/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | decrypt_tk.c | 44 krb5_decrypt_tkt_part(krb5_context context, const krb5_keyblock *srv_key, register krb5_ticket *ticket) argument 50 if (!krb5_c_valid_enctype(ticket->enc_part.enctype)) 53 scratch.length = ticket->enc_part.ciphertext.length; 54 if (!(scratch.data = malloc(ticket->enc_part.ciphertext.length))) 60 &ticket->enc_part, &scratch))) { 71 ticket->enc_part2 = dec_tkt_part;
|
H A D | rd_req.c | 36 * server specifies the expected server's name for the ticket. 39 * ticket. If keyproc is non-NULL, keyprocarg is passed to it, and the result 49 krb5_rd_req(krb5_context context, krb5_auth_context *auth_context, const krb5_data *inbuf, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument 83 server = request->ticket->server; 102 keytab, ap_req_options, ticket);
|
H A D | recvauth.c | 55 krb5_ticket ** ticket, 173 keytab, &ap_option, ticket); 256 krb5_recvauth(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fd, char *appl_version, krb5_principal server, krb5_int32 flags, krb5_keytab keytab, krb5_ticket **ticket) argument 259 server, flags, keytab, ticket, 0); 271 krb5_ticket **ticket, 275 server, flags, keytab, ticket, version); 46 recvauth_common(krb5_context context, krb5_auth_context * auth_context, krb5_pointer fd, char *appl_version, krb5_principal server, krb5_int32 flags, krb5_keytab keytab, krb5_ticket ** ticket, krb5_data *version) argument 263 krb5_recvauth_version(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fd, krb5_principal server, krb5_int32 flags, krb5_keytab keytab, krb5_ticket **ticket, krb5_data *version) argument
|
H A D | rd_req_dec.c | 47 * server specifies the expected server's name for the ticket; if NULL, then 55 * ticket. If keyproc is non-NULL, keyprocarg is passed to it, and the result 79 enctype = req->ticket->enc_part.enctype; 83 if ((retval = krb5_kt_get_entry(context, keytab, req->ticket->server, 84 req->ticket->enc_part.kvno, 97 retval = krb5_decrypt_tkt_part(context, &ktent.key, req->ticket); 102 krb5_principal princ = (krb5_principal) req->ticket->server; 108 "AP Request ticket decrypt fail for principal '%s' (kvno=%d, enctype=%d)"), 110 req->ticket->enc_part.kvno, 149 krb5_ticket **ticket, in 146 krb5_rd_req_decoded_opt(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket, int check_valid_flag) argument 502 krb5_rd_req_decoded(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument 516 krb5_rd_req_decoded_anyflag(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument [all...] |
/illumos-gate/usr/src/cmd/krb5/krb5kdc/ |
H A D | policy.c | 56 krb5_ticket *ticket, const char **status) 60 * For example, if your site wants to disallow ticket forwarding, 55 against_local_policy_tgs(register krb5_kdc_req *request, krb5_db_entry server, krb5_ticket *ticket, const char **status) argument
|
H A D | do_tgs_req.c | 223 * able to decrypt the U2U ticket! So we use that in preference 233 * Get the key for the second ticket, and decrypt it. 265 * Select the keytype for the ticket session key. 314 /* include new addresses in ticket & reply */ 328 /* include new addresses in ticket & reply */ 345 /* BEWARE of allocation hanging off of ticket & enc_part2, it belongs 355 /* BEWARE of allocation hanging off of ticket & enc_part2, it belongs 405 renewable ticket using a non-renewable ticket */ 423 * Propagate the preauthentication flags through to the returned ticket 763 prepare_error_tgs(krb5_kdc_req *request, krb5_ticket *ticket, int error, const char *ident, krb5_data **response, const char *status) argument [all...] |
