| /src/crypto/external/bsd/openssl/dist/util/perl/TLSProxy/ |
| NewSessionTicket.pm | 33 $self->{ticket} = ""; 44 my $ticket = substr($self->data, 6, $ticket_len); 47 $self->ticket($ticket); 58 $data .= pack('n', length($self->ticket)); 59 $data .= $self->ticket; 73 sub ticket subroutine 77 $self->{ticket} = shift; 79 return $self->{ticket};
|
| /src/crypto/external/bsd/openssl.old/dist/util/perl/TLSProxy/ |
| NewSessionTicket.pm | 33 $self->{ticket} = ""; 44 my $ticket = substr($self->data, 6, $ticket_len); 47 $self->ticket($ticket); 58 $data .= pack('n', length($self->ticket)); 59 $data .= $self->ticket; 73 sub ticket subroutine 77 $self->{ticket} = shift; 79 return $self->{ticket};
|
| /src/sys/external/bsd/drm2/include/linux/ |
| smp.h | 68 uint64_t ticket; local 70 ticket = xc_broadcast(0, &on_each_cpu_xc, &f, cookie); 72 xc_wait(ticket);
|
| /src/crypto/external/apache2/openssl/dist/util/perl/TLSProxy/ |
| NewSessionTicket.pm | 89 $self->{ticket} = ""; 100 my $ticket = substr($self->data, 6, $ticket_len); 103 $self->ticket($ticket); 114 $data .= pack('n', length($self->ticket)); 115 $data .= $self->ticket; 129 sub ticket subroutine 133 $self->{ticket} = shift; 135 return $self->{ticket};
|
| /src/sys/external/bsd/drm2/dist/drm/amd/amdgpu/ |
| amdgpu_csa.c | 74 struct ww_acquire_ctx ticket; local 88 r = ttm_eu_reserve_buffers(&ticket, &list, true, NULL); 96 ttm_eu_backoff_reservation(&ticket, &list); 108 ttm_eu_backoff_reservation(&ticket, &list); 112 ttm_eu_backoff_reservation(&ticket, &list);
|
| /src/crypto/external/bsd/openssh/dist/ |
| auth-krb5.c | 5 * Kerberos v5 authentication and ticket-passing routines. 76 * only, in auth is received ticket, in client is returned principal 77 * from the ticket 84 krb5_ticket *ticket; local 91 ticket = NULL; 115 auth, server, NULL, NULL, &ticket); 119 problem = krb5_copy_principal(authctxt->krb5_ctx, ticket->client, 143 if (ticket) 144 krb5_free_ticket(authctxt->krb5_ctx, ticket);
|
| /src/crypto/external/bsd/heimdal/dist/lib/kafs/ |
| kafs_locl.h | 137 void *ticket; member in struct:kafs_token
|
| /src/external/gpl2/xcvs/dist/src/ |
| kerberos4-client.c | 74 KTEXT_ST ticket; local 86 status = krb_sendauth (KOPT_DO_MUTUAL, s, &ticket, "rcmd",
|
| /src/crypto/external/bsd/heimdal/dist/lib/krb5/ |
| test_ap-req.c | 80 krb5_ticket *ticket = NULL; local 99 &ticket); 147 ticket, 160 krb5_free_ticket(context, ticket);
|
| test_pknistkdf.c | 51 krb5_data ticket; member in struct:testcase 88 { /* ticket */ 134 { /* ticket */ 180 { /* ticket */ 202 Ticket t; 215 ASN1_MALLOC_ENCODE(Ticket, data.data, data.length, &t, &size, ret); 217 errx(1, "ASN1_MALLOC_ENCODE(Ticket)"); 230 Ticket ticket; local 234 memset(&ticket, 0, sizeof(ticket)) [all...] |
| get_for_creds.c | 96 * @param forwardable make the forwarded ticket forwabledable. 165 * If the ticket have any address, hostname will be used for figure 166 * out the address to forward the ticket too. This since this might 171 * and thus the resulting ticket useless. 176 * @param flags the flags to control the resulting ticket flags 178 * @param in_creds the in client and server ticket names. The client 208 krb5_creds *ticket; local 214 ret = krb5_get_credentials(context, 0, ccache, in_creds, &ticket); 216 if (ticket->addresses.len) 218 krb5_free_creds (context, ticket); [all...] |
| /src/sys/external/bsd/drm2/dist/drm/vmwgfx/ |
| vmwgfx_validation.h | 66 * @ticket: Ticked used for ww mutex locking 83 struct ww_acquire_ctx ticket; member in struct:vmw_validation_context 174 return ttm_eu_reserve_buffers(&ctx->ticket, &ctx->bo_list, intr, 190 ttm_eu_fence_buffer_objects(&ctx->ticket, &ctx->bo_list,
|
| /src/sys/external/bsd/drm2/linux/ |
| linux_ww_mutex.c | 74 const uint64_t *const ticketp = vk, ticket = *ticketp; local 76 if (ctx->wwx_ticket < ticket) 78 if (ctx->wwx_ticket > ticket) 371 "ticket number reused: %"PRId64" (%p) %"PRId64" (%p)", 377 "ticket number reused: %"PRId64" (%p) %"PRId64" (%p)", 425 "ticket number reused: %"PRId64" (%p) %"PRId64" (%p)", 431 "ticket number reused: %"PRId64" (%p) %"PRId64" (%p)",
