table of contents
other versions
- wheezy 10.6-1
- wheezy-backports 11.13-3~bpo70+1
- jessie 11.13-3
- testing 12.13-1
- unstable 12.13-2
GSS Req Flags(3) | globus gssapi gsi | GSS Req Flags(3) |
NAME¶
GSS Req Flags -Modules¶
GSS Ret Flags
Defines¶
#define GSS_C_GLOBUS_DONT_ACCEPT_LIMITED_PROXY_FLAG 8192
Functions¶
OM_uint32 gss_acquire_cred (OM_uint32 *, const gss_name_t, OM_uint32, const gss_OID_set, gss_cred_usage_t, gss_cred_id_t *, gss_OID_set *, OM_uint32 *)
Detailed Description¶
These macros set the REQUESTED type of context - these should be set (or not) in the context's req_flags (or in the context's ret_flags if accept_sec_context is being called)Define Documentation¶
#define GSS_C_GLOBUS_DONT_ACCEPT_LIMITED_PROXY_FLAG 8192¶
Set if you don't want a context to accept a limited proxy. If this flag is set, and a limited proxy is received, the call will not be successful and the context will not be set up#define GSS_C_GLOBUS_DELEGATE_LIMITED_PROXY_FLAG 4096¶
Set if you wan the delegated proxy to be a limited proxy.#define GSS_C_GLOBUS_ACCEPT_PROXY_SIGNED_BY_LIMITED_PROXY_FLAG 32768¶
Set if you want to accept proxies signed by limited proxies. DeprecatedWe now accept proxies signed by limited
proxies if they are limited or independent.
#define GSS_C_GLOBUS_ALLOW_MISSING_SIGNING_POLICY 65536¶
Set if you want to allow CA certs without a signing policy to verify.#define GSS_C_GLOBUS_FORCE_SSL3 131072¶
Set if you want to force SSLv3 instead of negotiating TLSv1 or SSLv3.#define GSS_C_GLOBUS_LIMITED_PROXY_MANY_FLAG 32768 Deprecated¶
We now accept proxies signed by limited
proxies if they are limited or independent.
Function Documentation¶
OM_uint32 gss_acquire_cred (OM_uint32 *minor_status, const gss_name_tdesired_name_P, OM_uint32time_req, const gss_OID_setdesired_mechs, gss_cred_usage_tcred_usage, gss_cred_id_t *output_cred_handle_P, gss_OID_set *actual_mechs, OM_uint32 *time_rec)¶
GSSAPI routine to acquire the local credential. See the latest IETF draft/RFC on the GSS C bindings. Gets the local credentials. The proxy_init_cred does most of the work of setting up the SSL_ctx, getting the user's cert, key, etc. The globusid will be obtained from the certificate. (Minus and /CN=proxy entries.) Parameters:minor_status Mechanism specific status
code. In this implementation, the minor_status is a cast from a
globus_result_t value, which is either GLOBUS_SUCCESS or a globus error object
ID if an error occurred.
desired_name_P Name of principle whose credentials should be acquired
This parameter maps to the desired subject of the cert to be acquired as the
credential. Possible values are: For a service cert: <service
name>=''><fqdn> For a host cert: <fqdn> For a proxy cert:
<subject name>=''> For a user cert: <subject name>=''> This
parameter can be NULL, in which case the cert is chosen using a default search
order of: host, proxy, user, service
time_req Number of seconds that credentials should remain valid. This
value can be GSS_C_INDEFINITE for an unlimited lifetime. NOTE: in the current
implementation, this parameter is ignored, since you can't change the
expiration of a signed cert.
