Manual — Tru64 DCE_3.1
Section 1dce
| sams | ||
| svcdumplog |
Section 1rpc
| idl | ||
| rpc_intro | ||
| uuidgen |
Section 3dce
Section 3dts
Section 3rpc
| cs_byte_from_netcs | Converts international character data from a network code set to a local code set prior to unmarshalling; used by client and server applications | |
| cs_byte_local_size | Calculates the necessary buffer size for code set conversion from a network code set to a local code set prior to unmarshalling; used by client and server stubs but not directly by applications | |
| cs_byte_net_size | Calculates the necessary buffer size for code set conversion from a local code set to a network code set prior to marshalling; used by client and server stubs but not directly by applications | |
| cs_byte_to_netcs | Converts international character data from a local code set to a network code set prior to marshalling; used by client and server applications | |
| dce_cs_loc_to_rgy | Maps a local name for a code set to a code set value in the code set registry; used by client and server applications | |
| dce_cs_rgy_to_loc | Maps a code set value in the code set registry to the local name for a code set; used by client and server applications | |
| idl_es_decode_buffer | Returns a buffer decoding handle to the IDL encoding services | |
| idl_es_decode_incremental | Returns an incremental decoding handle to the IDL encoding services; used by client and server applications | |
| idl_es_encode_dyn_buffer | Returns a dynamic buffer encoding handle to the IDL encoding services; used by client and server applications | |
| idl_es_encode_fixed_buffer | Returns a fixed buffer encoding handle to the IDL encoding services | |
| idl_es_encode_incremental | Returns an incremental encoding handle to the IDL encoding services; used by client and server applications | |
| idl_es_handle_free | Frees an IDL encoding services handle | |
| idl_es_inq_encoding_id | Identifies an operation within an interface that has been called to encode data using the IDL encoding services | |
| rpc_binding_copy | Returns a copy of a binding handle; used by client or server applications | |
| rpc_binding_free | Releases binding handle resources; used by client or server applications | |
| rpc_binding_from_string_binding | Returns a binding handle from a string representation; used by client or management applications | |
| rpc_binding_inq_auth_caller | Returns authentication and authorization information from the binding handle for an authenticated client; used by server applications | |
| rpc_binding_inq_auth_client | Returns authentication and authorization information from the binding handle for an authenticated client; used by server applications | |
| rpc_binding_inq_auth_info | Returns authentication and authorization information from a server binding handle; used by client applications | |
| rpc_binding_inq_object | Returns the object UUID from a binding handle; used by client or server applications | |
| rpc_binding_reset | Resets a server binding handle; used by client or management applications | |
| rpc_binding_server_from_client | Converts a client binding handle to a server binding handle; used by server applications | |
| rpc_binding_set_auth_info | Sets authentication and authorization information for a server binding handle; used by client applications | |
| rpc_binding_set_object | Sets the object UUID value into a server binding handle; used by client applications | |
| rpc_binding_to_string_binding | Returns a string representation of a binding handle; used by client, server, or management applications | |
| rpc_binding_vector_free | Frees the memory used to store a vector and binding handles; used by client or server applications | |
| rpc_cs_binding_set_tags | Places code set tags into a server binding handle; used by client applications | |
| rpc_cs_char_set_compat_check | Evaluates character set compatibility between a client and a server; used by client applications | |
| rpc_cs_eval_with_universal | Evaluates a server’s supported character sets and code sets during the server binding selection process; used indirectly by client applications | |
| rpc_cs_eval_without_universal | Evaluates a server’s supported character sets and code sets during the server binding selection process; used indirectly by client applications | |
| rpc_cs_get_tags | Retrieves code set tags from a binding handle; used by client and server applications | |
| rpc_ep_register | Adds to, or replaces, server address information in the local endpoint map; used by server applications | |
| rpc_ep_register_no_replace | Adds to server address information in the local endpoint map; used by server applications | |
| rpc_ep_resolve_binding | Resolves a partially bound server binding handle into a fully bound server binding handle; used by client and management applications | |
| rpc_ep_unregister | Removes server address information from the local endpoint map; used by server applications | |
| rpc_if_id_vector_free | Frees a vector and the interface identifier structures it contains; used by client, server, or management applications | |
| rpc_if_inq_id | Returns the interface identifier for an interface specification; used by client or server applications | |
| rpc_intro | Introduction to the DCE RPC API runtime | |
| rpc_mgmt_ep_elt_inq_begin | Creates an inquiry context for viewing the elements in an endpoint map; used by management applications | |
| rpc_mgmt_ep_elt_inq_done | Deletes the inquiry context for viewing the elements in an endpoint map; used by management applications | |
| rpc_mgmt_ep_elt_inq_next | Returns one element from an endpoint map; used by management applications | |
| rpc_mgmt_ep_unregister | Removes server address information from an endpoint map; used by management applications | |
| rpc_mgmt_inq_com_timeout | Returns the communications timeout value in a binding handle; used by client applications | |
| rpc_mgmt_inq_dflt_protect_level | Returns the default protection level for an authentication service; used by client and server applications | |
| rpc_mgmt_inq_if_ids | Returns a vector of interface identifiers of interfaces a server offers; used by client, server, or management applications | |
| rpc_mgmt_inq_server_princ_name | Returns a server’s principal name; used by client, server, or management applications | |
| rpc_mgmt_inq_stats | Returns RPC runtime statistics; used by client, server, or management applications | |
| rpc_mgmt_is_server_listening | Tells whether a server is listening for remote procedure calls; used by client, server, or management applications | |
| rpc_mgmt_set_authorization_fn | Establishes an authorization function for processing remote calls to a server’s management routines; used by server applications | |
| rpc_mgmt_set_cancel_timeout | Sets the lower bound on the time to wait before timing out after forwarding a cancel; used by client applications | |
| rpc_mgmt_set_com_timeout | Sets the communications timeout value in a binding handle; used by client applications | |
| rpc_mgmt_set_server_stack_size | Specifies the stack size for each server thread; used by server applications | |
| rpc_mgmt_stats_vector_free | Frees a statistics vector; used by client, server, or management applications | |
| rpc_mgmt_stop_server_listening | Tells a server to stop listening for remote procedure calls; used by client, server, or management applications | |
| rpc_network_inq_protseqs | Returns all protocol sequences supported by both the RPC runtime and the operating system; used by client and server applications | |
| rpc_network_is_protseq_valid | Tells whether the specified protocol sequence is supported by both the RPC runtime and the operating system; used by client and server applications | |
| rpc_ns_binding_export | Establishes a name service database entry with binding handles or object UUIDs for a server; used by server applications | |
| rpc_ns_binding_import_begin | Creates an import context for an interface and an object in the name service database; used by client applications | |
| rpc_ns_binding_import_done | Deletes the import context for searching the name service database; used by client applications | |
| rpc_ns_binding_import_next | Returns a binding handle of a compatible server (if found) from the name service database; used by client applications | |
| rpc_ns_binding_inq_entry_name | Returns the name of an entry in the name service database from which the server binding handle came; used by client applications | |
