Searched defs:ticket (Results 1 - 19 of 19) sorted by relevance

/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Ddecrypt_tk.c44 krb5_decrypt_tkt_part(krb5_context context, const krb5_keyblock *srv_key, register krb5_ticket *ticket) argument
50 if (!krb5_c_valid_enctype(ticket->enc_part.enctype))
53 scratch.length = ticket->enc_part.ciphertext.length;
54 if (!(scratch.data = malloc(ticket->enc_part.ciphertext.length)))
60 &ticket->enc_part, &scratch))) {
71 ticket->enc_part2 = dec_tkt_part;
H A Drd_req.c36 * server specifies the expected server's name for the ticket.
39 * ticket. If keyproc is non-NULL, keyprocarg is passed to it, and the result
49 krb5_rd_req(krb5_context context, krb5_auth_context *auth_context, const krb5_data *inbuf, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument
83 server = request->ticket->server;
102 keytab, ap_req_options, ticket);
H A Drecvauth.c55 krb5_ticket ** ticket,
173 keytab, &ap_option, ticket);
256 krb5_recvauth(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fd, char *appl_version, krb5_principal server, krb5_int32 flags, krb5_keytab keytab, krb5_ticket **ticket) argument
259 server, flags, keytab, ticket, 0);
271 krb5_ticket **ticket,
275 server, flags, keytab, ticket, version);
46 recvauth_common(krb5_context context, krb5_auth_context * auth_context, krb5_pointer fd, char *appl_version, krb5_principal server, krb5_int32 flags, krb5_keytab keytab, krb5_ticket ** ticket, krb5_data *version) argument
263 krb5_recvauth_version(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fd, krb5_principal server, krb5_int32 flags, krb5_keytab keytab, krb5_ticket **ticket, krb5_data *version) argument
H A Drd_req_dec.c47 * server specifies the expected server's name for the ticket; if NULL, then
55 * ticket. If keyproc is non-NULL, keyprocarg is passed to it, and the result
79 enctype = req->ticket->enc_part.enctype;
83 if ((retval = krb5_kt_get_entry(context, keytab, req->ticket->server,
84 req->ticket->enc_part.kvno,
97 retval = krb5_decrypt_tkt_part(context, &ktent.key, req->ticket);
102 krb5_principal princ = (krb5_principal) req->ticket->server;
108 "AP Request ticket decrypt fail for principal '%s' (kvno=%d, enctype=%d)"),
110 req->ticket->enc_part.kvno,
149 krb5_ticket **ticket, in
146 krb5_rd_req_decoded_opt(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket, int check_valid_flag) argument
502 krb5_rd_req_decoded(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument
516 krb5_rd_req_decoded_anyflag(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument
[all...]
/illumos-gate/usr/src/cmd/krb5/krb5kdc/
H A Dpolicy.c56 krb5_ticket *ticket, const char **status)
60 * For example, if your site wants to disallow ticket forwarding,
55 against_local_policy_tgs(register krb5_kdc_req *request, krb5_db_entry server, krb5_ticket *ticket, const char **status) argument
H A Ddo_tgs_req.c223 * able to decrypt the U2U ticket! So we use that in preference
233 * Get the key for the second ticket, and decrypt it.
265 * Select the keytype for the ticket session key.
314 /* include new addresses in ticket & reply */
328 /* include new addresses in ticket & reply */
345 /* BEWARE of allocation hanging off of ticket & enc_part2, it belongs
355 /* BEWARE of allocation hanging off of ticket & enc_part2, it belongs
405 renewable ticket using a non-renewable ticket */
423 * Propagate the preauthentication flags through to the returned ticket
763 prepare_error_tgs(krb5_kdc_req *request, krb5_ticket *ticket, int error, const char *ident, krb5_data **response, const char *status) argument
[all...]
