OpenCores
URL https://opencores.org/ocsvn/openrisc_me/openrisc_me/trunk

Subversion Repositories openrisc_me

[/] [openrisc/] [trunk/] [rtos/] [rtems/] [c/] [src/] [librpc/] [include/] [rpcsvc/] [key_prot.x] - Rev 173

Compare with Previous | Blame | View Log

%/*
% * Sun RPC is a product of Sun Microsystems, Inc. and is provided for
% * unrestricted use provided that this legend is included on all tape
% * media and as a part of the software program in whole or part.  Users
% * may copy or modify Sun RPC without charge, but are not authorized
% * to license or distribute it to anyone else except as part of a product or
% * program developed by the user.
% *
% * SUN RPC IS PROVIDED AS IS WITH NO WARRANTIES OF ANY KIND INCLUDING THE
% * WARRANTIES OF DESIGN, MERCHANTIBILITY AND FITNESS FOR A PARTICULAR
% * PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE.
% *
% * Sun RPC is provided with no support and without any obligation on the
% * part of Sun Microsystems, Inc. to assist in its use, correction,
% * modification or enhancement.
% *
% * SUN MICROSYSTEMS, INC. SHALL HAVE NO LIABILITY WITH RESPECT TO THE
% * INFRINGEMENT OF COPYRIGHTS, TRADE SECRETS OR ANY PATENTS BY SUN RPC
% * OR ANY PART THEREOF.
% *
% * In no event will Sun Microsystems, Inc. be liable for any lost revenue
% * or profits or other special, indirect and consequential damages, even if
% * Sun has been advised of the possibility of such damages.
% *
% * Sun Microsystems, Inc.
% * 2550 Garcia Avenue
% * Mountain View, California  94043
% */
/*
 * Key server protocol definition
 * Copyright (C) 1990, 1991 Sun Microsystems, Inc.
 *
 * The keyserver is a public key storage/encryption/decryption service
 * The encryption method used is based on the Diffie-Hellman exponential
 * key exchange technology.
 *
 * The key server is local to each machine, akin to the portmapper.
 * Under TI-RPC, communication with the keyserver is through the
 * loopback transport.
 *
 * NOTE: This .x file generates the USER level headers for the keyserver.
 * the KERNEL level headers are created by hand as they kernel has special
 * requirements.
 */

%/* From: #pragma ident "@(#)key_prot.x 1.7     94/04/29 SMI" */
%
%/* Copyright (c)  1990, 1991 Sun Microsystems, Inc. */
%
%/* 
% * Compiled from key_prot.x using rpcgen.
% * DO NOT EDIT THIS FILE!
% * This is NOT source code!
% */

/*
 * PROOT and MODULUS define the way the Diffie-Hellman key is generated.
 *
 * MODULUS should be chosen as a prime of the form: MODULUS == 2*p + 1,
 * where p is also prime.
 *
 * PROOT satisfies the following two conditions:
 * (1) (PROOT ** 2) % MODULUS != 1
 * (2) (PROOT ** p) % MODULUS != 1
 *
 */

const PROOT = 3;
const HEXMODULUS = "d4a0ba0250b6fd2ec626e7efd637df76c716e22d0944b88b";

const HEXKEYBYTES = 48;         /* HEXKEYBYTES == strlen(HEXMODULUS) */
const KEYSIZE = 192;            /* KEYSIZE == bit length of key */
const KEYBYTES = 24;            /* byte length of key */

/*
 * The first 16 hex digits of the encrypted secret key are used as
 * a checksum in the database.
 */
const KEYCHECKSUMSIZE = 16;

/*
 * status of operation
 */
enum keystatus {
        KEY_SUCCESS,    /* no problems */
        KEY_NOSECRET,   /* no secret key stored */
        KEY_UNKNOWN,    /* unknown netname */
        KEY_SYSTEMERR   /* system error (out of memory, encryption failure) */
};

typedef opaque keybuf[HEXKEYBYTES];     /* store key in hex */

typedef string netnamestr<MAXNETNAMELEN>;

/*
 * Argument to ENCRYPT or DECRYPT 
 */
struct cryptkeyarg {
        netnamestr remotename;
        des_block deskey;
};

