Modules | Defines | Functions

GSS Req Flags

These macros set the REQUESTED type of context - these should be set (or not) in the context's req_flags (or in the context's ret_flags if accept_sec_context is being called). More...

Collaboration diagram for GSS Req Flags:

Modules

Defines

Functions


Detailed Description

These macros set the REQUESTED type of context - these should be set (or not) in the context's req_flags (or in the context's ret_flags if accept_sec_context is being called).


Define Documentation

#define GSS_C_GLOBUS_DONT_ACCEPT_LIMITED_PROXY_FLAG   8192

Set if you don't want a context to accept a limited proxy.

If this flag is set, and a limited proxy is received, the call will not be successful and the context will not be set up

#define GSS_C_GLOBUS_DELEGATE_LIMITED_PROXY_FLAG   4096

Set if you wan the delegated proxy to be a limited proxy.

#define GSS_C_GLOBUS_ACCEPT_PROXY_SIGNED_BY_LIMITED_PROXY_FLAG   32768

Set if you want to accept proxies signed by limited proxies.

Deprecated:
We now accept proxies signed by limited proxies if they are limited or independent.
#define GSS_C_GLOBUS_ALLOW_MISSING_SIGNING_POLICY   65536

Set if you want to allow CA certs without a signing policy to verify.

#define GSS_C_GLOBUS_FORCE_SSL3   131072

Set if you want to force SSLv3 instead of negotiating TLSv1 or SSLv3.

#define GSS_C_GLOBUS_LIMITED_PROXY_MANY_FLAG   32768
Deprecated:
We now accept proxies signed by limited proxies if they are limited or independent.

Function Documentation

OM_uint32 gss_acquire_cred ( OM_uint32 *  minor_status,
const gss_name_t  desired_name_P,
OM_uint32  time_req,
const gss_OID_set  desired_mechs,
gss_cred_usage_t  cred_usage,
gss_cred_id_t *  output_cred_handle_P,
gss_OID_set *  actual_mechs,
OM_uint32 *  time_rec 
)

GSSAPI routine to acquire the local credential.

See the latest IETF draft/RFC on the GSS C bindings.

Gets the local credentials. The proxy_init_cred does most of the work of setting up the SSL_ctx, getting the user's cert, key, etc.

The globusid will be obtained from the certificate. (Minus and /CN=proxy entries.)

Parameters:
minor_status Mechanism specific status code. In this implementation, the minor_status is a cast from a globus_result_t value, which is either GLOBUS_SUCCESS or a globus error object ID if an error occurred.
desired_name_P Name of principle whose credentials should be acquired This parameter maps to the desired subject of the cert to be acquired as the credential. Possible values are: For a service cert: <service name>=""><fqdn> For a host cert: <fqdn> For a proxy cert: <subject name>=""> For a user cert: <subject name>=""> This parameter can be NULL, in which case the cert is chosen using a default search order of: host, proxy, user, service
time_req Number of seconds that credentials should remain valid. This value can be GSS_C_INDEFINITE for an unlimited lifetime. NOTE: in the current implementation, this parameter is ignored, since you can't change the expiration of a signed cert.
desired_mechs 
cred_usage 
output_cred_handle_P 
actual_mechs 
time_rec 
OM_uint32 gss_release_cred ( OM_uint32 *  minor_status,
gss_cred_id_t *  cred_handle_P 
)

Release the GSS cred handle.

Parameters:
minor_status The minor status result - this is a globus_result_t cast to a OM_uint32. To access the globus error object use: globus_error_get((globus_result_t) *minor_status)
cred_handle_P The gss cred handle to be released
Returns:
The major status - GSS_S_COMPLETE or GSS_S_FAILURE
OM_uint32 gss_accept_sec_context ( OM_uint32 *  minor_status,
gss_ctx_id_t *  context_handle_P,
const gss_cred_id_t  acceptor_cred_handle,
const gss_buffer_t  input_token,
const gss_channel_bindings_t  input_chan_bindings,
gss_name_t *  src_name_P,
gss_OID *  mech_type,
gss_buffer_t  output_token,
OM_uint32 *  ret_flags,
OM_uint32 *  time_rec,
gss_cred_id_t *  delegated_cred_handle_P 
)
Parameters:
minor_status 
context_handle_P 
acceptor_cred_handle 
input_token 
input_chan_bindings 
src_name_P 
mech_type 
output_token 
ret_flags Also used as req_flags for other functions
time_rec 
delegated_cred_handle_P 
Returns:
OM_uint32 gss_delete_sec_context ( OM_uint32 *  minor_status,
gss_ctx_id_t *  context_handle_P,
gss_buffer_t  output_token 
)

Delete the GSS Security Context.

