Searched refs:ticket (Results 1 - 25 of 81) sorted by relevance

1234

/freebsd-11-stable/crypto/heimdal/lib/gssapi/krb5/
H A Dticket_flags.c47 if (ctx->ticket == NULL) {
53 *tkt_flags = TicketFlags2int(ctx->ticket->ticket.flags);
H A Ddelete_sec_context.c69 if (ctx->ticket)
70 krb5_free_ticket (context, ctx->ticket);
H A Dinquire_sec_context_by_oid.c83 if (context_handle->ticket == NULL) {
85 _gsskrb5_set_status(EINVAL, "No ticket from which to obtain flags");
90 tkt_flags = TicketFlags2int(context_handle->ticket->ticket.flags);
237 if (context_handle->ticket == NULL) {
240 _gsskrb5_set_status(EINVAL, "No ticket to obtain authz data from");
245 context_handle->ticket,
444 if (ctx->ticket == NULL) {
446 _gsskrb5_set_status(EINVAL, "No ticket to obtain auth time from");
451 authtime = ctx->ticket
[all...]
H A Dgsskrb5_locl.h83 struct krb5_ticket *ticket; member in struct:gsskrb5_ctx
/freebsd-11-stable/sys/contrib/ck/include/spinlock/
H A Dticket.h78 ck_spinlock_ticket_init(struct ck_spinlock_ticket *ticket) argument
81 ticket->value = 0;
87 ck_spinlock_ticket_locked(struct ck_spinlock_ticket *ticket) argument
91 request = CK_SPINLOCK_TICKET_LOAD(&ticket->value);
100 ck_spinlock_ticket_lock(struct ck_spinlock_ticket *ticket) argument
104 /* Get our ticket number and set next ticket number. */
105 request = CK_SPINLOCK_TICKET_FAA(&ticket->value,
113 position = CK_SPINLOCK_TICKET_LOAD(&ticket->value) &
122 ck_spinlock_ticket_lock_pb(struct ck_spinlock_ticket *ticket, unsigne argument
149 ck_spinlock_ticket_trylock(struct ck_spinlock_ticket *ticket) argument
170 ck_spinlock_ticket_unlock(struct ck_spinlock_ticket *ticket) argument
200 ck_spinlock_ticket_init(struct ck_spinlock_ticket *ticket) argument
211 ck_spinlock_ticket_locked(struct ck_spinlock_ticket *ticket) argument
222 ck_spinlock_ticket_lock(struct ck_spinlock_ticket *ticket) argument
242 ck_spinlock_ticket_lock_pb(struct ck_spinlock_ticket *ticket, unsigned int c) argument
271 ck_spinlock_ticket_unlock(struct ck_spinlock_ticket *ticket) argument
[all...]
/freebsd-11-stable/crypto/heimdal/lib/krb5/
H A Dbuild_ap_req.c55 ap.ticket.tkt_vno = 5;
56 copy_Realm(&cred->server->realm, &ap.ticket.realm);
57 copy_PrincipalName(&cred->server->name, &ap.ticket.sname);
59 decode_Ticket(cred->ticket.data, cred->ticket.length, &t, &len);
60 copy_EncryptedData(&t.enc_part, &ap.ticket.enc_part);
H A Drecvauth.c54 krb5_ticket **ticket)
59 keytab, ticket);
72 krb5_ticket **ticket)
172 ticket);
198 krb5_free_ticket(context, *ticket);
199 *ticket = NULL;
206 krb5_free_ticket(context, *ticket);
207 *ticket = NULL;
213 krb5_free_ticket(context, *ticket);
214 *ticket
47 krb5_recvauth(krb5_context context, krb5_auth_context *auth_context, krb5_pointer p_fd, const char *appl_version, krb5_principal server, int32_t flags, krb5_keytab keytab, krb5_ticket **ticket) argument
63 krb5_recvauth_match_version(krb5_context context, krb5_auth_context *auth_context, krb5_pointer p_fd, krb5_boolean (*match_appl_version)(const void *, const char*), const void *match_data, krb5_principal server, int32_t flags, krb5_keytab keytab, krb5_ticket **ticket) argument
[all...]
