/freebsd-11-stable/crypto/heimdal/lib/gssapi/krb5/ |
H A D | ticket_flags.c | 47 if (ctx->ticket == NULL) { 53 *tkt_flags = TicketFlags2int(ctx->ticket->ticket.flags);
|
H A D | delete_sec_context.c | 69 if (ctx->ticket) 70 krb5_free_ticket (context, ctx->ticket);
|
H A D | inquire_sec_context_by_oid.c | 83 if (context_handle->ticket == NULL) { 85 _gsskrb5_set_status(EINVAL, "No ticket from which to obtain flags"); 90 tkt_flags = TicketFlags2int(context_handle->ticket->ticket.flags); 237 if (context_handle->ticket == NULL) { 240 _gsskrb5_set_status(EINVAL, "No ticket to obtain authz data from"); 245 context_handle->ticket, 444 if (ctx->ticket == NULL) { 446 _gsskrb5_set_status(EINVAL, "No ticket to obtain auth time from"); 451 authtime = ctx->ticket [all...] |
H A D | gsskrb5_locl.h | 83 struct krb5_ticket *ticket; member in struct:gsskrb5_ctx
|
/freebsd-11-stable/sys/contrib/ck/include/spinlock/ |
H A D | ticket.h | 78 ck_spinlock_ticket_init(struct ck_spinlock_ticket *ticket) argument 81 ticket->value = 0; 87 ck_spinlock_ticket_locked(struct ck_spinlock_ticket *ticket) argument 91 request = CK_SPINLOCK_TICKET_LOAD(&ticket->value); 100 ck_spinlock_ticket_lock(struct ck_spinlock_ticket *ticket) argument 104 /* Get our ticket number and set next ticket number. */ 105 request = CK_SPINLOCK_TICKET_FAA(&ticket->value, 113 position = CK_SPINLOCK_TICKET_LOAD(&ticket->value) & 122 ck_spinlock_ticket_lock_pb(struct ck_spinlock_ticket *ticket, unsigne argument 149 ck_spinlock_ticket_trylock(struct ck_spinlock_ticket *ticket) argument 170 ck_spinlock_ticket_unlock(struct ck_spinlock_ticket *ticket) argument 200 ck_spinlock_ticket_init(struct ck_spinlock_ticket *ticket) argument 211 ck_spinlock_ticket_locked(struct ck_spinlock_ticket *ticket) argument 222 ck_spinlock_ticket_lock(struct ck_spinlock_ticket *ticket) argument 242 ck_spinlock_ticket_lock_pb(struct ck_spinlock_ticket *ticket, unsigned int c) argument 271 ck_spinlock_ticket_unlock(struct ck_spinlock_ticket *ticket) argument [all...] |
/freebsd-11-stable/crypto/heimdal/lib/krb5/ |
H A D | build_ap_req.c | 55 ap.ticket.tkt_vno = 5; 56 copy_Realm(&cred->server->realm, &ap.ticket.realm); 57 copy_PrincipalName(&cred->server->name, &ap.ticket.sname); 59 decode_Ticket(cred->ticket.data, cred->ticket.length, &t, &len); 60 copy_EncryptedData(&t.enc_part, &ap.ticket.enc_part);
|
H A D | recvauth.c | 54 krb5_ticket **ticket) 59 keytab, ticket); 72 krb5_ticket **ticket) 172 ticket); 198 krb5_free_ticket(context, *ticket); 199 *ticket = NULL; 206 krb5_free_ticket(context, *ticket); 207 *ticket = NULL; 213 krb5_free_ticket(context, *ticket); 214 *ticket 47 krb5_recvauth(krb5_context context, krb5_auth_context *auth_context, krb5_pointer p_fd, const char *appl_version, krb5_principal server, int32_t flags, krb5_keytab keytab, krb5_ticket **ticket) argument 63 krb5_recvauth_match_version(krb5_context context, krb5_auth_context *auth_context, krb5_pointer p_fd, krb5_boolean (*match_appl_version)(const void *, const char*), const void *match_data, krb5_principal server, int32_t flags, krb5_keytab keytab, krb5_ticket **ticket) argument [all...] |
H A D | rd_req.c | 64 "ticket part", "")); 126 if (ap_req->ticket.tkt_vno != 5){ 135 check_transited(krb5_context context, Ticket *ticket, EncTicketPart *enc) argument 158 ticket->realm); 162 ticket->realm, 225 Ticket *ticket, 232 ret = decrypt_tkt_enc_part (context, key, &ticket->enc_part, &t); 257 ret = check_transited(context, ticket, &t); 322 krb5_ticket **ticket) 331 ticket, 224 krb5_decrypt_ticket(krb5_context context, Ticket *ticket, krb5_keyblock *key, EncTicketPart *out, krb5_flags flags) argument 315 krb5_verify_ap_req(krb5_context context, krb5_auth_context *auth_context, krb5_ap_req *ap_req, krb5_const_principal server, krb5_keyblock *keyblock, krb5_flags flags, krb5_flags *ap_req_options, krb5_ticket **ticket) argument 