OSF DCE Application Development Guide--Introduction and Style Guide
Index
UUID, 1-4, 1-17
and incoming RPCs,
1-21
generating, 1-10
version number, 1-11, 1-19
compatibility, 1-12
interface definition language (IDL),
1-5
interface specification, 1-7
ISO_LATIN_1 character set, 6-9
ISO_MULTI_LINGUAL character
set, 6-9
ISO_UCS character set, 6-9
is_valid_principal( ),3-15
K
Kerberos shared secret key protocol,
3-4
keys
local copies of user keys, 3-7
maintenance of by server,
3-6
managing server key, 1-18,
3-9, 3-11
secret key, 1-18
should not be kept in
program memory,
3-8
where server obtains its key,
3-9
keytab file, 3-7
how created, 3-9
permissions needed to
access, 3-9
L
local login, 3-9
login context, 1-18, 3-11
client, retrieving, 1-28
default, 3-8
definition of, 3-7
handle, 1-28
inheriting, 3-6, 3-7, 3-8
represented by
sec_login_handle_t,
3-7
longjmp( ),2-14
M
malloc( ), 2-4, 3-15
manager
entry point vectors, 1-18,
1-19
type, 1-17
type UUID, use of, 3-24
mappings, IDL to C, 6-6
marshalling pointers, 6-11, 6-18
mask entries, in ACL, defined, 3-20
mask_obj ACL entry type, 3-22
maybe semantic attribute, 6-3
memory, allocating new, 6-10
memory management, parameter, 6-4
message catalogs, 1-13, 7-2
message generation, 7-3
multithreadedness, 1-4
advantages and
disadvantages of, 2-2
and blocking, 2-2
and multiprocessors, 2-2
and single processors, 2-2
and unsafe libraries, 2-7
complexity cost of, 2-3
in clients, 2-2
in servers, 2-2
behavior of, 1-34
specifying, 1-23
questions to consider when
adding to
applications, 2-3
mutexes, 2-6
and locking sequences, 2-6
and shared objects, 2-6
and threads cancellation,
2-12
when they should be used,
2-11
124246 Tandem Computers Incorporated Index−5










