3 sdp \- secure datagram protocol
6 .B bind -a #E\fIspec\fP /net
12 .BI /net/sdp/ n /control
14 .BI /net/sdp/ n /rstats
15 .BI /net/sdp/ n /stats
16 .BI /net/sdp/ n /status
22 device provides the interface to the Secure Datagram Protocol (SDP).
23 SDP (un)compresses and (de-)encrypts packets.
25 is an integer from 0 to 15 identifying a stack.
26 Each stack is independent of all others:
27 the only information transfer between them is via programs that
28 mount multiple stacks.
29 Normally a system uses only one stack.
30 However multiple stacks can be used for debugging
31 new networks or implementing firewalls or proxy
34 The top level directory contains a
38 file, and subdirectories numbered from zero to the number of connections
39 opened for this protocol.
43 file reserves a connection. The file descriptor returned from the
45 will point to the control file,
47 of the newly allocated connection.
51 string representing the number of the
53 Connections may be used either to listen for incoming calls
54 or to initiate calls to other machines.
56 A connection is controlled by writing text strings to the associated
59 After a connection has been established data may be read from
62 A connection can be actively established using the
66 A connection can be established passively by first
71 to bind to a local port and then
76 to receive incoming calls.
78 The following control messages are supported:
79 .TF "outsecret \fIsecret
83 Accept an incoming encrypted connection on
90 Initiate a new encrypted connection on
97 Randomly drop approximately one of every
100 thus simulating network errors.
102 .BI cipher " algorithm"
112 .BI auth " algorithm"
121 .BI comp " algorithm"
129 .BI insecret " secret"
132 to decrypt incoming packets.
134 .BI outsecret " secret"
137 to encrypt outgoing packets.
143 .IR "Robust Data Compression of Network Packets" ,
144 Sean Dorward and Sean Quilan, Bell Labs, Lucent Technologies,
145 .BR http://plan9.bell-labs.com/who/seanq/networkcomp.pdf .
147 .B /sys/src/9/port/devsdp.c