Sorry for the 'broadcast', but I'm looking for some source code that shows how GSS 'works' in real-world applications, as well as opinions on how good it is. Dave Merriman This is a test (3 UUE lines) of the unconstitutional ITAR - 1/713th of the PGP executable. See below for getting YOUR chunk! ------------------ PGP.ZIP Part [015/713] ------------------- M=$<(&L`#*IPP",(G6(,,S,`P](<2RWU96XCW86/JBYV8A\D8@X'HB_9H#&\X MX'PCUB.,13B"X8`R?^J-:UB.M_`U\>[#)BS&5$0C,Y#^1CS>1`\T1QTXX6!3 M8H,),S$8G>&.WP(8IRA`-M['+`Q%&_C"">5-F%LX@<_Q$;*P'',Q$Z/AA[8M ------------------------------------------------------------- for next chunk to export --> http://dcs.ex.ac.uk/~aba/export/ <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> My web page: http://www.geopages.com/CapitolHill/1148
Take a look at the kerberos 5 sources. You can grab krb5 beta 5 from MIT: ftp://athena-dist.mit.edu/pub/ATHENA/kerberos Read the appropriate README file for source download instructions -derek
participants (2)
-
David K. Merriman -
Derek Atkins