Next: Acknowledgements, Previous: Reference Manual, Up: Top [Contents][Index]
This chapter describes all the publicly available functions in the library.
• Preparation | What you should do before using the library. | |
• Initialization Functions | Creating library handle, configuration file. | |
• Ticket Set Functions | High-level ticket management functions. | |
• AP-REQ and AP-REP Functions | Client/Server authentication functions. | |
• SAFE and PRIV Functions | Client/Server session data functions. | |
• Ticket Functions | Medium-level ticket manipulation functions. | |
• AS Functions | Medium-level initial authentication functions. | |
• TGS Functions | Medium-level authentication functions. | |
• Ticket (ASN.1) Functions | Low-level Ticket functions. | |
• AS/TGS Functions | Low-level KDC functions; AS and TGS. | |
• Authenticator Functions | Low-level authenticator functions. | |
• KRB-ERROR Functions | Low-level KRB-ERROR functions. | |
• Cryptographic Functions | Low-level cryptographic functions. | |
• X.509 Functions | Utility functions for X.509 support. | |
• Utility Functions | Utilities for use in the global context. | |
• ASN.1 Functions | Perform low-level ASN.1 manipulations. | |
• Error Handling | Error codes and such. | |
• Examples | Example code. | |
• Kerberos Database Functions | The Shisa generic database interface. | |
• Generic Security Service | If you want to use the GSS API instead. |
Next: Acknowledgements, Previous: Reference Manual, Up: Top [Contents][Index]