| rpc_ns_binding_lookup_begin | Creates a lookup context for an interface and an object in the name service database; used by client applications | |
| rpc_ns_binding_lookup_done | Deletes the lookup context for searching the name service database; used by client applications | |
| rpc_ns_binding_lookup_next | Returns a list of binding handles of one or more compatible servers (if found) from the name service database; used by client applications | |
| rpc_ns_binding_select | Returns a binding handle from a list of compatible server binding handles; used by client applications | |
| rpc_ns_binding_unexport | Removes the binding handles for an interface, or object UUIDs, from an entry in the name service database; used by server applications | |
| rpc_ns_entry_expand_name | Expands the name of a name service entry; used by client, server, or management applications | |
| rpc_ns_entry_inq_resolution | Resolves the cell namespace components of a name and returns partial results. | |
| rpc_ns_entry_object_inq_begin | Creates an inquiry context for viewing the objects of an entry in the name service database; used by client, server, or management applications | |
| rpc_ns_entry_object_inq_done | Deletes the inquiry context for viewing the objects of an entry in the name service database; used by client, server, or management applications | |
| rpc_ns_entry_object_inq_next | Returns one object at a time from an entry in the name service database; used by client, server, or management applications | |
| rpc_ns_group_delete | Deletes a group attribute; used by client, server, or management applications | |
| rpc_ns_group_mbr_add | Adds an entry name to a group; if necessary, creates the entry; used by client, server, or management applications | |
| rpc_ns_group_mbr_inq_begin | Creates an inquiry context for viewing group members; used by client, server, or management applications | |
| rpc_ns_group_mbr_inq_done | Deletes the inquiry context for a group; used by client, server, or management applications | |
| rpc_ns_group_mbr_inq_next | Returns one member name at a time from a group; used by client, server, or management applications | |
| rpc_ns_group_mbr_remove | Removes an entry name from a group; used by client, server, or management applications | |
| rpc_ns_import_ctx_add_eval | Adds an evaluation routine to an import context; used by client applications | |
| rpc_ns_mgmt_binding_unexport | Removes multiple binding handles, or object UUIDs, from an entry in the name service database; used by management applications | |
| rpc_ns_mgmt_entry_create | Creates an entry in the name service database; used by management applications | |
| rpc_ns_mgmt_entry_delete | Deletes an entry from the name service database; used by management applications | |
| rpc_ns_mgmt_entry_inq_if_ids | Returns the list of interfaces exported to an entry in the name service database; used by client, server, or management applications | |
| rpc_ns_mgmt_free_codesets | Frees a code sets array that has been allocated by the RPC runtime; used by client and server applications | |
| rpc_ns_mgmt_handle_set_exp_age | Sets a handle’s expiration age for local copies of name service data; used by client, server, or management applications | |
| rpc_ns_mgmt_inq_exp_age | Returns the application’s global expiration age for local copies of name service data; used by client, server, or management applications | |
| rpc_ns_mgmt_read_codesets | Reads the code sets attribute associated with an RPC server entry in the name service database; used by client applications | |
| rpc_ns_mgmt_remove_attribute | Removes an attribute from an RPC server entry in the name service database; used mainly by server applications; can also be used by management applications | |
| rpc_ns_mgmt_set_attribute | Adds an attribute to an RPC server entry in the name service database; used mainly by server applications; can also be used by management applications | |
| rpc_ns_mgmt_set_exp_age | Modifies the application’s global expiration age for local copies of name service data; used by client, server, or management applications | |
| rpc_ns_profile_delete | Deletes a profile attribute; used by client, server, or management applications | |
| rpc_ns_profile_elt_add | Adds an element to a profile; if necessary, creates the entry; used by client, server, or management applications | |
| rpc_ns_profile_elt_inq_begin | Creates an inquiry context for viewing the elements in a profile; used by client, server, or management applications | |
| rpc_ns_profile_elt_inq_done | Deletes the inquiry context for a profile; used by client, server, or management applications | |
| rpc_ns_profile_elt_inq_next | Returns one element at a time from a profile; used by client, server, or management applications | |
| rpc_ns_profile_elt_remove | Removes an element from a profile; used by client, server, or management applications | |
| rpc_object_inq_type | Returns the type of an object; used by server applications | |
| rpc_object_set_inq_fn | Registers an object inquiry function; used by server applications | |
| rpc_object_set_type | Registers the type of an object with the RPC runtime; used by server applications | |
| rpc_protseq_vector_free | Frees the memory used by a vector and its protocol sequences; used by client or server applications | |
| rpc_rgy_get_codesets | Gets supported code sets information from the local host; used by client and server applications | |
| rpc_rgy_get_max_bytes | Gets the maximum number of bytes that a code set uses to encode one character from the code set registry on a host; used by client and server applications | |
| rpc_server_inq_bindings | Returns binding handles for communications with a server; used by server applications | |
| rpc_server_inq_if | Returns the manager entry point vector registered for an interface; used by server applications | |
| rpc_server_listen | Tells the RPC runtime to listen for remote procedure calls; used by server applications | |
| rpc_server_register_auth_ident | Registers user-to-user based authentication information with the RPC runtime; used by server applications | |
| rpc_server_register_auth_info | Registers server-key based authentication information with the RPC runtime; used by server applications | |
| rpc_server_register_if | Registers an interface with the RPC runtime; used by server applications | |
| rpc_server_unregister_if | Removes an interface from the RPC runtime; used by server applications | |
| rpc_server_use_all_protseqs | Tells the RPC runtime to use all supported protocol sequences for receiving remote procedure calls; used by server applications | |
| rpc_server_use_all_protseqs_if | Tells the RPC runtime to use all the protocol sequences and endpoints specified in the interface specification for receiving remote procedure calls; used by server applications | |
| rpc_server_use_protseq | Tells the RPC runtime to use the specified protocol sequence for receiving remote procedure calls; used by server applications | |
| rpc_server_use_protseq_ep | Tells the RPC runtime to use the specified protocol sequence combined with the specified endpoint for receiving remote procedure calls; used by server applications | |
| rpc_server_use_protseq_if | Tells the RPC runtime to use the specified protocol sequence combined with the endpoints in the interface specification for receiving remote procedure calls; used by server applications | |
| rpc_sm_allocate | Allocates memory within the RPC stub memory management scheme. | |
| rpc_sm_client_free | Frees memory returned from a client stub | |
| rpc_sm_destroy_client_context | Reclaims the client memory resources for a context handle, and sets the context handle to null | |
| rpc_sm_disable_allocate | Releases resources and allocated memory within the stub memory management scheme | |
| rpc_sm_enable_allocate | Enables the stub memory managment environment | |
| rpc_sm_free | Frees memory allocated by the rpc_sm_allocate() routine | |
| rpc_sm_get_thread_handle | Gets a thread handle for the stub memory management environment | |
| rpc_sm_set_client_alloc_free | Sets the memory allocation and freeing mechanisms used by the client stubs | |
| rpc_sm_set_thread_handle | Sets a thread handle for the stub memory management environment | |
| rpc_sm_swap_client_alloc_free | Exchanges the current memory allocation and freeing mechanism used by the client stubs with one supplied by the client | |
