NAME | DESCRIPTION | SECURITY POLICY | DEFINITIONS | MT-Level of Libraries | FILES | SEE ALSO | DIAGNOSTICS | NOTES ON MULTITHREADED APPLICATIONS | REALTIME APPLICATIONS | NOTES |
This section describes functions found in various libraries in the Solaris and Trusted Solaris environment, other than those functions that directly invoke UNIX system primitives, which are described in Section 2.
Functions that are unique to and originate in the Trusted Solaris environment, such as labelinfo(3tsol). labelinfo() gets information about security labels from the label_encodings(4) file.
SunOS
5.8 functions and X windows functions that have been modified to work within the Trusted Solaris security policy, such as accept(3SOCKET). Man pages for modified functions have been rewritten to remove information that is not accurate for how the function behaves in the Trusted Solaris environment. Modified man pages, such as accept(),
also contain descriptions for any added features and arguments.
SunOS
5.8 functions that remain unchanged from the Solaris 8 release, such as connect(3SOCKET).
The printed Trusted Solaris 8 Reference Manual includes only those functions that have been modified or originate in the Trusted Solaris environment. This includes X Windows Library man pages, located in /usr/openwin/man/man3, and the dtappsession.1 man page, located in /usr/dt/man/man1. Printed versions of unchanged SunOS
5.8 man pages are found in the SunOS 5.8 Reference Manual.
Function declarations can be obtained from the #include files indicated on each page. Pages are grouped by library and are identified by the library name (or an abbreviation of the library name) after the section number. Collections of related libraries are grouped into five volumes as described below. A sixth volume (listed first) contains pages describing the contents of each shared library and each header used by the functions, macros, and external variables described in the remaining five volumes.
This volume describes the contents of each shared library and each header used by functions, macros, and external variables described in the remaining five volumes.
The libraries described in this section are implemented as shared objects.
Descriptions of shared objects may include a definition of the global symbols that define the shared objects' public interface, for example SUNW_1.1. Other interfaces may exist within the shared object, for example SUNW_private.1.1. The public interface provides a stable, committed set of symbols for application development. The private interfaces are for internal use only, and may change at any time.
For many shared objects, an archive library is provided for backward compatibility on 32-bit systems only. Use of these libraries may restrict an applications ability to migrate between different Solaris releases. As dynamic linking is the preferred compilation method on Solaris, the use of these libraries is discouraged.
The SunOS/BSD Compatibility libraries described in this section are implemented as a shared object. See (3LIB) above.
The headers described in this section are used by functions, macros, and external variables. Headers contain function prototypes, definitions of symbolic constants, common structures, preprocessor macros, and defined types. Each function described in the remaining five volumes specifies the headers that an application must include in order to use that function. In most cases only one header is required. These headers are present on an application development system; they do have to be present on the target execution system.
The functions described in this volume are the core C library functions that are basic to application development.
These functions, together with those of Section 2, constitute the standard C library, libc, which is automatically linked by the C compilation system. The standard C library is implemented as a shared object, libc.so, and as an archive, libc.a. C programs are linked with the shared object version of the standard C library by default. Specify -Bstatic or -dn on the cc command line to link with the archive version. See libc(3LIB), cc(1B) for other overrides, and the "C Compilation System" chapter of the ANSI C Programmer's Guide for a discussion. Some functions behave differently in standard-conforming environments. This behavior is noted on the individual manual pages. See standards(5).
Some functions in libc have been modified for the Trusted Solaris environment. Changes in behavior or requirements are noted on the individual man pages.
These functions constitute the dynamic linking library, libdl. This library is implemented as a shared object, libdl.so, but is not automatically linked by the C compilation system. Specify -ldl on the cc command line to link with this library. See libdl(3LIB).
