2004-11-03 13:51:07 +00:00
|
|
|
.\" Copyright 2002 walter harms (walter.harms@informatik.uni-oldenburg.de)
|
|
|
|
.\" Distributed under GPL
|
|
|
|
.\" I had no way the check the functions out
|
2005-06-24 14:44:16 +00:00
|
|
|
.\" be careful
|
2004-11-03 13:51:07 +00:00
|
|
|
.TH KEY_SETSECRET 3 2002-07-18 "secure rpc"
|
|
|
|
.SH NAME
|
|
|
|
key_decryptsession, key_encryptsession, key_setsecret, key_gendes,
|
|
|
|
key_secretkey_is_set \- interfaces to rpc keyserver daemon
|
|
|
|
.SH SYNOPSIS
|
|
|
|
.sp
|
|
|
|
.BR "#include <rpc/rpc.h>"
|
|
|
|
.sp
|
|
|
|
.BI "int key_decryptsession(const char *" remotename ,
|
|
|
|
.BI "des_block *" deskey );
|
|
|
|
.sp
|
|
|
|
.BI "int key_encryptsession(const char *" remotename ,
|
|
|
|
.BI "des_block *" deskey );
|
|
|
|
.sp
|
|
|
|
.BI "int key_gendes(des_block *" deskey );
|
|
|
|
.sp
|
|
|
|
.BI "int key_setsecret(const char *" key );
|
|
|
|
.sp
|
|
|
|
.B "int key_secretkey_is_set(void);"
|
|
|
|
.sp
|
|
|
|
.SH DESCRIPTION
|
|
|
|
The functions here are used within the RPC's secure authentication
|
|
|
|
mechanism (AUTH_DES). There should be no need for user programs to
|
|
|
|
use this functions.
|
|
|
|
|
|
|
|
The function
|
2005-10-19 16:30:05 +00:00
|
|
|
.BR key_decryptsession ()
|
2004-11-03 13:51:07 +00:00
|
|
|
uses the (remote) server netname and takes the DES key
|
|
|
|
for decrypting. It uses the public key of the server and the
|
|
|
|
secret key associated with the effective UID of the calling process.
|
|
|
|
|
|
|
|
The function
|
|
|
|
.BR key_encryptsession ()
|
|
|
|
is the inverse of
|
|
|
|
.BR key_decryptsession ().
|
|
|
|
It encrypts the DES keys with the public key of the server and
|
|
|
|
the secret key associated with the effective UID of the calling process.
|
|
|
|
|
|
|
|
The function
|
|
|
|
.BR key_gendes ()
|
|
|
|
is used to ask the keyserver for a secure conversation key.
|
|
|
|
|
|
|
|
The function
|
|
|
|
.BR key_setsecret ()
|
|
|
|
is used to set the key for the effective UID of the calling process.
|
|
|
|
|
|
|
|
The function
|
|
|
|
.BR key_secretkey_is_set ()
|
|
|
|
can be used to determine whether a key has been
|
|
|
|
set for the effective UID of the calling process.
|
|
|
|
|
|
|
|
.SH NOTE
|
2006-09-06 12:38:32 +00:00
|
|
|
Note that we talk about two types of encryption here. One is
|
2004-11-03 13:51:07 +00:00
|
|
|
asymmetric using a public and secret key. The other is symmetric, the
|
|
|
|
64-bit DES.
|
|
|
|
.br
|
|
|
|
The routines were part of the linux/doors-project, abandoned by now.
|
|
|
|
|
|
|
|
.SH "RETURN VALUES"
|
|
|
|
The functions return 1 on success and 0 on failure.
|
|
|
|
|
|
|
|
.SH "SEE ALSO"
|
|
|
|
.BR crypt (3)
|