HomeSort by: relevance | last modified time | path
    Searched defs:ticket (Results 1 - 25 of 49) sorted by relevancy

1 2

  /src/crypto/external/bsd/openssl/dist/util/perl/TLSProxy/
NewSessionTicket.pm 33 $self->{ticket} = "";
44 my $ticket = substr($self->data, 6, $ticket_len);
47 $self->ticket($ticket);
58 $data .= pack('n', length($self->ticket));
59 $data .= $self->ticket;
73 sub ticket subroutine
77 $self->{ticket} = shift;
79 return $self->{ticket};
  /src/crypto/external/bsd/openssl.old/dist/util/perl/TLSProxy/
NewSessionTicket.pm 33 $self->{ticket} = "";
44 my $ticket = substr($self->data, 6, $ticket_len);
47 $self->ticket($ticket);
58 $data .= pack('n', length($self->ticket));
59 $data .= $self->ticket;
73 sub ticket subroutine
77 $self->{ticket} = shift;
79 return $self->{ticket};
  /src/sys/external/bsd/drm2/include/linux/
smp.h 68 uint64_t ticket; local
70 ticket = xc_broadcast(0, &on_each_cpu_xc, &f, cookie);
72 xc_wait(ticket);
  /src/crypto/external/apache2/openssl/dist/util/perl/TLSProxy/
NewSessionTicket.pm 89 $self->{ticket} = "";
100 my $ticket = substr($self->data, 6, $ticket_len);
103 $self->ticket($ticket);
114 $data .= pack('n', length($self->ticket));
115 $data .= $self->ticket;
129 sub ticket subroutine
133 $self->{ticket} = shift;
135 return $self->{ticket};
  /src/sys/external/bsd/drm2/dist/drm/amd/amdgpu/
amdgpu_csa.c 74 struct ww_acquire_ctx ticket; local
88 r = ttm_eu_reserve_buffers(&ticket, &list, true, NULL);
96 ttm_eu_backoff_reservation(&ticket, &list);
108 ttm_eu_backoff_reservation(&ticket, &list);
112 ttm_eu_backoff_reservation(&ticket, &list);
  /src/crypto/external/bsd/openssh/dist/
auth-krb5.c 5 * Kerberos v5 authentication and ticket-passing routines.
76 * only, in auth is received ticket, in client is returned principal
77 * from the ticket
84 krb5_ticket *ticket; local
91 ticket = NULL;
115 auth, server, NULL, NULL, &ticket);
119 problem = krb5_copy_principal(authctxt->krb5_ctx, ticket->client,
143 if (ticket)
144 krb5_free_ticket(authctxt->krb5_ctx, ticket);
  /src/crypto/external/bsd/heimdal/dist/lib/kafs/
kafs_locl.h 137 void *ticket; member in struct:kafs_token
  /src/external/gpl2/xcvs/dist/src/
kerberos4-client.c 74 KTEXT_ST ticket; local
86 status = krb_sendauth (KOPT_DO_MUTUAL, s, &ticket, "rcmd",
  /src/crypto/external/bsd/heimdal/dist/lib/krb5/
test_ap-req.c 80 krb5_ticket *ticket = NULL; local
99 &ticket);
147 ticket,
160 krb5_free_ticket(context, ticket);
test_pknistkdf.c 51 krb5_data ticket; member in struct:testcase
88 { /* ticket */
134 { /* ticket */
180 { /* ticket */
202 Ticket t;
215 ASN1_MALLOC_ENCODE(Ticket, data.data, data.length, &t, &size, ret);
217 errx(1, "ASN1_MALLOC_ENCODE(Ticket)");
230 Ticket ticket; local
234 memset(&ticket, 0, sizeof(ticket))
    [all...]
get_for_creds.c 96 * @param forwardable make the forwarded ticket forwabledable.
165 * If the ticket have any address, hostname will be used for figure
166 * out the address to forward the ticket too. This since this might
171 * and thus the resulting ticket useless.
176 * @param flags the flags to control the resulting ticket flags
178 * @param in_creds the in client and server ticket names. The client
208 krb5_creds *ticket; local
214 ret = krb5_get_credentials(context, 0, ccache, in_creds, &ticket);
216 if (ticket->addresses.len)
218 krb5_free_creds (context, ticket);
    [all...]
  /src/sys/external/bsd/drm2/dist/drm/vmwgfx/
vmwgfx_validation.h 66 * @ticket: Ticked used for ww mutex locking
83 struct ww_acquire_ctx ticket; member in struct:vmw_validation_context
174 return ttm_eu_reserve_buffers(&ctx->ticket, &ctx->bo_list, intr,
190 ttm_eu_fence_buffer_objects(&ctx->ticket, &ctx->bo_list,
  /src/sys/external/bsd/drm2/linux/
linux_ww_mutex.c 74 const uint64_t *const ticketp = vk, ticket = *ticketp; local
76 if (ctx->wwx_ticket < ticket)
78 if (ctx->wwx_ticket > ticket)
371 "ticket number reused: %"PRId64" (%p) %"PRId64" (%p)",