These functions constitute the various memory allocation libraries: libmalloc, libbsdmalloc, libmapmalloc, and libmtmalloc. Each of these libraries is implemented as a shared object (libmalloc.so, libbsdmalloc.so, libmapmalloc.so, and libmtmalloc.so) and all except libmtmalloc are implemented as archives (libmalloc.a, libbsdmalloc.a, libmapmalloc.a). These libraries are not automatically linked by the C compilation system. Specify -lmalloc, -lbsdmalloc, -lmapmalloc, and -lmtmalloc to link with, respectively, libmalloc, libbsdmalloc, libmapmalloc, and libmtmalloc. See libmalloc(3LIB), libbsdmalloc(3LIB), libmapmalloc(3LIB), and libmtmalloc(3LIB).
These functions constitute the Source Compatibility (with BSD functions) library. It is implemented as a shared object, libucb.so, and as an archive, libucb.a, but is not automatically linked by the C compilation system. Specify -lucb on the cc command line to link with this library, which is located in the /usr/ucb subdirectory. Headers for this library are located within /usr/ucbinclude. See libucb(3LIB).
The functions described in this volume comprise the various networking libraries.
These functions constitute the Kerberos library libkrb. This library is implemented as a shared object, libkrb.so, and as an archive, libkrb.a, but is not automatically linked by the C compilation system. Specify -lkrb on the cc command line to link with this library. See libkrb(3LIB).
These functions constitute the Lightweight Directory Access Protocol library, libldap. This library is implemented as a shared object, libldap.so, but is not automatically linked by the C compilation system. Specify -lldap on the cc command line to link with this library. See ldap(3LDAP).
These functions constitute the Network Service Library, libnsl. The Trusted Solaris environment modifies some Network Service Library functions, and adds the Trusted Systems Interoperability Group (TSIG) TSIX [RE]1.1 library, libt6. See libt6(3NSL).
libnsl.so and libt6.so are implemented as shared objects, and libnsl.a is also specified as an archive. Neither library is automatically linked by the C compilation system. Specify -lnsl on the cc command line to link with the libnsl. Specify -lt6 on the cc command line to link with the libt6 library.
Many base networking functions are also available in the X/Open Networking Interfaces library, libxnet. See section (3XNET) below for more information on the libxnet interfaces.
These functions constitute the remote asynchronous calls library, librac. This library is implemented as a shared object, librac.so, and as an archive, librac.a, but is not automatically linked by the C compilation system. Specify -lrac on the cc command line to link with this library. See librac(3LIB).
These functions constitute the resolver library, libresolv. This library is implemented as a shared object, libresolv.so, and as an archive, libresolv.a, but is not automatically linked by the C compilation system. Specify -lresolv on the cc command line to link with this library. See libresolv(3LIB).
These functions constitute the remote procedure call libraries, librpcsvc and librpcsoc. The latter is provided for compatibility only; new applications should not link to it. Both libraries are implemented as shared objects, librpcsvc.so and librpcsoc.so, respectively, and librpcsvc is implemented as an archive, librpcsvc.a. librt(3LIB). Neither library is automatically linked by the C compilation system. Specify -lrpcsvc or -lrpcsoc on the cc command line to link with these libraries. See librpcsvc(3LIB) and librpcsoc(3LIB).
These functions constitute the Service Location Protocol library, libslp. This library is implemented as a shared object, libslp.so.1, but it is not automatically linked by the C compilation system. See libslp(3LIB)
These functions constitute the sockets library, libsocket. This library is implemented as a shared object, libsocket.so, and as an archive, libsocket.a, but is not automatically linked by the C compilation system. Specify -lsocket on the cc command line to link with this library. See libsocket(3LIB).
These functions constitute the X/Open Federated Naming library, libxfn. This library is implemented as a shared object, libxfn.so, but is not automatically linked by the C compilation system. Specify -lxfn on the cc command line to link with this library. See libxfn(3LIB), xfn(3XFN), fns(5), and standards(5).
These functions constitute X/Open networking interfaces which comply with the X/Open CAE Specification, Networking Services, Issue 4 (September, 1994). This library is implemented as a shared object, libxnet.so, but is not automatically linked by the C compilation system. Specify -lxnet on the cc command line to link with this library. See libxnet(3LIB) and standards(5) for compilation information.
