HomeSort by: relevance | last modified time | path
    Searched refs:Ticket (Results 1 - 25 of 25) sorted by relevancy

  /src/crypto/external/bsd/heimdal/dist/lib/krb5/
build_ap_req.c 48 Ticket t;
57 ap.ticket.tkt_vno = 5;
58 copy_Realm(&cred->server->realm, &ap.ticket.realm);
59 copy_PrincipalName(&cred->server->name, &ap.ticket.sname);
61 decode_Ticket(cred->ticket.data, cred->ticket.length, &t, &len);
62 copy_EncryptedData(&t.enc_part, &ap.ticket.enc_part);
test_set_kvno0.c 58 Ticket t;
81 "\tThis utility edits a ccache, setting all ticket\n"
100 "\tThis utility edits a ccache, setting all ticket\n"
123 ret = decode_Ticket(cred.ticket.data, cred.ticket.length, &t, &len);
134 * The new Ticket has to need less or same space as before, so
138 ASN1_MALLOC_ENCODE(Ticket, data.data, data.length, &t, &len, ret);
143 krb5_data_free(&cred.ticket);
144 cred.ticket = data;
test_pknistkdf.c 51 krb5_data ticket; member in struct:testcase
88 { /* ticket */
134 { /* ticket */
180 { /* ticket */
202 Ticket t;
215 ASN1_MALLOC_ENCODE(Ticket, data.data, data.length, &t, &size, ret);
217 errx(1, "ASN1_MALLOC_ENCODE(Ticket)");
230 Ticket ticket; local
234 memset(&ticket, 0, sizeof(ticket))
    [all...]
crypto-pk.c 138 const Ticket *ticket,
154 pubinfo.ticket = *ticket;
206 const Ticket *ticket,
254 enctype, as_req, pk_as_rep, ticket, &other);
get_cred.c 44 Ticket *, krb5_creds **, krb5_creds ***);
145 Ticket *second_ticket,
406 N_("Failed to decode encpart in ticket", ""));
419 Ticket *second_ticket,
431 Ticket second_ticket_data;
617 Ticket *second_ticket,
654 Ticket *second_ticket,
756 Ticket *second_ticket,
918 Ticket *second_ticket,
948 * Get a service ticket from a KDC by chasing referrals from a start realm
966 krb5_creds tgt, referral, ticket; local
1390 Ticket *ticket; member in struct:krb5_get_creds_opt_data
    [all...]
krb5-private.h 357 Ticket */*second_ticket*/,
567 const Ticket */*ticket*/,
rd_cred.c 268 ASN1_MALLOC_ENCODE(Ticket, creds->ticket.data, creds->ticket.length,
274 if(creds->ticket.length != len)
rd_req.c 66 "ticket part", ""));
128 if (ap_req->ticket.tkt_vno != 5){
137 check_transited(krb5_context context, Ticket *ticket, EncTicketPart *enc)
160 ticket->realm);
164 ticket->realm,
194 Ticket *ticket,
201 ret = decrypt_tkt_enc_part (context, key, &ticket->enc_part, &t);
226 ret = check_transited(context, ticket, &t)
491 krb5_ticket *ticket; member in struct:krb5_rd_req_out_ctx_data
    [all...]
krb5-protos.h 78 * @param ccache credential cache used to check for des-ticket.
1227 * Get the lifetime of the initial ticket in the cache
1229 * Get the lifetime of the initial ticket in the cache, if the initial
1230 * ticket was not found, the error code KRB5_CC_END is returned.
1234 * @param t the relative lifetime of the initial ticket
1825 * - KRB5_TC_MATCH_FLAGS_EXACT Make sure that the ticket flags are identical.
1826 * - KRB5_TC_MATCH_FLAGS Make sure that all ticket flags set in mcreds are also present in creds .
1827 * - KRB5_TC_MATCH_TIMES_EXACT Compares the ticket times exactly.
1831 * - KRB5_TC_MATCH_IS_SKEY Compares the existance of the second ticket.
2473 * Copy ticket and conten
    [all...]
ticket.c 1 /* $NetBSD: ticket.c,v 1.6 2023/06/19 21:41:45 christos Exp $ */
41 * Free ticket and content
44 * @param ticket ticket to free
54 krb5_ticket *ticket)
56 free_EncTicketPart(&ticket->ticket);
57 krb5_free_principal(context, ticket->client);
58 krb5_free_principal(context, ticket->server);
59 free(ticket);
    [all...]
digest.c 748 Ticket **tickets)
scache.c 726 Ticket t;
729 ret = decode_Ticket(creds->ticket.data,
730 creds->ticket.length, &t, &len);
init_creds_pw.c 1390 * @param start_time the time the ticket should start to be valid or 0 for now.
