亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rpc.rfc.ms

?? RTEMS (Real-Time Executive for Multiprocessor Systems) is a free open source real-time operating sys
?? MS
?? 第 1 頁 / 共 3 頁
字號:
.el .DS L.ft CWconst BASE = 3;const MODULUS =         "d4a0ba0250b6fd2ec626e7efd637df76c716e22d0944b88b"; /* \fIhex \fP*/.DE.ft RThe way this scheme works is best explained by an example.  Supposethere are two people "A" and "B" who want to send encryptedmessages to each other.  So, A and B both generate "secret" keys atrandom which they do not reveal to anyone.  Let these keys berepresented as SK(A) and SK(B).  They also publish in a publicdirectory their "public" keys.  These keys are computed as follows:.ie t .DS.el .DS L.ft CWPK(A) = ( BASE ** SK(A) ) mod MODULUSPK(B) = ( BASE ** SK(B) ) mod MODULUS.DE.ft RThe "**" notation is used here to represent exponentiation.  Now,both A and B can arrive at the "common" key between them,represented here as CK(A, B), without revealing their secret keys..LPA computes:.ie t .DS.el .DS L.ft CWCK(A, B) = ( PK(B) ** SK(A)) mod MODULUS.DE.ft Rwhile B computes:.ie t .DS.el .DS L.ft CWCK(A, B) = ( PK(A) ** SK(B)) mod MODULUS.DE.ft RThese two can be shown to be equivalent:.ie t .DS.el .DS L.ft CW(PK(B) ** SK(A)) mod MODULUS = (PK(A) ** SK(B)) mod MODULUS.DE.ft RWe drop the "mod MODULUS" parts and assume modulo arithmetic tosimplify things:.ie t .DS.el .DS L.ft CWPK(B) ** SK(A) = PK(A) ** SK(B).DE.ft RThen, replace PK(B) by what B computed earlier and likewise forPK(A)..ie t .DS.el .DS L.ft CW((BASE ** SK(B)) ** SK(A) = (BASE ** SK(A)) ** SK(B).DE.ft Rwhich leads to:.ie t .DS.el .DS L.ft CWBASE ** (SK(A) * SK(B)) = BASE ** (SK(A) * SK(B)).DE.ft RThis common key CK(A, B) is not used to encrypt the timestamps usedin the protocol.  Rather, it is used only to encrypt a conversationkey which is then used to encrypt the timestamps.  The reason fordoing this is to use the common key as little as possible, for fearthat it could be broken.  Breaking the conversation key is a farless serious offense, since conversations are relativelyshort-lived..LPThe conversation key is encrypted using 56-bit DES keys, yet thecommon key is 192 bits.  To reduce the number of bits, 56 bits areselected from the common key as follows.  The middle-most 8-bytesare selected from the common key, and then parity is added to thelower order bit of each byte, producing a 56-bit key with 8 bits ofparity..KS.NH 1\&Record Marking Standard.LPWhen RPC messages are passed on top of a byte stream protocol (likeTCP/IP), it is necessary, or at least desirable, to delimit onemessage from another in order to detect and possibly recover fromuser protocol errors.  This is called record marking (RM).  Sun usesthis RM/TCP/IP transport for passing RPC messages on TCP streams.One RPC message fits into one RM record..LPA record is composed of one or more record fragments.  