]> git.ipfire.org Git - thirdparty/man-pages.git/blame - man3/key_setsecret.3
getifaddrs.3, getnameinfo.3: srcfix
[thirdparty/man-pages.git] / man3 / key_setsecret.3
CommitLineData
fea681da 1.\" Copyright 2002 walter harms (walter.harms@informatik.uni-oldenburg.de)
2297bf0e 2.\"
38f20bb9 3.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
fea681da 4.\" Distributed under GPL
38f20bb9 5.\" %%%LICENSE_END
fea681da 6.\" I had no way the check the functions out
b9560046 7.\" be careful
0ed55ece 8.TH KEY_SETSECRET 3 2002-07-18 "" "Linux Programmer's Manual"
fea681da
MK
9.SH NAME
10key_decryptsession, key_encryptsession, key_setsecret, key_gendes,
11key_secretkey_is_set \- interfaces to rpc keyserver daemon
12.SH SYNOPSIS
0daa9e92 13.B "#include <rpc/rpc.h>"
fea681da
MK
14.sp
15.BI "int key_decryptsession(const char *" remotename ,
16.BI "des_block *" deskey );
17.sp
18.BI "int key_encryptsession(const char *" remotename ,
19.BI "des_block *" deskey );
20.sp
21.BI "int key_gendes(des_block *" deskey );
22.sp
23.BI "int key_setsecret(const char *" key );
24.sp
25.B "int key_secretkey_is_set(void);"
fea681da
MK
26.SH DESCRIPTION
27The functions here are used within the RPC's secure authentication
c13182ef
MK
28mechanism (AUTH_DES).
29There should be no need for user programs to
fea681da
MK
30use this functions.
31
32The function
c13182ef
MK
33.BR key_decryptsession ()
34uses the (remote) server netname and takes the DES key
35for decrypting.
36It uses the public key of the server and the
fea681da
MK
37secret key associated with the effective UID of the calling process.
38
39The function
40.BR key_encryptsession ()
41is the inverse of
42.BR key_decryptsession ().
43It encrypts the DES keys with the public key of the server and
0425de01 44the secret key associated with the effective UID of the calling process.
fea681da
MK
45
46The function
c13182ef 47.BR key_gendes ()
fea681da
MK
48is used to ask the keyserver for a secure conversation key.
49
50The function
c13182ef
MK
51.BR key_setsecret ()
52is used to set the key for the effective UID of the calling process.
fea681da
MK
53
54The function
55.BR key_secretkey_is_set ()
56can be used to determine whether a key has been
c13182ef 57set for the effective UID of the calling process.
47297adb 58.SH RETURN VALUE
2b2581ee 59These functions return 1 on success and 0 on failure.
19c98696 60.SH NOTES
c13182ef 61Note that we talk about two types of encryption here.
19c98696 62One is asymmetric using a public and secret key.
c13182ef 63The other is symmetric, the
fea681da 6464-bit DES.
a9445f51
MK
65.PP
66These routines were part of the Linux/Doors-project, abandoned by now.
47297adb 67.SH SEE ALSO
fea681da 68.BR crypt (3)