亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rpc.rfc.ms

?? RTEMS (Real-Time Executive for Multiprocessor Systems) is a free open source real-time operating sys
?? MS
?? 第 1 頁 / 共 3 頁
字號:
.el .DS L.ft I/** Body of an RPC request call: * In version 2 of the  RPC protocol specification, rpcvers must* be equal to 2.  The  fields prog,  vers, and proc specify the* remote program, its version number, and the  procedure within* the remote program to be called.  After these  fields are two* authentication  parameters: cred (authentication credentials)* and verf  (authentication verifier).  The  two authentication* parameters are   followed by  the  parameters  to  the remote* procedure,  which  are specified  by  the  specific   program* protocol.*/.ft CWstruct call_body {	unsigned int rpcvers;  /* \fImust be equal to two (2) \fP*/	unsigned int prog;	unsigned int vers;	unsigned int proc;	opaque_auth cred;	opaque_auth verf;	/* \fIprocedure specific parameters start here \fP*/};.DE.ie t .DS.el .DS L.ft I/** Body of a reply to an RPC request:* The call message was either accepted or rejected.*/.ft CWunion reply_body switch (reply_stat stat) {	case MSG_ACCEPTED:  		accepted_reply areply;	case MSG_DENIED:  		rejected_reply rreply;} reply;.DE.ie t .DS.el .DS L.ft I/** Reply to   an RPC request  that  was accepted  by the server:* there could be an error even though the request was accepted.* The first field is an authentication verifier that the server* generates in order to  validate itself  to the caller.  It is* followed by    a  union whose     discriminant  is   an  enum* accept_stat.  The  \fISUCCESS\fP  arm of    the union  is  protocol* specific.  The \fIPROG_UNAVAIL\fP, \fIPROC_UNAVAIL\fP, and \fIGARBAGE_ARGP\fP* arms of the union are void.   The \fIPROG_MISMATCH\fP arm specifies* the lowest and highest version numbers of the  remote program* supported by the server.*/.ft CWstruct accepted_reply {	opaque_auth verf;	union switch (accept_stat stat) {		case SUCCESS:			opaque results[0];			/* \fIprocedure-specific results start here\fP */		case PROG_MISMATCH:			struct {				unsigned int low;				unsigned int high;			} mismatch_info;		default:.ft I			/*			* Void.  Cases include \fIPROG_UNAVAIL, PROC_UNAVAIL\fP,			* and \fIGARBAGE_ARGS\fP.			*/.ft CW			void;	} reply_data;};.DE.ie t .DS.el .DS L.ft I/** Reply to an RPC request that was rejected by the server: * The request  can   be rejected for   two reasons:  either the* server   is not  running a   compatible  version  of the  RPC* protocol    (\fIRPC_MISMATCH\fP), or    the  server   refuses    to* authenticate the  caller  (\fIAUTH_ERROR\fP).  In  case of  an  RPC* version mismatch,  the server returns the  lowest and highest* supported    RPC  version    numbers.  In   case   of refused* authentication, failure status is returned.*/.ft CWunion rejected_reply switch (reject_stat stat) {	case RPC_MISMATCH:		struct {			unsigned int low;			unsigned int high;		} mismatch_info;	case AUTH_ERROR: 		auth_stat stat;};.DE.NH 1\&Authentication Protocols.LPAs previously stated, authentication parameters are opaque, butopen-ended to the rest of the RPC protocol.  This section definessome "flavors" of authentication implemented at (and supported by)Sun.  Other sites are free to invent new authentication types, withthe same rules of flavor number assignment as there is for programnumber assignment..NH 2\&Null Authentication.LPOften calls must be made where the caller does not know who he is orthe server does not care who the caller is.  