A recordfragment is a four-byte header followed by 0 to (2**31) - 1 bytes offragment data.  The bytes encode an unsigned binary number; as withXDR integers, the byte order is from highest to lowest.  The numberencodes two values\(ema boolean which indicates whether the fragmentis the last fragment of the record (bit value 1 implies the fragmentis the last fragment) and a 31-bit unsigned binary value which is thelength in bytes of the fragment's data.  The boolean value is thehighest-order bit of the header; the length is the 31 low-order bits.(Note that this record specification is NOT in XDR standard form!).KE.KS.NH 1\&The RPC Language.LPJust as there was a need to describe the XDR data-types in a formallanguage, there is also need to describe the procedures that operateon these XDR data-types in a formal language as well.  We use the RPCLanguage for this purpose.  It is an extension to the XDR language.The following example is used to describe the essence of thelanguage..NH 2\&An Example Service Described in the RPC Language.LPHere is an example of the specification of a simple ping program..ie t .DS.el .DS L.vs 11.ft I/** Simple ping program*/.ft CWprogram PING_PROG {	/* \fILatest and greatest version\fP */	version PING_VERS_PINGBACK {	void 	PINGPROC_NULL(void) = 0;.ft I	/*	* Ping the caller, return the round-trip time	* (in microseconds). Returns -1 if the operation	* timed out.	*/.ft CW	int	PINGPROC_PINGBACK(void) = 1;        } = 2;     .ft I/** Original version*/.ft CWversion PING_VERS_ORIG {	void 	PINGPROC_NULL(void) = 0;	} = 1;} = 1;const PING_VERS = 2;      /* \fIlatest version \fP*/.vs.DE.KE.LPThe first version described is.I PING_VERS_PINGBACKwith  two procedures,   .I PINGPROC_NULL and .I PINGPROC_PINGBACK ..I PINGPROC_NULL takes no arguments and returns no results, but it is useful forcomputing round-trip times from the client to the server and backagain.  By convention, procedure 0 of any RPC protocol should havethe same semantics, and never require any kind of authentication.The second procedure is used for the client to have the server do areverse ping operation back to the client, and it returns the amountof time (in microseconds) that the operation used.  The next version,.I PING_VERS_ORIG ,is the original version of the protocoland it does not contain.I PINGPROC_PINGBACKprocedure. It  is usefulfor compatibility  with old client  programs,  and as  this programmatures it may be dropped from the protocol entirely..KS.NH 2\&The RPC Language Specification.LPThe  RPC language is identical to  the XDR language, except for theadded definition of a.I program-def described below..DS.ft CWprogram-def:	"program" identifier "{"		version-def 		version-def *	"}" "=" constant ";"version-def:	"version" identifier "{"		procedure-def		procedure-def *	"}" "=" constant ";"procedure-def:	type-specifier identifier "(" type-specifier ")"	"=" constant ";".DE.KE.NH 2\&Syntax Notes.IP  1.The following keywords  are  added  and   cannot  