Museum

Home

Lab Overview

Retrotechnology Articles

⇒ Tru64 DCE_3.1

Media Vault

Software Library

Restoration Projects

Artifacts Sought

Anchors

Section 1dce

Section 1rpc

Section 3dce

Section 3dts

Section 3rpc

Section 3sec

Section 3xds

Section 3xom

Section 4dfs

Section 4xds

Section 4xom

Section 5dce

Section 5sec

Section 8cds

Section 8dce

Section 8dceadd

Section 8dfs

Section 8dts

Section 8rpc

Section 8sdce

Section 8sec

Manual — Tru64 DCE_3.1

1012 entries

Section 1dce

sams
svcdumplog

Section 1rpc

idl
rpc_intro
uuidgen

Section 3dce

DCE_SVC_DEBUG
DCE_SVC_DEBUG_ATLEAST
DCE_SVC_DEBUG_IS
DCE_SVC_DEFINE_HANDLE
DCE_SVC_INTRO
DCE_SVC_LOG
dce_assert
dce_attr_intro
dce_attr_sch_bind
dce_attr_sch_bind_free
dce_attr_sch_create_entry
dce_attr_sch_cursor_alloc
dce_attr_sch_cursor_init
dce_attr_sch_cursor_release
dce_attr_sch_cursor_reset
dce_attr_sch_delete_entry
dce_attr_sch_get_acl_mgrs
dce_attr_sch_lookup_by_id
dce_attr_sch_lookup_by_name
dce_attr_sch_scan
dce_attr_sch_update_entry
dce_cf_binding_entry_from_host
dce_cf_dced_entry_from_host
dce_cf_find_name_by_key
dce_cf_free_cell_aliases
dce_cf_get_cell_aliases
dce_cf_get_cell_name
dce_cf_get_csrgy_filename
dce_cf_get_host_name
dce_cf_intro
dce_cf_prin_name_from_host
dce_cf_profile_entry_from_host
dce_cf_same_cell_name
dce_db_close
dce_db_delete
dce_db_delete_by_name
dce_db_delete_by_uuid
dce_db_fetch
dce_db_fetch_by_name
dce_db_fetch_by_uuid
dce_db_free
dce_db_header_fetch
dce_db_inq_count
dce_db_intro
dce_db_iter_done
dce_db_iter_next
dce_db_iter_next_by_name
dce_db_iter_next_by_uuid
dce_db_iter_start
dce_db_lock
dce_db_open
dce_db_std_header_init
dce_db_store
dce_db_store_by_name
dce_db_store_by_uuid
dce_db_unlock
dce_error_inq_text
dce_intro
dce_msg_cat_close
dce_msg_cat_get_msg
dce_msg_cat_open
dce_msg_define_msg_table
dce_msg_get
dce_msg_get_cat_msg
dce_msg_get_default_msg
dce_msg_get_msg
dce_msg_intro
dce_msg_translate_table
dce_pgm_printf
dce_printf
dce_server_disable_service
dce_server_enable_service
dce_server_inq_attr
dce_server_inq_server
dce_server_inq_uuids
dce_server_intro
dce_server_register
dce_server_sec_begin
dce_server_sec_done
dce_server_unregister
dce_server_use_protseq
dce_svc_components
dce_svc_debug_routing
dce_svc_debug_set_levels
dce_svc_define_filter
dce_svc_filter
dce_svc_intro
dce_svc_log_close
dce_svc_log_get
dce_svc_log_open
dce_svc_log_rewind
dce_svc_printf
dce_svc_register
dce_svc_routing
dce_svc_set_progname
dce_svc_table
dce_svc_unregister
dced_binding_create
dced_binding_free
dced_binding_from_rpc_binding
dced_binding_set_auth_info
dced_entry_add
dced_entry_get_next
dced_entry_remove
dced_hostdata_create
dced_hostdata_delete
dced_hostdata_read
dced_hostdata_write
dced_initialize_cursor
dced_inq_id
dced_inq_name
dced_intro
dced_keytab_add_key
dced_keytab_change_key
dced_keytab_create
dced_keytab_delete
dced_keytab_get_next_key
dced_keytab_initialize_cursor
dced_keytab_release_cursor
dced_keytab_remove_key
dced_list_get
dced_list_release
dced_object_read
dced_object_read_all
dced_objects_release
dced_release_cursor
dced_secval_start
dced_secval_status
dced_secval_stop
dced_secval_validate
dced_server_create
dced_server_delete
dced_server_disable_if
dced_server_enable_if
dced_server_modify_attributes
dced_server_start
dced_server_stop

Section 3dts

dts_intro
utc_abstime
utc_addtime
utc_anytime
utc_anyzone
utc_ascanytime
utc_ascgmtime
utc_asclocaltime
utc_ascreltime
utc_binreltime
utc_bintime
utc_boundtime
utc_cmpintervaltime
utc_cmpmidtime
utc_gettime
utc_getusertime
utc_gmtime
utc_gmtzone
utc_localtime
utc_localzone
utc_mkanytime
utc_mkascreltime
utc_mkasctime
utc_mkbinreltime
utc_mkbintime
utc_mkgmtime
utc_mklocaltime
utc_mkreltime
utc_mulftime
utc_multime
utc_pointtime
utc_reltime
utc_spantime
utc_subtime

