Searched refs:ticket (Results 1 - 25 of 146) sorted by relevance

123456

/macosx-10.10.1/MITKerberosShim-66/test/
H A Dtest-authen::krb5.pl9 my $ticket = shift;
22 # when decoding the ticket, the 3rd parameter is the expected server's name for the ticket.
26 $ticket = Authen::Krb5::rd_req( $ac, $ticket, undef, $kt );
28 if ( !defined($ticket) ) {
29 die( "Unable to read kerberos ticket request: ", Authen::Krb5::error() );
32 my $serverPrincipal = $ticket->server();
33 my $clientPrincipal = $ticket->enc_part2()->client();
66 my $ticket
[all...]
/macosx-10.10.1/Heimdal-398.1.2/lib/gssapi/krb5/
H A Dticket_flags.c47 if (ctx->ticket == NULL) {
53 *tkt_flags = TicketFlags2int(ctx->ticket->ticket.flags);
/macosx-10.10.1/MITKerberosShim-66/
H A Drd_req.c60 if (h->ticket.flags.forwardable)
62 if (h->ticket.flags.forwarded)
64 if (h->ticket.flags.proxiable)
66 if (h->ticket.flags.proxy)
68 if (h->ticket.flags.may_postdate)
70 if (h->ticket.flags.postdated)
72 if (h->ticket.flags.invalid)
74 if (h->ticket.flags.renewable)
76 if (h->ticket.flags.initial)
78 if (h->ticket
111 krb5_rd_req(mit_krb5_context context, mit_krb5_auth_context *ac, const mit_krb5_data *inbuf, mit_krb5_const_principal server, mit_krb5_keytab keytab, mit_krb5_flags *ap_req_options, mit_krb5_ticket **ticket) argument
150 krb5_recvauth(mit_krb5_context context, mit_krb5_auth_context *ac, mit_krb5_pointer fd, char *appl_version, mit_krb5_principal server, mit_krb5_int32 flags, mit_krb5_keytab keytab, mit_krb5_ticket **ticket) argument
176 mshim_hticket2mticket(HC(context), hticket, *ticket); local
195 krb5_recvauth_version(mit_krb5_context context, mit_krb5_auth_context *ac, mit_krb5_pointer fd, mit_krb5_principal server, mit_krb5_int32 flags, mit_krb5_keytab keytab, mit_krb5_ticket **ticket, mit_krb5_data *version) argument
222 mshim_hticket2mticket(HC(context), hticket, *ticket); local
[all...]
H A Dcreds.c117 c->ticket.magic = MIT_KV5M_DATA;
118 c->ticket.length = from->ticket.length;
119 c->ticket.data = mshim_malloc(from->ticket.length);
120 memcpy(c->ticket.data, from->ticket.data, c->ticket.length);
/macosx-10.10.1/mDNSResponder-561.1.1/mDNSMacOSX/
H A DP2PPacketFilter.c76 *outTicket = trans_e.ticket;
82 static int commitChange( int devFD, u_int32_t ticket, char * anchorPath ) argument
88 trans_e.ticket = ticket;
121 *outPoolTicket = pp.ticket;
141 u_int32_t ticket,
146 pr->ticket = ticket;
154 u_int32_t ticket,
161 initRuleHeader( pr, ticket, poolTicke
140 initRuleHeader( struct pfioc_rule * pr, u_int32_t ticket, u_int32_t poolTicket, char * anchorPath ) argument
152 initBonjourRule( struct pfioc_rule * pr, const char * interfaceName, u_int32_t ticket, u_int32_t poolTicket, char * anchorPath ) argument
178 initOutboundTCPRule( struct pfioc_rule * pr, const char * interfaceName, u_int32_t ticket, u_int32_t poolTicket, char * anchorPath ) argument
199 initPortRule( struct pfioc_rule * pr, const char * interfaceName, u_int32_t ticket, u_int32_t poolTicket, char * anchorPath, u_int16_t port, u_int16_t protocol ) argument
231 u_int32_t i, ticket, poolTicket; local
280 u_int32_t ticket; local
[all...]