Parameters:
minor_status The minor status result - this is a globus_result_t cast to a OM_uint32. The
context_handle_P The context handle to be deleted
output_token The
OM_uint32 gss_context_time ( OM_uint32 *  minor_status,
const gss_ctx_id_t  context_handle,
OM_uint32 *  time_rec 
)
Parameters:
minor_status 
context_handle 
time_rec 
Returns:
OM_uint32 gss_get_mic ( OM_uint32 *  minor_status,
const gss_ctx_id_t  context_handle,
gss_qop_t  qop_req,
const gss_buffer_t  message_buffer,
gss_buffer_t  message_token 
)

Calculates a cryptographic MIC (message integrity check) over an application message, and returns that MIC in the token.

The token and message can then be passed to the peer application which calls gss_verify_mic to verify the MIC.

Parameters:
minor_status 
context_handle 
qop_req 
message_buffer 
message_token 
Returns:
OM_uint32 gss_verify_mic ( OM_uint32 *  minor_status,
const gss_ctx_id_t  context_handle,
const gss_buffer_t  message_buffer,
const gss_buffer_t  token_buffer,
gss_qop_t *  qop_state 
)

Check a MIC of the data.

Parameters:
minor_status 
context_handle 
message_buffer 
token_buffer 
qop_state 
Returns:
OM_uint32 gss_wrap ( OM_uint32 *  minor_status,
const gss_ctx_id_t  context_handle,
int  conf_req_flag,
gss_qop_t  qop_req,
const gss_buffer_t  input_message_buffer,
int *  conf_state,
gss_buffer_t  output_message_buffer 
)

Wrap a message for integretry and protection.

We do this using the SSLv3 routines, by writing to the SSL bio, and pulling off the buffer from the back of the write BIO. But we can't do everything SSL might want, such as control messages, or segment the messages here, since we are forced to using the gssapi tokens, and can not communicate directly with our peer. So there maybe some failures which would work with true SSL.

Parameters:
minor_status 
context_handle 
conf_req_flag 
qop_req 
input_message_buffer 
conf_state 
output_message_buffer 
Returns:
OM_uint32 gss_unwrap ( OM_uint32 *  minor_status,
const gss_ctx_id_t  context_handle,
const gss_buffer_t  input_message_buffer,
gss_buffer_t  output_message_buffer,
int *  conf_state,
gss_qop_t *  qop_state 
)

GSSAPI routine to unwrap a buffer which may have been received and wraped by wrap.c.

Return the data from the wrapped buffer. There may also be errors, such as integraty errors. Since we can not communicate directly with our peer, we can not do everything SSL could, i.e. return a token for example.

Parameters:
minor_status 
context_handle 
input_message_buffer 
output_message_buffer 
conf_state 
qop_state 
Returns:
OM_uint32 gss_display_status ( OM_uint32 *  minor_status,
OM_uint32  status_value,
int  status_type,
const gss_OID  mech_type,
OM_uint32 *  message_context,
gss_buffer_t  status_string 
)

Calls the SSLeay error print routines to produce a printable message.

This may need some work, as the SSLeay error messages are more of a trace, and my not be the best for the user. Also don't take advantage of being called in a loop.

Parameters:
minor_status 
status_value 
status_type 
mech_type 
message_context 
status_string 
Returns:
OM_uint32 gss_indicate_mechs ( OM_uint32 *  minor_status,
gss_OID_set *  mech_set 
)

Passes back the mech set of available mechs.

We only have one for now.

Parameters:
minor_status 
mech_set 
Returns:
OM_uint32 gss_compare_name ( OM_uint32 *  minor_status,
const gss_name_t  name1_P,
const gss_name_t  name2_P,
int *  name_equal 
)

Compare two names.

GSSAPI names in this implementation are pointers to x509 names.

Parameters:
minor_status currently is always set to GLOBUS_SUCCESS
name1_P 
name2_P 
name_equal 
Returns:
currently always returns GSS_S_COMPLETE
OM_uint32 gss_import_name ( OM_uint32 *  minor_status,
const gss_buffer_t  input_name_buffer,
const gss_OID  input_name_type,
gss_name_t *  output_name_P 
)

Import a name into a gss_name_tCreates a new gss_name_t which contains a mechanism-specific representation of the input name.

