Previous topic |
Next topic |
Contents |
Contact z/OS |
Library |
PDF
X Window System routines: X authorization routines z/OS Communications Server: IP Programmer's Guide and Reference SC27-3659-02 |
|||||||||||||||||
The MIT X Authorization routines are included in SEZAX11L. These routines are used to deal with X authorization data in X clients. Table 1 lists the X authorization routines and provides a short description of each routine.
|
Copyright IBM Corporation 1990, 2014
|