| rpc_ss_allocate | Allocates memory within the RPC stub memory management scheme; used by server or possibly by client applications | |
| rpc_ss_bind_authn_client | Authenticates a client’s identity to a server from a client stub; a pointer to the server binding handle for the remote procedure call to which the routine will add authentication and authorization context | |
| rpc_ss_client_free | Frees memory returned from a client stub; used by client applications | |
| rpc_ss_destroy_client_context | Reclaims the client memory resources for the context handle, and sets the context handle to NULL; used by client applications | |
| rpc_ss_disable_allocate | Releases resources and allocated memory; used by client applications | |
| rpc_ss_enable_allocate | Enables the allocation of memory by the rpc_ss_allocate() routine when not in manager code; used by client applications | |
| rpc_ss_free | Frees memory allocated by the rpc_ss_allocate() routine; used by server or possibly by client applications | |
| rpc_ss_get_thread_handle | Gets a thread handle for the manager code before it spawns additional threads, or for the client code when it becomes a server; used by server or possibly by client applications | |
| rpc_ss_set_client_alloc_free | Sets the memory allocation and freeing mechanism used by the client stubs, thereby overriding the default routines the client stub uses to manage memory for pointed-to nodes; used by client applications | |
| rpc_ss_set_thread_handle | Sets the thread handle for either a newly created spawned thread or for a server that was formerly a client and is ready to be a client again; used by server or possibly by client applications | |
| rpc_ss_swap_client_alloc_free | Exchanges the current memory allocation and freeing mechanism used by the client stubs with one supplied by the client; used by client applications | |
| rpc_string_binding_compose | Combines the components of a string binding into a string binding; used by client or server applications | |
| rpc_string_binding_parse | Returns, as separate strings, the components of a string binding; used by client or server applications | |
| rpc_string_free | Frees a character string allocated by the runtime; used by client, server, or management applications | |
| rpc_tower_to_binding | Returns a binding handle from a tower representation | |
| rpc_tower_vector_free | Releases memory associated with a tower vector | |
| rpc_tower_vector_from_binding | Creates a tower vector from a binding handle | |
| uuid_compare | Compares two UUIDs and determines their order; used by client, server, or management applications | |
| uuid_create | Creates a new UUID; used by client, server, or management applications | |
| uuid_create_nil | Creates a nil UUID; used by client, server, or management applications | |
| uuid_equal | Determines if two UUIDs are equal; used by client, server, or management applications | |
| uuid_from_string | Converts a string UUID to its binary representation; used by client, server, or management applications | |
| uuid_hash | Creates a hash value for a UUID; used by client, server, or management applications | |
| uuid_is_nil | Determines if a UUID is nil; used by client, server, or management applications | |
| uuid_to_string | Converts a UUID from a binary representation to a string representation; used by client, server, or management applications | |
| wchar_t_from_netcs | Converts international character data from a network code set to a local code set prior to unmarshalling; used by client and server applications | |
| wchar_t_local_size | Calculates the necessary buffer size for code set conversion from a network code set to a local code set prior to unmarshalling; used by client and server stubs, but not directly by applications | |
| wchar_t_net_size | Calculates the necessary buffer size for code set conversion from a local code set to a network code set prior to marshalling; used by client and server stubs but not directly by applications | |
| wchar_t_to_netcs | Converts international character data from a local code set to a network code set prior to marshalling; used by client and server applications |
Section 3sec
| audit_intro | Introduction to the DCE audit API runtime | |
| cert_intro | Introduction to trust list facilities API | [ pkc_intro ] |
| cert_intro_crypto | Introduction to the signature algorithm API registration facility | [ crypto_intro ] |
| cert_intro_policy | Introduction to the policy module registration and service facility | [ policy_intro ] |
| cert_intro_trustlist | Introduction to the certificate manipulation facility | [ pkc_trustlist_intro ] |
| dce_acl_copy_acl | Copies an ACL | |
| dce_acl_inq_acl_from_header | Retrieves the UUID of an ACL from an item’s header in a backing store | |
| dce_acl_inq_client_creds | Returns the client’s credentials | |
| dce_acl_inq_client_permset | Returns the client’s permissions corresponding to an ACL | |
| dce_acl_inq_permset_for_creds | Determines a principal’s complete extent of access to an object | |
| dce_acl_inq_prin_and_group | Inquires the principal and group of an RPC caller | [ dce_acl_inq_prin_and_group.3sec ] |
| dce_acl_is_client_authorized | Checks whether a client’s credentials are authenticated | |
| dce_acl_obj_add_any_other_entry | Adds permissions for any_other ACL entry to a given ACL | |
| dce_acl_obj_add_foreign_entry | Adds permissions for an ACL entry for a foreign user or group to the given ACL | |
| dce_acl_obj_add_group_entry | Adds permissions for a group ACL entry to the given ACL | |
| dce_acl_obj_add_id_entry | Adds permissions for an ACL entry to the given ACL | |
| dce_acl_obj_add_obj_entry | Adds permissions for an object (obj) ACL entry to the given ACL | |
| dce_acl_obj_add_unauth_entry | Adds permissions for unauthenticated ACL entry to the given ACL | |
| dce_acl_obj_add_user_entry | Adds permissions for a user ACL entry to the given ACL | |
| dce_acl_obj_free_entries | Frees space used by an ACL’s entries | |
| dce_acl_obj_init | Initializes an ACL | |
| dce_acl_register_object_type | Registers an ACL manager’s object type | |
| dce_acl_resolve_by_name | Finds an ACL’s UUID, given an object’s name | |
| dce_acl_resolve_by_uuid | Finds an ACL’s UUID, given an object’s UUID | |
| dce_aud_close | Closes an audit trail file. Used by client/server applications and audit trail analysis and examination tools. | |
| dce_aud_commit | Writes the audit record in the audit trail file. Used by client/server applications. | |
| dce_aud_discard | Discards an audit record (releases the memory). Used by client/server applications and trail analysis and examination tools. | |
| dce_aud_free_ev_info | Frees the memory allocated for an event information stucture returned from calling dce_aud_get_ev_info(). Used by the audit trail analysis and examination tools. | |
| dce_aud_free_header | Frees the memory allocated to a designated audit record header structure. Used by the audit trail analysis and examination tools | |
| dce_aud_get_ev_info | Returns a pointer to an event information stucture (dce_aud_ev_info_t). Used by the audit trail analysis and examination tools | |
| dce_aud_get_header | Gets the header of a specified audit record. Used by the audit trail analysis and examination tools. | |
| dce_aud_length | Gets the length of a specified audit record. Used by client/server applications and trail analysis and examination tools | |
| dce_aud_next | Reads the next audit record from a specified audit trail file into a buffer. Used by the trail analysis and examination tools. | |
| dce_aud_open | Opens a specified audit trail file for read or write. Used by client/server applications and trail analysis and examination tools. | |
| dce_aud_prev | Reads the previous audit record from a specified audit trail file into a buffer. Used by the trail analysis and examination tools. | |
| dce_aud_print | Formats an audit record into human-readable form. Used by audit trail examination and analysis tools. | |
| dce_aud_put_ev_info | Adds event-specific information to a specified audit record buffer. Used by client/server applications. | |
| dce_aud_reset | Resets the cursors and the file pointers of the specified audit trail file. Used by the trail analysis and examination tools. | |
| dce_aud_rewind | Rewinds the specified audit trail file. Used by the trail analysis and examination tools. | |
