| .\" Copyright 2002 walter harms (walter.harms@informatik.uni-oldenburg.de) |
| .\" |
| .\" %%%LICENSE_START(GPL_NOVERSION_ONELINE) |
| .\" Distributed under GPL |
| .\" %%%LICENSE_END |
| .\" |
| .\" I had no way the check the functions out |
| .\" be careful |
| .TH KEY_SETSECRET 3 2021-03-22 "" "Linux Programmer's Manual" |
| .SH NAME |
| key_decryptsession, key_encryptsession, key_setsecret, key_gendes, |
| key_secretkey_is_set \- interfaces to rpc keyserver daemon |
| .SH SYNOPSIS |
| .nf |
| .B "#include <rpc/rpc.h>" |
| .PP |
| .BI "int key_decryptsession(char *" remotename ", des_block *" deskey ); |
| .BI "int key_encryptsession(char *" remotename ", des_block *" deskey ); |
| .PP |
| .BI "int key_gendes(des_block *" deskey ); |
| .PP |
| .BI "int key_setsecret(char *" key ); |
| .B "int key_secretkey_is_set(void);" |
| .fi |
| .SH DESCRIPTION |
| The functions here are used within the RPC's secure authentication |
| mechanism (AUTH_DES). |
| There should be no need for user programs to |
| use this functions. |
| .PP |
| The function |
| .BR key_decryptsession () |
| uses the (remote) server netname and takes the DES key |
| for decrypting. |
| It uses the public key of the server and the |
| secret key associated with the effective UID of the calling process. |
| .PP |
| The function |
| .BR key_encryptsession () |
| is the inverse of |
| .BR key_decryptsession (). |
| It encrypts the DES keys with the public key of the server and |
| the secret key associated with the effective UID of the calling process. |
| .PP |
| The function |
| .BR key_gendes () |
| is used to ask the keyserver for a secure conversation key. |
| .PP |
| The function |
| .BR key_setsecret () |
| is used to set the key for the effective UID of the calling process. |
| .PP |
| The function |
| .BR key_secretkey_is_set () |
| can be used to determine whether a key has been |
| set for the effective UID of the calling process. |
| .SH RETURN VALUE |
| These functions return 1 on success and 0 on failure. |
| .SH ATTRIBUTES |
| For an explanation of the terms used in this section, see |
| .BR attributes (7). |
| .ad l |
| .nh |
| .TS |
| allbox; |
| lbx lb lb |
| l l l. |
| Interface Attribute Value |
| T{ |
| .BR key_decryptsession (), |
| .BR key_encryptsession (), |
| .BR key_gendes (), |
| .BR key_setsecret (), |
| .BR key_secretkey_is_set () |
| T} Thread safety MT-Safe |
| .TE |
| .hy |
| .ad |
| .sp 1 |
| .SH NOTES |
| Note that we talk about two types of encryption here. |
| One is asymmetric using a public and secret key. |
| The other is symmetric, the |
| 64-bit DES. |
| .PP |
| These routines were part of the Linux/Doors-project, abandoned by now. |
| .SH SEE ALSO |
| .BR crypt (3) |