]>
Commit | Line | Data |
---|---|---|
fea681da MK |
1 | .\" Copyright 2002 walter harms (walter.harms@informatik.uni-oldenburg.de) |
2 | .\" Distributed under GPL | |
3 | .\" I had no way the check the functions out | |
b9560046 | 4 | .\" be careful |
fea681da MK |
5 | .TH KEY_SETSECRET 3 2002-07-18 "secure rpc" |
6 | .SH NAME | |
7 | key_decryptsession, key_encryptsession, key_setsecret, key_gendes, | |
8 | key_secretkey_is_set \- interfaces to rpc keyserver daemon | |
9 | .SH SYNOPSIS | |
10 | .sp | |
11 | .BR "#include <rpc/rpc.h>" | |
12 | .sp | |
13 | .BI "int key_decryptsession(const char *" remotename , | |
14 | .BI "des_block *" deskey ); | |
15 | .sp | |
16 | .BI "int key_encryptsession(const char *" remotename , | |
17 | .BI "des_block *" deskey ); | |
18 | .sp | |
19 | .BI "int key_gendes(des_block *" deskey ); | |
20 | .sp | |
21 | .BI "int key_setsecret(const char *" key ); | |
22 | .sp | |
23 | .B "int key_secretkey_is_set(void);" | |
fea681da MK |
24 | .SH DESCRIPTION |
25 | The functions here are used within the RPC's secure authentication | |
c13182ef MK |
26 | mechanism (AUTH_DES). |
27 | There should be no need for user programs to | |
fea681da MK |
28 | use this functions. |
29 | ||
30 | The function | |
c13182ef MK |
31 | .BR key_decryptsession () |
32 | uses the (remote) server netname and takes the DES key | |
33 | for decrypting. | |
34 | It uses the public key of the server and the | |
fea681da MK |
35 | secret key associated with the effective UID of the calling process. |
36 | ||
37 | The function | |
38 | .BR key_encryptsession () | |
39 | is the inverse of | |
40 | .BR key_decryptsession (). | |
41 | It encrypts the DES keys with the public key of the server and | |
42 | the secret key associated with the effective UID of the calling process. | |
43 | ||
44 | The function | |
c13182ef | 45 | .BR key_gendes () |
fea681da MK |
46 | is used to ask the keyserver for a secure conversation key. |
47 | ||
48 | The function | |
c13182ef MK |
49 | .BR key_setsecret () |
50 | is used to set the key for the effective UID of the calling process. | |
fea681da MK |
51 | |
52 | The function | |
53 | .BR key_secretkey_is_set () | |
54 | can be used to determine whether a key has been | |
c13182ef | 55 | set for the effective UID of the calling process. |
fea681da | 56 | .SH NOTE |
c13182ef MK |
57 | Note that we talk about two types of encryption here. |
58 | One is | |
59 | asymmetric using a public and secret key. | |
60 | The other is symmetric, the | |
fea681da MK |
61 | 64-bit DES. |
62 | .br | |
63 | The routines were part of the linux/doors-project, abandoned by now. | |
fea681da MK |
64 | .SH "RETURN VALUES" |
65 | The functions return 1 on success and 0 on failure. | |
fea681da MK |
66 | .SH "SEE ALSO" |
67 | .BR crypt (3) |