| dce_aud_set_trail_size_limit | Sets a limit to the audit trail size. Used by client/server applications. | |
| dce_aud_start | Determines whether a specified event should be audited given the client binding information and the event outcome. Used by client/server applications | |
| dce_aud_start_with_name | Determines whether a specified event should be audited given the client/server name and the event outcome. Used by non-RPC based client/server applications that do not use the DCE authorization model | |
| dce_aud_start_with_pac | Determines whether a specified event must be audited given the client’s privilege attribute certificate (PAC) and the event outcome. Used by non-RPC based client/server applications that use the DCE authorization model | |
| dce_aud_start_with_server_binding | Determines whether a specified event must be audited given the server binding information and the event outcome. Used by client/server applications | |
| dce_aud_start_with_uuid | Determines whether a specified event should be audited given the client/server UUID and the event outcome. Used by client/server applications which already know the UUIDs of their clients and wish to avoid the overhead of the audit library acquiring them | |
| gss_accept_sec_context | Establishes a security context between the application and a context acceptor | |
| gss_acquire_cred | Allows an application to acquire a handle for an existing named credential | |
| gss_compare_name | Allows an application to compare two internal names to determine whether they are equivalent | |
| gss_context_time | Checks the number of seconds for which the context will remain valid | |
| gss_delete_sec_context | Deletes a security context | |
| gss_display_name | Provides to an application the textual representation of an opaque internal name | |
| gss_display_status | Provides an application with the textual representation of a GSSAPI status code that can be displayed to a user or used for logging | |
| gss_import_name | Converts a printable name to an internal form | |
| gss_indicate_mechs | Allows an application to determine which underlying security mechanisms are available | |
| gss_init_sec_context | Establishes a security context between the context initiator and a context acceptor | |
| gss_inquire_cred | Provides the calling application information about a credential | |
| gss_process_context_token | Passes a context to the security service | |
| gss_release_buffer | Frees storage associated with a buffer | |
| gss_release_cred | Marks a credential for deletion | |
| gss_release_name | Frees storage associated with an internal name that was allocated by a GSSAPI routine. | |
| gss_release_oid_set | Frees storage associated with a gss_OID_set object | |
| gss_seal | Cryptographically signs and optionally encrypts a message | |
| gss_sign | Generates a cryptographic signature for a message | |
| gss_unseal | Converts a sealed message into a usable form and verifies the embedded signature | |
| gss_verify | Checks that the cryptographic signature fits the supplied message | |
| gssapi_intro | Generic security service application programming interface | |
| gssdce_add_oid_set_member | Adds an OID to an OID set | |
| gssdce_create_empty_oid_set | Creates a new, empty OID set to which members can be added by calling gssdce_add_oid_set_member() | |
| gssdce_cred_to_login_context | Obtains the DCE login context associated with a GSSAPI credential | |
| gssdce_extract_creds_from_sec_context | Extracts a DCE credential from a GSSAPI security context | |
| gssdce_login_context_to_cred | Creates a GSSAPI credential handle for a context initiator or context acceptor from a DCE login context | |
| gssdce_register_acceptor_identity | Registers a context acceptor’s identity | |
| gssdce_set_cred_context_ownership | Changes the ownership of a DCE credential’s login context | |
| gssdce_test_oid_set_member | Checks an OID set to see if a specified OID is in the set | |
| pkc_add_trusted_key | Adds a key to specified trust list | |
| pkc_append_to_trustlist | Appends one or more items to trust list | |
| pkc_ca_key_usage.class | A class that expresses key usage | |
| pkc_check_cert_against_trustlist | Checks specified certificate against specified list of trusted keys | |
| pkc_constraints.class | A class that expresses constraints on names | |
| pkc_copy_trustlist | Copies a trustlist | |
| pkc_crypto_generate_keypair | Generates a pair of public and private keys | |
| pkc_crypto_get_registered_algorithms | Returns algorithm implementations | |
| pkc_crypto_lookup_algorithm | Returns cryptographic module details | |
| pkc_crypto_register_signature_alg | Registers a signature algorithm module | |
| pkc_crypto_sign | Signs data with private key | |
| pkc_crypto_verify_signature | Verifies a signature | |
| pkc_delete_trustlist | Deletes a trust list | |
| pkc_display_trustlist | Displays information about a trust list | |
| pkc_free | Frees storage allocated by certification routines | |
| pkc_free_keyinfo | Frees key information storage | |
| pkc_free_trustbase | Frees a trust base’s storage | |
| pkc_free_trustlist | Frees a trust list’s storage | |
| pkc_generic_key_usage.class | A class that expresses generic key usage | |
| pkc_get_key_certifier_count | Returns number of key’s certifying authorities | |
| pkc_get_key_certifier_info | Returns information about a certifier | |
| pkc_get_key_count | Returns number of keys for a principal | |
| pkc_get_key_data | Returns a public key | |
| pkc_get_key_trust_info | Returns information about key trust | |
| pkc_get_registered_policies | Returns all registered trust policies | |
| pkc_init_trustbase | Initializes a trust base | |
| pkc_init_trustlist | Creates an empty trust list | |
| pkc_key_policies.class | A class that expresses policy rules and operations | |
| pkc_key_policy.class | Key policy class | |
| pkc_key_usage.class | A class that expresses key usage rules | |
| pkc_lookup_element_in_trustlist | Retrieves a specified key | |
| pkc_lookup_key_in_trustlist | Searches a trust list for the specified key | |
| pkc_lookup_keys_in_trustlist | Searches trust list for keys | |
| pkc_name_subord_constraint.class | Constraint rules and operations class | |
| pkc_name_subord_constraints.class | A class that expresses subordinate constraints on a name | |
| pkc_name_subtree_constraint.class | A class that expresses a subtree constraint on a name | |
| pkc_name_subtree_constraints.class | A class that expresses a set of subtree constraints on a name | |
| pkc_pending_revocation.class | Class of certificates awaiting revocation | |
| pkc_plcy_delete_keyinfo | Frees public key storage | |
| pkc_plcy_delete_trustbase | Frees trust base storage | |
| pkc_plcy_establish_trustbase | Establishes a trust base | |
| pkc_plcy_get_key_certifier_count | Returns number of a key’s certifying authorities | |
| pkc_plcy_get_key_certifier_info | Returns information about a key’s certifier | |
| pkc_plcy_get_key_count | Returns number of keys for a principal | |
| pkc_plcy_get_key_data | Returns a public key | |
| pkc_plcy_get_key_trust | Returns information about trust in a key | |
| pkc_plcy_get_registered_policies | Returns OID set describing registered policies | |
| pkc_plcy_lookup_policy | Returns a policy module descriptor block | |
| pkc_plcy_register_policy | Registers a policy module | |
| pkc_plcy_retrieve_keyinfo | Retrieves keys for specified principal | |
| pkc_prune_trustlist | Removes expired keys from trust list | |
| pkc_retrieve_keyinfo | Returns information about a key | |
| pkc_retrieve_keylist | Retrieves all keys for a principal | |
| pkc_revocation.class | A class that expresses certificate revocation operations | |
| pkc_revocation_list.class | Revoked certificates list class | |
| pkc_revoke_certificate | Revokes key and dependents from specified trust list | |
| pkc_revoke_certificates | Revokes a key and all dependent keys | |
| pkc_trust_list.class | A class that expresses certificate trust list operations | |
| pkc_trust_list_element.class | Public key class | |
| pkc_trusted_key.class | Trusted public key class | |
| priv_attr_trig_query | ||
| rdacl_get_access | Reads a privilege attribute certificate | |
| rdacl_get_manager_types | Lists the types of ACLs protecting an object | |
| rdacl_get_mgr_types_semantics | Lists the ACL manager types protecting an object and the POSIX semantics supported by each manager type | |
| rdacl_get_printstring | Returns printable ACL strings | |
