diff options
Diffstat (limited to 'man3/key_setsecret.3')
-rw-r--r-- | man3/key_setsecret.3 | 87 |
1 files changed, 0 insertions, 87 deletions
diff --git a/man3/key_setsecret.3 b/man3/key_setsecret.3 deleted file mode 100644 index a8c4470..0000000 --- a/man3/key_setsecret.3 +++ /dev/null @@ -1,87 +0,0 @@ -'\" t -.\" Copyright 2002 walter harms (walter.harms@informatik.uni-oldenburg.de) -.\" -.\" SPDX-License-Identifier: GPL-1.0-or-later -.\" -.\" I had no way the check the functions out -.\" be careful -.TH key_setsecret 3 2023-10-31 "Linux man-pages 6.7" -.SH NAME -key_decryptsession, key_encryptsession, key_setsecret, key_gendes, -key_secretkey_is_set \- interfaces to rpc keyserver daemon -.SH LIBRARY -Standard C library -.RI ( libc ", " \-lc ) -.SH SYNOPSIS -.nf -.B #include <rpc/rpc.h> -.P -.BI "int key_decryptsession(char *" remotename ", des_block *" deskey ); -.BI "int key_encryptsession(char *" remotename ", des_block *" deskey ); -.P -.BI "int key_gendes(des_block *" deskey ); -.P -.BI "int key_setsecret(char *" key ); -.B int key_secretkey_is_set(void); -.fi -.SH DESCRIPTION -The functions here are used within the RPC's secure authentication -mechanism (AUTH_DES). -There should be no need for user programs to -use this functions. -.P -The function -.BR key_decryptsession () -uses the (remote) server netname and takes the DES key -for decrypting. -It uses the public key of the server and the -secret key associated with the effective UID of the calling process. -.P -The function -.BR key_encryptsession () -is the inverse of -.BR key_decryptsession (). -It encrypts the DES keys with the public key of the server and -the secret key associated with the effective UID of the calling process. -.P -The function -.BR key_gendes () -is used to ask the keyserver for a secure conversation key. -.P -The function -.BR key_setsecret () -is used to set the key for the effective UID of the calling process. -.P -The function -.BR key_secretkey_is_set () -can be used to determine whether a key has been -set for the effective UID of the calling process. -.SH RETURN VALUE -These functions return 1 on success and 0 on failure. -.SH ATTRIBUTES -For an explanation of the terms used in this section, see -.BR attributes (7). -.TS -allbox; -lbx lb lb -l l l. -Interface Attribute Value -T{ -.na -.nh -.BR key_decryptsession (), -.BR key_encryptsession (), -.BR key_gendes (), -.BR key_setsecret (), -.BR key_secretkey_is_set () -T} Thread safety MT-Safe -.TE -.SH NOTES -Note that we talk about two types of encryption here. -One is asymmetric using a public and secret key. -The other is symmetric, the -64-bit DES. -.P -These routines were part of the Linux/Doors-project, abandoned by now. -.SH SEE ALSO -.BR crypt (3) |