GSSAPI OpenSSL implements the following name types, based on the input_name_type OID:

  • GSS_C_NT_ANONYMOUS (input_name_buffer is ignored)
  • GSS_C_NT_HOSTBASED_SERVICE (input_name_buffer contains a string "service@FQN" which will match /CN=service/FQDN)
  • GSS_C_NT_EXPORT_NAME (input_name_buffer contains a string with the X509_oneline representation of a name) like "/X=Y/Z=A...")
  • GSS_C_NO_OID or GSS_C_NT_USER_NAME (input_name_buffer contains an X.500 name formatted like "/X=Y/Z=A...")
  • GLOBUS_GSS_C_NT_HOST_IP (input_name_buffer contains a string "FQDN/ip-address" which will match names with the FQDN or the IP address)
  • GLOBUS_SSS_C_NT_X509 (input buffer is an X509 struct from OpenSSL)
Parameters:
minor_status Minor status
input_name_buffer Input name buffer which is interpreted based on the input_name_type
input_name_type OID of the name
output_name_P New gss_name_t value containing the name
Return values:
GSS_S_COMPLETE indicates that a valid name representation is output in output_name and described by the type value in output_name_type.
GSS_S_BAD_NAMETYPE indicates that the input_name_type is unsupported by the applicable underlying GSS-API mechanism(s), so the import operation could not be completed.
GSS_S_BAD_NAME indicates that the provided input_name_string is ill-formed in terms of the input_name_type, so the import operation could not be completed.
GSS_S_BAD_MECH indicates that the input presented for import was an exported name object and that its enclosed mechanism type was not recognized or was unsupported by the GSS-API implementation.
GSS_S_FAILURE indicates that the requested operation could not be performed for reasons unspecified at the GSS-API level.
OM_uint32 gss_export_name ( OM_uint32 *  minor_status,
const gss_name_t  input_name_P,
gss_buffer_t  exported_name 
)

Produces a mechanism-independent exported name object.

See section 3.2 of RFC 2743.

OM_uint32 gss_release_name ( OM_uint32 *  minor_status,
gss_name_t *  name_P 
)

Release the GSS Name.

Parameters:
minor_status The minor status result - this is a globus_result_t cast to a (OM_uint32 *).
name_P The gss name to be released
Returns:
The major status - GSS_S_COMPLETE or GSS_S_FAILURE
OM_uint32 gss_release_buffer ( OM_uint32 *  minor_status,
gss_buffer_t  buffer 
)
Parameters:
minor_status 
buffer 
Returns:
OM_uint32 gss_release_oid_set ( OM_uint32 *  minor_status,
gss_OID_set *  mech_set 
)

Release the OID set.

Parameters:
minor_status 
mech_set 
Returns:
OM_uint32 gss_inquire_cred ( OM_uint32 *  minor_status,
const gss_cred_id_t  cred_handle_P,
gss_name_t *  name,
OM_uint32 *  lifetime,
gss_cred_usage_t *  cred_usage,
gss_OID_set *  mechanisms 
)

Get information about the current credential.

We will also allow the return of the proxy file name, if the minor_status is set to a value of 57056 0xdee0 This is done since there is no way to pass back the delegated credential file name.

When 57056 is seen, this will cause a new copy of this credential to be written, and it is the user's responsibility to free the file when done. The name will be a pointer to a char * of the file name which must be freeed. The minor_status will be set to 57057 0xdee1 to indicate this.

DEE - this is a kludge, till the GSSAPI get a better way to return the name.

If the minor status is not changed from 57056 to 57057 assume it is not this gssapi, and a gss name was returned.

Parameters:
minor_status 
cred_handle_P 
name 
lifetime 
cred_usage 
mechanisms 
Returns:
OM_uint32 gss_inquire_context ( OM_uint32 *  minor_status,
const gss_ctx_id_t  context_handle_P,
gss_name_t *  src_name_P,
gss_name_t *  targ_name_P,
OM_uint32 *  lifetime_rec,
gss_OID *  mech_type,
OM_uint32 *  ctx_flags,
int *  locally_initiated,
int *  open 
)
Parameters:
minor_status 
context_handle_P 
src_name_P 
targ_name_P 
lifetime_rec 
mech_type 
ctx_flags 
locally_initiated 
open 
Returns:
OM_uint32 gss_wrap_size_limit ( OM_uint32 *  minor_status,
const gss_ctx_id_t  context_handle,
int  conf_req_flag,
gss_qop_t  qop_req,
OM_uint32  req_output_size,
OM_uint32 *  max_input_size 
)

GSSAPI routine to take a buffer, calculate a MIC which is returned as a token.

