diff options
Diffstat (limited to 'man3/key_setsecret.3')
-rw-r--r-- | man3/key_setsecret.3 | 21 |
1 files changed, 10 insertions, 11 deletions
diff --git a/man3/key_setsecret.3 b/man3/key_setsecret.3 index 13e8051..a8c4470 100644 --- a/man3/key_setsecret.3 +++ b/man3/key_setsecret.3 @@ -5,7 +5,7 @@ .\" .\" I had no way the check the functions out .\" be careful -.TH key_setsecret 3 2023-07-20 "Linux man-pages 6.05.01" +.TH key_setsecret 3 2023-10-31 "Linux man-pages 6.7" .SH NAME key_decryptsession, key_encryptsession, key_setsecret, key_gendes, key_secretkey_is_set \- interfaces to rpc keyserver daemon @@ -15,12 +15,12 @@ Standard C library .SH SYNOPSIS .nf .B #include <rpc/rpc.h> -.PP +.P .BI "int key_decryptsession(char *" remotename ", des_block *" deskey ); .BI "int key_encryptsession(char *" remotename ", des_block *" deskey ); -.PP +.P .BI "int key_gendes(des_block *" deskey ); -.PP +.P .BI "int key_setsecret(char *" key ); .B int key_secretkey_is_set(void); .fi @@ -29,29 +29,29 @@ The functions here are used within the RPC's secure authentication mechanism (AUTH_DES). There should be no need for user programs to use this functions. -.PP +.P The function .BR key_decryptsession () uses the (remote) server netname and takes the DES key for decrypting. It uses the public key of the server and the secret key associated with the effective UID of the calling process. -.PP +.P The function .BR key_encryptsession () is the inverse of .BR key_decryptsession (). It encrypts the DES keys with the public key of the server and the secret key associated with the effective UID of the calling process. -.PP +.P The function .BR key_gendes () is used to ask the keyserver for a secure conversation key. -.PP +.P The function .BR key_setsecret () is used to set the key for the effective UID of the calling process. -.PP +.P The function .BR key_secretkey_is_set () can be used to determine whether a key has been @@ -76,13 +76,12 @@ T{ .BR key_secretkey_is_set () T} Thread safety MT-Safe .TE -.sp 1 .SH NOTES Note that we talk about two types of encryption here. One is asymmetric using a public and secret key. The other is symmetric, the 64-bit DES. -.PP +.P These routines were part of the Linux/Doors-project, abandoned by now. .SH SEE ALSO .BR crypt (3) |