1N/A * The contents of this file are subject to the terms of the 1N/A * Common Development and Distribution License, Version 1.0 only 1N/A * (the "License"). You may not use this file except in compliance 1N/A * See the License for the specific language governing permissions 1N/A * and limitations under the License. 1N/A * When distributing Covered Code, include this CDDL HEADER in each 1N/A * If applicable, add the following below this CDDL HEADER, with the 1N/A * fields enclosed by brackets "[]" replaced with your own identifying 1N/A * information: Portions Copyright [yyyy] [name of copyright owner] 1N/A * Key server protocol definition 1N/A * Copyright (C) 1990, 1991 Sun Microsystems, Inc. 1N/A * The encryption method used is based on the Diffie-Hellman exponential 1N/A * key exchange technology. 1N/A * The key server is local to each machine, akin to the portmapper. 1N/A * Under TI-RPC, communication with the keyserver is through the 1N/A * loopback transport. 1N/A * NOTE: This .x file generates the USER level headers for the keyserver. 1N/A * the KERNEL level headers are created by hand as they kernel has special 1N/A%#
pragma ident "%Z%%M% %I% %E% SMI" 1N/A%
/* Copyright (c) 1990, 1991 Sun Microsystems, Inc. */ 1N/A% * Compiled from key_prot.x using rpcgen. 1N/A% * DO NOT EDIT THIS FILE! 1N/A% * This is NOT source code! 1N/A * PROOT and MODULUS define the way the Diffie-Hellman key is generated. 1N/A * MODULUS should be chosen as a prime of the form: MODULUS == 2*p + 1, 1N/A * where p is also prime. 1N/A * PROOT satisfies the following two conditions: 1N/A * (1) (PROOT ** 2) % MODULUS != 1 1N/A * (2) (PROOT ** p) % MODULUS != 1 1N/Aconst HEXMODULUS =
"d4a0ba0250b6fd2ec626e7efd637df76c716e22d0944b88b";
1N/Aconst KEYSIZE =
192;
/* KEYSIZE == bit length of key */ 1N/A * The first 16 hex digits of the encrypted secret key are used as 1N/A * a checksum in the database. 1N/A * status of operation 1N/A * algorithm type & key size * number of keys for KEY_GEN_3 to return * Argument to ENCRYPT or DECRYPT * Argument to ENCRYPT_PK or DECRYPT_PK * Argument to ENCRYPT_3, ENCRYPT_PK_3, DECRYPT_3, DECRYPT_PK_3 * Result of ENCRYPT, DECRYPT, ENCRYPT_PK, DECRYPT_PK, KEY_GET_CONV * Result of ENCRYPT_3, DECRYPT_3, ENCRYPT_PK_3, DECRYPT_PK_3, KEY_GET_CONV_3 const MAXGIDS =
16;
/* max number of gids in gid list */ * Unix credential, without arbitrary limit * Result returned from GETCRED * Result returned from GETCRED_3 * Argument to KEY_GET_CONV_3 * Encrypt a conversation key for me. * X just sent me a message. * Decrypt the conversation key for me. * Generate a secure conversation key for me * Get me the uid, gid and group-access-list associated * with this netname (for kernel which cannot use NIS) * Procedures 1-5 are identical to version 1 * Encrypt a conversation key for me. * X just sent me a message. * Decrypt the conversation key for me. * Generate a secure conversation key for me * Get me the uid, gid and group-access-list associated * with this netname (for kernel which cannot use NIS) * I want to talk to X. and I know X's public key * Encrypt a conversation key for me. * X just sent me a message. and I know X's public key * Decrypt the conversation key for me. * Store my public key, netname and private key. * Retrieve my public key, netname and private key. * Return me the conversation (common) key that is constructed * from my secret key and this publickey. * Procedures 1-10 are identical to versions 1 & 2 * Encrypt a conversation key for me. * X just sent me a message. * Decrypt the conversation key for me. * Generate a secure conversation key for me * Get me the uid, gid and group-access-list associated * with this netname (for kernel which cannot use NIS) * I want to talk to X. and I know X's public key * Encrypt a conversation key for me. * X just sent me a message. and I know X's public key * Decrypt the conversation key for me. * Store my public key, netname and private key. * Retrieve my public key, netname and private key. * Return me the conversation (common) key that is constructed * from my secret key and this publickey. * Procedures new in version 3 follow... * Encrypt a conversation key for me. * X just sent me a message. * Decrypt the conversation key for me. * Generate secure conversation key(s) for me * Get me the uid, gid and group-access-list associated * with this netname (for kernel which cannot use NIS) * I want to talk to X. and I know X's public key * Encrypt a conversation key for me. * X just sent me a message. and I know X's public key * Decrypt the conversation key for me. * Store my public key, netname and private key. * Retrieve my public key, netname and private key. * Return me the conversation (common) key that is constructed * from my secret key and this publickey.