From owner-man-jp-reviewer@jp.FreeBSD.org Tue Mar 19 02:18:32 2002
Received: (from daemon@localhost)
	by castle.jp.FreeBSD.org (8.11.6+3.4W/8.11.3) id g2IHIWm67039;
	Tue, 19 Mar 2002 02:18:32 +0900 (JST)
	(envelope-from owner-man-jp-reviewer@jp.FreeBSD.org)
Received: from asahi-net.or.jp (p73-dna09urasirohat.saitama.ocn.ne.jp [210.190.196.73])
	by castle.jp.FreeBSD.org (8.11.6+3.4W/8.11.3) with ESMTP/inet id g2IHIQc67034
	for <man-jp-reviewer@jp.freebsd.org>; Tue, 19 Mar 2002 02:18:26 +0900 (JST)
	(envelope-from ht5t-fry@asahi-net.or.jp)
Received: from localhost (localhost.tf.or.jp [127.0.0.1])
	by asahi-net.or.jp (8.10.0/3.7W-Teddy-00051302) with ESMTP id g2IHHa915359;
	Tue, 19 Mar 2002 02:17:36 +0900 (JST)
To: man-jp-reviewer@jp.FreeBSD.org
From: Tetsuro Teddy FURUYA
 (=?iso-2022-jp?B?GyRCOEVDKxsoQiAbJEJFL086GyhC?=) <ht5t-fry@asahi-net.or.jp>
X-Mailer: Mew version 1.93 on Emacs 19.28 / Mule 2.3 (SUETSUMUHANA)
X-fingerprint: F1 BA 5F C1 C2 48 1D C7  AE 5F 16 ED 12 17 75 38
Mime-Version: 1.0
Content-Type: Multipart/Mixed;
	boundary="--Next_Part(Tue_Mar_19_02:14:44_2002_945)--"
Content-Transfer-Encoding: 7bit
Message-Id: <20020319021735R.ht5t-fry@galois.tf.or.jp>
Date: Tue, 19 Mar 2002 02:17:35 +0900
X-Dispatcher: imput version 980905(IM100)
Lines: 1073
Reply-To: man-jp-reviewer@jp.FreeBSD.org
Precedence: list
X-Distribute: distribute version 2.1 (Alpha) patchlevel 24e+020312
X-Sequence: man-jp-reviewer 4013
Subject: [man-jp-reviewer 4013] rpc_secure.3
Errors-To: owner-man-jp-reviewer@jp.FreeBSD.org
Sender: owner-man-jp-reviewer@jp.FreeBSD.org
X-Originator: ht5t-fry@asahi-net.or.jp

----Next_Part(Tue_Mar_19_02:14:44_2002_945)--
Content-Type: Text/Plain; charset=iso-2022-jp
Content-Transfer-Encoding: 7bit


$B8EC+(B $B$G$9!#(B

rpc_secure.3 $BBh(B 1 $B9F(B $B$G$9!#(B



# $BMQ8l$K$D$$$F$O!"(B

conversation key	$B2qOC80(B ( <- $BJQ49%-!<(B )
 $B$H$7$^$7$?!#(B

# $B0E9f$HId9f$O0c$&$N$KMQ8l$,F1$8$J$N$O$*$+$7$$$7!"(B
$BBP>N@-$b9MN8$7$F<!$N$h$&$K$7$^$7$?!#(B

encrypt			$B0E9f2=$9$k!"0E9f$K$9$k(B
decrypt			$BJ?J82=$9$k!"2rFI$9$k(B
encode			$BId9f2=$9$k!"%(%s%3!<%I$9$k(B
decode			$BI|9f2=$9$k!"%G%3!<%I$9$k(B

# window on the validity of the client credential,
-$B%/%i%$%"%s%H>ZL@=q$N@5Ev@-$K4X$9$k%&%#%s%I%&$G!"(B
+$B%/%i%$%"%s%H>ZL@=q$NM-8z4|4V$r5,Dj$9$k%&%#%s%I%&$G!"(B

$B$3$3$N(B window $B$O(B $B!V(Bvalidity $B$r8+$k%&%#%s%I%&!W$+(B $B!V(Bvalidity $B$N%&%#%s%I%&!W(B
$B$N$$$:$l$+$H;W$o$l$^$9!#$7$+$7!"(BRFC1057 $B$h$j8e<T$G$"$k$3$H$O(B
$BL@$i$+$G$9!#(B


RFC1057 $B$h$j(B
P.14.- 9.3.2 DES Authentication Verifiers
   A timestamp is expired if the server's time is later than the sum of
   the client's timestamp plus what is known as the client's "window".
   $B%5!<%P$N;~9o$,%/%i%$%"%s%H$N%?%$%`%9%?%s%W$H$$$o$f$k!V%&%#%s%I%&!W$H(B
   $B$N9g7W$h$jCY$l$F$$$?$i!"%?%$%`%9%?%s%W$O4|8B@Z$l$G$9!#(B

$B$d!"$^$?!"(B
P.16.- 9.3.4 DES Authentication Protocol Specification
   A fullname contains the network name of the client, an encrypted
   conversation key and the window. The window is actually a lifetime
   for the credential.
   $B@55,$JL>A0$O%/%i%$%"%s%H$N%M%C%H%o!<%/L>!"0E9f2=$7$?2qOC80$*$h$S(B
   $B%&%#%s%I%&$r4^$_$^$9!#%&%#%s%I%&$O<B$O>ZL@=q$NM-8z4|4V$G$9!#(B

# clock drift
-$B%/%m%C%/$NMI$l(B
+$B%/%m%C%/$N%I%j%U%H(B



## cvs $BMQ$N(B $B%?%0(B $B$O$I$&$9$k$s$G$7$?$C$1!)(B



---
Tetsuro Teddy FURUYA ($B8EC+(B $BE/O:(B) <ht5t-fry@asahi-net.or.jp>
=====

----Next_Part(Tue_Mar_19_02:14:44_2002_945)--
Content-Type: Text/Plain; charset=iso-2022-jp
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename=rpc_secure.3.ej.diff