be used   asidentifiers: "program" and "version";.IP  2.A version name cannot occur more than once within the  scope ofa program definition. Nor can a version number occur more than oncewithin the scope of a program definition..IP  3.A procedure name cannot occur  more than once within  the scopeof a version definition. Nor can a procedure number occur more thanonce within the scope of version definition..IP  4.Program identifiers are in the same name space as  constant andtype identifiers..IP  5.Only unsigned constants can  be assigned to programs, versionsand procedures..NH 1\&Port Mapper Program Protocol.LPThe port mapper program maps RPC program and version numbers totransport-specific port numbers.  This program makes dynamic bindingof remote programs possible..LPThis is desirable because the range of reserved port numbers is verysmall and the number of potential remote programs is very large.  Byrunning only the port mapper on a reserved port, the port numbers ofother remote programs can be ascertained by querying the port mapper..LPThe port mapper also aids in broadcast RPC.  A given RPC program willusually have different port number bindings on different machines, sothere is no way to directly broadcast to all of these programs.  Theport mapper, however, does have a fixed port number.  So, tobroadcast to a given program, the client actually sends its messageto the port mapper located at the broadcast address.  Each portmapper that picks up the broadcast then calls the local servicespecified by the client.  When the port mapper gets the reply fromthe local service, it sends the reply on back to the client..KS.NH 2\&Port Mapper Protocol Specification (in RPC Language).ie t .DS.el .DS L.ft CW.vs 11const PMAP_PORT = 111;      /* \fIportmapper port number \fP*/.ft I/** A mapping of (program, version, protocol) to port number*/.ft CWstruct mapping {	unsigned int prog;	unsigned int vers;	unsigned int prot;	unsigned int port;};.ft I/* * Supported values for the "prot" field*/.ft CWconst IPPROTO_TCP = 6;      /* \fIprotocol number for TCP/IP \fP*/const IPPROTO_UDP = 17;     /* \fIprotocol number for UDP/IP \fP*/.ft I/** A list of mappings*/.ft CWstruct *pmaplist {	mapping map;	pmaplist next;};.vs.DE.ie t .DS.el .DS L.vs 11.ft I/** Arguments to callit*/.ft CWstruct call_args {	unsigned int prog;	unsigned int vers;	unsigned int proc;	opaque args<>;};  .ft I/** Results of callit*/.ft CWstruct call_result {	unsigned int port;	opaque res<>;};.vs.DE.KE.ie t .DS.el .DS L.vs 11.ft I/** Port mapper procedures*/.ft CWprogram PMAP_PROG {	version PMAP_VERS {		void 		PMAPPROC_NULL(void)         = 0;		bool		PMAPPROC_SET(mapping)       = 1;		bool		PMAPPROC_UNSET(mapping)     = 2;		unsigned int		PMAPPROC_GETPORT(mapping)   = 3;		pmaplist		PMAPPROC_DUMP(void)         = 4;		call_result		PMAPPROC_CALLIT(call_args)  = 5;	} = 2;} = 100000;.vs.DE.NH 2\&Port Mapper Operation.LPThe portmapper program currently supports two protocols (UDP/IP andTCP/IP).  