|
| /src/sys/kern/ |
| kern_heartbeat.c | 298 const uint64_t ticket = local 300 xc_wait(ticket);
|
| /src/usr.bin/login/ |
| k5login.c | 114 * Verify the Kerberos ticket-granting ticket just retrieved for the 132 krb5_ticket *ticket = NULL; local 154 /* talk to the kdc and construct the ticket */ 184 /* got ticket, try to use it */ 186 princ, NULL, NULL, &ticket); 207 krb5_warn(kcontext, kerror, "Unable to verify host ticket"); 208 k5_log(kcontext, kerror, "can't verify v5 ticket (%s)", 214 * The host/<host> ticket has been received _and_ verified. 223 /* possibly ticket and packet need freeing here as well * [all...] |
| /src/crypto/external/bsd/heimdal/dist/kdc/ |
| fast.c | 355 krb5_ticket *ticket = NULL; local 427 ap_req.ticket.sname, 428 ap_req.ticket.realm); 448 ap_req.ticket.enc_part.etype, 461 &ticket, 477 &ticket->ticket.key, 481 krb5_free_ticket(r->context, ticket);
|
| hpropd.c | 129 krb5_ticket *ticket; local 177 0, keytab, &ticket); 181 ret = krb5_unparse_name(context, ticket->server, &server); 185 krb5_errx(context, 1, "ticket not for hprop (%s)", server); 188 krb5_free_ticket (context, ticket);
|
| kx509.c | 409 krb5_ticket *ticket = NULL; local 443 &ticket); 447 ret = krb5_ticket_get_client(context, ticket, &cprincipal); 454 if (!ticket->ticket.flags.initial && 467 ret = krb5_ticket_get_server(context, ticket, &sprincipal); 513 krb5_ticket_get_endtime(context, ticket), 556 if (ticket) 557 krb5_free_ticket(context, ticket);
|
| /src/crypto/external/bsd/heimdal/dist/kuser/ |
| kgetcred.c | 62 NP_("where to find the ticket use for delegation", ""), "cache"}, 68 NP_("forwardable ticket requested", ""), NULL}, 83 NP_("request an anonymous ticket", ""), NULL }, 190 Ticket ticket; local 205 ret = decode_Ticket(c.ticket.data, c.ticket.length, &ticket, NULL); 212 ret = krb5_get_creds_opt_set_ticket(context, opt, &ticket); 215 free_Ticket(&ticket); [all...] |
| kvno.c | 52 NP_("Server to get ticket for", ""), "principal" }, 109 Ticket ticket; local 148 memset(&ticket, 0, sizeof(ticket)); 184 ret = decode_Ticket(out_creds->ticket.data, out_creds->ticket.length, 185 &ticket, &len); 187 krb5_err(context, 1, ret, "Can't decode ticket for %s", princ); 200 (ticket.enc_part.kvno != NULL) [all...] |
| kimpersonate.c | 75 Ticket ticket; local 78 memset(&ticket, 0, sizeof(ticket)); 105 * Encrypt `enc_part' of ticket with service key 121 &ticket.enc_part); 129 * Encode ticket 132 ticket.tkt_vno = 5; 133 ticket.realm = cred->server->realm; 134 ret = copy_PrincipalName(&cred->server->name, &ticket.sname) [all...] |
| /src/lib/libtelnet/ |
| kerberos5.c | 93 static krb5_ticket *ticket; variable 316 server, NULL, NULL, &ticket); 401 if (krb5_unparse_name(telnet_context, ticket->client, &name)) 405 ticket->client, UserNameRequested)) { 466 ticket->client); 601 krb5_kuserok(telnet_context, ticket->client, UserNameRequested)) {
|
| /src/sys/external/bsd/drm2/dist/drm/radeon/ |
| radeon_gem.c | 576 struct ww_acquire_ctx ticket; local 591 r = ttm_eu_reserve_buffers(&ticket, &list, true, NULL); 615 ttm_eu_backoff_reservation(&ticket, &list);
|
| /src/crypto/external/bsd/heimdal/dist/kadmin/ |
| server.c | 323 * initial ticket, but then, check with the password quality 446 * a) it's for the principal him/herself and this was an initial ticket 757 krb5_ticket *ticket; local 770 keytab, &ticket); 774 ret = krb5_unparse_name (contextp, ticket->server, &server_name); 780 krb5_errx (contextp, 1, "ticket for strange principal (%s)", 795 initial = ticket->ticket.flags.initial; 796 ret = krb5_unparse_name(contextp, ticket->client, &client); 799 krb5_free_ticket (contextp, ticket); [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/gssapi/krb5/ |
| gsskrb5_locl.h | 85 struct krb5_ticket *ticket; member in struct:gsskrb5_ctx
|