Searched refs:ticket (Results 1 - 25 of 144) sorted by relevance

123456

/macosx-10.9.5/MITKerberosShim-62.1/test/
H A Dtest-authen::krb5.pl9 my $ticket = shift;
22 # when decoding the ticket, the 3rd parameter is the expected server's name for the ticket.
26 $ticket = Authen::Krb5::rd_req( $ac, $ticket, undef, $kt );
28 if ( !defined($ticket) ) {
29 die( "Unable to read kerberos ticket request: ", Authen::Krb5::error() );
32 my $serverPrincipal = $ticket->server();
33 my $clientPrincipal = $ticket->enc_part2()->client();
66 my $ticket
[all...]
/macosx-10.9.5/Heimdal-323.92.1/lib/gssapi/krb5/
H A Dticket_flags.c47 if (ctx->ticket == NULL) {
53 *tkt_flags = TicketFlags2int(ctx->ticket->ticket.flags);
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/mac/krb4_sources/
H A Dmk_auth.c42 * The ticket acquired by `krb_mk_req' is returned in `ticket' and the
49 KTEXT ticket,
77 ret = krb_mk_req (ticket, service, realinst, realm, checksum);
99 tmp = krb_put_int(ticket->length, p, rem, 4);
105 if (rem < ticket->length)
107 memcpy(p, ticket->dat, ticket->length);
108 p += ticket->length;
109 rem -= ticket
48 krb_mk_auth(int32_t options, KTEXT ticket, char *service, char *instance, char *realm, u_int32_t checksum, char *version, KTEXT buf) argument
[all...]
H A Dmk_req.c91 * and a checksum. It then retrieves a ticket for
108 * unsigned char kvno from ticket server's key version
110 * unsigned char tl ticket length
112 * text ticket->dat ticket for server
115 * The ticket information is retrieved from the ticket cache or
140 KTEXT ticket = &(cr.ticket_st); /* Pointer to tkt_st */ local
161 /* Get the ticket and move it into the authenticator */
178 * With multi realm ticket file
[all...]
/macosx-10.9.5/MITKerberosShim-62.1/
H A Drd_req.c60 if (h->ticket.flags.forwardable)
62 if (h->ticket.flags.forwarded)
64 if (h->ticket.flags.proxiable)
66 if (h->ticket.flags.proxy)
68 if (h->ticket.flags.may_postdate)
70 if (h->ticket.flags.postdated)
72 if (h->ticket.flags.invalid)
74 if (h->ticket.flags.renewable)
76 if (h->ticket.flags.initial)
78 if (h->ticket
111 krb5_rd_req(mit_krb5_context context, mit_krb5_auth_context *ac, const mit_krb5_data *inbuf, mit_krb5_const_principal server, mit_krb5_keytab keytab, mit_krb5_flags *ap_req_options, mit_krb5_ticket **ticket) argument
150 krb5_recvauth(mit_krb5_context context, mit_krb5_auth_context *ac, mit_krb5_pointer fd, char *appl_version, mit_krb5_principal server, mit_krb5_int32 flags, mit_krb5_keytab keytab, mit_krb5_ticket **ticket) argument
176 mshim_hticket2mticket(HC(context), hticket, *ticket); local
195 krb5_recvauth_version(mit_krb5_context context, mit_krb5_auth_context *ac, mit_krb5_pointer fd, mit_krb5_principal server, mit_krb5_int32 flags, mit_krb5_keytab keytab, mit_krb5_ticket **ticket, mit_krb5_data *version) argument
222 mshim_hticket2mticket(HC(context), hticket, *ticket); local
[all...]
H A Dcreds.c117 c->ticket.magic = MIT_KV5M_DATA;
118 c->ticket.length = from->ticket.length;
119 c->ticket.data = mshim_malloc(from->ticket.length);
120 memcpy(c->ticket.data, from->ticket.data, c->ticket.length);
/macosx-10.9.5/mDNSResponder-522.92.1/mDNSMacOSX/
H A DP2PPacketFilter.c76 *outTicket = trans_e.ticket;
82 static int commitChange( int devFD, u_int32_t ticket, char * anchorPath ) argument
88 trans_e.ticket = ticket;
121 *outPoolTicket = pp.ticket;
141 u_int32_t ticket,
146 pr->ticket = ticket;
154 u_int32_t ticket,
161 initRuleHeader( pr, ticket, poolTicke
140 initRuleHeader( struct pfioc_rule * pr, u_int32_t ticket, u_int32_t poolTicket, char * anchorPath ) argument
152 initBonjourRule( struct pfioc_rule * pr, const char * interfaceName, u_int32_t ticket, u_int32_t poolTicket, char * anchorPath ) argument
178 initOutboundTCPRule( struct pfioc_rule * pr, const char * interfaceName, u_int32_t ticket, u_int32_t poolTicket, char * anchorPath ) argument
199 initPortRule( struct pfioc_rule * pr, const char * interfaceName, u_int32_t ticket, u_int32_t poolTicket, char * anchorPath, u_int16_t port, u_int16_t protocol ) argument
231 u_int32_t i, ticket, poolTicket; local
280 u_int32_t ticket; local
[all...]
