Lines Matching +full:quality +full:- +full:of +full:- +full:service

1 .\" -*- nroff -*-
9 .\" 1. Redistributions of source code must retain the above copyright
10 .\" notice, this list of conditions and the following disclaimer.
12 .\" notice, this list of conditions and the following disclaimer in the
17 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
21 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
22 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34 .Nd Check a MIC against a message; verify integrity of a received message
61 parameter allows a message recipient to determine the strength of
64 Since some application-level protocols may wish to use tokens emitted
68 implementations must support the calculation and verification of MICs
69 over zero-length messages.
73 routine is an obsolete variant of
76 compatibility with applications using the GSS-API V1 interface.
78 both to allow GSS-API V1 applications to link
80 obsolete versions of this routine and its current form.
82 .Bl -tag -width ".It context_handle"
92 Quality of protection gained from MIC.
98 .Bl -tag -width ".It GSS_S_CONTEXT_EXPIRED"
116 but has been verified out of sequence;
121 but has been verified out of sequence;
131 .Bl -tag -width ".It RFC 2743"
133 Generic Security Service Application Program Interface Version 2, Update 1
135 Generic Security Service API Version 2 : C-bindings
147 This document and translations of it may be copied and furnished to
150 and distributed, in whole or in part, without restriction of any
155 Internet organizations, except as needed for the purpose of
167 BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
168 HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF