]>
Commit | Line | Data |
---|---|---|
fea681da | 1 | .\" Copyright 2002 walter harms (walter.harms@informatik.uni-oldenburg.de) |
38f20bb9 | 2 | .\" %%%LICENSE_START(GPL_NOVERSION_ONELINE) |
fea681da | 3 | .\" Distributed under GPL |
38f20bb9 | 4 | .\" %%%LICENSE_END |
fea681da | 5 | .\" I had no way the check the functions out |
b9560046 | 6 | .\" be careful |
0ed55ece | 7 | .TH KEY_SETSECRET 3 2002-07-18 "" "Linux Programmer's Manual" |
fea681da MK |
8 | .SH NAME |
9 | key_decryptsession, key_encryptsession, key_setsecret, key_gendes, | |
10 | key_secretkey_is_set \- interfaces to rpc keyserver daemon | |
11 | .SH SYNOPSIS | |
0daa9e92 | 12 | .B "#include <rpc/rpc.h>" |
fea681da MK |
13 | .sp |
14 | .BI "int key_decryptsession(const char *" remotename , | |
15 | .BI "des_block *" deskey ); | |
16 | .sp | |
17 | .BI "int key_encryptsession(const char *" remotename , | |
18 | .BI "des_block *" deskey ); | |
19 | .sp | |
20 | .BI "int key_gendes(des_block *" deskey ); | |
21 | .sp | |
22 | .BI "int key_setsecret(const char *" key ); | |
23 | .sp | |
24 | .B "int key_secretkey_is_set(void);" | |
fea681da MK |
25 | .SH DESCRIPTION |
26 | The functions here are used within the RPC's secure authentication | |
c13182ef MK |
27 | mechanism (AUTH_DES). |
28 | There should be no need for user programs to | |
fea681da MK |
29 | use this functions. |
30 | ||
31 | The function | |
c13182ef MK |
32 | .BR key_decryptsession () |
33 | uses the (remote) server netname and takes the DES key | |
34 | for decrypting. | |
35 | It uses the public key of the server and the | |
fea681da MK |
36 | secret key associated with the effective UID of the calling process. |
37 | ||
38 | The function | |
39 | .BR key_encryptsession () | |
40 | is the inverse of | |
41 | .BR key_decryptsession (). | |
42 | It encrypts the DES keys with the public key of the server and | |
0425de01 | 43 | the secret key associated with the effective UID of the calling process. |
fea681da MK |
44 | |
45 | The function | |
c13182ef | 46 | .BR key_gendes () |
fea681da MK |
47 | is used to ask the keyserver for a secure conversation key. |
48 | ||
49 | The function | |
c13182ef MK |
50 | .BR key_setsecret () |
51 | is used to set the key for the effective UID of the calling process. | |
fea681da MK |
52 | |
53 | The function | |
54 | .BR key_secretkey_is_set () | |
55 | can be used to determine whether a key has been | |
c13182ef | 56 | set for the effective UID of the calling process. |
47297adb | 57 | .SH RETURN VALUE |
2b2581ee | 58 | These functions return 1 on success and 0 on failure. |
19c98696 | 59 | .SH NOTES |
c13182ef | 60 | Note that we talk about two types of encryption here. |
19c98696 | 61 | One is asymmetric using a public and secret key. |
c13182ef | 62 | The other is symmetric, the |
fea681da | 63 | 64-bit DES. |
a9445f51 MK |
64 | .PP |
65 | These routines were part of the Linux/Doors-project, abandoned by now. | |
47297adb | 66 | .SH SEE ALSO |
fea681da | 67 | .BR crypt (3) |