JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Solaris Security for Developers Guide
search filter icon
search icon

Document Information

Preface

1.  Oracle Solaris Security for Developers (Overview)

2.  Developing Privileged Applications

3.  Writing PAM Applications and Services

4.  Writing Applications That Use GSS-API

5.  GSS-API Client Example

6.  GSS-API Server Example

7.  Writing Applications That Use SASL

8.  Introduction to the Oracle Solaris Cryptographic Framework

9.  Writing User-Level Cryptographic Applications and Providers

10.  Using the Smart Card Framework

A.  Sample C-Based GSS-API Programs

B.  GSS-API Reference

C.  Specifying an OID

D.  Source Code for SASL Example

E.  SASL Reference Tables

F.  Packaging and Signing Cryptographic Providers

Glossary

Index

A

C

D

E

F

G

H

I

J

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

C

C_CloseSession() function
digest message example, Message Digest Example
message signing example, Sign and Verify Example
random byte generation example, Random Byte Generation Example
C_Decrypt() function, Symmetric Encryption Example
C_DecryptInit() function, Symmetric Encryption Example
C_EncryptFinal() function, Symmetric Encryption Example
C_EncryptInit() function, Symmetric Encryption Example
C_EncryptUpdate() function, Symmetric Encryption Example
C_Finalize() function
digest message example, Message Digest Example
message signing example, Sign and Verify Example
C_GenerateKeyPair() function, Sign and Verify Example
C_GenerateRandom() function, Random Byte Generation Example
C_GetAttributeValue() function, Sign and Verify Example
C_GetInfo() function
PKCS #11 Functions: C_GetInfo()
Message Digest Example
C_GetMechanismList() function, PKCS #11 Functions: C_GetMechanismList()
C_GetSlotList() function, PKCS #11 Functions: C_GetSlotList()
message signing example, Sign and Verify Example
random byte generation example, Random Byte Generation Example
C_Initialize() function, PKCS #11 Functions: C_Initialize()
C_OpenSession() function, PKCS #11 Functions: C_OpenSession()
random byte generation example, Random Byte Generation Example
C_SignInit() function, Sign and Verify Example
C_Verify() function, Sign and Verify Example
C_VerifyInit() function, Sign and Verify Example
callbacks
SASL, Communication in SASL
SASL_CB_AUTHNAME, Communication in SASL
SASL_CB_CANON_USER, Communication in SASL
SASL_CB_ECHOPROMPT, Communication in SASL
SASL_CB_GETCONF, Communication in SASL
SASL_CB_GETOPT, Communication in SASL
SASL_CB_GETPATH, Communication in SASL
SASL_CB_GETREALM, Communication in SASL
SASL_CB_LANGUAGE, Communication in SASL
SASL_CB_LOG, Communication in SASL
SASL_CB_NOECHOPROMPT, Communication in SASL
SASL_CB_PASS, Communication in SASL
SASL_CB_PROXY_POLICY, Communication in SASL
SASL_CB_SERVER_USERDB_CHECKPASS, Communication in SASL
SASL_CB_SERVER_USERDB_SETPASS, Communication in SASL
SASL_CB_USER, Communication in SASL
SASL_CB_VERIFYFILE, Communication in SASL
canonicalization, SASL, User Canonicalization Plug-ins
card objects, SCF, Developing Smart Card Consumer Applications
certificates
cryptographic applications, Packaging Cryptographic Provider Applications and Modules
requesting from Sun, To Request a Certificate for Signing a Provider
channel bindings
GSS-API
Using Channel Bindings in GSS-API
Address Types for Channel Bindings
client_establish_context() function, GSS-API client example, Establishing a Security Context With the Server
client plug-ins
SASL
Client Plug-ins
SASL Plug-in Development Guidelines
confidentiality
GSS-API
Security Services in GSS-API
Sending Protected Data in GSS-API
connect_to_server() function
GSS-API client example
Opening a Connection With the Server
Establishing a Security Context for GSS-API
connection contexts, SASL, SASL Connection Contexts
consumers
defined, Network Security Architecture
Solaris cryptographic framework, Oracle Solaris Cryptography Terminology
context-level tokens, GSS-API, GSS-API Tokens
contexts
GSS-API
acceptance, Accepting a Context in GSS-API
acceptance example, Accepting a Context
deletion, Cleaning Up a GSS-API Session
establishing, Working With Contexts in GSS-API
establishing example, Establishing a Security Context for GSS-API
exporting, Exporting and Importing Contexts in GSS-API
getting acquisition information, Obtaining Context Information in GSS-API
gss-client example, Deleting the Security Context
import and export
Exporting and Importing Contexts in GSS-API
Using the test_import_export_context() Function
introduction, Introduction to GSS-API
other context services, Using Other Context Services in GSS-API
releasing, Cleanup in the GSSAPI Server Example
initiation in GSS-API, Initiating a Context in GSS-API
createMechOid() function, createMechOid() Function
credentials
cache, Glossary
delegation, Delegating a Credential in GSS-API
GSS-API
Working With Credentials in GSS-API
Types of Credentials Supported
acquisition, Acquiring Credentials
GSS-API default, Acquiring Credentials in GSS-API
crypto pseudo device driver, Components of the Cryptographic Framework
cryptoadm pseudo device driver, Components of the Cryptographic Framework
cryptoadm utility, Components of the Cryptographic Framework
cryptographic checksum (MIC), Tagging Messages With gss_get_mic()
cryptographic framework, See Solaris cryptographic framework
cryptographic providers, Solaris cryptographic framework, Components of the Cryptographic Framework
cryptoki library, overview, Overview of the Cryptoki Library