--- ../src/rpc_secure.3.sagyoueibun.txt	Wed Mar 13 14:48:20 2002
+++ rpc_secure.3.jis	Tue Mar 19 00:43:54 2002
@@ -1,13 +1,19 @@
 .\" @(#)rpc_secure.3n	2.1 88/08/08 4.0 RPCSRC; from 1.19 88/06/24 SMI
 .\" $FreeBSD: src/lib/libc/rpc/rpc_secure.3,v 1.6.2.5 2001/12/14 18:33:57 ru Exp $
 .\"
+.\"WORD : conversation key	$B2qOC80(B
+.\"WORD : encrypt		$B0E9f2=$9$k!"0E9f$K$9$k(B
+.\"WORD : decrypt		$BJ?J82=$9$k!"2rFI$9$k(B
+.\"WORD : encode		$BId9f2=$9$k!"%(%s%3!<%I$9$k(B
+.\"WORD : decode		$BI|9f2=$9$k!"%G%3!<%I$9$k(B
+.\"
 .Dd February 16, 1988
 .Dt RPC 3
 .Os
-.Sh NAME
+.Sh $BL>>N(B
 .Nm rpc_secure
-.Nd library routines for secure remote procedure calls
-.Sh SYNOPSIS
+.Nd $B0BA4$J%j%b!<%H%W%m%7!<%8%c%3!<%k$N$?$a$N%i%$%V%i%j%k!<%A%s(B
+.Sh $B=q<0(B
 .In rpc/rpc.h
 .Ft AUTH *
 .Fo authdes_create
@@ -36,210 +42,216 @@
 .Fn netname2user "char *name" "uid_t *uidp" "gid_t *gidp" "int *gidlenp" "gid_t *gidlist"
 .Ft int
 .Fn user2netname "char *name" "uid_t uid" "char *domain"
-.Sh DESCRIPTION
-These routines are part of the
+.Sh $B2r@b(B
+$B$3$N%k!<%A%s$O!"(B
 .Tn RPC
-library.  They implement
+$B%i%$%V%i%j$N0lIt$G$9!#(B
 .Tn DES
-Authentication.  See
+$BG'>Z$r<BAu$7$^$9!#(B
+.Tn RPC
+$B$N>\:Y$K$D$$$F$O!"(B
 .Xr rpc 3
-for further details about
-.Tn RPC .
+$B$r;2>H$7$F$/$@$5$$!#(B
 .Pp
-The
-.Fn authdes_create
-is the first of two routines which interface to the
-.Tn RPC
-secure authentication system, known as
 .Tn DES
-authentication.
-The second is
-.Fn authdes_getucred ,
-below.
+$BG'>Z$H$7$FCN$i$l$k!"(B
+.Tn RPC
+$B0BA4G'>Z%7%9%F%`$N%$%s%?%U%'!<%9$H(B
+$B$J$k(B 2 $B$D$"$k%k!<%A%s$N$&$A(B 1 $B$D$O!"(B
+.Fn authdes_create
+$B$G$9!#(B
+2 $B$D$a$N%k!<%A%s$O$=$N<!$K<($5$l$k(B
+.Fn authdes_getucred
+$B$G$9!#(B
 .Pp
-Note: the keyserver daemon
-.Xr keyserv 8
-must be running for the
+$BCm(B :
 .Tn DES
-authentication system to work.
+$BG'>Z%7%9%F%`$rF0:n$5$;$k$K$O!"80%5!<%P%G!<%b%s(B
+.Xr keyserv 8
+$B$r<B9T$9$kI,MW$,$"$j$^$9!#(B
 .Pp
-.Fn Authdes_create ,
-used on the client side, returns an authentication handle that
-will enable the use of the secure authentication system.
-The first parameter
+$B%/%i%$%"%s%HB&$G;HMQ$9$k(B
+.Fn Authdes_create
+$B$O!"0BA4G'>Z%7%9%F%`$r;HMQ$G$-$k$h$&$K$9$k(B
+$BG'>Z%O%s%I%k$rJV$7$^$9!#(B
+$B:G=i$N%Q%i%a!<%?(B
 .Fa name
-is the network name, or
-.Fa netname ,
-of the owner of the server process.
-This field usually
-represents a
+$B$O!"%5!<%P%W%m%;%9$N=jM-<T$N%M%C%H%o!<%/L>!"$D$^$j(B
+.Fa netname
+$B$G$9!#(B
+$BDL>o$N>l9g!"$3$N%U%#!<%k%I$O%f!<%F%#%j%F%#%k!<%A%s(B
+.Fn host2netname
+$B$+$i0z$-=P$5$l$?(B
 .Fa hostname
-derived from the utility routine
-.Fn host2netname ,
-but could also represent a user name using
-.Fn user2netname .
-The second field is window on the validity of
-the client credential, given in seconds.  A small
-window is more secure than a large one, but choosing
-too small of a window will increase the frequency of
-resynchronizations because of clock drift.
-The third
-parameter
+$B$rI=$7$^$9$,!"(B
+.Fn user2netname
+$B$r;HMQ$7$F%f!<%6L>$rI=$9$3$H$b$G$-$^$9!#(B
+$BBh(B 2 $B%U%#!<%k%I$O!"(B
+$B%/%i%$%"%s%H>ZL@=q$NM-8z4|4V$r5,Dj$9$k%&%#%s%I%&$G!"(B
+$BICC10L$G;XDj$7$^$9!#(B
+$B>.$5$$%&%#%s%I%&$NJ}$,Bg$-$$%&%#%s%I%&$h$j(B
+$B0BA4$G$9$,!"%&%#%s%I%&$r>.$5$/$7$9$.$k$H!"(B
+$B%/%m%C%/$N%I%j%U%H$N$?$a!":FF14|$NIQEY$,A}2C$7$^$9!#(B
+$BBh(B 3 $B%Q%i%a!<%?(B
 .Fa addr
-is optional.  If it is
-.Dv NULL ,
-then the authentication system will assume
-that the local clock is always in sync with the server's
-clock, and will not attempt resynchronizations.
-If an address
-is supplied, however, then the system will use the address
-for consulting the remote time service whenever
-resynchronization
-is required.
-This parameter is usually the
-address of the
+$B$O%*%W%7%g%s$G$9!#(B
+$B$3$N%Q%i%a!<%?$r(B
+.Dv "$B%L%k(B "
+$B$K$9$k$H!"%m!<%+%k%/%m%C%/$O%5!<%P$N%/%m%C%/$H(B
+$B>o$KF14|$7$F$$$k$3$H$rG'>Z%7%9%F%`$,2>Dj$9$k$?$a!"(B
+$B:FF14|$O<B9T$5$l$J$/$J$j$^$9!#(B
+$B$7$+$7%"%I%l%9$r;XDj$9$k$H!"(B
+$B%7%9%F%`$O:FF14|$,I,MW$J;~$O>o$K$=$N%"%I%l%9$r(B
+$B;HMQ$7$F%j%b!<%H%?%$%`%5!<%S%9$+$i>pJs$rF@$^$9!#(B
+$BDL>o$N>l9g!"$3$N%Q%i%a!<%?$O(B
 .Tn RPC
-server itself.
-The final parameter
+$B%5!<%P$N%"%I%l%9$K$J$j$^$9!#(B
+$B:G8e$N%Q%i%a!<%?(B
 .Fa ckey
-is also optional.  If it is
-.Dv NULL ,
-then the authentication system will
-generate a random
-.Tn DES
-key to be used for the encryption of credentials.
-If it is supplied, however, then it will be used instead.
+$B$b%*%W%7%g%s$G$9!#(B
+$B$3$N%Q%i%a!<%?$r(B
+.Dv "$B%L%k(B "
+$B$K$9$k$H!"(B
+$BG'>Z%7%9%F%`$O>ZL@=q$N0E9f2=$K;HMQ$9$k%i%s%@%`$J(B
+.Tn DES
+$B80$r:n@.$7$^$9!#(B
+$B$3$N%Q%i%a!<%?$r;XDj$9$k$H!"(B
+$B$=$l$,%i%s%@%`$J80$NBe$o$j$K;HMQ$5$l$^$9!#(B
 .Pp
-.Fn Authdes_getucred ,
-the second of the two
 .Tn DES
-authentication routines,
-is used on the server side for converting a
+$BG'>Z$NBh(B 2 $B%k!<%A%s(B
+.Fn authdes_getucred
+$B$O!"%*%Z%l!<%F%#%s%0%7%9%F%`$K0MB8$7$J$$(B
 .Tn DES
-credential, which is
-operating system independent, into a
+$B>ZL@=q$r(B
 .Ux
-credential.
-This routine differs from utility routine
-.Fn netname2user
-in that
+$B>ZL@=q$KJQ49$9$k$?$a$K%5!<%PB&$G;HMQ$5$l$^$9!#(B
 .Fn authdes_getucred
-pulls its information from a cache, and does not have to do a
-Yellow Pages lookup every time it is called to get its information.
+$B$O%-%c%C%7%e$+$i>pJs$r0z$-=P$9$N$G!">pJs$rF@$k$?$a$K(B
+$B4X?t$,8F$S=P$5$l$k$?$S$K(B Yellow Page $B8!:w(B
+$B$r$9$kI,MW$O$J$$$H$$$&LL$G!"%f!<%F%#%j%F%#%k!<%A%s(B