/macosx-10.9.5/libtelnet-13/
H A Dforward.c36 rd_and_store_for_creds(context, auth_context, inbuf, ticket)
40 krb5_ticket *ticket;
59 if ((retval = krb5_cc_initialize(context, ccache, ticket->enc_part2->client)))
/macosx-10.9.5/Heimdal-323.92.1/kuser/
H A Dkvno.c50 NP_("Server to get ticket for", ""), "principal" },
107 Ticket ticket; local
146 memset(&ticket, 0, sizeof(ticket));
182 ret = decode_Ticket(out_creds->ticket.data, out_creds->ticket.length,
183 &ticket, &len);
185 krb5_err(context, 1, ret, "Can't decode ticket for %s", princ);
198 (ticket.enc_part.kvno != NULL)?
199 *ticket
[all...]
H A Dkdecode_ticket.c42 krb5_data *ticket,
54 ret = decode_Ticket (ticket->data, ticket->length, &tkt, &len);
156 print_and_decode_tkt (context, &out->ticket, out->server,
41 print_and_decode_tkt(krb5_context context, krb5_data *ticket, krb5_principal server, krb5_enctype enctype) argument
H A Dkimpersonate.c73 Ticket ticket; local
76 memset (&ticket, 0, sizeof(ticket));
101 * Encrypt `enc_part' of ticket with service key
117 &ticket.enc_part);
125 * Encode ticket
128 ticket.tkt_vno = 5;
129 ticket.realm = cred->server->realm;
130 copy_PrincipalName(&cred->server->name, &ticket.sname);
132 ASN1_MALLOC_ENCODE(Ticket, buf, len, &ticket,
[all...]
/macosx-10.9.5/Heimdal-323.92.1/lib/krb5/
H A Drecvauth.c54 krb5_ticket **ticket)
59 keytab, ticket);
72 krb5_ticket **ticket)
174 ticket);
200 krb5_free_ticket(context, *ticket);
201 *ticket = NULL;
208 krb5_free_ticket(context, *ticket);
209 *ticket = NULL;
216 krb5_free_ticket(context, *ticket);
217 *ticket
47 krb5_recvauth(krb5_context context, krb5_auth_context *auth_context, krb5_pointer p_fd, const char *appl_version, krb5_principal server, int32_t flags, krb5_keytab keytab, krb5_ticket **ticket) argument
63 krb5_recvauth_match_version(krb5_context context, krb5_auth_context *auth_context, krb5_pointer p_fd, krb5_boolean (*match_appl_version)(const void *, const char*), const void *match_data, krb5_principal server, int32_t flags, krb5_keytab keytab, krb5_ticket **ticket) argument
[all...]
H A Drd_req.c63 "ticket part", ""));
125 if (ap_req->ticket.tkt_vno != 5){
134 check_transited(krb5_context context, Ticket *ticket, EncTicketPart *enc) argument
157 ticket->realm);
161 ticket->realm,
224 Ticket *ticket,
231 ret = decrypt_tkt_enc_part(context, key, &ticket->enc_part, &t);
256 ret = check_transited(context, ticket, &t);
321 krb5_ticket **ticket)
330 ticket,
223 krb5_decrypt_ticket(krb5_context context, Ticket *ticket, krb5_keyblock *key, EncTicketPart *out, krb5_flags flags) argument
314 krb5_verify_ap_req(krb5_context context, krb5_auth_context *auth_context, krb5_ap_req *ap_req, krb5_const_principal server, krb5_keyblock *keyblock, krb5_flags flags, krb5_flags *ap_req_options, krb5_ticket **ticket) argument
335 krb5_verify_ap_req2(krb5_context context, krb5_auth_context *auth_context, krb5_ap_req *ap_req, krb5_const_principal server, krb5_keyblock *keyblock, krb5_flags flags, krb5_flags *ap_req_options, krb5_ticket **ticket, krb5_key_usage usage) argument
527 krb5_ticket *ticket; member in struct:krb5_rd_req_out_ctx_data
621 krb5_rd_req_out_get_ticket(krb5_context context, krb5_rd_req_out_ctx out, krb5_ticket **ticket) argument
695 krb5_rd_req(krb5_context context, krb5_auth_context *auth_context, const krb5_data *inbuf, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument
740 krb5_rd_req_with_keyblock(krb5_context context, krb5_auth_context *auth_context, const krb5_data *inbuf, krb5_const_principal server, krb5_keyblock *keyblock, krb5_flags *ap_req_options, krb5_ticket **ticket) argument
[all...]
