1 .\" Copyright 2002 walter harms (walter.harms@informatik.uni-oldenburg.de)
3 .\" %%%LICENSE_START(GPL_NOVERSION_ONELINE)
4 .\" Distributed under GPL
7 .\" I had no way the check the functions out
9 .TH KEY_SETSECRET 3 2017-09-15 "" "Linux Programmer's Manual"
11 key_decryptsession, key_encryptsession, key_setsecret, key_gendes,
12 key_secretkey_is_set \- interfaces to rpc keyserver daemon
15 .B "#include <rpc/rpc.h>"
17 .BI "int key_decryptsession(char *" remotename ", des_block *" deskey );
18 .BI "int key_encryptsession(char *" remotename ", des_block *" deskey );
20 .BI "int key_gendes(des_block *" deskey );
22 .BI "int key_setsecret(char *" key );
23 .B "int key_secretkey_is_set(void);"
26 The functions here are used within the RPC's secure authentication
28 There should be no need for user programs to
32 .BR key_decryptsession ()
33 uses the (remote) server netname and takes the DES key
35 It uses the public key of the server and the
36 secret key associated with the effective UID of the calling process.
39 .BR key_encryptsession ()
41 .BR key_decryptsession ().
42 It encrypts the DES keys with the public key of the server and
43 the secret key associated with the effective UID of the calling process.
47 is used to ask the keyserver for a secure conversation key.
51 is used to set the key for the effective UID of the calling process.
54 .BR key_secretkey_is_set ()
55 can be used to determine whether a key has been
56 set for the effective UID of the calling process.
58 These functions return 1 on success and 0 on failure.
60 For an explanation of the terms used in this section, see
68 Interface Attribute Value
70 .BR key_decryptsession (),
71 .BR key_encryptsession (),
74 .BR key_secretkey_is_set ()
75 T} Thread safety MT-Safe
81 Note that we talk about two types of encryption here.
82 One is asymmetric using a public and secret key.
83 The other is symmetric, the
86 These routines were part of the Linux/Doors-project, abandoned by now.