/*
 * Argument to ENCRYPT_PK or DECRYPT_PK
 */
struct cryptkeyarg2 {
        netnamestr remotename;
        netobj  remotekey;      /* Contains a length up to 1024 bytes */
        des_block deskey;
};


/*
 * Result of ENCRYPT, DECRYPT, ENCRYPT_PK, and DECRYPT_PK
 */
union cryptkeyres switch (keystatus status) {
case KEY_SUCCESS:
        des_block deskey;
default:
        void;
};

const MAXGIDS  = 16;    /* max number of gids in gid list */

/*
 * Unix credential 
 */     
struct unixcred {
        u_int uid;
        u_int gid;
        u_int gids<MAXGIDS>;    
};

/*
 * Result returned from GETCRED
 */
union getcredres switch (keystatus status) {
case KEY_SUCCESS:
        unixcred cred;
default:
        void;
};
/*
 * key_netstarg;
 */

struct key_netstarg {
        keybuf st_priv_key;
        keybuf st_pub_key;
        netnamestr st_netname;
};

union key_netstres switch (keystatus status){
case KEY_SUCCESS:
        key_netstarg knet;
default:
        void;
};      

#ifdef RPC_HDR
%
%#ifndef opaque
%#define opaque char
%#endif
%
#endif
program KEY_PROG {
        version KEY_VERS {

                /*
                 * This is my secret key.
                 * Store it for me.
                 */
                keystatus 
                KEY_SET(keybuf) = 1;    
        
                /*
                 * I want to talk to X.
                 * Encrypt a conversation key for me.
                 */
                cryptkeyres
                KEY_ENCRYPT(cryptkeyarg) = 2;   

                /*
                 * X just sent me a message.
                 * Decrypt the conversation key for me.
                 */
                cryptkeyres
                KEY_DECRYPT(cryptkeyarg) = 3;

                /*
                 * Generate a secure conversation key for me
                 */
                des_block 
                KEY_GEN(void) = 4;

                /*
                 * Get me the uid, gid and group-access-list associated
                 * with this netname (for kernel which cannot use NIS)
                 */
                getcredres
                KEY_GETCRED(netnamestr) = 5;
        } = 1;
        version KEY_VERS2 {

                /*
                 * #######
                 * Procedures 1-5 are identical to version 1
                 * #######
                 */

                /*
                 * This is my secret key.
                 * Store it for me.
                 */
                keystatus 
                KEY_SET(keybuf) = 1;    
        
                /*
                 * I want to talk to X.
                 * Encrypt a conversation key for me.
                 */
                cryptkeyres
                KEY_ENCRYPT(cryptkeyarg) = 2;   

                /*
                 * X just sent me a message.
                 * Decrypt the conversation key for me.
                 */
                cryptkeyres
                KEY_DECRYPT(cryptkeyarg) = 3;

                /*
                 * Generate a secure conversation key for me
                 */
                des_block 
                KEY_GEN(void) = 4;

                /*
                 * Get me the uid, gid and group-access-list associated
                 * with this netname (for kernel which cannot use NIS)
                 */
                getcredres
                KEY_GETCRED(netnamestr) = 5;
                
                /*
                 * I want to talk to X. and I know X's public key
                 * Encrypt a conversation key for me.
                 */
                cryptkeyres
                KEY_ENCRYPT_PK(cryptkeyarg2) = 6;       

                /*
                 * X just sent me a message. and I know X's public key
                 * Decrypt the conversation key for me.
                 */
                cryptkeyres
                KEY_DECRYPT_PK(cryptkeyarg2) = 7;
                
                /* 
                 * Store my public key, netname and private key. 
                 */
                keystatus
                KEY_NET_PUT(key_netstarg) = 8;
                
                /*
                 * Retrieve my public key, netname and private key. 
                 */
                key_netstres
                KEY_NET_GET(void) = 9;
                
                /*
                 * Return me the conversation key that is constructed 
                 * from my secret key and this publickey. 
                 */

                cryptkeyres 
                KEY_GET_CONV(keybuf) = 10; 

                
        } = 2;
} = 100029;


Compare with Previous | Blame | View Log

powered by: WebSVN 2.1.0

© copyright 1999-2024 OpenCores.org, equivalent to Oliscience, all rights reserved. OpenCores®, registered trademark.