+.Fn netname2user
+$B$H$O0[$J$j$^$9!#(B
 .Pp
-.Fn Getnetname
-installs the unique, operating-system independent netname of
-the
-caller in the fixed-length array
-.Fa name .
-Returns
+.Fn getnetname
+$B$O8F$S=P$785$N%M%C%HL>$r8GDjD9G[Ns(B
+.Fa name
+$B$K@_Dj$7$^$9!#(B
+$B$3$N%M%C%HL>$O0l0U$G$"$j(B
+$B%*%Z%l!<%F%#%s%0%7%9%F%`$K0MB8$7$^$;$s!#(B
+$B@5>o=*N;$7$?>l9g$O(B
 .Dv TRUE
-if it succeeds and
+$B$rJV$7!"=hM}$K<:GT$7$?>l9g$O(B
 .Dv FALSE
-if it fails.
+$B$rJV$7$^$9!#(B
 .Pp
-.Fn Host2netname
-converts from a domain-specific hostname to an
-operating-system independent netname.
-Returns
+.Fn host2netname
+$B$O!"%I%a%$%s8GM-$N%[%9%HL>$r(B
+$B%*%Z%l!<%F%#%s%0%7%9%F%`$K0MB8$7$J$$%M%C%HL>$KJQ49$7$^$9!#(B
+$B@5>o=*N;$7$?>l9g$O(B
 .Dv TRUE
-if it succeeds and
+$B$rJV$7!"=hM}$K<:GT$7$?>l9g$O(B
 .Dv FALSE
-if it fails.
-Inverse of
-.Fn netname2host .
-.Pp
-.Fn Key_decryptsession
-is an interface to the keyserver daemon, which is associated
-with
-.Tn RPC Ns 's
-secure authentication system
+$B$rJV$7$^$9!#(B
+$B$3$l$O!"(B
+.Fn netname2host
+$B$N5U$G$9!#(B
+.Pp
+.Tn RPC
+$B$N0BA4G'>Z%7%9%F%`(B
 .Tn ( DES
-authentication).
-User programs rarely need to call it, or its associated routines
+$BG'>Z(B) $B$K7k$SIU$1$i$l$F$$$k(B
+$B80%5!<%P%G!<%b%s$KBP$7$F!"(B
+.Fn key_decryptsession
+$B$O%$%s%?%U%'!<%9$H$J$j$^$9!#(B
+$B$3$N%k!<%A%s!"$*$h$S$3$N%k!<%A%s$K4XO"$9$k(B
 .Fn key_encryptsession ,
-.Fn key_gendes
-and
-.Fn key_setsecret .
-System commands such as
+.Fn key_gendes ,
+.Fn key_setsecret
+$B$r%f!<%6%W%m%0%i%`$,8F$S=P$9I,MW$O$[$H$s$I$"$j$^$;$s!#(B
 .Xr login 1
-and the
+$B$J$I$N%7%9%F%`%3%^%s%I$H(B
 .Tn RPC
-library are the main clients of these four routines.
+$B%i%$%V%i%j$,!"(B
+$B$3$N(B 4 $B$D$N%k!<%A%s$N<g$J%/%i%$%"%s%H$G$9!#(B
 .Pp
-.Fn Key_decryptsession
-takes a server netname and a
+.Fn key_decryptsession
+$B$O!"%5!<%P$N%M%C%HL>$H(B
 .Tn DES
-key, and decrypts the key by
-using the public key of the server and the secret key
-associated with the effective uid of the calling process.  It
-is the inverse of
-.Fn key_encryptsession .
-.Pp
-.Fn Key_encryptsession
-is a keyserver interface routine.
-It
-takes a server netname and a des key, and encrypts
-it using the public key of the server and the secret key
-associated with the effective uid of the calling process.  It
-is the inverse of
-.Fn key_decryptsession .
-.Pp
-.Fn Key_gendes
-is a keyserver interface routine.
-It
-is used to ask the keyserver for a secure conversation key.
-Choosing one
-.Qq random
-is usually not good enough,
-because
-the common ways of choosing random numbers, such as using the
-current time, are very easy to guess.
-.Pp
-.Fn Key_setsecret
-is a keyserver interface routine.
-It is used to set the key for
-the effective
+$B80$r<u$1<h$j!"(B
+$B%5!<%P$N8x3+80$H8F$S=P$785%W%m%;%9$N<B8z%f!<%6(B ID $B$K(B
+$B7k$SIU$1$i$l$?HkL)80$r;HMQ$7$F$3$N80$rJ?J82=$7$^$9!#(B
+$B$3$l$O!"(B
+.Fn key_encryptsession
+$B$N5U$G$9!#(B
+.Pp
+.Fn key_encryptsession
+$B$O!"80%5!<%P%$%s%?%U%'!<%9%k!<%A%s$G$9!#(B
+$B%5!<%P$N%M%C%HL>$H(B
+.Tn DES
+$B80$r<u$1<h$j!"%5!<%P$N8x3+80$H(B
+$B8F$S=P$785%W%m%;%9$N<B8z%f!<%6(B ID $B$K(B
+$B7k$SIU$1$i$l$?HkL)80$r;HMQ$7$F$3$N80$r0E9f2=$7$^$9!#(B
+$B$3$l$O!"(B
+.Fn key_decryptsession
+$B$N5U$G$9!#(B
+.Pp
+.Fn key_gendes
+$B$O!"80%5!<%P%$%s%?%U%'!<%9%k!<%A%s$G$9!#(B
+$B0BA4$J2qOC80$r80%5!<%P$KMW5a$9$k$?$a$K;HMQ$7$^$9!#(B
+$BBgDq$N>l9g!"(B 1 $B$D$N(B
+.Qq $B$G$?$i$a$5(B
+$B$rA*Br$9$k$@$1$G$O==J,$G$O$"$j$^$;$s!#(B
+$B$J$<$J$i!"8=:_;~9o$rMxMQ$9$k$h$&$JMp?t$N(B
+$B$h$/$"$kA*BrJ}K!$O$H$F$bMF0W$K?dB,$G$-$k$+$i$G$9!#(B
+.Pp
+.Fn key_setsecret
+$B$O!"80%5!<%P%$%s%?%U%'!<%9%k!<%A%s$G$9!#(B
+$B8F$S=P$785%W%m%;%9$N<B8z(B
 .Fa uid
-of the calling process.
+$B$N80$r@_Dj$9$k$?$a$K;HMQ$7$^$9!#(B
 .Pp
-.Fn Netname2host
-converts from an operating-system independent netname to a
-domain-specific hostname.
-Returns
+.Fn netname2host
+$B$O!"%*%Z%l!<%F%#%s%0%7%9%F%`$K0MB8$7$J$$%M%C%HL>(B
+$B$r%I%a%$%s8GM-$N%[%9%HL>$KJQ49$7$^$9!#(B
+$B@5>o=*N;$7$?>l9g$O(B
 .Dv TRUE
-if it succeeds and
+$B$rJV$7!"=hM}$K<:GT$7$?>l9g$O(B
 .Dv FALSE
-if it fails.  Inverse of
-.Fn host2netname .
+$B$rJV$7$^$9!#(B
+$B$3$l$O!"(B
+.Fn host2netname
+$B$N5U$G$9!#(B
 .Pp
-.Fn Netname2user
-converts from an operating-system independent netname to a
-domain-specific user ID.
-Returns
+.Fn netname2user
+$B$O!"%*%Z%l!<%F%#%s%0%7%9%F%`$K0MB8$7$J$$%M%C%HL>$r(B
+$B%I%a%$%s8GM-$N%f!<%6(B ID $B$KJQ49$7$^$9!#(B
+$B@5>o=*N;$7$?>l9g$O(B
 .Dv TRUE
-if it succeeds and
+$B$rJV$7!"=hM}$K<:GT$7$?>l9g$O(B
 .Dv FALSE
-if it fails.
-Inverse of
-.Fn user2netname .
-.Pp
-.Fn User2netname
-converts from a domain-specific username to an operating-system
-independent netname.
-Returns
+$B$rJV$7$^$9!#(B
+$B$3$l$O!"(B
+.Fn user2netname
+$B$N5U$G$9!#(B
+.Pp
+.Fn user2netname
+$B$O!"%I%a%$%s8GM-$N%f!<%6L>$r(B
+$B%*%Z%l!<%F%#%s%0%7%9%F%`$K0MB8$7$J$$%M%C%HL>$KJQ49$7$^$9!#(B
+$B@5>o=*N;$7$?>l9g$O(B
 .Dv TRUE
-if it succeeds and
+$B$rJV$7!"=hM}$K<:GT$7$?>l9g$O(B
 .Dv FALSE
-if it fails.
-Inverse of
-.Fn netname2user .
-.Sh SEE ALSO
+$B$rJV$7$^$9!#(B
+$B$3$l$O!"(B
+.Fn netname2user
+$B$N5U$G$9!#(B
+.Sh $B4XO"9`L\(B
 .Xr rpc 3 ,
 .Xr xdr 3 ,
 .Xr keyserv 8
 .Pp
-The following manuals:
+$B0J2<$N%^%K%e%"%k(B :
 .Rs
 .%B Remote Procedure Calls: Protocol Specification
 .Re
@@ -253,3 +265,4 @@
 .%B RPC: Remote Procedure Call Protocol Specification
 .%O RFC1050, Sun Microsystems Inc., USC-ISI
 .Re
+.\" Revised by Tetsuro Furuya <ht5t-fry@asahi-net.or.jp>, Mar. 2002.