H A Dbuild_ap_req.c54 ret = decode_Ticket(cred->ticket.data, cred->ticket.length, &ap.ticket, &len);
H A Dtest_pknistkdf.c49 krb5_data ticket; member in struct:testcase
86 { /* ticket */
132 { /* ticket */
178 { /* ticket */
228 Ticket ticket; local
232 memset(&ticket, 0, sizeof(&ticket));
237 ret = decode_Ticket(c->ticket.data, c->ticket.length, &ticket,
[all...]
H A Dticket.c39 * Free ticket and content
42 * @param ticket ticket to free
52 krb5_ticket *ticket)
54 free_EncTicketPart(&ticket->ticket);
55 krb5_free_principal(context, ticket->client);
56 krb5_free_principal(context, ticket->server);
57 free(ticket);
62 * Copy ticket an
51 krb5_free_ticket(krb5_context context, krb5_ticket *ticket) argument
124 krb5_ticket_get_client(krb5_context context, const krb5_ticket *ticket, krb5_principal *client) argument
145 krb5_ticket_get_server(krb5_context context, const krb5_ticket *ticket, krb5_principal *server) argument
164 krb5_ticket_get_endtime(krb5_context context, const krb5_ticket *ticket) argument
181 krb5_ticket_get_flags(krb5_context context, const krb5_ticket *ticket) argument
342 krb5_ticket_get_authorization_data_type(krb5_context context, krb5_ticket *ticket, int type, krb5_data *data) argument
[all...]
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/libDER/Tests/
H A DparseTicket.c309 DERBbTicket ticket = {}; local
311 drtn = DERDecodeBbTicket(&derTicket, &ticket, &ticketSize);
315 // Verify signature if key file exists (we should really use the certificate or GPUK in the ticket here. */
319 (unsigned char *)ticket.body.data,
320 ticket.body.length,
321 (unsigned char *)ticket.signature.data );
329 /* Example of how to retrive fields from ticket. */
331 drtn = DERSetDecodeItemWithTag(&ticket.body,
335 drtn = DERSetDecodeItemWithTag(&ticket.body,
341 fprintf( stdout, "Bad ticket\
350 unsigned char *ticket = NULL; local
362 DERApTicket ticket = { }; local
447 DERBbTicket ticket = {}; local
[all...]
H A DDER_Ticket.h62 DERApTicket *ticket, /* RETURNED */
80 DERBbTicket *ticket, /* RETURNED */
H A DDER_Ticket.c134 DERApTicket *ticket, /* RETURNED */
142 DERNumApTicketItemSpecs, DERApTicketItemSpecs, ticket, 0);
147 drtn = DERParseSequenceContent(&ticket->signatureAlgorithm,
163 DERBbTicket *ticket, /* RETURNED */
171 DERNumBbTicketItemSpecs, DERBbTicketItemSpecs, ticket, 0);
176 drtn = DERParseSequenceContent(&ticket->signatureAlgorithm,
132 DERDecodeApTicket( const DERItem *contents, DERApTicket *ticket, DERSize *numUsedBytes) argument
161 DERDecodeBbTicket( const DERItem *contents, DERBbTicket *ticket, DERSize *numUsedBytes) argument
/macosx-10.9.5/remote_cmds-41.90.1/rlogin.tproj/
H A Dkrcmd.c101 KTEXT_ST ticket; local
112 &ticket,
144 KTEXT_ST ticket; local
157 &ticket,
/macosx-10.9.5/Heimdal-323.92.1/lib/kafs/
H A Dafskrb5.c52 kt->ticket = NULL;
66 ret = decode_Ticket(cred->ticket.data, cred->ticket.length, &t, &len);
82 kt->ticket = buf;
87 kt->ticket = malloc(cred->ticket.length);
88 if (kt->ticket == NULL)
90 kt->ticket_len = cred->ticket.length;
91 memcpy(kt->ticket, cred->ticket
[all...]
