PreviousNext

sec_key_mgmt_gen_rand_key(3sec)

Generates a new random key of a specified key type

Synopsis

#include <dce/keymgmt.h>

void sec_key_mgmt_gen_rand_key(
sec_key_mgmt_authn_service authn_service,
void *
arg,
idl_char *
principal_name,
void *
keytype,
unsigned32
key_vno,
void **
keydata,
error_status_t *
status);

Parameters

Input

authn_service
Identifies the authentication protocol using this key. The possible authentication protocols are as follows:

rpc_c_authn_dce_secret DCE shared-secret key authentication.
rpc_c_authn_dce_public DCE public key authentication (reserved for future use).
arg
This parameter can specify either the local key file or an argument to the get_key_fn key acquisition routine of the rpc_server_register_auth_info routine.

A value of NULL specifies that the default key file (/krb/v5srvtab) should be used. A key file name specifies that file should be used as the key file. You must prepend the file's absolute file name with FILE: and the file must have been created with the rgy_edit ktadd command or the sec_key_mgmt_set_key routine.

Any other value specifies an argument for the get_key_fn key acquisition routine. See the rpc_server_register_auth_info( ) reference page for more information.

principal_name
A pointer to a character string indicating the name of the principal for whom the key is to be generated.

keytype
A pointer to a value of type sec_passwd_type_t. The value identifies the data encryption algorithm to be used for the key (for example, DES).

key_vno
The version number of the new key.

Output

keydata
A pointer to a value of sec_passwd_rec_t. The storage for keydata is allocated dynamically, so the returned pointer actually indicates a pointer to the key value. The storage for this data may be freed with the sec_key_mgmt_free_key( ) function.

status
A pointer to the completion status. On successful completion, the routine returns error_status_ok. Otherwise, it returns an error.

Description
The sec_key_mgmt_gen_rand_key( ) routine generates a new random key for a specified principal and of a specified key type. The generated key can be used with the sec_key_mgmt_change_key( ) and sec_key_mgmt_set_key( ) routines.

Note that to initialize the random keyseed, the process must first make an authenticated call such as sec_rgy_site_open( ).

Files

/usr/include/dce/keymgmt.idl
The idl file from which dce/keymgmt.h was derived.

Errors

The following describes a partial list of errors that might be returned. Refer to the OSF DCE Problem Determination Guide for complete descriptions of all error messages.

sec_key_mgmt_e_not_implemented
The specified keytype is not supported.

sec_s_no_key_seed
No random key seed has been set.

sec_s_no_memory
Unable to allocate memory.

error_status_ok
The call was successful.

Related Information
Functions:

sec_intro(3sec)

sec_key_mgmt_change_key(3sec)

sec_key_mgmt_set_key(3sec)