| /src/crypto/external/bsd/heimdal/dist/lib/krb5/ |
| build_ap_req.c | 48 Ticket t; 57 ap.ticket.tkt_vno = 5; 58 copy_Realm(&cred->server->realm, &ap.ticket.realm); 59 copy_PrincipalName(&cred->server->name, &ap.ticket.sname); 61 decode_Ticket(cred->ticket.data, cred->ticket.length, &t, &len); 62 copy_EncryptedData(&t.enc_part, &ap.ticket.enc_part);
|
| test_set_kvno0.c | 58 Ticket t; 81 "\tThis utility edits a ccache, setting all ticket\n" 100 "\tThis utility edits a ccache, setting all ticket\n" 123 ret = decode_Ticket(cred.ticket.data, cred.ticket.length, &t, &len); 134 * The new Ticket has to need less or same space as before, so 138 ASN1_MALLOC_ENCODE(Ticket, data.data, data.length, &t, &len, ret); 143 krb5_data_free(&cred.ticket); 144 cred.ticket = data;
|
| test_pknistkdf.c | 51 krb5_data ticket; member in struct:testcase 88 { /* ticket */ 134 { /* ticket */ 180 { /* ticket */ 202 Ticket t; 215 ASN1_MALLOC_ENCODE(Ticket, data.data, data.length, &t, &size, ret); 217 errx(1, "ASN1_MALLOC_ENCODE(Ticket)"); 230 Ticket ticket; local 234 memset(&ticket, 0, sizeof(ticket)) [all...] |
| crypto-pk.c | 138 const Ticket *ticket, 154 pubinfo.ticket = *ticket; 206 const Ticket *ticket, 254 enctype, as_req, pk_as_rep, ticket, &other);
|
| get_cred.c | 44 Ticket *, krb5_creds **, krb5_creds ***); 145 Ticket *second_ticket, 406 N_("Failed to decode encpart in ticket", "")); 419 Ticket *second_ticket, 431 Ticket second_ticket_data; 617 Ticket *second_ticket, 654 Ticket *second_ticket, 756 Ticket *second_ticket, 918 Ticket *second_ticket, 948 * Get a service ticket from a KDC by chasing referrals from a start realm 966 krb5_creds tgt, referral, ticket; local 1390 Ticket *ticket; member in struct:krb5_get_creds_opt_data [all...] |
| krb5-private.h | 357 Ticket */*second_ticket*/, 567 const Ticket */*ticket*/,
|
| rd_cred.c | 268 ASN1_MALLOC_ENCODE(Ticket, creds->ticket.data, creds->ticket.length, 274 if(creds->ticket.length != len)
|
| rd_req.c | 66 "ticket part", "")); 128 if (ap_req->ticket.tkt_vno != 5){ 137 check_transited(krb5_context context, Ticket *ticket, EncTicketPart *enc) 160 ticket->realm); 164 ticket->realm, 194 Ticket *ticket, 201 ret = decrypt_tkt_enc_part (context, key, &ticket->enc_part, &t); 226 ret = check_transited(context, ticket, &t) 491 krb5_ticket *ticket; member in struct:krb5_rd_req_out_ctx_data [all...] |
| krb5-protos.h | 78 * @param ccache credential cache used to check for des-ticket. 1227 * Get the lifetime of the initial ticket in the cache 1229 * Get the lifetime of the initial ticket in the cache, if the initial 1230 * ticket was not found, the error code KRB5_CC_END is returned. 1234 * @param t the relative lifetime of the initial ticket 1825 * - KRB5_TC_MATCH_FLAGS_EXACT Make sure that the ticket flags are identical. 1826 * - KRB5_TC_MATCH_FLAGS Make sure that all ticket flags set in mcreds are also present in creds . 1827 * - KRB5_TC_MATCH_TIMES_EXACT Compares the ticket times exactly. 1831 * - KRB5_TC_MATCH_IS_SKEY Compares the existance of the second ticket. 2473 * Copy ticket and conten [all...] |
| ticket.c | 1 /* $NetBSD: ticket.c,v 1.6 2023/06/19 21:41:45 christos Exp $ */ 41 * Free ticket and content 44 * @param ticket ticket to free 54 krb5_ticket *ticket) 56 free_EncTicketPart(&ticket->ticket); 57 krb5_free_principal(context, ticket->client); 58 krb5_free_principal(context, ticket->server); 59 free(ticket); [all...] |
| digest.c | 748 Ticket **tickets)
|
| scache.c | 726 Ticket t; 729 ret = decode_Ticket(creds->ticket.data, 730 creds->ticket.length, &t, &len);
|
| init_creds_pw.c | 1390 * @param start_time the time the ticket should start to be valid or 0 for now. 2229 ASN1_MALLOC_ENCODE(Ticket, data.data, data.length, 2230 &rep.kdc_rep.ticket, &size, ret); 2242 * Now check and extract the ticket 2262 _krb5_debug(context, 5, "krb5_get_init_creds: extracting ticket");
|
| /src/crypto/external/bsd/heimdal/dist/kuser/ |
| kdecode_ticket.c | 44 krb5_data *ticket, 54 Ticket tkt; 56 ret = decode_Ticket (ticket->data, ticket->length, &tkt, &len); 158 print_and_decode_tkt (context, &out->ticket, out->server,
|