H A D | kdc_util.c | 150 * Returns TRUE if the kerberos principal is the name of a Kerberos ticket 169 comp_cksum(krb5_context kcontext, krb5_data *source, krb5_ticket *ticket, argument 183 if ((retval = krb5_c_verify_checksum(kcontext, ticket->enc_part2->session, 196 krb5_data *pkt, krb5_ticket **ticket, 232 /* If the "server" principal in the ticket is not something 242 if ((krb5_princ_realm(kdc_context, apreq->ticket->server)->length != 244 memcmp(krb5_princ_realm(kdc_context, apreq->ticket->server)->data, 262 if ((retval = kdc_get_server_key(apreq->ticket, &key, &kvno))) 278 apreq->ticket->server, 280 NULL, ticket))) { 195 kdc_process_tgs_req(krb5_kdc_req *request, const krb5_fulladdr *from, krb5_data *pkt, krb5_ticket **ticket, krb5_keyblock **subkey) argument 386 kdc_get_server_key(krb5_ticket *ticket, krb5_keyblock **key, krb5_kvno *kvno) argument 453 check_hot_list(krb5_ticket *ticket) argument 1123 validate_tgs_request(register krb5_kdc_req *request, krb5_db_entry server, krb5_ticket *ticket, krb5_timestamp kdc_time, const char **status) argument [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/common/ |
H A D | store_forw_creds.c | 46 krb5_ticket *ticket, 74 ticket->enc_part2->client)) != 0) { 44 store_forw_creds(krb5_context context, krb5_creds **creds, krb5_ticket *ticket, char *lusername, krb5_ccache *ccache) argument
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | accept_sec_context.c | 306 krb5_ticket * ticket = NULL; local 462 if ((code = krb5_copy_principal(context, request->ticket->server, 576 cred->princ, cred->keytab, NULL, &ticket))) { 585 request->ticket->enc_part.kvno, 629 (authdat->ticket->enc_part2 == NULL)) { 862 ticket->enc_part2->authorization_data, 988 ctx->endtime = ticket->enc_part2->times.endtime; 989 ctx->krb_flags = ticket->enc_part2->flags; 991 krb5_free_ticket(context, ticket); /* Done with ticket */ [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/telnet/ |
H A D | kerberos5.c | 103 static krb5_ticket *ticket = NULL; variable 503 ticket->enc_part2->client, UserNameRequested)) {
|
/illumos-gate/usr/src/lib/krb5/kadm5/srv/ |
H A D | chgpwd.c | 59 krb5_ticket *ticket; local 78 ticket = NULL; 181 NULL, &ticket); 309 * Verify that this is an AS_REQ ticket 311 if (!(ticket->enc_part2->flags & TKT_FLG_INITIAL)) { 344 ret = krb5_unparse_name(context, ticket->enc_part2->client, &clientstr); 366 ticket->enc_part2->client, 548 if (ticket) 549 krb5_free_ticket(context, ticket);
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/ |
H A D | in.rshd.c | 1422 krb5_ticket *ticket; local 1476 &ticket, /* return ticket */ 1510 if ((status = krb5_unparse_name(bsd_context, ticket->enc_part2->client, 1515 ticket->enc_part2->client, &client))) 1556 key.magic = ticket->enc_part2->session->magic; 1557 key.enctype = ticket->enc_part2->session->enctype; 1558 key.contents = ticket->enc_part2->session->contents; 1559 key.length = ticket->enc_part2->session->length; 1607 * The key is taken from the ticket instea [all...] |
