publickey(4) File Formats publickey(4)NAME
publickey - public key database
SYNOPSIS
/etc/publickey
DESCRIPTION
/etc/publickey is a local public key database that is used for secure RPC. The /etc/publickey file can be used in conjunction with or
instead of other publickey databases, including the NIS publickey map and the NIS+ publickey map. Each entry in the database consists of a
network user name (which may refer to either a user or a hostname), followed by the user's public key (in hex notation), a colon, and then
the user's secret key encrypted with a password (also in hex notation).
The /etc/publickey file contains a default entry for nobody.
SEE ALSO chkey(1), newkey(1M), getpublickey(3NSL), nsswitch.conf(4)SunOS 5.11 6 Mar 1992 publickey(4)
Check Out this Related Man Page
getpublickey(3NSL) Networking Services Library Functions getpublickey(3NSL)NAME
getpublickey, getsecretkey, publickey - retrieve public or secret key
SYNOPSIS
#include <rpc/rpc.h>
#include <rpc/key_prot.h>
int getpublickey(const char netname[MAXNETNAMELEN],
char publickey[HEXKEYBYTES+1]);
int getsecretkey(const char netname[MAXNETNAMELEN],
char secretkey[HEXKEYBYTES+1],const char *passwd);
DESCRIPTION
The getpublickey() and getsecretkey() functions get public and secret keys for netname. The key may come from one of the following sources:
o /etc/publickey file. See publickey(4).
o NIS map ``publickey.byname'' or the NIS+ table ``cred.org_dir''. The sources and their lookup order are specified in the
/etc/nsswitch.conf file. See nsswitch.conf(4).
getsecretkey() has an extra argument, passwd, which is used to decrypt the encrypted secret key stored in the database.
RETURN VALUES
Both routines return 1 if they are successful in finding the key. Otherwise, the routines return 0. The keys are returned as null-termi-
nated, hexadecimal strings. If the password supplied to getsecretkey() fails to decrypt the secret key, the routine will return 1 but the
secretkey [0] will be set to NULL.
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|MT-Level |Safe |
+-----------------------------+-----------------------------+
SEE ALSO secure_rpc(3NSL), nsswitch.conf(4), publickey(4), attributes(5)WARNINGS
If getpublickey() gets the public key from any source other than NIS+, all authenticated NIS+ operations may fail. To ensure that this does
not happen, edit the nsswitch.conf(4) file to make sure that the public key is obtained from NIS+.
NOTES
NIS+ might not be supported in future releases of the Solaris operating system. Tools to aid the migration from NIS+ to LDAP are available
in the current Solaris release. For more information, visit http://www.sun.com/directory/nisplus/transition.html.
SunOS 5.11 10 Nov 2005 getpublickey(3NSL)
Connecting to -> Ubuntu server running apache
Connecting from -> Mac OS X 10.4
As soon as I had created my 'dsa' and 'rsa' keys I sent them to be added to the 'authenticated whatever file' so I could connect.
The first time I tried it...
Asked for pasphrase
Connected to server
no prob
... (2 Replies)
Hello,
when I try to connect to a remote machine through SSH username@host I am getting the error message
Permission denied (publickey,password,keyboard-interactive).
Can any one tell me what is the problem. the key is added in the remote machines authorized_keys file. (5 Replies)
Hi all,
I am trying to write a program in C which will generate private and public keys using openssl RSA and use these for encryption and decryption. I am able to generate the keys successfully and write these to files. I am able to read the private key successfully. I can encrypt and decrypt... (1 Reply)
Hello,
I'm trying to setup password less authentication to remote ssh server. I generated the public key and gave it to the vendor and The key is added in the remote machines authorized_keys file.
When I try to connect to a remote machine through SFTP username@host I am getting the error... (4 Replies)