KEYTEXT(6) KEYTEXT(6) NAME keytext - textual form of Inferno public/private keys DESCRIPTION Keyring-certtostr(2) defines a set of functions that convert between textual forms of the elements of the Inferno public-key authentication system and their internal data types. The textual form is used for key storage and as the transport format for the authentication protocol auth(6). In storage and transport each encoded value is encapsulated by the record-oriented encoding defined in keyring-getmsg(2). The format represents public and private keys, and signer's certificates. In this context a certificate is a time- limited cryptographically signed hash of some other value (usually a public key) and contains neither that value nor the signer's key, which is assumed to be available else- where. All values are represented by a sequence of newline- separated text fields. The type of any given value is determined by its context. Each type of value has a common prefix that includes an algorithm identifier, followed by a sequence of algorithm-dependent fields: authinfo ::= signer-public-key certificate !private-key big-alpha big-p certificate ::= sigalg hashalg signer-name exp-time *-sig sigalg ::= rsa | dsa | elgamal hashalg ::= sha1 | md5 *-key ::= sigalg owner-name ... rsa-public-key ::= rsa owner-name big-n big-ek rsa-private-key ::= rsa owner-name big-n big-ek !big-dk !big-p !big-q !big-kp !big-kq !big-c2 dsa-public-key ::= dsa owner-name big-p big-q big-alpha big-key dsa-private-key ::= dsa owner-name big-p big-q big-alpha big-key !big-secret rsa-sig ::= big-val dsa-sig ::= big-r big-s elgamal-sig ::= big-r big-s Each value labelled as `big-' is an unsigned multiple- precision integer from keyring-ipint(2), represented as a sequence of bytes with in big-endian order, as produced by IPint->iptobytes with an extra leading zero byte added if the top bit of the first byte is set, and then encoded in Page 1 Plan 9 (printed 12/23/24) KEYTEXT(6) KEYTEXT(6) base-64 (as by encoding(2)). Each value labelled `-name' is utf(6) text not containing a newline; it is interpreted by an application and need not be a name. The expiry time exp-time is represented in decimal as seconds from the Epoch (1 January 1970 00:00 GMT); if it is zero, no expiry time is set. A label prefixed by `!' marks a value that should be considered secret. The hash of a key is computed over its textual encoding according to the syntax above. A certificate's signature value is produced by digitally signing using sigalg the hash (using hashalg) of the concatenation of the value to be authenticated, the signer-name in utf(6), a single space, and the exp-time in decimal (with no leading zeroes). When checking a signature, comparisons are done with values in internal multiple-precision form (ie, as IPints), not in base-64 form. SEE ALSO keyring-certtostr(2), keyring-getmsg(2), factotum(4), keys(6), getauthinfo(8) BUGS The byte-array encoding of IPint should not require the leading zero; it does so for compatibility with old keys. Page 2 Plan 9 (printed 12/23/24)