Lines Matching +full:per +full:- +full:context
1 .\" -*- nroff -*-
34 GSS-API Library (libgssapi, -lgssapi)
42 Typically, GSS-API callers will be application protocols into which
44 provided by the GSS-API.
45 The GSS-API allows a caller application to authenticate a principal
49 on a per-message basis.
51 There are four stages to using the GSS-API:
52 .Bl -tag -width "a)"
61 context using their credentials.
62 The security context is a pair of GSS-API data structures that contain
63 shared state information, which is required in order that per-message
66 a security context are cryptographic keys,
68 As part of the establishment of a security context,
69 the context initiator is authenticated to the responder,
80 security context,
81 certain GSS-API calls will return a token data structure,
84 The caller of such a GSS-API routine is responsible for transferring
88 corresponding GSS-API routine which will decode the token and extract
90 updating the security context state information accordingly.
92 Per-message services are invoked to apply either:
96 which are treated by GSS-API as arbitrary octet-strings.
98 call the appropriate GSS-API routine (gss_get_mic or gss_wrap) to
100 specifying the appropriate security context,
103 protected by gss_get_mic, the accompanying message-data) to the
109 each application calls a GSS-API routine to delete the security
110 context.
115 .Sh GSS-API ROUTINES
116 This section lists the routines that make up the GSS-API,
119 GSS-API Credential-management Routines:
120 .Bl -tag -width "gss_inquire_cred_by_mech"
122 Assume a global identity; Obtain a GSS-API credential handle for
123 pre-existing credentials.
129 Obtain per-mechanism information about a credential.
134 GSS-API Context-Level Routines:
135 .Bl -tag -width "gss_inquire_cred_by_mech"
137 Initiate a security context with a peer application
139 Accept a security context initiated by a peer application
141 Discard a security context
143 Process a token on a security context from a peer application
145 Determine for how long a context will remain valid
147 Obtain information about a security context
149 Determine token-size limit for
151 on a context
153 Transfer a security context to another process
155 Import a transferred context
158 GSS-API Per-message Routines:
159 .Bl -tag -width "gss_inquire_cred_by_mech"
174 GSS-API Name manipulation Routines:
175 .Bl -tag -width "gss_inquire_cred_by_mech"
177 Convert a contiguous string name to internal-form
179 Convert internal-form name to text
181 Compare two internal-form names
183 Discard an internal-form name
185 List the name-types supported by the specified mechanism
187 List mechanisms that support the specified name-type
196 GSS-API Miscellaneous Routines
197 .Bl -tag -width "gss_inquire_cred_by_mech"
201 Convert a GSS-API status code to text
214 Individual GSS-API implementations may augment these routines by
215 providing additional mechanism-specific routines if required
220 .Bl -tag -width ".It RFC 2743"
224 Generic Security Service API Version 2 : C-bindings