JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Developer's Guide to Oracle Solaris Security     Oracle Solaris 11 Express 11/10
search filter icon
search icon

Document Information

Preface

1.  Oracle Solaris Security for Developers (Overview)

2.  Developing Privileged Applications

3.  Writing PAM Applications and Services

4.  Writing Applications That Use GSS-API

5.  GSS-API Client Example

6.  GSS-API Server Example

7.  Writing Applications That Use SASL

8.  Introduction to the Oracle Solaris Cryptographic Framework

9.  Writing User-Level Cryptographic Applications and Providers

10.  Introduction to the Oracle Solaris Key Management Framework

A.  Sample C-Based GSS-API Programs

B.  GSS-API Reference

C.  Specifying an OID

D.  Source Code for SASL Example

E.  SASL Reference Tables

F.  Packaging and Signing Cryptographic Providers

Glossary

Index

A

C

D

E

F

G

H

I

J

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

E

effective privilege set, defined, Effective Privilege Set
elfsign command
Oracle Solaris cryptographic framework, Components of the Cryptographic Framework
request subcommand, To Request a Certificate for Signing a Provider
sign subcommand
To Sign a Provider
To Generate an Activation File for Retail Export
verify subcommand, To Verify That a Provider Is Signed
encryption
GSS-API, Sending Protected Data in GSS-API
wrapping messages with gss_wrap(), Wrapping Messages With gss_wrap()
encryption products, export laws, Complying with U.S. Government Export Laws
error codes, GSS-API, GSS-API Major Status Code Values
examples
checking for authorizations, About Authorizations
GSS-API client application
description, GSSAPI Client Example Overview
source code, Client-Side Application
GSS-API miscellaneous functions
source code, Miscellaneous GSS-API Sample Functions
GSS-API server application
description, GSSAPI Server Example Overview
source code, Server-Side Application
miscellaneous SASL functions, Common Code
Oracle Solaris cryptographic framework
message digest, Message Digest Example
random byte generation, Random Byte Generation Example
signing and verifying messages, Sign and Verify Example
symmetric encryption, Symmetric Encryption Example
PAM consumer application, A Simple PAM Consumer Example
PAM conversation function, Writing Conversation Functions
PAM service provider, Sample PAM Provider Service Module
privilege bracketing, Privilege Bracketing in the Least Privilege Model
SASL client application, SASL Client Example
SASL server application, SASL Server Example
export laws, encryption products, Complying with U.S. Government Export Laws
exporting GSS-API contexts, Exporting and Importing Contexts in GSS-API