| Skip Navigation Links | |
| Exit Print View | |
|
Developer's Guide to Oracle Solaris Security Oracle Solaris 11 Express 11/10 |
1. Oracle Solaris Security for Developers (Overview)
2. Developing Privileged Applications
3. Writing PAM Applications and Services
4. Writing Applications That Use GSS-API
7. Writing Applications That Use SASL
8. Introduction to the Oracle Solaris Cryptographic Framework
9. Writing User-Level Cryptographic Applications and Providers
10. Introduction to the Oracle Solaris Key Management Framework
A. Sample C-Based GSS-API Programs
D. Source Code for SASL Example
Oracle Solaris Key Management Framework Features
Constructing Mechanism OIDs
GSS-API OIDs
GSS-API OIDs
GSS-API OIDs
GSS-API OIDs
Oracle Solaris Key Management Framework Features
Overview of the Cryptographic Framework
Components of the Cryptographic Framework
Components of the Cryptographic Framework
Components of the Cryptographic Framework
Components of the Cryptographic Framework
Overview of the Cryptoki Library
Requirements for Developers of Kernel-Level Consumers
Requirements for Developers of Kernel-Level Providers
Avoiding Data Cleanup Collisions in User-Level Providers
Requirements for Developers of User-Level Consumers
Requirements for Developers of User-Level Providers
Components of the Cryptographic Framework
Message Digest Example
Random Byte Generation Example
Sign and Verify Example
Symmetric Encryption Example
Introduction to the Oracle Solaris Cryptographic Framework
Components of the Cryptographic Framework
Components of the Cryptographic Framework
Components of the Cryptographic Framework
Packaging Cryptographic Provider Applications and Modules
Components of the Cryptographic Framework
Components of the Cryptographic Framework
Components of the Cryptographic Framework
Network Security Architecture
Components of the Cryptographic Framework
Detecting Sequence Problems in GSS-API