H A Dkdc_util.c150 * Returns TRUE if the kerberos principal is the name of a Kerberos ticket
169 comp_cksum(krb5_context kcontext, krb5_data *source, krb5_ticket *ticket, argument
183 if ((retval = krb5_c_verify_checksum(kcontext, ticket->enc_part2->session,
196 krb5_data *pkt, krb5_ticket **ticket,
232 /* If the "server" principal in the ticket is not something
242 if ((krb5_princ_realm(kdc_context, apreq->ticket->server)->length !=
244 memcmp(krb5_princ_realm(kdc_context, apreq->ticket->server)->data,
262 if ((retval = kdc_get_server_key(apreq->ticket, &key, &kvno)))
278 apreq->ticket->server,
280 NULL, ticket))) {
195 kdc_process_tgs_req(krb5_kdc_req *request, const krb5_fulladdr *from, krb5_data *pkt, krb5_ticket **ticket, krb5_keyblock **subkey) argument
386 kdc_get_server_key(krb5_ticket *ticket, krb5_keyblock **key, krb5_kvno *kvno) argument
453 check_hot_list(krb5_ticket *ticket) argument
1123 validate_tgs_request(register krb5_kdc_req *request, krb5_db_entry server, krb5_ticket *ticket, krb5_timestamp kdc_time, const char **status) argument
[all...]
/illumos-gate/usr/src/cmd/cmd-inet/common/
H A Dstore_forw_creds.c46 krb5_ticket *ticket,
74 ticket->enc_part2->client)) != 0) {
44 store_forw_creds(krb5_context context, krb5_creds **creds, krb5_ticket *ticket, char *lusername, krb5_ccache *ccache) argument
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/
H A Daccept_sec_context.c306 krb5_ticket * ticket = NULL; local
462 if ((code = krb5_copy_principal(context, request->ticket->server,
576 cred->princ, cred->keytab, NULL, &ticket))) {
585 request->ticket->enc_part.kvno,
629 (authdat->ticket->enc_part2 == NULL)) {
862 ticket->enc_part2->authorization_data,
988 ctx->endtime = ticket->enc_part2->times.endtime;
989 ctx->krb_flags = ticket->enc_part2->flags;
991 krb5_free_ticket(context, ticket); /* Done with ticket */
[all...]
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/telnet/
H A Dkerberos5.c103 static krb5_ticket *ticket = NULL; variable
503 ticket->enc_part2->client, UserNameRequested)) {
/illumos-gate/usr/src/lib/krb5/kadm5/srv/
H A Dchgpwd.c59 krb5_ticket *ticket; local
78 ticket = NULL;
181 NULL, &ticket);
309 * Verify that this is an AS_REQ ticket
311 if (!(ticket->enc_part2->flags & TKT_FLG_INITIAL)) {
344 ret = krb5_unparse_name(context, ticket->enc_part2->client, &clientstr);
366 ticket->enc_part2->client,
548 if (ticket)
549 krb5_free_ticket(context, ticket);
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/
H A Din.rshd.c1422 krb5_ticket *ticket; local
1476 &ticket, /* return ticket */
1510 if ((status = krb5_unparse_name(bsd_context, ticket->enc_part2->client,
1515 ticket->enc_part2->client, &client)))
1556 key.magic = ticket->enc_part2->session->magic;
1557 key.enctype = ticket->enc_part2->session->enctype;
1558 key.contents = ticket->enc_part2->session->contents;
1559 key.length = ticket->enc_part2->session->length;
1607 * The key is taken from the ticket instea
[all...]
H A Din.rlogind.c117 krb5_ticket **ticket,
372 krb5_ticket **ticket,
425 ticket, /* return ticket */
503 key.contents = (*ticket)->enc_part2->session->contents;
504 key.length = (*ticket)->enc_part2->session->length;
526 (*ticket)->enc_part2->client,
561 * The key is taken from the ticket instead (see below).
573 * the ticket.
581 (*ticket)
369 recvauth(int f, krb5_context krb_context, unsigned int *valid_checksum, krb5_ticket **ticket, int *auth_type, krb5_principal *client, int encr_flag, krb5_keytab keytab) argument
643 krb5_ticket *ticket = NULL; local
878 krb5_compat_recvauth(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fdp, krb5_principal server, krb5_int32 flags, krb5_keytab keytab, krb5_ticket **ticket, krb5_int32 *auth_sys, krb5_data *version) argument
[all...]
