From bac@lessa.cc.purdue.edu Mon Oct 7 09:35:56 1996
Received: from MIT.EDU (PACIFIC-CARRIER-ANNEX.MIT.EDU [18.69.0.28]) by rt-11.MIT.EDU (8.7.5/8.7.3) with SMTP id JAA09417 for <bugs@RT-11.MIT.EDU>; Mon, 7 Oct 1996 09:35:55 -0400
Received: from lessa.cc.purdue.edu by MIT.EDU with SMTP
id AA29673; Mon, 7 Oct 96 09:35:45 EDT
Received: from lessa.cc.purdue.edu (localhost [127.0.0.1]) by lessa.cc.purdue.edu (8.7.5/8.6.12) with ESMTP id IAA08328 for <krb5-bugs@athena.mit.edu>; Mon, 7 Oct 1996 08:35:06 -0500 (EST)
Message-Id: <199610071335.IAA08328@lessa.cc.purdue.edu>
Date: Mon, 07 Oct 1996 08:35:05 -0500
From: Beth Chaney <bac@lessa.cc.purdue.edu>
To: krb5-bugs@MIT.EDU
Subject: Kerberos V5 Documentation
State-Changed-From-To: open-closed
State-Changed-By: tlyu
State-Changed-When: Wed Oct 9 12:37:59 1996
State-Changed-Why:
Retracted by user
have been unable to find any documentation (man pages or otherwise) on
the functions which are to be used when writing Kerberos client applications.
I have wandered through the Kerberos library and sample source code; however,
the code contains few comments. Is there such information available?
Thanks in advance.
Beth
-------------------------------------------------------------------------
Beth A. Chaney Purdue University Computing Center
Purdue University email:bac@cc.purdue.edu
1408 Mathematical Sciences Building phone:(317)494-1787
West Lafayette, IN 47907-1408 fax :(317)494-0566
Received: from MIT.EDU (PACIFIC-CARRIER-ANNEX.MIT.EDU [18.69.0.28]) by rt-11.MIT.EDU (8.7.5/8.7.3) with SMTP id JAA09417 for <bugs@RT-11.MIT.EDU>; Mon, 7 Oct 1996 09:35:55 -0400
Received: from lessa.cc.purdue.edu by MIT.EDU with SMTP
id AA29673; Mon, 7 Oct 96 09:35:45 EDT
Received: from lessa.cc.purdue.edu (localhost [127.0.0.1]) by lessa.cc.purdue.edu (8.7.5/8.6.12) with ESMTP id IAA08328 for <krb5-bugs@athena.mit.edu>; Mon, 7 Oct 1996 08:35:06 -0500 (EST)
Message-Id: <199610071335.IAA08328@lessa.cc.purdue.edu>
Date: Mon, 07 Oct 1996 08:35:05 -0500
From: Beth Chaney <bac@lessa.cc.purdue.edu>
To: krb5-bugs@MIT.EDU
Subject: Kerberos V5 Documentation
Show quoted text
>Number: 78
>Category: krb5-doc
>Synopsis: Kerberos V5 Documentation
>Confidential: yes
>Severity: serious
>Priority: medium
>Responsible: gnats-admin
>State: closed
>Class: sw-bug
>Submitter-Id: unknown
>Arrival-Date: Mon Oct e 09:36:01 EDT 1996
>Last-Modified: Wed Oct e 12:38:34 EDT 1996
>Originator:
>Organization:
>Release:
>Environment:
>Description:
>How-To-Repeat:
>Fix:
>Audit-Trail:
>Category: krb5-doc
>Synopsis: Kerberos V5 Documentation
>Confidential: yes
>Severity: serious
>Priority: medium
>Responsible: gnats-admin
>State: closed
>Class: sw-bug
>Submitter-Id: unknown
>Arrival-Date: Mon Oct e 09:36:01 EDT 1996
>Last-Modified: Wed Oct e 12:38:34 EDT 1996
>Originator:
>Organization:
>Release:
>Environment:
>Description:
>How-To-Repeat:
>Fix:
>Audit-Trail:
State-Changed-From-To: open-closed
State-Changed-By: tlyu
State-Changed-When: Wed Oct 9 12:37:59 1996
State-Changed-Why:
Retracted by user
Show quoted text
>Unformatted:
I have obtained the Kerberos V5B6 sources from your FTP site; however, I have been unable to find any documentation (man pages or otherwise) on
the functions which are to be used when writing Kerberos client applications.
I have wandered through the Kerberos library and sample source code; however,
the code contains few comments. Is there such information available?
Thanks in advance.
Beth
-------------------------------------------------------------------------
Beth A. Chaney Purdue University Computing Center
Purdue University email:bac@cc.purdue.edu
1408 Mathematical Sciences Building phone:(317)494-1787
West Lafayette, IN 47907-1408 fax :(317)494-0566