Searched defs:ticket (Results 1 - 9 of 9) sorted by relevance

/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Ddecrypt_tk.c43 krb5_decrypt_tkt_part(krb5_context context, const krb5_keyblock *srv_key, register krb5_ticket *ticket) argument
49 if (!krb5_c_valid_enctype(ticket->enc_part.enctype))
52 if (!krb5_is_permitted_enctype(context, ticket->enc_part.enctype))
55 scratch.length = ticket->enc_part.ciphertext.length;
56 if (!(scratch.data = malloc(ticket->enc_part.ciphertext.length)))
62 &ticket->enc_part, &scratch))) {
73 ticket->enc_part2 = dec_tkt_part;
H A Drd_req.c40 * server specifies the expected server's name for the ticket.
43 * ticket. If keyproc is non-NULL, keyprocarg is passed to it, and the result
56 krb5_ticket **ticket)
96 server, keytab, ap_req_options, ticket);
53 krb5_rd_req(krb5_context context, krb5_auth_context *auth_context, const krb5_data *inbuf, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument
H A Dsrv_dec_tkt.c28 * Server decrypt ticket via keytab or keyblock.
37 * - Does not free ticket->enc_part2 on error.
46 krb5_ticket *ticket)
52 retval = krb5_decrypt_tkt_part(context, key, ticket);
56 trans = &ticket->enc_part2->transited;
57 realm = &ticket->enc_part2->client->realm;
60 realm, &ticket->server->realm);
64 if (ticket->enc_part2->flags & TKT_FLG_INVALID) { /* ie, KDC_OPT_POSTDATED */
77 krb5_ticket *ticket)
86 ticket
44 krb5int_server_decrypt_ticket_keyblock(krb5_context context, const krb5_keyblock *key, krb5_ticket *ticket) argument
75 krb5_server_decrypt_ticket_keytab(krb5_context context, const krb5_keytab keytab, krb5_ticket *ticket) argument
[all...]
H A Drecvauth.c53 krb5_ticket ** ticket,
151 keytab, &ap_option, ticket);
232 krb5_recvauth(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fd, char *appl_version, krb5_principal server, krb5_int32 flags, krb5_keytab keytab, krb5_ticket **ticket) argument
235 server, flags, keytab, ticket, 0);
247 krb5_ticket **ticket,
251 server, flags, keytab, ticket, version);
44 recvauth_common(krb5_context context, krb5_auth_context * auth_context, krb5_pointer fd, char *appl_version, krb5_principal server, krb5_int32 flags, krb5_keytab keytab, krb5_ticket ** ticket, krb5_data *version) argument
239 krb5_recvauth_version(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fd, krb5_principal server, krb5_int32 flags, krb5_keytab keytab, krb5_ticket **ticket, krb5_data *version) argument
H A Drd_req_dec.c53 * server specifies the expected server's name for the ticket; if NULL, then
61 * ticket. If keyproc is non-NULL, keyprocarg is passed to it, and the result
106 server != NULL ? server : req->ticket->server,
107 req->ticket->enc_part.kvno,
108 req->ticket->enc_part.enctype, &ktent);
110 retval = krb5_decrypt_tkt_part(context, &ktent.key, req->ticket);
128 if (ktent.key.enctype != req->ticket->enc_part.enctype) {
134 req->ticket);
140 * We overwrite ticket->server to be the principal
149 * server as it appeared in the ticket
256 rd_req_decoded_opt(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, const krb5_data *raw_req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket, int check_valid_flag) argument
726 krb5_rd_req_decoded_ext(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, const krb5_data *raw_req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument
741 krb5_rd_req_decoded(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument
757 krb5_rd_req_decoded_anyflag_ext(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, const krb5_data *raw_req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument
773 krb5_rd_req_decoded_anyflag(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument
[all...]
/osnet-11/usr/src/lib/pam_modules/tty_tickets/
H A Dtty_tickets.c46 * The content of this ticket will be different between 32 bit and 64 bit
54 * the lifetime of a single ticket, it will look exactly like a ticket expiry.
136 int ticket = -1; local
152 ticket = open(ticketname, O_RDONLY|O_NOFOLLOW|O_NOCTTY, 0600);
153 if (ticket == -1) {
156 "pam_tty_tickets: unable to open ticket %s: %m",
162 if (fstat(ticket, &ticketsb) != 0) {
165 "pam_tty_tickets: unable to stat ticket %s: %m",
174 "pam_tty_tickets: invalid ticket
234 int ticket = -1; local
[all...]
/osnet-11/usr/src/lib/krb5/kadm5/srv/
H A Dchgpwd.c69 krb5_ticket *ticket; local
88 ticket = NULL;
191 NULL, &ticket);
343 client = ticket->enc_part2->client;
381 /* for cpw, verify that this is an AS_REQ ticket */
383 (ticket->enc_part2->flags & TKT_FLG_INITIAL) == 0) {
605 if (ticket)
606 krb5_free_ticket(context, ticket);
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/mech/
H A Daccept_sec_context.c124 krb5_ticket *ticket,
137 krb_creds.client = ticket->enc_part2->client;
138 krb_creds.server = ticket->server;
139 krb_creds.keyblock = *(ticket->enc_part2->session);
140 krb_creds.ticket_flags = ticket->enc_part2->flags;
141 krb_creds.times = ticket->enc_part2->times;
145 code = encode_krb5_ticket(ticket, &data);
151 krb_creds.ticket = *data;
455 krb5_ticket * ticket = NULL; local
630 if ((code = krb5_copy_principal(context, request->ticket
122 create_constrained_deleg_creds(OM_uint32 *minor_status, krb5_gss_cred_id_t verifier_cred_handle, krb5_ticket *ticket, krb5_gss_cred_id_t *out_cred, krb5_context context) argument
[all...]
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/include/krb5/
H A Dkdb.h331 krb5_const_principal client_princ; /* Client name used in ticket */
334 krb5_db_entry *krbtgt; /* DB entry for ticket granting service principal */
373 krb5_ticket *ticket; member in struct:_kdb_check_policy_tgs_req

Completed in 32 milliseconds