]> git.ipfire.org Git - thirdparty/man-pages.git/blame_incremental - man3/key_setsecret.3
rename.2: SEE ALSO: add rename(1)
[thirdparty/man-pages.git] / man3 / key_setsecret.3
... / ...
CommitLineData
1.\" Copyright 2002 walter harms (walter.harms@informatik.uni-oldenburg.de)
2.\"
3.\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
4.\" Distributed under GPL
5.\" %%%LICENSE_END
6.\"
7.\" I had no way the check the functions out
8.\" be careful
9.TH KEY_SETSECRET 3 2017-09-15 "" "Linux Programmer's Manual"
10.SH NAME
11key_decryptsession, key_encryptsession, key_setsecret, key_gendes,
12key_secretkey_is_set \- interfaces to rpc keyserver daemon
13.SH SYNOPSIS
14.B "#include <rpc/rpc.h>"
15.PP
16.BI "int key_decryptsession(char *" remotename ,
17.BI "des_block *" deskey );
18.PP
19.BI "int key_encryptsession(char *" remotename ,
20.BI "des_block *" deskey );
21.PP
22.BI "int key_gendes(des_block *" deskey );
23.PP
24.BI "int key_setsecret(char *" key );
25.PP
26.B "int key_secretkey_is_set(void);"
27.SH DESCRIPTION
28The functions here are used within the RPC's secure authentication
29mechanism (AUTH_DES).
30There should be no need for user programs to
31use this functions.
32.PP
33The function
34.BR key_decryptsession ()
35uses the (remote) server netname and takes the DES key
36for decrypting.
37It uses the public key of the server and the
38secret key associated with the effective UID of the calling process.
39.PP
40The function
41.BR key_encryptsession ()
42is the inverse of
43.BR key_decryptsession ().
44It encrypts the DES keys with the public key of the server and
45the secret key associated with the effective UID of the calling process.
46.PP
47The function
48.BR key_gendes ()
49is used to ask the keyserver for a secure conversation key.
50.PP
51The function
52.BR key_setsecret ()
53is used to set the key for the effective UID of the calling process.
54.PP
55The function
56.BR key_secretkey_is_set ()
57can be used to determine whether a key has been
58set for the effective UID of the calling process.
59.SH RETURN VALUE
60These functions return 1 on success and 0 on failure.
61.SH ATTRIBUTES
62For an explanation of the terms used in this section, see
63.BR attributes (7).
64.TS
65allbox;
66lbw22 lb lb
67l l l.
68Interface Attribute Value
69T{
70.BR key_decryptsession (),
71.br
72.BR key_encryptsession (),
73.br
74.BR key_gendes (),
75.br
76.BR key_setsecret (),
77.br
78.BR key_secretkey_is_set ()
79T} Thread safety MT-Safe
80.TE
81.sp 1
82.SH NOTES
83Note that we talk about two types of encryption here.
84One is asymmetric using a public and secret key.
85The other is symmetric, the
8664-bit DES.
87.PP
88These routines were part of the Linux/Doors-project, abandoned by now.
89.SH SEE ALSO
90.BR crypt (3)