H A Drd_req.c64 "ticket part", ""));
126 if (ap_req->ticket.tkt_vno != 5){
135 check_transited(krb5_context context, Ticket *ticket, EncTicketPart *enc) argument
158 ticket->realm);
162 ticket->realm,
225 Ticket *ticket,
232 ret = decrypt_tkt_enc_part (context, key, &ticket->enc_part, &t);
257 ret = check_transited(context, ticket, &t);
322 krb5_ticket **ticket)
331 ticket,
224 krb5_decrypt_ticket(krb5_context context, Ticket *ticket, krb5_keyblock *key, EncTicketPart *out, krb5_flags flags) argument
315 krb5_verify_ap_req(krb5_context context, krb5_auth_context *auth_context, krb5_ap_req *ap_req, krb5_const_principal server, krb5_keyblock *keyblock, krb5_flags flags, krb5_flags *ap_req_options, krb5_ticket **ticket) argument
336 krb5_verify_ap_req2(krb5_context context, krb5_auth_context *auth_context, krb5_ap_req *ap_req, krb5_const_principal server, krb5_keyblock *keyblock, krb5_flags flags, krb5_flags *ap_req_options, krb5_ticket **ticket, krb5_key_usage usage) argument
527 krb5_ticket *ticket; member in struct:krb5_rd_req_out_ctx_data
621 krb5_rd_req_out_get_ticket(krb5_context context, krb5_rd_req_out_ctx out, krb5_ticket **ticket) argument
688 krb5_rd_req(krb5_context context, krb5_auth_context *auth_context, const krb5_data *inbuf, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument
733 krb5_rd_req_with_keyblock(krb5_context context, krb5_auth_context *auth_context, const krb5_data *inbuf, krb5_const_principal server, krb5_keyblock *keyblock, krb5_flags *ap_req_options, krb5_ticket **ticket) argument
[all...]
H A Dticket.c39 * Free ticket and content
42 * @param ticket ticket to free
52 krb5_ticket *ticket)
54 free_EncTicketPart(&ticket->ticket);
55 krb5_free_principal(context, ticket->client);
56 krb5_free_principal(context, ticket->server);
57 free(ticket);
62 * Copy ticket an
51 krb5_free_ticket(krb5_context context, krb5_ticket *ticket) argument
124 krb5_ticket_get_client(krb5_context context, const krb5_ticket *ticket, krb5_principal *client) argument
145 krb5_ticket_get_server(krb5_context context, const krb5_ticket *ticket, krb5_principal *server) argument
164 krb5_ticket_get_endtime(krb5_context context, const krb5_ticket *ticket) argument
181 krb5_ticket_get_flags(krb5_context context, const krb5_ticket *ticket) argument
342 krb5_ticket_get_authorization_data_type(krb5_context context, krb5_ticket *ticket, int type, krb5_data *data) argument
[all...]
H A Dget_cred.c390 N_("Failed to decode encpart in ticket", ""));
931 krb5_creds tgt, referral, ticket; local
942 memset(&ticket, 0, sizeof(ticket));
990 ret = krb5_cc_retrieve_cred(context, ccache, 0, &mcreds, &ticket);
997 second_ticket, &ticket);
1002 /* Did we get the right ticket ? */
1005 ticket.server))
1008 if (!krb5_principal_is_krbtgt(context, ticket.server)) {
1011 "ticket referral
1224 Ticket *ticket; member in struct:krb5_get_creds_opt_data
1288 krb5_get_creds_opt_set_ticket(krb5_context context, krb5_get_creds_opt opt, const Ticket *ticket) argument
[all...]
H A Dcrypto-pk.c139 const Ticket *ticket,
155 pubinfo.ticket = *ticket;
207 const Ticket *ticket,
257 enctype, as_req, pk_as_rep, ticket, &other);
132 encode_otherinfo(krb5_context context, const AlgorithmIdentifier *ai, krb5_const_principal client, krb5_const_principal server, krb5_enctype enctype, const krb5_data *as_req, const krb5_data *pk_as_rep, const Ticket *ticket, krb5_data *other) argument
198 _krb5_pk_kdf(krb5_context context, const struct AlgorithmIdentifier *ai, const void *dhdata, size_t dhsize, krb5_const_principal client, krb5_const_principal server, krb5_enctype enctype, const krb5_data *as_req, const krb5_data *pk_as_rep, const Ticket *ticket, krb5_keyblock *key) argument
H A Dcreds.c56 krb5_data_free (&c->ticket);
95 ret = krb5_data_copy (&c->ticket,
96 incred->ticket.data,
97 incred->ticket.length);
190 * - KRB5_TC_MATCH_FLAGS_EXACT Make sure that the ticket flags are identical.
191 * - KRB5_TC_MATCH_FLAGS Make sure that all ticket flags set in mcreds are also present in creds .
192 * - KRB5_TC_MATCH_TIMES_EXACT Compares the ticket times exactly.
196 * - KRB5_TC_MATCH_IS_SKEY Compares the existance of the second ticket.
271 * Returns the ticket flags for the credentials in creds.
274 * @param creds credential to get ticket flag
[all...]