We will use the SSL protocol here.

Parameters:
minor_status 
context_handle 
conf_req_flag 
qop_req 
req_output_size 
max_input_size 
Returns:
OM_uint32 gss_export_sec_context ( OM_uint32 *  minor_status,
gss_ctx_id_t *  context_handle_P,
gss_buffer_t  interprocess_token 
)

Saves the important info about the session, converts it to a token, then deletes the context.

Parameters:
minor_status 
context_handle_P 
interprocess_token 
Returns:

For SSL handle We need to save: version of this routine. cred_usage, i.e. are we accept or initiate target/source or name Session: Protocol, cipher, and Master-Key Client-Random Server-Random tmp.key_block: client and server Mac_secrets write_sequence read_sequence write iv read iv

see SSL 3.0 draft http://wp.netscape.com/eng/ssl3/index.html

OM_uint32 gss_import_sec_context ( OM_uint32 *  minor_status,
const gss_buffer_t  interprocess_token,
gss_ctx_id_t *  context_handle_P 
)

GSSAPI routine to import the security context based on the input token.

See: <draft-ietf-cat-gssv2-cbind-04.txt>

OM_uint32 gss_create_empty_oid_set ( OM_uint32 *  minor_status,
gss_OID_set *  oid_set 
)

Creates an object identifier set containing no object identifiers, to which members may be subsequently added using the GSS_Add_OID_set_member() routine.

These routines are intended to be used to construct sets of mechanism object identifiers, for input to GSS_Acquire_cred().

Parameters:
minor_status 
oid_set 
Returns:
GSS_S_COMPLETE indicates successful completion GSS_S_FAILURE indicates that the operation failed
OM_uint32 gss_add_oid_set_member ( OM_uint32 *  minor_status,
const gss_OID  member_oid,
gss_OID_set *  oid_set 
)

Adds an Object Identifier to an Object Identifier set.

This routine is intended for use in conjunction with GSS_Create_empty_OID_set() when constructing a set of mechanism OIDs for input to GSS_Acquire_cred().

Parameters:
minor_status 
member_oid 
oid_set 
Returns:
GSS_S_COMPLETE indicates successful completion GSS_S_FAILURE indicates that the operation failed
OM_uint32 gss_test_oid_set_member ( OM_uint32 *  minor_status,
const gss_OID  member,
const gss_OID_set  set,
int *  present 
)

Interrogates an Object Identifier set to determine whether a specified Object Identifier is a member.

This routine is intended to be used with OID sets returned by GSS_Indicate_mechs(), GSS_Acquire_cred(), and GSS_Inquire_cred().

Parameters:
minor_status 
member 
set 
present 
Returns:
GSS_S_COMPLETE indicates successful completion GSS_S_FAILURE indicates that the operation failed
OM_uint32 gss_duplicate_name ( OM_uint32 *  minor_status,
const gss_name_t  src_name,
gss_name_t *  dest_name 
)

Copy a GSS name.

Parameters:
minor_status 
src_name 
dest_name 
Returns:
OM_uint32 gss_sign ( OM_uint32 *  minor_status,
gss_ctx_id_t  context_handle,
int  qop_req,
gss_buffer_t  message_buffer,
gss_buffer_t  message_token 
)

Deprecated.

Does the same thing as gss_get_mic for V1 compatability.

Parameters:
minor_status 
context_handle 
qop_req 
message_buffer 
message_token 
Returns:
OM_uint32 gss_verify ( OM_uint32 *  minor_status,
gss_ctx_id_t  context_handle,
gss_buffer_t  message_buffer,
gss_buffer_t  token_buffer,
int *  qop_state 
)

Obsolete variant of gss_verify for V1 compatability Check a MIC of the date.

Parameters:
minor_status 
context_handle 
massage_buffer 
token_buffer 
qop_state 
Returns:
OM_uint32 gss_unseal ( OM_uint32 *  minor_status,
gss_ctx_id_t  context_handle,
gss_buffer_t  input_message_buffer,
gss_buffer_t  output_message_buffer,
int *  conf_state,
int *  qop_state 
)

Obsolete variant of gss_wrap for V1 compatability allow for non 32 bit integer in qop_state.

Return the data from the wrapped buffer. There may also be errors, such as integraty errors. Since we can not communicate directly with our peer, we can not do everything SSL could, i.e. return a token for example.

