]> git.ipfire.org Git - thirdparty/man-pages.git/blame - man3/key_setsecret.3
random.4: spfix
[thirdparty/man-pages.git] / man3 / key_setsecret.3
CommitLineData
fea681da
MK
1.\" Copyright 2002 walter harms (walter.harms@informatik.uni-oldenburg.de)
2.\" Distributed under GPL
3.\" I had no way the check the functions out
b9560046 4.\" be careful
0ed55ece 5.TH KEY_SETSECRET 3 2002-07-18 "" "Linux Programmer's Manual"
fea681da
MK
6.SH NAME
7key_decryptsession, key_encryptsession, key_setsecret, key_gendes,
8key_secretkey_is_set \- interfaces to rpc keyserver daemon
9.SH SYNOPSIS
0daa9e92 10.B "#include <rpc/rpc.h>"
fea681da
MK
11.sp
12.BI "int key_decryptsession(const char *" remotename ,
13.BI "des_block *" deskey );
14.sp
15.BI "int key_encryptsession(const char *" remotename ,
16.BI "des_block *" deskey );
17.sp
18.BI "int key_gendes(des_block *" deskey );
19.sp
20.BI "int key_setsecret(const char *" key );
21.sp
22.B "int key_secretkey_is_set(void);"
fea681da
MK
23.SH DESCRIPTION
24The functions here are used within the RPC's secure authentication
c13182ef
MK
25mechanism (AUTH_DES).
26There should be no need for user programs to
fea681da
MK
27use this functions.
28
29The function
c13182ef
MK
30.BR key_decryptsession ()
31uses the (remote) server netname and takes the DES key
32for decrypting.
33It uses the public key of the server and the
fea681da
MK
34secret key associated with the effective UID of the calling process.
35
36The function
37.BR key_encryptsession ()
38is the inverse of
39.BR key_decryptsession ().
40It encrypts the DES keys with the public key of the server and
0425de01 41the secret key associated with the effective UID of the calling process.
fea681da
MK
42
43The function
c13182ef 44.BR key_gendes ()
fea681da
MK
45is used to ask the keyserver for a secure conversation key.
46
47The function
c13182ef
MK
48.BR key_setsecret ()
49is used to set the key for the effective UID of the calling process.
fea681da
MK
50
51The function
52.BR key_secretkey_is_set ()
53can be used to determine whether a key has been
c13182ef 54set for the effective UID of the calling process.
2b2581ee
MK
55.SH "RETURN VALUE"
56These functions return 1 on success and 0 on failure.
19c98696 57.SH NOTES
c13182ef 58Note that we talk about two types of encryption here.
19c98696 59One is asymmetric using a public and secret key.
c13182ef 60The other is symmetric, the
fea681da 6164-bit DES.
a9445f51
MK
62.PP
63These routines were part of the Linux/Doors-project, abandoned by now.
fea681da
MK
64.SH "SEE ALSO"
65.BR crypt (3)