desired_mechs
cred_usage
output_cred_handle_P
actual_mechs
time_rec
OM_uint32 gss_release_cred (OM_uint32 *minor_status, gss_cred_id_t *cred_handle_P)¶
Release the GSS cred handle. Parameters:minor_status The minor status result -
this is a globus_result_t cast to a OM_uint32. To access the globus error
object use: globus_error_get((globus_result_t) *minor_status)
cred_handle_P The gss cred handle to be released
Returns:
The major status - GSS_S_COMPLETE or
GSS_S_FAILURE
OM_uint32 gss_accept_sec_context (OM_uint32 *minor_status, gss_ctx_id_t *context_handle_P, const gss_cred_id_tacceptor_cred_handle, const gss_buffer_tinput_token, const gss_channel_bindings_tinput_chan_bindings, gss_name_t *src_name_P, gss_OID *mech_type, gss_buffer_toutput_token, OM_uint32 *ret_flags, OM_uint32 *time_rec, gss_cred_id_t *delegated_cred_handle_P) Parameters:¶
minor_status
context_handle_P
acceptor_cred_handle
input_token
input_chan_bindings
src_name_P
mech_type
output_token
ret_flags Also used as req_flags for other functions
time_rec
delegated_cred_handle_P
Returns:
OM_uint32 gss_delete_sec_context (OM_uint32 *minor_status, gss_ctx_id_t *context_handle_P, gss_buffer_toutput_token)¶
Delete the GSS Security Context. Parameters:minor_status The minor status result -
this is a globus_result_t cast to a OM_uint32. The
context_handle_P The context handle to be deleted
output_token The
OM_uint32 gss_context_time (OM_uint32 *minor_status, const gss_ctx_id_tcontext_handle, OM_uint32 *time_rec) Parameters:¶
minor_status
context_handle
time_rec
Returns:
OM_uint32 gss_get_mic (OM_uint32 *minor_status, const gss_ctx_id_tcontext_handle, gss_qop_tqop_req, const gss_buffer_tmessage_buffer, gss_buffer_tmessage_token)¶
Calculates a cryptographic MIC (message integrity check) over an application message, and returns that MIC in the token. The token and message can then be passed to the peer application which calls gss_verify_mic to verify the MIC. Parameters:minor_status
context_handle
qop_req
message_buffer
message_token
Returns:
OM_uint32 gss_verify_mic (OM_uint32 *minor_status, const gss_ctx_id_tcontext_handle, const gss_buffer_tmessage_buffer, const gss_buffer_ttoken_buffer, gss_qop_t *qop_state)¶
Check a MIC of the data. Parameters:minor_status
context_handle
message_buffer
token_buffer
qop_state
Returns:
OM_uint32 gss_wrap (OM_uint32 *minor_status, const gss_ctx_id_tcontext_handle, intconf_req_flag, gss_qop_tqop_req, const gss_buffer_tinput_message_buffer, int *conf_state, gss_buffer_toutput_message_buffer)¶
Wrap a message for integretry and protection. We do this using the SSLv3 routines, by writing to the SSL bio, and pulling off the buffer from the back of the write BIO. But we can't do everything SSL might want, such as control messages, or segment the messages here, since we are forced to using the gssapi tokens, and can not communicate directly with our peer. So there maybe some failures which would work with true SSL. Parameters:minor_status
context_handle
conf_req_flag
qop_req
input_message_buffer
conf_state
output_message_buffer
Returns:
OM_uint32 gss_unwrap (OM_uint32 *minor_status, const gss_ctx_id_tcontext_handle, const gss_buffer_tinput_message_buffer, gss_buffer_toutput_message_buffer, int *conf_state, gss_qop_t *qop_state)¶
GSSAPI routine to unwrap a buffer which may have been received and wraped by wrap.c. Return the data from the wrapped buffer. There may also be errors, such as integraty errors. Since we can not communicate directly with our peer, we can not do everything SSL could, i.e. return a token for example. Parameters:minor_status
context_handle
input_message_buffer
output_message_buffer
conf_state
qop_state
Returns:
OM_uint32 gss_display_status (OM_uint32 *minor_status, OM_uint32status_value, intstatus_type, const gss_OIDmech_type, OM_uint32 *message_context, gss_buffer_tstatus_string)¶
Calls the SSLeay error print routines to produce a printable message. This may need some work, as the SSLeay error messages are more of a trace, and my not be the best for the user. Also don't take advantage of being called in a loop. Parameters:minor_status
status_value
status_type
mech_type
message_context
status_string
Returns:
OM_uint32 gss_indicate_mechs (OM_uint32 *minor_status, gss_OID_set *mech_set)¶
Passes back the mech set of available mechs. We only have one for now. Parameters:minor_status
mech_set
Returns:
OM_uint32 gss_compare_name (OM_uint32 *minor_status, const gss_name_tname1_P, const gss_name_tname2_P, int *name_equal)¶
Compare two names. GSSAPI names in this implementation are pointers to x509 names. Parameters:minor_status currently is always set to
GLOBUS_SUCCESS
name1_P
name2_P
name_equal
Returns:
currently always returns GSS_S_COMPLETE
OM_uint32 gss_import_name (OM_uint32 *minor_status, const gss_buffer_tinput_name_buffer, const gss_OIDinput_name_type, gss_name_t *output_name_P)¶
Import a name into a gss_name_t Creates a new gss_name_t which contains a mechanism-specific representation of the input name. GSSAPI OpenSSL implements the following name types, based on the input_name_type OID:- •
- GSS_C_NT_ANONYMOUS (input_name_buffer is ignored)
- •
- GSS_C_NT_HOSTBASED_SERVICE (input_name_buffer contains a string 'service@FQN' which will match /CN=service/FQDN)
- •
- GSS_C_NT_EXPORT_NAME (input_name_buffer contains a string with the X509_oneline representation of a name) like '/X=Y/Z=A...')
