1.\" -*- nroff -*- 2.\" 3.\" Copyright (c) 2005 Doug Rabson 4.\" All rights reserved. 5.\" 6.\" Redistribution and use in source and binary forms, with or without 7.\" modification, are permitted provided that the following conditions 8.\" are met: 9.\" 1. Redistributions of source code must retain the above copyright 10.\" notice, this list of conditions and the following disclaimer. 11.\" 2. Redistributions in binary form must reproduce the above copyright 12.\" notice, this list of conditions and the following disclaimer in the 13.\" documentation and/or other materials provided with the distribution. 14.\" 15.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 16.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 17.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 18.\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 19.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 20.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 21.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 22.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 23.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 24.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 25.\" SUCH DAMAGE. 26.\" 27.\" The following commands are required for all man pages. 28.Dd January 26, 2010 29.Dt GSS_IMPORT_SEC_CONTEXT 3 PRM 30.Os 31.Sh NAME 32.Nm gss_import_sec_context 33.Nd Import a transferred context 34.\" This next command is for sections 2 and 3 only. 35.\" .Sh LIBRARY 36.Sh SYNOPSIS 37.In "gssapi/gssapi.h" 38.Ft OM_uint32 39.Fo gss_import_sec_context 40.Fa "OM_uint32 *minor_status" 41.Fa "const gss_buffer_t interprocess_token" 42.Fa "gss_ctx_id_t *context_handle" 43.Fc 44.Sh DESCRIPTION 45Allows a process to import a security context established by another 46process. 47A given interprocess token may be imported only once. 48See 49.Fn gss_export_sec_context . 50.Sh PARAMETERS 51.Bl -tag -width ".It interprocess_token" 52.It minor_status 53Mechanism specific status code. 54.It interprocess_token 55Token received from exporting process. 56.It context_handle 57Context handle of newly reactivated context. 58Resources associated with this context handle must be released by the 59application after use with a call to 60.Fn gss_delete_sec_context . 61.El 62.Sh RETURN VALUES 63.Bl -tag -width ".It GSS_S_DEFECTIVE_TOKEN" 64.It GSS_S_COMPLETE 65Successful completion 66.It GSS_S_NO_CONTEXT 67The token did not contain a valid context reference 68.It GSS_S_DEFECTIVE_TOKEN 69The token was invalid 70.It GSS_S_UNAVAILABLE 71The operation is unavailable 72.It GSS_S_UNAUTHORIZED 73Local policy prevents the import of this context by the current process 74.El 75.Sh SEE ALSO 76.Xr gss_delete_sec_context 3 , 77.Xr gss_export_sec_context 3 78.Sh STANDARDS 79.Bl -tag -width ".It RFC 2743" 80.It RFC 2743 81Generic Security Service Application Program Interface Version 2, Update 1 82.It RFC 2744 83Generic Security Service API Version 2 : C-bindings 84.El 85.Sh HISTORY 86The 87.Nm 88function first appeared in 89.Fx 7.0 . 90.Sh AUTHORS 91John Wray, Iris Associates 92.Sh COPYRIGHT 93Copyright (C) The Internet Society (2000). All Rights Reserved. 94.Pp 95This document and translations of it may be copied and furnished to 96others, and derivative works that comment on or otherwise explain it 97or assist in its implementation may be prepared, copied, published 98and distributed, in whole or in part, without restriction of any 99kind, provided that the above copyright notice and this paragraph are 100included on all such copies and derivative works. However, this 101document itself may not be modified in any way, such as by removing 102the copyright notice or references to the Internet Society or other 103Internet organizations, except as needed for the purpose of 104developing Internet standards in which case the procedures for 105copyrights defined in the Internet Standards process must be 106followed, or as required to translate it into languages other than 107English. 108.Pp 109The limited permissions granted above are perpetual and will not be 110revoked by the Internet Society or its successors or assigns. 111.Pp 112This document and the information contained herein is provided on an 113"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING 114TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING 115BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION 116HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF 117MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. 118