Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

gss_process_context_token(3) [hpux man page]

gss_process_context_token(3)				     Library Functions Manual				      gss_process_context_token(3)

NAME
gss_process_context_token() - process a context to the security service SYNOPSIS
DESCRIPTION
The routine passes tokens generated by the routine to the security service. Usually, tokens are associated with either the context establishment or with per-message security services. If the tokens are associated with the context establishment, they are passed to the or routine. If the tokens are associated with the per-message security service, they are passed to the or routine. Tokens generated by the routine are passed by the routine to the security service for processing. Input Parameters context_handle Specifies the context handle on which the security service processes the token. input_token_buffer Specifies an opaque pointer to the first byte of the token to be processed. Output Parameters minor_status Returns a status code from the security mechanism. STATUS CODES
The following status codes can be returned: The routine was completed successfully. Consistency checks performed on the input_token parameter failed. The routine failed. See the minor_status parameter return value for more information. The supplied context handle did not refer to a valid context. AUTHOR
was developed by Sun Microsystems, Inc. SEE ALSO
gss_accept_sec_context(3), gss_delete_sec_context(3), gss_init_sec_context(3), gss_verify_mic(3), gss_unseal(3). The manpages for DCE-GSSAPI are included with the DCE-CoreTools product. To see those manpages add to gss_process_context_token(3)

Check Out this Related Man Page

gss_get_mic(3)						     Library Functions Manual						    gss_get_mic(3)

NAME
gss_get_mic() - calculate a cryptographic message integrity code (MIC) for a message and return in a token SYNOPSIS
DESCRIPTION The routine generates a cryptographic message integrity code (MIC) for the supplied message and places the MIC in a token for trans- fer to the peer application. The qop_req parameter allows a choice between several cryptographic algorithms, if supported by the chosen mechanism. Input Parameters context_handle Specifies the context on which the message is sent. qop_req Specifies the cryptographic algorithm, or quality of protection. To accept the default quality of protection offered by the chosen mechanism specify message_buffer Specifies the message to be protected. Output Parameters msg_token Buffer to receive the sealed message. minor_status Returns a status code from the security mechanism. STATUS CODES
The following status codes can be returned: The routine was completed successfully. The context has already expired. The context is recognized but the associated credentials have expired. The context identified in the context_handle parameter was not valid. The specified QOP is not supported by the mechanism. AUTHOR
was developed by Sun Microsystems, Inc. SEE ALSO
gss_verify_mic(3). The manpages for DCE-GSSAPI are included with the DCE-CoreTools product. To see those manpages add to gss_get_mic(3)
Man Page

8 More Discussions You Might Find Interesting

1. Cybersecurity

unix admire

hello, i've been using microsot product especially in networking field. but, i found microsoft product aren't good enough for networks security features. and now, is there anybody that could advice me what security features Unix may offer me than microsoft. by the way, i'm working at... (1 Reply)
Discussion started by: czer
1 Replies

2. Cybersecurity

Certification

are there any unix certification's on security, and which is the most best one to take? (2 Replies)
Discussion started by: lealyz
2 Replies

3. Cybersecurity

ISS screws up.

Seems that security company ISS who brought us products such as BlackICE defender, released to the public, information concerning a vulnerability in apache that effects all versions on all platforms before telling the developers at Apache about it. This forced the people at Apache to work quickly... (1 Reply)
Discussion started by: ThePreacher
1 Replies

4. Cybersecurity

Need Help

I would really like to work within security in the I.T industry, though I am not sure what my next step should be. I can not afford a security course at this point in time. I have been reading books and catching up with security tips as much as I can from the Internet. Though I feel I can... (6 Replies)
Discussion started by: woofie
6 Replies

5. UNIX for Dummies Questions & Answers

security question

I just wanted to know when dealing with key loggers, What would be a normal routine for searching them out. I really don't know what I am looking for other than odd process. Also packet sniffers. What are signs? (0 Replies)
Discussion started by: blanks
0 Replies

6. AIX

security wrappers

Hi All, Any idea what is the security wrappers on AIX 5.3? Any idea will be highly appreciated, thanks. (1 Reply)
Discussion started by: itik
1 Replies

7. Cybersecurity

hacking

I want to start with hacking and learning it from the scratch! I have googled and found thousands of pages but I would like to know how to start really! It's always good to hear from security experts. please give me some links. the ones which are related to unix hacking. (1 Reply)
Discussion started by: messi777
1 Replies

8. Cybersecurity

Any Denial of Service test site with advice?

Hi, please do you know any free or very cheap service which generates short time attacks on a remote webserver to test its security and ability to minigate various kind of DoS? Then some report with advices on how to fix holes. Just to veriffy server configuration, firewall is OK, before its... (1 Reply)
Discussion started by: postcd
1 Replies