man-pages/man3/key_setsecret.3

66 lines
1.9 KiB
Groff
Raw Normal View History

2004-11-03 13:51:07 +00:00
.\" Copyright 2002 walter harms (walter.harms@informatik.uni-oldenburg.de)
.\" Distributed under GPL
.\" I had no way the check the functions out
2005-06-24 14:44:16 +00:00
.\" be careful
.TH KEY_SETSECRET 3 2002-07-18 "" "Linux Programmer's Manual"
2004-11-03 13:51:07 +00:00
.SH NAME
key_decryptsession, key_encryptsession, key_setsecret, key_gendes,
key_secretkey_is_set \- interfaces to rpc keyserver daemon
.SH SYNOPSIS
2007-09-20 16:26:31 +00:00
.B "#include <rpc/rpc.h>"
2004-11-03 13:51:07 +00:00
.sp
.BI "int key_decryptsession(const char *" remotename ,
.BI "des_block *" deskey );
.sp
.BI "int key_encryptsession(const char *" remotename ,
.BI "des_block *" deskey );
.sp
.BI "int key_gendes(des_block *" deskey );
.sp
.BI "int key_setsecret(const char *" key );
.sp
.B "int key_secretkey_is_set(void);"
.SH DESCRIPTION
The functions here are used within the RPC's secure authentication
mechanism (AUTH_DES).
There should be no need for user programs to
2004-11-03 13:51:07 +00:00
use this functions.
The function
.BR key_decryptsession ()
uses the (remote) server netname and takes the DES key
for decrypting.
It uses the public key of the server and the
2004-11-03 13:51:07 +00:00
secret key associated with the effective UID of the calling process.
The function
.BR key_encryptsession ()
is the inverse of
.BR key_decryptsession ().
It encrypts the DES keys with the public key of the server and
2008-07-01 14:15:13 +00:00
the secret key associated with the effective UID of the calling process.
2004-11-03 13:51:07 +00:00
The function
.BR key_gendes ()
2004-11-03 13:51:07 +00:00
is used to ask the keyserver for a secure conversation key.
The function
.BR key_setsecret ()
is used to set the key for the effective UID of the calling process.
2004-11-03 13:51:07 +00:00
The function
.BR key_secretkey_is_set ()
can be used to determine whether a key has been
set for the effective UID of the calling process.
.SH "RETURN VALUE"
These functions return 1 on success and 0 on failure.
2007-05-16 02:54:18 +00:00
.SH NOTES
Note that we talk about two types of encryption here.
2007-05-16 02:54:18 +00:00
One is asymmetric using a public and secret key.
The other is symmetric, the
2004-11-03 13:51:07 +00:00
64-bit DES.
2007-06-21 22:01:09 +00:00
.PP
These routines were part of the Linux/Doors-project, abandoned by now.
2004-11-03 13:51:07 +00:00
.SH "SEE ALSO"
.BR crypt (3)