Lines Matching +full:quality +full:- +full:of +full:- +full:service

8 .\" 1. Redistributions of source code must retain the above copyright
9 .\" notice, this list of conditions and the following disclaimer.
11 .\" notice, this list of conditions and the following disclaimer in the
16 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
23 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 .Nd "GSS-API based authentication for RPC"
38 It uses the Generic Security Service API (GSS-API) to establish a
43 The integrity service uses checksums to ensure that all data sent by
45 The privacy service uses encryption to ensure that no third party can
55 .Bl -tag -width "MMMM"
57 This type defines the types of security service required for
59 .Bd -literal
70 .Bd -literal
79 Various details of the created security context are returned using
81 .Bd -literal
94 in GSS-API exported name form
105 .Bd -literal
114 .Bd -literal
118 const char *qop; /* quality of protection */
121 rpc_gss_service_t service; /* service type */
128 .Bd -literal
133 gid_t *gidlist; /* list of groups */
137 Structure used to enforce a particular QOP and service.
138 .Bd -literal
147 .Bd -literal
162 .Bd -literal
176 .Bl -tag -width "MMMM"
180 Set service and quality of protection for a context
184 Get details of the last error
186 Convert a mechanism name to the corresponding GSS-API oid.
188 Convert a GSS-API oid to a mechanism name
190 Convert a quality of protection name to the corresponding number
192 Get a list of security mechanisms.
196 Return the maximum and minimum supported versions of the
200 Query for the presence of a particular security mechanism
202 Set the name of a service principal which matches a given RPC program
205 Get credential details for the security context of an RPC request