tail head cat sleep
QR code linking to this page

Manual Pages  — RPC_CLNT_AUTH


auth_destroy, authnone_create, authsys_create, authsys_create_default – library routines for client side remote procedure call authentication



Standard C Library (libc, -lc)


#include <rpc/rpc.h>

auth_destroy(AUTH *auth);


authsys_create(const char *host, const uid_t uid, const gid_t gid, const int len, const gid_t *aup_gids);



These routines are part of the RPC library that allows C language programs to make procedure calls on other machines across the network, with desired authentication.

These routines are normally called after creating the CLIENT handle. The cl_auth field of the CLIENT structure should be initialized by the AUTH structure returned by some of the following routines. The client's authentication information is passed to the server when the RPC call is made.

Only the NULL and the SYS style of authentication is discussed here.


  A function macro that destroys the authentication information associated with auth. Destruction usually involves deallocation of private data structures. The use of auth is undefined after calling auth_destroy().
  Create and return an RPC authentication handle that passes nonusable authentication information with each remote procedure call. This is the default authentication used by RPC.
  Create and return an RPC authentication handle that contains AUTH_SYS authentication information. The host argument is the name of the machine on which the information was created; uid is the user's user ID; gid is the user's current group ID; len and aup_gids refer to a counted array of groups to which the user belongs.
  Call authsys_create() with the appropriate arguments.


rpc(3), rpc_clnt_calls(3), rpc_clnt_create(3)

RPC_CLNT_AUTH (3) May 7, 1993

tail head cat sleep
QR code linking to this page

Please direct any comments about this manual page service to Ben Bullock. Privacy policy.

Our grievance is not just against Unix itself, but against the cult of Unix zealots who defend and nurture it. They take the heat, disease, and pestilence as givens, and, as ancient shamans did, display their wounds, some self-inflicted, as proof of their power and wizardry. We aim, through bluntness and humor, to show them that they pray to a tin god, and that science, not religion, is the path to useful and friendly technology.
— The Unix Haters' handbook