nsISupports
Last changed in Gecko 1.8 (Firefox 1.5 / Thunderbird 1.5 / SeaMonkey 1.0)void getNextToken([const] in voidPtr aInToken, in unsigned long aInTokenLength, out voidPtr aOutToken, out unsigned long aOutTokenLength); |
void init(in string aServiceName, in unsigned long aServiceFlags, in wstring aDomain, in wstring aUsername, in wstring aPassword); |
void unwrap([const] in voidPtr aInToken, in unsigned long aInTokenLength, out voidPtr aOutToken, out unsigned long aOutTokenLength); |
void wrap([const] in voidPtr aInToken, in unsigned long aInTokenLength, in boolean confidential, out voidPtr aOutToken, out unsigned long aOutTokenLength); |
| Constant | Value | Description |
REQ_DEFAULT | 0 | Default behavior. |
REQ_MUTUAL_AUTH | (1 << 0) | Client and server will be authenticated. |
REQ_DELEGATE | (1 << 1) | The server is allowed to impersonate the client. The REQ_MUTUAL_AUTH flag may also need to be specified in order for this flag to take effect. |
This method is called to get the next token in a sequence of authentication steps.
void getNextToken( [const] in voidPtr aInToken, in unsigned long aInTokenLength, out voidPtr aOutToken, out unsigned long aOutTokenLength );
aInTokennull.aInTokenLengthaOutTokengetNextToken succeeds, then aOutToken will point to a buffer to be sent in response to the server challenge. The length of this buffer is given by aOutTokenLength. The buffer at aOutToken must be recycled with a call to nsIMemory.free().aOutTokenLengthgetNextToken succeeds, then aOutTokenLength contains the length of the buffer (number of bytes) pointed to by aOutToken.This method is called to initialize an auth module. The other methods cannot be called unless this method succeeds.
void init( in string aServiceName, in unsigned long aServiceFlags, in wstring aDomain, in wstring aUsername, in wstring aPassword );
aServiceNamenull if not applicable (For example, for NTLM, this parameter should be null).aServiceFlagsREQ_ constants (pass REQ_DEFAULT for default behavior).aDomainnull if not applicable.aUsernameaPasswordThis method is used to unpack, decrypt, and verify the checksums on data returned by a server when security layers are in use.
void unwrap( [const] in voidPtr aInToken, in unsigned long aInTokenLength, out voidPtr aOutToken, out unsigned long aOutTokenLength );
aInTokenaInTokenLengthaOutTokenaOutTokenLengthNS_ERROR_NOT_IMPLEMENTEDOnce a security context has been established through calls to getNextToken() it may be used to protect data exchanged between client and server. Calls to this method are used to protect items of data to be sent to the server.
void wrap( [const] in voidPtr aInToken, in unsigned long aInTokenLength, in boolean confidential, out voidPtr aOutToken, out unsigned long aOutTokenLength );
aInTokenaInTokenLengthconfidentialtrue, it will encrypt the data, otherwise data will just be integrity protected (checksummed).aOutTokenaOutTokenLengthNS_ERROR_NOT_IMPLEMENTED