| rdacl_get_referral | Gets a referral to an ACL update site | |
| rdacl_lookup | Returns the ACL for an object | |
| rdacl_replace | Replaces an ACL | |
| rdacl_test_access | Tests access to an object | |
| rdacl_test_access_on_behalf | Tests access to an object on behalf of another process | |
| rsec_pwd_mgmt_gen_pwd | Generates a set of passwords | |
| rsec_pwd_mgmt_str_chk | Strength-checks a password | |
| sec_acl_bind | Returns a handle for an object’s ACL | |
| sec_acl_bind_auth | Returns an opaque handle to an object’s ACL | |
| sec_acl_bind_to_addr | Returns a handle to an object identified by its network address | |
| sec_acl_calc_mask | Returns the sec_acl_type_mask_obj entry for the specified ACL list | |
| sec_acl_get_access | Lists the access (permission set) that the caller has for an object | |
| sec_acl_get_error_info | Returns error information from an ACL handle | |
| sec_acl_get_manager_types | Lists the manager types of the ACLs protecting an object | |
| sec_acl_get_mgr_types_semantics | Lists the manager types of the ACLs protecting an object | |
| sec_acl_get_printstring | Returns printable ACL strings | |
| sec_acl_lookup | Returns the ACL for an object | |
| sec_acl_release | Releases ACL storage | |
| sec_acl_release_handle | Removes an ACL handle | |
| sec_acl_replace | Replaces an ACL | |
| sec_acl_test_access | Tests access to an object | |
| sec_acl_test_access_on_behalf | Tests access to an object on behalf of another process | |
| sec_attr_trig_query | Reads attributes coded with an attribute trigger type of query | |
| sec_attr_trig_update | For attributes coded with an attribute trigger type of update, passes attribute updates to an update attribute trigger server for evaluation | |
| sec_attr_util_alloc_copy | Allocates the necessary subfields of the destination sec_attr_t and copies the corresponding data from the source sec_attr_t | |
| sec_attr_util_free | Frees nonnull pointers in a sec_attr_t with an input deallocate routine | |
| sec_attr_util_inst_free | Frees nonnull pointers in a sec_attr_t and the pointer to the sec_attr_t itself | |
| sec_attr_util_inst_free_ptrs | Frees nonnull pointers in a sec_attr_t | |
| sec_attr_util_sch_ent_free | Frees nonnull pointers in a sec_attr_schema_entry_t and the pointer to the sec_attr_schema_entry_t itself | |
| sec_attr_util_sch_ent_free_ptrs | Frees nonnull pointers in a sec_attr_schema_entry_t | |
| sec_cred_free_attr_cursor | Frees the local resources allocated to a sec_attr_cursor_t | |
| sec_cred_free_cursor | Releases local resources allocated to a sec_cred_cursor_t | |
| sec_cred_free_pa_handle | Frees the local resources allocated to a privilege attribute handle of type sec_cred_pa_handle_t | |
| sec_cred_get_authz_session_info | Returns session-specific information that represents an authenticated client’s credentials | |
| sec_cred_get_client_princ_name | Returns the principal name associated with a credential handle | |
| sec_cred_get_deleg_restrictions | Returns delegate restrictions from a privilege attribute handle | |
| sec_cred_get_delegate | Returns a handle to the privilege attributes of an intermediary in a delegation chain | |
| sec_cred_get_delegation_type | Returns the delegation type from a privilege attribute handle | |
| sec_cred_get_extended_attrs | Returns extended attributes from a privilege handle | |
| sec_cred_get_initiator | Returns the privilege attributes of the initiator of a delegation chain | |
| sec_cred_get_opt_restrictions | Returns optional restrictions from a privilege handle | |
| sec_cred_get_pa_data | Returns identity information from a privilege attribute handle | |
| sec_cred_get_req_restrictions | Returns required restrictions from a privilege attribute handle | |
| sec_cred_get_tgt_restrictions | Returns target restrictions from a privilege attribute handle | |
| sec_cred_get_v1_pac | Returns pre-1.1 PAC from a privilege attribute handle | |
| sec_cred_initialize_attr_cursor | Initializes a sec_attr_cursor_t | |
| sec_cred_initialize_cursor | Initializes a sec_cred_cursor_t | |
| sec_cred_is_authenticated | Returns TRUE if the supplied credentials are authenticated, and FALSE if they are not | |
| sec_id_gen_group | Generates a global name from cell and group UUIDs | |
| sec_id_gen_name | Generates a global name from cell and principal UUIDs | |
| sec_id_parse_group | Translates a global name into group and cell names and UUIDs | |
| sec_id_parse_name | Translates a global name into principal and cell names and UUIDs | |
| sec_intro | Application program interface to the DCE Security Service | |
| sec_key_mgmt_change_key | Changes a principal’s key | |
| sec_key_mgmt_delete_key | Deletes a key from the local storage | |
| sec_key_mgmt_delete_key_type | Deletes a key version of a key type from the local key storage | |
| sec_key_mgmt_free_key | Frees the memory used by a key value | |
| sec_key_mgmt_garbage_collect | Deletes obsolete keys | |
| sec_key_mgmt_gen_rand_key | Generates a new random key of a specified key type | |
| sec_key_mgmt_get_key | Retrieves a key from local storage | |
| sec_key_mgmt_get_next_key | Retrieves successive keys from the local key storage | |
| sec_key_mgmt_get_next_kvno | Retrieves the next eligible key version number for a key | |
| sec_key_mgmt_initialize_cursor | Repositions the cursor in the local key store | |
| sec_key_mgmt_manage_key | Automatically changes a principal’s key before it expires | |
| sec_key_mgmt_release_cursor | Releases the memory used by an initialized cursor value | |
| sec_key_mgmt_set_key | Inserts a key value into the local storage | |
| sec_login_become_delegate | Causes an intermediate server to become a delegate in traced delegation chain | |
| sec_login_become_impersonator | Used by a server to create a login context and assoicated handle that impersonates the identity of a caller | |
| sec_login_become_initiator | Constructs a new login context that enables delegation for the calling client | |
| sec_login_certify_identity | Certifies the network authentication service | |
| sec_login_cred_get_delegate | Returns a handle to the privilege attributes of an intermediary in a delegation chain. Used by clients. | |
| sec_login_cred_get_initiator | Returns information about the delegation initiator in a specified login context | |
| sec_login_cred_init_cursor | Initializes a sec_cred_cursor_t | |
| sec_login_disable_delegation | Disables delegation for a specified login context | |
| sec_login_export_context | Creates an exportable login context | |
| sec_login_free_net_info | Frees storage allocated for a principal’s network information | |
| sec_login_get_current_context | Returns a handle to the current login context | |
| sec_login_get_expiration | Returns the TGT lifetime for an authenticated identity | |
| sec_login_get_groups | Returns the group set from a login context | |
| sec_login_get_pwent | Returns a passwd-style entry for a login context | |
| sec_login_import_context | Imports a login context | |
| sec_login_init_first | Initializes the default context | |
| sec_login_inquire_net_info | Returns a principal’s network information | |
| sec_login_newgroups | Changes the group list for a login context | |
| sec_login_purge_context | Destroys a login context and frees its storage | |
| sec_login_refresh_identity | Refreshes an authenticated identity for a login context | |
| sec_login_release_context | Frees storage allocated for a login context | |
| sec_login_set_context | Creates network credentials for a login context | |
| sec_login_set_extended_attrs | Constructs a new login context that contains extended registry attributes | |
| sec_login_setup_first | Sets up the default network context | |
| sec_login_setup_identity | Sets up the user’s network identity | |
| sec_login_valid_and_cert_ident | Validates and certifies a login context | |
| sec_login_valid_from_keytable | Validates a login context’s identity using input from a specified keytable file | |
| sec_login_validate_first | Validates the initial login context | |
| sec_login_validate_identity | Validates a login context’s identity | |
| sec_pk_data_free | Frees memory allocated to a sec_pk_data_t and its aliases. This routine is not available in the DCE binary code. It is provided in DCE source for use by vendors. | |
| sec_pk_data_zero_and_free | Frees and zeros out memory allocated to a sec_pk_data_t or its aliases. This routine is not available in the DCE binary code. It is provided in DCE source for use by vendors. | |