H A D | in.rlogind.c | 117 krb5_ticket **ticket, 372 krb5_ticket **ticket, 425 ticket, /* return ticket */ 503 key.contents = (*ticket)->enc_part2->session->contents; 504 key.length = (*ticket)->enc_part2->session->length; 526 (*ticket)->enc_part2->client, 561 * The key is taken from the ticket instead (see below). 573 * the ticket. 581 (*ticket) 369 recvauth(int f, krb5_context krb_context, unsigned int *valid_checksum, krb5_ticket **ticket, int *auth_type, krb5_principal *client, int encr_flag, krb5_keytab keytab) argument 643 krb5_ticket *ticket = NULL; local 878 krb5_compat_recvauth(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fdp, krb5_principal server, krb5_int32 flags, krb5_keytab keytab, krb5_ticket **ticket, krb5_int32 *auth_sys, krb5_data *version) argument [all...] |
H A D | in.telnetd.c | 178 static krb5_ticket *ticket = NULL; variable 463 krb5_data *inbuf, krb5_ticket *ticket, 482 ticket->enc_part2->client)) != 0) 518 (void) krb5_kuserok(context, ticket->enc_part2->client, 603 NULL, keytabid, NULL, &ticket); 615 ticket->server, 0)->length < MAXPRINCLEN) { 619 ticket->server, 0)->data, 621 ticket->server, 0)->length); 623 ticket->server, 0)->length] = '\0'; 719 ticket 461 rd_and_store_forwarded_creds(krb5_context context, krb5_auth_context auth_context, krb5_data *inbuf, krb5_ticket *ticket, char *username) argument [all...] |
/illumos-gate/usr/src/cmd/krb5/slave/ |
H A D | kpropd.c | 1407 krb5_ticket * ticket; local 1481 kprop_version, server, 0, keytab, &ticket); 1487 retval = krb5_copy_principal(context, ticket->enc_part2->client, clientp); 1494 *etype = ticket->enc_part.enctype; 1511 com_err(progname, retval, gettext("while unparsing ticket etype")); 1519 krb5_free_ticket(context, ticket);
|
/illumos-gate/usr/src/uts/sun4u/starfire/io/ |
H A D | idn.c | 3177 dp->dvote.ticket = 0; 3205 idn_open_domain(int domid, int cpuid, uint_t ticket) argument 3216 "[cpuid = %d, ticket = 0x%x]\n", 3217 proc, domid, cpuid, ticket); 3255 dp->dvote.ticket = ticket; 3315 proc, domid, dp->dcpu, dp->dvote.ticket); 3480 ldp->dvote.ticket = IDNVOTE_INITIAL_TICKET; 4701 dp->dvote.ticket);
|
H A D | idn_proto.c | 1013 ((v.ticket = dp->dvote.ticket) == 0)) 1368 uint_t ticket; local 1450 ticket = IDNVOTE_BASICS(ldp->dvote); 1466 dp->dcpu, ticket, conset, masterid); 1471 IDNXDC(domid, &mt, ticket, dset[0], dset[1], dset[2]); 1504 uint_t ticket; local 1508 ticket = GET_XARGS_NEGO_TICKET(xargs); 1512 if (idn_open_domain(domid, cpuid, ticket) != 0) { 1514 "(ticket [all...] |
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/include/ |
H A D | krb5.h | 832 * Mask of ticket flags in the TGT which should be converted into KDC 1048 in ticket? otherwise client can't get this */ 1049 krb5_timestamp starttime; /* optional in ticket, if not present, 1106 krb5_ticket *ticket; member in struct:_krb5_tkt_authent 1118 krb5_boolean is_skey; /* true if ticket is encrypted in 1119 another ticket's skey */ 1120 krb5_flags ticket_flags; /* flags in ticket */ 1121 krb5_address * *addresses; /* addrs in ticket */ 1122 krb5_data ticket; /* ticket strin member in struct:_krb5_creds 1188 krb5_ticket *ticket; /* ticket */ member in struct:_krb5_kdc_rep 1213 krb5_ticket *ticket; /* ticket */ member in struct:_krb5_ap_req [all...] |
/illumos-gate/usr/src/uts/sun4u/starfire/sys/ |
H A D | idn.h | 862 uint_t ticket; member in union:__anon10073 880 * election ticket, i.e. those physical attributes pertaining 884 #define IDNVOTE_ELECT(tkt) ((tkt).ticket & IDNVOTE_ELECT_MASK) 886 #define IDNVOTE_BASICS(tkt) ((tkt).ticket & IDNVOTE_BASICS_MASK) 1028 * vote Local/Remote domain's vote ticket. 3587 extern int idn_open_domain(int domid, int cpuid, uint_t ticket);
|