Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

gss_export_sec_context(3) [hpux man page]

gss_export_sec_context(3)				     Library Functions Manual					 gss_export_sec_context(3)

NAME
gss_export_sec_context() - transfer a security context to another process on a single machine SYNOPSIS
DESCRIPTION The deactivates the security context for the calling process and creates an interprocess token which, when passed to in another process, will re-activate the context in the second process. Only a single instantiation of a given context may be active at any one time; a subsequent attempt by a context exporter to access the exported security context will fail. is created such that it is functionally identical to the original context. If creation of the interprocess token is successful, the implementation shall deallocate all process-wide resources associated with the security context, and set the context_handle to The ability to transfer a security context is indicated when the context is created, by or setting the bit in their ret_flags parameter. Input Parameters context_handle Specifies the context handle identifying the context to transfer. interprocess_token Specifies the token to be transferred to target process. Output Parameters minor_status Returns a status code from the security mechanism. STATUS CODES
The following status codes can be returned: The routine was completed successfully. The context has expired The supplied context handle did not refer to a valid context. The operation is not supported. AUTHOR
was developed by Sun Microsystems, Inc. SEE ALSO
gss_import_sec_context(3). The manpages for DCE-GSSAPI are included with the DCE-CoreTools product. To see those manpages add to gss_export_sec_context(3)

Check Out this Related Man Page

gss_process_context_token(3)				     Library Functions Manual				      gss_process_context_token(3)

NAME
gss_process_context_token() - process a context to the security service SYNOPSIS
DESCRIPTION
The routine passes tokens generated by the routine to the security service. Usually, tokens are associated with either the context establishment or with per-message security services. If the tokens are associated with the context establishment, they are passed to the or routine. If the tokens are associated with the per-message security service, they are passed to the or routine. Tokens generated by the routine are passed by the routine to the security service for processing. Input Parameters context_handle Specifies the context handle on which the security service processes the token. input_token_buffer Specifies an opaque pointer to the first byte of the token to be processed. Output Parameters minor_status Returns a status code from the security mechanism. STATUS CODES
The following status codes can be returned: The routine was completed successfully. Consistency checks performed on the input_token parameter failed. The routine failed. See the minor_status parameter return value for more information. The supplied context handle did not refer to a valid context. AUTHOR
was developed by Sun Microsystems, Inc. SEE ALSO
gss_accept_sec_context(3), gss_delete_sec_context(3), gss_init_sec_context(3), gss_verify_mic(3), gss_unseal(3). The manpages for DCE-GSSAPI are included with the DCE-CoreTools product. To see those manpages add to gss_process_context_token(3)
Man Page

7 More Discussions You Might Find Interesting

1. Cybersecurity

unix admire

hello, i've been using microsot product especially in networking field. but, i found microsoft product aren't good enough for networks security features. and now, is there anybody that could advice me what security features Unix may offer me than microsoft. by the way, i'm working at... (1 Reply)
Discussion started by: czer
1 Replies

2. Programming

transfer an open file description between two process

How can I transfer an open file description between two process? (1 Reply)
Discussion started by: xu_wen_dong
1 Replies

3. UNIX for Dummies Questions & Answers

(SOS) Please help !

Does anybody can help me with the definition of "terminal" DTE and DCE in context to Unix ?. This has something to do with devices in Unix. I need it asap. Thank you very much !:confused: (1 Reply)
Discussion started by: aqua_jan
1 Replies

4. UNIX for Dummies Questions & Answers

security question

I just wanted to know when dealing with key loggers, What would be a normal routine for searching them out. I really don't know what I am looking for other than odd process. Also packet sniffers. What are signs? (0 Replies)
Discussion started by: blanks
0 Replies

5. HP-UX

Grecv

What is grecv in HP-UNIX context (0 Replies)
Discussion started by: bhavani2006
0 Replies

6. Cybersecurity

Secure File Transfer for Mainframe systems

Hi guys, I would like to transfer files from UNIX machine to Mainframe system (using UNIX machine as client). The transfer process needs to be secure (i.e. data sent thro network should be encrypted using 128-bit encryption algorithm). I came to know that SFTP server is not available for Mainframe... (3 Replies)
Discussion started by: sydneymoon
3 Replies

7. Cybersecurity

Network security course

Hi I was wondering if someone could give some tips about network security postgraduate courses and/or certifications . I know that is a generic question and a wide area, but that's the problem, the net is full of books, courses, or whatever. My goal is to find a good course (or book) that... (0 Replies)
Discussion started by: Dedalus
0 Replies