Under all circumstances, the use of the Sockets API is recommended over the XTI and TLI APIs. If portability to other XPGV4v2 (see standards(5)) systems is a requirement, the application must use the libxnet interfaces. If portability is not required, the sockets interfaces in libsocket and libnsl are recommended over those in libxnet. Between the XTI and TLI APIs, the XTI interfaces (available with libxnet) are recommended over the TLI interfaces (available with libnsl).
The functions described in this volume comprise the libraries that provide graphics and character screen updating capabilities.
The functions constitute the following libraries:
These functions constitute the curses library, libcurses. This library is implemented as a shared object, libcurses.so, and as an archive, libcurses.a, but is not automatically linked by the C compilation system. Specify -lcurses on the cc command line to link with this library. See libcurses(3LIB).
These functions constitute the forms library, libform. This library is implemented as a shared object, libform.so, and as an archive, libforms.a, but is not automatically linked by the C compilation system. Specify -lform on the cc command line to link with this library. See libform(3LIB).
These functions constitute the menus library, libmenu. This library is implemented as a shared object, libmenu.so, and as an archive, libmenu.a, but is not automatically linked by the C compilation system. Specify -lmenu on the cc command line to link with this library. See libmenu(3LIB).
These functions constitute the panels library, libpanel. This library is implemented as a shared object, libpanel.so, and as an archive, libpanel.a, but is not automatically linked by the C compilation system. Specify -lpanel on the cc command line to link with this library. See libpanel(3LIB).
These functions constitute the grapnics library, libplot. This library is implemented as a shared object, libplot.so, and as an archive, libplot.a, but is not automatically linked by the C compilation system. Specify -lplot on the cc command line to link with this library. See libplot(3LIB).
These functions constitute the X/Open Curses library, located in /usr/xpg4/lib/libcurses.so.1. This library provides a set of internationalized functions and macros for creating and modifying input and output to a terminal screen. Included in this library are functions for creating windows, highlighting text, writing to the screen, reading from user input, and moving the cursor. X/Open Curses is designed to optimize screen update activities. The X/Open Curses library conforms fully with Issue 4 of the X/Open Extended Curses specification.
The functions described in this volume constitute the threads and realtime libraries.
These functions constitute the asynchronous I/O library, liaio. This library is implemented as a shared object, libaio.so, but is not automatically linked by the C compilation system. Specify -laio on the cc command line to link with this library. See libaio(3LIB).
These functions constitute the doors library, libdoor. This library is implemented as a shared object, libdoor.so, but is not automatically linked by the C compilation system. Specify -ldoor on the cc command line to link with this library.
The Trusted Solaris environment adds the function door_tcred() to ldoor and modifies the door_create() function. Changes in behavior or requirements are noted on the individual man pages.
These functions constitute the POSIX.4 Realtime library, librt. It is implemented as a shared object, librt.so, but is not automatically linked by the C compilation system. Specify -lrt on the cc command line to link with this library. Note that the former name for this library, libposix4, is maintained for backward compatibility but should be avoided. See librt(3LIB)
The clock_settime() function in librt has been modified for the Trusted Solaris environment. Changes in behavior or requirements are noted on the man page.
These functions constitute the LWP scheduling library, libsched. This library is implemented as a shared object, libsched.so, but is not automatically linked by the C compilation system. Specify -lsched on the cc command line to link with this library. .
These functions constitute the threads libraries, libpthread, libthread, and libthread_db. The libpthread and libthread libraries are used for building multithreaded applications: libpthread implements the POSIX (see standards(5)) threads interface, whereas libthread implements the Solaris threads interface. The libthread_db library is useful for building debuggers for multithreaded applications.
Both POSIX threads and Solaris threads can be used within the same application. Their implementations are completely compatible with each other; however, only POSIX threads guarantee portability to other POSIX-conforming environments.
When POSIX and Solaris threads are used in the same application, if there are calls with the same name but different semantics, the POSIX semantic supersedes the Solaris threads semantic. For example, the call to fork() will imply the fork1() semantic in a program linked with the POSIX threads library, whether or not it is also linked with -lthread (Solaris threads).