| kimpersonate.c | 75 Ticket ticket; local 78 memset(&ticket, 0, sizeof(ticket)); 105 * Encrypt `enc_part' of ticket with service key 121 &ticket.enc_part); 129 * Encode ticket 132 ticket.tkt_vno = 5; 133 ticket.realm = cred->server->realm; 134 ret = copy_PrincipalName(&cred->server->name, &ticket.sname) [all...] |
| kvno.c | 52 NP_("Server to get ticket for", ""), "principal" }, 109 Ticket ticket; local 148 memset(&ticket, 0, sizeof(ticket)); 184 ret = decode_Ticket(out_creds->ticket.data, out_creds->ticket.length, 185 &ticket, &len); 187 krb5_err(context, 1, ret, "Can't decode ticket for %s", princ); 200 (ticket.enc_part.kvno != NULL) [all...] |
| kgetcred.c | 62 NP_("where to find the ticket use for delegation", ""), "cache"}, 68 NP_("forwardable ticket requested", ""), NULL}, 83 NP_("request an anonymous ticket", ""), NULL }, 190 Ticket ticket; local 205 ret = decode_Ticket(c.ticket.data, c.ticket.length, &ticket, NULL); 212 ret = krb5_get_creds_opt_set_ticket(context, opt, &ticket); 215 free_Ticket(&ticket); [all...] |
| klist.c | 167 Ticket t; 171 decode_Ticket(cred->ticket.data, cred->ticket.length, &t, &len); 173 printf(N_("Ticket etype: ", "")); 193 printf(N_("Ticket length: %lu\n", ""), 194 (unsigned long)cred->ticket.length); 214 printf(N_("Ticket flags: %s\n", ""), flags); 473 krb5_warnx(context, N_("No ticket file: %s", ""),
|
| /src/crypto/external/bsd/heimdal/dist/tools/ |
| kdc-log-analyze.pl | 329 print "\tTop ten ticket enctypes:\n"; 341 printf("Requests to forward non-forwardable ticket: $forward_non_forward\n"); 456 my $ticket = $1; 459 if ($ticket =~ /des-cbc-(crc|md4|md5)/) { 469 } elsif (/Request to forward non-forwardable ticket/) { 473 } elsif (/krb_rd_req: Ticket expired \(krb_rd_req\)/) { 474 } elsif (/Ticket expired \(.*\)/) { 488 } elsif (/Bad request for ([,a-zA-Z0-9]+) ticket/) { 490 } elsif (/Failed to verify AP-REQ: Ticket expired/) {
|
| /src/crypto/external/bsd/heimdal/include/ |
| krb5-private.h | 355 Ticket */*second_ticket*/, 565 const Ticket */*ticket*/,
|
| krb5-protos.h | 76 * @param ccache credential cache used to check for des-ticket. 1225 * Get the lifetime of the initial ticket in the cache 1227 * Get the lifetime of the initial ticket in the cache, if the initial 1228 * ticket was not found, the error code KRB5_CC_END is returned. 1232 * @param t the relative lifetime of the initial ticket 1823 * - KRB5_TC_MATCH_FLAGS_EXACT Make sure that the ticket flags are identical. 1824 * - KRB5_TC_MATCH_FLAGS Make sure that all ticket flags set in mcreds are also present in creds . 1825 * - KRB5_TC_MATCH_TIMES_EXACT Compares the ticket times exactly. 1829 * - KRB5_TC_MATCH_IS_SKEY Compares the existance of the second ticket. 2471 * Copy ticket and conten [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/kafs/ |
| afskrb5.c | 54 kt->ticket = NULL; 57 Ticket t; 64 ret = decode_Ticket(cred->ticket.data, cred->ticket.length, &t, &len); 80 kt->ticket = buf; 85 kt->ticket = malloc(cred->ticket.length); 86 if (kt->ticket == NULL) 88 kt->ticket_len = cred->ticket.length; 89 memcpy(kt->ticket, cred->ticket.data, kt->ticket_len) [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/asn1/ |
| check-gen.c | 1340 Ticket ticket; local 1344 memset(&ticket, 0, sizeof(ticket)); 1345 test.val = &ticket; 1349 ret = generic_decode_fail(&test, 1, sizeof(Ticket),
|
| /src/crypto/external/bsd/heimdal/dist/kdc/ |
| krb5tgs.c | 39 * return the realm of a krbtgt-ticket or NULL 53 * The KDC might add a signed path to the ticket authorization data 406 "Bad request to validate ticket"); 411 "Early request to validate ticket"); 418 "Ticket-granting ticket has INVALID flag set"); 425 "Bad request for forwardable ticket"); 433 "Request to forward non-forwardable ticket"); 445 "Bad request for proxiable ticket"); 453 "Request to proxy non-proxiable ticket"); 2505 krb5_ticket *ticket = NULL; local [all...] |
| kerberos5.c | 149 * additional ticket present. 872 kdc_log(context, config, 0, "Failed to encode ticket: %s", msg); 894 &rep->ticket.enc_part); 919 ASN1_MALLOC_ENCODE(Ticket, data.data, data.length, 920 &rep->ticket, &len, ret); 1524 "Request for anonymous ticket denied by local policy"); 1961 _kdc_set_e_text(r, "Anonymous ticket requests are disabled"); 2007 rep.ticket.tkt_vno = 5; 2008 ret = copy_Realm(&r->server->entry.principal->realm, &rep.ticket.realm); 2011 _krb5_principal2principalname(&rep.ticket.sname [all...] |