/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | decrypt_tk.c | 43 krb5_decrypt_tkt_part(krb5_context context, const krb5_keyblock *srv_key, register krb5_ticket *ticket) argument 49 if (!krb5_c_valid_enctype(ticket->enc_part.enctype)) 52 if (!krb5_is_permitted_enctype(context, ticket->enc_part.enctype)) 55 scratch.length = ticket->enc_part.ciphertext.length; 56 if (!(scratch.data = malloc(ticket->enc_part.ciphertext.length))) 62 &ticket->enc_part, &scratch))) { 73 ticket->enc_part2 = dec_tkt_part;
|
H A D | rd_req.c | 40 * server specifies the expected server's name for the ticket. 43 * ticket. If keyproc is non-NULL, keyprocarg is passed to it, and the result 56 krb5_ticket **ticket) 96 server, keytab, ap_req_options, ticket); 53 krb5_rd_req(krb5_context context, krb5_auth_context *auth_context, const krb5_data *inbuf, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument
|
H A D | srv_dec_tkt.c | 28 * Server decrypt ticket via keytab or keyblock. 37 * - Does not free ticket->enc_part2 on error. 46 krb5_ticket *ticket) 52 retval = krb5_decrypt_tkt_part(context, key, ticket); 56 trans = &ticket->enc_part2->transited; 57 realm = &ticket->enc_part2->client->realm; 60 realm, &ticket->server->realm); 64 if (ticket->enc_part2->flags & TKT_FLG_INVALID) { /* ie, KDC_OPT_POSTDATED */ 77 krb5_ticket *ticket) 86 ticket 44 krb5int_server_decrypt_ticket_keyblock(krb5_context context, const krb5_keyblock *key, krb5_ticket *ticket) argument 75 krb5_server_decrypt_ticket_keytab(krb5_context context, const krb5_keytab keytab, krb5_ticket *ticket) argument [all...] |
H A D | recvauth.c | 53 krb5_ticket ** ticket, 151 keytab, &ap_option, ticket); 232 krb5_recvauth(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fd, char *appl_version, krb5_principal server, krb5_int32 flags, krb5_keytab keytab, krb5_ticket **ticket) argument 235 server, flags, keytab, ticket, 0); 247 krb5_ticket **ticket, 251 server, flags, keytab, ticket, version); 44 recvauth_common(krb5_context context, krb5_auth_context * auth_context, krb5_pointer fd, char *appl_version, krb5_principal server, krb5_int32 flags, krb5_keytab keytab, krb5_ticket ** ticket, krb5_data *version) argument 239 krb5_recvauth_version(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fd, krb5_principal server, krb5_int32 flags, krb5_keytab keytab, krb5_ticket **ticket, krb5_data *version) argument
|
H A D | rd_req_dec.c | 53 * server specifies the expected server's name for the ticket; if NULL, then 61 * ticket. If keyproc is non-NULL, keyprocarg is passed to it, and the result 106 server != NULL ? server : req->ticket->server, 107 req->ticket->enc_part.kvno, 108 req->ticket->enc_part.enctype, &ktent); 110 retval = krb5_decrypt_tkt_part(context, &ktent.key, req->ticket); 128 if (ktent.key.enctype != req->ticket->enc_part.enctype) { 134 req->ticket); 140 * We overwrite ticket->server to be the principal 149 * server as it appeared in the ticket 256 rd_req_decoded_opt(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, const krb5_data *raw_req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket, int check_valid_flag) argument 726 krb5_rd_req_decoded_ext(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, const krb5_data *raw_req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument 741 krb5_rd_req_decoded(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument 757 krb5_rd_req_decoded_anyflag_ext(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, const krb5_data *raw_req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument 773 krb5_rd_req_decoded_anyflag(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument [all...] |
/osnet-11/usr/src/lib/pam_modules/tty_tickets/ |
H A D | tty_tickets.c | 46 * The content of this ticket will be different between 32 bit and 64 bit 54 * the lifetime of a single ticket, it will look exactly like a ticket expiry. 136 int ticket = -1; local 152 ticket = open(ticketname, O_RDONLY|O_NOFOLLOW|O_NOCTTY, 0600); 153 if (ticket == -1) { 156 "pam_tty_tickets: unable to open ticket %s: %m", 162 if (fstat(ticket, &ticketsb) != 0) { 165 "pam_tty_tickets: unable to stat ticket %s: %m", 174 "pam_tty_tickets: invalid ticket 234 int ticket = -1; local [all...] |
/osnet-11/usr/src/lib/krb5/kadm5/srv/ |
H A D | chgpwd.c | 69 krb5_ticket *ticket; local 88 ticket = NULL; 191 NULL, &ticket); 343 client = ticket->enc_part2->client; 381 /* for cpw, verify that this is an AS_REQ ticket */ 383 (ticket->enc_part2->flags & TKT_FLG_INITIAL) == 0) { 605 if (ticket) 606 krb5_free_ticket(context, ticket);
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | accept_sec_context.c | 124 krb5_ticket *ticket, 137 krb_creds.client = ticket->enc_part2->client; 138 krb_creds.server = ticket->server; 139 krb_creds.keyblock = *(ticket->enc_part2->session); 140 krb_creds.ticket_flags = ticket->enc_part2->flags; 141 krb_creds.times = ticket->enc_part2->times; 145 code = encode_krb5_ticket(ticket, &data); 151 krb_creds.ticket = *data; 455 krb5_ticket * ticket = NULL; local 630 if ((code = krb5_copy_principal(context, request->ticket 122 create_constrained_deleg_creds(OM_uint32 *minor_status, krb5_gss_cred_id_t verifier_cred_handle, krb5_ticket *ticket, krb5_gss_cred_id_t *out_cred, krb5_context context) argument [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/include/krb5/ |
H A D | kdb.h | 331 krb5_const_principal client_princ; /* Client name used in ticket */ 334 krb5_db_entry *krbtgt; /* DB entry for ticket granting service principal */ 373 krb5_ticket *ticket; member in struct:_kdb_check_policy_tgs_req
|