| sec_psm_close | Close a personal security mechanism. This routine is not available in the DCE binary code. It is provided in DCE source for use by vendors. | |
| sec_psm_decrypt_data | Decrypt data that was encrypted with a public key mechanism. This routine is not available in the DCE binary code. It is provided in DCE source for use by vendors. | |
| sec_psm_encrypt_data | Encrypt data using a public key mechanism. This routine is not available in the DCE binary code. It is provided in DCE source for use by vendors. | |
| sec_psm_gen_pub_key | Randomly generate a public key pair. This routine is not available in the DCE binary code. It is provided in DCE source for use by vendors. | |
| sec_psm_open | Open a personal security mechanism. This routine is not available in the DCE binary code. It is provided in DCE source for use by vendors. | |
| sec_psm_put_pub_key | Store a public key pair . This routine is not available in the DCE binary code. It is provided in DCE source for use by vendors. | |
| sec_psm_sign_data | Compute the signature of data using a specified signature algorithm . This routine is not available in the DCE binary code. It is provided in DCE source for use by vendors. | |
| sec_psm_update_pub_key | Update a public key in a personal security mechanism. . This routine is not available in the DCE binary code. It is provided in DCE source for use by vendors. | |
| sec_psm_verify_data | Verify signed data. This routine is not available in the DCE binary code. It is provided in DCE source for use by vendors. | |
| sec_pwd_mgmt_free_handle | Frees storage allocated for a password management handle | |
| sec_pwd_mgmt_gen_pwd | Generates a set of passwords | |
| sec_pwd_mgmt_get_val_type | Gets users password validation type | |
| sec_pwd_mgmt_setup | Sets up the user’s password policy information | |
| sec_rgy_acct_add | Adds an account for a login name | |
| sec_rgy_acct_admin_replace | Replaces administrative account data | |
| sec_rgy_acct_delete | Deletes an account | |
| sec_rgy_acct_get_projlist | Returns the projects in an account’s project list | |
| sec_rgy_acct_lookup | Returns data for a specified account | |
| sec_rgy_acct_passwd | Changes the password for an account | |
| sec_rgy_acct_rename | Changes an account login name | |
| sec_rgy_acct_replace_all | Replaces all account data for an account | |
| sec_rgy_acct_user_replace | Replaces user account data | |
| sec_rgy_attr_cursor_alloc | Allocates resources to a cursor used by sec_rgy_attr_lookup_by_id | |
| sec_rgy_attr_cursor_init | Initializes a cursor used by sec_rgy_attr_lookup_by_id | |
| sec_rgy_attr_cursor_release | Releases a cursor | |
| sec_rgy_attr_cursor_reset | Reinitializes a cursor | |
| sec_rgy_attr_delete | Deletes specified attributes for a specified object | |
| sec_rgy_attr_get_effective | Reads effective attributes by ID | |
| sec_rgy_attr_lookup_by_id | Reads a specified object’s attributes, expanding attribute sets into individual member attributes | |
| sec_rgy_attr_lookup_by_name | Reads a single attribute instance for a specific object | |
| sec_rgy_attr_lookup_no_expand | Reads a specified object’s attribute(s), without expanding attribute sets into individual member attributes | |
| sec_rgy_attr_sch_aclmgr_strings | Returns printable ACL strings associated with an ACL manager protecting a schema object | |
| sec_rgy_attr_sch_create_entry | Creates a schema entry | |
| sec_rgy_attr_sch_cursor_alloc | Allocates resources to a cursor used with sec_rgy_attr_sch_scan | |
| sec_rgy_attr_sch_cursor_init | Initializes and allocates a cursor used with sec_rgy_attr_sch_scan | |
| sec_rgy_attr_sch_cursor_release | Releases states associated with a cursor used by sec_rgy_attr_sch_scan | |
| sec_rgy_attr_sch_cursor_reset | Resets a cursor that has been allocated | |
| sec_rgy_attr_sch_delete_entry | Deletes a schema entry | |
| sec_rgy_attr_sch_get_acl_mgrs | Retrieves the manager types of the ACLs protecting the objects dominated by a named schema | |
| sec_rgy_attr_sch_lookup_by_id | Reads a schema entry identified by UUID | |
| sec_rgy_attr_sch_lookup_by_name | Reads a schema entry identified by name | |
| sec_rgy_attr_sch_scan | Reads a specified number of schema entries | |
| sec_rgy_attr_sch_update_entry | Updates a schema entry | |
| sec_rgy_attr_test_and_update | Updates specified attribute instances for a specified object only if a set of control attribute instances match the object’s existing attribute instances | |
| sec_rgy_attr_update | Creates and updates attribute instances for a specified object | |
| sec_rgy_auth_plcy_get_effective | Returns the effective authentication policy for an account | |
| sec_rgy_auth_plcy_get_info | Returns the authentication policy for an account | |
| sec_rgy_auth_plcy_set_info | Sets the authentication policy for an account | |
| sec_rgy_cell_bind | Binds to a registry in a cell | |
| sec_rgy_cursor_reset | Resets the registry database cursor | |
| sec_rgy_login_get_effective | Returns the effective login data for an account | |
| sec_rgy_login_get_info | Returns login information for an account | |
| sec_rgy_pgo_add | Adds a PGO item to the registry database | |
| sec_rgy_pgo_add_member | Adds a principal to a group or organization | |
| sec_rgy_pgo_delete | Deletes a PGO item from the registry database | |
| sec_rgy_pgo_delete_member | Removes a member from a group or organization | |
| sec_rgy_pgo_get_by_eff_unix_num | Returns the name and data for a PGO item identified by its effective UNIX number | |
| sec_rgy_pgo_get_by_id | Returns the name and data for a PGO item identified by its UUID | |
| sec_rgy_pgo_get_by_name | Returns the data for a named PGO item | |
| sec_rgy_pgo_get_by_unix_num | Returns the name and data for a PGO item identified by its UNIX ID | |
| sec_rgy_pgo_get_members | Returns the membership list for a specified group or organization or returns the set of groups in which the specified principal is a member | |
| sec_rgy_pgo_get_next | Returns the next PGO item in the registry database | |
| sec_rgy_pgo_id_to_name | Returns the name for a PGO item identified by its UUID | |
| sec_rgy_pgo_id_to_unix_num | Returns the UNIX number for a PGO item identified by its UUID | |
| sec_rgy_pgo_is_member | Checks group or organization membership | |
| sec_rgy_pgo_name_to_id | Returns the UUID for a named PGO item | |
| sec_rgy_pgo_name_to_unix_num | Returns the UNIX number for a PGO item identified by its name | |
| sec_rgy_pgo_rename | Changes the name of a PGO item in the registry database | |
| sec_rgy_pgo_replace | Replaces the data in an existing PGO item | |
| sec_rgy_pgo_unix_num_to_id | Returns the UUID for a PGO item identified by its UNIX number | |
| sec_rgy_pgo_unix_num_to_name | Returns the name for a PGO item identified by its UNIX number | |
| sec_rgy_plcy_get_effective | Returns the effective policy for an organization | |
| sec_rgy_plcy_get_info | Returns the policy for an organization | |
| sec_rgy_plcy_set_info | Sets the policy for an organization | |
| sec_rgy_properties_get_info | Returns registry properties | |
| sec_rgy_properties_set_info | Sets registry properties | |
| sec_rgy_site_bind | Binds to a registry site | |
| sec_rgy_site_bind_query | Binds to a registry query site | |
| sec_rgy_site_bind_update | Binds to a registry update site | |
| sec_rgy_site_binding_get_info | Returns information from the registry binding handle | |
| sec_rgy_site_close | Frees the binding handle for a registry server | |
| sec_rgy_site_get | Returns the string representation for a bound registry site | |
| sec_rgy_site_is_readonly | Checks whether a registry site is read-only | |
| sec_rgy_site_open | Binds to a registry site | |
| sec_rgy_site_open_query | Binds to a registry query site | |
| sec_rgy_site_open_update | Binds to a registry update site | |
| sec_rgy_unix_getgrgid | Returns a UNIX style group entry for the account matching the specified group ID | |
| sec_rgy_unix_getgrnam | Returns a UNIX style group entry for the account matching the specified group name | |
| sec_rgy_unix_getpwnam | Returns a UNIX style passwd entry for account matching the specified name | |
| sec_rgy_unix_getpwuid | Returns a UNIX style passwd entry for the account matching the specified UID | |
| sec_rgy_wait_until_consistent | Blocks the caller while prior updates are propagated to the registry replicas |
Section 3xds
Section 3xom
| omX_extract | ||
| omX_fill | ||