- •
- GSS_C_NO_OID or GSS_C_NT_USER_NAME (input_name_buffer contains an X.500 name formatted like '/X=Y/Z=A...')
- •
- GLOBUS_GSS_C_NT_HOST_IP (input_name_buffer contains a string 'FQDN/ip-address' which will match names with the FQDN or the IP address)
- •
- GLOBUS_SSS_C_NT_X509 (input buffer is an X509 struct from OpenSSL)
minor_status Minor status
input_name_buffer Input name buffer which is interpreted based on the
input_name_type
input_name_type OID of the name
output_name_P New gss_name_t value containing the name
Return values:
GSS_S_COMPLETE indicates that a valid
name representation is output in output_name and described by the type value
in output_name_type.
GSS_S_BAD_NAMETYPE indicates that the input_name_type is unsupported by
the applicable underlying GSS-API mechanism(s), so the import operation could
not be completed.
GSS_S_BAD_NAME indicates that the provided input_name_string is
ill-formed in terms of the input_name_type, so the import operation could not
be completed.
GSS_S_BAD_MECH indicates that the input presented for import was an
exported name object and that its enclosed mechanism type was not recognized
or was unsupported by the GSS-API implementation.
GSS_S_FAILURE indicates that the requested operation could not be
performed for reasons unspecified at the GSS-API level.
OM_uint32 gss_export_name (OM_uint32 *minor_status, const gss_name_tinput_name_P, gss_buffer_texported_name)¶
Produces a mechanism-independent exported name object. See section 3.2 of RFC 2743.OM_uint32 gss_release_name (OM_uint32 *minor_status, gss_name_t *name_P)¶
Release the GSS Name. Parameters:minor_status The minor status result -
this is a globus_result_t cast to a (OM_uint32 *).
name_P The gss name to be released
Returns:
The major status - GSS_S_COMPLETE or
GSS_S_FAILURE
OM_uint32 gss_release_buffer (OM_uint32 *minor_status, gss_buffer_tbuffer) Parameters:¶
minor_status
buffer
Returns:
OM_uint32 gss_release_oid_set (OM_uint32 *minor_status, gss_OID_set *mech_set)¶
Release the OID set. Parameters:minor_status
mech_set
Returns:
OM_uint32 gss_inquire_cred (OM_uint32 *minor_status, const gss_cred_id_tcred_handle_P, gss_name_t *name, OM_uint32 *lifetime, gss_cred_usage_t *cred_usage, gss_OID_set *mechanisms)¶
Get information about the current credential. We will also allow the return of the proxy file name, if the minor_status is set to a value of 57056 0xdee0 This is done since there is no way to pass back the delegated credential file name. When 57056 is seen, this will cause a new copy of this credential to be written, and it is the user's responsibility to free the file when done. The name will be a pointer to a char * of the file name which must be freeed. The minor_status will be set to 57057 0xdee1 to indicate this. DEE - this is a kludge, till the GSSAPI get a better way to return the name. If the minor status is not changed from 57056 to 57057 assume it is not this gssapi, and a gss name was returned. Parameters:minor_status
cred_handle_P
name
lifetime
cred_usage
mechanisms
Returns:
OM_uint32 gss_inquire_context (OM_uint32 *minor_status, const gss_ctx_id_tcontext_handle_P, gss_name_t *src_name_P, gss_name_t *targ_name_P, OM_uint32 *lifetime_rec, gss_OID *mech_type, OM_uint32 *ctx_flags, int *locally_initiated, int *open) Parameters:¶
minor_status
context_handle_P
src_name_P
targ_name_P
lifetime_rec
mech_type
ctx_flags
locally_initiated
open
Returns:
OM_uint32 gss_wrap_size_limit (OM_uint32 *minor_status, const gss_ctx_id_tcontext_handle, intconf_req_flag, gss_qop_tqop_req, OM_uint32req_output_size, OM_uint32 *max_input_size)¶
GSSAPI routine to take a buffer, calculate a MIC which is returned as a token. We will use the SSL protocol here. Parameters:minor_status
context_handle
conf_req_flag
qop_req
req_output_size
max_input_size
Returns:
OM_uint32 gss_export_sec_context (OM_uint32 *minor_status, gss_ctx_id_t *context_handle_P, gss_buffer_tinterprocess_token)¶