Section 3rpc

cs_byte_from_netcsConverts international character data from a network code set to a local code set prior to unmarshalling; used by client and server applications
cs_byte_local_sizeCalculates the necessary buffer size for code set conversion from a network code set to a local code set prior to unmarshalling; used by client and server stubs but not directly by applications
cs_byte_net_sizeCalculates the necessary buffer size for code set conversion from a local code set to a network code set prior to marshalling;  used by client and server stubs but not directly by applications
cs_byte_to_netcsConverts international character data from a local code set to a network code set prior to marshalling; used by client and server applications
dce_cs_loc_to_rgyMaps a local name for a code set to a code set value in the code set registry; used by client and server applications
dce_cs_rgy_to_locMaps a code set value in the code set registry to the local name for a code set;  used by client and server applications
idl_es_decode_bufferReturns a buffer decoding handle to the IDL encoding services
idl_es_decode_incrementalReturns an incremental decoding handle to the IDL encoding services; used by client and server applications
idl_es_encode_dyn_bufferReturns a dynamic buffer encoding handle to the IDL encoding services; used by client and server applications
idl_es_encode_fixed_bufferReturns a fixed buffer encoding handle to the IDL encoding services
idl_es_encode_incrementalReturns an incremental encoding handle to the IDL encoding services; used by client and server applications
idl_es_handle_freeFrees an IDL encoding services handle
idl_es_inq_encoding_idIdentifies an operation within an interface that has been called to encode data using the IDL encoding services
rpc_binding_copyReturns a copy of a binding handle; used by client or server applications
rpc_binding_freeReleases binding handle resources;  used by client or server applications
rpc_binding_from_string_bindingReturns a binding handle from a string representation;  used by client or management applications
rpc_binding_inq_auth_callerReturns authentication and authorization information from the binding handle for an authenticated client;  used by server applications
rpc_binding_inq_auth_clientReturns authentication and authorization information from the binding handle for an authenticated client;  used by server applications
rpc_binding_inq_auth_infoReturns authentication and authorization information from a server binding handle;  used by client applications
rpc_binding_inq_objectReturns the object UUID from a binding handle;  used by client or server applications
rpc_binding_resetResets a server binding handle;  used by client or management applications
rpc_binding_server_from_clientConverts a client binding handle to a server binding handle;  used by server applications
rpc_binding_set_auth_infoSets authentication and authorization information for a server binding handle;  used by client applications
rpc_binding_set_objectSets the object UUID value into a server binding handle;  used by client applications
rpc_binding_to_string_bindingReturns a string representation of a binding handle;  used by client, server, or management applications
rpc_binding_vector_freeFrees the memory used to store a vector and binding handles;  used by client or server applications
rpc_cs_binding_set_tagsPlaces code set tags into a server binding handle;  used by client applications
rpc_cs_char_set_compat_checkEvaluates character set compatibility between a client and a server;  used by client applications
rpc_cs_eval_with_universalEvaluates a server’s supported character sets and code sets during the server binding selection process;  used indirectly by client applications
rpc_cs_eval_without_universalEvaluates a server’s supported character sets and code sets during the server binding selection process;  used indirectly by client applications
rpc_cs_get_tagsRetrieves code set tags from a binding handle;  used by client and server applications
rpc_ep_registerAdds to, or replaces, server address information in the local endpoint map;  used by server applications
rpc_ep_register_no_replaceAdds to server address information in the local endpoint map;  used by server applications
rpc_ep_resolve_bindingResolves a partially bound server binding handle into a fully bound server binding handle;  used by client and management applications
rpc_ep_unregisterRemoves server address information from the local endpoint map;  used by server applications
rpc_if_id_vector_freeFrees a vector and the interface identifier structures it contains;  used by client, server, or management applications
rpc_if_inq_idReturns the interface identifier for an interface specification;  used by client or server applications
rpc_introIntroduction to the DCE RPC API runtime
rpc_mgmt_ep_elt_inq_beginCreates an inquiry context for viewing the elements in an endpoint map;  used by management applications
rpc_mgmt_ep_elt_inq_doneDeletes the inquiry context for viewing the elements in an endpoint map;  used by management applications
rpc_mgmt_ep_elt_inq_nextReturns one element from an endpoint map;  used by management applications
rpc_mgmt_ep_unregisterRemoves server address information from an endpoint map;  used by management applications
rpc_mgmt_inq_com_timeoutReturns the communications timeout value in a binding handle;  used by client applications
rpc_mgmt_inq_dflt_protect_levelReturns the default protection level for an authentication service;  used by client and server applications
rpc_mgmt_inq_if_idsReturns a vector of interface identifiers of interfaces a server offers;  used by client, server, or management applications
rpc_mgmt_inq_server_princ_nameReturns a server’s principal name;  used by client, server, or management applications
rpc_mgmt_inq_statsReturns RPC runtime statistics;  used by client, server, or management applications
rpc_mgmt_is_server_listeningTells whether a server is listening for remote procedure calls;  used by client, server, or management applications
rpc_mgmt_set_authorization_fnEstablishes an authorization function for processing remote calls to a server’s management routines;  used by server applications
rpc_mgmt_set_cancel_timeoutSets the lower bound on the time to wait before timing out after forwarding a cancel;  used by client applications
rpc_mgmt_set_com_timeoutSets the communications timeout value in a binding handle;  used by client applications
rpc_mgmt_set_server_stack_sizeSpecifies the stack size for each server thread;  used by server applications
rpc_mgmt_stats_vector_freeFrees a statistics vector;  used by client, server, or management applications
rpc_mgmt_stop_server_listeningTells a server to stop listening for remote procedure calls;  used by client, server, or management applications
rpc_network_inq_protseqsReturns all protocol sequences supported by both the RPC runtime and the operating system;  used by client and server applications
rpc_network_is_protseq_validTells whether the specified protocol sequence is supported by both the RPC runtime and the operating system;  used by client and server applications
rpc_ns_binding_exportEstablishes a name service database entry with binding handles or object UUIDs for a server;  used by server applications
rpc_ns_binding_import_beginCreates an import context for an interface and an object in the name service database;  used by client applications
rpc_ns_binding_import_doneDeletes the import context for searching the name service database;  used by client applications
rpc_ns_binding_import_nextReturns a binding handle of a compatible server (if found) from the name service database;  used by client applications
rpc_ns_binding_inq_entry_nameReturns the name of an entry in the name service database from which the server binding handle came;  used by client applications
rpc_ns_binding_lookup_beginCreates a lookup context for an interface and an object in the name service database;  used by client applications
rpc_ns_binding_lookup_doneDeletes the lookup context for searching the name service database;  used by client applications
rpc_ns_binding_lookup_nextReturns a list of binding handles of one or more compatible servers (if found) from the name service database;  used by client applications
rpc_ns_binding_selectReturns a binding handle from a list of compatible server binding handles;  used by client applications
rpc_ns_binding_unexportRemoves the binding handles for an interface, or object UUIDs, from  an entry in the name service database;  used by server applications
rpc_ns_entry_expand_nameExpands the name of a name service entry;  used by client, server, or management applications
rpc_ns_entry_inq_resolutionResolves the cell namespace components of a name and returns partial results. 
rpc_ns_entry_object_inq_beginCreates an inquiry context for viewing the objects of an entry in the name service database;  used by client, server, or management applications
rpc_ns_entry_object_inq_doneDeletes the inquiry context for viewing the objects of an entry in the name service database;  used by client, server, or management applications
rpc_ns_entry_object_inq_nextReturns one object at a time from an entry in the name service database;  used by client, server, or management applications
rpc_ns_group_deleteDeletes a group attribute;  used by client, server, or management applications
rpc_ns_group_mbr_addAdds an entry name to a group; if necessary, creates the entry;  used by client, server, or management applications
rpc_ns_group_mbr_inq_beginCreates an inquiry context for viewing group members;  used by client, server, or management applications
rpc_ns_group_mbr_inq_doneDeletes the inquiry context for a group;  used by client, server, or management applications
rpc_ns_group_mbr_inq_nextReturns one member name at a time from a group;  used by client, server, or management applications
