[Top][All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Generic Security Service Library (GSSLib) 0.1.0

From: Simon Josefsson
Subject: Generic Security Service Library (GSSLib) 0.1.0
Date: Mon, 30 Mar 2009 14:30:22 +0200
User-agent: Gnus/5.110011 (No Gnus v0.11) Emacs/23.0.90 (gnu/linux)

GSSLib is an implementation of the Generic Security Service Application
Program Interface (GSS-API).  GSS-API is used by network servers to
provide security services.  For example, GSS can be used to authenticate
a client against SMTP or IMAP servers.  GSS consists of a library, a
manual, and a command line tool for debugging purposes.

Noteworthy changes since the last version:

* Version 0.1.0 (released 2009-03-30)

** libgss: Shared library version is incremented.
The library is backwards compatible on source code level if you don't
use the gss_krb5* functions or the gss_alloc_fail_function variable.

** libgss: Kerberos V5 function symbols gss_krb5* not exported.
They were never intended to be exported and have never been part of
any header file.

** libgss: Obsolete gss_xalloc_die and gss_alloc_fail_function not exported.

** libgss: Add GSS_KRB5_NT_MACHINE_UID_NAME{,_static}.
Defined in RFC 1964.

** libgss: New header file gss/krb5-ext.h used for GNU GSS specific extensions.
Before gss/krb5.h was used for both offical and GNU GSS prototypes.

** libgss: The version script version is now GSS_0.1.0 instead of GSS_1.0.
The use of GSS_1.0 in the last release was a mistake.

** libgss: Added version integer symbols to header file.

** doc: The GTK-DOC manual is now built properly.

** Fix compilation error with Sun Studio related to missing getopt.
Reported by Dagobert Michelsen <address@hidden> in

** API and ABI modifications.
gss_alloc_fail_function: REMOVED
gss_krb5*: REMOVED

While written to be flexible with regards to different GSS mechanisms,
the only currently supported mechanism is Kerberos 5 via GNU Shishi.
Mutual and non-mutual authentication, as client and server, is
supported.  Message privacy protection using DES and 3DES is supported.

GSS aims to be internationalized, thread safe and portable.  GSS is
written in ANSI/ISO C89, and has been ported to numerous platforms, even
cross compiled to embedded platforms such as Motorola Coldfire.

GSS is a GNU project, and is licensed under the GNU General Public
License version 3 or later.

Improving GSS is costly, but you can help!  We are looking for
organizations that find GSS useful and wish to contribute back.  You can
contribute by reporting bugs, improve the software, or donate money or

Commercial support contracts for GSS are available, and they help
finance continued maintenance.  Simon Josefsson Datakonsult AB, a
Stockholm based privately held company, is currently funding GSS
maintenance.  We are always looking for interesting development

The project's web page is available at:

All manuals are available from:

Specifically, the following formats are available.

The main manual: - HTML format - PDF format

If you need help to use GNU GSS, or want to help others, you are invited
to join our help-gss mailing list, see:

Here are the compressed sources of the entire package: (1.7MB) (OpenPGP signature)

Here are the build reports for various platforms:

Daily builds of the package are available from:

The software is cryptographically signed by the author using an
OpenPGP key identified by the following information:

pub   1280R/B565716F 2002-05-05 [expires: 2010-02-22]
      Key fingerprint = 0424 D4EE 81A0 E3D1 19C6  F835 EDA2 1E94 B565 716F
uid                  Simon Josefsson <address@hidden>
uid                  Simon Josefsson <address@hidden>
sub   1280R/4D5D40AE 2002-05-05 [expires: 2009-04-21]

The key is available from:

Here are the SHA-1 and SHA-224 checksums:

48435b290f4f31b9f20bf6d485b6e83d3c030046  gss-0.1.0.tar.gz

6071769bf5a4a3be57fdad6c94a505196c57097278a80f7685f71293  gss-0.1.0.tar.gz

Happy hacking,

Attachment: pgpXHlgIeqBMt.pgp
Description: PGP signature

reply via email to

[Prev in Thread] Current Thread [Next in Thread]