Parameters:
minor_status 
context_handle 
input_message_buffer 
output_message_buffer 
conf_state 
qop_state 
Returns:
OM_uint32 gss_create_empty_buffer_set ( OM_uint32 *  minor_status,
gss_buffer_set_t *  buffer_set 
)

Create a empty buffer set.

This function allocates and initializes a empty buffer set. The memory allocated in this function should be freed by a call to gss_release_buffer_set.

Parameters:
minor_status The minor status returned by this function. This paramter will be 0 upon success.
buffer_set Pointer to a buffer set structure.
Returns:
GSS_S_COMPLETE upon success GSS_S_FAILURE failure
See also:
gss_add_buffer_set_member
gss_release_buffer_set
OM_uint32 gss_add_buffer_set_member ( OM_uint32 *  minor_status,
const gss_buffer_t  member_buffer,
gss_buffer_set_t *  buffer_set 
)

Add a buffer to a buffer set.

This function allocates a new gss_buffer_t, intializes it with the values in the member_buffer parameter.

Parameters:
minor_status The minor status returned by this function. This paramter will be 0 upon success.
member_buffer Buffer to insert into the buffer set.
buffer_set Pointer to a initialized buffer set structure.
Returns:
GSS_S_COMPLETE upon success GSS_S_FAILURE failure
See also:
gss_create_empty_buffer_set
gss_release_buffer_set
OM_uint32 gss_release_buffer_set ( OM_uint32 *  minor_status,
gss_buffer_set_t *  buffer_set 
)

Free all memory associated with a buffer set.

This function will free all memory associated with a buffer set. Note that it will also free all memory associated with the buffers int the buffer set.

Parameters:
minor_status The minor status returned by this function. This paramter will be 0 upon success.
buffer_set Pointer to a buffer set structure. This pointer will point at a NULL value upon return.
Returns:
GSS_S_COMPLETE upon success GSS_S_FAILURE failure
See also:
gss_create_empty_buffer_set
gss_add_buffer_set_member
OM_uint32 gss_import_cred ( OM_uint32 *  minor_status,
gss_cred_id_t *  output_cred_handle,
const gss_OID  desired_mech,
OM_uint32  option_req,
const gss_buffer_t  import_buffer,
OM_uint32  time_req,
OM_uint32 *  time_rec 
)

Import a credential that was exported by gss_export_cred().

This function will import credentials exported by gss_export_cred(). It is intended to allow a multiple use application to checkpoint delegated credentials.

Parameters:
minor_status The minor status returned by this function. This paramter will be 0 upon success.
output_cred_handle Upon success, this paramter will contain the imported credential. When no longer needed this credential should be freed using gss_release_cred().
desired_mech This paramter may be used to specify the desired security mechanism. May be GSS_C_NO_OID.
option_req This paramater indicates which option_req value was used to produce the import_buffer.
import_buffer A buffer produced by gss_export_credential().
time_req The requested period of validity (seconds) for the imported credential. May be NULL.
time_rec This parameter will contain the received period of validity of the imported credential upon success. May be NULL.
Returns:
GSS_S_COMPLETE upon successful completion GSS_S_BAD_MECH if the requested security mechanism is unavailable GSS_S_DEFECTIVE_TOKEN if the import_buffer is defective GSS_S_FAILURE upon general failure
OM_uint32 gss_export_cred ( OM_uint32 *  minor_status,
const gss_cred_id_t  cred_handle,
const gss_OID  desired_mech,
OM_uint32  option_req,
gss_buffer_t  export_buffer 
)

Saves the credential so it can be checkpointed and imported by gss_import_cred.

Parameters:
minor_status 
cred_handle 
desired_mech Should either be gss_mech_globus_gssapi_openssl or NULL (in which case gss_mech_globus_gssapi_openssl is assumed).
option_req 
export_buffer 
Returns:
OM_uint32 gss_init_delegation ( OM_uint32 *  minor_status,
const gss_ctx_id_t  context_handle,
const gss_cred_id_t  cred_handle,
const gss_OID  desired_mech,
const gss_OID_set  extension_oids,
const gss_buffer_set_t  extension_buffers,
const gss_buffer_t  input_token,
OM_uint32  req_flags,
OM_uint32  time_req,
gss_buffer_t  output_token 
)

Initiate the delegation of a credential.

This functions drives the initiating side of the credential delegation process. It is expected to be called in tandem with the gss_accept_delegation function.