rpc_ns_group_mbr_removeRemoves an entry name from a group;  used by client, server, or management applications
rpc_ns_import_ctx_add_evalAdds an evaluation routine to an import context;  used by client applications
rpc_ns_mgmt_binding_unexportRemoves multiple binding handles, or object UUIDs, from an entry in the name service database;  used by management applications
rpc_ns_mgmt_entry_createCreates an entry in the name service database;  used by management applications
rpc_ns_mgmt_entry_deleteDeletes an entry from the name service database;  used by management applications
rpc_ns_mgmt_entry_inq_if_idsReturns the list of interfaces exported to an entry in the name service database;  used by client, server, or management applications
rpc_ns_mgmt_free_codesetsFrees a code sets array that has been allocated by the RPC runtime;  used by client and server applications
rpc_ns_mgmt_handle_set_exp_ageSets a handle’s expiration age for local copies of name service data;  used by client, server, or management applications
rpc_ns_mgmt_inq_exp_ageReturns the application’s global expiration age for local copies of name service data;  used by client, server, or management applications
rpc_ns_mgmt_read_codesetsReads the code sets attribute associated with an RPC server entry in the name service database;  used by client applications
rpc_ns_mgmt_remove_attributeRemoves an attribute from an RPC server entry in the name service database;  used mainly by server applications; can also be used by management applications
rpc_ns_mgmt_set_attributeAdds an attribute to an RPC server entry in the name service database;  used mainly by server applications; can also be used by management applications
rpc_ns_mgmt_set_exp_ageModifies the application’s global expiration age for local copies of name service data;  used by client, server, or management applications
rpc_ns_profile_deleteDeletes a profile attribute;  used by client, server, or management applications
rpc_ns_profile_elt_addAdds an element to a profile; if necessary, creates the entry;  used by client, server, or management applications
rpc_ns_profile_elt_inq_beginCreates an inquiry context for viewing the elements in a profile;  used by client, server, or management applications
rpc_ns_profile_elt_inq_doneDeletes the inquiry context for a profile;  used by client, server, or management applications
rpc_ns_profile_elt_inq_nextReturns one element at a time from a profile;  used by client, server, or management applications
rpc_ns_profile_elt_removeRemoves an element from a profile;  used by client, server, or management applications
rpc_object_inq_typeReturns the type of an object;  used by server applications
rpc_object_set_inq_fnRegisters an object inquiry function;  used by server applications
rpc_object_set_typeRegisters the type of an object with the RPC runtime;  used by server applications
rpc_protseq_vector_freeFrees the memory used by a vector and its protocol sequences;  used by client or server applications
rpc_rgy_get_codesetsGets supported code sets information from the local host;  used by client and server applications
rpc_rgy_get_max_bytesGets the maximum number of bytes that a code set uses to encode one character from the code set registry on a host;  used by client and server applications
rpc_server_inq_bindingsReturns binding handles for communications with a server;  used by server applications
rpc_server_inq_ifReturns the manager entry point vector registered for an interface;  used by server applications
rpc_server_listenTells the RPC runtime to listen for remote procedure calls;  used by server applications
rpc_server_register_auth_identRegisters user-to-user based authentication information with the RPC runtime;  used by server applications
rpc_server_register_auth_infoRegisters server-key based authentication information with the RPC runtime;  used by server applications
rpc_server_register_ifRegisters an interface with the RPC runtime;  used by server applications
rpc_server_unregister_ifRemoves an interface from the RPC runtime;  used by server applications
rpc_server_use_all_protseqsTells the RPC runtime to use all supported protocol sequences for receiving remote procedure calls;  used by server applications
rpc_server_use_all_protseqs_ifTells the RPC runtime to use all the protocol sequences and endpoints specified in the interface specification for receiving remote procedure calls;  used by server applications
rpc_server_use_protseqTells the RPC runtime to use the specified protocol sequence for receiving remote procedure calls;  used by server applications
rpc_server_use_protseq_epTells the RPC runtime to use the specified protocol sequence combined with the specified endpoint for receiving remote procedure calls;  used by server applications
rpc_server_use_protseq_ifTells the RPC runtime to use the specified protocol sequence combined with the endpoints in the interface specification for receiving remote procedure calls;  used by server applications
rpc_sm_allocateAllocates memory within the RPC stub memory management scheme. 
rpc_sm_client_freeFrees memory returned from a client stub
rpc_sm_destroy_client_contextReclaims the client memory resources for a context handle, and sets the context handle to null
rpc_sm_disable_allocateReleases resources and allocated memory within the stub memory management scheme
rpc_sm_enable_allocateEnables the stub memory managment environment
rpc_sm_freeFrees memory allocated by the rpc_sm_allocate() routine
rpc_sm_get_thread_handleGets a thread handle for the stub memory management environment
rpc_sm_set_client_alloc_freeSets the memory allocation and freeing mechanisms used by the client stubs
rpc_sm_set_thread_handleSets a thread handle for the stub memory management environment
rpc_sm_swap_client_alloc_freeExchanges the current memory  allocation and freeing mechanism used by the client stubs with one supplied by the client
rpc_ss_allocateAllocates memory within the RPC stub memory management scheme;  used by server or possibly by client applications
rpc_ss_bind_authn_clientAuthenticates a client’s identity to a server from a client stub;  a pointer to the server binding handle for the remote procedure call to which the routine will add authentication and authorization context
rpc_ss_client_freeFrees memory returned from a client stub;  used by client applications
rpc_ss_destroy_client_contextReclaims the client memory resources for the context handle, and sets the context handle to NULL;  used by client applications
rpc_ss_disable_allocateReleases resources and allocated memory;  used by client applications
rpc_ss_enable_allocateEnables the allocation of memory by the rpc_ss_allocate() routine when not in manager code;  used by client applications
rpc_ss_freeFrees memory allocated by the rpc_ss_allocate() routine;  used by server or possibly by client applications
rpc_ss_get_thread_handleGets a thread handle for the manager code before it spawns additional threads, or for the client code when it becomes a server;  used by server or possibly by client applications
rpc_ss_set_client_alloc_freeSets the memory allocation and freeing mechanism used by the client stubs, thereby overriding the default routines the client stub uses to manage memory for pointed-to nodes;  used by client applications
rpc_ss_set_thread_handleSets the thread handle for either a newly created spawned thread or for a server that was formerly a client and is ready to be a client again;  used by server or possibly by client applications
rpc_ss_swap_client_alloc_freeExchanges the current memory allocation and freeing mechanism used by the client stubs with one supplied by the client;  used by client applications
rpc_string_binding_composeCombines the components of a string binding into a string binding;  used by client or server applications
rpc_string_binding_parseReturns, as separate strings, the components of a string binding;  used by client or server applications
rpc_string_freeFrees a character string allocated by the runtime;  used by client, server, or management applications
rpc_tower_to_bindingReturns a binding handle from a tower representation
rpc_tower_vector_freeReleases memory associated with a tower vector
rpc_tower_vector_from_bindingCreates a tower vector from a binding handle
uuid_compareCompares two UUIDs and determines their order;  used by client, server, or management applications
uuid_createCreates a new UUID;  used by client, server, or management applications
uuid_create_nilCreates a nil UUID;  used by client, server, or management applications
uuid_equalDetermines if two UUIDs are equal;  used by client, server, or management applications
uuid_from_stringConverts a string UUID to its binary representation;  used by client, server, or management applications
uuid_hashCreates a hash value for a UUID;  used by client, server, or management applications
uuid_is_nilDetermines if a UUID is nil;  used by client, server, or management applications
uuid_to_stringConverts a UUID from a binary representation to a string representation;  used by client, server, or management applications
wchar_t_from_netcsConverts international character data from a network code set to a local code set prior to unmarshalling;  used by client and server applications
wchar_t_local_sizeCalculates the necessary buffer size for code set conversion from a network code set to a local code set prior to unmarshalling;  used by client and server stubs, but not directly by applications
wchar_t_net_sizeCalculates the necessary buffer size for code set conversion from a local code set to a network code set prior to marshalling;  used by client and server stubs but not directly by applications
wchar_t_to_netcsConverts international character data from a local code set to a network code set prior to marshalling;  used by client and server applications

