/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/netatalk-2.2.0/etc/uams/uams_krb4/ |
H A D | kuam.c | 84 KTEXT tkt = &tkt_st; /* Current ticket */ local 155 KTEXT tkt = &tkt_st; local 183 tkt->length = (unsigned char) ptr[2]; 187 memcpy( tkt->dat, ptr, tkt->length); 188 ptr += tkt->length; 212 lifetime, kvno, tkt, t_local.tv_sec))
|
H A D | uams_krb4.c | 131 KTEXT_ST tkt; local 149 tkt.length = ntohs( len ); 152 if ( tkt.length <= 0 || tkt.length > MAX_KTXT_LEN ) { 154 LOG(log_info, logtype_default, "krb4_login: tkt.length = %d", tkt.length ); 158 memcpy( tkt.dat, p, tkt.length ); 159 p += tkt.length; 172 if( (rc = krb_rd_req( &tkt, prin 260 KTEXT_ST tkt; local [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/libsmb/ |
H A D | clikrb5.c | 184 void get_auth_data_from_tkt(DATA_BLOB *auth_data, krb5_ticket *tkt) argument 187 if (tkt->enc_part2 && tkt->enc_part2->authorization_data && tkt->enc_part2->authorization_data[0] && tkt->enc_part2->authorization_data[0]->length) 188 *auth_data = data_blob(tkt->enc_part2->authorization_data[0]->contents, 189 tkt->enc_part2->authorization_data[0]->length); 191 if (tkt->ticket.authorization_data && tkt->ticket.authorization_data->len) 192 *auth_data = data_blob(tkt 197 get_principal_from_tkt(krb5_ticket *tkt) argument [all...] |
H A D | clispnego.c | 331 DATA_BLOB tkt, tkt_wrapped; local 335 retval = cli_krb5_get_ticket(principal, time_offset, &tkt, session_key_krb5); 341 tkt_wrapped = spnego_gen_krb5_wrap(tkt, TOK_ID_KRB_AP_REQ); 347 data_blob_free(&tkt);
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/libads/ |
H A D | kerberos_verify.c | 260 krb5_ticket *tkt = NULL; local 335 auth_ok = ads_keytab_verify_ticket(context, auth_context, ticket, &packet, &tkt); 339 ticket, &packet, &tkt); 369 get_auth_data_from_tkt(auth_data, tkt); 378 if (tkt->enc_part2) { 380 tkt->enc_part2->authorization_data[0]->contents, 381 tkt->enc_part2->authorization_data[0]->length); 385 if ((ret = krb5_unparse_name(context, get_principal_from_tkt(tkt), 413 if (tkt != NULL) { 414 krb5_free_ticket(context, tkt); [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/curl-7.23.1/lib/ |
H A D | krb4.c | 337 KTEXT_ST tkt, tktcopy; local 377 if(tmp >= sizeof(tkt.dat)) { 387 memcpy((char *)tkt.dat, ptr, tmp); 389 tkt.length = tmp; 390 tktcopy.length = tkt.length; 405 des_pcbc_encrypt((void *)tkt.dat, (void *)tktcopy.dat, 406 tkt.length, 414 des_pcbc_encrypt((void *)tkt.dat, (void *)tktcopy.dat, 415 tkt.length,
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/netatalk-2.2.0/etc/papd/ |
H A D | queries.c | 126 KTEXT_ST tkt; local 146 bzero( &tkt, sizeof( tkt )); 149 for ( i = 0, t = tkt.dat; p < stop; p += 2, t++, i++ ) { 153 tkt.length = i; 155 if (( rc = krb_rd_req( &tkt, "LaserWriter", printer->p_name,
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/utils/ |
H A D | ntlm_auth.c | 1143 DATA_BLOB tkt, to_server; local 1169 retval = cli_krb5_get_ticket(principal, 0, &tkt, &session_key_krb5); 1192 retval = cli_krb5_get_ticket(principal, 0, &tkt, &session_key_krb5); 1207 reply.negTokenInit.mechToken = tkt; 1211 data_blob_free(&tkt);
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/include/ |
H A D | includes.h | 1333 void get_auth_data_from_tkt(DATA_BLOB *auth_data, krb5_ticket *tkt); 1334 krb5_const_principal get_principal_from_tkt(krb5_ticket *tkt);
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/ |
H A D | configure | 32875 krb5_ticket tkt; tkt.enc_part2->authorization_data[0]->contents = NULL; [all...] |