2229 ASN1_MALLOC_ENCODE(Ticket, data.data, data.length,
2230 &rep.kdc_rep.ticket, &size, ret);
2242 * Now check and extract the ticket
2262 _krb5_debug(context, 5, "krb5_get_init_creds: extracting ticket");
  /src/crypto/external/bsd/heimdal/dist/kuser/
kdecode_ticket.c 44 krb5_data *ticket,
54 Ticket tkt;
56 ret = decode_Ticket (ticket->data, ticket->length, &tkt, &len);
158 print_and_decode_tkt (context, &out->ticket, out->server,
kimpersonate.c 75 Ticket ticket; local
78 memset(&ticket, 0, sizeof(ticket));
105 * Encrypt `enc_part' of ticket with service key
121 &ticket.enc_part);
129 * Encode ticket
132 ticket.tkt_vno = 5;
133 ticket.realm = cred->server->realm;
134 ret = copy_PrincipalName(&cred->server->name, &ticket.sname)
    [all...]
kvno.c 52 NP_("Server to get ticket for", ""), "principal" },
109 Ticket ticket; local
148 memset(&ticket, 0, sizeof(ticket));
184 ret = decode_Ticket(out_creds->ticket.data, out_creds->ticket.length,
185 &ticket, &len);
187 krb5_err(context, 1, ret, "Can't decode ticket for %s", princ);
200 (ticket.enc_part.kvno != NULL)
    [all...]
kgetcred.c 62 NP_("where to find the ticket use for delegation", ""), "cache"},
68 NP_("forwardable ticket requested", ""), NULL},
83 NP_("request an anonymous ticket", ""), NULL },
190 Ticket ticket; local
205 ret = decode_Ticket(c.ticket.data, c.ticket.length, &ticket, NULL);
212 ret = krb5_get_creds_opt_set_ticket(context, opt, &ticket);
215 free_Ticket(&ticket);
    [all...]
klist.c 167 Ticket t;
171 decode_Ticket(cred->ticket.data, cred->ticket.length, &t, &len);
173 printf(N_("Ticket etype: ", ""));
193 printf(N_("Ticket length: %lu\n", ""),
194 (unsigned long)cred->ticket.length);
214 printf(N_("Ticket flags: %s\n", ""), flags);
473 krb5_warnx(context, N_("No ticket file: %s", ""),
  /src/crypto/external/bsd/heimdal/dist/tools/
kdc-log-analyze.pl 329 print "\tTop ten ticket enctypes:\n";
341 printf("Requests to forward non-forwardable ticket: $forward_non_forward\n");
456 my $ticket = $1;
459 if ($ticket =~ /des-cbc-(crc|md4|md5)/) {
469 } elsif (/Request to forward non-forwardable ticket/) {
473 } elsif (/krb_rd_req: Ticket expired \(krb_rd_req\)/) {
474 } elsif (/Ticket expired \(.*\)/) {
488 } elsif (/Bad request for ([,a-zA-Z0-9]+) ticket/) {
490 } elsif (/Failed to verify AP-REQ: Ticket expired/) {
  /src/crypto/external/bsd/heimdal/include/
krb5-private.h 355 Ticket */*second_ticket*/,
565 const Ticket */*ticket*/,
krb5-protos.h 76 * @param ccache credential cache used to check for des-ticket.
1225 * Get the lifetime of the initial ticket in the cache
1227 * Get the lifetime of the initial ticket in the cache, if the initial
1228 * ticket was not found, the error code KRB5_CC_END is returned.
1232 * @param t the relative lifetime of the initial ticket
1823 * - KRB5_TC_MATCH_FLAGS_EXACT Make sure that the ticket flags are identical.
1824 * - KRB5_TC_MATCH_FLAGS Make sure that all ticket flags set in mcreds are also present in creds .
1825 * - KRB5_TC_MATCH_TIMES_EXACT Compares the ticket times exactly.
1829 * - KRB5_TC_MATCH_IS_SKEY Compares the existance of the second ticket.
2471 * Copy ticket and conten
    [all...]
  /src/crypto/external/bsd/heimdal/dist/lib/kafs/
afskrb5.c 54 kt->ticket = NULL;
57 Ticket t;
64 ret = decode_Ticket(cred->ticket.data, cred->ticket.length, &t, &len);
80 kt->ticket = buf;
85 kt->ticket = malloc(cred->ticket.length);
86 if (kt->ticket == NULL)
88 kt->ticket_len = cred->ticket.length;
89 memcpy(kt->ticket, cred->ticket.data, kt->ticket_len)
    [all...]
  /src/crypto/external/bsd/heimdal/dist/lib/asn1/
check-gen.c 1340 Ticket ticket; local
1344 memset(&ticket, 0, sizeof(ticket));
1345 test.val = &ticket;
1349 ret = generic_decode_fail(&test, 1, sizeof(Ticket),
  /src/crypto/external/bsd/heimdal/dist/kdc/
krb5tgs.c 39 * return the realm of a krbtgt-ticket or NULL
53 * The KDC might add a signed path to the ticket authorization data
406 "Bad request to validate ticket");
411 "Early request to validate ticket");
418 "Ticket-granting ticket has INVALID flag set");
425 "Bad request for forwardable ticket");
433 "Request to forward non-forwardable ticket");
445 "Bad request for proxiable ticket");
453 "Request to proxy non-proxiable ticket");
2505 krb5_ticket *ticket = NULL; local
    [all...]
kerberos5.c 149 * additional ticket present.
872 kdc_log(context, config, 0, "Failed to encode ticket: %s", msg);
894 &rep->ticket.enc_part);
919 ASN1_MALLOC_ENCODE(Ticket, data.data, data.length,
920 &rep->ticket, &len, ret);
1524 "Request for anonymous ticket denied by local policy");
1961 _kdc_set_e_text(r, "Anonymous ticket requests are disabled");
2007 rep.ticket.tkt_vno = 5;
2008 ret = copy_Realm(&r->server->entry.principal->realm, &rep.ticket.realm);
2011 _krb5_principal2principalname(&rep.ticket.sname
    [all...]

Completed in 30 milliseconds