Unix/Linux Go Back    

RedHat 9 (Linux i386) - man page for sasl_server_new (redhat section 3)

Linux & Unix Commands - Search Man Pages
Man Page or Keyword Search:   man
Select Man Page Set:       apropos Keyword Search (sections above)

sasl_server_new(16 May 2001)					     sasl_server_new(16 May 2001)

       sasl_server_new - Create a new server authentication object

       #include <sasl/sasl.h>

       int sasl_server_new(const char *service,
		       const char *serverFQDN,
		       const char *user_realm,
		       const char *iplocalport,
		       const char *ipremoteport,
		       const sasl_callback_t *callbacks,
		       unsigned secflags,
		       sasl_conn_t ** pconn);

       sasl_server_new() creates a new SASL context. This context will be used for all SASL calls
       for one connection. It handles both authentication and  integrity/encyption  layers  after

       service is the registered name of the service (usually the protocol name) using SASL (e.g.

       serverFQDN is the fully qualified server domain name.  NULL means use gethostname().  This
       is useful for multi-homed servers.

       user_realm  is  the  domain  of	the  user  agent.  This is usually not necessary (NULL is

       iplocalport is the IP and port of the local side of the connection, or NULL.  If  iplocal-
       port is NULL it will disable mechanisms that require IP address information.  This strings
       must be in one of the following	formats:  "a.b.c.d;port"  (IPv4),  "e:f:g:h:i:j:k:l;port"
       (IPv6), or "e:f:g:h:i:j:a.b.c.d;port" (IPv6)

       ipremoteport  is  the IP and port of the remote side of the connection, or NULL (see iplo-

       secflags are security flags (see below)

       pconn is a pointer to the conection context allocated by the library. This structure  will
       be used for all future SASL calls for this connection.

       Security Flags

       Security flags that may be passed to sasl_server_new() include

	       Don't permit mechanisms susceptible to simple passive attack (e.g., PLAIN, LOGIN)

	       Protection  from  active  (non-dictionary) attacks during authentication exchange.
	       Authenticates server.

	       Don't permit mechanisms susceptible to passive dictionary attack

	       Require forward secrecy between sessions. (breaking one won't help break next)

	       Require mechanisms which pass client credentials, and allow mechanisms  which  can
	       pass credentials to do so.

       sasl_server_new()  returns  an  integer	which corresponds to one of the SASL error codes.
       SASL_OK is the only one that indicates success. All  others  indicate  errors  and  should
       either be handled or the authentication session should be quit.

       RFC 2222

       sasl(3),  sasl_errors(3),  sasl_server_init(3), sasl_server_start(3), sasl_server_step(3),

SASL man pages				       SASL		     sasl_server_new(16 May 2001)
Unix & Linux Commands & Man Pages : ©2000 - 2018 Unix and Linux Forums

All times are GMT -4. The time now is 11:27 PM.