summaryrefslogtreecommitdiffstats
path: root/man3/key_setsecret.3
diff options
context:
space:
mode:
Diffstat (limited to 'man3/key_setsecret.3')
-rw-r--r--man3/key_setsecret.388
1 files changed, 88 insertions, 0 deletions
diff --git a/man3/key_setsecret.3 b/man3/key_setsecret.3
new file mode 100644
index 0000000..13e8051
--- /dev/null
+++ b/man3/key_setsecret.3
@@ -0,0 +1,88 @@
+'\" t
+.\" Copyright 2002 walter harms (walter.harms@informatik.uni-oldenburg.de)
+.\"
+.\" SPDX-License-Identifier: GPL-1.0-or-later
+.\"
+.\" I had no way the check the functions out
+.\" be careful
+.TH key_setsecret 3 2023-07-20 "Linux man-pages 6.05.01"
+.SH NAME
+key_decryptsession, key_encryptsession, key_setsecret, key_gendes,
+key_secretkey_is_set \- interfaces to rpc keyserver daemon
+.SH LIBRARY
+Standard C library
+.RI ( libc ", " \-lc )
+.SH SYNOPSIS
+.nf
+.B #include <rpc/rpc.h>
+.PP
+.BI "int key_decryptsession(char *" remotename ", des_block *" deskey );
+.BI "int key_encryptsession(char *" remotename ", des_block *" deskey );
+.PP
+.BI "int key_gendes(des_block *" deskey );
+.PP
+.BI "int key_setsecret(char *" key );
+.B int key_secretkey_is_set(void);
+.fi
+.SH DESCRIPTION
+The functions here are used within the RPC's secure authentication
+mechanism (AUTH_DES).
+There should be no need for user programs to
+use this functions.
+.PP
+The function
+.BR key_decryptsession ()
+uses the (remote) server netname and takes the DES key
+for decrypting.
+It uses the public key of the server and the
+secret key associated with the effective UID of the calling process.
+.PP
+The function
+.BR key_encryptsession ()
+is the inverse of
+.BR key_decryptsession ().
+It encrypts the DES keys with the public key of the server and
+the secret key associated with the effective UID of the calling process.
+.PP
+The function
+.BR key_gendes ()
+is used to ask the keyserver for a secure conversation key.
+.PP
+The function
+.BR key_setsecret ()
+is used to set the key for the effective UID of the calling process.
+.PP
+The function
+.BR key_secretkey_is_set ()
+can be used to determine whether a key has been
+set for the effective UID of the calling process.
+.SH RETURN VALUE
+These functions return 1 on success and 0 on failure.
+.SH ATTRIBUTES
+For an explanation of the terms used in this section, see
+.BR attributes (7).
+.TS
+allbox;
+lbx lb lb
+l l l.
+Interface Attribute Value
+T{
+.na
+.nh
+.BR key_decryptsession (),
+.BR key_encryptsession (),
+.BR key_gendes (),
+.BR key_setsecret (),
+.BR key_secretkey_is_set ()
+T} Thread safety MT-Safe
+.TE
+.sp 1
+.SH NOTES
+Note that we talk about two types of encryption here.
+One is asymmetric using a public and secret key.
+The other is symmetric, the
+64-bit DES.
+.PP
+These routines were part of the Linux/Doors-project, abandoned by now.
+.SH SEE ALSO
+.BR crypt (3)