In this case, the flavorvalue (the discriminant of the \fIopaque_auth\fP's union) of the RPCmessage's credentials, verifier, and response verifier is.I AUTH_NULL .The  bytes of the opaque_auth's body  are undefined.It is recommended that the opaque length be zero..NH 2\&UNIX Authentication.LPThe caller of a remote procedure may wish to identify himself as heis identified on a UNIX system.  The  value of the credential'sdiscriminant of an RPC call  message is  .I AUTH_UNIX .The bytes ofthe credential's opaque body encode the following structure:.DS.ft CWstruct auth_unix {	unsigned int stamp;	string machinename<255>;	unsigned int uid;	unsigned int gid;	unsigned int gids<10>;};.DEThe .I stamp is an  arbitrary    ID which the  caller machine   maygenerate.  The .I machinename is the  name of the  caller's machine (like  "krypton").  The .I uid is  the caller's effective user  ID.  The  .I gid is  the caller's effective  group  ID.  The .I gids is  acounted array of groups which contain the caller as  a member.  Theverifier accompanying the  credentials  should  be  of  .I AUTH_NULL(defined above)..LPThe value of the discriminant of  the response verifier received inthe  reply  message  from  the    server  may   be   .I AUTH_NULL or.I AUTH_SHORT .In  the  case  of .I AUTH_SHORT ,the bytes of the response verifier's string encode an opaquestructure.  This new opaque structure may now be passed to the serverinstead of the original.I AUTH_UNIXflavor credentials.  The server keeps a cache which maps shorthandopaque structures (passed back by way of an.I AUTH_SHORTstyle response verifier) to the original credentials of the caller.The caller can save network bandwidth and server cpu cycles by usingthe new credentials..LPThe server may flush the shorthand opaque structure at any time.  Ifthis happens, the remote procedure call message will be rejected dueto an authentication error.  The reason for the failure will be.I AUTH_REJECTEDCRED .At this point, the caller may wish to try the original.I AUTH_UNIXstyle of credentials..KS.NH 2\&DES Authentication.LPUNIX authentication suffers from two major problems:.IP  1.The naming is too UNIX-system oriented..IP  2.There is no verifier, so credentials can easily be faked..LPDES authentication attempts to fix these two problems..KE.NH 3\&Naming.LPThe first problem is handled by addressing the caller by a simplestring of characters instead of by an operating system specificinteger.  This string of characters is known as the "netname" ornetwork name of the caller.  The server is not allowed to interpretthe contents of the caller's name in any other way except toidentify the caller.  Thus, netnames should be unique for everycaller in the internet..LPIt is up to each operating system's implementation of DESauthentication to generate netnames for its users that insure thisuniqueness when they call upon remote servers.  Operating systemsalready know how to distinguish users local to their systems.  It isusually a simple matter to extend this mechanism to the network.For example, a UNIX user at Sun with a user ID of 515 might beassigned the following netname: "unix.515@sun.com".  This netnamecontains three items that serve to insure it is unique.  Goingbackwards, there is only one naming domain called "sun.com" in theinternet.  