Parameters:
minor_status The minor status returned by this function. This paramter will be 0 upon success.
context_handle The security context over which the credential is delegated.
cred_handle The credential to be delegated. May be GSS_C_NO_CREDENTIAL in which case the credential associated with the security context is used.
desired_mech The desired security mechanism. Currently not used. May be GSS_C_NO_OID.
extension_oids A set of extension oids corresponding to buffers in the extension_buffers parameter below. The extensions specified will be added to the delegated credential. May be GSS_C_NO_BUFFER_SET.
extension_buffers A set of extension buffers corresponding to oids in the extension_oids paramter above. May be GSS_C_NO_BUFFER_SET.
input_token The token that was produced by a prior call to gss_accept_delegation. This parameter will be ignored the first time this function is called.
req_flags Flags that modify the behavior of the function. Currently only GSS_C_GLOBUS_SSL_COMPATIBLE and GSS_C_GLOBUS_LIMITED_DELEG_PROXY_FLAG are checked for. The GSS_C_GLOBUS_SSL_COMPATIBLE flag results in tokens that aren't wrapped and GSS_C_GLOBUS_LIMITED_DELEG_PROXY_FLAG causes the delegated proxy to be limited (requires that no extensions are specified.
time_req The requested period of validity (seconds) of the delegated credential. Passing a time_req of 0 cause the delegated credential to have the same lifetime as the credential that issued it.
output_token A token that should be passed to gss_accept_delegation if the return value is GSS_S_CONTINUE_NEEDED.
Returns:
GSS_S_COMPLETE upon successful completion GSS_S_CONTINUE_NEEDED if the function needs to be called again. GSS_S_FAILURE upon failure
OM_uint32 gss_accept_delegation ( OM_uint32 *  minor_status,
const gss_ctx_id_t  context_handle,
const gss_OID_set  extension_oids,
const gss_buffer_set_t  extension_buffers,
const gss_buffer_t  input_token,
OM_uint32  req_flags,
OM_uint32  time_req,
OM_uint32 *  time_rec,
gss_cred_id_t *  delegated_cred_handle,
gss_OID *  mech_type,
gss_buffer_t  output_token 
)

Accept a delegated credential.

This functions drives the accepting side of the credential delegation process. It is expected to be called in tandem with the gss_init_delegation function.

Parameters:
minor_status The minor status returned by this function. This paramter will be 0 upon success.
context_handle The security context over which the credential is delegated.
extension_oids A set of extension oids corresponding to buffers in the extension_buffers paramter below. May be GSS_C_NO_BUFFER_SET. Currently not used.
extension_buffers A set of extension buffers corresponding to oids in the extension_oids paramter above. May be GSS_C_NO_BUFFER_SET. Currently not used.
input_token The token that was produced by a prior call to gss_init_delegation.
req_flags Flags that modify the behavior of the function. Currently only GSS_C_GLOBUS_SSL_COMPATIBLE is checked for. This flag results in tokens that aren't wrapped.
time_req The requested period of validity (seconds) of the delegated credential. Currently a noop.
time_rec This parameter will contain the received period of validity of the delegated credential upon success. May be NULL.
delegated_cred_handle This parameter will contain the delegated credential upon success.
mech_type Returns the security mechanism upon success. Currently not implemented. May be NULL.
output_token A token that should be passed to gss_init_delegation if the return value is GSS_S_CONTINUE_NEEDED.
Returns:
GSS_S_COMPLETE upon successful completion GSS_S_CONTINUE_NEEDED if the function needs to be called again. GSS_S_FAILURE upon failure
OM_uint32 gss_inquire_cred_by_oid ( OM_uint32 *  minor_status,
const gss_cred_id_t  cred_handle,
const gss_OID  desired_object,
gss_buffer_set_t *  data_set 
)

NOTE: Checks both the cert in the credential and the certs in the cert chain for a valid extension that matches the desired OID.

The first one found is used, starting with the endpoint cert, and then searching the cert chain.

Parameters:
minor_status 
cred_handle 
desired_object 
data_set 
Returns:
OM_uint32 gss_set_sec_context_option ( OM_uint32 *  minor_status,
gss_ctx_id_t *  context_handle,
const gss_OID  option,
const gss_buffer_t  value 
)

GSSAPI routine to initiate the sending of a security context See: <draft-ietf-cat-gssv2-cbind-04.txt>

Parameters:
minor_status 
context_handle 
option 
value 
Returns:

about globus | globus toolkit | dev.globus

Comments? webmaster@globus.org