]>
Commit | Line | Data |
---|---|---|
fea681da MK |
1 | .\" Copyright 2002 walter harms (walter.harms@informatik.uni-oldenburg.de) |
2 | .\" Distributed under GPL | |
3 | .\" I had no way the check the functions out | |
4 | .\" be carefull | |
5 | .TH KEY_SETSECRET 3 2002-07-18 "secure rpc" | |
6 | .SH NAME | |
7 | key_decryptsession, key_encryptsession, key_setsecret, key_gendes, | |
8 | key_secretkey_is_set \- interfaces to rpc keyserver daemon | |
9 | .SH SYNOPSIS | |
10 | .sp | |
11 | .BR "#include <rpc/rpc.h>" | |
12 | .sp | |
13 | .BI "int key_decryptsession(const char *" remotename , | |
14 | .BI "des_block *" deskey ); | |
15 | .sp | |
16 | .BI "int key_encryptsession(const char *" remotename , | |
17 | .BI "des_block *" deskey ); | |
18 | .sp | |
19 | .BI "int key_gendes(des_block *" deskey ); | |
20 | .sp | |
21 | .BI "int key_setsecret(const char *" key ); | |
22 | .sp | |
23 | .B "int key_secretkey_is_set(void);" | |
24 | .sp | |
25 | .SH DESCRIPTION | |
26 | The functions here are used within the RPC's secure authentication | |
27 | mechanism (AUTH_DES). There should be no need for user programs to | |
28 | use this functions. | |
29 | ||
30 | The function | |
31 | .BR key_decryptsession () | |
32 | uses the (remote) server netname and takes the DES key | |
33 | for decrypting. It uses the public key of the server and the | |
34 | secret key associated with the effective UID of the calling process. | |
35 | ||
36 | The function | |
37 | .BR key_encryptsession () | |
38 | is the inverse of | |
39 | .BR key_decryptsession (). | |
40 | It encrypts the DES keys with the public key of the server and | |
41 | the secret key associated with the effective UID of the calling process. | |
42 | ||
43 | The function | |
44 | .BR key_gendes () | |
45 | is used to ask the keyserver for a secure conversation key. | |
46 | ||
47 | The function | |
48 | .BR key_setsecret () | |
49 | is used to set the key for the effective UID of the calling process. | |
50 | ||
51 | The function | |
52 | .BR key_secretkey_is_set () | |
53 | can be used to determine whether a key has been | |
54 | set for the effective UID of the calling process. | |
55 | ||
56 | .SH NOTE | |
57 | Please note that we talk about two types of encryption here. One is | |
58 | asymmetric using a public and secret key. The other is symmetric, the | |
59 | 64-bit DES. | |
60 | .br | |
61 | The routines were part of the linux/doors-project, abandoned by now. | |
62 | ||
63 | .SH "RETURN VALUES" | |
64 | The functions return 1 on success and 0 on failure. | |
65 | ||
66 | .SH "SEE ALSO" | |
67 | .BR crypt (3) |