The libpthread, libthread, and libthread_db libraries are implemented as shared objects, libpthread.so, libthread_db.so, and libthread.so, respectively, but only libthread_db is implememted as an archive library, libthread_db.a. These libraries are not automatically linked by the C compilation system. Specify -lpthread, -lthread, or -lthread_db on the cc command line to link with these libraries. See libpthread(3LIB), libthread(3LIB), and libthread_db(3LIB).
The following functions are optional under POSIX and are not supported in the current Solaris release.
int pthread_mutexattr_setprotocol(pthread_mutexattr_t *attr, int protocol); int pthread_mutexattr_getprotocol(const pthread_mutexattr_t *attr, int *protocol); int pthread_mutexattr_setprioceiling(pthread_mutexattr_t *attr, int prioceiling); int pthread_mutexattr_getprioceiling(const pthread_mutexattr_t *attr, int *prioceiling);
The functions described in this volume comprise various specialized libraries that are not limited to the following:
These functions constitute the basic security library, libbsm. This library is implemented as a shared object, libbsm.so, and as an archive, libbsm.a, but is not automatically linked by the C compilation system. Specify -lbsm on the cc command line to link with this library. See libbsm(3LIB).
The Trusted Solaris environment adds some functions to libbsm and modifies others. Changes in behavior or requirements are noted on the individual man pages.
These functions constitute the configuration administration library, libcfgadm. This library is implemented as a shared object, libcfgadm.so, but is not automatically linked by the C compilation system. Specify -lcfgadm on the cc command line to link with this library. See libcfgadm(3LIB).
These functions constitute the CPU performance counter library, libcpc. This library is implemented as a shared object, libcpc.so, but is not automatically linked by the C compilation system. Specify -lcpc on the cc command line to link with this library. See libcpc(3LIB).
These functions constitute the device ID library, libdevid. This library is implemented as a shared object, libdevid.so, but is not automatically linked by the C compilation system. Specify -ldevid on the cc command line to link with this library. See libdevid(3LIB).
These functions constitute the device information library, libbsm. This library is implemented as a shared object, libdevinfo.so, and as an archive, libdevinfo.a, but is not automatically linked by the C compilation system. Specify -ldevinfo on the cc command line to link with this library. See libdevinfo(3LIB).
These functions constitute the DMI libraries, libdmi, libdmici, and libdmimi. These libraries are implemented as shared objects, libdmi.so, libdmici.so, and libdmimi.so, respectively, but are not automatically linked by the C compilation system. Specify -ldmi, -ldmici, or -ldmimi on the cc command line to link with these libraries. See libdmi(3LIB), libdmici(3LIB), and libdmimi(3LIB).
These functions constitute the ELF access library, libelf, (Extensible Linking Format). This library provides the interface for the creation and analyses of "elf" files; executables, objects, and shared objects. libelf is implemented as a shared object, libelf.so, and as an archive, libelf.a, but is not automatically linked by the C compilation system. Specify -lelf on the cc command line to link with this library. See libelf(3LIB).
These functions constitute the string pattern-matching and pathname manipulation library, libgen. This library is implemented as a shared object, libgen.so, and as an archive, libgen.a, but is not automatically linked by the C compilation system. Specify -lgen on the cc command line to link with this library. See libgen(3LIB).
These functions constitute the kernel statistics library, which is implemented as a shared object, libkstat.so, and as an archive, libkstat.a, but is not automatically linked by the C compilation system. Specify -lkstat on the cc command line to link with this library. See libkstat(3LIB).
The kstat_read() function in libkstat has been modified for the Trusted Solaris environment. Changes in behavior or requirements are noted on the man page.
These functions allow access to the kernel's virtual memory library, which is implemented as a shared object, libkvm.so, and as an archive, libkvm.a, but is not automatically linked by the C compilation system. Specify -lkvm on the cc command line to link with this library. See libkvm(3LIB).
The kstat_write() function in libkvm has been modified for the Trusted Solaris environment. Changes in behavior or requirements are noted on the man page.
These functions constitute the layout service library, which is implemented as a shared object, liblayout.so, but is not automatically linked by the C compilation system. Specify -llayout on the cc command line to link with this library. See liblayout(3LIB).