336 krb5_verify_ap_req2(krb5_context context, krb5_auth_context *auth_context, krb5_ap_req *ap_req, krb5_const_principal server, krb5_keyblock *keyblock, krb5_flags flags, krb5_flags *ap_req_options, krb5_ticket **ticket, krb5_key_usage usage) argument 527 krb5_ticket *ticket; member in struct:krb5_rd_req_out_ctx_data 621 krb5_rd_req_out_get_ticket(krb5_context context, krb5_rd_req_out_ctx out, krb5_ticket **ticket) argument 688 krb5_rd_req(krb5_context context, krb5_auth_context *auth_context, const krb5_data *inbuf, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument 733 krb5_rd_req_with_keyblock(krb5_context context, krb5_auth_context *auth_context, const krb5_data *inbuf, krb5_const_principal server, krb5_keyblock *keyblock, krb5_flags *ap_req_options, krb5_ticket **ticket) argument [all...] |
H A D | ticket.c | 39 * Free ticket and content 42 * @param ticket ticket to free 52 krb5_ticket *ticket) 54 free_EncTicketPart(&ticket->ticket); 55 krb5_free_principal(context, ticket->client); 56 krb5_free_principal(context, ticket->server); 57 free(ticket); 62 * Copy ticket an 51 krb5_free_ticket(krb5_context context, krb5_ticket *ticket) argument 124 krb5_ticket_get_client(krb5_context context, const krb5_ticket *ticket, krb5_principal *client) argument 145 krb5_ticket_get_server(krb5_context context, const krb5_ticket *ticket, krb5_principal *server) argument 164 krb5_ticket_get_endtime(krb5_context context, const krb5_ticket *ticket) argument 181 krb5_ticket_get_flags(krb5_context context, const krb5_ticket *ticket) argument 342 krb5_ticket_get_authorization_data_type(krb5_context context, krb5_ticket *ticket, int type, krb5_data *data) argument [all...] |
H A D | get_cred.c | 390 N_("Failed to decode encpart in ticket", "")); 931 krb5_creds tgt, referral, ticket; local 942 memset(&ticket, 0, sizeof(ticket)); 990 ret = krb5_cc_retrieve_cred(context, ccache, 0, &mcreds, &ticket); 997 second_ticket, &ticket); 1002 /* Did we get the right ticket ? */ 1005 ticket.server)) 1008 if (!krb5_principal_is_krbtgt(context, ticket.server)) { 1011 "ticket referral 1224 Ticket *ticket; member in struct:krb5_get_creds_opt_data 1288 krb5_get_creds_opt_set_ticket(krb5_context context, krb5_get_creds_opt opt, const Ticket *ticket) argument [all...] |
H A D | crypto-pk.c | 139 const Ticket *ticket, 155 pubinfo.ticket = *ticket; 207 const Ticket *ticket, 257 enctype, as_req, pk_as_rep, ticket, &other); 132 encode_otherinfo(krb5_context context, const AlgorithmIdentifier *ai, krb5_const_principal client, krb5_const_principal server, krb5_enctype enctype, const krb5_data *as_req, const krb5_data *pk_as_rep, const Ticket *ticket, krb5_data *other) argument 198 _krb5_pk_kdf(krb5_context context, const struct AlgorithmIdentifier *ai, const void *dhdata, size_t dhsize, krb5_const_principal client, krb5_const_principal server, krb5_enctype enctype, const krb5_data *as_req, const krb5_data *pk_as_rep, const Ticket *ticket, krb5_keyblock *key) argument
|
H A D | creds.c | 56 krb5_data_free (&c->ticket); 95 ret = krb5_data_copy (&c->ticket, 96 incred->ticket.data, 97 incred->ticket.length); 190 * - KRB5_TC_MATCH_FLAGS_EXACT Make sure that the ticket flags are identical. 191 * - KRB5_TC_MATCH_FLAGS Make sure that all ticket flags set in mcreds are also present in creds . 192 * - KRB5_TC_MATCH_TIMES_EXACT Compares the ticket times exactly. 196 * - KRB5_TC_MATCH_IS_SKEY Compares the existance of the second ticket. 271 * Returns the ticket flags for the credentials in creds. 274 * @param creds credential to get ticket flag [all...] |
/freebsd-11-stable/sys/contrib/ck/include/ |
H A D | ck_pflock.h | 87 uint32_t ticket; local 90 ticket = ck_pr_faa_32(&pf->win, 1); 91 while (ck_pr_load_32(&pf->wout) != ticket) 95 * Acquire ticket on read-side in order to allow them 99 ticket = ck_pr_faa_32(&pf->rin, 100 (ticket & CK_PFLOCK_PHID) | CK_PFLOCK_PRES); 103 while (ck_pr_load_32(&pf->rout) != ticket)
