mirror of https://github.com/mkerrisk/man-pages
66 lines
1.9 KiB
Groff
66 lines
1.9 KiB
Groff
.\" Copyright 2002 walter harms (walter.harms@informatik.uni-oldenburg.de)
|
|
.\" Distributed under GPL
|
|
.\" I had no way the check the functions out
|
|
.\" be careful
|
|
.TH KEY_SETSECRET 3 2002-07-18 "" "Linux Programmer's Manual"
|
|
.SH NAME
|
|
key_decryptsession, key_encryptsession, key_setsecret, key_gendes,
|
|
key_secretkey_is_set \- interfaces to rpc keyserver daemon
|
|
.SH SYNOPSIS
|
|
.B "#include <rpc/rpc.h>"
|
|
.sp
|
|
.BI "int key_decryptsession(const char *" remotename ,
|
|
.BI "des_block *" deskey );
|
|
.sp
|
|
.BI "int key_encryptsession(const char *" remotename ,
|
|
.BI "des_block *" deskey );
|
|
.sp
|
|
.BI "int key_gendes(des_block *" deskey );
|
|
.sp
|
|
.BI "int key_setsecret(const char *" key );
|
|
.sp
|
|
.B "int key_secretkey_is_set(void);"
|
|
.SH DESCRIPTION
|
|
The functions here are used within the RPC's secure authentication
|
|
mechanism (AUTH_DES).
|
|
There should be no need for user programs to
|
|
use this functions.
|
|
|
|
The function
|
|
.BR key_decryptsession ()
|
|
uses the (remote) server netname and takes the DES key
|
|
for decrypting.
|
|
It uses the public key of the server and the
|
|
secret key associated with the effective UID of the calling process.
|
|
|
|
The function
|
|
.BR key_encryptsession ()
|
|
is the inverse of
|
|
.BR key_decryptsession ().
|
|
It encrypts the DES keys with the public key of the server and
|
|
the secret key associated with the effective UID of the calling process.
|
|
|
|
The function
|
|
.BR key_gendes ()
|
|
is used to ask the keyserver for a secure conversation key.
|
|
|
|
The function
|
|
.BR key_setsecret ()
|
|
is used to set the key for the effective UID of the calling process.
|
|
|
|
The function
|
|
.BR key_secretkey_is_set ()
|
|
can be used to determine whether a key has been
|
|
set for the effective UID of the calling process.
|
|
.SH "RETURN VALUE"
|
|
These functions return 1 on success and 0 on failure.
|
|
.SH NOTES
|
|
Note that we talk about two types of encryption here.
|
|
One is asymmetric using a public and secret key.
|
|
The other is symmetric, the
|
|
64-bit DES.
|
|
.PP
|
|
These routines were part of the Linux/Doors-project, abandoned by now.
|
|
.SH "SEE ALSO"
|
|
.BR crypt (3)
|