----Next_Part(Tue_Mar_19_02:14:44_2002_945)--
Content-Type: Text/Plain; charset=iso-2022-jp
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename=rpc_secure.3.jis

.\" @(#)rpc_secure.3n	2.1 88/08/08 4.0 RPCSRC; from 1.19 88/06/24 SMI
.\" $FreeBSD: src/lib/libc/rpc/rpc_secure.3,v 1.6.2.5 2001/12/14 18:33:57 ru Exp $
.\"
.\"WORD : conversation key	$B2qOC80(B
.\"WORD : encrypt		$B0E9f2=$9$k!"0E9f$K$9$k(B
.\"WORD : decrypt		$BJ?J82=$9$k!"2rFI$9$k(B
.\"WORD : encode		$BId9f2=$9$k!"%(%s%3!<%I$9$k(B
.\"WORD : decode		$BI|9f2=$9$k!"%G%3!<%I$9$k(B
.\"
.Dd February 16, 1988
.Dt RPC 3
.Os
.Sh $BL>>N(B
.Nm rpc_secure
.Nd $B0BA4$J%j%b!<%H%W%m%7!<%8%c%3!<%k$N$?$a$N%i%$%V%i%j%k!<%A%s(B
.Sh $B=q<0(B
.In rpc/rpc.h
.Ft AUTH *
.Fo authdes_create
.Fa "char *name"
.Fa "unsigned window"
.Fa "struct sockaddr *addr"
.Fa "des_block *ckey"
.Fc
.Ft int
.Fn authdes_getucred "struct authdes_cred *adc" "uid_t *uid" "gid_t *gid" "int *grouplen" "gid_t *groups"
.Ft int
.Fn getnetname "char *name"
.Ft int
.Fn host2netname "char *name" "char *host" "char *domain"
.Ft int
.Fn key_decryptsession "const char *remotename" "des_block *deskey"
.Ft int
.Fn key_encryptsession "const char *remotename" "des_block *deskey"
.Ft int
.Fn key_gendes "des_block *deskey"
.Ft int
.Fn key_setsecret "const char *key"
.Ft int
.Fn netname2host "char *name" "char *host" "int hostlen"
.Ft int
.Fn netname2user "char *name" "uid_t *uidp" "gid_t *gidp" "int *gidlenp" "gid_t *gidlist"
.Ft int
.Fn user2netname "char *name" "uid_t uid" "char *domain"
.Sh $B2r@b(B
$B$3$N%k!<%A%s$O!"(B
.Tn RPC
$B%i%$%V%i%j$N0lIt$G$9!#(B
.Tn DES
$BG'>Z$r<BAu$7$^$9!#(B
.Tn RPC
$B$N>\:Y$K$D$$$F$O!"(B
.Xr rpc 3
$B$r;2>H$7$F$/$@$5$$!#(B
.Pp
.Tn DES
$BG'>Z$H$7$FCN$i$l$k!"(B
.Tn RPC
$B0BA4G'>Z%7%9%F%`$N%$%s%?%U%'!<%9$H(B
$B$J$k(B 2 $B$D$"$k%k!<%A%s$N$&$A(B 1 $B$D$O!"(B
.Fn authdes_create
$B$G$9!#(B
2 $B$D$a$N%k!<%A%s$O$=$N<!$K<($5$l$k(B
.Fn authdes_getucred
$B$G$9!#(B
.Pp
$BCm(B :
.Tn DES
$BG'>Z%7%9%F%`$rF0:n$5$;$k$K$O!"80%5!<%P%G!<%b%s(B
.Xr keyserv 8
$B$r<B9T$9$kI,MW$,$"$j$^$9!#(B
.Pp
$B%/%i%$%"%s%HB&$G;HMQ$9$k(B
.Fn Authdes_create
$B$O!"0BA4G'>Z%7%9%F%`$r;HMQ$G$-$k$h$&$K$9$k(B
$BG'>Z%O%s%I%k$rJV$7$^$9!#(B
$B:G=i$N%Q%i%a!<%?(B
.Fa name
$B$O!"%5!<%P%W%m%;%9$N=jM-<T$N%M%C%H%o!<%/L>!"$D$^$j(B
.Fa netname
$B$G$9!#(B
$BDL>o$N>l9g!"$3$N%U%#!<%k%I$O%f!<%F%#%j%F%#%k!<%A%s(B
.Fn host2netname
$B$+$i0z$-=P$5$l$?(B
.Fa hostname
$B$rI=$7$^$9$,!"(B
.Fn user2netname
$B$r;HMQ$7$F%f!<%6L>$rI=$9$3$H$b$G$-$^$9!#(B
$BBh(B 2 $B%U%#!<%k%I$O!"(B
$B%/%i%$%"%s%H>ZL@=q$NM-8z4|4V$r5,Dj$9$k%&%#%s%I%&$G!"(B
$BICC10L$G;XDj$7$^$9!#(B
$B>.$5$$%&%#%s%I%&$NJ}$,Bg$-$$%&%#%s%I%&$h$j(B
$B0BA4$G$9$,!"%&%#%s%I%&$r>.$5$/$7$9$.$k$H!"(B
$B%/%m%C%/$N%I%j%U%H$N$?$a!":FF14|$NIQEY$,A}2C$7$^$9!#(B
$BBh(B 3 $B%Q%i%a!<%?(B
.Fa addr
$B$O%*%W%7%g%s$G$9!#(B
$B$3$N%Q%i%a!<%?$r(B
.Dv "$B%L%k(B "
$B$K$9$k$H!"%m!<%+%k%/%m%C%/$O%5!<%P$N%/%m%C%/$H(B
$B>o$KF14|$7$F$$$k$3$H$rG'>Z%7%9%F%`$,2>Dj$9$k$?$a!"(B
$B:FF14|$O<B9T$5$l$J$/$J$j$^$9!#(B
$B$7$+$7%"%I%l%9$r;XDj$9$k$H!"(B
$B%7%9%F%`$O:FF14|$,I,MW$J;~$O>o$K$=$N%"%I%l%9$r(B
$B;HMQ$7$F%j%b!<%H%?%$%`%5!<%S%9$+$i>pJs$rF@$^$9!#(B
$BDL>o$N>l9g!"$3$N%Q%i%a!<%?$O(B
.Tn RPC
$B%5!<%P$N%"%I%l%9$K$J$j$^$9!#(B
$B:G8e$N%Q%i%a!<%?(B
.Fa ckey
$B$b%*%W%7%g%s$G$9!#(B
$B$3$N%Q%i%a!<%?$r(B
.Dv "$B%L%k(B "
$B$K$9$k$H!"(B
$BG'>Z%7%9%F%`$O>ZL@=q$N0E9f2=$K;HMQ$9$k%i%s%@%`$J(B
.Tn DES
$B80$r:n@.$7$^$9!#(B
$B$3$N%Q%i%a!<%?$r;XDj$9$k$H!"(B
$B$=$l$,%i%s%@%`$J80$NBe$o$j$K;HMQ$5$l$^$9!#(B
.Pp
.Tn DES
$BG'>Z$NBh(B 2 $B%k!<%A%s(B
