GSS Req Flags
Collaboration diagram for GSS Req Flags:

Modules

Defines

Functions


Detailed Description

These macros set the REQUESTED type of context - these should be set (or not) in the context's req_flags (or in the context's ret_flags if accept_sec_context is being called)


Define Documentation

Set if you don't want a context to accept a limited proxy.

If this flag is set, and a limited proxy is received, the call will not be successful and the context will not be set up

Set if you wan the delegated proxy to be a limited proxy.

Set if you want to accept proxies signed by limited proxies.

Deprecated:
We now accept proxies signed by limited proxies if they are limited or independent.

Set if you want to allow CA certs without a signing policy to verify.

#define GSS_C_GLOBUS_FORCE_SSL3   131072

Set if you want to force SSLv3 instead of negotiating TLSv1 or SSLv3.

Deprecated:
We now accept proxies signed by limited proxies if they are limited or independent.

Function Documentation

OM_uint32 gss_acquire_cred ( OM_uint32 *  minor_status,
const gss_name_t  desired_name_P,
OM_uint32  time_req,
const gss_OID_set  desired_mechs,
gss_cred_usage_t  cred_usage,
gss_cred_id_t *  output_cred_handle_P,
gss_OID_set *  actual_mechs,
OM_uint32 *  time_rec 
)

GSSAPI routine to acquire the local credential.

See the latest IETF draft/RFC on the GSS C bindings.

Gets the local credentials. The proxy_init_cred does most of the work of setting up the SSL_ctx, getting the user's cert, key, etc.

The globusid will be obtained from the certificate. (Minus and /CN=proxy entries.)

Parameters:
minor_statusMechanism specific status code. In this implementation, the minor_status is a cast from a globus_result_t value, which is either GLOBUS_SUCCESS or a globus error object ID if an error occurred.
desired_name_PName of principle whose credentials should be acquired This parameter maps to the desired subject of the cert to be acquired as the credential. Possible values are: For a service cert: <service name>=""><fqdn> For a host cert: <fqdn> For a proxy cert: <subject name>=""> For a user cert: <subject name>=""> This parameter can be NULL, in which case the cert is chosen using a default search order of: host, proxy, user, service
time_reqNumber of seconds that credentials should remain valid. This value can be GSS_C_INDEFINITE for an unlimited lifetime. NOTE: in the current implementation, this parameter is ignored, since you can't change the expiration of a signed cert.
desired_mechs
cred_usage
output_cred_handle_P
actual_mechs
time_rec
OM_uint32 gss_release_cred ( OM_uint32 *  minor_status,
gss_cred_id_t *  cred_handle_P 
)

Release the GSS cred handle.

Parameters:
minor_statusThe minor status result - this is a globus_result_t cast to a OM_uint32. To access the globus error object use: globus_error_get((globus_result_t) *minor_status)
cred_handle_PThe gss cred handle to be released
Returns:
The major status - GSS_S_COMPLETE or GSS_S_FAILURE
OM_uint32 gss_accept_sec_context ( OM_uint32 *  minor_status,
gss_ctx_id_t *  context_handle_P,
const gss_cred_id_t  acceptor_cred_handle,
const gss_buffer_t  input_token,
const gss_channel_bindings_t  input_chan_bindings,
gss_name_t *  src_name_P,
gss_OID *  mech_type,
gss_buffer_t  output_token,
OM_uint32 *  ret_flags,
OM_uint32 *  time_rec,
gss_cred_id_t *  delegated_cred_handle_P 
)
Parameters:
minor_status
context_handle_P
acceptor_cred_handle
input_token
input_chan_bindings
src_name_P
mech_type
output_token
ret_flagsAlso used as req_flags for other functions
time_rec
delegated_cred_handle_P
Returns:
OM_uint32 gss_delete_sec_context ( OM_uint32 *  minor_status,
gss_ctx_id_t *  context_handle_P,
gss_buffer_t  output_token 
)

Delete the GSS Security Context.

Parameters:
minor_statusThe minor status result - this is a globus_result_t cast to a OM_uint32. The
context_handle_PThe context handle to be deleted
output_tokenThe
OM_uint32 gss_context_time ( OM_uint32 *  minor_status,
const gss_ctx_id_t  context_handle,
OM_uint32 *  time_rec 
)
Parameters:
minor_status
context_handle
time_rec
Returns:
OM_uint32 gss_get_mic ( OM_uint32 *  minor_status,
const gss_ctx_id_t  context_handle,
gss_qop_t  qop_req,
const gss_buffer_t  message_buffer,
gss_buffer_t  message_token 
)

Calculates a cryptographic MIC (message integrity check) over an application message, and returns that MIC in the token.