Section 3sec

audit_introIntroduction to the DCE audit API runtime
cert_introIntroduction to trust list facilities API[ pkc_intro ]
cert_intro_cryptoIntroduction to the signature algorithm API registration facility[ crypto_intro ]
cert_intro_policyIntroduction to the policy module registration and service facility[ policy_intro ]
cert_intro_trustlistIntroduction to the certificate manipulation facility[ pkc_trustlist_intro ]
dce_acl_copy_aclCopies an ACL
dce_acl_inq_acl_from_headerRetrieves the UUID of an ACL from an item’s header in a backing store
dce_acl_inq_client_credsReturns the client’s credentials
dce_acl_inq_client_permsetReturns the client’s permissions corresponding to an ACL
dce_acl_inq_permset_for_credsDetermines a principal’s complete extent of access to an object
dce_acl_inq_prin_and_groupInquires the principal and group of an RPC caller[ dce_acl_inq_prin_and_group.3sec ]
dce_acl_is_client_authorizedChecks whether a client’s credentials are authenticated
dce_acl_obj_add_any_other_entryAdds permissions for any_other ACL entry to a given ACL
dce_acl_obj_add_foreign_entryAdds permissions for an ACL entry for a foreign user or group to the given ACL
dce_acl_obj_add_group_entryAdds permissions for a group ACL entry to the given ACL
dce_acl_obj_add_id_entryAdds permissions for an ACL entry to the given ACL
dce_acl_obj_add_obj_entryAdds permissions for an object (obj) ACL entry to the given ACL
dce_acl_obj_add_unauth_entryAdds permissions for unauthenticated ACL entry to the given ACL
dce_acl_obj_add_user_entryAdds permissions for a user ACL entry to the given ACL
dce_acl_obj_free_entriesFrees space used by an ACL’s entries
dce_acl_obj_initInitializes an ACL
dce_acl_register_object_typeRegisters an ACL manager’s object type
dce_acl_resolve_by_nameFinds an ACL’s UUID, given an object’s name
dce_acl_resolve_by_uuidFinds an ACL’s UUID, given an object’s UUID
dce_aud_closeCloses an audit trail file. Used by client/server applications and audit trail analysis and examination tools. 
dce_aud_commitWrites the audit record in the audit trail file.  Used by client/server applications. 
dce_aud_discardDiscards an audit record (releases the memory).  Used by client/server applications and trail analysis and examination tools. 
dce_aud_free_ev_infoFrees the memory allocated for an event information stucture returned from calling dce_aud_get_ev_info().  Used by the audit trail analysis and examination tools. 
dce_aud_free_headerFrees the memory allocated to a designated audit record header structure.  Used by the audit trail analysis and examination tools
dce_aud_get_ev_infoReturns a pointer to an event information stucture (dce_aud_ev_info_t).  Used by the audit trail analysis and examination tools
dce_aud_get_headerGets the header of a specified audit record.  Used by the audit trail analysis and examination tools. 
dce_aud_lengthGets the length of a specified audit record.  Used by client/server applications and trail analysis and examination tools
dce_aud_nextReads the next audit record from a specified audit trail file into a buffer.  Used by the trail analysis and examination tools. 
dce_aud_openOpens a specified audit trail file for read or write.  Used by client/server applications and trail analysis and examination tools. 
dce_aud_prevReads the previous audit record from a specified audit trail file into a buffer.  Used by the trail analysis and examination tools. 
dce_aud_printFormats an audit record into human-readable form.  Used by audit trail examination and analysis tools. 
dce_aud_put_ev_infoAdds event-specific information to a specified audit record buffer.  Used by client/server applications. 
dce_aud_resetResets the cursors and the file pointers of the specified audit trail file.  Used by the trail analysis and examination tools. 
dce_aud_rewindRewinds the specified audit trail file.  Used by the trail analysis and examination tools. 
dce_aud_set_trail_size_limitSets a limit to the audit trail size. Used by client/server applications. 
dce_aud_startDetermines whether a specified event should be audited given the client binding information and the event outcome.  Used by client/server applications
dce_aud_start_with_nameDetermines whether a specified event should be audited given the client/server name and the event outcome.  Used by non-RPC based client/server applications that do not use the DCE authorization model
dce_aud_start_with_pacDetermines whether a specified event must be audited given the client’s privilege attribute certificate (PAC) and the event outcome.  Used by non-RPC based client/server applications that use the DCE authorization model
dce_aud_start_with_server_bindingDetermines whether a specified event must be audited given the server binding information and the event outcome.  Used by client/server applications
dce_aud_start_with_uuidDetermines whether a specified event should be audited given the client/server UUID and the event outcome.  Used by client/server applications which already know the UUIDs of their clients and wish to avoid the overhead of the audit library acquiring them
gss_accept_sec_contextEstablishes a security context between the application and a context acceptor
gss_acquire_credAllows an application to acquire a handle for an existing named credential
gss_compare_nameAllows an application to compare two internal names to determine whether they are equivalent
gss_context_timeChecks the number of seconds for which the context will remain valid
gss_delete_sec_contextDeletes a security context
gss_display_nameProvides to an application the textual representation of an opaque internal name
gss_display_statusProvides an application with the textual representation of a GSSAPI status code that can be displayed to a user or used for logging
gss_import_nameConverts a printable name to an internal form
gss_indicate_mechsAllows an application to determine which underlying security mechanisms are available
gss_init_sec_contextEstablishes a security context between the context initiator and a context acceptor
gss_inquire_credProvides the calling application information about a credential
gss_process_context_tokenPasses a context to the security service
gss_release_bufferFrees storage associated with a buffer
gss_release_credMarks a credential for deletion
gss_release_nameFrees storage associated with an internal name that was allocated by a GSSAPI routine. 
gss_release_oid_setFrees storage associated with a gss_OID_set object
gss_sealCryptographically signs and optionally encrypts a message
gss_signGenerates a cryptographic signature for a message
gss_unsealConverts a sealed message into a usable form and verifies the embedded signature
gss_verifyChecks that the cryptographic signature fits the supplied message
gssapi_introGeneric security service application programming interface
gssdce_add_oid_set_memberAdds an OID to an OID set
gssdce_create_empty_oid_setCreates a new, empty OID set to which members can be added by calling gssdce_add_oid_set_member()
gssdce_cred_to_login_contextObtains the DCE login context associated with a GSSAPI credential
gssdce_extract_creds_from_sec_contextExtracts a DCE credential from a GSSAPI security context
gssdce_login_context_to_credCreates a GSSAPI credential handle for a context initiator or context acceptor from a DCE login context
gssdce_register_acceptor_identityRegisters a context acceptor’s identity
gssdce_set_cred_context_ownershipChanges the ownership of a DCE credential’s login context
gssdce_test_oid_set_memberChecks an OID set to see if a specified OID is in the set
pkc_add_trusted_keyAdds a key to specified trust list
pkc_append_to_trustlistAppends one or more items to trust list
pkc_ca_key_usage.classA class that expresses key usage
pkc_check_cert_against_trustlistChecks specified certificate against specified list of trusted keys
pkc_constraints.classA class that expresses constraints on names
pkc_copy_trustlistCopies a trustlist
pkc_crypto_generate_keypairGenerates a pair of public and private keys
pkc_crypto_get_registered_algorithmsReturns algorithm implementations
pkc_crypto_lookup_algorithmReturns cryptographic module details
pkc_crypto_register_signature_algRegisters a signature algorithm module
pkc_crypto_signSigns data with private key
pkc_crypto_verify_signatureVerifies a signature
pkc_delete_trustlistDeletes a trust list
pkc_display_trustlistDisplays information about a trust list
pkc_freeFrees storage allocated by certification routines
pkc_free_keyinfoFrees key information storage
pkc_free_trustbaseFrees a trust base’s storage
pkc_free_trustlistFrees a trust list’s storage
pkc_generic_key_usage.classA class that expresses generic key usage
pkc_get_key_certifier_countReturns number of key’s certifying authorities
pkc_get_key_certifier_infoReturns information about a certifier
pkc_get_key_countReturns number of keys for a principal
pkc_get_key_dataReturns a public key
