glenda.party
term% ls -F
term% cat index.txt
SDP(3)                     Library Functions Manual                     SDP(3)



NAME
       sdp - secure datagram protocol

SYNOPSIS
       bind -a #Espec /net
       /net/sdp/clone
       /net/sdp/log
       /net/sdp/n
       /net/sdp/n/data
       /net/sdp/n/control
       /net/sdp/n/ctl
       /net/sdp/n/rstats
       /net/sdp/n/stats
       /net/sdp/n/status
       ...

DESCRIPTION
       The  sdp  device provides the interface to the Secure Datagram Protocol
       (SDP).  SDP (un)compresses and (de-)encrypts packets.  Spec is an inte‐
       ger from 0 to 15 identifying a stack.  Each stack is independent of all
       others: the only information transfer between them is via programs that
       mount multiple stacks.  Normally a system uses only one stack.  However
       multiple stacks can be used for debugging new networks or  implementing
       firewalls or proxy services.

       The  top  level directory contains a clone file, a log file, and subdi‐
       rectories numbered from zero to the number of  connections  opened  for
       this protocol.

       Opening  the clone file reserves a connection.  The file descriptor re‐
       turned from the open(2) will point to the control  file,  ctl,  of  the
       newly  allocated  connection.  Reading ctl returns a text string repre‐
       senting the number of the connection.  Connections may be  used  either
       to listen for incoming calls or to initiate calls to other machines.

       A  connection  is  controlled by writing text strings to the associated
       ctl file.  After a connection has been established  data  may  be  read
       from and written to data.  A connection can be actively established us‐
       ing the connect message (see also dial(2)).  A connection can be estab‐
       lished  passively  by  first using an announce message (see dial(2)) to
       bind to a local port and then opening the listen file (see dial(2))  to
       receive incoming calls.

       The following control messages are supported:

       accept file
              Accept  an  incoming  encrypted  connection on file, typically a
              data file.

       dial file
              Initiate a new encrypted connection on  file,  typically  a  UDP
              data file.

       drop permil
              Randomly  drop approximately one of every permil output packets,
              thus simulating network errors.

       cipher algorithm
              Use ciphering algorithm; choices are and

       auth algorithm
              Use authentication algorithm; choices are and

       comp algorithm
              Use compression algorithm; choices are and

       insecret secret
              Use secret to decrypt incoming packets.

       outsecret secret
              Use secret to encrypt outgoing packets.

SEE ALSO
       dial(2), ip(3)
       Robust Data Compression of  Network  Packets,  Sean  Dorward  and  Sean
       Quilan,    Bell    Labs,    Lucent   Technologies,   http://plan9.bell-
       labs.com/who/seanq/networkcomp.pdf.

SOURCE
       /sys/src/9/port/devsdp.c



                                                                        SDP(3)