.Fn authdes_getucred
$B$O!"%*%Z%l!<%F%#%s%0%7%9%F%`$K0MB8$7$J$$(B
.Tn DES
$B>ZL@=q$r(B
.Ux
$B>ZL@=q$KJQ49$9$k$?$a$K%5!<%PB&$G;HMQ$5$l$^$9!#(B
.Fn authdes_getucred
$B$O%-%c%C%7%e$+$i>pJs$r0z$-=P$9$N$G!">pJs$rF@$k$?$a$K(B
$B4X?t$,8F$S=P$5$l$k$?$S$K(B Yellow Page $B8!:w(B
$B$r$9$kI,MW$O$J$$$H$$$&LL$G!"%f!<%F%#%j%F%#%k!<%A%s(B
.Fn netname2user
$B$H$O0[$J$j$^$9!#(B
.Pp
.Fn getnetname
$B$O8F$S=P$785$N%M%C%HL>$r8GDjD9G[Ns(B
.Fa name
$B$K@_Dj$7$^$9!#(B
$B$3$N%M%C%HL>$O0l0U$G$"$j(B
$B%*%Z%l!<%F%#%s%0%7%9%F%`$K0MB8$7$^$;$s!#(B
$B@5>o=*N;$7$?>l9g$O(B
.Dv TRUE
$B$rJV$7!"=hM}$K<:GT$7$?>l9g$O(B
.Dv FALSE
$B$rJV$7$^$9!#(B
.Pp
.Fn host2netname
$B$O!"%I%a%$%s8GM-$N%[%9%HL>$r(B
$B%*%Z%l!<%F%#%s%0%7%9%F%`$K0MB8$7$J$$%M%C%HL>$KJQ49$7$^$9!#(B
$B@5>o=*N;$7$?>l9g$O(B
.Dv TRUE
$B$rJV$7!"=hM}$K<:GT$7$?>l9g$O(B
.Dv FALSE
$B$rJV$7$^$9!#(B
$B$3$l$O!"(B
.Fn netname2host
$B$N5U$G$9!#(B
.Pp
.Tn RPC
$B$N0BA4G'>Z%7%9%F%`(B
.Tn ( DES
$BG'>Z(B) $B$K7k$SIU$1$i$l$F$$$k(B
$B80%5!<%P%G!<%b%s$KBP$7$F!"(B
.Fn key_decryptsession
$B$O%$%s%?%U%'!<%9$H$J$j$^$9!#(B
$B$3$N%k!<%A%s!"$*$h$S$3$N%k!<%A%s$K4XO"$9$k(B
.Fn key_encryptsession ,
.Fn key_gendes ,
.Fn key_setsecret
$B$r%f!<%6%W%m%0%i%`$,8F$S=P$9I,MW$O$[$H$s$I$"$j$^$;$s!#(B
.Xr login 1
$B$J$I$N%7%9%F%`%3%^%s%I$H(B
.Tn RPC
$B%i%$%V%i%j$,!"(B
$B$3$N(B 4 $B$D$N%k!<%A%s$N<g$J%/%i%$%"%s%H$G$9!#(B
.Pp
.Fn key_decryptsession
$B$O!"%5!<%P$N%M%C%HL>$H(B
.Tn DES
$B80$r<u$1<h$j!"(B
$B%5!<%P$N8x3+80$H8F$S=P$785%W%m%;%9$N<B8z%f!<%6(B ID $B$K(B
$B7k$SIU$1$i$l$?HkL)80$r;HMQ$7$F$3$N80$rJ?J82=$7$^$9!#(B
$B$3$l$O!"(B
.Fn key_encryptsession
$B$N5U$G$9!#(B
.Pp
.Fn key_encryptsession
$B$O!"80%5!<%P%$%s%?%U%'!<%9%k!<%A%s$G$9!#(B
$B%5!<%P$N%M%C%HL>$H(B
.Tn DES
$B80$r<u$1<h$j!"%5!<%P$N8x3+80$H(B
$B8F$S=P$785%W%m%;%9$N<B8z%f!<%6(B ID $B$K(B
$B7k$SIU$1$i$l$?HkL)80$r;HMQ$7$F$3$N80$r0E9f2=$7$^$9!#(B
$B$3$l$O!"(B
.Fn key_decryptsession
$B$N5U$G$9!#(B
.Pp
.Fn key_gendes
$B$O!"80%5!<%P%$%s%?%U%'!<%9%k!<%A%s$G$9!#(B
$B0BA4$J2qOC80$r80%5!<%P$KMW5a$9$k$?$a$K;HMQ$7$^$9!#(B
$BBgDq$N>l9g!"(B 1 $B$D$N(B
.Qq $B$G$?$i$a$5(B
$B$rA*Br$9$k$@$1$G$O==J,$G$O$"$j$^$;$s!#(B
$B$J$<$J$i!"8=:_;~9o$rMxMQ$9$k$h$&$JMp?t$N(B
$B$h$/$"$kA*BrJ}K!$O$H$F$bMF0W$K?dB,$G$-$k$+$i$G$9!#(B
.Pp
.Fn key_setsecret
$B$O!"80%5!<%P%$%s%?%U%'!<%9%k!<%A%s$G$9!#(B
$B8F$S=P$785%W%m%;%9$N<B8z(B
.Fa uid
$B$N80$r@_Dj$9$k$?$a$K;HMQ$7$^$9!#(B
.Pp
.Fn netname2host
$B$O!"%*%Z%l!<%F%#%s%0%7%9%F%`$K0MB8$7$J$$%M%C%HL>(B
$B$r%I%a%$%s8GM-$N%[%9%HL>$KJQ49$7$^$9!#(B
$B@5>o=*N;$7$?>l9g$O(B
.Dv TRUE
$B$rJV$7!"=hM}$K<:GT$7$?>l9g$O(B
.Dv FALSE
$B$rJV$7$^$9!#(B
$B$3$l$O!"(B
.Fn host2netname
$B$N5U$G$9!#(B
.Pp
.Fn netname2user
$B$O!"%*%Z%l!<%F%#%s%0%7%9%F%`$K0MB8$7$J$$%M%C%HL>$r(B
$B%I%a%$%s8GM-$N%f!<%6(B ID $B$KJQ49$7$^$9!#(B
$B@5>o=*N;$7$?>l9g$O(B
.Dv TRUE
$B$rJV$7!"=hM}$K<:GT$7$?>l9g$O(B
.Dv FALSE
$B$rJV$7$^$9!#(B
$B$3$l$O!"(B
.Fn user2netname
$B$N5U$G$9!#(B
.Pp
.Fn user2netname
$B$O!"%I%a%$%s8GM-$N%f!<%6L>$r(B
$B%*%Z%l!<%F%#%s%0%7%9%F%`$K0MB8$7$J$$%M%C%HL>$KJQ49$7$^$9!#(B
$B@5>o=*N;$7$?>l9g$O(B
.Dv TRUE
$B$rJV$7!"=hM}$K<:GT$7$?>l9g$O(B
.Dv FALSE
$B$rJV$7$^$9!#(B
$B$3$l$O!"(B
.Fn netname2user
$B$N5U$G$9!#(B
.Sh $B4XO"9`L\(B
.Xr rpc 3 ,
.Xr xdr 3 ,
.Xr keyserv 8
.Pp
$B0J2<$N%^%K%e%"%k(B :
.Rs
.%B Remote Procedure Calls: Protocol Specification
.Re
.Rs
.%B Remote Procedure Call Programming Guide
.Re
.Rs
.%B Rpcgen Programming Guide
.Re
.Rs
.%B RPC: Remote Procedure Call Protocol Specification
.%O RFC1050, Sun Microsystems Inc., USC-ISI
.Re
.\" Revised by Tetsuro Furuya <ht5t-fry@asahi-net.or.jp>, Mar. 2002.