These functions constitute the mathematical library, libm. This library is implemented as a shared object, libm.so, and as an archive, libm.a, but is not automatically linked by the C compilation system. Specify -lm on the cc command line to link with this library.
These functions constitute the user mailbox management library, libmail. This library is implemented as a shared object, libmail.so, and as an archive, libmail.a, but is not automatically linked by the C compilation system. Specify -lmail on the cc command line to link with this library.
These functions constitute the integer mathematical library, libmp. This library is implemented as a shared object, libmp.so, and as an archive, libmp.a, but is not automatically linked by the C compilation system. Specify -lmp on the cc command line to link with this library. See libmp(3LIB).
These functions constitute the Pluggable Authentication Module (PAM) library, libpam. This library is implemented as a shared object, libpam.so, and as an archive, libpam.a, but is not automatically linked by the C compilation system. Specify -lpam on the cc command line to link with this library. See libpam(3LIB).
These functions constitute the process context library, libpctx. This library is implemented as a shared object, libpctx.so, but is not automatically linked by the C compilation system. Specify -lpctx on the cc command line to link with this library. See libpctx(3LIB).
These functions constitute the file access control library, libsec. This library is implemented as a shared object, libsec.so, and as an archive, libsec.a, but is not automatically linked by the C compilation system. Specify -lsec on the cc command line to link with this library. See libsec(3LIB).
These functions constitute the security attributes database library, libsecdb. This library is implemented as a shared object, libsecdb.so, but is not automatically linked by the C compilation system. Specify -lsecdb on the cc command line to link with this library. See libsecdb(3LIB).
The Trusted Solaris environment adds some functions to libsecdb and modifies others. Changes in behavior or requirements are noted on the individual man pages.
These functions constitute the SNMP libraries, libdssagent and libdssasnmp. These libraries are implemented as shared objects, libssagent.so and libssasnmp.so, respectively, but are not automatically linked by the C compilation system. Specify -lssagent or -lssasnmp on the cc command line to link with these libraries. See libssagent(3LIB) and libssasnmp(3LIB).
These functions constitute the TNF libraries, libtnf, libtnfctl, and libtnfprobe. These libraries are implemented as shared objects, libtnf.so, libtnfctl.so, and libtnfprobe.so, respectively, but are not automatically linked by the C compilation system. Specify -ltnf, -ltnfctl, or -ltnfprobe on the cc command line to link with these libraries. See libtnfctl(3TNF), libtnfctl(3LIB), and libtnfprobe(3LIB).
These functions constitute the volume management library, libvolmgt. This library is implemented as a shared object, libvolmgt.so, and as an archive, libvolmgt.a, but is not automatically linked by the C compilation system. Specify -lvolmgt on the cc command line to link with this library. See libvolmgt(3LIB).
These functions constitute the Trusted Solaris library libtsol. libtsol.so is implemented as a shared object but is not automatically linked by the C compilation system. To link with the libtsol library specify -ltsol on the cc command line.
The printed and AnswerBook2 versions of the Trusted Solaris 8 Reference Manualinclude these functions, which constitute the Trusted Solaris extension to the X windows library libXtsol. libXtsol.so is implemented as a shared object but is not automatically linked by the C compilation system. To link with the libXtsol library, specify -lX11 and then -lXtsol on the cc command line (cc -lX11 -lXtsol).
Online man pages for these functions are stored in /usr/openwin/man/man3.
System calls enforce policy for library routines, and you should generally look to the system call man page for the to find out how policy is enforced for the system call. However, policy is sometimes explained on the library routine man pages, according to the following guidelines:
If the relationship between the library routine and the underlying system call is intuitively obvious, as is the relationship between fopen(3UCB) and open(2), the related system call is mentioned in the SEE ALSO section, and the policy is not repeated on the library routine's man page.
If the relationship between the library routine and the underlying system call(s) is not obvious, the policy information appears on the library routine's man page.
If the system call man page has so much information that the developer may have trouble finding it, the relevant information is repeated on the library routine's man page. An example is t6peek_attr(3NSL), which relies on streamio(7I), whose man page is 21 pages.