The portmapper is contacted by talking to it on assignedport number 111 (SUNRPC [8]) on either of these protocols.  Thefollowing is a description of each of the portmapper procedures:.IP \fBPMAPPROC_NULL:\fPThis procedure does no work.  By convention, procedure zero of anyprotocol takes no parameters and returns no results..IP \fBPMAPPROC_SET:\fPWhen a program first becomes available on a machine, it registersitself with the port mapper program on the same machine.  The programpasses its program number "prog", version number "vers", transportprotocol number "prot", and the port "port" on which it awaitsservice request.  The procedure returns a boolean response whosevalue is.I TRUEif the procedure successfully established the mapping and .I FALSE otherwise.  The procedure refuses to establisha mapping if one already exists for the tuple "(prog, vers, prot)"..IP \fBPMAPPROC_UNSET:\fPWhen a program becomes unavailable, it should unregister itself withthe port mapper program on the same machine.  The parameters andresults have meanings identical to those of.I PMAPPROC_SET .The protocol and port number fields of the argument are ignored..IP \fBPMAPPROC_GETPORT:\fPGiven a program number "prog", version number "vers", and transportprotocol number "prot", this procedure returns the port number onwhich the program is awaiting call requests.  A port value of zerosmeans the program has not been registered.  The "port" field of theargument is ignored..IP \fBPMAPPROC_DUMP:\fPThis procedure enumerates all entries in the port mapper's database.The procedure takes no parameters and returns a list of program,version, protocol, and port values..IP \fBPMAPPROC_CALLIT:\fPThis procedure allows a caller to call another remote procedure onthe same machine without knowing the remote procedure's port number.It is intended for supporting broadcasts to arbitrary remote programsvia the well-known port mapper's port.  The parameters "prog","vers", "proc", and the bytes of "args" are the program number,version number, procedure number, and parameters of the remoteprocedure..LP.B Note:.RS.IP  1.This procedure only sends a response if the procedure wassuccessfully executed and is silent (no response) otherwise..IP  2.The port mapper communicates with the remote program using UDP/IPonly..RE.LPThe procedure returns the remote program's port number, and the bytesof results are the results of the remote procedure..bp.NH 1\&References.LP[1]  Birrell, Andrew D. & Nelson, Bruce Jay; "Implementing RemoteProcedure Calls"; XEROX CSL-83-7, October 1983..LP[2]  Cheriton, D.; "VMTP:  Versatile Message Transaction Protocol",Preliminary Version 0.3; Stanford University, January 1987..LP[3]  Diffie & Hellman; "New Directions in Cryptography"; IEEETransactions on Information Theory IT-22, November 1976..LP[4]  Harrenstien, K.; "Time Server", RFC 738; Information SciencesInstitute, October 1977..LP[5]  National Bureau of Standards; "Data Encryption Standard"; FederalInformation Processing Standards Publication 46, January 1977..LP[6]  Postel, J.; "Transmission Control Protocol - DARPA InternetProgram Protocol Specification", RFC 793; Information SciencesInstitute, September 1981..LP[7]  Postel, J.; "User Datagram Protocol", RFC 768; Information SciencesInstitute, August 1980..LP[8]  Reynolds, J.  & Postel, J.; "Assigned Numbers", RFC 923; InformationSciences Institute, October 1984.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲国产成人porn| 日韩电影免费一区| 亚洲精品成a人| 成人欧美一区二区三区| 亚洲激情在线播放| 91福利在线免费观看| 日韩丝袜美女视频| 久久综合九色综合欧美98| 国产精品国产三级国产aⅴ原创| 亚洲无线码一区二区三区| 欧美三级视频在线观看| 久久亚洲捆绑美女| 国产成人高清视频| 欧美精品在线视频| 中文字幕在线不卡| 在线免费观看成人短视频| 国产日韩一级二级三级| 日本怡春院一区二区| 日韩免费观看2025年上映的电影| 中文字幕亚洲成人| 欧美中文字幕一区二区三区| 日韩在线卡一卡二| 在线欧美小视频| 日本欧美肥老太交大片| 国产午夜一区二区三区| 国内久久精品视频| 欧美一区二区三区四区视频| 亚洲一区二区三区精品在线| 99久久精品国产麻豆演员表| 日韩精品综合一本久道在线视频| 国产盗摄一区二区三区| 一区二区三区免费看视频| 97精品久久久午夜一区二区三区| 亚洲综合激情另类小说区| 日韩欧美一级二级三级久久久| 成人av在线看| 欧美经典一区二区| 六月婷婷色综合| 精品三级在线观看| 狠狠色丁香久久婷婷综| 一区二区不卡在线视频 午夜欧美不卡在| 这里只有精品免费| 日韩av一区二区三区四区| 亚洲国产精品成人久久综合一区| 欧美日韩在线播放| 北岛玲一区二区三区四区| 中文字幕在线不卡一区二区三区| 日韩视频免费观看高清在线视频| 91小视频在线| 亚洲三级在线播放| 欧美日韩精品专区| 麻豆国产精品一区二区三区 | 亚洲综合丁香婷婷六月香| 精品粉嫩超白一线天av| 国产九色精品成人porny| 国产女同性恋一区二区| 欧美一区二区三区日韩视频| 一本大道久久a久久精品综合| 国产精品二三区| 2014亚洲片线观看视频免费| 在线综合+亚洲+欧美中文字幕| 色综合亚洲欧洲| 亚洲国产成人av网| 亚洲三级视频在线观看| 中文字幕一区二区三| www国产成人免费观看视频 深夜成人网| 蜜桃视频在线一区| 日韩高清中文字幕一区| 91.麻豆视频| 国产成人精品免费| 一区二区三区不卡在线观看| 51精品秘密在线观看| 国产成人精品免费网站| 亚洲欧美激情在线| 一区二区理论电影在线观看| 日韩无一区二区| 久久久久亚洲综合| 91一区二区三区在线观看| 国产呦萝稀缺另类资源| 一区在线中文字幕| 国产精品萝li| 欧美精品日韩一区| 欧美综合视频在线观看| 94-欧美-setu| 91麻豆免费看| 91福利在线观看| 欧美日韩一区二区三区免费看 | av一区二区久久| 亚洲欧洲国产日本综合| 国产精品国产馆在线真实露脸| 日韩欧美一二三| 欧美一级理论性理论a| 色狠狠综合天天综合综合| 一区二区不卡在线播放| 久久久国产一区二区三区四区小说 | 99国产精品国产精品久久| 日韩电影免费一区| 国产传媒欧美日韩成人| 国产精品色在线| 成人午夜在线播放| 国产成人av自拍| 国内一区二区在线| 国产一区二区不卡在线| 国产精品一区二区在线观看不卡| 久久久99精品免费观看不卡| 成人永久免费视频| 中文字幕一区二区三区在线不卡| 久久成人免费日本黄色| 亚洲免费资源在线播放| 日本久久一区二区三区| 色综合久久天天| 91久久免费观看| 91精品在线一区二区| 日韩亚洲欧美一区| 久久久综合网站| 中文字幕在线不卡国产视频| 亚洲国产精品天堂| 午夜视频一区二区| 日韩欧美国产三级| 精品国产污污免费网站入口 | 久久蜜臀精品av| 亚洲视频免费在线| 免费久久精品视频| 亚洲综合丝袜美腿| 九九九久久久精品| 九一久久久久久| 色综合天天综合网天天狠天天| 91精品国产色综合久久不卡蜜臀 | 欧美日韩一级黄| 久久久久久久性| 亚洲超碰精品一区二区| 午夜精品久久久久久| 岛国一区二区三区| 欧美一区二区久久久| ...av二区三区久久精品| 乱中年女人伦av一区二区| 一本一道久久a久久精品| 久久精品夜色噜噜亚洲a∨| 天天综合天天做天天综合| 97精品国产露脸对白| 久久人人爽爽爽人久久久| 亚洲成人午夜影院| av一区二区三区| 国产午夜久久久久| 蜜臀av一区二区在线免费观看 | 欧美日韩情趣电影| 国产精品灌醉下药二区| 国产盗摄一区二区| 精品久久久久久久人人人人传媒 | 亚洲另类中文字| 岛国一区二区在线观看| 26uuu国产一区二区三区| 日韩激情中文字幕| 欧美午夜精品一区二区蜜桃| 日韩欧美国产小视频| 日韩影院免费视频| 欧美视频一二三区| 亚洲乱码国产乱码精品精小说| 成人动漫av在线| 国产亚洲欧美一区在线观看| 美国精品在线观看| 欧美一区二区成人6969| 天天亚洲美女在线视频| 欧美日韩国产区一| 亚洲福利电影网| 欧美日韩激情一区| 亚洲国产cao| 欧美日韩精品综合在线| 亚洲成人av中文| 欧美人狂配大交3d怪物一区| 亚洲二区在线观看| 精品1区2区3区| 天堂av在线一区| 欧美肥大bbwbbw高潮| 日本 国产 欧美色综合| 欧美成人女星排名| 国产在线精品一区二区夜色| 2019国产精品| 成人午夜免费电影| 亚洲日本韩国一区| 91搞黄在线观看| 日韩高清一级片| 亚洲精品一区二区三区蜜桃下载| 国产一区二区美女| 国产精品全国免费观看高清| 99视频在线观看一区三区| 亚洲精品国产品国语在线app| 欧美最新大片在线看| 天天综合色天天综合色h| 精品欧美一区二区久久| 丰满亚洲少妇av| 精品蜜桃在线看| 懂色av一区二区夜夜嗨| 亚洲欧美经典视频| 日韩一区二区视频| 国产二区国产一区在线观看| 亚洲伦理在线免费看| 91精品啪在线观看国产60岁| 国产一区在线观看麻豆| 一区二区三区四区蜜桃|