----Next_Part(Tue_Mar_19_02:14:44_2002_945)--
Content-Type: Text/Plain; charset=iso-2022-jp
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename=rpc_secure-jj.diff

--- ../src/rpc_secure.3.nihongo.txt	Wed Mar 13 14:48:18 2002
+++ rpc_secure.3.euc	Tue Mar 19 00:25:46 2002
@@ -1,12 +1,20 @@
 .\" @(#)rpc_secure.3n	2.1 88/08/08 4.0 RPCSRC; from 1.19 88/06/24 SMI
-.\" %Id: rpc_secure.3,v 1.3 1998/01/16 13:33:09 bde Exp %
+.\" $FreeBSD: src/lib/libc/rpc/rpc_secure.3,v 1.6.2.5 2001/12/14 18:33:57 ru Exp $
+.\"
+.\"WORD : conversation key	$B2qOC80(B
+.\"WORD : encrypt		$B0E9f2=$9$k!"0E9f$K$9$k(B
+.\"WORD : decrypt		$BJ?J82=$9$k!"2rFI$9$k(B
+.\"WORD : encode		$BId9f2=$9$k!"%(%s%3!<%I$9$k(B
+.\"WORD : decode		$BI|9f2=$9$k!"%G%3!<%I$9$k(B
+.\"
 .Dd February 16, 1988
 .Dt RPC 3
+.Os
 .Sh $BL>>N(B
 .Nm rpc_secure
 .Nd $B0BA4$J%j%b!<%H%W%m%7!<%8%c%3!<%k$N$?$a$N%i%$%V%i%j%k!<%A%s(B
 .Sh $B=q<0(B
-.Fd #include <rpc/rpc.h>
+.In rpc/rpc.h
 .Ft AUTH *
 .Fo authdes_create
 .Fa "char *name"
@@ -37,9 +45,9 @@
 .Sh $B2r@b(B
 $B$3$N%k!<%A%s$O!"(B
 .Tn RPC
-$B%i%$%V%i%j$N0lIt$G!"(B
+$B%i%$%V%i%j$N0lIt$G$9!#(B
 .Tn DES
-$BG'>Z$r<B8=$7$F$$$^$9!#(B
+$BG'>Z$r<BAu$7$^$9!#(B
 .Tn RPC
 $B$N>\:Y$K$D$$$F$O!"(B
 .Xr rpc 3
@@ -48,53 +56,67 @@
 .Tn DES
 $BG'>Z$H$7$FCN$i$l$k!"(B
 .Tn RPC
-$B0BA4G'>Z%7%9%F%`$N%$%s%?%U%'!<%9$H$J$k:G=i$N%k!<%A%s$O!"(B
+$B0BA4G'>Z%7%9%F%`$N%$%s%?%U%'!<%9$H(B
+$B$J$k(B 2 $B$D$"$k%k!<%A%s$N$&$A(B 1 $B$D$O!"(B
 .Fn authdes_create
-$B$G$9!#<!$N%k!<%A%s$O(B
+$B$G$9!#(B
+2 $B$D$a$N%k!<%A%s$O$=$N<!$K<($5$l$k(B
 .Fn authdes_getucred
 $B$G$9!#(B
 .Pp
-$BCm0U(B:
+$BCm(B :
 .Tn DES
-$BG'>Z%7%9%F%`$rF0:n$5$;$k$K$O!"%-!<%5!<%P%G!<%b%s(B
+$BG'>Z%7%9%F%`$rF0:n$5$;$k$K$O!"80%5!<%P%G!<%b%s(B
 .Xr keyserv 8
 $B$r<B9T$9$kI,MW$,$"$j$^$9!#(B
 .Pp
 $B%/%i%$%"%s%HB&$G;HMQ$9$k(B
-.Fn authdes_create
-$B$O!"0BA4G'>Z%7%9%F%`$r;HMQ$G$-$k$h$&$K$9$kG'>Z%O%s%I%k$rLa$7$^$9!#(B
+.Fn Authdes_create
+$B$O!"0BA4G'>Z%7%9%F%`$r;HMQ$G$-$k$h$&$K$9$k(B
+$BG'>Z%O%s%I%k$rJV$7$^$9!#(B
 $B:G=i$N%Q%i%a!<%?(B
 .Fa name
 $B$O!"%5!<%P%W%m%;%9$N=jM-<T$N%M%C%H%o!<%/L>!"$D$^$j(B
 .Fa netname
-$B$G$9!#DL>o$N>l9g!"$3$N%U%#!<%k%I$O!"%f!<%F%#%j%F%#%k!<%A%s(B
+$B$G$9!#(B
+$BDL>o$N>l9g!"$3$N%U%#!<%k%I$O%f!<%F%#%j%F%#%k!<%A%s(B
 .Fn host2netname
 $B$+$i0z$-=P$5$l$?(B
 .Fa hostname
 $B$rI=$7$^$9$,!"(B
 .Fn user2netname
-$B$r;HMQ$7$F%f!<%6L>$rI=$9$3$H$b$G$-$^$9!#Bh(B 2 $B%U%#!<%k%I$O!"(B
-$B%/%i%$%"%s%H>ZL@=q$N@5Ev@-$K4X$9$k%&%#%s%I%&$G!"ICC10L$G;XDj$5$l$^$9!#(B
-$B>.$5$$%&%#%s%I%&$NJ}$,Bg$-$$%&%#%s%I%&$h$j0BA4$G$9$,!"%&%#%s%I%&$r(B
-$B>.$5$/$7$9$.$k$H!"%/%m%C%/$NMI$l$N$?$a!":FF14|2=$NIQEY$,(B
-$B>e$,$j$^$9!#Bh(B 3 $B%Q%i%a!<%?(B
+$B$r;HMQ$7$F%f!<%6L>$rI=$9$3$H$b$G$-$^$9!#(B
+$BBh(B 2 $B%U%#!<%k%I$O!"(B
+$B%/%i%$%"%s%H>ZL@=q$NM-8z4|4V$r5,Dj$9$k%&%#%s%I%&$G!"(B
+$BICC10L$G;XDj$7$^$9!#(B
+$B>.$5$$%&%#%s%I%&$NJ}$,Bg$-$$%&%#%s%I%&$h$j(B
+$B0BA4$G$9$,!"%&%#%s%I%&$r>.$5$/$7$9$.$k$H!"(B
+$B%/%m%C%/$N%I%j%U%H$N$?$a!":FF14|$NIQEY$,A}2C$7$^$9!#(B
+$BBh(B 3 $B%Q%i%a!<%?(B
 .Fa addr
-$B$O%*%W%7%g%s$G$9!#$3$N%Q%i%a!<%?$r(B
-.Dv NULL
-$B$K$9$k$H!"%m!<%+%k%/%m%C%/$H%5!<%P$N%/%m%C%/$G>o$KF14|$,<h$i$l$F$$$k(B
-$B$3$H$rG'>Z%7%9%F%`$,2>Dj$9$k$?$a!":FF14|2=$O<B9T$5$l$J$/$J$j$^$9!#(B
-$B$7$+$7%"%I%l%9$r;XDj$9$k$H!"%7%9%F%`$O!":FF14|2=$,I,MW$J;~$O>o$K!"(B
-$B$=$N%"%I%l%9$r;HMQ$7$F%j%b!<%H%?%$%`%5!<%S%9$+$i>pJs$rF@$^$9!#(B