If the library is the exposed interface, and if the system call is undocumented, the policy appears on the library man page. One example of this is in the TSIX library routines, some of which rely on undocumented system calls.
A character is any bit pattern able to fit into a byte on the machine. Exception: in some international languages, a "character" may require more than one byte, and is represented in multi-bytes.
The null character is a character with value 0, conventionally represented in the C language as \0. A character array is a sequence of characters. A null-terminated character array (a string) is a sequence of characters, the last of which is the null character. The null string is a character array containing only the terminating null character. A null pointer is the value that is obtained by casting 0 into a pointer. C guarantees that this value will not match that of any legitimate pointer, so many functions that return pointers return NULL to indicate an error. The macro NULL is defined in <stdio.h>. Types of the form size_t are defined in the appropriate headers.
See attributes(5) for descriptions of library MT-Levels.
usually /usr/include
usually /usr/ccs/lib
For assistance specific to Trusted Solaris libraries, see intro(2), specifically the DEFINITIONS section, and the Trusted Solaris Developer's Guide.
ar(1), cc(1B), ld(1), stdio(3C), attributes (5), standards(5)
Profiling Tools
ANSI C Programmer's Guide
For functions that return floating-point values, error handling varies according to compilation mode. Under the -Xt (default) option to cc, these functions return the conventional values 0, +-HUGE, or NaN when the function is undefined for the given arguments or when the value is not representable. In the -Xa and -Xc compilation modes, +-HUGE_VAL is returned in stead of +-HUGE. (HUGE_VAL and HUGE are defined in <math.h> to be infinity and the largest-magnitude single-precision number, respectively.)
When compiling a multithreaded application, either the _POSIX_C_SOURCE, _POSIX_PTHREAD_SEMANTICS, or _REENTRANT flag must be defined on the command line. This enables special definitions for functions only applicable to multithreaded applications. For POSIX.1c-conforming applications, define the _POSIX_C_SOURCE flag to be >= 199506L:
cc [flags] file... -D_POSIX_C_SOURCE=199506L -lpthread
For POSIX behavior with the Solaris fork() and fork1() distinction, compile as follows:
cc [flags] file... -D_POSIX_PTHREAD_SEMANTICS -lthread
For Solaris threads behavior, compile as follows:
cc [flags] file... -D_REENTRANT -lthread
When building a singlethreaded application, the above flags should be undefined. This generates a binary that is executable on previous Solaris releases which do not support multithreading.
Unsafe interfaces should be called only from the main thread to ensure the application's safety.
MT-Safe interfaces are denoted in the ATTRIBUTES section of the functions and libraries manual pages [see attributes(5). If a manual page does not state explicitly that an interface is MT-Safe, the user should assume that the interface is unsafe.
Be sure to have set the environment variable LD_BIND_NOW to a non-null value to enable early binding. Refer to the "When Relocations are Processed" chapter inLinker and Libraries Guide for additional information.
None of the functions, external variables, or macros should be redefined in the user's programs. Any other name may be redefined without affecting the behavior of other library functions, but such redefinition may conflict with a declaration in an included header.
The headers in INCDIR provide function prototypes (function declarations including the types of arguments) for most of the functions listed in this manual. Function prototypes allow the compiler to check for correct usage of these functions in the user's program. The lint program checker may also be used and will report discrepancies even if the headers are not included with #include statements. Definitions for Sections 2, 3C, and 3S are checked automatically. Other definitions can be included by using the -l option to lint. (For example, -lm includes definitions for libm.) Use of lint is highly recommended. See the lint chapter in Performance Profiling Tools.
Users should carefully note the difference between STREAMS and stream. STREAMS is a set of kernel mechanisms that support the development of network services and data communication drivers. It is composed of utility routines, kernel facilities, and a set of data structures. A stream is a file with its associated buffering. It is declared to be a pointer to a type FILE defined in <stdio.h>.
In detailed definitions of components, it is sometimes necessary to refer to symbolic names that are implementation-specific, but which are not necessarily expected to be accessible to an application program. Many of these symbolic names describe boundary conditions and system limits.