pkc_get_key_trust_infoReturns information about key trust
pkc_get_registered_policiesReturns all registered trust policies
pkc_init_trustbaseInitializes a trust base
pkc_init_trustlistCreates an empty trust list
pkc_key_policies.classA class that expresses policy rules and operations
pkc_key_policy.classKey policy class
pkc_key_usage.classA class that expresses key usage rules
pkc_lookup_element_in_trustlistRetrieves a specified key
pkc_lookup_key_in_trustlistSearches a trust list for the specified key
pkc_lookup_keys_in_trustlistSearches trust list for keys
pkc_name_subord_constraint.classConstraint rules and operations class
pkc_name_subord_constraints.classA class that expresses subordinate constraints on a name
pkc_name_subtree_constraint.classA class that expresses a subtree constraint on a name
pkc_name_subtree_constraints.classA class that expresses a set of subtree constraints on a name
pkc_pending_revocation.classClass of certificates awaiting revocation
pkc_plcy_delete_keyinfoFrees public key storage
pkc_plcy_delete_trustbaseFrees trust base storage
pkc_plcy_establish_trustbaseEstablishes a trust base
pkc_plcy_get_key_certifier_countReturns number of a key’s certifying authorities
pkc_plcy_get_key_certifier_infoReturns information about a key’s certifier
pkc_plcy_get_key_countReturns number of keys for a principal
pkc_plcy_get_key_dataReturns a public key
pkc_plcy_get_key_trustReturns information about trust in a key
pkc_plcy_get_registered_policiesReturns OID set describing registered policies
pkc_plcy_lookup_policyReturns a policy module descriptor block
pkc_plcy_register_policyRegisters a policy module
pkc_plcy_retrieve_keyinfoRetrieves keys for specified principal
pkc_prune_trustlistRemoves expired keys from trust list
pkc_retrieve_keyinfoReturns information about a key
pkc_retrieve_keylistRetrieves all keys for a principal
pkc_revocation.classA class that expresses certificate revocation operations
pkc_revocation_list.classRevoked certificates list class
pkc_revoke_certificateRevokes key and dependents from specified trust list
pkc_revoke_certificatesRevokes a key and all dependent keys
pkc_trust_list.classA class that expresses certificate trust list operations
pkc_trust_list_element.classPublic key class
pkc_trusted_key.classTrusted public key class
priv_attr_trig_query
rdacl_get_accessReads a privilege attribute certificate
rdacl_get_manager_typesLists the types of ACLs protecting an object
rdacl_get_mgr_types_semanticsLists the ACL manager types protecting an object and the POSIX semantics supported by each manager type
rdacl_get_printstringReturns printable ACL strings
rdacl_get_referralGets a referral to an ACL update site
rdacl_lookupReturns the ACL for an object
rdacl_replaceReplaces an ACL
rdacl_test_accessTests access to an object
rdacl_test_access_on_behalfTests access to an object on behalf of another process
rsec_pwd_mgmt_gen_pwdGenerates a set of passwords
rsec_pwd_mgmt_str_chkStrength-checks a password
sec_acl_bindReturns a handle for an object’s ACL
sec_acl_bind_authReturns an opaque handle to an object’s ACL
sec_acl_bind_to_addrReturns a handle to an object identified by its network address
sec_acl_calc_maskReturns the sec_acl_type_mask_obj entry for the specified ACL list
sec_acl_get_accessLists the access (permission set) that the caller has for an object
sec_acl_get_error_infoReturns error information from an ACL handle
sec_acl_get_manager_typesLists the manager types of the ACLs protecting an object
sec_acl_get_mgr_types_semanticsLists the manager types of the ACLs protecting an object
sec_acl_get_printstringReturns printable ACL strings
sec_acl_lookupReturns the ACL for an object
sec_acl_releaseReleases ACL storage
sec_acl_release_handleRemoves an ACL handle
sec_acl_replaceReplaces an ACL
sec_acl_test_accessTests access to an object
sec_acl_test_access_on_behalfTests access to an object on behalf of another process
sec_attr_trig_queryReads attributes coded with an attribute trigger type of query
sec_attr_trig_updateFor attributes coded with an attribute trigger type of update, passes attribute updates to an update attribute trigger server for evaluation
sec_attr_util_alloc_copyAllocates the necessary subfields of the destination sec_attr_t and copies the corresponding data from the source sec_attr_t
sec_attr_util_freeFrees nonnull pointers in a sec_attr_t with an input deallocate routine
sec_attr_util_inst_freeFrees nonnull pointers in a sec_attr_t and the pointer to the sec_attr_t itself
sec_attr_util_inst_free_ptrsFrees nonnull pointers in a sec_attr_t
sec_attr_util_sch_ent_freeFrees nonnull pointers in a sec_attr_schema_entry_t and the pointer to the sec_attr_schema_entry_t itself
sec_attr_util_sch_ent_free_ptrsFrees nonnull pointers in a sec_attr_schema_entry_t
sec_cred_free_attr_cursorFrees the local resources allocated to a sec_attr_cursor_t
sec_cred_free_cursorReleases local resources allocated to a sec_cred_cursor_t
sec_cred_free_pa_handleFrees the local resources allocated to a privilege attribute handle of type sec_cred_pa_handle_t
sec_cred_get_authz_session_infoReturns session-specific information that represents an authenticated client’s credentials
sec_cred_get_client_princ_nameReturns the principal name associated with a credential handle
sec_cred_get_deleg_restrictionsReturns delegate restrictions from a privilege attribute handle
sec_cred_get_delegateReturns a handle to the privilege attributes of an intermediary in a delegation chain
sec_cred_get_delegation_typeReturns the delegation type from a privilege attribute handle
sec_cred_get_extended_attrsReturns extended attributes from a privilege handle
sec_cred_get_initiatorReturns the privilege attributes of the initiator of a delegation chain
sec_cred_get_opt_restrictionsReturns optional restrictions from a privilege handle
sec_cred_get_pa_dataReturns identity information from a privilege attribute handle
sec_cred_get_req_restrictionsReturns required restrictions from a privilege attribute handle
sec_cred_get_tgt_restrictionsReturns target restrictions from a privilege attribute handle
sec_cred_get_v1_pacReturns pre-1.1 PAC from a privilege attribute handle
sec_cred_initialize_attr_cursorInitializes a sec_attr_cursor_t
sec_cred_initialize_cursorInitializes a sec_cred_cursor_t
sec_cred_is_authenticatedReturns TRUE if the supplied credentials are authenticated, and FALSE if they are not
sec_id_gen_groupGenerates a global name from cell and group UUIDs
sec_id_gen_nameGenerates a global name from cell and principal UUIDs
sec_id_parse_groupTranslates a global name into group and cell names and UUIDs
sec_id_parse_nameTranslates a global name into principal and cell names and UUIDs
sec_introApplication program interface to the DCE Security Service
sec_key_mgmt_change_keyChanges a principal’s key
sec_key_mgmt_delete_keyDeletes a key from the local storage
sec_key_mgmt_delete_key_typeDeletes a key version of a key type from the local key storage
sec_key_mgmt_free_keyFrees the memory used by a key value
sec_key_mgmt_garbage_collectDeletes obsolete keys
sec_key_mgmt_gen_rand_keyGenerates a new random key of a specified key type
sec_key_mgmt_get_keyRetrieves a key from local storage
sec_key_mgmt_get_next_keyRetrieves successive keys from the local key storage
sec_key_mgmt_get_next_kvnoRetrieves the next eligible key version number for a key
sec_key_mgmt_initialize_cursorRepositions the cursor in the local key store
sec_key_mgmt_manage_keyAutomatically changes a principal’s key before it expires
sec_key_mgmt_release_cursorReleases the memory used by an initialized cursor value
sec_key_mgmt_set_keyInserts a key value into the local storage
sec_login_become_delegateCauses an intermediate server to become a delegate in traced delegation chain
sec_login_become_impersonatorUsed by a server to create a login context and assoicated handle that impersonates the identity of a caller
sec_login_become_initiatorConstructs a new login context that enables delegation for the calling client
sec_login_certify_identityCertifies the network authentication service
sec_login_cred_get_delegateReturns a handle to the privilege attributes of an intermediary in a delegation chain.  Used by clients. 
sec_login_cred_get_initiatorReturns information about the delegation initiator in a specified login context
sec_login_cred_init_cursorInitializes a sec_cred_cursor_t
sec_login_disable_delegationDisables delegation for a specified login context
sec_login_export_contextCreates an exportable login context
sec_login_free_net_infoFrees storage allocated for a principal’s network information
sec_login_get_current_contextReturns a handle to the current login context
sec_login_get_expirationReturns the TGT lifetime for an authenticated identity
sec_login_get_groupsReturns the group set from a login context
sec_login_get_pwentReturns a passwd-style entry for a login context
sec_login_import_contextImports a login context
sec_login_init_firstInitializes the default context
