NAME | API RESTRICTIONS | DESCRIPTION | ATTRIBUTES | SEE ALSO
The function or functions documented here may not be used safely in all application contexts with all APIs provided in the ChorusOS 5.0 product.
See API(5FEA) for details.
These routines are part of the RPC library that allows C language programs to make procedure calls on other machines across the network, with chosen authentication.
These routines are normally called after creating the CLIENT handle. The cl_auth field of the CLIENT structure should be initialized by the AUTH structure returned by some of the routines listed below. The client's authentication information is passed to the server when the RPC call is made.
Only the NULL and the SYS style of authentication are discussed here.
The NULL and SYS style of authentication are safe in multithreaded applications.
The following routines require that the header <rpc/rpc.h> be included (see rpc(3RPC) for the definition of the AUTH data structure).
#include <rpc/rpc.h> |
A function macro that destroys the authentication information associated with auth . Destruction usually involves deallocation of private data structures. The use of auth is undefined after calling auth_destroy() .
Creates and returns an RPC authentication handle that passes nonusable authentication information with each remote procedure call. This is the default authentication used by RPC.
Creates and returns an RPC authentication handle that contains AUTH_SYS authentication information. The host parameter is the name of the machine on which the information was created; uid is the user's user ID; gid is the user's current group ID; len and aup_gids refer to a counted array of groups to which the user belongs.
Calls authsys_create() with the appropriate parameters.
See attributes(5) for descriptions of the following attributes:
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
|---|---|
| MT-Level | MT-Safe |
NAME | API RESTRICTIONS | DESCRIPTION | ATTRIBUTES | SEE ALSO