]>
Commit | Line | Data |
---|---|---|
fea681da MK |
1 | .\" Copyright 2002 walter harms (walter.harms@informatik.uni-oldenburg.de) |
2 | .\" Distributed under GPL | |
3 | .\" I had no way the check the functions out | |
b9560046 | 4 | .\" be careful |
0ed55ece | 5 | .TH KEY_SETSECRET 3 2002-07-18 "" "Linux Programmer's Manual" |
fea681da MK |
6 | .SH NAME |
7 | key_decryptsession, key_encryptsession, key_setsecret, key_gendes, | |
8 | key_secretkey_is_set \- interfaces to rpc keyserver daemon | |
9 | .SH SYNOPSIS | |
0daa9e92 | 10 | .B "#include <rpc/rpc.h>" |
fea681da MK |
11 | .sp |
12 | .BI "int key_decryptsession(const char *" remotename , | |
13 | .BI "des_block *" deskey ); | |
14 | .sp | |
15 | .BI "int key_encryptsession(const char *" remotename , | |
16 | .BI "des_block *" deskey ); | |
17 | .sp | |
18 | .BI "int key_gendes(des_block *" deskey ); | |
19 | .sp | |
20 | .BI "int key_setsecret(const char *" key ); | |
21 | .sp | |
22 | .B "int key_secretkey_is_set(void);" | |
fea681da MK |
23 | .SH DESCRIPTION |
24 | The functions here are used within the RPC's secure authentication | |
c13182ef MK |
25 | mechanism (AUTH_DES). |
26 | There should be no need for user programs to | |
fea681da MK |
27 | use this functions. |
28 | ||
29 | The function | |
c13182ef MK |
30 | .BR key_decryptsession () |
31 | uses the (remote) server netname and takes the DES key | |
32 | for decrypting. | |
33 | It uses the public key of the server and the | |
fea681da MK |
34 | secret key associated with the effective UID of the calling process. |
35 | ||
36 | The function | |
37 | .BR key_encryptsession () | |
38 | is the inverse of | |
39 | .BR key_decryptsession (). | |
40 | It encrypts the DES keys with the public key of the server and | |
0425de01 | 41 | the secret key associated with the effective UID of the calling process. |
fea681da MK |
42 | |
43 | The function | |
c13182ef | 44 | .BR key_gendes () |
fea681da MK |
45 | is used to ask the keyserver for a secure conversation key. |
46 | ||
47 | The function | |
c13182ef MK |
48 | .BR key_setsecret () |
49 | is used to set the key for the effective UID of the calling process. | |
fea681da MK |
50 | |
51 | The function | |
52 | .BR key_secretkey_is_set () | |
53 | can be used to determine whether a key has been | |
c13182ef | 54 | set for the effective UID of the calling process. |
2b2581ee MK |
55 | .SH "RETURN VALUE" |
56 | These functions return 1 on success and 0 on failure. | |
19c98696 | 57 | .SH NOTES |
c13182ef | 58 | Note that we talk about two types of encryption here. |
19c98696 | 59 | One is asymmetric using a public and secret key. |
c13182ef | 60 | The other is symmetric, the |
fea681da | 61 | 64-bit DES. |
a9445f51 MK |
62 | .PP |
63 | These routines were part of the Linux/Doors-project, abandoned by now. | |
fea681da MK |
64 | .SH "SEE ALSO" |
65 | .BR crypt (3) |