key_decryptsession, key_encryptsession, key_setsecret, key_gendes, key_secretkey_is_set − interfaces to rpc keyserver daemon


#include <rpc/rpc.h>

int key_decryptsession(char *remotename, des_block *deskey);

int key_encryptsession(char *remotename, des_block *deskey);

int key_gendes(des_block *deskey);

int key_setsecret(char *key);

int key_secretkey_is_set(void);


The functions here are used within the RPC’s secure authentication mechanism (AUTH_DES). There should be no need for user programs to use this functions.

The function key_decryptsession() uses the (remote) server netname and takes the DES key for decrypting. It uses the public key of the server and the secret key associated with the effective UID of the calling process.

The function key_encryptsession() is the inverse of key_decryptsession(). It encrypts the DES keys with the public key of the server and the secret key associated with the effective UID of the calling process.

The function key_gendes() is used to ask the keyserver for a secure conversation key.

The function key_setsecret() is used to set the key for the effective UID of the calling process.

The function key_secretkey_is_set() can be used to determine whether a key has been set for the effective UID of the calling process.


These functions return 1 on success and 0 on failure.


Note that we talk about two types of encryption here. One is asymmetric using a public and secret key. The other is symmetric, the 64-bit DES.

These routines were part of the Linux/Doors-project, abandoned by now.




This page is part of release 3.69 of the Linux man-pages project. A description of the project, information about reporting bugs, and the latest version of this page, can be found at−pages/.

More Linux Commands

lgammal(3) - log gamma function (Library - Linux man page)
For the definition of the Gamma function, see tgamma(3). The lgamma() function returns the natural logarithm of the absolute value of the Gamma function. The si

printenv(1) - print all or part of environment (Man Page)...
Print the values of the specified environment VARIABLE(s). If no VARIABLE is specified, print name and value pairs for them all. -0, --null end each output line

glNormal3dv(3gl) - set the current normal vector (Man Page)
The current normal is set to the given coordinates whenever glNormal is issued. Byte, short, or integer arguments are converted to floating-point with a linear

remquol(3) - remainder and part of quotient - Linux man page
These functions compute the remainder and part of the quotient upon division of x by y. A few bits of the quotient are stored via the quo pointer. The remainder

gzexe(1) - compress executable files in place (Man Page)....
The gzexe utility allows you to compress executables in place and have them automatically uncompress and execute when you run them (at a penalty in performance)

gnutls_certificate_set_rsa_export_params(3) - API function
This function will set the temporary RSA parameters for a certificate server to use. These parameters will be used in RSA-EXPORT cipher suites. REPORTING BUGS R

jnl(3) - Bessel functions of the first kind - Linux man page
The j0() and j1() functions return Bessel functions of x of the first kind of orders 0 and 1, respectively. The jn() function returns the Bessel function of x o

glMap2f(3gl) - define a two-dimensional evaluator (ManPage)
Evaluators provide a way to use polynomial or rational polynomial mapping to produce vertices, normals, texture coordinates, and colors. The values produced by

items(3menu) - make and break connections between items and
The function set_menu_items changes the item pointer array of the given menu. The array must be terminated by a NULL. The function menu_items returns the item a

fesetround(3) - floating-point rounding and exception handli
These eleven functions were defined in C99, and describe the handling of floating-point rounding and exceptions (overflow, zero-divide, etc.). Exceptions The di

x25(7) - ITU-T X.25 / ISO-8208 protocol interface. (ManPage)
X25 sockets provide an interface to the X.25 packet layer protocol. This allows applications to communicate over a public X.25 data network as standardized by I

Tk_FreeXId(3) - make X resource identifier available for reu
The default allocator for resource identifiers provided by Xlib is very simple-minded and does not allow resource identifiers to be re-used. If a long-running a

We can't live, work or learn in freedom unless the software we use is free.