intro.3krb

来自「<B>Digital的Unix操作系统VAX 4.2源码</B>」· 3KRB 代码 · 共 220 行

3KRB
220
字号
.TH intro 3krb.SH Nameintro \- introduction to the Kerberos subroutines.SH Syntax.nf.nj \fB#include <krb.h>\fP.PP \fB#include <des.h>\fP.PP \fBcc [ \fIoptions\fP ] \fIfiles\fP \-lkrb \-lknet\fP.br \fB \-ldes \-lacl [ \fIlibraries\fP ]\fP.fi.SH Description.NXR "Kerberos files" "intro.3krb"The Kerberos subroutinescan provide for the authentication of and protection against the unauthorized modification of every message sentacross a TCP/IP network from one application to another.  In addition,they provide a means to provide for the creation of access controllists (ACL) which an application can use with Kerberosauthentication,to determine if another application is authorized to perform aparticular action..PPThe .PN krb_svc_int(3krb)routines are designed to initialize the Kerberoslibraries so that the other Kerberos routines can functionproperly. The.PN krb_svc_initroutines are used to contact aKerberos server to obtain a ticket-granting ticket thatcan be used by the .PN kerberos(3krb) , .PN krb_sendmutual(3krb) ,and.PN krb_sendauth(3krb)routines.They also initialize pieces of Kerberos librarydata.  To use these routines, the libraries .PN libkrb.a ,.PN libknet.a ,and.PN libdes.amust be linked with your application in theorder listed..PPThe.PN kerberos(3krb)routines .PN krb_mk_reqand .PN krb_rd_reqare designedto provide for the initial authentication of an application toanother.  They are designed to be used with applications thatsupport "on-the-wire" protocols in which authentication informationcan be placed.  The .PN kerberos(3krb)routines.PN krb_mk_safeand.PN krb_rd_safeare designed to provide for the authentication of and protectionagainst the modification of every message sent between twoapplications after the initial authentication message.  Touse these routines, the libraries.PN libkrb.a ,.PN libknet.a ,and.PN libdes.amust be linked with your application in the order listed..PPThe .PN krb_sendmutual(3krb)routines are designed to provide for themutual authentication of two applications after the initialauthentication of one application, X to another, Y.  To providemutual authentication, Y's identity is proven by the .PN krb_sendmutualroutines to X.  To use these routines, the libraries.PN libkrb.a ,.PN libknet.a ,and.PN libdes.amust be linked with yourapplication in the order listed..PPThe .PN krb_sendauth(3krb)routines are designed to provide both theinitial authentication that .PN krb_mk_reqand.PN krb_rd_reqprovide, as well asthe mutual authentication of the .PN krb_sendmutualroutines.  The.PN krb_sendauthroutines are designed to be used with applicationsthat do not have room in the protocols they support forauthentication information.  To use these routines, thelibraries.PN libkrb.a ,.PN libknet.a ,and.PN libdes.amust be linked with yourapplication in the order listed..PPThe .PN krb_get_lrealm(3krb)routines are designed to provide informationto the user about the Kerberos environment.  To use theseroutines, the library.PN libkrb.amust be linked with your application..PPThe .PN des_crypt(3krb)routines are designed to provide support forthe above routines with	respect to Data Encryption Standard (DES)keys.  The .PN des_quad_cksumroutine can be used to providesupport for the authentication of and protection against themodification of every message sent between two applications afterthe initial authentication message.  It is designed to be usedonly with applications that have room in their "on-the-wire"protocol for authentication information.  To use theseroutines, the library.PN libdes.amust be linked with your application..PPThe .PN krb_set_tkt_string(3krb)routines are designed allow the userof the Kerberos libraries to modify some of the default settingsof the Kerberos libraries.  To use these routines, thelibrary.PN libkrb.amust be linked with your application..PPThe .PN acl_check(3krb)routines are designed to provide for thecreation and use of access control lists (ACL).  After an application, X, correctly authenticates the identity ofanother, Y, the application X has the ability to assign accessrights to Y, based on Y's identity.  The routines above provide forthe authentication of applications while the .PN acl_check(3krb)routinesprovide the ability to store the access rights associated witheach application.  To use these routines, thelibrary.PN libacl.amust be linked with your application..SH Files.TP.PN /usr/lib/libkrb.a.TP.PN /usr/lib/libknet.a.TP.PN /usr/lib/libdes.a.TP.PN /usr/lib/libacl.a.SH See AlsoAll the other Kerberos reference pages:.PPacl_check(3krb).brdes_crypt(3krb).brkerberos(3krb).brkrb_get_lrealm(3krb).brkrb_sendauth(3krb).brkrb_sendmutual(3krb).brkrb_set_tkt_string(3krb).brkrb_svc_init(3krb).brkrb.conf(5krb).brkrb_slaves(5krb).brkrb_dbase(5krb).brext_srvtab(8krb).brkdb_destroy(8krb).brkdb_edit(8krb).brkdb_init(8krb).brkdb_util(8krb).brkdestroy(8krb).brkerberos(8krb).brkinit(8krb).brklist(8krb).brkprop(8krb).brkpropd(8krb).brkstash(8krb)

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?