Saves the important info about the session, converts it to a token, then deletes the context. Parameters:minor_status
context_handle_P
interprocess_token
Returns:
For SSL handle We need to save: version of this routine. cred_usage, i.e. are we
accept or initiate target/source or name Session: Protocol, cipher, and
Master-Key Client-Random Server-Random tmp.key_block: client and server
Mac_secrets write_sequence read_sequence write iv read iv
see SSL 3.0 draft http://wp.netscape.com/eng/ssl3/index.html
OM_uint32 gss_import_sec_context (OM_uint32 *minor_status, const gss_buffer_tinterprocess_token, gss_ctx_id_t *context_handle_P)¶
GSSAPI routine to import the security context based on the input token. See: <draft-ietf-cat-gssv2-cbind-04.txt>OM_uint32 gss_create_empty_oid_set (OM_uint32 *minor_status, gss_OID_set *oid_set)¶
Creates an object identifier set containing no object identifiers, to which members may be subsequently added using the GSS_Add_OID_set_member() routine. These routines are intended to be used to construct sets of mechanism object identifiers, for input to GSS_Acquire_cred(). Parameters:minor_status
oid_set
Returns:
GSS_S_COMPLETE indicates successful completion
GSS_S_FAILURE indicates that the operation failed
OM_uint32 gss_add_oid_set_member (OM_uint32 *minor_status, const gss_OIDmember_oid, gss_OID_set *oid_set)¶
Adds an Object Identifier to an Object Identifier set. This routine is intended for use in conjunction with GSS_Create_empty_OID_set() when constructing a set of mechanism OIDs for input to GSS_Acquire_cred(). Parameters:minor_status
member_oid
oid_set
Returns:
GSS_S_COMPLETE indicates successful completion
GSS_S_FAILURE indicates that the operation failed
OM_uint32 gss_test_oid_set_member (OM_uint32 *minor_status, const gss_OIDmember, const gss_OID_setset, int *present)¶
Interrogates an Object Identifier set to determine whether a specified Object Identifier is a member. This routine is intended to be used with OID sets returned by GSS_Indicate_mechs(), GSS_Acquire_cred(), and GSS_Inquire_cred(). Parameters:minor_status
member
set
present
Returns:
GSS_S_COMPLETE indicates successful completion
GSS_S_FAILURE indicates that the operation failed
OM_uint32 gss_duplicate_name (OM_uint32 *minor_status, const gss_name_tsrc_name, gss_name_t *dest_name)¶
Copy a GSS name. Parameters:minor_status
src_name
dest_name
Returns:
OM_uint32 gss_sign (OM_uint32 *minor_status, gss_ctx_id_tcontext_handle, intqop_req, gss_buffer_tmessage_buffer, gss_buffer_tmessage_token)¶
Deprecated. Does the same thing as gss_get_mic for V1 compatability. Parameters:minor_status
context_handle
qop_req
message_buffer
message_token
Returns:
OM_uint32 gss_verify (OM_uint32 *minor_status, gss_ctx_id_tcontext_handle, gss_buffer_tmessage_buffer, gss_buffer_ttoken_buffer, int *qop_state)¶
Obsolete variant of gss_verify for V1 compatability Check a MIC of the date. Parameters:minor_status
context_handle
massage_buffer
token_buffer
qop_state
Returns:
OM_uint32 gss_unseal (OM_uint32 *minor_status, gss_ctx_id_tcontext_handle, gss_buffer_tinput_message_buffer, gss_buffer_toutput_message_buffer, int *conf_state, int *qop_state)¶
Obsolete variant of gss_wrap for V1 compatability allow for non 32 bit integer in qop_state. Return the data from the wrapped buffer. There may also be errors, such as integraty errors. Since we can not communicate directly with our peer, we can not do everything SSL could, i.e. return a token for example. Parameters:minor_status
context_handle
input_message_buffer
output_message_buffer
conf_state
qop_state
Returns:
OM_uint32 gss_create_empty_buffer_set (OM_uint32 *minor_status, gss_buffer_set_t *buffer_set)¶
Create a empty buffer set. This function allocates and initializes a empty buffer set. The memory allocated in this function should be freed by a call to gss_release_buffer_set. Parameters:minor_status The minor status returned
by this function. This paramter will be 0 upon success.
buffer_set Pointer to a buffer set structure.