/macosx-10.10.1/libtelnet-13/
H A Dforward.c36 rd_and_store_for_creds(context, auth_context, inbuf, ticket)
40 krb5_ticket *ticket;
59 if ((retval = krb5_cc_initialize(context, ccache, ticket->enc_part2->client)))
/macosx-10.10.1/Heimdal-398.1.2/kuser/
H A Dkvno.c50 NP_("Server to get ticket for", ""), "principal" },
107 Ticket ticket; local
146 memset(&ticket, 0, sizeof(ticket));
182 ret = decode_Ticket(out_creds->ticket.data, out_creds->ticket.length,
183 &ticket, &len);
185 krb5_err(context, 1, ret, "Can't decode ticket for %s", princ);
198 (ticket.enc_part.kvno != NULL)?
199 *ticket
[all...]
H A Dkdecode_ticket.c42 krb5_data *ticket,
54 ret = decode_Ticket (ticket->data, ticket->length, &tkt, &len);
156 print_and_decode_tkt (context, &out->ticket, out->server,
41 print_and_decode_tkt(krb5_context context, krb5_data *ticket, krb5_principal server, krb5_enctype enctype) argument
H A Dkimpersonate.c73 Ticket ticket; local
76 memset (&ticket, 0, sizeof(ticket));
101 * Encrypt `enc_part' of ticket with service key
117 &ticket.enc_part);
125 * Encode ticket
128 ticket.tkt_vno = 5;
129 ticket.realm = cred->server->realm;
130 copy_PrincipalName(&cred->server->name, &ticket.sname);
132 ASN1_MALLOC_ENCODE(Ticket, buf, len, &ticket,
[all...]
/macosx-10.10.1/Heimdal-398.1.2/lib/krb5/
H A Drecvauth.c54 krb5_ticket **ticket)
59 keytab, ticket);
72 krb5_ticket **ticket)
179 ticket);
205 krb5_free_ticket(context, *ticket);
206 *ticket = NULL;
213 krb5_free_ticket(context, *ticket);
214 *ticket = NULL;
221 krb5_free_ticket(context, *ticket);
222 *ticket
47 krb5_recvauth(krb5_context context, krb5_auth_context *auth_context, krb5_pointer p_fd, const char *appl_version, krb5_principal server, int32_t flags, krb5_keytab keytab, krb5_ticket **ticket) argument
63 krb5_recvauth_match_version(krb5_context context, krb5_auth_context *auth_context, krb5_pointer p_fd, krb5_boolean (*match_appl_version)(const void *, const char*), const void *match_data, krb5_principal server, int32_t flags, krb5_keytab keytab, krb5_ticket **ticket) argument
[all...]
H A Drd_req.c63 "ticket part", ""));
125 if (ap_req->ticket.tkt_vno != 5){
134 check_transited(krb5_context context, Ticket *ticket, EncTicketPart *enc) argument
157 ticket->realm);
161 ticket->realm,
191 Ticket *ticket,
198 ret = decrypt_tkt_enc_part(context, key, &ticket->enc_part, &t);
223 ret = check_transited(context, ticket, &t);
288 krb5_ticket **ticket)
297 ticket,
190 krb5_decrypt_ticket(krb5_context context, Ticket *ticket, krb5_keyblock *key, EncTicketPart *out, krb5_flags flags) argument
281 krb5_verify_ap_req(krb5_context context, krb5_auth_context *auth_context, krb5_ap_req *ap_req, krb5_const_principal server, krb5_keyblock *keyblock, krb5_flags flags, krb5_flags *ap_req_options, krb5_ticket **ticket) argument
302 krb5_verify_ap_req2(krb5_context context, krb5_auth_context *auth_context, krb5_ap_req *ap_req, krb5_const_principal server, krb5_keyblock *keyblock, krb5_flags flags, krb5_flags *ap_req_options, krb5_ticket **ticket, krb5_key_usage usage) argument
497 krb5_ticket *ticket; member in struct:krb5_rd_req_out_ctx_data
591 krb5_rd_req_out_get_ticket(krb5_context context, krb5_rd_req_out_ctx out, krb5_ticket **ticket) argument
665 krb5_rd_req(krb5_context context, krb5_auth_context *auth_context, const krb5_data *inbuf, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument
710 krb5_rd_req_with_keyblock(krb5_context context, krb5_auth_context *auth_context, const krb5_data *inbuf, krb5_const_principal server, krb5_keyblock *keyblock, krb5_flags *ap_req_options, krb5_ticket **ticket) argument
[all...]