377 "ticket number reused: %"PRId64" (%p) %"PRId64" (%p)",
425 "ticket number reused: %"PRId64" (%p) %"PRId64" (%p)",
431 "ticket number reused: %"PRId64" (%p) %"PRId64" (%p)",
  /src/sys/kern/
kern_heartbeat.c 298 const uint64_t ticket = local
300 xc_wait(ticket);
  /src/usr.bin/login/
k5login.c 114 * Verify the Kerberos ticket-granting ticket just retrieved for the
132 krb5_ticket *ticket = NULL; local
154 /* talk to the kdc and construct the ticket */
184 /* got ticket, try to use it */
186 princ, NULL, NULL, &ticket);
207 krb5_warn(kcontext, kerror, "Unable to verify host ticket");
208 k5_log(kcontext, kerror, "can't verify v5 ticket (%s)",
214 * The host/<host> ticket has been received _and_ verified.
223 /* possibly ticket and packet need freeing here as well *
    [all...]
  /src/crypto/external/bsd/heimdal/dist/kdc/
fast.c 355 krb5_ticket *ticket = NULL; local
427 ap_req.ticket.sname,
428 ap_req.ticket.realm);
448 ap_req.ticket.enc_part.etype,
461 &ticket,
477 &ticket->ticket.key,
481 krb5_free_ticket(r->context, ticket);
hpropd.c 129 krb5_ticket *ticket; local
177 0, keytab, &ticket);
181 ret = krb5_unparse_name(context, ticket->server, &server);
185 krb5_errx(context, 1, "ticket not for hprop (%s)", server);
188 krb5_free_ticket (context, ticket);
kx509.c 409 krb5_ticket *ticket = NULL; local
443 &ticket);
447 ret = krb5_ticket_get_client(context, ticket, &cprincipal);
454 if (!ticket->ticket.flags.initial &&
467 ret = krb5_ticket_get_server(context, ticket, &sprincipal);
513 krb5_ticket_get_endtime(context, ticket),
556 if (ticket)
557 krb5_free_ticket(context, ticket);
  /src/crypto/external/bsd/heimdal/dist/kuser/
kgetcred.c 62 NP_("where to find the ticket use for delegation", ""), "cache"},
68 NP_("forwardable ticket requested", ""), NULL},
83 NP_("request an anonymous ticket", ""), NULL },
190 Ticket ticket; local
205 ret = decode_Ticket(c.ticket.data, c.ticket.length, &ticket, NULL);
212 ret = krb5_get_creds_opt_set_ticket(context, opt, &ticket);
215 free_Ticket(&ticket);
    [all...]
kvno.c 52 NP_("Server to get ticket for", ""), "principal" },
109 Ticket ticket; local
148 memset(&ticket, 0, sizeof(ticket));
184 ret = decode_Ticket(out_creds->ticket.data, out_creds->ticket.length,
185 &ticket, &len);
187 krb5_err(context, 1, ret, "Can't decode ticket for %s", princ);
200 (ticket.enc_part.kvno != NULL)
    [all...]
kimpersonate.c 75 Ticket ticket; local
78 memset(&ticket, 0, sizeof(ticket));
105 * Encrypt `enc_part' of ticket with service key
121 &ticket.enc_part);
129 * Encode ticket
132 ticket.tkt_vno = 5;
133 ticket.realm = cred->server->realm;
134 ret = copy_PrincipalName(&cred->server->name, &ticket.sname)
    [all...]
  /src/lib/libtelnet/
kerberos5.c 93 static krb5_ticket *ticket; variable
316 server, NULL, NULL, &ticket);
401 if (krb5_unparse_name(telnet_context, ticket->client, &name))
405 ticket->client, UserNameRequested)) {
466 ticket->client);
601 krb5_kuserok(telnet_context, ticket->client, UserNameRequested)) {
  /src/sys/external/bsd/drm2/dist/drm/radeon/
radeon_gem.c 576 struct ww_acquire_ctx ticket; local
591 r = ttm_eu_reserve_buffers(&ticket, &list, true, NULL);
615 ttm_eu_backoff_reservation(&ticket, &list);
  /src/crypto/external/bsd/heimdal/dist/kadmin/
server.c 323 * initial ticket, but then, check with the password quality
446 * a) it's for the principal him/herself and this was an initial ticket
757 krb5_ticket *ticket; local
770 keytab, &ticket);
774 ret = krb5_unparse_name (contextp, ticket->server, &server_name);
780 krb5_errx (contextp, 1, "ticket for strange principal (%s)",
795 initial = ticket->ticket.flags.initial;
796 ret = krb5_unparse_name(contextp, ticket->client, &client);
799 krb5_free_ticket (contextp, ticket);
    [all...]
  /src/crypto/external/bsd/heimdal/dist/lib/gssapi/krb5/
gsskrb5_locl.h 85 struct krb5_ticket *ticket; member in struct:gsskrb5_ctx

Completed in 43 milliseconds

1 2