sec_login_inquire_net_infoReturns a principal’s network information
sec_login_newgroupsChanges the group list for a login context
sec_login_purge_contextDestroys a login context and frees its storage
sec_login_refresh_identityRefreshes an authenticated identity for a login context
sec_login_release_contextFrees storage allocated for a login context
sec_login_set_contextCreates network credentials for a login context
sec_login_set_extended_attrsConstructs a new login context that contains extended registry attributes
sec_login_setup_firstSets up the default network context
sec_login_setup_identitySets up the user’s network identity
sec_login_valid_and_cert_identValidates and certifies a login context
sec_login_valid_from_keytableValidates a login context’s identity using input from a specified keytable file
sec_login_validate_firstValidates the initial login context
sec_login_validate_identityValidates a login context’s identity
sec_pk_data_freeFrees memory allocated to a sec_pk_data_t and its aliases.  This routine is not available in the DCE binary code.  It is provided in DCE source for use by vendors. 
sec_pk_data_zero_and_freeFrees and zeros out memory allocated to a sec_pk_data_t or its aliases.  This routine is not available in the DCE binary code.  It is provided in DCE source for use by vendors. 
sec_psm_closeClose a personal security mechanism. This routine is not available in the DCE binary code.  It is provided in DCE source for use by vendors. 
sec_psm_decrypt_dataDecrypt data that was encrypted with a public key mechanism. This routine is not available in the DCE binary code.  It is provided in DCE source for use by vendors. 
sec_psm_encrypt_dataEncrypt data using a public key mechanism. This routine is not available in the DCE binary code.  It is provided in DCE source for use by vendors. 
sec_psm_gen_pub_keyRandomly generate a public key pair. This routine is not available in the DCE binary code.  It is provided in DCE source for use by vendors. 
sec_psm_openOpen a personal security mechanism. This routine is not available in the DCE binary code.  It is provided in DCE source for use by vendors. 
sec_psm_put_pub_keyStore a public key pair . This routine is not available in the DCE binary code.  It is provided in DCE source for use by vendors. 
sec_psm_sign_dataCompute the signature of data using a specified signature algorithm . This routine is not available in the DCE binary code.  It is provided in DCE source for use by vendors. 
sec_psm_update_pub_keyUpdate a public key in a personal security mechanism. . This routine is not available in the DCE binary code.  It is provided in DCE source for use by vendors. 
sec_psm_verify_dataVerify signed data. This routine is not available in the DCE binary code.  It is provided in DCE source for use by vendors. 
sec_pwd_mgmt_free_handleFrees storage allocated for a password management handle
sec_pwd_mgmt_gen_pwdGenerates a set of passwords
sec_pwd_mgmt_get_val_typeGets users password validation type
sec_pwd_mgmt_setupSets up the user’s password policy information
sec_rgy_acct_addAdds an account for a login name
sec_rgy_acct_admin_replaceReplaces administrative account data
sec_rgy_acct_deleteDeletes an account
sec_rgy_acct_get_projlistReturns the projects in an account’s project list
sec_rgy_acct_lookupReturns data for a specified account
sec_rgy_acct_passwdChanges the password for an account
sec_rgy_acct_renameChanges an account login name
sec_rgy_acct_replace_allReplaces all account data for an account
sec_rgy_acct_user_replaceReplaces user account data
sec_rgy_attr_cursor_allocAllocates resources to a cursor used by sec_rgy_attr_lookup_by_id
sec_rgy_attr_cursor_initInitializes a cursor used by sec_rgy_attr_lookup_by_id
sec_rgy_attr_cursor_releaseReleases a cursor
sec_rgy_attr_cursor_resetReinitializes a cursor
sec_rgy_attr_deleteDeletes specified attributes for a specified object
sec_rgy_attr_get_effectiveReads effective attributes by ID
sec_rgy_attr_lookup_by_idReads a specified object’s attributes, expanding attribute sets into individual member attributes
sec_rgy_attr_lookup_by_nameReads a single attribute instance for a specific object
sec_rgy_attr_lookup_no_expandReads a specified object’s attribute(s), without expanding attribute sets into individual member attributes
sec_rgy_attr_sch_aclmgr_stringsReturns printable ACL strings associated with an ACL manager protecting a schema object
sec_rgy_attr_sch_create_entryCreates a schema entry
sec_rgy_attr_sch_cursor_allocAllocates resources to a cursor used with sec_rgy_attr_sch_scan
sec_rgy_attr_sch_cursor_initInitializes and allocates a cursor used with sec_rgy_attr_sch_scan
sec_rgy_attr_sch_cursor_releaseReleases states associated with a cursor used by sec_rgy_attr_sch_scan
sec_rgy_attr_sch_cursor_resetResets a cursor that has been allocated
sec_rgy_attr_sch_delete_entryDeletes a schema entry
sec_rgy_attr_sch_get_acl_mgrsRetrieves the manager types of the ACLs protecting the objects dominated by a named schema
sec_rgy_attr_sch_lookup_by_idReads a schema entry identified by UUID
sec_rgy_attr_sch_lookup_by_nameReads a schema entry identified by name
sec_rgy_attr_sch_scanReads a specified number of schema entries
sec_rgy_attr_sch_update_entryUpdates a schema entry
sec_rgy_attr_test_and_updateUpdates specified attribute instances for a specified object only if a set of control attribute instances match the object’s existing attribute instances
sec_rgy_attr_updateCreates and updates attribute instances for a specified object
sec_rgy_auth_plcy_get_effectiveReturns the effective authentication policy for an account
sec_rgy_auth_plcy_get_infoReturns the authentication policy for an account
sec_rgy_auth_plcy_set_infoSets the authentication policy for an account
sec_rgy_cell_bindBinds to a registry in a cell
sec_rgy_cursor_resetResets the registry database cursor
sec_rgy_login_get_effectiveReturns the effective login data for an account
sec_rgy_login_get_infoReturns login information for an account
sec_rgy_pgo_addAdds a PGO item to the registry database
sec_rgy_pgo_add_memberAdds a principal to a group or organization
sec_rgy_pgo_deleteDeletes a PGO item from the registry database
sec_rgy_pgo_delete_memberRemoves a member from a group or organization
sec_rgy_pgo_get_by_eff_unix_numReturns the name and data for a PGO item identified by its effective UNIX number
sec_rgy_pgo_get_by_idReturns the name and data for a PGO item identified by its UUID
sec_rgy_pgo_get_by_nameReturns the data for a named PGO item
sec_rgy_pgo_get_by_unix_numReturns the name and data for a PGO item identified by its UNIX ID
sec_rgy_pgo_get_membersReturns the membership list for a specified group or organization or returns the set of groups in which the specified principal is a member
sec_rgy_pgo_get_nextReturns the next PGO item in the registry database
sec_rgy_pgo_id_to_nameReturns the name for a PGO item identified by its UUID
sec_rgy_pgo_id_to_unix_numReturns the UNIX number for a PGO item identified by its UUID
sec_rgy_pgo_is_memberChecks group or organization membership
sec_rgy_pgo_name_to_idReturns the UUID for a named PGO item
sec_rgy_pgo_name_to_unix_numReturns the UNIX number for a PGO item identified by its name
sec_rgy_pgo_renameChanges the name of a PGO item in the registry database
sec_rgy_pgo_replaceReplaces the data in an existing PGO item
sec_rgy_pgo_unix_num_to_idReturns the UUID for a PGO item identified by its UNIX number
sec_rgy_pgo_unix_num_to_nameReturns the name for a PGO item identified by its UNIX number
sec_rgy_plcy_get_effectiveReturns the effective policy for an organization
sec_rgy_plcy_get_infoReturns the policy for an organization
sec_rgy_plcy_set_infoSets the policy for an organization
sec_rgy_properties_get_infoReturns registry properties
sec_rgy_properties_set_infoSets registry properties
sec_rgy_site_bindBinds to a registry site
sec_rgy_site_bind_queryBinds to a registry query site
sec_rgy_site_bind_updateBinds to a registry update site
sec_rgy_site_binding_get_infoReturns information from the registry binding handle
sec_rgy_site_closeFrees the binding handle for a registry server
sec_rgy_site_getReturns the string representation for a bound registry site
sec_rgy_site_is_readonlyChecks whether a registry site is read-only
sec_rgy_site_openBinds to a registry site
sec_rgy_site_open_queryBinds to a registry query site
sec_rgy_site_open_updateBinds to a registry update site
sec_rgy_unix_getgrgidReturns a UNIX style group entry for the account matching the specified group ID
sec_rgy_unix_getgrnamReturns a UNIX style group entry for the account matching the specified group name
sec_rgy_unix_getpwnamReturns a UNIX style passwd entry for account matching the specified name
sec_rgy_unix_getpwuidReturns a UNIX style passwd entry for the account matching the specified UID
sec_rgy_wait_until_consistentBlocks the caller while prior updates are propagated to the registry replicas