| omX_fill_oid | ||
| omX_object_to_string | ||
| omX_string_to_object | ||
| om_copy | ||
| om_copy_value | ||
| om_create | ||
| om_delete | ||
| om_get | ||
| om_instance | ||
| om_put | ||
| om_read | ||
| om_remove | ||
| om_write | ||
| xom_intro |
Section 4dfs
| BosConfig | Defines server processes to be monitored by the Basic OverSeer (BOS) Server | |
| BosLog | Contains messages generated by the Basic OverSeer (BOS) Server | |
| CacheInfo | Defines the initial configuration of the Cache Manager | |
| CacheItems | Records information about each V file in a disk cache | |
| DfsgwLog | Contains messages generated by the Gateway Server process of the DFS/NFS Secure Gateway | |
| FilesetItems | Records location mappings for filesets accessed by a Cache Manager using a disk cache | |
| FlLog | Contains messages generated by the Fileset Location Server | |
| FtLog | Contains messages generated by the Fileset Server | |
| NoAuth | Indicates that DFS authorization checking is disabled | |
| UpLog | Contains messages generated by the server portion of the Update Server | |
| Vn | Contains a chunk of data cached in a disk cache | |
| admin.bos | Contains the administrative list for the Basic OverSeer (BOS) Server | |
| admin.fl | Contains the administrative list for the Fileset Location (FL) Server | |
| admin.ft | Contains the administrative list for the Fileset Server | |
| admin.up | Contains the administrative list for the Update Server | |
| dfs_intro | Introduction to DFS files | |
| dfstab | Specifies DCE LFS aggregates and non-LFS partitions that can be exported |
Section 4xds
| xds.h | ||
| xds_intro | ||
| xdsbdcp.h | ||
| xdscds.h | ||
| xdsdme.h | ||
| xdsgds.h | ||
| xdsmdup.h | ||
| xdssap.h | ||
| xmhp.h | ||
| xmsga.h |
Section 4xom
| xom.h |
Section 5dce
| svcroute |
Section 5sec
| aud_audit_events | ||
| dts_audit_events | ||
| event_class | ||
| group_override | ||
| passwd_override | ||
| sec_audit_events | ||
| sec_intro | ||
| v5srvtab |
Section 8cds
Section 8dce
| account | A dcecp object that manages an account in the DCE Security Service | |
| acl | A dcecp object that manages DCE access control lists | |
| attrlist | A dcecp object that manipulates attribute lists | |
| aud | A dcecp object that manages the audit daemon on a DCE host | |
| audevents | A dcecp object that lists audit events on a DCE host | |
| audfilter | A dcecp object that manages the event filters on a DCE host | |
| audtrail | A dcecp object that converts the audit trail into a readable format | |
| cds | A dcecp object that represents a Cell Directory Service server | |
| cdsalias | A dcecp object that lets you manipulate cell names in CDS | |
| cdscache | ||
| cdsclient | A dcecp object that represents a Cell Directory Service client | |
| cell | A dcecp task object that operates on a DCE cell | |
| cellalias | A dcecp task object that manages cell name aliases | |
| clearinghouse | A dcecp object that manages a clearinghouse in CDS | |
| clock | A dcecp object that manages the clock on a local or remote host | |
| csrc | Builds a DCE character and code set registry on a host | |
| dce_config | Installs, configures, and starts up DCE | |
| dce_intro | Introduction to the cross-component DCE administration tools | |
| dcecp | Administrative interface for DCE management tasks | |
| dced | the DCE host daemon | |
| dcesetup | Configures and starts up DCE | |
| directory | A dcecp object that manages a name service directory | |
| dts | A dcecp object that manages a dtsd process | |
| endpoint | A dcecp object that manages endpoint information in local RPC endpoint maps | |
| getcellname | Gets the primary name of the cell | |
| getip | Gets a host’s IP address | |
| group | A dcecp object that manages a group in the DCE Security Service | |
| host | A dcecp task object that manages host information in a DCE cell | |
| hostdata | A dcecp object that manages a DCE host’s cell affiliation information | |
| keytab | A dcecp object that manages server passwords on DCE hosts | |
| ldap_addcell | ||
| link | A dcecp object that manages a soft link in CDS | |
| log | A dcecp object that manages serviceability routing and debug routing | |
| name | A dcecp object that compares and expands DCE names | |
| object | A dcecp object that manages an object in the DCE Cell Directory Service (CDS) | |
| organization | A dcecp object that manages an organization in the DCE Security Service | |
| principal | A dcecp object that manages a principal in the DCE Security Service | |
| registry | A dcecp object that manages a registry in the DCE Security Service | |
| rpcentry | A dcecp object that manages an RPC entry in the DCE Cell Directory Service | |
| rpcgroup | A dcecp object that manages an RPC group entry in CDS | |
| secval | A dcecp object that manages the security validation service on a host | |
| server | A dcecp object that manages DCE application servers | |
| user | A dcecp task object that manipulates user information in a DCE cell | |
| utc | A dcecp object that manipulates UTC timestamps | |
| uuid | A dcecp object that generates and compares UUIDs | |
| xattrschema | A dcecp object that manages schema information for ERAs |
Section 8dceadd
| rpcprofile | A dcecp object that manages an RPC profile entry in CDS |
Section 8dfs
| bos | Introduction to the bos command suite | |
| bos_addadmin | Adds a user, group, or server to an administrative list | [ bos addadmin ] |
| bos_addkey | Converts a string into a server encryption key and adds it to a keytab file | [ bos addkey ] |
| bos_apropos | Shows each help entry containing a specified string | [ bos apropos ] |
| bos_create | Creates a new process in the BosConfig file and starts it | [ bos create ] |
| bos_delete | Deletes server processes from the BosConfig file | [ bos delete ] |
| bos_gckeys | Removes obsolete server encryption keys from a keytab file | [ bos gckeys ] |
| bos_genkey | Generates a random key and adds it to a keytab file | [ bos genkey ] |
| bos_getdates | Lists time stamps on versions of binary files | [ bos getdates ] |
| bos_getlog | Examines the log file for a server process | [ bos getlog ] |
| bos_getrestart | Lists automatic restart times for server processes | [ bos getrestart ] |
| bos_help | Shows syntax of specified bos commands or lists functional descriptions of all bos commands | [ bos help ] |
| bos_install | Installs new versions of binary files | [ bos install ] |
| bos_lsadmin | Lists the users, groups, and servers from an administrative list | [ bos lsadmin ] |
| bos_lscell | Lists the cell in which the BOS Server is running | [ bos lscell ] |
| bos_lskeys | Displays server encryption key information from a keytab file | [ bos lskeys ] |
| bos_prune | Removes old binary and core files from dcelocal/bin and dcelocal/var/dfs/adm | [ bos prune ] |
| bos_restart | Restarts processes on a server machine | [ bos restart ] |
| bos_rmadmin | Removes a user, group, or server from an administrative list | [ bos rmadmin ] |
| bos_rmkey | Removes server encryption keys from a keytab file | [ bos rmkey ] |
| bos_setauth | Enables or disables DFS authorization checking for all DFS server processes on a machine | [ bos setauth ] |
| bos_setrestart | Sets the date and time at which the BOS Server restarts all processes or only those with new binaries | [ bos setrestart ] |
| bos_shutdown | Stops processes without changing their status flags in the BosConfig file | [ bos shutdown ] |
| bos_start | Starts processes after setting their status flags to Run in the BosConfig file and in memory | [ bos start ] |
| bos_startup | Starts processes by changing their status flags to Run in memory without changing their status flags in the BosConfig file | [ bos startup ] |
| bos_status | Displays the statuses of server processes on a server machine | [ bos status ] |
| bos_stop | Stops processes after changing their status flags in the BosConfig file to NotRun | [ bos stop ] |
| bos_uninstall | Installs the former versions of binary files | [ bos uninstall ] |
| bosserver | Initializes the Basic OverSeer (BOS) Server process | |
| butc | Initializes a Tape Coordinator process | |
| cm | Introduction to the cm command suite | |
| cm_apropos | Shows each help entry containing a specified string | [ cm apropos ] |
| cm_checkfilesets | Forces the Cache Manager to update fileset-related information | [ cm checkfilesets ] |
| cm_flush | Forces the Cache Manager to discard data cached from specified files or directories | [ cm flush ] |