The token and message can then be passed to the peer application which calls gss_verify_mic to verify the MIC.

Parameters:
minor_status
context_handle
qop_req
message_buffer
message_token
Returns:
OM_uint32 gss_verify_mic ( OM_uint32 *  minor_status,
const gss_ctx_id_t  context_handle,
const gss_buffer_t  message_buffer,
const gss_buffer_t  token_buffer,
gss_qop_t *  qop_state 
)

Check a MIC of the data.

Parameters:
minor_status
context_handle
message_buffer
token_buffer
qop_state
Returns:
OM_uint32 gss_wrap ( OM_uint32 *  minor_status,
const gss_ctx_id_t  context_handle,
int  conf_req_flag,
gss_qop_t  qop_req,
const gss_buffer_t  input_message_buffer,
int *  conf_state,
gss_buffer_t  output_message_buffer 
)

Wrap a message for integretry and protection.

We do this using the SSLv3 routines, by writing to the SSL bio, and pulling off the buffer from the back of the write BIO. But we can't do everything SSL might want, such as control messages, or segment the messages here, since we are forced to using the gssapi tokens, and can not communicate directly with our peer. So there maybe some failures which would work with true SSL.

Parameters:
minor_status
context_handle
conf_req_flag
qop_req
input_message_buffer
conf_state
output_message_buffer
Returns:
OM_uint32 gss_unwrap ( OM_uint32 *  minor_status,
const gss_ctx_id_t  context_handle,
const gss_buffer_t  input_message_buffer,
gss_buffer_t  output_message_buffer,
int *  conf_state,
gss_qop_t *  qop_state 
)

GSSAPI routine to unwrap a buffer which may have been received and wraped by wrap.c.

Return the data from the wrapped buffer. There may also be errors, such as integraty errors. Since we can not communicate directly with our peer, we can not do everything SSL could, i.e. return a token for example.

Parameters:
minor_status
context_handle
input_message_buffer
output_message_buffer
conf_state
qop_state
Returns:
OM_uint32 gss_display_status ( OM_uint32 *  minor_status,
OM_uint32  status_value,
int  status_type,
const gss_OID  mech_type,
OM_uint32 *  message_context,
gss_buffer_t  status_string 
)

Calls the SSLeay error print routines to produce a printable message.

This may need some work, as the SSLeay error messages are more of a trace, and my not be the best for the user. Also don't take advantage of being called in a loop.

Parameters:
minor_status
status_value
status_type
mech_type
message_context
status_string
Returns:
OM_uint32 gss_indicate_mechs ( OM_uint32 *  minor_status,
gss_OID_set *  mech_set 
)

Passes back the mech set of available mechs.

We only have one for now.

Parameters:
minor_status
mech_set
Returns:
OM_uint32 gss_compare_name ( OM_uint32 *  minor_status,
const gss_name_t  name1_P,
const gss_name_t  name2_P,
int *  name_equal 
)

Compare two names.

GSSAPI names in this implementation are pointers to x509 names.

Parameters:
minor_statuscurrently is always set to GLOBUS_SUCCESS
name1_P
name2_P
name_equal
Returns:
currently always returns GSS_S_COMPLETE
OM_uint32 gss_import_name ( OM_uint32 *  minor_status,
const gss_buffer_t  input_name_buffer,
const gss_OID  input_name_type,
gss_name_t *  output_name_P 
)

Import a name into a gss_name_tCreates a new gss_name_t which contains a mechanism-specific representation of the input name.

