aboutsummaryrefslogtreecommitdiff
path: root/lib/gssapi/gssapi.cat3
diff options
context:
space:
mode:
Diffstat (limited to 'lib/gssapi/gssapi.cat3')
-rw-r--r--lib/gssapi/gssapi.cat3114
1 files changed, 0 insertions, 114 deletions
diff --git a/lib/gssapi/gssapi.cat3 b/lib/gssapi/gssapi.cat3
deleted file mode 100644
index 701dd4264c0a..000000000000
--- a/lib/gssapi/gssapi.cat3
+++ /dev/null
@@ -1,114 +0,0 @@
-GSSAPI(3) BSD Library Functions Manual GSSAPI(3)
-
-NAME
- gssapi -- Generic Security Service Application Program Interface library
-
-LIBRARY
- GSS-API Library (libgssapi, -lgssapi)
-
-DESCRIPTION
- The Generic Security Service Application Program Interface (GSS-API) pro-
- vides security services to callers in a generic fashion, supportable with
- a range of underlying mechanisms and technologies and hence allowing
- source-level portability of applications to different environments.
-
- The GSS-API implementation in Heimdal implements the Kerberos 5 and the
- SPNEGO GSS-API security mechanisms.
-
-LIST OF FUNCTIONS
- These functions constitute the gssapi library, libgssapi. Declarations
- for these functions may be obtained from the include file gssapi.h.
- Name/Page
- gss_accept_sec_context(3)
- gss_acquire_cred(3)
- gss_add_cred(3)
- gss_add_oid_set_member(3)
- gss_canonicalize_name(3)
- gss_compare_name(3)
- gss_context_time(3)
- gss_create_empty_oid_set(3)
- gss_delete_sec_context(3)
- gss_display_name(3)
- gss_display_status(3)
- gss_duplicate_name(3)
- gss_export_name(3)
- gss_export_sec_context(3)
- gss_get_mic(3)
- gss_import_name(3)
- gss_import_sec_context(3)
- gss_indicate_mechs(3)
- gss_init_sec_context(3)
- gss_inquire_context(3)
- gss_inquire_cred(3)
- gss_inquire_cred_by_mech(3)
- gss_inquire_mechs_for_name(3)
- gss_inquire_names_for_mech(3)
- gss_krb5_ccache_name(3)
- gss_krb5_compat_des3_mic(3)
- gss_krb5_copy_ccache(3)
- gss_krb5_extract_authz_data_from_sec_context(3)
- gss_krb5_import_ccache(3)
- gss_process_context_token(3)
- gss_release_buffer(3)
- gss_release_cred(3)
- gss_release_name(3)
- gss_release_oid_set(3)
- gss_seal(3)
- gss_sign(3)
- gss_test_oid_set_member(3)
- gss_unseal(3)
- gss_unwrap(3)
- gss_verify(3)
- gss_verify_mic(3)
- gss_wrap(3)
- gss_wrap_size_limit(3)
-
-COMPATIBILITY
- The Heimdal GSS-API implementation had a bug in releases before 0.6 that
- made it fail to inter-operate when using DES3 with other GSS-API imple-
- mentations when using gss_get_mic() / gss_verify_mic(). It is possible
- to modify the behavior of the generator of the MIC with the krb5.conf
- configuration file so that old clients/servers will still work.
-
- New clients/servers will try both the old and new MIC in Heimdal 0.6. In
- 0.7 it will check only if configured - the compatibility code will be re-
- moved in 0.8.
-
- Heimdal 0.6 still generates by default the broken GSS-API DES3 mic, this
- will change in 0.7 to generate correct des3 mic.
-
- To turn on compatibility with older clients and servers, change the
- [gssapi] broken_des3_mic in krb5.conf that contains a list of globbing
- expressions that will be matched against the server name. To turn off
- generation of the old (incompatible) mic of the MIC use [gssapi]
- correct_des3_mic.
-
- If a match for a entry is in both [gssapi] correct_des3_mic and [gssapi]
- broken_des3_mic, the later will override.
-
- This config option modifies behaviour for both clients and servers.
-
- Microsoft implemented SPNEGO to Windows2000, however, they managed to get
- it wrong, their implementation didn't fill in the MechListMIC in the re-
- ply token with the right content. There is a work around for this prob-
- lem, but not all implementation support it.
-
- Heimdal defaults to correct SPNEGO when the the kerberos implementation
- uses CFX, or when it is configured by the user. To turn on compatibility
- with peers, use option [gssapi] require_mechlist_mic.
-
-EXAMPLES
- [gssapi]
- broken_des3_mic = cvs/*@SU.SE
- broken_des3_mic = host/*@E.KTH.SE
- correct_des3_mic = host/*@SU.SE
- require_mechlist_mic = host/*@SU.SE
-
-BUGS
- All of 0.5.x versions of heimdal had broken token delegations in the
- client side, the server side was correct.
-
-SEE ALSO
- krb5(3), krb5.conf(5), kerberos(8)
-
-BSD April 20, 2005 BSD