Within this domain, there is only one UNIX user withuser ID 515.  However, there may be another user on anotheroperating system, for example VMS, within the same naming domainthat, by coincidence, happens to have the same user ID.  To insurethat these two users can be distinguished we add the operatingsystem name.  So one user is "unix.515@sun.com" and the other is"vms.515@sun.com"..LPThe first field is actually a naming method rather than anoperating system name.  It just happens that today there is almosta one-to-one correspondence between naming methods and operatingsystems.  If the world could agree on a naming standard, the firstfield could be the name of that standard, instead of an operatingsystem name..LP.NH 3\&DES Authentication Verifiers.LPUnlike UNIX authentication, DES authentication does have a verifierso the server can validate the client's credential (andvice-versa).  The contents of this verifier is primarily anencrypted timestamp.  The server can decrypt this timestamp, and ifit is close to what the real time is, then the client must haveencrypted it correctly.  The only way the client could encrypt itcorrectly is to know the "conversation key" of the RPC session.  Andif the client knows the conversation key, then it must be the realclient..LPThe conversation key is a DES [5] key which the client generatesand notifies the server of in its first RPC call.  The conversationkey is encrypted using a public key scheme in this firsttransaction.  The particular public key scheme used in DESauthentication is Diffie-Hellman [3] with 192-bit keys.  Thedetails of this encryption method are described later..LPThe client and the server need the same notion of the current timein order for all of this to work.  If network time synchronizationcannot be guaranteed, then client can synchronize with the serverbefore beginning the conversation, perhaps by consulting theInternet Time Server (TIME[4])..LPThe way a server determines if a client timestamp is valid issomewhat complicated.  For any other transaction but the first, theserver just checks for two things:.IP  1.the timestamp is greater than the one previously seen from thesame client..IP  2.the timestamp has not expired..LPA timestamp is expired if the server's time is later than the sumof the client's timestamp plus what is known as the client's"window".  The "window" is a number the client passes (encrypted)to the server in its first transaction.  You can think of it as alifetime for the credential..LPThis explains everything but the first transaction.  In the firsttransaction, the server checks only that the timestamp has notexpired.  If this was all that was done though, then it would bequite easy for the client to send random data in place of thetimestamp with a fairly good chance of succeeding.  As an addedcheck, the client sends an encrypted item in the first transactionknown as the "window verifier" which must be equal to the windowminus 1, or the server will reject the credential..LPThe client too must check the verifier returned from the server tobe sure it is legitimate.  The server sends back to the client theencrypted timestamp it received from the client, minus one second.If the client gets anything different than this, it will reject it..LP.NH 3\&Nicknames and Clock Synchronization.LPAfter the first transaction, the server's DES authenticationsubsystem returns in its verifier to the client an integer"nickname" which the client may use in its further transactionsinstead of passing its netname, encrypted DES key and window everytime.  