OSF DCE Application Development Guide--Core Components
OSF DCE Application Development Guide—Core Components
28.3.2 Creating and Managing Attribute Instances .......28-15
28.3.3 Reading Attribute Instances ............28-17
28.4 The Attribute Trigger Facility ..............28-19
28.4.1 Defining an Attribute Trigger/Attribute
Association ................. 28-20
28.4.2 Trigger Binding ...............28-21
28.4.3 Access Control on Attributes with Triggers .......28-23
28.5 Calls that Access Attribute Triggers ............28-23
28.5.1 Using sec_attr_trig_cursor_t with
sec_attr_trig_query( ) .............. 28-23
28.5.2 The sec_rgy_attr_trig_query() and sec_rgy_attr_trig_update( )
Calls ................... 28-24
28.5.3 The priv_attr_triq_query( ) Call ........... 28-24
28.6 The DCE Attribute API ................28-24
28.7 Macros to Aid Extended Attribute Programming ........28-26
28.7.1 Macros to Access Binding Fields ..........28-26
28.7.2 Macros to Access Schema Entry Fields ........28-28
28.7.3 Macros to Access Attribute Instance Fields .......28-29
28.7.4 Binding Data Structure Size Calculation Macros ......28-32
28.7.5 Schema Entry Data Structure Size Calculation
Macros ..................28-32
28.7.6 Attribute Instance Data Structure Size Calculation
Macros ..................28-33
28.7.7 Binding Semantic Check Macros ..........28-33
28.7.8 Schema Entry Semantic Check Macros ........28-35
28.7.9 Attribute Instance Semantic Check Macros .......28-35
28.7.10 Schema Entry Flag Set and Unset Macros ........28-36
28.7.11 Schema Trigger Entry Flag Check Macros .......28-37
28.8 Utilities to Use with Extended Attribute Calls .........28-38
Chapter 29. The Login API .................... 29-1
29.1 Establishing Login Contexts .............. 29-1
29.1.1 Validating the Login Context and Certifying the Security
Server .................. 29-2
29.1.2 Validating the Login Context Without Certifying the Security
Server .................. 29-3
29.1.3 Example of a System Login Program ......... 29-3
29.2 Context Inheritance ................. 29-4
29.2.1 The Initial Context .............. 29-4
29.2.2 Private Contexts ............... 29-4
29.3 Handling Expired Certificates of Identity .......... 29-5
29.4 Importing and Exporting Contexts ............ 29-6
29.5 Changing a Groupset ................ 29-6
29.6 Miscellaneous Login API Functions ............ 29-7
29.6.1 Getting the Current Context ............ 29-7
29.6.2 Getting Information from a Login Context ....... 29-7
29.6.3 Getting Password and Group Information for Local Process
Identities ................. 29-8
29.6.4 Releasing and Purging a Context .......... 29-8
xiv Tandem Computers Incorporated 124245