| cm_flushfileset | Forces the Cache Manager to discard data cached from filesets that contain specified files or directories | [ cm flushfileset ] |
| cm_getcachesize | Shows the current size of the cache, the amount of cache in use, and the type of cache | [ cm getcachesize ] |
| cm_getdevok | Shows whether device files from specified filesets are honored by the Cache Manager | [ cm getdevok ] |
| cm_getsetuid | Shows the status of setuid programs from specified filesets | [ cm getsetuid ] |
| cm_help | Shows syntax of specified cm commands or lists functional descriptions of all cm commands | [ cm help ] |
| cm_lscellinfo | Shows database server machines in cells known to the Cache Manager | [ cm lscellinfo ] |
| cm_lsstores | Lists filesets that contain data the Cache Manager cannot write back to a File Server machine | [ cm lsstores ] |
| cm_resetstores | Cancels attempts by the Cache Manager to contact unavailable File Server machines and discards all data the Cache Manager cannot store to such machines | [ cm resetstores ] |
| cm_setcachesize | Sets the size of a disk cache | [ cm setcachesize ] |
| cm_setdevok | Specifies whether device files from specified filesets are honored by the Cache Manager | [ cm setdevok ] |
| cm_setsetuid | Enables or disables setuid programs from specified filesets | [ cm setsetuid ] |
| cm_statservers | Checks the statuses of File Server machines | [ cm statservers ] |
| cm_sysname | Reports or sets the CPU/OS type | [ cm sysname ] |
| cm_whereis | Reports names of File Server machines that house specified files or directories | [ cm whereis ] |
| dfs_intro | Introduction to the DFS commands | |
| dfs_login | Authenticates a user to DCE for access to DFS via the DFS/NFS Secure Gateway | |
| dfs_logout | Cancels a user’s authenticated access to DFS via the DFS/NFS Secure Gateway | |
| dfsbind | Provides user-space information to the Cache Manager and File Exporter | |
| dfsd | Initializes the DFS Cache Manager and starts related daemons | |
| dfsexport | Exports DCE LFS aggregates and non-LFS partitions to the DCE namespace | |
| dfsgw | Introduction to the dfsgw command suite used with the DFS/NFS Secure Gateway | |
| dfsgw_add | Adds an entry to the authentication table on the Gateway Server machine | [ dfsgw add ] |
| dfsgw_apropos | Shows each help entry that contains a specified string | [ dfsgw apropos ] |
| dfsgw_delete | Removes an entry from the authentication table on the Gateway Server machine | [ dfsgw delete ] |
| dfsgw_help | Shows syntax of specified dfsgw commands or lists functional descriptions of all dfsgw commands | [ dfsgw help ] |
| dfsgw_list | Lists all entries in the authentication table on the Gateway Server machine | [ dfsgw list ] |
| dfsgw_query | Queries the authentication table on the Gateway Server machine | [ dfsgw query ] |
| dfsgwd | Initializes the Gateway Server process for the DFS/NFS Secure Gateway | |
| dfstrace | Introduction to the dfstrace command suite | |
| dfstrace_apropos | Shows each help entry containing a specified string | [ dfstrace apropos ] |
| dfstrace_clear | Clears server process or kernel trace logs | [ dfstrace clear ] |
| dfstrace_dump | Dumps server process or kernel trace logs | [ dfstrace dump ] |
| dfstrace_help | Shows syntax of specified dfstrace commands or lists functional descriptions of all dfstrace commands | [ dfstrace help ] |
| dfstrace_lslog | Lists information on server process or kernel trace logs | [ dfstrace lslog ] |
| dfstrace_lsset | Lists server process or kernel event sets and their states | [ dfstrace lsset ] |
| dfstrace_setlog | Sets the size of the indicated log | [ dfstrace setlog ] |
| dfstrace_setset | Sets the state of server process or kernel event sets | [ dfstrace setset ] |
| flserver | Initializes the Fileset Location (FL) Server | |
| fts | Introduction to the fts command suite | |
| fts_addsite | Adds a replication site for a read/write DCE LFS fileset | [ fts addsite ] |
| fts_aggrinfo | Displays disk space information about aggregates and partitions exported from a File Server machine | [ fts aggrinfo ] |
| fts_apropos | Shows each help entry containing a specified string | [ fts apropos ] |
| fts_clone | Creates a backup version of a read/write DCE LFS fileset | [ fts clone ] |
| fts_clonesys | Creates backup versions of all indicated read/write DCE LFS filesets | [ fts clonesys ] |
| fts_create | Creates a read/write DCE LFS fileset and associated FLDB entry | [ fts create ] |
| fts_crfldbentry | Creates a fileset entry in the FLDB | [ fts crfldbentry ] |
| fts_crmount | Creates a mount point for a fileset | [ fts crmount ] |
| fts_crserverentry | Creates a server entry in the FLDB | [ fts crserverentry ] |
| fts_delete | Removes a specified read/write or backup version of a DCE LFS fileset | [ fts delete ] |
| fts_delfldbentry | Removes a specified entry from the FLDB | [ fts delfldbentry ] |
| fts_delmount | Removes a mount point | [ fts delmount ] |
| fts_delserverentry | Deletes a server entry from the FLDB | [ fts delserverentry ] |
| fts_dump | Converts a fileset to a bytestream format and places it in a file | [ fts dump ] |
| fts_edserverentry | Edits a server entry in the FLDB | [ fts edserverentry ] |
| fts_help | Shows syntax of specified fts commands or lists functional descriptions of all fts commands | [ fts help ] |
| fts_lock | Locks a fileset entry in the FLDB | [ fts lock ] |
| fts_lsaggr | Lists all exported aggregates and partitions on a File Server machine | [ fts lsaggr ] |
| fts_lsfldb | Shows information from fileset entries in the FLDB | [ fts lsfldb ] |
| fts_lsft | Lists fileset information from both the fileset header and the FLDB entry | [ fts lsft ] |
| fts_lsheader | Shows information from fileset headers | [ fts lsheader ] |
| fts_lsmount | Lists the filesets associated with mount points | [ fts lsmount ] |
| fts_lsquota | Shows quota and quota usage information for filesets and disk size and usage information for aggregates or partitions | [ fts lsquota ] |
| fts_lsreplicas | Displays the statuses of DCE LFS fileset replicas | [ fts lsreplicas ] |
| fts_lsserverentry | Lists a server entry from the FLDB | [ fts lsserverentry ] |
| fts_move | Moves a read/write DCE LFS fileset to another site | [ fts move ] |
| fts_release | Initiates Release Replication by placing a read-only version of a read/write DCE LFS fileset at the local site | [ fts release ] |
| fts_rename | Renames a fileset | [ fts rename ] |
| fts_restore | Converts a dump file from bytestream format to fileset format and places it in the file system | [ fts restore ] |
| fts_rmsite | Removes a replication site and read-only DCE LFS fileset | [ fts rmsite ] |
| fts_setquota | Sets the maximum quota for a read/write DCE LFS fileset | [ fts setquota ] |
| fts_setrepinfo | Sets or changes replication type and parameters for a read/write DCE LFS fileset | [ fts setrepinfo ] |
| fts_statftserver | Reports on the activity of a Fileset Server | [ fts statftserver ] |
| fts_statrepserver | Displays the status of a Replication Server | [ fts statrepserver ] |
| fts_syncfldb | Synchronizes FLDB entries to match their fileset headers | [ fts syncfldb ] |
| fts_syncserv | Synchronizes fileset headers to match their FLDB entries | [ fts syncserv ] |
| fts_unlock | Unlocks an entry in the FLDB | [ fts unlock ] |
| fts_unlockfldb | Unlocks all specified locked entries in the FLDB | [ fts unlockfldb ] |
| fts_update | Requests an immediate update of replicas of a read/write DCE LFS fileset that uses Scheduled Replication | [ fts update ] |
| fts_zap | Removes a DCE LFS fileset from its site without updating the FLDB | [ fts zap ] |
| ftserver | Initializes the Fileset Server | |
| fxd | Initializes the File Exporter and starts associated kernel daemons | |
| scout | Initializes the scout program | |
| udebug | Displays Ubik status information relevant to the specified DFS database server | |
| upclient | Initializes the client portion of the Update Server | |
| upserver | Initializes the server portion of the Update Server |
Section 8dts
| advertise | ||
| change | ||
| create | ||
| delete | ||
| disable | ||
| dts_intro | ||
| dtscp | ||
| dtsd | ||
| dtsdate | ||
| enable | ||
| exit | ||
| help | ||
| quit | ||
| set | ||
| show | ||
| synchronize | ||
| unadvertise | ||
| update |
Section 8rpc
Section 8sdce
| hostvar | A dcecp task object that manages the security binary compatibility attributes |