H A Dbuild_ap_req.c54 ret = decode_Ticket(cred->ticket.data, cred->ticket.length, &ap.ticket, &len);
H A Dtest_pknistkdf.c49 krb5_data ticket; member in struct:testcase
86 { /* ticket */
132 { /* ticket */
178 { /* ticket */
228 Ticket ticket; local
232 memset(&ticket, 0, sizeof(&ticket));
237 ret = decode_Ticket(c->ticket.data, c->ticket.length, &ticket,
[all...]
H A Dticket.c39 * Free ticket and content
42 * @param ticket ticket to free
52 krb5_ticket *ticket)
54 free_EncTicketPart(&ticket->ticket);
55 krb5_free_principal(context, ticket->client);
56 krb5_free_principal(context, ticket->server);
57 free(ticket);
62 * Copy ticket an
51 krb5_free_ticket(krb5_context context, krb5_ticket *ticket) argument
124 krb5_ticket_get_client(krb5_context context, const krb5_ticket *ticket, krb5_principal *client) argument
145 krb5_ticket_get_server(krb5_context context, const krb5_ticket *ticket, krb5_principal *server) argument
164 krb5_ticket_get_endtime(krb5_context context, const krb5_ticket *ticket) argument
181 krb5_ticket_get_flags(krb5_context context, const krb5_ticket *ticket) argument
372 krb5_ticket_get_authorization_data_type(krb5_context context, krb5_ticket *ticket, int type, krb5_data *data) argument
[all...]
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/libDER/Tests/
H A DparseTicket.c309 DERBbTicket ticket = {}; local
311 drtn = DERDecodeBbTicket(&derTicket, &ticket, &ticketSize);
315 // Verify signature if key file exists (we should really use the certificate or GPUK in the ticket here. */
319 (unsigned char *)ticket.body.data,
320 ticket.body.length,
321 (unsigned char *)ticket.signature.data );
329 /* Example of how to retrive fields from ticket. */
331 drtn = DERSetDecodeItemWithTag(&ticket.body,
335 drtn = DERSetDecodeItemWithTag(&ticket.body,
341 fprintf( stdout, "Bad ticket\
350 unsigned char *ticket = NULL; local
362 DERApTicket ticket = { }; local
447 DERBbTicket ticket = {}; local
[all...]
