Skip to Main Content
DCE Replacement Strategies
book

DCE Replacement Strategies

by Heinz Johner, Jakob Erber, Stephen Hawkins, Klaus Mueller, Pallavi Nagesha Rao, Donna Skibbie
June 2003
Intermediate to advanced content levelIntermediate to advanced
454 pages
10h 19m
English
IBM Redbooks
Content preview from DCE Replacement Strategies
Appendix A. Scenario 1: Source code listings 281
newsockfd,
&security_context,
cred_handle);
fprintf(stdout, "Accepted connection from host %d.%d.%d.%d\n",
((unsigned char *)&cli_addr.sin_addr.s_addr)[0],
((unsigned char *)&cli_addr.sin_addr.s_addr)[1],
((unsigned char *)&cli_addr.sin_addr.s_addr)[2],
((unsigned char *)&cli_addr.sin_addr.s_addr)[3]);
/* call str_s1 to exchange protected application data with client */
str_s1(newsockfd, service_level, security_context);
exit(0);
}
close(newsockfd);
}
} /* end main */
Authorization module with DCE dependencies
Description: Authorization module with DCE dependencies
File name: dce_authz.c
#include <stdio.h>
#include <string.h>
#include <dce/gssapi.h>
#include <dce/aclbase.h>
#include <dce/uu ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Reinventing the Organization for GenAI and LLMs

Reinventing the Organization for GenAI and LLMs

Ethan Mollick

Publisher Resources

ISBN: 0738453080Purchase book