/macosx-10.9.5/MITKerberosShim-62.1/test/ |
H A D | test-authen::krb5.pl | 9 my $ticket = shift; 22 # when decoding the ticket, the 3rd parameter is the expected server's name for the ticket. 26 $ticket = Authen::Krb5::rd_req( $ac, $ticket, undef, $kt ); 28 if ( !defined($ticket) ) { 29 die( "Unable to read kerberos ticket request: ", Authen::Krb5::error() ); 32 my $serverPrincipal = $ticket->server(); 33 my $clientPrincipal = $ticket->enc_part2()->client(); 66 my $ticket [all...] |
/macosx-10.9.5/Heimdal-323.92.1/lib/gssapi/krb5/ |
H A D | ticket_flags.c | 47 if (ctx->ticket == NULL) { 53 *tkt_flags = TicketFlags2int(ctx->ticket->ticket.flags);
|
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/mac/krb4_sources/ |
H A D | mk_auth.c | 42 * The ticket acquired by `krb_mk_req' is returned in `ticket' and the 49 KTEXT ticket, 77 ret = krb_mk_req (ticket, service, realinst, realm, checksum); 99 tmp = krb_put_int(ticket->length, p, rem, 4); 105 if (rem < ticket->length) 107 memcpy(p, ticket->dat, ticket->length); 108 p += ticket->length; 109 rem -= ticket 48 krb_mk_auth(int32_t options, KTEXT ticket, char *service, char *instance, char *realm, u_int32_t checksum, char *version, KTEXT buf) argument [all...] |
H A D | mk_req.c | 91 * and a checksum. It then retrieves a ticket for 108 * unsigned char kvno from ticket server's key version 110 * unsigned char tl ticket length 112 * text ticket->dat ticket for server 115 * The ticket information is retrieved from the ticket cache or 140 KTEXT ticket = &(cr.ticket_st); /* Pointer to tkt_st */ local 161 /* Get the ticket and move it into the authenticator */ 178 * With multi realm ticket file [all...] |
/macosx-10.9.5/MITKerberosShim-62.1/ |
H A D | rd_req.c | 60 if (h->ticket.flags.forwardable) 62 if (h->ticket.flags.forwarded) 64 if (h->ticket.flags.proxiable) 66 if (h->ticket.flags.proxy) 68 if (h->ticket.flags.may_postdate) 70 if (h->ticket.flags.postdated) 72 if (h->ticket.flags.invalid) 74 if (h->ticket.flags.renewable) 76 if (h->ticket.flags.initial) 78 if (h->ticket 111 krb5_rd_req(mit_krb5_context context, mit_krb5_auth_context *ac, const mit_krb5_data *inbuf, mit_krb5_const_principal server, mit_krb5_keytab keytab, mit_krb5_flags *ap_req_options, mit_krb5_ticket **ticket) argument 150 krb5_recvauth(mit_krb5_context context, mit_krb5_auth_context *ac, mit_krb5_pointer fd, char *appl_version, mit_krb5_principal server, mit_krb5_int32 flags, mit_krb5_keytab keytab, mit_krb5_ticket **ticket) argument 176 mshim_hticket2mticket(HC(context), hticket, *ticket); local 195 krb5_recvauth_version(mit_krb5_context context, mit_krb5_auth_context *ac, mit_krb5_pointer fd, mit_krb5_principal server, mit_krb5_int32 flags, mit_krb5_keytab keytab, mit_krb5_ticket **ticket, mit_krb5_data *version) argument 222 mshim_hticket2mticket(HC(context), hticket, *ticket); local [all...] |
H A D | creds.c | 117 c->ticket.magic = MIT_KV5M_DATA; 118 c->ticket.length = from->ticket.length; 119 c->ticket.data = mshim_malloc(from->ticket.length); 120 memcpy(c->ticket.data, from->ticket.data, c->ticket.length);
|
/macosx-10.9.5/mDNSResponder-522.92.1/mDNSMacOSX/ |
H A D | P2PPacketFilter.c | 76 *outTicket = trans_e.ticket; 82 static int commitChange( int devFD, u_int32_t ticket, char * anchorPath ) argument 88 trans_e.ticket = ticket; 121 *outPoolTicket = pp.ticket; 141 u_int32_t ticket, 146 pr->ticket = ticket; 154 u_int32_t ticket, 161 initRuleHeader( pr, ticket, poolTicke 140 initRuleHeader( struct pfioc_rule * pr, u_int32_t ticket, u_int32_t poolTicket, char * anchorPath ) argument 152 initBonjourRule( struct pfioc_rule * pr, const char * interfaceName, u_int32_t ticket, u_int32_t poolTicket, char * anchorPath ) argument 178 initOutboundTCPRule( struct pfioc_rule * pr, const char * interfaceName, u_int32_t ticket, u_int32_t poolTicket, char * anchorPath ) argument 199 initPortRule( struct pfioc_rule * pr, const char * interfaceName, u_int32_t ticket, u_int32_t poolTicket, char * anchorPath, u_int16_t port, u_int16_t protocol ) argument 231 u_int32_t i, ticket, poolTicket; local 280 u_int32_t ticket; local [all...] |