|
/freebsd-11-stable/crypto/heimdal/lib/kafs/ |
H A D | afskrb5.c | 52 kt->ticket = NULL; 66 ret = decode_Ticket(cred->ticket.data, cred->ticket.length, &t, &len); 82 kt->ticket = buf; 87 kt->ticket = malloc(cred->ticket.length); 88 if (kt->ticket == NULL) 90 kt->ticket_len = cred->ticket.length; 91 memcpy(kt->ticket, cred->ticket [all...] |
/freebsd-11-stable/crypto/heimdal/appl/test/ |
H A D | uu_client.c | 53 krb5_ticket *ticket; local 124 status = krb5_write_message(context, &sock, &cred.ticket); 133 VERSION, client, 0, NULL, &ticket); 138 if (ticket->ticket.authorization_data) { 144 authz = ticket->ticket.authorization_data;
|
H A D | tcp_server.c | 45 krb5_ticket *ticket; local 82 &ticket); 87 ticket->client,
|
/freebsd-11-stable/crypto/heimdal/kuser/ |
H A D | kdecode_ticket.c | 42 krb5_data *ticket, 54 ret = decode_Ticket (ticket->data, ticket->length, &tkt, &len); 156 print_and_decode_tkt (context, &out->ticket, out->server, 41 print_and_decode_tkt(krb5_context context, krb5_data *ticket, krb5_principal server, krb5_enctype enctype) argument
|
H A D | kimpersonate.c | 73 Ticket ticket; local 76 memset (&ticket, 0, sizeof(ticket)); 101 * Encrypt `enc_part' of ticket with service key 117 &ticket.enc_part); 125 * Encode ticket 128 ticket.tkt_vno = 5; 129 ticket.realm = cred->server->realm; 130 copy_PrincipalName(&cred->server->name, &ticket.sname); 132 ASN1_MALLOC_ENCODE(Ticket, buf, len, &ticket, [all...] |
H A D | kgetcred.c | 54 NP_("where to find the ticket use for delegation", ""), "cache"}, 58 NP_("forwardable ticket requested", ""), NULL}, 159 Ticket ticket; local 174 ret = decode_Ticket(c.ticket.data, c.ticket.length, &ticket, NULL); 181 ret = krb5_get_creds_opt_set_ticket(context, opt, &ticket); 184 free_Ticket(&ticket);
|
/freebsd-11-stable/crypto/heimdal/kpasswd/ |
H A D | kpasswdd.c | 435 krb5_ticket **ticket, 491 ticket); 512 same = krb5_principal_compare(context, principal, (*ticket)->server); 519 krb5_unparse_name(context, (*ticket)->server, &str); 527 if (strcmp((*ticket)->server->realm, (*ticket)->client->realm) != 0) { 529 (*ticket)->server->realm, (*ticket)->client->realm); 530 reply_error ((*ticket)->server->realm, s, sa, sa_size, ret, 1, 535 if (!(*ticket) 432 verify(krb5_auth_context *auth_context, krb5_realm *realms, krb5_keytab keytab, krb5_ticket **ticket, krb5_data *out_data, uint16_t *version, int s, struct sockaddr *sa, int sa_size, u_char *msg, size_t len, krb5_address *client_addr) argument 591 krb5_ticket *ticket; local [all...] |
/freebsd-11-stable/crypto/heimdal/appl/kf/ |
H A D | kfd.c | 128 krb5_ticket *ticket; local 168 &ticket); 173 ticket->client, 219 ticket->client, 246 status = krb5_cc_initialize (context, ccache, ticket->client); 259 krb5_warnx(context, "%s forwarded ticket to %s,%s",
|
/freebsd-11-stable/crypto/heimdal/kdc/ |
H A D | hpropd.c | 125 krb5_ticket *ticket; local 172 0, keytab, &ticket); 176 ret = krb5_unparse_name(context, ticket->server, &server); 180 krb5_errx(context, 1, "ticket not for hprop (%s)", server); 183 krb5_free_ticket (context, ticket);
|
/freebsd-11-stable/include/rpc/ |
H A D | auth_kerb.h | 54 * A fullname contains the ticket and the window 57 KTEXT_ST ticket; member in struct:authkerb_fullname 66 unsigned char k_flags; /* Flags from ticket */ 72 int life; /* Life of ticket */ 73 unsigned long time_sec; /* Time ticket issued */ 74 unsigned long address; /* Address in ticket */ 77 unsigned long expiry; /* time the ticket is expiring */
|
/freebsd-11-stable/usr.bin/newgrp/ |
H A D | newgrp.c | 262 char *args[2], **cleanenv, *term, *ticket; local 275 ticket = getenv("KRBTKFILE"); 291 if (ticket != NULL) 292 setenv("KRBTKFILE", ticket, 1);
|
/freebsd-11-stable/contrib/wpa/src/tls/ |
H A D | tlsv1_server.h | 42 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|