+$B$O%*%W%7%g%s$G$9!#(B
+$B$3$N%Q%i%a!<%?$r(B
+.Dv "$B%L%k(B "
+$B$K$9$k$H!"%m!<%+%k%/%m%C%/$O%5!<%P$N%/%m%C%/$H(B
+$B>o$KF14|$7$F$$$k$3$H$rG'>Z%7%9%F%`$,2>Dj$9$k$?$a!"(B
+$B:FF14|$O<B9T$5$l$J$/$J$j$^$9!#(B
+$B$7$+$7%"%I%l%9$r;XDj$9$k$H!"(B
+$B%7%9%F%`$O:FF14|$,I,MW$J;~$O>o$K$=$N%"%I%l%9$r(B
+$B;HMQ$7$F%j%b!<%H%?%$%`%5!<%S%9$+$i>pJs$rF@$^$9!#(B
 $BDL>o$N>l9g!"$3$N%Q%i%a!<%?$O(B
 .Tn RPC
-$B%5!<%P$N%"%I%l%9$K$J$j$^$9!#:G8e$N%Q%i%a!<%?(B
+$B%5!<%P$N%"%I%l%9$K$J$j$^$9!#(B
+$B:G8e$N%Q%i%a!<%?(B
 .Fa ckey
-$B$b%*%W%7%g%s$G$9!#$3$N%Q%i%a!<%?$r(B
-.Dv NULL
-$B$K$9$k$H!"G'>Z%7%9%F%`$O!">ZL@=q$N0E9f2=$K;HMQ$9$k%i%s%@%`$J(B
+$B$b%*%W%7%g%s$G$9!#(B
+$B$3$N%Q%i%a!<%?$r(B
+.Dv "$B%L%k(B "
+$B$K$9$k$H!"(B
+$BG'>Z%7%9%F%`$O>ZL@=q$N0E9f2=$K;HMQ$9$k%i%s%@%`$J(B
 .Tn DES
-$B%-!<$r:n@.$7$^$9!#$3$N%Q%i%a!<%?$r;XDj$9$k$H!"$=$l$,(B
-$B%i%s%@%`$J%-!<$NBe$o$j$K;HMQ$5$l$^$9!#(B
+$B80$r:n@.$7$^$9!#(B
+$B$3$N%Q%i%a!<%?$r;XDj$9$k$H!"(B
+$B$=$l$,%i%s%@%`$J80$NBe$o$j$K;HMQ$5$l$^$9!#(B
 .Pp
 .Tn DES
 $BG'>Z$NBh(B 2 $B%k!<%A%s(B
@@ -105,39 +127,44 @@
 .Ux
 $B>ZL@=q$KJQ49$9$k$?$a$K%5!<%PB&$G;HMQ$5$l$^$9!#(B
 .Fn authdes_getucred
-$B$O%-%c%C%7%e$+$i>pJs$r0z$-=P$9$N$G!">pJs$rF@$h$&$H$7$F4X?t$,(B
-$B8F$S=P$5$l$k$?$S$K(B
-Yellow Page $B8!:w$r$9$kI,MW$O$J$$$H$$$&LL$G!"%f!<%F%#%j%F%#%k!<%A%s(B
+$B$O%-%c%C%7%e$+$i>pJs$r0z$-=P$9$N$G!">pJs$rF@$k$?$a$K(B
+$B4X?t$,8F$S=P$5$l$k$?$S$K(B Yellow Page $B8!:w(B
+$B$r$9$kI,MW$O$J$$$H$$$&LL$G!"%f!<%F%#%j%F%#%k!<%A%s(B
 .Fn netname2user
 $B$H$O0[$J$j$^$9!#(B
 .Pp
 .Fn getnetname
-$B$O!"8GM-$G$"$j%*%Z%l!<%F%#%s%0%7%9%F%`$K0MB8$7$J$$!"8F$S=P$7B&$N%M%C%HL>$r(B
-$B8GDjD9G[Ns(B
+$B$O8F$S=P$785$N%M%C%HL>$r8GDjD9G[Ns(B
 .Fa name
-$B$K%$%s%9%H!<%k$7$^$9!#LdBj$,$J$$>l9g$O(B
+$B$K@_Dj$7$^$9!#(B
+$B$3$N%M%C%HL>$O0l0U$G$"$j(B
+$B%*%Z%l!<%F%#%s%0%7%9%F%`$K0MB8$7$^$;$s!#(B
+$B@5>o=*N;$7$?>l9g$O(B
 .Dv TRUE
-$B$rLa$7!"LdBj$,$"$k>l9g$O(B
+$B$rJV$7!"=hM}$K<:GT$7$?>l9g$O(B
 .Dv FALSE
-$B$rLa$7$^$9!#(B
+$B$rJV$7$^$9!#(B
 .Pp
 .Fn host2netname
-$B$O!"%I%a%$%sFCM-$J%[%9%HL>$r%*%Z%l!<%F%#%s%0%7%9%F%`$K0MB8$7$J$$(B
-$B%M%C%HL>$KJQ49$7$^$9!#LdBj$,$J$$>l9g$O(B
+$B$O!"%I%a%$%s8GM-$N%[%9%HL>$r(B
+$B%*%Z%l!<%F%#%s%0%7%9%F%`$K0MB8$7$J$$%M%C%HL>$KJQ49$7$^$9!#(B
+$B@5>o=*N;$7$?>l9g$O(B
 .Dv TRUE
-$B$rLa$7!"LdBj$,$"$k>l9g$O(B
+$B$rJV$7!"=hM}$K<:GT$7$?>l9g$O(B
 .Dv FALSE
-$B$rLa$7$^$9!#$3$l$O!"(B
+$B$rJV$7$^$9!#(B
+$B$3$l$O!"(B
 .Fn netname2host
 $B$N5U$G$9!#(B
 .Pp
-.Fn key_decryptsession
-$B$O!"(B
 .Tn RPC
-$B$N0BA4G'>Z%7%9%F%`(B (
-.Tn DES
-$BG'>Z(B) $B$K4XO"$7$?%-!<%5!<%P%G!<%b%s$H$N%$%s%?%U%'!<%9$G$9!#(B
-$B$3$N%k!<%A%s!"$*$h$S$3$N%k!<%A%s$K4XO"$7$?(B
+$B$N0BA4G'>Z%7%9%F%`(B
+.Tn ( DES
+$BG'>Z(B) $B$K7k$SIU$1$i$l$F$$$k(B
+$B80%5!<%P%G!<%b%s$KBP$7$F!"(B
+.Fn key_decryptsession
+$B$O%$%s%?%U%'!<%9$H$J$j$^$9!#(B
+$B$3$N%k!<%A%s!"$*$h$S$3$N%k!<%A%s$K4XO"$9$k(B
 .Fn key_encryptsession ,
 .Fn key_gendes ,
 .Fn key_setsecret
@@ -145,69 +172,78 @@
 .Xr login 1
 $B$J$I$N%7%9%F%`%3%^%s%I$H(B
 .Tn RPC
-$B%i%$%V%i%j$,!"$3$N(B
-4 $B$D$N%k!<%A%s$N<g$J%/%i%$%"%s%H$G$9!#(B
+$B%i%$%V%i%j$,!"(B
+$B$3$N(B 4 $B$D$N%k!<%A%s$N<g$J%/%i%$%"%s%H$G$9!#(B
 .Pp
 .Fn key_decryptsession
 $B$O!"%5!<%P$N%M%C%HL>$H(B
 .Tn DES
-$B%-!<$r<u$1<h$j!"%5!<%P$N8x3+80$H8F$S=P$7%W%m%;%9$N<B8z%f!<%6(B
-ID
-$B$K4XO"$7$?HkL)80$r;HMQ$7$F%-!<$rI|9f2=$7$^$9!#$3$l$O!"(B
+$B80$r<u$1<h$j!"(B
