/macosx-10.10.1/MITKerberosShim-66/test/ |
H A D | test-authen::krb5.pl | 9 my $ticket = shift; 22 # when decoding the ticket, the 3rd parameter is the expected server's name for the ticket. 26 $ticket = Authen::Krb5::rd_req( $ac, $ticket, undef, $kt ); 28 if ( !defined($ticket) ) { 29 die( "Unable to read kerberos ticket request: ", Authen::Krb5::error() ); 32 my $serverPrincipal = $ticket->server(); 33 my $clientPrincipal = $ticket->enc_part2()->client(); 66 my $ticket [all...] |
/macosx-10.10.1/Heimdal-398.1.2/lib/gssapi/krb5/ |
H A D | ticket_flags.c | 47 if (ctx->ticket == NULL) { 53 *tkt_flags = TicketFlags2int(ctx->ticket->ticket.flags);
|
/macosx-10.10.1/MITKerberosShim-66/ |
H A D | rd_req.c | 60 if (h->ticket.flags.forwardable) 62 if (h->ticket.flags.forwarded) 64 if (h->ticket.flags.proxiable) 66 if (h->ticket.flags.proxy) 68 if (h->ticket.flags.may_postdate) 70 if (h->ticket.flags.postdated) 72 if (h->ticket.flags.invalid) 74 if (h->ticket.flags.renewable) 76 if (h->ticket.flags.initial) 78 if (h->ticket 111 krb5_rd_req(mit_krb5_context context, mit_krb5_auth_context *ac, const mit_krb5_data *inbuf, mit_krb5_const_principal server, mit_krb5_keytab keytab, mit_krb5_flags *ap_req_options, mit_krb5_ticket **ticket) argument 150 krb5_recvauth(mit_krb5_context context, mit_krb5_auth_context *ac, mit_krb5_pointer fd, char *appl_version, mit_krb5_principal server, mit_krb5_int32 flags, mit_krb5_keytab keytab, mit_krb5_ticket **ticket) argument 176 mshim_hticket2mticket(HC(context), hticket, *ticket); local 195 krb5_recvauth_version(mit_krb5_context context, mit_krb5_auth_context *ac, mit_krb5_pointer fd, mit_krb5_principal server, mit_krb5_int32 flags, mit_krb5_keytab keytab, mit_krb5_ticket **ticket, mit_krb5_data *version) argument 222 mshim_hticket2mticket(HC(context), hticket, *ticket); local [all...] |
H A D | creds.c | 117 c->ticket.magic = MIT_KV5M_DATA; 118 c->ticket.length = from->ticket.length; 119 c->ticket.data = mshim_malloc(from->ticket.length); 120 memcpy(c->ticket.data, from->ticket.data, c->ticket.length);
|
/macosx-10.10.1/mDNSResponder-561.1.1/mDNSMacOSX/ |
H A D | P2PPacketFilter.c | 76 *outTicket = trans_e.ticket; 82 static int commitChange( int devFD, u_int32_t ticket, char * anchorPath ) argument 88 trans_e.ticket = ticket; 121 *outPoolTicket = pp.ticket; 141 u_int32_t ticket, 146 pr->ticket = ticket; 154 u_int32_t ticket, 161 initRuleHeader( pr, ticket, poolTicke 140 initRuleHeader( struct pfioc_rule * pr, u_int32_t ticket, u_int32_t poolTicket, char * anchorPath ) argument 152 initBonjourRule( struct pfioc_rule * pr, const char * interfaceName, u_int32_t ticket, u_int32_t poolTicket, char * anchorPath ) argument 178 initOutboundTCPRule( struct pfioc_rule * pr, const char * interfaceName, u_int32_t ticket, u_int32_t poolTicket, char * anchorPath ) argument 199 initPortRule( struct pfioc_rule * pr, const char * interfaceName, u_int32_t ticket, u_int32_t poolTicket, char * anchorPath, u_int16_t port, u_int16_t protocol ) argument 231 u_int32_t i, ticket, poolTicket; local 280 u_int32_t ticket; local [all...] |
/macosx-10.10.1/libtelnet-13/ |
