Searched refs:ticket (Results 1 - 20 of 20) sorted by relevance

/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/lib/
H A Dafs_settoken.c51 DATA_BLOB *ticket, struct ClearToken *ct)
133 DEBUG(10, ("Could not get ticket\n"));
137 *ticket = blob;
155 DATA_BLOB ticket)
167 memcpy(p, &ticket.length, sizeof(uint32));
169 memcpy(p, ticket.data, ticket.length);
170 p += ticket.length;
211 DATA_BLOB ticket; local
216 if (!afs_decode_token(token_string, &cell, &ticket,
50 afs_decode_token(const char *string, char **cell, DATA_BLOB *ticket, struct ClearToken *ct) argument
153 afs_settoken(const char *cell, const struct ClearToken *ctok, DATA_BLOB ticket) argument
[all...]
H A Dafs.c40 static char *afs_encode_token(const char *cell, const DATA_BLOB ticket, argument
49 base64_ticket = base64_encode_data_blob(ticket);
63 DEBUG(10, ("Got ticket string:\n%s\n", result));
71 /* Create a ClearToken and an encrypted ticket. ClearToken has not yet the
75 DATA_BLOB *ticket, struct ClearToken *ct)
95 /* Build the ticket. This is going to be encrypted, so in our
174 *ticket = data_blob(clear_ticket, len);
181 DATA_BLOB ticket; local
185 if (!afs_createtoken(username, cell, &ticket, &ct))
188 result = afs_encode_token(cell, ticket,
74 afs_createtoken(const char *username, const char *cell, DATA_BLOB *ticket, struct ClearToken *ct) argument
212 DATA_BLOB ticket; local
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/fs/xfs/
H A Dxfs_log.c52 STATIC int xlog_commit_record(xfs_mount_t *mp, xlog_ticket_t *ticket,
73 xlog_ticket_t *ticket,
96 xlog_ticket_t *ticket);
98 xlog_ticket_t *ticket);
100 xlog_ticket_t *ticket);
103 /* local ticket functions */
110 STATIC void xlog_ticket_put(xlog_t *log, xlog_ticket_t *ticket);
139 /* ticket counts are 1 byte each */
264 * This routine is called when a user of a log manager ticket is done with
265 * the reservation. If the ticket wa
284 xlog_ticket_t *ticket = (xfs_log_ticket_t) xtic; local
421 xfs_log_reserve(xfs_mount_t *mp, int unit_bytes, int cnt, xfs_log_ticket_t *ticket, __uint8_t client, uint flags, uint t_type) argument
1245 xlog_commit_record(xfs_mount_t *mp, xlog_ticket_t *ticket, xlog_in_core_t **iclog, xfs_lsn_t *commitlsnp) argument
1591 xlog_print_tic_res(xfs_mount_t *mp, xlog_ticket_t *ticket) argument
1743 xlog_ticket_t *ticket = (xlog_ticket_t *)tic; local
2339 xlog_state_get_iclog_space(xlog_t *log, int len, xlog_in_core_t **iclogp, xlog_ticket_t *ticket, int *continued_write, int *logoffsetp) argument
2698 xlog_regrant_reserve_log_space(xlog_t *log, xlog_ticket_t *ticket) argument
2747 xlog_ungrant_log_space(xlog_t *log, xlog_ticket_t *ticket) argument
3222 xlog_ticket_put(xlog_t *log, xlog_ticket_t *ticket) argument
[all...]
H A Dxfs_log.h137 xfs_log_ticket_t ticket,
161 xfs_log_ticket_t *ticket,
168 xfs_log_ticket_t ticket,
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/net/rxrpc/
H A Dar-key.c64 * 6 2 ticket length
68 * 24 [len] ticket
120 tsec->ticket[0], tsec->ticket[1],
121 tsec->ticket[2], tsec->ticket[3],
122 tsec->ticket[4], tsec->ticket[5],
123 tsec->ticket[6], tsec->ticket[
[all...]
H A Drxkad.c654 iov[2].iov_base = (void *) s2->ticket;
810 * decrypt the kerberos IV ticket in the response
813 void *ticket, size_t ticket_len,
845 ASSERTCMP((unsigned long) ticket & 7UL, ==, 0);
853 sg_init_one(&ssg[0], ticket, ticket_len);
857 p = ticket;
873 /* extract the ticket flags */
893 /* get the IPv4 address of the entity that requested the ticket */
898 /* get the session key from the ticket */
904 /* get the ticket'
812 rxkad_decrypt_ticket(struct rxrpc_connection *conn, void *ticket, size_t ticket_len, struct rxrpc_crypt *_session_key, time_t *_expiry, u32 *_abort_code) argument
1002 void *ticket; local
[all...]
H A Dar-internal.h403 u16 ticket_len; /* length of ticket[] */
407 u8 ticket[0]; /* the encrypted ticket */ member in struct:rxkad_key
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/libads/
H A Dkerberos_verify.c34 Try to verify a ticket using the system keytab... the system keytab has kvno -1 entries, so
40 const DATA_BLOB *ticket, krb5_data *p_packet, krb5_ticket **pp_tkt)
81 * try verifying the ticket using that principal. */
101 p_packet->length = ticket->length;
102 p_packet->data = (krb5_pointer)ticket->data;
168 Try to verify a ticket using the secrets.tdb.
173 const DATA_BLOB *ticket, krb5_data *p_packet, krb5_ticket **pp_tkt)
204 p_packet->length = ticket->length;
205 p_packet->data = (krb5_pointer)ticket->data;
247 Verify an incoming ticket an
39 ads_keytab_verify_ticket(krb5_context context, krb5_auth_context auth_context, const DATA_BLOB *ticket, krb5_data *p_packet, krb5_ticket **pp_tkt) argument
171 ads_secrets_verify_ticket(krb5_context context, krb5_auth_context auth_context, krb5_principal host_princ, const DATA_BLOB *ticket, krb5_data *p_packet, krb5_ticket **pp_tkt) argument
251 ads_verify_ticket(const char *realm, const DATA_BLOB *ticket, char **principal, DATA_BLOB *auth_data, DATA_BLOB *ap_rep, DATA_BLOB *session_key) argument
[all...]