/macosx-10.9.5/Heimdal-323.92.1/appl/test/
H A Duu_client.c53 krb5_ticket *ticket; local
124 status = krb5_write_message(context, &sock, &cred.ticket);
133 VERSION, client, 0, NULL, &ticket);
138 if (ticket->ticket.authorization_data) {
144 authz = ticket->ticket.authorization_data;
/macosx-10.9.5/CPANInternal-140/SQL-Abstract/t/
H A D00new.t88 stmt => 'SELECT * FROM test WHERE ( ( LOWER(ticket) = LOWER(?) ) OR ( LOWER(hostname) = LOWER(?) ) OR ( LOWER(taco) = LOWER(?) ) OR ( LOWER(salami) = LOWER(?) ) )',
89 where => [ { ticket => 11 }, { hostname => 11 }, { taco => 'salad' }, { salami => 'punch' } ],
94 stmt => 'SELECT * FROM test WHERE ( ( UPPER(hostname) IN ( UPPER(?), UPPER(?), UPPER(?), UPPER(?) ) AND ( ( UPPER(ticket) = UPPER(?) ) OR ( UPPER(ticket) = UPPER(?) ) OR ( UPPER(ticket) = UPPER(?) ) ) ) OR ( UPPER(tack) BETWEEN UPPER(?) AND UPPER(?) ) OR ( ( ( UPPER(a) = UPPER(?) ) OR ( UPPER(a) = UPPER(?) ) OR ( UPPER(a) = UPPER(?) ) ) AND ( ( UPPER(e) != UPPER(?) ) OR ( UPPER(e) != UPPER(?) ) ) AND UPPER(q) NOT IN ( UPPER(?), UPPER(?), UPPER(?), UPPER(?), UPPER(?), UPPER(?), UPPER(?) ) ) )',
95 where => [ { ticket => [11, 12, 13],
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/mac/CommonKClient/mac_kclient3/Headers/CredentialsCache/
H A DCredentialsCache2.h69 /* * This is backwards compatibility for CCache API v2 clients to be able to run * against the CCache API v3 library */ #ifndef __CREDENTIALSCACHE2__ #define __CREDENTIALSCACHE2__ #include <CredentialsCache/CredentialsCache.h> #ifdef __cplusplus extern "C" { #endif /* __cplusplus */ #include <KerberosSupport/KerberosConditionalMacros.h> #if PRAGMA_IMPORT # pragma import on #endif /* This stuff is to make sure that we always use the same compiler options for this header file. Otherwise we get really exciting failure modes -- meeroh */ /* Sadly, the v2 APi didn't specify the alignment, so we use the default except on MacOS (where our implementation defined it to be 2-byte aligned) */ #if TARGET_OS_MAC #if PRAGMA_STRUCT_ALIGN #pragma options align=mac68k #elif PRAGMA_STRUCT_PACKPUSH #pragma pack(push, 2) #elif PRAGMA_STRUCT_PACK #pragma pack(2) #endif #endif #if PRAGMA_ENUM_ALWAYSINT #pragma enumsalwaysint on #endif #if TARGET_CPU_68K #pragma fourbyteints on #endif /* Some old types get directly mapped to new types */ typedef cc_context_d apiCB; typedef cc_ccache_d ccache_p; typedef cc_credentials_iterator_d ccache_cit_creds; typedef cc_ccache_iterator_d ccache_cit_ccache; typedef cc_data cc_data_compat; typedef cc_int32 cc_cred_vers; typedef cc_int32 cc_result; /* This doesn't exist in API v3 */ typedef cc_uint32 cc_flags; /* Credentials types are visible to the caller so we have to keep binary compatibility */ typedef struct cc_credentials_v5_compat { char* client; char* server; cc_data_compat keyblock; cc_time_t authtime; cc_time_t starttime; cc_time_t endtime; cc_time_t renew_till; cc_uint32 is_skey; cc_uint32 ticket_flags; cc_data_compat** addresses; cc_data_compat ticket; cc_data_compat second_ticket; cc_data_compat** authdata; } cc_credentials_v5_compat; enum { MAX_V4_CRED_LEN = 1250 }; enum { KRB_NAME_SZ = 40, KRB_INSTANCE_SZ = 40, KRB_REALM_SZ = 40 }; typedef struct cc_credentials_v4_compat { unsigned char kversion; char principal[KRB_NAME_SZ+1]; char principal_instance[KRB_INSTANCE_SZ+1]; char service[KRB_NAME_SZ+1]; char service_instance[KRB_INSTANCE_SZ+1]; char realm[KRB_REALM_SZ+1]; unsigned char session_key[8]; cc_int32 kvno; cc_int32 str_to_key; long issue_date; cc_int32 lifetime; cc_uint32 address; cc_int32 ticket_sz; unsigned char ticket[MAX_V4_CRED_LEN]; unsigned long oops; } cc_credentials_v4_compat; typedef union cred_ptr_union_c (…)
1 / member in struct:cc_credentials_v4_compat
/macosx-10.9.5/MITKerberosShim-62.1/mittestcc/
H A Dtest_ccapi_util.c74 v5creds->ticket.type = 0;
75 v5creds->ticket.length = 0;
76 v5creds->ticket.data = NULL;
113 if (v5creds->ticket.data) { free(v5creds->ticket.data); }

Completed in 114 milliseconds

123456