+$B%5!<%P$N8x3+80$H8F$S=P$785%W%m%;%9$N<B8z%f!<%6(B ID $B$K(B
+$B7k$SIU$1$i$l$?HkL)80$r;HMQ$7$F$3$N80$rJ?J82=$7$^$9!#(B
+$B$3$l$O!"(B
 .Fn key_encryptsession
 $B$N5U$G$9!#(B
 .Pp
 .Fn key_encryptsession
-$B$O!"%-!<%5!<%P%$%s%?%U%'!<%9%k!<%A%s$G$9!#%5!<%P$N%M%C%HL>$H(B
+$B$O!"80%5!<%P%$%s%?%U%'!<%9%k!<%A%s$G$9!#(B
+$B%5!<%P$N%M%C%HL>$H(B
 .Tn DES
-$B%-!<$r<u$1<h$j!"%5!<%P$N8x3+80$H8F$S=P$7%W%m%;%9$N<B8z%f!<%6(B
-ID
-$B$K4XO"$7$?HkL)80$r;HMQ$7$F%-!<$r0E9f2=$7$^$9!#$3$l$O!"(B
+$B80$r<u$1<h$j!"%5!<%P$N8x3+80$H(B
+$B8F$S=P$785%W%m%;%9$N<B8z%f!<%6(B ID $B$K(B
+$B7k$SIU$1$i$l$?HkL)80$r;HMQ$7$F$3$N80$r0E9f2=$7$^$9!#(B
+$B$3$l$O!"(B
 .Fn key_decryptsession
 $B$N5U$G$9!#(B
 .Pp
 .Fn key_gendes
-$B$O!"%-!<%5!<%P%$%s%?%U%'!<%9%k!<%A%s$G$9!#0BA4$JJQ49%-!<$r%-!<%5!<%P$K(B
-$BMW5a$9$k$?$a$K;HMQ$7$^$9!#BgDq$N>l9g!"(B
-1 $B$D$N(B
-.Qq $B%i%s%@%`(B
-$B$rA*Br$9$k$@$1$G$O==J,$G$O$"$j$^$;$s!#$J$<$J$i!"(B
-$B8=:_;~9o$rMxMQ$9$kMM$J%i%s%@%`?tCM$N$h$/$"$kA*BrJ}K!$O(B
-$B$H$F$bMF0W$K?dB,$G$-$k$+$i$G$9!#(B
+$B$O!"80%5!<%P%$%s%?%U%'!<%9%k!<%A%s$G$9!#(B
+$B0BA4$J2qOC80$r80%5!<%P$KMW5a$9$k$?$a$K;HMQ$7$^$9!#(B
+$BBgDq$N>l9g!"(B 1 $B$D$N(B
+.Qq $B$G$?$i$a$5(B
+$B$rA*Br$9$k$@$1$G$O==J,$G$O$"$j$^$;$s!#(B
+$B$J$<$J$i!"8=:_;~9o$rMxMQ$9$k$h$&$JMp?t$N(B
+$B$h$/$"$kA*BrJ}K!$O$H$F$bMF0W$K?dB,$G$-$k$+$i$G$9!#(B
 .Pp
 .Fn key_setsecret
-$B$O!"%-!<%5!<%P%$%s%?%U%'!<%9%k!<%A%s$G$9!#8F$S=P$7%W%m%;%9$N<B8z(B
+$B$O!"80%5!<%P%$%s%?%U%'!<%9%k!<%A%s$G$9!#(B
+$B8F$S=P$785%W%m%;%9$N<B8z(B
 .Fa uid
-$B$N%-!<$r@_Dj$9$k$?$a$K;HMQ$7$^$9!#(B
+$B$N80$r@_Dj$9$k$?$a$K;HMQ$7$^$9!#(B
 .Pp
 .Fn netname2host
-$B$O!"%*%Z%l!<%F%#%s%0%7%9%F%`$K0MB8$7$J$$%M%C%HL>$r%I%a%$%sFCM-$N(B
-$B%[%9%HL>$KJQ49$7$^$9!#LdBj$,$J$$>l9g$O(B
+$B$O!"%*%Z%l!<%F%#%s%0%7%9%F%`$K0MB8$7$J$$%M%C%HL>(B
+$B$r%I%a%$%s8GM-$N%[%9%HL>$KJQ49$7$^$9!#(B
+$B@5>o=*N;$7$?>l9g$O(B
 .Dv TRUE
-$B$rLa$7!"LdBj$,$"$k>l9g$O(B
+$B$rJV$7!"=hM}$K<:GT$7$?>l9g$O(B
 .Dv FALSE
-$B$rLa$7$^$9!#$3$l$O!"(B
+$B$rJV$7$^$9!#(B
+$B$3$l$O!"(B
 .Fn host2netname
 $B$N5U$G$9!#(B
 .Pp
 .Fn netname2user
-$B$O!"%*%Z%l!<%F%#%s%0%7%9%F%`$K0MB8$7$J$$%M%C%HL>$r%I%a%$%sFCM-$N%f!<%6(B
-ID
-$B$KJQ49$7$^$9!#LdBj$,$J$$>l9g$O(B
+$B$O!"%*%Z%l!<%F%#%s%0%7%9%F%`$K0MB8$7$J$$%M%C%HL>$r(B
+$B%I%a%$%s8GM-$N%f!<%6(B ID $B$KJQ49$7$^$9!#(B
+$B@5>o=*N;$7$?>l9g$O(B
 .Dv TRUE
-$B$rLa$7!"LdBj$,$"$k>l9g$O(B
+$B$rJV$7!"=hM}$K<:GT$7$?>l9g$O(B
 .Dv FALSE
-$B$rLa$7$^$9!#$3$l$O!"(B
+$B$rJV$7$^$9!#(B
+$B$3$l$O!"(B
 .Fn user2netname
 $B$N5U$G$9!#(B
 .Pp
 .Fn user2netname
-$B$O!"%I%a%$%sFCM-$N%f!<%6L>$r%*%Z%l!<%F%#%s%0%7%9%F%`$K0MB8$7$J$$(B
-$B%M%C%HL>$KJQ49$7$^$9!#LdBj$,$J$$>l9g$O(B
+$B$O!"%I%a%$%s8GM-$N%f!<%6L>$r(B
+$B%*%Z%l!<%F%#%s%0%7%9%F%`$K0MB8$7$J$$%M%C%HL>$KJQ49$7$^$9!#(B
+$B@5>o=*N;$7$?>l9g$O(B
 .Dv TRUE
-$B$rLa$7!"LdBj$,$"$k>l9g$O(B
+$B$rJV$7!"=hM}$K<:GT$7$?>l9g$O(B
 .Dv FALSE
-$B$rLa$7$^$9!#$3$l$O!"(B
+$B$rJV$7$^$9!#(B
+$B$3$l$O!"(B
 .Fn netname2user
 $B$N5U$G$9!#(B
 .Sh $B4XO"9`L\(B
@@ -215,7 +251,7 @@
 .Xr xdr 3 ,
 .Xr keyserv 8
 .Pp
-$B0J2<$N%^%K%e%"%k(B
+$B0J2<$N%^%K%e%"%k(B :
 .Rs
 .%B Remote Procedure Calls: Protocol Specification
 .Re
@@ -229,3 +265,4 @@
 .%B RPC: Remote Procedure Call Protocol Specification
 .%O RFC1050, Sun Microsystems Inc., USC-ISI
 .Re
+.\" Revised by Tetsuro Furuya <ht5t-fry@asahi-net.or.jp>, Mar. 2002.

----Next_Part(Tue_Mar_19_02:14:44_2002_945)----
