| Skip Navigation Links | |
| Exit Print View | |
|
Developer's Guide to Oracle Solaris 10 Security Oracle Solaris 10 1/13 Information Library |
1. Oracle Solaris Security for Developers (Overview)
2. Developing Privileged Applications
3. Writing PAM Applications and Services
4. Writing Applications That Use GSS-API
7. Writing Applications That Use SASL
8. Introduction to the Oracle Solaris Cryptographic Framework
9. Writing User-Level Cryptographic Applications and Providers
10. Using the Smart Card Framework
A. Sample C-Based GSS-API Programs
D. Source Code for SASL Example
Message Digest Example
Sign and Verify Example
Random Byte Generation Example
Symmetric Encryption Example
Symmetric Encryption Example
Symmetric Encryption Example
Symmetric Encryption Example
Symmetric Encryption Example
Message Digest Example
Sign and Verify Example
Sign and Verify Example
Random Byte Generation Example
Sign and Verify Example
PKCS #11 Functions: C_GetMechanismList()
PKCS #11 Functions: C_GetSlotList()
Sign and Verify Example
Random Byte Generation Example
PKCS #11 Functions: C_Initialize()
PKCS #11 Functions: C_OpenSession()
Random Byte Generation Example
Sign and Verify Example
Sign and Verify Example
Sign and Verify Example
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
User Canonicalization Plug-ins
Developing Smart Card Consumer Applications
Packaging Cryptographic Provider Applications and Modules
To Request a Certificate for Signing a Provider
Establishing a Security Context With the Server
SASL Connection Contexts
Network Security Architecture
Oracle Solaris Cryptography Terminology
GSS-API Tokens
Accepting a Context in GSS-API
Accepting a Context
Cleaning Up a GSS-API Session
Working With Contexts in GSS-API
Establishing a Security Context for GSS-API
Exporting and Importing Contexts in GSS-API
Obtaining Context Information in GSS-API
Deleting the Security Context
Introduction to GSS-API
Using Other Context Services in GSS-API
Cleanup in the GSSAPI Server Example
Initiating a Context in GSS-API
createMechOid() Function
Glossary
Delegating a Credential in GSS-API
Acquiring Credentials
Acquiring Credentials in GSS-API
Components of the Cryptographic Framework
Components of the Cryptographic Framework
Components of the Cryptographic Framework
Tagging Messages With gss_get_mic()
Components of the Cryptographic Framework
Overview of the Cryptoki Library