H A D | forward.c | 36 rd_and_store_for_creds(context, auth_context, inbuf, ticket) 40 krb5_ticket *ticket; 59 if ((retval = krb5_cc_initialize(context, ccache, ticket->enc_part2->client)))
|
/macosx-10.10.1/Heimdal-398.1.2/kuser/ |
H A D | kvno.c | 50 NP_("Server to get ticket for", ""), "principal" }, 107 Ticket ticket; local 146 memset(&ticket, 0, sizeof(ticket)); 182 ret = decode_Ticket(out_creds->ticket.data, out_creds->ticket.length, 183 &ticket, &len); 185 krb5_err(context, 1, ret, "Can't decode ticket for %s", princ); 198 (ticket.enc_part.kvno != NULL)? 199 *ticket [all...] |
H A D | kdecode_ticket.c | 42 krb5_data *ticket, 54 ret = decode_Ticket (ticket->data, ticket->length, &tkt, &len); 156 print_and_decode_tkt (context, &out->ticket, out->server, 41 print_and_decode_tkt(krb5_context context, krb5_data *ticket, krb5_principal server, krb5_enctype enctype) argument
|
H A D | kimpersonate.c | 73 Ticket ticket; local 76 memset (&ticket, 0, sizeof(ticket)); 101 * Encrypt `enc_part' of ticket with service key 117 &ticket.enc_part); 125 * Encode ticket 128 ticket.tkt_vno = 5; 129 ticket.realm = cred->server->realm; 130 copy_PrincipalName(&cred->server->name, &ticket.sname); 132 ASN1_MALLOC_ENCODE(Ticket, buf, len, &ticket, [all...] |
/macosx-10.10.1/Heimdal-398.1.2/lib/krb5/ |
H A D | recvauth.c | 54 krb5_ticket **ticket) 59 keytab, ticket); 72 krb5_ticket **ticket) 179 ticket); 205 krb5_free_ticket(context, *ticket); 206 *ticket = NULL; 213 krb5_free_ticket(context, *ticket); 214 *ticket = NULL; 221 krb5_free_ticket(context, *ticket); 222 *ticket 47 krb5_recvauth(krb5_context context, krb5_auth_context *auth_context, krb5_pointer p_fd, const char *appl_version, krb5_principal server, int32_t flags, krb5_keytab keytab, krb5_ticket **ticket) argument 63 krb5_recvauth_match_version(krb5_context context, krb5_auth_context *auth_context, krb5_pointer p_fd, krb5_boolean (*match_appl_version)(const void *, const char*), const void *match_data, krb5_principal server, int32_t flags, krb5_keytab keytab, krb5_ticket **ticket) argument [all...] |
H A D | rd_req.c | 63 "ticket part", "")); 125 if (ap_req->ticket.tkt_vno != 5){ 134 check_transited(krb5_context context, Ticket *ticket, EncTicketPart *enc) argument 157 ticket->realm); 161 ticket->realm, 191 Ticket *ticket, 198 ret = decrypt_tkt_enc_part(context, key, &ticket->enc_part, &t); 223 ret = check_transited(context, ticket, &t); 288 krb5_ticket **ticket) 297 ticket, 190 krb5_decrypt_ticket(krb5_context context, Ticket *ticket, krb5_keyblock *key, EncTicketPart *out, krb5_flags flags) argument 281 krb5_verify_ap_req(krb5_context context, krb5_auth_context *auth_context, krb5_ap_req *ap_req, krb5_const_principal server, krb5_keyblock *keyblock, krb5_flags flags, krb5_flags *ap_req_options, krb5_ticket **ticket) argument 302 krb5_verify_ap_req2(krb5_context context, krb5_auth_context *auth_context, krb5_ap_req *ap_req, krb5_const_principal server, krb5_keyblock *keyblock, krb5_flags flags, krb5_flags *ap_req_options, krb5_ticket **ticket, krb5_key_usage usage) argument 497 krb5_ticket *ticket; member in struct:krb5_rd_req_out_ctx_data 591 krb5_rd_req_out_get_ticket(krb5_context context, krb5_rd_req_out_ctx out, krb5_ticket **ticket) argument 665 krb5_rd_req(krb5_context context, krb5_auth_context *auth_context, const krb5_data *inbuf, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument 710 krb5_rd_req_with_keyblock(krb5_context context, krb5_auth_context *auth_context, const krb5_data *inbuf, krb5_const_principal server, krb5_keyblock *keyblock, krb5_flags *ap_req_options, krb5_ticket **ticket) argument [all...] |