GSSAPI OpenSSL implements the following name types, based on the input_name_type OID:

  • GSS_C_NT_ANONYMOUS (input_name_buffer is ignored)
    • GSS_C_NT_HOSTBASED_SERVICE (input_name_buffer contains a string "service@FQN" which will match /CN=service/FQDN)
    • GSS_C_NT_EXPORT_NAME (input_name_buffer contains a string with the X509_oneline representation of a name) like "/X=Y/Z=A...")
    • GSS_C_NO_OID or GSS_C_NT_USER_NAME (input_name_buffer contains an X.500 name formatted like "/X=Y/Z=A...")
    • GLOBUS_GSS_C_NT_HOST_IP (input_name_buffer contains a string "FQDN/ip-address" which will match names with the FQDN or the IP address)
    • GLOBUS_SSS_C_NT_X509 (input buffer is an X509 struct from OpenSSL)
Parameters:
minor_statusMinor status
input_name_bufferInput name buffer which is interpreted based on the input_name_type
input_name_typeOID of the name
output_name_PNew gss_name_t value containing the name
Return values:
GSS_S_COMPLETEindicates that a valid name representation is output in output_name and described by the type value in output_name_type.
GSS_S_BAD_NAMETYPEindicates that the input_name_type is unsupported by the applicable underlying GSS-API mechanism(s), so the import operation could not be completed.
GSS_S_BAD_NAMEindicates that the provided input_name_string is ill-formed in terms of the input_name_type, so the import operation could not be completed.
GSS_S_BAD_MECHindicates that the input presented for import was an exported name object and that its enclosed mechanism type was not recognized or was unsupported by the GSS-API implementation.
GSS_S_FAILUREindicates that the requested operation could not be performed for reasons unspecified at the GSS-API level.
OM_uint32 gss_export_name ( OM_uint32 *  minor_status,
const gss_name_t  input_name_P,
gss_buffer_t  exported_name 
)

Produces a mechanism-independent exported name object.

See section 3.2 of RFC 2743.

OM_uint32 gss_release_name ( OM_uint32 *  minor_status,
gss_name_t *  name_P 
)

Release the GSS Name.

Parameters:
minor_statusThe minor status result - this is a globus_result_t cast to a (OM_uint32 *).
name_PThe gss name to be released
Returns:
The major status - GSS_S_COMPLETE or GSS_S_FAILURE
OM_uint32 gss_release_buffer ( OM_uint32 *  minor_status,
gss_buffer_t  buffer 
)
Parameters:
minor_status
buffer
Returns:
OM_uint32 gss_release_oid_set ( OM_uint32 *  minor_status,
gss_OID_set *  mech_set 
)

Release the OID set.

Parameters:
minor_status
mech_set
Returns:
OM_uint32 gss_inquire_cred ( OM_uint32 *  minor_status,
const gss_cred_id_t  cred_handle_P,
gss_name_t *  name,
OM_uint32 *  lifetime,
gss_cred_usage_t *  cred_usage,
gss_OID_set *  mechanisms 
)

Get information about the current credential.

We will also allow the return of the proxy file name, if the minor_status is set to a value of 57056 0xdee0 This is done since there is no way to pass back the delegated credential file name.

When 57056 is seen, this will cause a new copy of this credential to be written, and it is the user's responsibility to free the file when done. The name will be a pointer to a char * of the file name which must be freeed. The minor_status will be set to 57057 0xdee1 to indicate this.

DEE - this is a kludge, till the GSSAPI get a better way to return the name.

If the minor status is not changed from 57056 to 57057 assume it is not this gssapi, and a gss name was returned.

Parameters:
minor_status
cred_handle_P
name
lifetime
cred_usage
mechanisms
Returns:
OM_uint32 gss_inquire_context ( OM_uint32 *  minor_status,
const gss_ctx_id_t  context_handle_P,
gss_name_t *  src_name_P,
gss_name_t *  targ_name_P,
OM_uint32 *  lifetime_rec,
gss_OID *  mech_type,
OM_uint32 *  ctx_flags,
int *  locally_initiated,
int *  open 
)
Parameters:
minor_status
context_handle_P
src_name_P
targ_name_P
lifetime_rec
mech_type
ctx_flags
locally_initiated
open
Returns:
OM_uint32 gss_wrap_size_limit ( OM_uint32 *  minor_status,
const gss_ctx_id_t  context_handle,
int  conf_req_flag,
gss_qop_t  qop_req,
OM_uint32  req_output_size,
OM_uint32 *  max_input_size 
)

GSSAPI routine to take a buffer, calculate a MIC which is returned as a token.

We will use the SSL protocol here.