/macosx-10.9.5/libtelnet-13/ |
H A D | forward.c | 36 rd_and_store_for_creds(context, auth_context, inbuf, ticket) 40 krb5_ticket *ticket; 59 if ((retval = krb5_cc_initialize(context, ccache, ticket->enc_part2->client)))
|
/macosx-10.9.5/Heimdal-323.92.1/kuser/ |
H A D | kvno.c | 50 NP_("Server to get ticket for", ""), "principal" }, 107 Ticket ticket; local 146 memset(&ticket, 0, sizeof(ticket)); 182 ret = decode_Ticket(out_creds->ticket.data, out_creds->ticket.length, 183 &ticket, &len); 185 krb5_err(context, 1, ret, "Can't decode ticket for %s", princ); 198 (ticket.enc_part.kvno != NULL)? 199 *ticket [all...] |
H A D | kdecode_ticket.c | 42 krb5_data *ticket, 54 ret = decode_Ticket (ticket->data, ticket->length, &tkt, &len); 156 print_and_decode_tkt (context, &out->ticket, out->server, 41 print_and_decode_tkt(krb5_context context, krb5_data *ticket, krb5_principal server, krb5_enctype enctype) argument
|
H A D | kimpersonate.c | 73 Ticket ticket; local 76 memset (&ticket, 0, sizeof(ticket)); 101 * Encrypt `enc_part' of ticket with service key 117 &ticket.enc_part); 125 * Encode ticket 128 ticket.tkt_vno = 5; 129 ticket.realm = cred->server->realm; 130 copy_PrincipalName(&cred->server->name, &ticket.sname); 132 ASN1_MALLOC_ENCODE(Ticket, buf, len, &ticket, [all...] |
/macosx-10.9.5/Heimdal-323.92.1/lib/krb5/ |
H A D | recvauth.c | 54 krb5_ticket **ticket) 59 keytab, ticket); 72 krb5_ticket **ticket) 174 ticket); 200 krb5_free_ticket(context, *ticket); 201 *ticket = NULL; 208 krb5_free_ticket(context, *ticket); 209 *ticket = NULL; 216 krb5_free_ticket(context, *ticket); 217 *ticket 47 krb5_recvauth(krb5_context context, krb5_auth_context *auth_context, krb5_pointer p_fd, const char *appl_version, krb5_principal server, int32_t flags, krb5_keytab keytab, krb5_ticket **ticket) argument 63 krb5_recvauth_match_version(krb5_context context, krb5_auth_context *auth_context, krb5_pointer p_fd, krb5_boolean (*match_appl_version)(const void *, const char*), const void *match_data, krb5_principal server, int32_t flags, krb5_keytab keytab, krb5_ticket **ticket) argument [all...] |
H A D | rd_req.c | 63 "ticket part", "")); 125 if (ap_req->ticket.tkt_vno != 5){ 134 check_transited(krb5_context context, Ticket *ticket, EncTicketPart *enc) argument 157 ticket->realm); 161 ticket->realm, 224 Ticket *ticket, 231 ret = decrypt_tkt_enc_part(context, key, &ticket->enc_part, &t); 256 ret = check_transited(context, ticket, &t); 321 krb5_ticket **ticket) 330 ticket, 223 krb5_decrypt_ticket(krb5_context context, Ticket *ticket, krb5_keyblock *key, EncTicketPart *out, krb5_flags flags) argument 314 krb5_verify_ap_req(krb5_context context, krb5_auth_context *auth_context, krb5_ap_req *ap_req, krb5_const_principal server, krb5_keyblock *keyblock, krb5_flags flags, krb5_flags *ap_req_options, krb5_ticket **ticket) argument 335 krb5_verify_ap_req2(krb5_context context, krb5_auth_context *auth_context, krb5_ap_req *ap_req, krb5_const_principal server, krb5_keyblock *keyblock, krb5_flags flags, krb5_flags *ap_req_options, krb5_ticket **ticket, krb5_key_usage usage) argument 527 krb5_ticket *ticket; member in struct:krb5_rd_req_out_ctx_data 621 krb5_rd_req_out_get_ticket(krb5_context context, krb5_rd_req_out_ctx out, krb5_ticket **ticket) argument 695 krb5_rd_req(krb5_context context, krb5_auth_context *auth_context, const krb5_data *inbuf, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument 740 krb5_rd_req_with_keyblock(krb5_context context, krb5_auth_context *auth_context, const krb5_data *inbuf, krb5_const_principal server, krb5_keyblock *keyblock, krb5_flags *ap_req_options, krb5_ticket **ticket) argument [all...] |