H A D | build_ap_req.c | 54 ret = decode_Ticket(cred->ticket.data, cred->ticket.length, &ap.ticket, &len);
|
H A D | test_pknistkdf.c | 49 krb5_data ticket; member in struct:testcase 86 { /* ticket */ 132 { /* ticket */ 178 { /* ticket */ 228 Ticket ticket; local 232 memset(&ticket, 0, sizeof(&ticket)); 237 ret = decode_Ticket(c->ticket.data, c->ticket.length, &ticket, [all...] |
H A D | ticket.c | 39 * Free ticket and content 42 * @param ticket ticket to free 52 krb5_ticket *ticket) 54 free_EncTicketPart(&ticket->ticket); 55 krb5_free_principal(context, ticket->client); 56 krb5_free_principal(context, ticket->server); 57 free(ticket); 62 * Copy ticket an 51 krb5_free_ticket(krb5_context context, krb5_ticket *ticket) argument 124 krb5_ticket_get_client(krb5_context context, const krb5_ticket *ticket, krb5_principal *client) argument 145 krb5_ticket_get_server(krb5_context context, const krb5_ticket *ticket, krb5_principal *server) argument 164 krb5_ticket_get_endtime(krb5_context context, const krb5_ticket *ticket) argument 181 krb5_ticket_get_flags(krb5_context context, const krb5_ticket *ticket) argument 372 krb5_ticket_get_authorization_data_type(krb5_context context, krb5_ticket *ticket, int type, krb5_data *data) argument [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/libDER/Tests/ |
H A D | parseTicket.c | 309 DERBbTicket ticket = {}; local 311 drtn = DERDecodeBbTicket(&derTicket, &ticket, &ticketSize); 315 // Verify signature if key file exists (we should really use the certificate or GPUK in the ticket here. */ 319 (unsigned char *)ticket.body.data, 320 ticket.body.length, 321 (unsigned char *)ticket.signature.data ); 329 /* Example of how to retrive fields from ticket. */ 331 drtn = DERSetDecodeItemWithTag(&ticket.body, 335 drtn = DERSetDecodeItemWithTag(&ticket.body, 341 fprintf( stdout, "Bad ticket\ 350 unsigned char *ticket = NULL; local 362 DERApTicket ticket = { }; local 447 DERBbTicket ticket = {}; local [all...] |
H A D | DER_Ticket.h | 77 DERApTicket *ticket, /* RETURNED */ 95 DERBbTicket *ticket, /* RETURNED */
|
H A D | DER_Ticket.c | 149 DERApTicket *ticket, /* RETURNED */ 157 DERNumApTicketItemSpecs, DERApTicketItemSpecs, ticket, 0); 162 drtn = DERParseSequenceContent(&ticket->signatureAlgorithm, 178 DERBbTicket *ticket, /* RETURNED */ 186 DERNumBbTicketItemSpecs, DERBbTicketItemSpecs, ticket, 0); 191 drtn = DERParseSequenceContent(&ticket->signatureAlgorithm, 147 DERDecodeApTicket( const DERItem *contents, DERApTicket *ticket, DERSize *numUsedBytes) argument 176 DERDecodeBbTicket( const DERItem *contents, DERBbTicket *ticket, DERSize *numUsedBytes) argument
|
/macosx-10.10.1/remote_cmds-47/rlogin.tproj/ |
H A D | krcmd.c | 101 KTEXT_ST ticket; local 112 &ticket, 144 KTEXT_ST ticket; local 157 &ticket,
|
/macosx-10.10.1/ICU-531.30/icuSources/tools/toolutil/ |