Section 3xds

decode_alt_addr
dsX_extract_attr_values
ds_add_entry
ds_bind
ds_compare
ds_initialize
ds_list
ds_modify_entry
ds_modify_rdn
ds_read
ds_remove_entry
ds_search
ds_shutdown
ds_unbind
ds_version
encode_alt_addr
gds_decode_alt_addr
gds_encode_alt_addr
xds_intro

Section 3xom

omX_extract
omX_fill
omX_fill_oid
omX_object_to_string
omX_string_to_object
om_copy
om_copy_value
om_create
om_delete
om_get
om_instance
om_put
om_read
om_remove
om_write
xom_intro

Section 4dfs

BosConfigDefines server processes to be monitored by the Basic OverSeer (BOS) Server
BosLogContains messages generated by the Basic OverSeer (BOS) Server
CacheInfoDefines the initial configuration of the Cache Manager
CacheItemsRecords information about each V file in a disk cache
DfsgwLogContains messages generated by the Gateway Server process of the DFS/NFS Secure Gateway
FilesetItemsRecords location mappings for filesets accessed by a Cache Manager using a disk cache
FlLogContains messages generated by the Fileset Location Server
FtLogContains messages generated by the Fileset Server
NoAuthIndicates that DFS authorization checking is disabled
UpLogContains messages generated by the server portion of the Update Server
VnContains a chunk of data cached in a disk cache
admin.bosContains the administrative list for the Basic OverSeer (BOS) Server
admin.flContains the administrative list for the Fileset Location (FL) Server
admin.ftContains the administrative list for the Fileset Server
admin.upContains the administrative list for the Update Server
dfs_introIntroduction to DFS files
dfstabSpecifies DCE LFS aggregates and non-LFS partitions that can be exported

Section 4xds

xds.h
xds_intro
xdsbdcp.h
xdscds.h
xdsdme.h
xdsgds.h
xdsmdup.h
xdssap.h
xmhp.h
xmsga.h

Section 4xom

xom.h

Section 5dce

svcroute

Section 5sec

aud_audit_events
dts_audit_events
event_class
group_override
passwd_override
sec_audit_events
sec_intro
v5srvtab

Section 8cds

add_directory
add_object
cds_intro
cdsadv
cdsbrowser
cdsclerk
cdscp
cdsd
clear_cached_server
clear_clearinghouse
create_child
create_clearinghouse
create_directory
create_link
create_object
create_replica
define_cached_server
delete_child
delete_clearinghouse
delete_directory
delete_link
delete_object
delete_replica
disable_clerk
disable_server
dump_clerk_cache
gdad
list_child
list_clearinghouse
list_directory
list_link
list_object
remove_directory
remove_link
remove_object
set_cdscp_confidence
set_cdscp_preferred_clearinghouse
set_directory
set_directory_epoch
set_directory_skulk
set_link
set_object
show_cached_clearinghouse
show_cached_server
show_cdscp_confidence
show_cdscp_preferred_clearinghouse
show_cell
show_child
show_clearinghouse
show_clerk
show_directory
show_link
show_object
show_replica
show_server

Section 8dce

accountA dcecp object that manages an account in the DCE Security Service
aclA dcecp object that manages DCE access control lists
attrlistA dcecp object that manipulates attribute lists
audA dcecp object that manages the audit daemon on a DCE host
audeventsA dcecp object that lists audit events on a DCE host
audfilterA dcecp object that manages the event filters on a DCE host
audtrailA dcecp object that converts the audit trail into a readable format
cdsA dcecp object that represents a Cell Directory Service server
cdsaliasA dcecp object that lets you manipulate cell names in CDS
cdscache
cdsclientA dcecp object that represents a Cell Directory Service client
cellA dcecp task object that operates on a DCE cell
cellaliasA dcecp task object that manages cell name aliases
clearinghouseA dcecp object that manages a clearinghouse in CDS
clockA dcecp object that manages the clock on a local or remote host
csrcBuilds a DCE character and code set registry on a host
dce_configInstalls, configures, and starts up DCE
dce_introIntroduction to the cross-component DCE administration tools
dcecpAdministrative interface for DCE management tasks
dcedthe DCE host daemon
dcesetupConfigures and starts up DCE
directoryA dcecp object that manages a name service directory
dtsA dcecp object that manages a dtsd process
endpointA dcecp object that manages endpoint information in local RPC endpoint maps
getcellnameGets the primary name of the cell
getipGets a host’s IP address
groupA dcecp object that manages a group in the DCE Security Service
hostA dcecp task object that manages host information in a DCE cell
hostdataA dcecp object that manages a DCE host’s cell affiliation information
keytabA dcecp object that manages server passwords on DCE hosts
ldap_addcell
linkA dcecp object that manages a soft link in CDS
logA dcecp object that manages serviceability routing and debug routing
nameA dcecp object that compares and expands DCE names
objectA dcecp object that manages an object in the DCE Cell Directory Service (CDS)
organizationA dcecp object that manages an organization in the DCE Security Service
principalA dcecp object that manages a principal in the DCE Security Service
registryA dcecp object that manages a registry in the DCE Security Service
rpcentryA  dcecp object that manages an RPC entry in the DCE Cell Directory Service
rpcgroupA dcecp object that manages an RPC group entry in CDS
secvalA dcecp object that manages the security validation service on a host
serverA dcecp object that manages DCE application servers
userA dcecp task object that manipulates user information in a DCE cell
utcA dcecp object that manipulates UTC timestamps
uuidA dcecp object that generates and compares UUIDs
xattrschemaA dcecp object that manages schema information for ERAs