The nickname is most likely an index into a table on theserver which stores for each client its netname, decrypted DES keyand window..LPThough they originally were synchronized, the client's and server'sclocks can get out of sync again.  When this happens the client RPCsubsystem most likely will get back.I RPC_AUTHERROR at which point it should resynchronize..LPA client may still get the.I RPC_AUTHERROR error even though it issynchronized with the server.  The reason is that the server'snickname table is a limited size, and it may flush entries wheneverit wants.  A client should resend its original credential in thiscase and the server will give it a new nickname.  If a servercrashes, the entire nickname table gets flushed, and all clientswill have to resend their original credentials..KS.NH 3\&DES Authentication Protocol (in XDR language).ie t .DS.el .DS L.ft I/** There are two kinds of credentials: one in which the client uses* its full network name, and one in which it uses its "nickname"* (just an unsigned integer) given to it by the server.  The* client must use its fullname in its first transaction with the* server, in which the server will return to the client its* nickname.  The client may use its nickname in all further* transactions with the server.  There is no requirement to use the* nickname, but it is wise to use it for performance reasons.*/.ft CWenum authdes_namekind {	ADN_FULLNAME = 0,	ADN_NICKNAME = 1};.ft I/** A 64-bit block of encrypted DES data*/.ft CWtypedef opaque des_block[8];.ft I/** Maximum length of a network user's name*/.ft CWconst MAXNETNAMELEN = 255;.ft I/** A fullname contains the network name of the client, an encrypted* conversation key and the window.  The window is actually a* lifetime for the credential.  If the time indicated in the* verifier timestamp plus the window has past, then the server* should expire the request and not grant it.  To insure that* requests are not replayed, the server should insist that* timestamps are greater than the previous one seen, unless it is* the first transaction.  In the first transaction, the server* checks instead that the window verifier is one less than the* window.*/.ft CWstruct authdes_fullname {string name<MAXNETNAMELEN>;  /* \fIname of client \f(CW*/des_block key;               /* \fIPK encrypted conversation key \f(CW*/unsigned int window;         /* \fIencrypted window \f(CW*/};.ft I/** A credential is either a fullname or a nickname*/.ft CWunion authdes_cred switch (authdes_namekind adc_namekind) {	case ADN_FULLNAME:		authdes_fullname adc_fullname;	case ADN_NICKNAME:		unsigned int adc_nickname;};.ft I/** A timestamp encodes the time since midnight, January 1, 1970.*/.ft CWstruct timestamp {	unsigned int seconds;    /* \fIseconds \fP*/	unsigned int useconds;   /* \fIand microseconds \fP*/};.ft I/** Verifier: client variety* The window verifier is only used in the first transaction.  In* conjunction with a fullname credential, these items are packed* into the following structure before being encrypted:** \f(CWstruct {\fP*     \f(CWadv_timestamp;            \fP-- one DES block*     \f(CWadc_fullname.window;      \fP-- one half DES block*     \f(CWadv_winverf;              \fP-- one half DES block* \f(CW}\fP* This structure is encrypted using CBC mode encryption with an* input vector of zero.  