H A D | udbgutil.h | 114 * @param ticket ticket string such as "10245" or "cldrbug:5013" 118 U_CAPI char *udbg_knownIssueURLFrom(const char *ticket, char *buf); 125 U_CAPI void *udbg_knownIssue_openU(void *ptr, const char *ticket, char *where, const UChar *msg, UBool *firstForTicket, 134 U_CAPI void *udbg_knownIssue_open(void *ptr, const char *ticket, char *where, const char *msg, UBool *firstForTicket,
|
H A D | udbgutil.cpp | 585 #define ICU_TRAC_URL "http://bugs.icu-project.org/trac/ticket/" 586 #define CLDR_TRAC_URL "http://unicode.org/cldr/trac/ticket/" 589 U_CAPI char *udbg_knownIssueURLFrom(const char *ticket, char *buf) { argument 590 if( ticket==NULL ) { 594 if( !strncmp(ticket, CLDR_TICKET_PREFIX, strlen(CLDR_TICKET_PREFIX)) ) { 596 strcat( buf, ticket+strlen(CLDR_TICKET_PREFIX) ); 599 strcat( buf, ticket ); 608 U_CAPI void *udbg_knownIssue_openU(void *ptr, const char *ticket, char *where, const UChar *msg, UBool *firstForTicket, argument 613 printf("%s\tKnown Issue #%s\n", where, ticket); 618 U_CAPI void *udbg_knownIssue_open(void *ptr, const char *ticket, cha argument 666 add(const char *ticket, const char *where, const UChar *msg, UBool *firstForTicket, UBool *firstForWhere) argument 688 add(const char *ticket, const char *where, const char *msg, UBool *firstForTicket, UBool *firstForWhere) argument 738 udbg_knownIssue_openU(void *ptr, const char *ticket, char *where, const UChar *msg, UBool *firstForTicket, UBool *firstForWhere) argument 750 udbg_knownIssue_open(void *ptr, const char *ticket, char *where, const char *msg, UBool *firstForTicket, UBool *firstForWhere) argument [all...] |
/macosx-10.10.1/Heimdal-398.1.2/lib/kafs/ |
H A D | afskrb5.c | 52 kt->ticket = NULL; 66 ret = decode_Ticket(cred->ticket.data, cred->ticket.length, &t, &len); 82 kt->ticket = buf; 87 kt->ticket = malloc(cred->ticket.length); 88 if (kt->ticket == NULL) 90 kt->ticket_len = cred->ticket.length; 91 memcpy(kt->ticket, cred->ticket [all...] |
/macosx-10.10.1/Heimdal-398.1.2/appl/test/ |
H A D | uu_client.c | 53 krb5_ticket *ticket; local 124 status = krb5_write_message(context, &sock, &cred.ticket); 133 VERSION, client, 0, NULL, &ticket); 138 if (ticket->ticket.authorization_data) { 144 authz = ticket->ticket.authorization_data;
|
H A D | tcp_server.c | 45 krb5_ticket *ticket; local 82 &ticket); 87 ticket->client,
|
/macosx-10.10.1/MITKerberosShim-66/mittestcc/ |
H A D | test_ccapi_util.c | 74 v5creds->ticket.type = 0; 75 v5creds->ticket.length = 0; 76 v5creds->ticket.data = NULL; 113 if (v5creds->ticket.data) { free(v5creds->ticket.data); }
|
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/saslauthd/ |
H A D | auth_krb4.c | 92 * krb4 proxy authentication has a side effect of creating a ticket 94 * directory so as not to override a system ticket file that may be 186 KTEXT_ST ticket; 201 syslog(LOG_ERR, "auth_krb4: could not generate ticket file name"); 255 /* if the TGT wasn't spoofed, it should entitle us to an rcmd ticket... */ 256 rc = krb_mk_req(&ticket, verify_principal, myhostname, default_realm, 0); 265 /* .. and that ticket should match our secret host key */ 266 rc = krb_rd_req(&ticket, verify_principal, myhostname, 0, &kdata, srvtabname); 184 KTEXT_ST ticket; local
|