In this section, for readability, these implementation-specific values are given symbolic names. These names always appear enclosed in curly brackets to distinguish them from symbolic names of other implementation-specific constants that are accessible to application programs by headers. These names are not necessarily accessible to an application program through a header, although they may be defined in the documentation for a particular system.
In general, a portable application program should not refer to these symbolic names in its code. For example, an application program would not be expected to test the length of an argument list given to a routine to determine if it was greater than ARG_MAX.
Description
Test if a window is created by a trusted client
Make this window a Trusted Path window
Shut down the system
Get all CMW attributes associated with a client
Get all CMW attributes associated with a property hanging on a window
Get the CMW label associated with a property hanging on a window
Get the UID associated with a property hanging on a window
Get all CMW attributes associated with a window or a pixmap
Get the CMW label associated with a window, a pixmap, or a colormap
Get the UID associated with a window, a pixmap
Get the height of screen stripe
Get the ownership of the workstation
Set polyinstantiation information
Set the CMW label associated with a property hanging on a window
Set the UID associated with a property hanging on a window
Set the CMW label associated with a window or a pixmap
Set the UID associated with a window, a pixmap, or a colormap
Set the height of screen stripe
Set the session high sensitivity label to the window server
Set the session low sensitivity label to the window server
Set the ownership of the workstation
Accept a connection on a socket
Adorn the final component of a pathname
Preselect an audit event
Get user's binary preselection mask
Construct and write user-level audit records
Translate and verify user authorizations
Obtain and display error messages
See btohex(3TSOL)
See btohex(3TSOL)
See bltos(3TSOL)
See blvalid(3TSOL)
Translate binary CMW labels to character-coded labels for a printer banner page
See btohex(3TSOL)
See btohex(3TSOL)
See blportion(3TSOL)
See bltos(3TSOL)
See blportion(3TSOL)
Conjoin binary information labels
See blcompare(3TSOL)
See blcompare(3TSOL)
See btohex(3TSOL)
See btohex(3TSOL)
See blportion(3TSOL)
See bltos(3TSOL)
See blvalid(3TSOL)
See blcompare(3TSOL)
See blcompare(3TSOL)
Bind a name to a socket
Compare binary labels
See blcompare(3TSOL)
See blcompare(3TSOL)
See blcompare(3TSOL)
Check binary label for inclusion in set
Create manifest binary labels
See blminmax(3TSOL)
See blminmax(3TSOL)
Bound of two binary levels
Access binary label portions
See blcompare(3TSOL)
Get character-coded color name of label
See bltocolor(3TSOL)
Translate binary labels to character coded labels
Compare and set the type of binary label
Check validity of binary label
See btohex(3TSOL)
See btohex(3TSOL)
See bltos(3TSOL)
See blvalid(3TSOL)
Convert binary label to hexadecimal
Verify user authorizations
High-resolution clock operations
Create a door descriptor
Return the extended credential information associated with the client of the current door invocation
See getacinfo(3BSM)
See getauevent(3BSM)
See getutent(3C)
See getutxent(3C)
Walk a file tree
See getacinfo(3BSM)
See getacinfo(3BSM)
Get audit control file information
See getacinfo(3BSM)
See getacinfo(3BSM)
get audit_class entry
Convert audit flag specifications
Get audit_event entry
See getauevent(3BSM)
See getauevent(3BSM)
See getauevent(3BSM)
See getauevent(3BSM)
See getauevent(3BSM)
See getauevent(3BSM)
get authorization entry
Get audit_user entry
See blportion(3TSOL)
See blportion(3TSOL)
Generates the process audit state
Get peer's process characteristics
Get user profile description
Get user profile description
Get and set options on sockets
Get user security attributes
Access utmp file entry
See getutent(3C)
See getutent(3C)
See getutxent(3C)
