| Skip Navigation Links | |
| Exit Print View | |
|
Developer's Guide to Oracle Solaris Security Oracle Solaris 10 8/11 Information Library |
1. Oracle Solaris Security for Developers (Overview)
2. Developing Privileged Applications
3. Writing PAM Applications and Services
4. Writing Applications That Use GSS-API
7. Writing Applications That Use SASL
8. Introduction to the Oracle Solaris Cryptographic Framework
9. Writing User-Level Cryptographic Applications and Providers
10. Using the Smart Card Framework
A. Sample C-Based GSS-API Programs
D. Source Code for SASL Example
Constructing Mechanism OIDs
GSS-API OIDs
GSS-API OIDs
GSS-API OIDs
GSS-API OIDs
Components of the Cryptographic Framework
Components of the Cryptographic Framework
Components of the Cryptographic Framework
Components of the Cryptographic Framework
Overview of the Cryptoki Library
Requirements for Developers of Kernel-Level Consumers
Avoiding Data Cleanup Collisions in User-Level Providers
Requirements for Developers of User-Level Providers
Components of the Cryptographic Framework
Message Digest Example
Random Byte Generation Example
Sign and Verify Example
Symmetric Encryption Example
Components of the Cryptographic Framework
Components of the Cryptographic Framework
Components of the Cryptographic Framework
Components of the Cryptographic Framework
Components of the Cryptographic Framework
Components of the Cryptographic Framework
Detecting Sequence Problems in GSS-API