summaryrefslogtreecommitdiffstats
path: root/man3/key_setsecret.3
diff options
context:
space:
mode:
Diffstat (limited to 'man3/key_setsecret.3')
-rw-r--r--man3/key_setsecret.367
1 files changed, 67 insertions, 0 deletions
diff --git a/man3/key_setsecret.3 b/man3/key_setsecret.3
new file mode 100644
index 000000000..36fb656b7
--- /dev/null
+++ b/man3/key_setsecret.3
@@ -0,0 +1,67 @@
+.\" Copyright 2002 walter harms (walter.harms@informatik.uni-oldenburg.de)
+.\" Distributed under GPL
+.\" I had no way the check the functions out
+.\" be carefull
+.TH KEY_SETSECRET 3 2002-07-18 "secure rpc"
+.SH NAME
+key_decryptsession, key_encryptsession, key_setsecret, key_gendes,
+key_secretkey_is_set \- interfaces to rpc keyserver daemon
+.SH SYNOPSIS
+.sp
+.BR "#include <rpc/rpc.h>"
+.sp
+.BI "int key_decryptsession(const char *" remotename ,
+.BI "des_block *" deskey );
+.sp
+.BI "int key_encryptsession(const char *" remotename ,
+.BI "des_block *" deskey );
+.sp
+.BI "int key_gendes(des_block *" deskey );
+.sp
+.BI "int key_setsecret(const char *" key );
+.sp
+.B "int key_secretkey_is_set(void);"
+.sp
+.SH DESCRIPTION
+The functions here are used within the RPC's secure authentication
+mechanism (AUTH_DES). There should be no need for user programs to
+use this functions.
+
+The function
+.BR key_decryptsession ()
+uses the (remote) server netname and takes the DES key
+for decrypting. It uses the public key of the server and the
+secret key associated with the effective UID of the calling process.
+
+The function
+.BR key_encryptsession ()
+is the inverse of
+.BR key_decryptsession ().
+It encrypts the DES keys with the public key of the server and
+the secret key associated with the effective UID of the calling process.
+
+The function
+.BR key_gendes ()
+is used to ask the keyserver for a secure conversation key.
+
+The function
+.BR key_setsecret ()
+is used to set the key for the effective UID of the calling process.
+
+The function
+.BR key_secretkey_is_set ()
+can be used to determine whether a key has been
+set for the effective UID of the calling process.
+
+.SH NOTE
+Please note that we talk about two types of encryption here. One is
+asymmetric using a public and secret key. The other is symmetric, the
+64-bit DES.
+.br
+The routines were part of the linux/doors-project, abandoned by now.
+
+.SH "RETURN VALUES"
+The functions return 1 on success and 0 on failure.
+
+.SH "SEE ALSO"
+.BR crypt (3)