H A Din.telnetd.c178 static krb5_ticket *ticket = NULL; variable
463 krb5_data *inbuf, krb5_ticket *ticket,
482 ticket->enc_part2->client)) != 0)
518 (void) krb5_kuserok(context, ticket->enc_part2->client,
603 NULL, keytabid, NULL, &ticket);
615 ticket->server, 0)->length < MAXPRINCLEN) {
619 ticket->server, 0)->data,
621 ticket->server, 0)->length);
623 ticket->server, 0)->length] = '\0';
719 ticket
461 rd_and_store_forwarded_creds(krb5_context context, krb5_auth_context auth_context, krb5_data *inbuf, krb5_ticket *ticket, char *username) argument
[all...]
/illumos-gate/usr/src/cmd/krb5/slave/
H A Dkpropd.c1407 krb5_ticket * ticket; local
1481 kprop_version, server, 0, keytab, &ticket);
1487 retval = krb5_copy_principal(context, ticket->enc_part2->client, clientp);
1494 *etype = ticket->enc_part.enctype;
1511 com_err(progname, retval, gettext("while unparsing ticket etype"));
1519 krb5_free_ticket(context, ticket);
/illumos-gate/usr/src/uts/sun4u/starfire/io/
H A Didn.c3177 dp->dvote.ticket = 0;
3205 idn_open_domain(int domid, int cpuid, uint_t ticket) argument
3216 "[cpuid = %d, ticket = 0x%x]\n",
3217 proc, domid, cpuid, ticket);
3255 dp->dvote.ticket = ticket;
3315 proc, domid, dp->dcpu, dp->dvote.ticket);
3480 ldp->dvote.ticket = IDNVOTE_INITIAL_TICKET;
4701 dp->dvote.ticket);
H A Didn_proto.c1013 ((v.ticket = dp->dvote.ticket) == 0))
1368 uint_t ticket; local
1450 ticket = IDNVOTE_BASICS(ldp->dvote);
1466 dp->dcpu, ticket, conset, masterid);
1471 IDNXDC(domid, &mt, ticket, dset[0], dset[1], dset[2]);
1504 uint_t ticket; local
1508 ticket = GET_XARGS_NEGO_TICKET(xargs);
1512 if (idn_open_domain(domid, cpuid, ticket) != 0) {
1514 "(ticket
[all...]
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/include/
H A Dkrb5.h832 * Mask of ticket flags in the TGT which should be converted into KDC
1048 in ticket? otherwise client can't get this */
1049 krb5_timestamp starttime; /* optional in ticket, if not present,
1106 krb5_ticket *ticket; member in struct:_krb5_tkt_authent
1118 krb5_boolean is_skey; /* true if ticket is encrypted in
1119 another ticket's skey */
1120 krb5_flags ticket_flags; /* flags in ticket */
1121 krb5_address * *addresses; /* addrs in ticket */
1122 krb5_data ticket; /* ticket strin member in struct:_krb5_creds
1188 krb5_ticket *ticket; /* ticket */ member in struct:_krb5_kdc_rep
1213 krb5_ticket *ticket; /* ticket */ member in struct:_krb5_ap_req
[all...]
/illumos-gate/usr/src/uts/sun4u/starfire/sys/
H A Didn.h862 uint_t ticket; member in union:__anon10073
880 * election ticket, i.e. those physical attributes pertaining
884 #define IDNVOTE_ELECT(tkt) ((tkt).ticket & IDNVOTE_ELECT_MASK)
886 #define IDNVOTE_BASICS(tkt) ((tkt).ticket & IDNVOTE_BASICS_MASK)
1028 * vote Local/Remote domain's vote ticket.
3587 extern int idn_open_domain(int domid, int cpuid, uint_t ticket);

Completed in 140 milliseconds