H A D | build_ap_req.c | 54 ret = decode_Ticket(cred->ticket.data, cred->ticket.length, &ap.ticket, &len);
|
H A D | test_pknistkdf.c | 49 krb5_data ticket; member in struct:testcase 86 { /* ticket */ 132 { /* ticket */ 178 { /* ticket */ 228 Ticket ticket; local 232 memset(&ticket, 0, sizeof(&ticket)); 237 ret = decode_Ticket(c->ticket.data, c->ticket.length, &ticket, [all...] |
H A D | ticket.c | 39 * Free ticket and content 42 * @param ticket ticket to free 52 krb5_ticket *ticket) 54 free_EncTicketPart(&ticket->ticket); 55 krb5_free_principal(context, ticket->client); 56 krb5_free_principal(context, ticket->server); 57 free(ticket); 62 * Copy ticket an 51 krb5_free_ticket(krb5_context context, krb5_ticket *ticket) argument 124 krb5_ticket_get_client(krb5_context context, const krb5_ticket *ticket, krb5_principal *client) argument 145 krb5_ticket_get_server(krb5_context context, const krb5_ticket *ticket, krb5_principal *server) argument 164 krb5_ticket_get_endtime(krb5_context context, const krb5_ticket *ticket) argument 181 krb5_ticket_get_flags(krb5_context context, const krb5_ticket *ticket) argument 342 krb5_ticket_get_authorization_data_type(krb5_context context, krb5_ticket *ticket, int type, krb5_data *data) argument [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/libDER/Tests/ |
H A D | parseTicket.c | 309 DERBbTicket ticket = {}; local 311 drtn = DERDecodeBbTicket(&derTicket, &ticket, &ticketSize); 315 // Verify signature if key file exists (we should really use the certificate or GPUK in the ticket here. */ 319 (unsigned char *)ticket.body.data, 320 ticket.body.length, 321 (unsigned char *)ticket.signature.data ); 329 /* Example of how to retrive fields from ticket. */ 331 drtn = DERSetDecodeItemWithTag(&ticket.body, 335 drtn = DERSetDecodeItemWithTag(&ticket.body, 341 fprintf( stdout, "Bad ticket\ 350 unsigned char *ticket = NULL; local 362 DERApTicket ticket = { }; local 447 DERBbTicket ticket = {}; local [all...] |
H A D | DER_Ticket.h | 62 DERApTicket *ticket, /* RETURNED */ 80 DERBbTicket *ticket, /* RETURNED */
|
H A D | DER_Ticket.c | 134 DERApTicket *ticket, /* RETURNED */ 142 DERNumApTicketItemSpecs, DERApTicketItemSpecs, ticket, 0); 147 drtn = DERParseSequenceContent(&ticket->signatureAlgorithm, 163 DERBbTicket *ticket, /* RETURNED */ 171 DERNumBbTicketItemSpecs, DERBbTicketItemSpecs, ticket, 0); 176 drtn = DERParseSequenceContent(&ticket->signatureAlgorithm, 132 DERDecodeApTicket( const DERItem *contents, DERApTicket *ticket, DERSize *numUsedBytes) argument 161 DERDecodeBbTicket( const DERItem *contents, DERBbTicket *ticket, DERSize *numUsedBytes) argument
|
/macosx-10.9.5/remote_cmds-41.90.1/rlogin.tproj/ |
H A D | krcmd.c | 101 KTEXT_ST ticket; local 112 &ticket, 144 KTEXT_ST ticket; local 157 &ticket,
|
/macosx-10.9.5/Heimdal-323.92.1/lib/kafs/ |
H A D | afskrb5.c | 52 kt->ticket = NULL; 66 ret = decode_Ticket(cred->ticket.data, cred->ticket.length, &t, &len); 82 kt->ticket = buf; 87 kt->ticket = malloc(cred->ticket.length); 88 if (kt->ticket == NULL) 90 kt->ticket_len = cred->ticket.length; 91 memcpy(kt->ticket, cred->ticket [all...] |
/macosx-10.9.5/Heimdal-323.92.1/appl/test/ |
H A D | uu_client.c | 53 krb5_ticket *ticket; local 124 status = krb5_write_message(context, &sock, &cred.ticket); 133 VERSION, client, 0, NULL, &ticket); 138 if (ticket->ticket.authorization_data) { 144 authz = ticket->ticket.authorization_data;
