sasl_server_new man page on IRIX

Man page or keyword search:  
man Server   31559 pages
apropos Keyword Search (all sections)
Output format
IRIX logo
[printable version]

sasl_server_new(16 May 2001)	     sasl_server_new(16 May 2001)

NAME
       sasl_server_new	-  Create  a  new  server  authentication
       object

SYNOPSIS
       #include <sasl/sasl.h>

       int sasl_server_new(const char *service,
		       const char *serverFQDN,
		       const char *user_realm,
		       const char *iplocalport,
		       const char *ipremoteport,
		       const sasl_callback_t *callbacks,
		       unsigned secflags,
		       sasl_conn_t ** pconn);

DESCRIPTION
       sasl_server_new() creates a new SASL context. This context
       will  be	 used  for  all SASL calls for one connection. It
       handles both authentication and integrity/encyption layers
       after authentication.

       service is the registered name of the service (usually the
       protocol name) using SASL (e.g. "imap").

       serverFQDN is the  fully	 qualified  server  domain  name.
       NULL  means  use gethostname().	This is useful for multi-
       homed servers.

       user_realm is the domain of the user agent. This	 is  usu-
       ally not necessary (NULL is default)

       iplocalport  is	the  IP and port of the local side of the
       connection, or NULL.  If iplocalport is NULL it will  dis-
       able mechanisms that require IP address information.  This
       strings	must  be  in  one  of  the   following	 formats:
       "a.b.c.d;port"  (IPv4),	"e:f:g:h:i:j:k:l;port" (IPv6), or
       "e:f:g:h:i:j:a.b.c.d;port" (IPv6)

       ipremoteport is the IP and port of the remote side of  the
       connection, or NULL (see iplocalport)

       secflags are security flags (see below)

       pconn  is  a pointer to the conection context allocated by
       the library. This structure will be used	 for  all  future
       SASL calls for this connection.

       Security Flags

       Security	 flags	that  may  be passed to sasl_server_new()
       include

       NOPLAINTEXT
	       Don't permit mechanisms susceptible to simple pas-
	       sive attack (e.g., PLAIN, LOGIN)

       NOACTIVE
	       Protection  from	 active	 (non-dictionary) attacks
	       during  authentication  exchange.    Authenticates
	       server.

       NODICTIONARY
	       Don't  permit  mechanisms  susceptible  to passive
	       dictionary attack

       FORWARD_SECURITY
	       Require forward secrecy between sessions.  (break-
	       ing one won't help break next)

       PASS_CREDENTIALS
	       Require	mechanisms which pass client credentials,
	       and allow mechanisms which can pass credentials to
	       do so.

RETURN VALUE
       sasl_server_new()  returns an integer which corresponds to
       one of the SASL error codes. SASL_OK is the only one  that
       indicates  success.  All others indicate errors and should
       either be handled or the authentication session should  be
       quit.

CONFORMING TO
       RFC 2222

SEE ALSO
       sasl(3),	       sasl_errors(3),	     sasl_server_init(3),
       sasl_server_start(3), sasl_server_step(3), sasl_setprop(3)

SASL man pages		       SASL  sasl_server_new(16 May 2001)
[top]

List of man pages available for IRIX

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net