Parameters:
minor_status
context_handle
conf_req_flag
qop_req
req_output_size
max_input_size
Returns:
OM_uint32 gss_export_sec_context ( OM_uint32 *  minor_status,
gss_ctx_id_t *  context_handle_P,
gss_buffer_t  interprocess_token 
)

Saves the important info about the session, converts it to a token, then deletes the context.

Parameters:
minor_status
context_handle_P
interprocess_token
Returns:

For SSL handle We need to save: version of this routine. cred_usage, i.e. are we accept or initiate target/source or name Session: Protocol, cipher, and Master-Key Client-Random Server-Random tmp.key_block: client and server Mac_secrets write_sequence read_sequence write iv read iv

see SSL 3.0 draft http://wp.netscape.com/eng/ssl3/index.html

OM_uint32 gss_import_sec_context ( OM_uint32 *  minor_status,
const gss_buffer_t  interprocess_token,
gss_ctx_id_t *  context_handle_P 
)

GSSAPI routine to import the security context based on the input token.

See: <draft-ietf-cat-gssv2-cbind-04.txt>

OM_uint32 gss_create_empty_oid_set ( OM_uint32 *  minor_status,
gss_OID_set *  oid_set 
)

Creates an object identifier set containing no object identifiers, to which members may be subsequently added using the GSS_Add_OID_set_member() routine.

These routines are intended to be used to construct sets of mechanism object identifiers, for input to GSS_Acquire_cred().

Parameters:
minor_status
oid_set
Returns:
GSS_S_COMPLETE indicates successful completion GSS_S_FAILURE indicates that the operation failed
OM_uint32 gss_add_oid_set_member ( OM_uint32 *  minor_status,
const gss_OID  member_oid,
gss_OID_set *  oid_set 
)

Adds an Object Identifier to an Object Identifier set.

This routine is intended for use in conjunction with GSS_Create_empty_OID_set() when constructing a set of mechanism OIDs for input to GSS_Acquire_cred().

Parameters:
minor_status
member_oid
oid_set
Returns:
GSS_S_COMPLETE indicates successful completion GSS_S_FAILURE indicates that the operation failed
OM_uint32 gss_test_oid_set_member ( OM_uint32 *  minor_status,
const gss_OID  member,
const gss_OID_set  set,
int *  present 
)

Interrogates an Object Identifier set to determine whether a specified Object Identifier is a member.

This routine is intended to be used with OID sets returned by GSS_Indicate_mechs(), GSS_Acquire_cred(), and GSS_Inquire_cred().

Parameters:
minor_status
member
set
present
Returns:
GSS_S_COMPLETE indicates successful completion GSS_S_FAILURE indicates that the operation failed
OM_uint32 gss_duplicate_name ( OM_uint32 *  minor_status,
const gss_name_t  src_name,
gss_name_t *  dest_name 
)

Copy a GSS name.

Parameters:
minor_status
src_name
dest_name
Returns:
OM_uint32 gss_sign ( OM_uint32 *  minor_status,
gss_ctx_id_t  context_handle,
int  qop_req,
gss_buffer_t  message_buffer,
gss_buffer_t  message_token 
)

Deprecated.

Does the same thing as gss_get_mic for V1 compatability.

Parameters:
minor_status
context_handle
qop_req
message_buffer
message_token
Returns:
OM_uint32 gss_verify ( OM_uint32 *  minor_status,
gss_ctx_id_t  context_handle,
gss_buffer_t  message_buffer,
gss_buffer_t  token_buffer,
int *  qop_state 
)

Obsolete variant of gss_verify for V1 compatability Check a MIC of the date.

Parameters:
minor_status
context_handle
massage_buffer
token_buffer
qop_state
Returns:
OM_uint32 gss_unseal ( OM_uint32 *  minor_status,
gss_ctx_id_t  context_handle,
gss_buffer_t  input_message_buffer,
gss_buffer_t  output_message_buffer,
int *  conf_state,
int *  qop_state 
)

Obsolete variant of gss_wrap for V1 compatability allow for non 32 bit integer in qop_state.

Return the data from the wrapped buffer. There may also be errors, such as integraty errors. Since we can not communicate directly with our peer, we can not do everything SSL could, i.e. return a token for example.

Parameters:
minor_status
context_handle
input_message_buffer
output_message_buffer
conf_state
qop_state
Returns:
OM_uint32 gss_create_empty_buffer_set ( OM_uint32 *  minor_status,
gss_buffer_set_t *  buffer_set 
)

Create a empty buffer set.