All other encryptions of timestamps use* ECB mode encryption.*/.ft CWstruct authdes_verf_clnt {	timestamp adv_timestamp;    /* \fIencrypted timestamp       \fP*/	unsigned int adv_winverf;   /* \fIencrypted window verifier \fP*/};.ft I/** Verifier: server variety* The server returns (encrypted) the same timestamp the client* gave it minus one second.  It also tells the client its nickname* to be used in future transactions (unencrypted).*/.ft CWstruct authdes_verf_svr {timestamp adv_timeverf;     /* \fIencrypted verifier      \fP*/unsigned int adv_nickname;  /* \fInew nickname for client \fP*/};.DE.KE.NH 3\&Diffie-Hellman Encryption.LPIn this scheme, there are two constants,.I BASE and.I MODULUS .Theparticular values Sun has chosen for these for the DESauthentication protocol are:.ie t .DS

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产日韩av一区| 久久综合精品国产一区二区三区| 成人激情小说网站| 韩国精品主播一区二区在线观看| 日韩精品五月天| 亚洲国产精品一区二区尤物区| 亚洲国产精品传媒在线观看| 国产日韩精品一区二区三区在线| 久久精品日韩一区二区三区| 久久久91精品国产一区二区三区| 国产日韩欧美综合在线| 国产精品毛片大码女人| 一区精品在线播放| 一区在线中文字幕| 亚洲综合激情小说| 日韩有码一区二区三区| 日本欧美一区二区三区乱码| 欧美视频日韩视频在线观看| 欧美性受xxxx黑人xyx性爽| 中文字幕国产一区二区| 久久精品亚洲一区二区三区浴池| 久久综合九色欧美综合狠狠| 欧美日韩国产乱码电影| 91免费版pro下载短视频| www.色综合.com| 成人国产在线观看| 国产成人夜色高潮福利影视| 久久99国产精品麻豆| 久久成人免费电影| 亚洲黄色免费网站| 亚洲成人激情av| 久久69国产一区二区蜜臀| 懂色av一区二区夜夜嗨| 色综合久久综合网欧美综合网| 精品视频在线看| 日韩欧美色综合| 中文字幕av资源一区| 一区二区三区四区视频精品免费| 日韩在线一二三区| 国产久卡久卡久卡久卡视频精品| 99re6这里只有精品视频在线观看 99re8在线精品视频免费播放 | 欧美在线一二三四区| 欧美老年两性高潮| 国产日韩成人精品| 亚洲电影欧美电影有声小说| 国产毛片精品国产一区二区三区| 91在线国产观看| 午夜精品爽啪视频| 岛国av在线一区| 8v天堂国产在线一区二区| 国产精品女同一区二区三区| 午夜久久久久久久久| 成人午夜在线视频| 91精品欧美综合在线观看最新| 国产午夜精品一区二区三区四区| 亚洲成人777| av一区二区不卡| 日韩欧美国产综合| 亚洲另类在线制服丝袜| 韩国一区二区视频| 欧美日韩国产高清一区| 国产精品久久久久一区二区三区| 国产女人18毛片水真多成人如厕 | 精品国产123| 国产精品嫩草影院com| 天堂在线亚洲视频| 成人黄色777网| 亚洲精品一区二区三区99| 亚洲国产日韩精品| 91国偷自产一区二区三区观看| 麻豆国产欧美日韩综合精品二区| 五月天丁香久久| jizzjizzjizz欧美| 久久伊人中文字幕| 婷婷久久综合九色综合绿巨人 | 国产精品影视在线| 欧美日韩国产bt| 亚洲免费电影在线| 东方欧美亚洲色图在线| 欧美第一区第二区| 天堂va蜜桃一区二区三区漫画版| 不卡视频在线观看| 久久久久国产精品麻豆| 久久超碰97人人做人人爱| 欧美亚洲愉拍一区二区| 一区二区中文字幕在线| 成人动漫av在线| 国产女人aaa级久久久级| 国产美女视频91| 精品国产乱码久久久久久久久| 日韩福利视频网| 在线不卡a资源高清| 亚洲动漫第一页| 在线免费亚洲电影| 亚洲激情一二三区| 色哟哟欧美精品| 亚洲欧美另类久久久精品2019| 成人激情视频网站| **欧美大码日韩| 99久久精品一区| 欧美亚洲丝袜传媒另类| 欧美日韩中文一区| 精品久久久网站| 国产麻豆成人精品| 国产拍欧美日韩视频二区| 国产精品12区| 中文字幕免费不卡在线| 国产精品一区在线| 国内久久精品视频| 国产欧美日韩精品在线| 国产二区国产一区在线观看| 亚洲国产精品精华液ab| 久久精品综合网| 色又黄又爽网站www久久| 成人免费在线视频观看| 播五月开心婷婷综合| 亚洲欧洲另类国产综合| 91免费小视频| 亚洲国产成人91porn| 欧美日韩高清一区二区不卡| 日韩精品亚洲一区| 日韩欧美国产综合在线一区二区三区 | 国产精品视频一二三区| 97久久精品人人爽人人爽蜜臀| 亚洲精品久久7777| 欧美夫妻性生活| 国产在线精品免费av| 国产精品视频在线看| 欧美在线免费观看视频| 免费欧美日韩国产三级电影| 欧美精品一区二区精品网| 成人aaaa免费全部观看| 亚洲国产精品视频| 欧美v国产在线一区二区三区| 国产精品主播直播| 亚洲欧美另类在线| 91精品国产乱码| 国产iv一区二区三区| 亚洲美女区一区| 欧美一级高清片| 国产成+人+日韩+欧美+亚洲| 亚洲美女一区二区三区| 欧美一区二区三区的| 国产成人综合网| 亚洲午夜av在线| 久久美女艺术照精彩视频福利播放| 99久久精品国产网站| 日韩有码一区二区三区| 国产蜜臀av在线一区二区三区| 成人av高清在线| 欧美伊人久久大香线蕉综合69 | 美女在线视频一区| 色综合久久久久久久久| 91蜜桃网址入口| 欧美一级二级在线观看| 国产乱码字幕精品高清av| 亚洲免费在线看| 欧美三级日韩三级| 国产精品久久久久一区二区三区 | 欧美极品xxx| 天堂成人免费av电影一区| 欧美三电影在线| 亚洲成精国产精品女| 精品一区二区三区的国产在线播放 | 久久影院午夜片一区| 国产精品剧情在线亚洲| 一区二区三区久久| 蜜桃精品视频在线| 一本色道**综合亚洲精品蜜桃冫 | 狠狠色丁香婷婷综合| 国产精品1区2区| 欧美一区二区三区爱爱| 久久精品一区八戒影视| 亚洲成a人片在线观看中文| 五月婷婷激情综合网| 久久精品噜噜噜成人88aⅴ| 国产精华液一区二区三区| 欧美午夜视频网站| 欧美日韩国产精品成人| 26uuu欧美| 日本vs亚洲vs韩国一区三区二区| 99久久精品免费看| 国产亚洲欧美一区在线观看| 一区二区在线电影| 秋霞午夜av一区二区三区| 蜜桃av噜噜一区二区三区小说| 日韩精品一区二区在线| www.在线欧美| 久久精品国产99国产精品| 亚洲综合色自拍一区| 国产亚洲精品bt天堂精选| 91麻豆精品91久久久久同性| www.欧美亚洲| 国产精品系列在线播放| 偷拍与自拍一区| 一区二区三区四区激情| 欧洲一区在线电影| 国产一区二区导航在线播放| 水蜜桃久久夜色精品一区的特点| 亚洲欧美一区二区久久|