diff options
Diffstat (limited to 'man3/key_setsecret.3')
-rw-r--r-- | man3/key_setsecret.3 | 67 |
1 files changed, 67 insertions, 0 deletions
diff --git a/man3/key_setsecret.3 b/man3/key_setsecret.3 new file mode 100644 index 000000000..36fb656b7 --- /dev/null +++ b/man3/key_setsecret.3 @@ -0,0 +1,67 @@ +.\" Copyright 2002 walter harms (walter.harms@informatik.uni-oldenburg.de) +.\" Distributed under GPL +.\" I had no way the check the functions out +.\" be carefull +.TH KEY_SETSECRET 3 2002-07-18 "secure rpc" +.SH NAME +key_decryptsession, key_encryptsession, key_setsecret, key_gendes, +key_secretkey_is_set \- interfaces to rpc keyserver daemon +.SH SYNOPSIS +.sp +.BR "#include <rpc/rpc.h>" +.sp +.BI "int key_decryptsession(const char *" remotename , +.BI "des_block *" deskey ); +.sp +.BI "int key_encryptsession(const char *" remotename , +.BI "des_block *" deskey ); +.sp +.BI "int key_gendes(des_block *" deskey ); +.sp +.BI "int key_setsecret(const char *" key ); +.sp +.B "int key_secretkey_is_set(void);" +.sp +.SH DESCRIPTION +The functions here are used within the RPC's secure authentication +mechanism (AUTH_DES). There should be no need for user programs to +use this functions. + +The function +.BR key_decryptsession () +uses the (remote) server netname and takes the DES key +for decrypting. It uses the public key of the server and the +secret key associated with the effective UID of the calling process. + +The function +.BR key_encryptsession () +is the inverse of +.BR key_decryptsession (). +It encrypts the DES keys with the public key of the server and +the secret key associated with the effective UID of the calling process. + +The function +.BR key_gendes () +is used to ask the keyserver for a secure conversation key. + +The function +.BR key_setsecret () +is used to set the key for the effective UID of the calling process. + +The function +.BR key_secretkey_is_set () +can be used to determine whether a key has been +set for the effective UID of the calling process. + +.SH NOTE +Please note that we talk about two types of encryption here. One is +asymmetric using a public and secret key. The other is symmetric, the +64-bit DES. +.br +The routines were part of the linux/doors-project, abandoned by now. + +.SH "RETURN VALUES" +The functions return 1 on success and 0 on failure. + +.SH "SEE ALSO" +.BR crypt (3) |