/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/lib/ |
H A D | afs_settoken.c | 51 DATA_BLOB *ticket, struct ClearToken *ct) 133 DEBUG(10, ("Could not get ticket\n")); 137 *ticket = blob; 155 DATA_BLOB ticket) 167 memcpy(p, &ticket.length, sizeof(uint32)); 169 memcpy(p, ticket.data, ticket.length); 170 p += ticket.length; 211 DATA_BLOB ticket; local 216 if (!afs_decode_token(token_string, &cell, &ticket, 50 afs_decode_token(const char *string, char **cell, DATA_BLOB *ticket, struct ClearToken *ct) argument 153 afs_settoken(const char *cell, const struct ClearToken *ctok, DATA_BLOB ticket) argument [all...] |
H A D | afs.c | 40 static char *afs_encode_token(const char *cell, const DATA_BLOB ticket, argument 49 base64_ticket = base64_encode_data_blob(ticket); 63 DEBUG(10, ("Got ticket string:\n%s\n", result)); 71 /* Create a ClearToken and an encrypted ticket. ClearToken has not yet the 75 DATA_BLOB *ticket, struct ClearToken *ct) 95 /* Build the ticket. This is going to be encrypted, so in our 174 *ticket = data_blob(clear_ticket, len); 181 DATA_BLOB ticket; local 185 if (!afs_createtoken(username, cell, &ticket, &ct)) 188 result = afs_encode_token(cell, ticket, 74 afs_createtoken(const char *username, const char *cell, DATA_BLOB *ticket, struct ClearToken *ct) argument 212 DATA_BLOB ticket; local [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/fs/xfs/ |
H A D | xfs_log.c | 52 STATIC int xlog_commit_record(xfs_mount_t *mp, xlog_ticket_t *ticket, 73 xlog_ticket_t *ticket, 96 xlog_ticket_t *ticket); 98 xlog_ticket_t *ticket); 100 xlog_ticket_t *ticket); 103 /* local ticket functions */ 110 STATIC void xlog_ticket_put(xlog_t *log, xlog_ticket_t *ticket); 139 /* ticket counts are 1 byte each */ 264 * This routine is called when a user of a log manager ticket is done with 265 * the reservation. If the ticket wa 284 xlog_ticket_t *ticket = (xfs_log_ticket_t) xtic; local 421 xfs_log_reserve(xfs_mount_t *mp, int unit_bytes, int cnt, xfs_log_ticket_t *ticket, __uint8_t client, uint flags, uint t_type) argument 1245 xlog_commit_record(xfs_mount_t *mp, xlog_ticket_t *ticket, xlog_in_core_t **iclog, xfs_lsn_t *commitlsnp) argument 1591 xlog_print_tic_res(xfs_mount_t *mp, xlog_ticket_t *ticket) argument 1743 xlog_ticket_t *ticket = (xlog_ticket_t *)tic; local 2339 xlog_state_get_iclog_space(xlog_t *log, int len, xlog_in_core_t **iclogp, xlog_ticket_t *ticket, int *continued_write, int *logoffsetp) argument 2698 xlog_regrant_reserve_log_space(xlog_t *log, xlog_ticket_t *ticket) argument 2747 xlog_ungrant_log_space(xlog_t *log, xlog_ticket_t *ticket) argument 3222 xlog_ticket_put(xlog_t *log, xlog_ticket_t *ticket) argument [all...] |
H A D | xfs_log.h | 137 xfs_log_ticket_t ticket, 161 xfs_log_ticket_t *ticket, 168 xfs_log_ticket_t ticket,
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/net/rxrpc/ |
H A D | ar-key.c | 64 * 6 2 ticket length 68 * 24 [len] ticket 120 tsec->ticket[0], tsec->ticket[1], 121 tsec->ticket[2], tsec->ticket[3], 122 tsec->ticket[4], tsec->ticket[5], 123 tsec->ticket[6], tsec->ticket[ [all...] |
H A D | rxkad.c | 654 iov[2].iov_base = (void *) s2->ticket; 810 * decrypt the kerberos IV ticket in the response 813 void *ticket, size_t ticket_len, 845 ASSERTCMP((unsigned long) ticket & 7UL, ==, 0); 853 sg_init_one(&ssg[0], ticket, ticket_len); 857 p = ticket; 873 /* extract the ticket flags */ 893 /* get the IPv4 address of the entity that requested the ticket */ 898 /* get the session key from the ticket */ 904 /* get the ticket' 812 rxkad_decrypt_ticket(struct rxrpc_connection *conn, void *ticket, size_t ticket_len, struct rxrpc_crypt *_session_key, time_t *_expiry, u32 *_abort_code) argument 1002 void *ticket; local [all...] |
H A D | ar-internal.h | 403 u16 ticket_len; /* length of ticket[] */ 407 u8 ticket[0]; /* the encrypted ticket */ member in struct:rxkad_key
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/libads/ |
H A D | kerberos_verify.c | 34 Try to verify a ticket using the system keytab... the system keytab has kvno -1 entries, so 40 const DATA_BLOB *ticket, krb5_data *p_packet, krb5_ticket **pp_tkt) 81 * try verifying the ticket using that principal. */ 101 p_packet->length = ticket->length; 102 p_packet->data = (krb5_pointer)ticket->data; 168 Try to verify a ticket using the secrets.tdb. 173 const DATA_BLOB *ticket, krb5_data *p_packet, krb5_ticket **pp_tkt) 204 p_packet->length = ticket->length; 205 p_packet->data = (krb5_pointer)ticket->data; 247 Verify an incoming ticket an 39 ads_keytab_verify_ticket(krb5_context context, krb5_auth_context auth_context, const DATA_BLOB *ticket, krb5_data *p_packet, krb5_ticket **pp_tkt) argument 171 ads_secrets_verify_ticket(krb5_context context, krb5_auth_context auth_context, krb5_principal host_princ, const DATA_BLOB *ticket, krb5_data *p_packet, krb5_ticket **pp_tkt) argument 251 ads_verify_ticket(const char *realm, const DATA_BLOB *ticket, char **principal, DATA_BLOB *auth_data, DATA_BLOB *ap_rep, DATA_BLOB *session_key) argument [all...] |
H A D | kerberos.c | 306 Routine to get initial credentials as a service ticket for the local machine. 342 ticket to ourselves. */ 413 krb5_ticket *ticket = NULL; local 463 if (!(err = krb5_rd_req(ctx, &auth_context, in_data, NULL, NULL, NULL, &ticket))) { 473 if (ticket != NULL) { 474 krb5_free_ticket(ctx, ticket); 546 /* Get a service ticket for ourselves into our memory ccache. */
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/libsmb/ |
H A D | clikrb5.c | 191 if (tkt->ticket.authorization_data && tkt->ticket.authorization_data->len) 192 *auth_data = data_blob(tkt->ticket.authorization_data->val->ad_data.data, 193 tkt->ticket.authorization_data->val->ad_data.length); 369 /* obtain ticket & session key */ 378 /* This can commonly fail on smbd startup with no ticket in the cache. 393 /* cope with ticket being in the future due to clock skew */ 430 get a kerberos5 ticket for the given service 433 DATA_BLOB *ticket, DATA_BLOB *session_key_krb5) 481 *ticket 432 cli_krb5_get_ticket(const char *principal, time_t time_offset, DATA_BLOB *ticket, DATA_BLOB *session_key_krb5) argument 548 cli_krb5_get_ticket(const char *principal, time_t time_offset, DATA_BLOB *ticket, DATA_BLOB *session_key_krb5) argument [all...] |
H A D | clispnego.c | 261 generate a krb5 GSS-API wrapper packet given a ticket 263 DATA_BLOB spnego_gen_krb5_wrap(DATA_BLOB ticket, const uint8 tok_id[2]) argument 274 asn1_write(&data, ticket.data, ticket.length); 289 parse a krb5 GSS-API wrapper packet giving a ticket 291 BOOL spnego_parse_krb5_wrap(DATA_BLOB blob, DATA_BLOB *ticket, uint8 tok_id[2]) argument 308 *ticket = data_blob(NULL, data_remaining); 309 asn1_read(&data, ticket->data, ticket->length); 334 /* get a kerberos ticket fo [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/crypto/krb5/ |
H A D | krb5_asn.h | 128 ** ticket[3] Ticket, 140 KRB5_TICKET *ticket; member in struct:krb5_ap_req_st
|
H A D | krb5_asn.c | 104 ASN1_EXP(KRB5_APREQBODY, ticket, KRB5_TICKET, 3),
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/include/openssl/ |
H A D | krb5_asn.h | 128 ** ticket[3] Ticket, 140 KRB5_TICKET *ticket; member in struct:krb5_ap_req_st
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | krb5_asn.h | 128 ** ticket[3] Ticket, 140 KRB5_TICKET *ticket; member in struct:krb5_ap_req_st
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/crypto/krb5/ |
H A D | krb5_asn.h | 128 ** ticket[3] Ticket, 140 KRB5_TICKET *ticket; member in struct:krb5_ap_req_st
|
H A D | krb5_asn.c | 104 ASN1_EXP(KRB5_APREQBODY, ticket, KRB5_TICKET, 3),
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/smbd/ |
H A D | sesssetup.c | 147 DATA_BLOB ticket; local 162 ZERO_STRUCT(ticket); 168 if (!spnego_parse_krb5_wrap(*secblob, &ticket, tok_id)) { 172 ret = ads_verify_ticket(lp_realm(), &ticket, &client, &auth_data, &ap_rep, &session_key); 174 data_blob_free(&ticket); 177 DEBUG(1,("Failed to verify incoming ticket!\n"));
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/ssl/ |
H A D | kssl.c | 555 krb5_ticket *ticket) 561 return(p_krb5_decrypt_tkt_part(con,keys,ticket)); 1028 ** Return encrypted Kerberos ticket for service @ hostname. 1111 *enc_ticketp = &krb5credsp->ticket; 1246 "Error building ticket server principal.\n"); 1428 "Error converting ASN.1 ticket to krb5_ticket.\n"); 1437 "server principal != ticket principal\n"); 1461 printf("Decrypted ticket fields:\n"); 1496 "bad ticket from krb5_rd_req.\n"); 1515 "invalid ticket fro 554 krb5_decrypt_tkt_part(krb5_context con, krb5_const krb5_keyblock *keys, krb5_ticket *ticket) argument [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | kssl.c | 563 krb5_ticket *ticket) 569 return(p_krb5_decrypt_tkt_part(con,keys,ticket)); 1055 ** Return encrypted Kerberos ticket for service @ hostname. 1138 *enc_ticketp = &krb5credsp->ticket; 1273 "Error building ticket server principal.\n"); 1455 "Error converting ASN.1 ticket to krb5_ticket.\n"); 1464 "server principal != ticket principal\n"); 1488 printf("Decrypted ticket fields:\n"); 1523 "bad ticket from krb5_rd_req.\n"); 1542 "invalid ticket fro 562 krb5_decrypt_tkt_part(krb5_context con, krb5_const krb5_keyblock *keys, krb5_ticket *ticket) argument [all...] |