LinuxGuruz
  • Last 5 Forum Topics
    Replies
    Views
    Last post


The Web Only This Site
  • BOOKMARK

  • ADD TO FAVORITES

  • REFERENCES


  • MARC

    Mailing list ARChives
    - Search by -
     Subjects
     Authors
     Bodies





    FOLDOC

    Computing Dictionary




  • Text Link Ads






  • LINUX man pages
  • Linux Man Page Viewer


    The following form allows you to view linux man pages.

    Command:

    key_setsecret

    
    
    
    

    SYNOPSIS

           #include <rpc/rpc.h>
    
           int key_decryptsession(const char *remotename, des_block *deskey);
    
           int key_encryptsession(const char *remotename, des_block *deskey);
    
           int key_gendes(des_block *deskey);
    
           int key_setsecret(const char *key);
    
           int key_secretkey_is_set(void);
    
    
    

    DESCRIPTION

           The functions here are used  within  the  RPC's  secure  authentication
           mechanism (AUTH_DES).  There should be no need for user programs to use
           this functions.
    
           The function key_decryptsession() uses the (remote) server netname  and
           takes the DES key for decrypting.  It uses the public key of the server
           and the secret key associated with the effective  UID  of  the  calling
           process.
    
           The  function  key_encryptsession()  is  the inverse of key_decryptses-
           sion().  It encrypts the DES keys with the public key of the server and
           the  secret  key  associated with the effective UID of the calling pro-
           cess.
    
           The function key_gendes() is used to ask the  keyserver  for  a  secure
           conversation key.
    
           The  function  key_setsecret() is used to set the key for the effective
           UID of the calling process.
    
           The function key_secretkey_is_set() can be used to determine whether  a
           key has been set for the effective UID of the calling process.
    
    
    

    RETURN VALUE

           These functions return 1 on success and 0 on failure.
    
    
    

    NOTES

           Note  that we talk about two types of encryption here.  One is asymmet-
           ric using a public and secret key.  The other is symmetric, the  64-bit
           DES.
    
           These  routines were part of the Linux/Doors-project, abandoned by now.
    
    
    

    SEE ALSO

           crypt(3)
    
    
  • MORE RESOURCE


  • Linux

    The Distributions





    Linux

    The Software





    Linux

    The News



  • MARKETING






  • Toll Free

webmaster@linuxguruz.com
Copyright © 1999 - 2016 by LinuxGuruz