Section 8dceadd

rpcprofileA dcecp object that manages an RPC profile entry in CDS

Section 8dfs

bosIntroduction to the bos command suite
bos_addadminAdds a user, group, or server to an administrative list[ bos addadmin ]
bos_addkeyConverts a string into a server encryption key and adds it to a keytab file[ bos addkey ]
bos_aproposShows each help entry containing a specified string[ bos apropos ]
bos_createCreates a new process in the BosConfig file and starts it[ bos create ]
bos_deleteDeletes server processes from the BosConfig file[ bos delete ]
bos_gckeysRemoves obsolete server encryption keys from a keytab file[ bos gckeys ]
bos_genkeyGenerates a random key and adds it to a keytab file[ bos genkey ]
bos_getdatesLists time stamps on versions of binary files[ bos getdates ]
bos_getlogExamines the log file for a server process[ bos getlog ]
bos_getrestartLists automatic restart times for server processes[ bos getrestart ]
bos_helpShows syntax of specified bos commands or lists functional descriptions of all bos commands[ bos help ]
bos_installInstalls new versions of binary files[ bos install ]
bos_lsadminLists the users, groups, and servers from an administrative list[ bos lsadmin ]
bos_lscellLists the cell in which the BOS Server is running[ bos lscell ]
bos_lskeysDisplays server encryption key information from a keytab file[ bos lskeys ]
bos_pruneRemoves old binary and core files from dcelocal/bin and dcelocal/var/dfs/adm[ bos prune ]
bos_restartRestarts processes on a server machine[ bos restart ]
bos_rmadminRemoves a user, group, or server from an administrative list[ bos rmadmin ]
bos_rmkeyRemoves server encryption keys from a keytab file[ bos rmkey ]
bos_setauthEnables or disables DFS authorization checking for all DFS server processes on a machine[ bos setauth ]
bos_setrestartSets the date and time at which the BOS Server restarts all processes or only those with new binaries[ bos setrestart ]
bos_shutdownStops processes without changing their status flags in the BosConfig file[ bos shutdown ]
bos_startStarts processes after setting their status flags to Run in the BosConfig file and in memory[ bos start ]
bos_startupStarts processes by changing their status flags to Run in memory without changing their status flags in the BosConfig file[ bos startup ]
bos_statusDisplays the statuses of server processes on a server machine[ bos status ]
bos_stopStops processes after changing their status flags in the BosConfig file to NotRun[ bos stop ]
bos_uninstallInstalls the former versions of binary files[ bos uninstall ]
bosserverInitializes the Basic OverSeer (BOS) Server process
butcInitializes a Tape Coordinator process
cmIntroduction to the cm command suite
cm_aproposShows each help entry containing a specified string[ cm apropos ]
cm_checkfilesetsForces the Cache Manager to update fileset-related information[ cm checkfilesets ]
cm_flushForces the Cache Manager to discard data cached from specified files or directories[ cm flush ]
cm_flushfilesetForces the Cache Manager to discard data cached from filesets that contain specified files or directories[ cm flushfileset ]
cm_getcachesizeShows the current size of the cache, the amount of cache in use, and the type of cache[ cm getcachesize ]
cm_getdevokShows whether device files from specified filesets are honored by the Cache Manager[ cm getdevok ]
cm_getsetuidShows the status of setuid programs from specified filesets[ cm getsetuid ]
cm_helpShows syntax of specified cm commands or lists functional descriptions of all cm commands[ cm help ]
cm_lscellinfoShows database server machines in cells known to the Cache Manager[ cm lscellinfo ]
cm_lsstoresLists filesets that contain data the Cache Manager cannot write back to a File Server machine[ cm lsstores ]
cm_resetstoresCancels attempts by the Cache Manager to contact unavailable File Server machines and discards all data the Cache Manager cannot store to such machines[ cm resetstores ]
cm_setcachesizeSets the size of a disk cache[ cm setcachesize ]
cm_setdevokSpecifies whether device files from specified filesets are honored by the Cache Manager[ cm setdevok ]
cm_setsetuidEnables or disables setuid programs from specified filesets[ cm setsetuid ]
cm_statserversChecks the statuses of File Server machines[ cm statservers ]
cm_sysnameReports or sets the CPU/OS type[ cm sysname ]
cm_whereisReports names of File Server machines that house specified files or directories[ cm whereis ]
dfs_introIntroduction to the DFS commands
dfs_loginAuthenticates a user to DCE for access to DFS via the DFS/NFS Secure Gateway
dfs_logoutCancels a user’s authenticated access to DFS via the DFS/NFS Secure Gateway
dfsbindProvides user-space information to the Cache Manager and File Exporter
dfsdInitializes the DFS Cache Manager and starts related daemons
dfsexportExports DCE LFS aggregates and non-LFS partitions to the DCE namespace
dfsgwIntroduction to the dfsgw command suite used with the DFS/NFS Secure Gateway
dfsgw_addAdds an entry to the authentication table on the Gateway Server machine[ dfsgw add ]
dfsgw_aproposShows each help entry that contains a specified string[ dfsgw apropos ]
dfsgw_deleteRemoves an entry from the authentication table on the Gateway Server machine[ dfsgw delete ]
dfsgw_helpShows syntax of specified dfsgw commands or lists functional descriptions of all dfsgw commands[ dfsgw help ]
dfsgw_listLists all entries in the authentication table on the Gateway Server machine[ dfsgw list ]
dfsgw_queryQueries the authentication table on the Gateway Server machine[ dfsgw query ]
dfsgwdInitializes the Gateway Server process for the DFS/NFS Secure Gateway
dfstraceIntroduction to the dfstrace command suite
dfstrace_aproposShows each help entry containing a specified string[ dfstrace apropos ]
dfstrace_clearClears server process or kernel trace logs[ dfstrace clear ]
dfstrace_dumpDumps server process or kernel trace logs[ dfstrace dump ]
dfstrace_helpShows syntax of specified dfstrace commands or lists functional descriptions of all dfstrace commands[ dfstrace help ]
dfstrace_lslogLists information on server process or kernel trace logs[ dfstrace lslog ]
dfstrace_lssetLists server process or kernel event sets and their states[ dfstrace lsset ]
dfstrace_setlogSets the size of the indicated log[ dfstrace setlog ]
dfstrace_setsetSets the state of server process or kernel event sets[ dfstrace setset ]
flserverInitializes the Fileset Location (FL) Server
ftsIntroduction to the fts command suite
fts_addsiteAdds a replication site for a read/write DCE LFS fileset[ fts addsite ]
fts_aggrinfoDisplays disk space information about aggregates and partitions exported from a File Server machine[ fts aggrinfo ]
fts_aproposShows each help entry containing a specified string[ fts apropos ]
fts_cloneCreates a backup version of a read/write DCE LFS fileset[ fts clone ]
fts_clonesysCreates backup versions of all indicated read/write DCE LFS filesets[ fts clonesys ]
fts_createCreates a read/write DCE LFS fileset and associated FLDB entry[ fts create ]
fts_crfldbentryCreates a fileset entry in the FLDB[ fts crfldbentry ]
fts_crmountCreates a mount point for a fileset[ fts crmount ]
fts_crserverentryCreates a server entry in the FLDB[ fts crserverentry ]
fts_deleteRemoves a specified read/write or backup version of a DCE LFS fileset[ fts delete ]
fts_delfldbentryRemoves a specified entry from the FLDB[ fts delfldbentry ]
fts_delmountRemoves a mount point[ fts delmount ]
fts_delserverentryDeletes a server entry from the FLDB[ fts delserverentry ]
fts_dumpConverts a fileset to a bytestream format and places it in a file[ fts dump ]
fts_edserverentryEdits a server entry in the FLDB[ fts edserverentry ]
fts_helpShows syntax of specified fts commands or lists functional descriptions of all fts commands[ fts help ]
fts_lockLocks a fileset entry in the FLDB[ fts lock ]
fts_lsaggrLists all exported aggregates and partitions on a File Server machine[ fts lsaggr ]
fts_lsfldbShows information from fileset entries in the FLDB[ fts lsfldb ]
fts_lsftLists fileset information from both the fileset header and the FLDB entry[ fts lsft ]
fts_lsheaderShows information from fileset headers[ fts lsheader ]
fts_lsmountLists the filesets associated with mount points[ fts lsmount ]
fts_lsquotaShows quota and quota usage information for filesets and disk size and usage information for aggregates or partitions[ fts lsquota ]
fts_lsreplicasDisplays the statuses of DCE LFS fileset replicas[ fts lsreplicas ]
fts_lsserverentryLists a server entry from the FLDB[ fts lsserverentry ]
fts_moveMoves a read/write DCE LFS fileset to another site[ fts move ]
fts_releaseInitiates Release Replication by placing a read-only version of a read/write DCE LFS fileset at the local site[ fts release ]
fts_renameRenames a fileset[ fts rename ]
fts_restoreConverts a dump file from bytestream format to fileset format and places it in the file system[ fts restore ]
fts_rmsiteRemoves a replication site and read-only DCE LFS fileset[ fts rmsite ]
fts_setquotaSets the maximum quota for a read/write DCE LFS fileset[ fts setquota ]
fts_setrepinfoSets or changes replication type and parameters for a read/write DCE LFS fileset[ fts setrepinfo ]
fts_statftserverReports on the activity of a Fileset Server[ fts statftserver ]
fts_statrepserverDisplays the status of a Replication Server[ fts statrepserver ]
fts_syncfldbSynchronizes FLDB entries to match their fileset headers[ fts syncfldb ]
fts_syncservSynchronizes fileset headers to match their FLDB entries[ fts syncserv ]
fts_unlockUnlocks an entry in the FLDB[ fts unlock ]
fts_unlockfldbUnlocks all specified locked entries in the FLDB[ fts unlockfldb ]
fts_updateRequests an immediate update of replicas of a read/write DCE LFS fileset that uses Scheduled Replication[ fts update ]
fts_zapRemoves a DCE LFS fileset from its site without updating the FLDB[ fts zap ]
ftserverInitializes the Fileset Server
fxdInitializes the File Exporter and starts associated kernel daemons
scoutInitializes the scout program
udebugDisplays Ubik status information relevant to the specified DFS database server
upclientInitializes the client portion of the Update Server
upserverInitializes the server portion of the Update Server

Section 8dts

advertise
change
create
delete
disable
dts_intro
dtscp
dtsd
dtsdate
enable
exit
help
quit
set
show
synchronize
unadvertise
update

Section 8rpc

rpc_intro
rpccp
rpccp_add_element
rpccp_add_entry
rpccp_add_mapping
rpccp_add_member
rpccp_export
rpccp_help
rpccp_import
rpccp_remove_element
rpccp_remove_entry
rpccp_remove_group
rpccp_remove_mapping
rpccp_remove_member
rpccp_remove_profile
rpccp_show_entry
rpccp_show_group
rpccp_show_mapping
rpccp_show_profile
rpccp_show_server
rpccp_unexport

Section 8sdce

hostvarA dcecp task object that manages the security binary compatibility attributes

Section 8sec

acl_edit
auditd
chpass
dce_login
k5dcelogin
k5login
kdestroy
kinit
klist
passwd_export
passwd_import
pwd_strengthd
randd
rgy_edit
rlogin
rlogind
rsh
rshd
sec_admin
sec_create_db
sec_intro
sec_salvage_db
secd
su

Typewritten Software • bear@typewritten.org • Edmonds, WA 98026