This function allocates and initializes a empty buffer set. The memory allocated in this function should be freed by a call to gss_release_buffer_set.

Parameters:
minor_statusThe minor status returned by this function. This paramter will be 0 upon success.
buffer_setPointer to a buffer set structure.
Returns:
GSS_S_COMPLETE upon success GSS_S_FAILURE failure
See also:
gss_add_buffer_set_member
gss_release_buffer_set
OM_uint32 gss_add_buffer_set_member ( OM_uint32 *  minor_status,
const gss_buffer_t  member_buffer,
gss_buffer_set_t *  buffer_set 
)

Add a buffer to a buffer set.

This function allocates a new gss_buffer_t, intializes it with the values in the member_buffer parameter.

Parameters:
minor_statusThe minor status returned by this function. This paramter will be 0 upon success.
member_bufferBuffer to insert into the buffer set.
buffer_setPointer to a initialized buffer set structure.
Returns:
GSS_S_COMPLETE upon success GSS_S_FAILURE failure
See also:
gss_create_empty_buffer_set
gss_release_buffer_set
OM_uint32 gss_release_buffer_set ( OM_uint32 *  minor_status,
gss_buffer_set_t *  buffer_set 
)

Free all memory associated with a buffer set.

This function will free all memory associated with a buffer set. Note that it will also free all memory associated with the buffers int the buffer set.

Parameters:
minor_statusThe minor status returned by this function. This paramter will be 0 upon success.
buffer_setPointer to a buffer set structure. This pointer will point at a NULL value upon return.
Returns:
GSS_S_COMPLETE upon success GSS_S_FAILURE failure
See also:
gss_create_empty_buffer_set
gss_add_buffer_set_member
OM_uint32 gss_import_cred ( OM_uint32 *  minor_status,
gss_cred_id_t *  output_cred_handle,
const gss_OID  desired_mech,
OM_uint32  option_req,
const gss_buffer_t  import_buffer,
OM_uint32  time_req,
OM_uint32 *  time_rec 
)

Import a credential that was exported by gss_export_cred().

This function will import credentials exported by gss_export_cred(). It is intended to allow a multiple use application to checkpoint delegated credentials.

Parameters:
minor_statusThe minor status returned by this function. This paramter will be 0 upon success.
output_cred_handleUpon success, this paramter will contain the imported credential. When no longer needed this credential should be freed using gss_release_cred().
desired_mechThis paramter may be used to specify the desired security mechanism. May be GSS_C_NO_OID.
option_reqThis paramater indicates which option_req value was used to produce the import_buffer.
import_bufferA buffer produced by gss_export_credential().
time_reqThe requested period of validity (seconds) for the imported credential. May be NULL.
time_recThis parameter will contain the received period of validity of the imported credential upon success. May be NULL.
Returns:
GSS_S_COMPLETE upon successful completion GSS_S_BAD_MECH if the requested security mechanism is unavailable GSS_S_DEFECTIVE_TOKEN if the import_buffer is defective GSS_S_FAILURE upon general failure
OM_uint32 gss_export_cred ( OM_uint32 *  minor_status,
const gss_cred_id_t  cred_handle,
const gss_OID  desired_mech,
OM_uint32  option_req,
gss_buffer_t  export_buffer 
)

Saves the credential so it can be checkpointed and imported by gss_import_cred.

Parameters:
minor_status
cred_handle
desired_mechShould either be gss_mech_globus_gssapi_openssl or NULL (in which case gss_mech_globus_gssapi_openssl is assumed).
option_req
export_buffer
Returns:
OM_uint32 gss_init_delegation ( OM_uint32 *  minor_status,
const gss_ctx_id_t  context_handle,
const gss_cred_id_t  cred_handle,
const gss_OID  desired_mech,
const gss_OID_set  extension_oids,
const gss_buffer_set_t  extension_buffers,
const gss_buffer_t  input_token,
OM_uint32  req_flags,
OM_uint32  time_req,
gss_buffer_t  output_token 
)

Initiate the delegation of a credential.

This functions drives the initiating side of the credential delegation process. It is expected to be called in tandem with the gss_accept_delegation function.

