11.07.2015 Views

Borland VisiBroker® 7.0 - Borland Technical Publications

Borland VisiBroker® 7.0 - Borland Technical Publications

Borland VisiBroker® 7.0 - Borland Technical Publications

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

vbsec::TargetReturnsExceptionsArgumentsExceptionsArgumentsReturnsExceptionsArgumentsExceptionsA final context token.nonevirtual void processFinalContext (::vbsec::Subject&, ::CORBA::OctetSeq&) =0;Consumes a final context token returned by the server.The target subject.nonevirtual ::CSI::GSSToken* createErrorContext (::vbsec::Subject&) =0;Creates an error context token in the case of an authentication failure.The target subject.An error context token.nonevirtual ::vbsec::Subject* processErrorContext (::vbsec::Subject&,::CSI::GSSToken&, ::vbsec::CallbackHandler*) =0;Consumes an error token returned from server. The callback handler is used to interactwith a user trying to reacquire credentials. If credentials are required, the client-sidesecurity service attempts to establish the context again.This method takes the following two arguments:■■noneA target subject.A callback handler.vbsec::TargetThis class gives the runtime representation of a target authenticating principal. Thecontext includes names for the target required in different scenarios, such as thedisplay name, or the DER representation of the OID.MethodsReturnsExceptionsReturnsExceptionsReturnsExceptionsvirtual std::string getName () const =0;This method returns the display name of the target.The target name string.nonevirtual ::CSI::OID getOid () const =0;This method returns the target OID.The target OID string.nonevirtual ::CORBA::OctetSeq getEncodedName () const =0;This method returns the mechanism-specific encoding of the target name.The encoded target name.noneChapter 12: Security SPI for C++ 125

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!