H A DDER_Ticket.h77 DERApTicket *ticket, /* RETURNED */
95 DERBbTicket *ticket, /* RETURNED */
H A DDER_Ticket.c149 DERApTicket *ticket, /* RETURNED */
157 DERNumApTicketItemSpecs, DERApTicketItemSpecs, ticket, 0);
162 drtn = DERParseSequenceContent(&ticket->signatureAlgorithm,
178 DERBbTicket *ticket, /* RETURNED */
186 DERNumBbTicketItemSpecs, DERBbTicketItemSpecs, ticket, 0);
191 drtn = DERParseSequenceContent(&ticket->signatureAlgorithm,
147 DERDecodeApTicket( const DERItem *contents, DERApTicket *ticket, DERSize *numUsedBytes) argument
176 DERDecodeBbTicket( const DERItem *contents, DERBbTicket *ticket, DERSize *numUsedBytes) argument
/macosx-10.10.1/remote_cmds-47/rlogin.tproj/
H A Dkrcmd.c101 KTEXT_ST ticket; local
112 &ticket,
144 KTEXT_ST ticket; local
157 &ticket,
/macosx-10.10.1/ICU-531.30/icuSources/tools/toolutil/
H A Dudbgutil.h114 * @param ticket ticket string such as "10245" or "cldrbug:5013"
118 U_CAPI char *udbg_knownIssueURLFrom(const char *ticket, char *buf);
125 U_CAPI void *udbg_knownIssue_openU(void *ptr, const char *ticket, char *where, const UChar *msg, UBool *firstForTicket,
134 U_CAPI void *udbg_knownIssue_open(void *ptr, const char *ticket, char *where, const char *msg, UBool *firstForTicket,
H A Dudbgutil.cpp585 #define ICU_TRAC_URL "http://bugs.icu-project.org/trac/ticket/"
586 #define CLDR_TRAC_URL "http://unicode.org/cldr/trac/ticket/"
589 U_CAPI char *udbg_knownIssueURLFrom(const char *ticket, char *buf) { argument
590 if( ticket==NULL ) {
594 if( !strncmp(ticket, CLDR_TICKET_PREFIX, strlen(CLDR_TICKET_PREFIX)) ) {
596 strcat( buf, ticket+strlen(CLDR_TICKET_PREFIX) );
599 strcat( buf, ticket );
608 U_CAPI void *udbg_knownIssue_openU(void *ptr, const char *ticket, char *where, const UChar *msg, UBool *firstForTicket, argument
613 printf("%s\tKnown Issue #%s\n", where, ticket);
618 U_CAPI void *udbg_knownIssue_open(void *ptr, const char *ticket, cha argument
666 add(const char *ticket, const char *where, const UChar *msg, UBool *firstForTicket, UBool *firstForWhere) argument
688 add(const char *ticket, const char *where, const char *msg, UBool *firstForTicket, UBool *firstForWhere) argument
738 udbg_knownIssue_openU(void *ptr, const char *ticket, char *where, const UChar *msg, UBool *firstForTicket, UBool *firstForWhere) argument
750 udbg_knownIssue_open(void *ptr, const char *ticket, char *where, const char *msg, UBool *firstForTicket, UBool *firstForWhere) argument
[all...]
/macosx-10.10.1/Heimdal-398.1.2/lib/kafs/
H A Dafskrb5.c52 kt->ticket = NULL;
66 ret = decode_Ticket(cred->ticket.data, cred->ticket.length, &t, &len);
82 kt->ticket = buf;
87 kt->ticket = malloc(cred->ticket.length);
88 if (kt->ticket == NULL)
90 kt->ticket_len = cred->ticket.length;
91 memcpy(kt->ticket, cred->ticket
[all...]
/macosx-10.10.1/Heimdal-398.1.2/appl/test/
H A Duu_client.c53 krb5_ticket *ticket; local
124 status = krb5_write_message(context, &sock, &cred.ticket);
133 VERSION, client, 0, NULL, &ticket);
138 if (ticket->ticket.authorization_data) {
144 authz = ticket->ticket.authorization_data;
H A Dtcp_server.c45 krb5_ticket *ticket; local
82 &ticket);
87 ticket->client,
/macosx-10.10.1/MITKerberosShim-66/mittestcc/
H A Dtest_ccapi_util.c74 v5creds->ticket.type = 0;
75 v5creds->ticket.length = 0;
76 v5creds->ticket.data = NULL;
113 if (v5creds->ticket.data) { free(v5creds->ticket.data); }
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/saslauthd/
H A Dauth_krb4.c92 * krb4 proxy authentication has a side effect of creating a ticket
94 * directory so as not to override a system ticket file that may be
186 KTEXT_ST ticket;
201 syslog(LOG_ERR, "auth_krb4: could not generate ticket file name");
255 /* if the TGT wasn't spoofed, it should entitle us to an rcmd ticket... */
256 rc = krb_mk_req(&ticket, verify_principal, myhostname, default_realm, 0);
265 /* .. and that ticket should match our secret host key */
266 rc = krb_rd_req(&ticket, verify_principal, myhostname, 0, &kdata, srvtabname);
184 KTEXT_ST ticket; local

Completed in 154 milliseconds

123456