H A Dkerberos.c306 Routine to get initial credentials as a service ticket for the local machine.
342 ticket to ourselves. */
413 krb5_ticket *ticket = NULL; local
463 if (!(err = krb5_rd_req(ctx, &auth_context, in_data, NULL, NULL, NULL, &ticket))) {
473 if (ticket != NULL) {
474 krb5_free_ticket(ctx, ticket);
546 /* Get a service ticket for ourselves into our memory ccache. */
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/libsmb/
H A Dclikrb5.c191 if (tkt->ticket.authorization_data && tkt->ticket.authorization_data->len)
192 *auth_data = data_blob(tkt->ticket.authorization_data->val->ad_data.data,
193 tkt->ticket.authorization_data->val->ad_data.length);
369 /* obtain ticket & session key */
378 /* This can commonly fail on smbd startup with no ticket in the cache.
393 /* cope with ticket being in the future due to clock skew */
430 get a kerberos5 ticket for the given service
433 DATA_BLOB *ticket, DATA_BLOB *session_key_krb5)
481 *ticket
432 cli_krb5_get_ticket(const char *principal, time_t time_offset, DATA_BLOB *ticket, DATA_BLOB *session_key_krb5) argument
548 cli_krb5_get_ticket(const char *principal, time_t time_offset, DATA_BLOB *ticket, DATA_BLOB *session_key_krb5) argument
[all...]
H A Dclispnego.c261 generate a krb5 GSS-API wrapper packet given a ticket
263 DATA_BLOB spnego_gen_krb5_wrap(DATA_BLOB ticket, const uint8 tok_id[2]) argument
274 asn1_write(&data, ticket.data, ticket.length);
289 parse a krb5 GSS-API wrapper packet giving a ticket
291 BOOL spnego_parse_krb5_wrap(DATA_BLOB blob, DATA_BLOB *ticket, uint8 tok_id[2]) argument
308 *ticket = data_blob(NULL, data_remaining);
309 asn1_read(&data, ticket->data, ticket->length);
334 /* get a kerberos ticket fo
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/crypto/krb5/
H A Dkrb5_asn.h128 ** ticket[3] Ticket,
140 KRB5_TICKET *ticket; member in struct:krb5_ap_req_st
H A Dkrb5_asn.c104 ASN1_EXP(KRB5_APREQBODY, ticket, KRB5_TICKET, 3),
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/include/openssl/
H A Dkrb5_asn.h128 ** ticket[3] Ticket,
140 KRB5_TICKET *ticket; member in struct:krb5_ap_req_st
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/
H A Dkrb5_asn.h128 ** ticket[3] Ticket,
140 KRB5_TICKET *ticket; member in struct:krb5_ap_req_st
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/crypto/krb5/
H A Dkrb5_asn.h128 ** ticket[3] Ticket,
140 KRB5_TICKET *ticket; member in struct:krb5_ap_req_st
H A Dkrb5_asn.c104 ASN1_EXP(KRB5_APREQBODY, ticket, KRB5_TICKET, 3),
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/smbd/
H A Dsesssetup.c147 DATA_BLOB ticket; local
162 ZERO_STRUCT(ticket);
168 if (!spnego_parse_krb5_wrap(*secblob, &ticket, tok_id)) {
172 ret = ads_verify_ticket(lp_realm(), &ticket, &client, &auth_data, &ap_rep, &session_key);
174 data_blob_free(&ticket);
177 DEBUG(1,("Failed to verify incoming ticket!\n"));
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/ssl/
H A Dkssl.c555 krb5_ticket *ticket)
561 return(p_krb5_decrypt_tkt_part(con,keys,ticket));
1028 ** Return encrypted Kerberos ticket for service @ hostname.
1111 *enc_ticketp = &krb5credsp->ticket;
1246 "Error building ticket server principal.\n");
1428 "Error converting ASN.1 ticket to krb5_ticket.\n");
1437 "server principal != ticket principal\n");
1461 printf("Decrypted ticket fields:\n");
1496 "bad ticket from krb5_rd_req.\n");
1515 "invalid ticket fro
554 krb5_decrypt_tkt_part(krb5_context con, krb5_const krb5_keyblock *keys, krb5_ticket *ticket) argument
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/ssl/
H A Dkssl.c563 krb5_ticket *ticket)
569 return(p_krb5_decrypt_tkt_part(con,keys,ticket));
1055 ** Return encrypted Kerberos ticket for service @ hostname.
1138 *enc_ticketp = &krb5credsp->ticket;
1273 "Error building ticket server principal.\n");
1455 "Error converting ASN.1 ticket to krb5_ticket.\n");
1464 "server principal != ticket principal\n");
1488 printf("Decrypted ticket fields:\n");
1523 "bad ticket from krb5_rd_req.\n");
1542 "invalid ticket fro
562 krb5_decrypt_tkt_part(krb5_context con, krb5_const krb5_keyblock *keys, krb5_ticket *ticket) argument
[all...]

Completed in 320 milliseconds