See getutxent(3C)
User accounting database functions
See getutxent(3C)
See getutxent(3C)
Get vfstab_adjunct file entry
grant access to the slave pseudo-terminal device
See btohex(3TSOL)
See btohex(3TSOL)
Convert hexadecimal string to binary label
See hextob(3TSOL)
See hextob(3TSOL)
See hextob(3TSOL)
See hextob(3TSOL)
Initialize the supplementary group access list
Read or write kstat data
Create a Motif-based user interface for interactively building a valid label or clearance
Translate a binary label and clip to the specified width
Get information about the label encodings
Get version of the label_encodings file
TSIX trusted IPC library
Listen for connections on a socket
Get pathname of current working directory
See mldstat(3TSOL)
Return the canonicalized absolute pathname, including any MLD adornments and SLD names
Get file status in multilevel directory
Lock or unlock pages in memory
Lock or unlock address space
See mlock(3C)
See mlockall(3C)
See ftw(3C)
See nis_names(3NSL)
See nis_tables(3NSL)
See nis_groups(3NSL)
See nis_ping(3NSL)
See nis_groups(3NSL)
See nis_groups(3NSL)
See nis_tables(3NSL)
See nis_names(3NSL)
See nis_server(3NSL)
See nis_server(3NSL)
See nis_server(3NSL)
NIS+ group manipulation functions
See nis_groups(3NSL)
See nis_tables(3NSL)
See nis_names(3NSL)
See nis_server(3NSL)
See nis_names(3NSL)
See nis_tables(3NSL)
NIS+ namespace functions
See nis_tables(3NSL)
Misc NIS+ log administration functions
See nis_groups(3NSL)
See nis_names(3NSL)
See nis_tables(3NSL)
See nis_groups(3NSL)
See nis_server(3NSL)
Miscellaneous NIS+ functions
See nis_server(3NSL)
See nis_server(3NSL)
NIS+ table functions
See nis_groups(3NSL)
Lock or unlock into memory process, text, or data
Convert a numeric privilege to its name or a privilege name to its number
See getutent(3C)
See getutxent(3C)
Generate random pronounceable password
Resolver routines
Library routines for remote procedure calls
Library routines for client side calls
Library routines for dealing with creation and manipulation of CLIENT handles
Library routines for RPC servers
Library routines for the creation of server handles
Library routines for registering servers
See rpcbind(3NSL)
See rpcbind(3NSL)
See rpcbind(3NSL)
See rpcbind(3NSL)
See rpcbind(3NSL)
See rpcbind(3NSL)
See rpcbind(3NSL)
Library routines for RPC bind service
See sbltos(3TSOL)
See sbltos(3TSOL)
See sbltos(3TSOL)
Translate binary labels to canonical character-coded labels
See sbltos(3TSOL)
Send a message from a socket
See send(3SOCKET)
See send(3SOCKET)
Assign a privilege set for the current process
See getacinfo(3BSM)
See getauevent(3BSM)
See bltype(3TSOL)
See blportion(3TSOL)
See blportion(3TSOL)
See getutent(3C)
See getutxent(3C)
See stobl(3TSOL)
See stobl(3TSOL)
See stobl(3TSOL)
Translate character-coded labels to binary labels
See stobl(3TSOL)
Allocate and free security-attribute control structure and buffer
Get mask indicating which attributes came from templates
Clear security attributes
Compare security attributes
Copy security attributes
Duplicate security attributes
Manipulate network-endpoint security options
Get security attributes from or set security attributes in the security-attribute buffer handled by a control structure
Get and set endpoint mask, or get and set endpoint default attributes
See t6ext_attr(3NSL)
Examine the security attributes on the next or the previous byte of data
Read security attributes and data from a trusted endpoint
Specify security attributes to send with data on a trusted endpoint
See t6get_attr(3NSL)
Get the size of a particular attribute from the control structure
Accept a connection request
Bind an address to a transport endpoint
Manage options for a transport endpoint
Send data or expedited data over a connection
Send a data unit
See getutxent(3C)
See getutxent(3C)
See getutent(3C)
See getutxent(3C)
NAME | DESCRIPTION | SECURITY POLICY | DEFINITIONS | MT-Level of Libraries | FILES | SEE ALSO | DIAGNOSTICS | NOTES ON MULTITHREADED APPLICATIONS | REALTIME APPLICATIONS | NOTES |