Returns:
GSS_S_COMPLETE upon success GSS_S_FAILURE
failure
See also:
gss_add_buffer_set_member
gss_release_buffer_set
OM_uint32 gss_add_buffer_set_member (OM_uint32 *minor_status, const gss_buffer_tmember_buffer, gss_buffer_set_t *buffer_set)¶
Add a buffer to a buffer set. This function allocates a new gss_buffer_t, intializes it with the values in the member_buffer parameter. Parameters:minor_status The minor status returned
by this function. This paramter will be 0 upon success.
member_buffer Buffer to insert into the buffer set.
buffer_set Pointer to a initialized buffer set structure.
Returns:
GSS_S_COMPLETE upon success GSS_S_FAILURE
failure
See also:
gss_create_empty_buffer_set
gss_release_buffer_set
OM_uint32 gss_release_buffer_set (OM_uint32 *minor_status, gss_buffer_set_t *buffer_set)¶
Free all memory associated with a buffer set. This function will free all memory associated with a buffer set. Note that it will also free all memory associated with the buffers int the buffer set. Parameters:minor_status The minor status returned
by this function. This paramter will be 0 upon success.
buffer_set Pointer to a buffer set structure. This pointer will point at
a NULL value upon return.
Returns:
GSS_S_COMPLETE upon success GSS_S_FAILURE
failure
See also:
gss_create_empty_buffer_set
gss_add_buffer_set_member
OM_uint32 gss_import_cred (OM_uint32 *minor_status, gss_cred_id_t *output_cred_handle, const gss_OIDdesired_mech, OM_uint32option_req, const gss_buffer_timport_buffer, OM_uint32time_req, OM_uint32 *time_rec)¶
Import a credential that was exported by gss_export_cred(). This function will import credentials exported by gss_export_cred(). It is intended to allow a multiple use application to checkpoint delegated credentials. Parameters:minor_status The minor status returned
by this function. This paramter will be 0 upon success.
output_cred_handle Upon success, this paramter will contain the imported
credential. When no longer needed this credential should be freed using
gss_release_cred().
desired_mech This paramter may be used to specify the desired security
mechanism. May be GSS_C_NO_OID.
option_req This paramater indicates which option_req value was used to
produce the import_buffer.
import_buffer A buffer produced by gss_export_credential().
time_req The requested period of validity (seconds) for the imported
credential. May be NULL.
time_rec This parameter will contain the received period of validity of
the imported credential upon success. May be NULL.
Returns:
GSS_S_COMPLETE upon successful completion
GSS_S_BAD_MECH if the requested security mechanism is unavailable
GSS_S_DEFECTIVE_TOKEN if the import_buffer is defective GSS_S_FAILURE upon
general failure
OM_uint32 gss_export_cred (OM_uint32 *minor_status, const gss_cred_id_tcred_handle, const gss_OIDdesired_mech, OM_uint32option_req, gss_buffer_texport_buffer)¶
Saves the credential so it can be checkpointed and imported by gss_import_cred. Parameters:minor_status
cred_handle
desired_mech Should either be gss_mech_globus_gssapi_openssl or
NULL (in which case gss_mech_globus_gssapi_openssl is assumed).
option_req
export_buffer
Returns:
OM_uint32 gss_init_delegation (OM_uint32 *minor_status, const gss_ctx_id_tcontext_handle, const gss_cred_id_tcred_handle, const gss_OIDdesired_mech, const gss_OID_setextension_oids, const gss_buffer_set_textension_buffers, const gss_buffer_tinput_token, OM_uint32req_flags, OM_uint32time_req, gss_buffer_toutput_token)¶
Initiate the delegation of a credential. This functions drives the initiating side of the credential delegation process. It is expected to be called in tandem with the gss_accept_delegation function. Parameters:minor_status The minor status returned
by this function. This paramter will be 0 upon success.
context_handle The security context over which the credential is
delegated.