/freebsd-11-stable/sys/contrib/ck/include/
H A Dck_pflock.h87 uint32_t ticket; local
90 ticket = ck_pr_faa_32(&pf->win, 1);
91 while (ck_pr_load_32(&pf->wout) != ticket)
95 * Acquire ticket on read-side in order to allow them
99 ticket = ck_pr_faa_32(&pf->rin,
100 (ticket & CK_PFLOCK_PHID) | CK_PFLOCK_PRES);
103 while (ck_pr_load_32(&pf->rout) != ticket)
/freebsd-11-stable/crypto/heimdal/lib/kafs/
H A Dafskrb5.c52 kt->ticket = NULL;
66 ret = decode_Ticket(cred->ticket.data, cred->ticket.length, &t, &len);
82 kt->ticket = buf;
87 kt->ticket = malloc(cred->ticket.length);
88 if (kt->ticket == NULL)
90 kt->ticket_len = cred->ticket.length;
91 memcpy(kt->ticket, cred->ticket
[all...]
/freebsd-11-stable/crypto/heimdal/appl/test/
H A Duu_client.c53 krb5_ticket *ticket; local
124 status = krb5_write_message(context, &sock, &cred.ticket);
133 VERSION, client, 0, NULL, &ticket);
138 if (ticket->ticket.authorization_data) {
144 authz = ticket->ticket.authorization_data;
H A Dtcp_server.c45 krb5_ticket *ticket; local
82 &ticket);
87 ticket->client,
/freebsd-11-stable/crypto/heimdal/kuser/
H A Dkdecode_ticket.c42 krb5_data *ticket,
54 ret = decode_Ticket (ticket->data, ticket->length, &tkt, &len);
156 print_and_decode_tkt (context, &out->ticket, out->server,
41 print_and_decode_tkt(krb5_context context, krb5_data *ticket, krb5_principal server, krb5_enctype enctype) argument
H A Dkimpersonate.c73 Ticket ticket; local
76 memset (&ticket, 0, sizeof(ticket));
101 * Encrypt `enc_part' of ticket with service key
117 &ticket.enc_part);
125 * Encode ticket
128 ticket.tkt_vno = 5;
129 ticket.realm = cred->server->realm;
130 copy_PrincipalName(&cred->server->name, &ticket.sname);
132 ASN1_MALLOC_ENCODE(Ticket, buf, len, &ticket,
[all...]
H A Dkgetcred.c54 NP_("where to find the ticket use for delegation", ""), "cache"},
58 NP_("forwardable ticket requested", ""), NULL},
159 Ticket ticket; local
174 ret = decode_Ticket(c.ticket.data, c.ticket.length, &ticket, NULL);
181 ret = krb5_get_creds_opt_set_ticket(context, opt, &ticket);
184 free_Ticket(&ticket);
/freebsd-11-stable/crypto/heimdal/kpasswd/
H A Dkpasswdd.c435 krb5_ticket **ticket,
491 ticket);
512 same = krb5_principal_compare(context, principal, (*ticket)->server);
519 krb5_unparse_name(context, (*ticket)->server, &str);
527 if (strcmp((*ticket)->server->realm, (*ticket)->client->realm) != 0) {
529 (*ticket)->server->realm, (*ticket)->client->realm);
530 reply_error ((*ticket)->server->realm, s, sa, sa_size, ret, 1,
535 if (!(*ticket)
432 verify(krb5_auth_context *auth_context, krb5_realm *realms, krb5_keytab keytab, krb5_ticket **ticket, krb5_data *out_data, uint16_t *version, int s, struct sockaddr *sa, int sa_size, u_char *msg, size_t len, krb5_address *client_addr) argument
591 krb5_ticket *ticket; local
[all...]
/freebsd-11-stable/crypto/heimdal/appl/kf/
H A Dkfd.c128 krb5_ticket *ticket; local
168 &ticket);
173 ticket->client,
219 ticket->client,
246 status = krb5_cc_initialize (context, ccache, ticket->client);
259 krb5_warnx(context, "%s forwarded ticket to %s,%s",
/freebsd-11-stable/crypto/heimdal/kdc/
H A Dhpropd.c125 krb5_ticket *ticket; local
172 0, keytab, &ticket);
176 ret = krb5_unparse_name(context, ticket->server, &server);
180 krb5_errx(context, 1, "ticket not for hprop (%s)", server);
183 krb5_free_ticket (context, ticket);
/freebsd-11-stable/include/rpc/
H A Dauth_kerb.h54 * A fullname contains the ticket and the window
57 KTEXT_ST ticket; member in struct:authkerb_fullname
66 unsigned char k_flags; /* Flags from ticket */
72 int life; /* Life of ticket */
73 unsigned long time_sec; /* Time ticket issued */
74 unsigned long address; /* Address in ticket */
77 unsigned long expiry; /* time the ticket is expiring */
/freebsd-11-stable/usr.bin/newgrp/
H A Dnewgrp.c262 char *args[2], **cleanenv, *term, *ticket; local
275 ticket = getenv("KRBTKFILE");
291 if (ticket != NULL)
292 setenv("KRBTKFILE", ticket, 1);
/freebsd-11-stable/contrib/wpa/src/tls/
H A Dtlsv1_server.h42 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,

Completed in 164 milliseconds

1234