20" updated="2023-03-29">
      <value>153</value>
      <description>PA-REDHAT-PASSKEY</description>
      <xref type="person" data="Pavel_Březina"/>
    </record>
    <record>
      <value>154-164</value>
      <description>Unassigned</description>
    </record>
    <record>
      <value>165</value>
      <description>PA-SUPPORTED-ETYPES</description>
      <xref type="text">MSKILE</xref>
      <xref type="uri" data="http://msdn2.microsoft.com/en-us/library/cc206927.aspx"/>
    </record>
    <record>
      <value>166</value>
      <description>PA-EXTENDED_ERROR</description>
      <xref type="text">MSKILE</xref>
      <xref type="uri" data="http://msdn2.microsoft.com/en-us/library/cc206927.aspx"/>
    </record>
        
  </registry>
  
  <registry id="fast-armor">
    <title>FAST Armor Types</title>
    <xref type="rfc" data="rfc6113"/>
    <registration_rule>Standards Action</registration_rule>
    <record>
      <value>0</value>
      <name>Reserved</name>
      <description>Reserved</description>
      <xref type="rfc" data="rfc6113"/>
    </record>
    <record>
      <value>1</value>
      <name>FX_FAST_ARMOR_AP_REQUEST</name>
      <description>Ticket armor using an ap-req.</description>
      <xref type="rfc" data="rfc6113"/>
    </record>   
    </registry>
 
  <registry id="fast-options">
    <title>FAST Options</title>
    <xref type="rfc" data="rfc6113"/>
    <registration_rule>Standards Action</registration_rule>
    <record>
      <value>0</value>
      <name>RESERVED</name>
      <description>Reserved for future expansion of this field.</description>
      <xref type="rfc" data="rfc6113"/>
    </record>
    <record>
      <value>1</value>
      <name>hide-client-names</name>
      <description>Requesting the KDC to hide client names in the KDC response</description>
      <xref type="rfc" data="rfc6113"/>
    </record>
    <record>
      <value>16</value>
      <name>kdc-follow-referrals</name>
      <description>reserved</description>
      <xref type="rfc" data="rfc6113"/>
    </record> 
  </registry>
  
  <registry id="principal-names">
    <title>Well-Known Kerberos Principal Names</title>
    <xref type="rfc" data="rfc6111"/>
    <expert>Unassigned</expert>
    <registration_rule>Specification Required</registration_rule>
    <record>
      <name>anonymous</name>
      <xref type="rfc" data="rfc8062"/>
    </record>
  </registry>
  
  <registry id="realm-names">
    <title>Well-Known Kerberos Realm Names</title>
    <xref type="rfc" data="rfc6111"/>
    <expert>Unassigned</expert>
    <registration_rule>Specification Required</registration_rule>
    <record>
      <name>anonymous</name>
      <xref type="rfc" data="rfc8062"/>
    </record>
  </registry>
  
  <registry id="transport-type">
    <title>Kerberos Message Transport Types</title>
    <xref type="rfc" data="rfc6784"/>
    <registration_rule>IETF Review</registration_rule>
    <record>
      <value>0</value>
      <name>Reserved</name>
      <xref type="rfc" data="rfc6784"/>
    </record>
    <record>
      <value>1</value>
      <name>UDP</name>
      <xref type="rfc" data="rfc6784"/>
    </record>
    <record>
      <value>2</value>
      <name>TCP</name>
      <xref type="rfc" data="rfc6784"/>
    </record>
    <record>
      <value>3</value>
      <name>TLS</name>
      <xref type="rfc" data="rfc6784"/>
    </record>
    <record>
      <value>4-254</value>
      <name>Unassigned</name>
    </record>
    <record>
      <value>255</value>
      <name>Reserved</name>
      <xref type="rfc" data="rfc6784"/>
    </record>
  </registry>
  
  <registry id="second-factor-types">
    <title>Kerberos Second Factor Types</title>
    <xref type="rfc" data="rfc9588"/>
    <registration_rule>Specification Required</registration_rule>
    <expert>Simo Sorce, Greg Hudson</expert>
    <note>Registration requests should be sent to the mailing list described 
in <xref type="rfc" data="rfc9588"/>. If approved, designated experts should notify IANA 
within three weeks. For assistance, please contact iana@iana.org.
    </note>
    <note>These are signed integers ranging from -2147483648 to 2147483647,
inclusive. Positive values must be assigned only for algorithms 
specified in accordance with these rules for use with Kerberos 
and related protocols. Negative values should be used for private 
and experimental algorithms only. Zero is reserved and must not 
be assigned. Values should be assigned in increasing order.
    </note>
    <record date="2024-02-16">
      <value>0</value>
      <description>Reserved</description>
      <xref type="rfc" data="rfc9588"/>
    </record>
    <record date="2024-02-16">
      <value>1</value>
      <description>SF-NONE</description>
      <xref type="rfc" data="rfc9588"/>
    </record>
  </registry>