Parameters:
minor_statusThe minor status returned by this function. This paramter will be 0 upon success.
context_handleThe security context over which the credential is delegated.
cred_handleThe credential to be delegated. May be GSS_C_NO_CREDENTIAL in which case the credential associated with the security context is used.
desired_mechThe desired security mechanism. Currently not used. May be GSS_C_NO_OID.
extension_oidsA set of extension oids corresponding to buffers in the extension_buffers parameter below. The extensions specified will be added to the delegated credential. May be GSS_C_NO_BUFFER_SET.
extension_buffersA set of extension buffers corresponding to oids in the extension_oids paramter above. May be GSS_C_NO_BUFFER_SET.
input_tokenThe token that was produced by a prior call to gss_accept_delegation. This parameter will be ignored the first time this function is called.
req_flagsFlags that modify the behavior of the function. Currently only GSS_C_GLOBUS_SSL_COMPATIBLE and GSS_C_GLOBUS_LIMITED_DELEG_PROXY_FLAG are checked for. The GSS_C_GLOBUS_SSL_COMPATIBLE flag results in tokens that aren't wrapped and GSS_C_GLOBUS_LIMITED_DELEG_PROXY_FLAG causes the delegated proxy to be limited (requires that no extensions are specified.
time_reqThe requested period of validity (seconds) of the delegated credential. Passing a time_req of 0 cause the delegated credential to have the same lifetime as the credential that issued it.
output_tokenA token that should be passed to gss_accept_delegation if the return value is GSS_S_CONTINUE_NEEDED.
Returns:
GSS_S_COMPLETE upon successful completion GSS_S_CONTINUE_NEEDED if the function needs to be called again. GSS_S_FAILURE upon failure
OM_uint32 gss_accept_delegation ( OM_uint32 *  minor_status,
const gss_ctx_id_t  context_handle,
const gss_OID_set  extension_oids,
const gss_buffer_set_t  extension_buffers,
const gss_buffer_t  input_token,
OM_uint32  req_flags,
OM_uint32  time_req,
OM_uint32 *  time_rec,
gss_cred_id_t *  delegated_cred_handle,
gss_OID *  mech_type,
gss_buffer_t  output_token 
)

Accept a delegated credential.

This functions drives the accepting side of the credential delegation process. It is expected to be called in tandem with the gss_init_delegation function.

Parameters:
minor_statusThe minor status returned by this function. This paramter will be 0 upon success.
context_handleThe security context over which the credential is delegated.
extension_oidsA set of extension oids corresponding to buffers in the extension_buffers paramter below. May be GSS_C_NO_BUFFER_SET. Currently not used.
extension_buffersA set of extension buffers corresponding to oids in the extension_oids paramter above. May be GSS_C_NO_BUFFER_SET. Currently not used.
input_tokenThe token that was produced by a prior call to gss_init_delegation.
req_flagsFlags that modify the behavior of the function. Currently only GSS_C_GLOBUS_SSL_COMPATIBLE is checked for. This flag results in tokens that aren't wrapped.
time_reqThe requested period of validity (seconds) of the delegated credential. Currently a noop.
time_recThis parameter will contain the received period of validity of the delegated credential upon success. May be NULL.
delegated_cred_handleThis parameter will contain the delegated credential upon success.
mech_typeReturns the security mechanism upon success. Currently not implemented. May be NULL.
output_tokenA token that should be passed to gss_init_delegation if the return value is GSS_S_CONTINUE_NEEDED.
Returns:
GSS_S_COMPLETE upon successful completion GSS_S_CONTINUE_NEEDED if the function needs to be called again. GSS_S_FAILURE upon failure
OM_uint32 gss_inquire_cred_by_oid ( OM_uint32 *  minor_status,
const gss_cred_id_t  cred_handle,
const gss_OID  desired_object,
gss_buffer_set_t *  data_set 
)

NOTE: Checks both the cert in the credential and the certs in the cert chain for a valid extension that matches the desired OID.

The first one found is used, starting with the endpoint cert, and then searching the cert chain.

Parameters:
minor_status
cred_handle
desired_object
data_set
Returns:
OM_uint32 gss_set_sec_context_option ( OM_uint32 *  minor_status,
gss_ctx_id_t *  context_handle,
const gss_OID  option,
const gss_buffer_t  value 
)

GSSAPI routine to initiate the sending of a security context See: <draft-ietf-cat-gssv2-cbind-04.txt>

Parameters:
minor_status
context_handle
option
value
Returns: