]> git.ipfire.org Git - thirdparty/man-pages.git/blob - man3/key_setsecret.3
Import of man-pages 1.70
[thirdparty/man-pages.git] / man3 / key_setsecret.3
1 .\" Copyright 2002 walter harms (walter.harms@informatik.uni-oldenburg.de)
2 .\" Distributed under GPL
3 .\" I had no way the check the functions out
4 .\" be carefull
5 .TH KEY_SETSECRET 3 2002-07-18 "secure rpc"
6 .SH NAME
7 key_decryptsession, key_encryptsession, key_setsecret, key_gendes,
8 key_secretkey_is_set \- interfaces to rpc keyserver daemon
9 .SH SYNOPSIS
10 .sp
11 .BR "#include <rpc/rpc.h>"
12 .sp
13 .BI "int key_decryptsession(const char *" remotename ,
14 .BI "des_block *" deskey );
15 .sp
16 .BI "int key_encryptsession(const char *" remotename ,
17 .BI "des_block *" deskey );
18 .sp
19 .BI "int key_gendes(des_block *" deskey );
20 .sp
21 .BI "int key_setsecret(const char *" key );
22 .sp
23 .B "int key_secretkey_is_set(void);"
24 .sp
25 .SH DESCRIPTION
26 The functions here are used within the RPC's secure authentication
27 mechanism (AUTH_DES). There should be no need for user programs to
28 use this functions.
29
30 The function
31 .BR key_decryptsession ()
32 uses the (remote) server netname and takes the DES key
33 for decrypting. It uses the public key of the server and the
34 secret key associated with the effective UID of the calling process.
35
36 The function
37 .BR key_encryptsession ()
38 is the inverse of
39 .BR key_decryptsession ().
40 It encrypts the DES keys with the public key of the server and
41 the secret key associated with the effective UID of the calling process.
42
43 The function
44 .BR key_gendes ()
45 is used to ask the keyserver for a secure conversation key.
46
47 The function
48 .BR key_setsecret ()
49 is used to set the key for the effective UID of the calling process.
50
51 The function
52 .BR key_secretkey_is_set ()
53 can be used to determine whether a key has been
54 set for the effective UID of the calling process.
55
56 .SH NOTE
57 Please note that we talk about two types of encryption here. One is
58 asymmetric using a public and secret key. The other is symmetric, the
59 64-bit DES.
60 .br
61 The routines were part of the linux/doors-project, abandoned by now.
62
63 .SH "RETURN VALUES"
64 The functions return 1 on success and 0 on failure.
65
66 .SH "SEE ALSO"
67 .BR crypt (3)