3960614646
Although groff_mdoc(7) gives another impression, this is the ordering most widely used and also required by mdocml/mandoc. Reviewed by: ru Approved by: philip, ed (mentors)
172 lines
5.8 KiB
Groff
172 lines
5.8 KiB
Groff
.\" -*- nroff -*-
|
|
.\"
|
|
.\" Copyright (c) 2005 Doug Rabson
|
|
.\" All rights reserved.
|
|
.\"
|
|
.\" Redistribution and use in source and binary forms, with or without
|
|
.\" modification, are permitted provided that the following conditions
|
|
.\" are met:
|
|
.\" 1. Redistributions of source code must retain the above copyright
|
|
.\" notice, this list of conditions and the following disclaimer.
|
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
|
.\" notice, this list of conditions and the following disclaimer in the
|
|
.\" documentation and/or other materials provided with the distribution.
|
|
.\"
|
|
.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
|
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
.\" SUCH DAMAGE.
|
|
.\"
|
|
.\" $FreeBSD$
|
|
.\"
|
|
.\" The following commands are required for all man pages.
|
|
.Dd January 26, 2010
|
|
.Dt GSS_VERIFY_MIC 3 PRM
|
|
.Os
|
|
.Sh NAME
|
|
.Nm gss_verify_mic ,
|
|
.Nm gss_verify
|
|
.Nd Check a MIC against a message; verify integrity of a received message
|
|
.\" This next command is for sections 2 and 3 only.
|
|
.\" .Sh LIBRARY
|
|
.Sh SYNOPSIS
|
|
.In "gssapi/gssapi.h"
|
|
.Ft OM_uint32
|
|
.Fo gss_verify_mic
|
|
.Fa "OM_uint32 *minor_status"
|
|
.Fa "const gss_ctx_id_t context_handle"
|
|
.Fa "const gss_buffer_t message_buffer"
|
|
.Fa "const gss_buffer_t token_buffer"
|
|
.Fa "gss_qop_t *qop_state"
|
|
.Fc
|
|
.Ft OM_uint32
|
|
.Fo gss_verify
|
|
.Fa "OM_uint32 *minor_status"
|
|
.Fa "gss_ctx_id_t context_handle"
|
|
.Fa "gss_buffer_t message_buffer"
|
|
.Fa "gss_buffer_t token_buffer"
|
|
.Fa "gss_qop_t *qop_state"
|
|
.Fc
|
|
.Sh DESCRIPTION
|
|
Verifies that a cryptographic MIC,
|
|
contained in the token parameter,
|
|
fits the supplied message.
|
|
The
|
|
.Fa qop_state
|
|
parameter allows a message recipient to determine the strength of
|
|
protection that was applied to the message.
|
|
.Pp
|
|
Since some application-level protocols may wish to use tokens emitted
|
|
by
|
|
.Fn gss_wrap
|
|
to provide "secure framing",
|
|
implementations must support the calculation and verification of MICs
|
|
over zero-length messages.
|
|
.Pp
|
|
The
|
|
.Fn gss_verify
|
|
routine is an obsolete variant of
|
|
.Fn gss_verify_mic .
|
|
It is provided for backwards
|
|
compatibility with applications using the GSS-API V1 interface.
|
|
A distinct entrypoint (as opposed to #define) is provided,
|
|
both to allow GSS-API V1 applications to link
|
|
and to retain the slight parameter type differences between the
|
|
obsolete versions of this routine and its current form.
|
|
.Sh PARAMETERS
|
|
.Bl -tag
|
|
.It minor_status
|
|
Mechanism specific status code.
|
|
.It context_handle
|
|
Identifies the context on which the message arrived.
|
|
.It message_buffer
|
|
Message to be verified.
|
|
.It token_buffer
|
|
Token associated with message.
|
|
.It qop_state
|
|
Quality of protection gained from MIC.
|
|
Specify
|
|
.Dv NULL
|
|
if not required.
|
|
.El
|
|
.Sh RETURN VALUES
|
|
.Bl -tag
|
|
.It GSS_S_COMPLETE
|
|
Successful completion
|
|
.It GSS_S_DEFECTIVE_TOKEN
|
|
The token failed consistency checks
|
|
.It GSS_S_BAD_SIG
|
|
The MIC was incorrect
|
|
.It GSS_S_DUPLICATE_TOKEN
|
|
The token was valid,
|
|
and contained a correct MIC for the message,
|
|
but it had already been processed
|
|
.It GSS_S_OLD_TOKEN
|
|
The token was valid,
|
|
and contained a correct MIC for the message,
|
|
but it is too old to check for duplication
|
|
.It GSS_S_UNSEQ_TOKEN
|
|
The token was valid,
|
|
and contained a correct MIC for the message,
|
|
but has been verified out of sequence;
|
|
a later token has already been received.
|
|
.It GSS_S_GAP_TOKEN
|
|
The token was valid,
|
|
and contained a correct MIC for the message,
|
|
but has been verified out of sequence;
|
|
an earlier expected token has not yet been received
|
|
.It GSS_S_CONTEXT_EXPIRED
|
|
The context has already expired
|
|
.It GSS_S_NO_CONTEXT
|
|
The context_handle parameter did not identify a valid context
|
|
.El
|
|
.Sh SEE ALSO
|
|
.Xr gss_wrap 3
|
|
.Sh STANDARDS
|
|
.Bl -tag
|
|
.It RFC 2743
|
|
Generic Security Service Application Program Interface Version 2, Update 1
|
|
.It RFC 2744
|
|
Generic Security Service API Version 2 : C-bindings
|
|
.El
|
|
.Sh HISTORY
|
|
The
|
|
.Nm
|
|
function first appeared in
|
|
.Fx 7.0 .
|
|
.Sh AUTHORS
|
|
John Wray, Iris Associates
|
|
.Sh COPYRIGHT
|
|
Copyright (C) The Internet Society (2000). All Rights Reserved.
|
|
.Pp
|
|
This document and translations of it may be copied and furnished to
|
|
others, and derivative works that comment on or otherwise explain it
|
|
or assist in its implementation may be prepared, copied, published
|
|
and distributed, in whole or in part, without restriction of any
|
|
kind, provided that the above copyright notice and this paragraph are
|
|
included on all such copies and derivative works. However, this
|
|
document itself may not be modified in any way, such as by removing
|
|
the copyright notice or references to the Internet Society or other
|
|
Internet organizations, except as needed for the purpose of
|
|
developing Internet standards in which case the procedures for
|
|
copyrights defined in the Internet Standards process must be
|
|
followed, or as required to translate it into languages other than
|
|
English.
|
|
.Pp
|
|
The limited permissions granted above are perpetual and will not be
|
|
revoked by the Internet Society or its successors or assigns.
|
|
.Pp
|
|
This document and the information contained herein is provided on an
|
|
"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
|
|
TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
|
|
BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
|
|
HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
|
|
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
|