  <registry id="spake-groups">
    <title>Kerberos SPAKE Groups</title>
    <xref type="rfc" data="rfc9588"/>
    <registration_rule>Specification Required</registration_rule>
    <expert>Simo Sorce, Greg Hudson</expert>
    <note>Registration requests should be sent to the mailing list described 
in <xref type="rfc" data="rfc9588"/>. If approved, designated experts should notify IANA 
within three weeks. For assistance, please contact iana@iana.org.
    </note>
    <note>These are signed integers ranging from -2147483648 to 2147483647,
inclusive. Positive values must be assigned only for algorithms 
specified in accordance with these rules for use with Kerberos 
and related protocols. Negative values should be used for private 
and experimental algorithms only. Zero is reserved and must not 
be assigned. Values should be assigned in increasing order.
    </note>
    <record date="2024-02-16">
      <value>0</value>
      <name>Reserved</name>
      <serial/>
      <length/>
      <conv/>
      <spakem/>
      <spaken/>
      <hash/>
      <xref type="rfc" data="rfc9588"/>
    </record>
    <record date="2024-02-16">
      <value>1</value>
      <name>edwards25519</name>
      <serial><xref type="rfc" data="rfc8032">RFC8032, Section 3.1</xref></serial>
      <length>32</length>
      <conv><xref type="rfc" data="rfc8032">RFC8032, Section 3.1</xref></conv>
      <spakem>d048032c6ea0b6d697ddc2e86bda85a33adac920f1bf18e1b0c6d166a5cecdaf</spakem>
      <spaken>d3bfb518f44f3430f29d0c92af503865a1ed3281dc69b35dd868ba85f886c4ab</spaken>
      <hash>SHA-256 <xref type="rfc" data="rfc6234"/></hash>
      <xref type="rfc" data="rfc7748">RFC7748, Section 4.1</xref>
      <xref type="text">(edwards25519)</xref>
    </record>
    <record date="2024-02-16">
      <value>2</value>
      <name>P-256</name>
      <serial><xref type="uri" data="https://www.secg.org/sec1-v2.pdf">SECG-SEC1, Section 2.3.3</xref>
      <xref type="text">(compressed format)</xref></serial>
      <length>32</length>
      <conv><xref type="uri" data="https://www.secg.org/sec1-v2.pdf">SECG-SEC1, Section 2.3.8</xref></conv>
      <spakem>02886e2f97ace46e55ba9dd7242579f2993b64e16ef3dcab95afd497333d8fa12f</spakem>
      <spaken>03d8bbd6c639c62937b04d997f38c3770719c629d7014d49a24b4f98baa1292b49</spaken>
      <hash>SHA-256 <xref type="rfc" data="rfc6234"/></hash>
      <xref type="uri" data="http://www.secg.org/sec2-v2.pdf">SECG-SEC2, Section 2.4.2</xref>
    </record>
    <record date="2024-02-16">
      <value>3</value>
      <name>P-384</name>
      <serial><xref type="uri" data="https://www.secg.org/sec1-v2.pdf">SECG-SEC1, Section 2.3.3</xref>
      <xref type="text">(compressed format)</xref></serial>
      <length>48</length>
      <conv><xref type="uri" data="https://www.secg.org/sec1-v2.pdf">SECG-SEC1, Section 2.3.8</xref></conv>
      <spakem>030ff0895ae5ebf6187080a82d82b42e2765e3b2f8749c7e05eba366434b363d3dc36f15314739074d2eb8613fceec2853</spakem>
      <spaken>02c72cf2e390853a1c1c4ad816a62fd15824f56078918f43f922ca21518f9c543bb252c5490214cf9aa3f0baab4b665c10</spaken>
      <hash>SHA-384 <xref type="rfc" data="rfc6234"/></hash>
      <xref type="uri" data="http://www.secg.org/sec2-v2.pdf">SECG-SEC2, Section 2.5.1</xref>
    </record>
    <record date="2024-02-16">
      <value>4</value>
      <name>P-521</name>
      <serial><xref type="uri" data="https://www.secg.org/sec1-v2.pdf">SECG-SEC1, Section 2.3.3</xref>
      <xref type="text">(compressed format)</xref></serial>
      <length>48</length>
      <conv><xref type="uri" data="https://www.secg.org/sec1-v2.pdf">SECG-SEC1, Section 2.3.8</xref></conv>
      <spakem>02003f06f38131b2ba2600791e82488e8d20ab889af753a41806c5db18d37d85608cfae06b82e4a72cd744c719193562a653ea1f119eef9356907edc9b56979962d7aa</spakem>
      <spaken>0200c7924b9ec017f3094562894336a53c50167ba8c5963876880542bc669e494b2532d76c5b53dfb349fdf69154b9e0048c58a42e8ed04cef052a3bc349d95575cd25</spaken>
      <hash>SHA-512 <xref type="rfc" data="rfc6234"/></hash>
      <xref type="uri" data="http://www.secg.org/sec2-v2.pdf">SECG-SEC2, Section 2.6.1</xref>
    </record>
  </registry>

  <people>
    <person id="Pavel_Březina">
      <name>Pavel Březina</name>
      <uri>mailto:pbrezina&amp;redhat.com</uri>
      <updated>2023-03-29</updated>
    </person>
  </people>
</registry>