|
/macosx-10.9.5/CPANInternal-140/SQL-Abstract/t/ |
H A D | 00new.t | 88 stmt => 'SELECT * FROM test WHERE ( ( LOWER(ticket) = LOWER(?) ) OR ( LOWER(hostname) = LOWER(?) ) OR ( LOWER(taco) = LOWER(?) ) OR ( LOWER(salami) = LOWER(?) ) )', 89 where => [ { ticket => 11 }, { hostname => 11 }, { taco => 'salad' }, { salami => 'punch' } ], 94 stmt => 'SELECT * FROM test WHERE ( ( UPPER(hostname) IN ( UPPER(?), UPPER(?), UPPER(?), UPPER(?) ) AND ( ( UPPER(ticket) = UPPER(?) ) OR ( UPPER(ticket) = UPPER(?) ) OR ( UPPER(ticket) = UPPER(?) ) ) ) OR ( UPPER(tack) BETWEEN UPPER(?) AND UPPER(?) ) OR ( ( ( UPPER(a) = UPPER(?) ) OR ( UPPER(a) = UPPER(?) ) OR ( UPPER(a) = UPPER(?) ) ) AND ( ( UPPER(e) != UPPER(?) ) OR ( UPPER(e) != UPPER(?) ) ) AND UPPER(q) NOT IN ( UPPER(?), UPPER(?), UPPER(?), UPPER(?), UPPER(?), UPPER(?), UPPER(?) ) ) )', 95 where => [ { ticket => [11, 12, 13],
|
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/mac/CommonKClient/mac_kclient3/Headers/CredentialsCache/ |
H A D | CredentialsCache2.h | 69 /*
* This is backwards compatibility for CCache API v2 clients to be able to run
* against the CCache API v3 library
*/
#ifndef __CREDENTIALSCACHE2__
#define __CREDENTIALSCACHE2__
#include <CredentialsCache/CredentialsCache.h>
#ifdef __cplusplus
extern "C" {
#endif /* __cplusplus */
#include <KerberosSupport/KerberosConditionalMacros.h>
#if PRAGMA_IMPORT
# pragma import on
#endif
/* This stuff is to make sure that we always use the same compiler options for
this header file. Otherwise we get really exciting failure modes -- meeroh */
/* Sadly, the v2 APi didn't specify the alignment, so we use the default except on MacOS
(where our implementation defined it to be 2-byte aligned) */
#if TARGET_OS_MAC
#if PRAGMA_STRUCT_ALIGN
#pragma options align=mac68k
#elif PRAGMA_STRUCT_PACKPUSH
#pragma pack(push, 2)
#elif PRAGMA_STRUCT_PACK
#pragma pack(2)
#endif
#endif
#if PRAGMA_ENUM_ALWAYSINT
#pragma enumsalwaysint on
#endif
#if TARGET_CPU_68K
#pragma fourbyteints on
#endif
/* Some old types get directly mapped to new types */
typedef cc_context_d apiCB;
typedef cc_ccache_d ccache_p;
typedef cc_credentials_iterator_d ccache_cit_creds;
typedef cc_ccache_iterator_d ccache_cit_ccache;
typedef cc_data cc_data_compat;
typedef cc_int32 cc_cred_vers;
typedef cc_int32 cc_result;
/* This doesn't exist in API v3 */
typedef cc_uint32 cc_flags;
/* Credentials types are visible to the caller so we have to keep binary compatibility */
typedef struct cc_credentials_v5_compat {
char* client;
char* server;
cc_data_compat keyblock;
cc_time_t authtime;
cc_time_t starttime;
cc_time_t endtime;
cc_time_t renew_till;
cc_uint32 is_skey;
cc_uint32 ticket_flags;
cc_data_compat** addresses;
cc_data_compat ticket;
cc_data_compat second_ticket;
cc_data_compat** authdata;
} cc_credentials_v5_compat;
enum {
MAX_V4_CRED_LEN = 1250
};
enum {
KRB_NAME_SZ = 40,
KRB_INSTANCE_SZ = 40,
KRB_REALM_SZ = 40
};
typedef struct cc_credentials_v4_compat {
unsigned char kversion;
char principal[KRB_NAME_SZ+1];
char principal_instance[KRB_INSTANCE_SZ+1];
char service[KRB_NAME_SZ+1];
char service_instance[KRB_INSTANCE_SZ+1];
char realm[KRB_REALM_SZ+1];
unsigned char session_key[8];
cc_int32 kvno;
cc_int32 str_to_key;
long issue_date;
cc_int32 lifetime;
cc_uint32 address;
cc_int32 ticket_sz;
unsigned char ticket[MAX_V4_CRED_LEN];
unsigned long oops;
} cc_credentials_v4_compat;
typedef union cred_ptr_union_c (…) 1 / member in struct:cc_credentials_v4_compat
|
/macosx-10.9.5/MITKerberosShim-62.1/mittestcc/ |
H A D | test_ccapi_util.c | 74 v5creds->ticket.type = 0; 75 v5creds->ticket.length = 0; 76 v5creds->ticket.data = NULL; 113 if (v5creds->ticket.data) { free(v5creds->ticket.data); }
|