51251b2b3b
This version supports both the keyserv v1 and v2 protocols. It uses the new AF_LOCAL transport so that only local processes can use it for storing/retrieving keys, and it uses the SCM_CREDS kernel hack for authentication. With these two modifications, we don't need the keyenvoy program normally used with RPC 4.0. Note that if libdes.so.3.x is present on the system when keyserv is started, Secure RPC will run with normal DES encryption. If not, everything falls back to RC4 with a 40 bit key.
20 lines
748 B
C
20 lines
748 B
C
|
|
extern void setmodulus __P((char *modx));
|
|
|
|
extern keystatus pk_setkey __P(( uid_t, keybuf ));;
|
|
extern keystatus pk_encrypt __P(( uid_t, char *, netobj *, des_block * ));
|
|
extern keystatus pk_decrypt __P(( uid_t, char *, netobj *, des_block * ));
|
|
extern keystatus pk_netput __P(( uid_t, key_netstarg * ));
|
|
extern keystatus pk_netget __P(( uid_t, key_netstarg * ));
|
|
extern keystatus pk_get_conv_key __P(( uid_t, keybuf, cryptkeyres * ));
|
|
extern void pk_nodefaultkeys __P(( void ));
|
|
|
|
extern int __rpc_get_local_uid __P(( uid_t * , SVCXPRT * ));
|
|
extern void crypt_prog_1 __P(( struct svc_req *, register SVCXPRT * ));
|
|
extern void load_des __P(( int, char * ));
|
|
|
|
extern int (*_my_crypt)__P(( char *, int, struct desparams * ));
|
|
|
|
extern char ROOTKEY[];
|
|
|