KEYTEXT(6) KEYTEXT(6)
NAME
keytext - textual form of Inferno public/private keys
DESCRIPTION
Keyring-certtostr(2) defines a set of functions that convert
between textual forms of the elements of the Inferno
public-key authentication system and their internal data
types. The textual form is used for key storage and as the
transport format for the authentication protocol auth(6). In
storage and transport each encoded value is encapsulated by
the record-oriented encoding defined in keyring-getmsg(2).
The format represents public and private keys, and signer's
certificates. In this context a certificate is a time-
limited cryptographically signed hash of some other value
(usually a public key) and contains neither that value nor
the signer's key, which is assumed to be available else-
where.
All values are represented by a sequence of newline-
separated text fields. The type of any given value is
determined by its context. Each type of value has a common
prefix that includes an algorithm identifier, followed by a
sequence of algorithm-dependent fields:
authinfo ::= signer-public-key certificate
!private-key big-alpha big-p
certificate ::= sigalg hashalg signer-name
exp-time *-sig
sigalg ::= rsa | dsa | elgamal
hashalg ::= sha1 | md5
*-key ::= sigalg owner-name ...
rsa-public-key ::= rsa owner-name big-n big-ek
rsa-private-key ::= rsa owner-name big-n big-ek
!big-dk !big-p !big-q !big-kp
!big-kq !big-c2
dsa-public-key ::= dsa owner-name big-p big-q
big-alpha big-key
dsa-private-key ::= dsa owner-name big-p big-q
big-alpha big-key !big-secret
rsa-sig ::= big-val
dsa-sig ::= big-r big-s
elgamal-sig ::= big-r big-s
Each value labelled as `big-' is an unsigned multiple-
precision integer from keyring-ipint(2), represented as a
sequence of bytes with in big-endian order, as produced by
IPint->iptobytes with an extra leading zero byte added if
the top bit of the first byte is set, and then encoded in
Page 1 Plan 9 (printed 11/6/25)
KEYTEXT(6) KEYTEXT(6)
base-64 (as by encoding(2)). Each value labelled `-name' is
utf (6) text not containing a newline; it is interpreted by
an application and need not be a name. The expiry time
exp-time is represented in decimal as seconds from the Epoch
(1 January 1970 00:00 GMT); if it is zero, no expiry time is
set. A label prefixed by `!' marks a value that should be
considered secret.
The hash of a key is computed over its textual encoding
according to the syntax above. A certificate's signature
value is produced by digitally signing using sigalg the hash
(using hashalg) of the concatenation of the value to be
authenticated, the signer-name in utf(6), a single space,
and the exp-time in decimal (with no leading zeroes). When
checking a signature, comparisons are done with values in
internal multiple-precision form (ie, as IPints), not in
base-64 form.
SEE ALSO
keyring-certtostr(2), keyring-getmsg(2), factotum(4),
keys(6), getauthinfo(8)
BUGS
The byte-array encoding of IPint should not require the
leading zero; it does so for compatibility with old keys.
Page 2 Plan 9 (printed 11/6/25)