cred_handle The credential to be delegated. May be GSS_C_NO_CREDENTIAL in
which case the credential associated with the security context is used.
desired_mech The desired security mechanism. Currently not used. May be
GSS_C_NO_OID.
extension_oids A set of extension oids corresponding to buffers in the
extension_buffers parameter below. The extensions specified will be added to
the delegated credential. May be GSS_C_NO_BUFFER_SET.
extension_buffers A set of extension buffers corresponding to oids in the
extension_oids paramter above. May be GSS_C_NO_BUFFER_SET.
input_token The token that was produced by a prior call to
gss_accept_delegation. This parameter will be ignored the first time this
function is called.
req_flags Flags that modify the behavior of the function. Currently only
GSS_C_GLOBUS_SSL_COMPATIBLE and GSS_C_GLOBUS_LIMITED_DELEG_PROXY_FLAG are
checked for. The GSS_C_GLOBUS_SSL_COMPATIBLE flag results in tokens that
aren't wrapped and GSS_C_GLOBUS_LIMITED_DELEG_PROXY_FLAG causes the delegated
proxy to be limited (requires that no extensions are specified.
time_req The requested period of validity (seconds) of the delegated
credential. Passing a time_req of 0 cause the delegated credential to have the
same lifetime as the credential that issued it.
output_token A token that should be passed to gss_accept_delegation if
the return value is GSS_S_CONTINUE_NEEDED.
Returns:
GSS_S_COMPLETE upon successful completion
GSS_S_CONTINUE_NEEDED if the function needs to be called again. GSS_S_FAILURE
upon failure
OM_uint32 gss_accept_delegation (OM_uint32 *minor_status, const gss_ctx_id_tcontext_handle, const gss_OID_setextension_oids, const gss_buffer_set_textension_buffers, const gss_buffer_tinput_token, OM_uint32req_flags, OM_uint32time_req, OM_uint32 *time_rec, gss_cred_id_t *delegated_cred_handle, gss_OID *mech_type, gss_buffer_toutput_token)¶
Accept a delegated credential. This functions drives the accepting side of the credential delegation process. It is expected to be called in tandem with the gss_init_delegation function. Parameters:minor_status The minor status returned
by this function. This paramter will be 0 upon success.
context_handle The security context over which the credential is
delegated.
extension_oids A set of extension oids corresponding to buffers in the
extension_buffers paramter below. May be GSS_C_NO_BUFFER_SET. Currently not
used.
extension_buffers A set of extension buffers corresponding to oids in the
extension_oids paramter above. May be GSS_C_NO_BUFFER_SET. Currently not used.
input_token The token that was produced by a prior call to
gss_init_delegation.
req_flags Flags that modify the behavior of the function. Currently only
GSS_C_GLOBUS_SSL_COMPATIBLE is checked for. This flag results in tokens that
aren't wrapped.
time_req The requested period of validity (seconds) of the delegated
credential. Currently a noop.
time_rec This parameter will contain the received period of validity of
the delegated credential upon success. May be NULL.
delegated_cred_handle This parameter will contain the delegated
credential upon success.
mech_type Returns the security mechanism upon success. Currently not
implemented. May be NULL.
output_token A token that should be passed to gss_init_delegation if the
return value is GSS_S_CONTINUE_NEEDED.
Returns:
GSS_S_COMPLETE upon successful completion
GSS_S_CONTINUE_NEEDED if the function needs to be called again. GSS_S_FAILURE
upon failure
OM_uint32 gss_inquire_cred_by_oid (OM_uint32 *minor_status, const gss_cred_id_tcred_handle, const gss_OIDdesired_object, gss_buffer_set_t *data_set)¶
NOTE: Checks both the cert in the credential and the certs in the cert chain for a valid extension that matches the desired OID. The first one found is used, starting with the endpoint cert, and then searching the cert chain. Parameters:minor_status
cred_handle
desired_object
data_set
Returns:
OM_uint32 gss_set_sec_context_option (OM_uint32 *minor_status, gss_ctx_id_t *context_handle, const gss_OIDoption, const gss_buffer_tvalue)¶
GSSAPI routine to initiate the sending of a security context See: <draft-ietf-cat-gssv2-cbind-04.txt> Parameters:minor_status
context_handle
option
value
Returns:
Author¶
Generated automatically by Doxygen for globus gssapi gsi from the source code.Mon Apr 30 2012 | Version 10.6 |