ProgrammingThis forum is for all programming questions.
The question does not have to be directly related to Linux and any language is fair game.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
how does callback works ??
is it common among authoritization and authentication stuffs for master/slaves communication ??
what are the commonly used "encrytion" libraries just for the authoritization and authentication part ??
Callback functions work by passing and saving a pointer to a function that is called on certain events. OpenSSL, for example, is used for many cryptography related stuff, not just authentication.
Are you referring to callback functions, or the practice of having modems return a call to a known host instead of connecting directly?
A callback function is when you write a function to do something, but it is the operating system or sysem library that calls your function. There will usually be a standard method of registering your function so that it will be run. This is a common method of having drivers run userland code, and is also used a lot in GUI frameworks.
is it ok if using i only use libshadow/libcrypt for "on-disk" type of password challenge for simple program ??
i still have problem figuring out how people do their tunneling ... thanks for your good suggestion , you changed your sig again ... cool ^_^
to jschiwal , thanks for the link ... i usually dont like "wikipedia" kinds of things , but this time ... hmm ... they are not that bad after all ... thanks for the good advice i got my mockup running(at least) now after reading that link ...
is it ok if using i only use libshadow/libcrypt for "on-disk" type of password challenge for simple program ??
Well yes. You set the program setuid, ask an username, then you do a getspnam() or getpwnam() on systems that return the encrypted password through it. You only have to ask for the password, encrypt it, and then compare it with the hashed version. For the salt to use with crypt(), use the first bytes (it varies from system to system).
Quote:
i still have problem figuring out how people do their tunneling ...
Tunneling through SSL ? I still haven't tried it. Browse openssl.org for their howto. There must be tutorials on the web. If you find good stuff, let me know
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.