/openjdk7/jdk/src/share/classes/sun/security/jgss/krb5/ |
H A D | SubjectComber.java | 132 KerberosTicket ticket = (KerberosTicket)obj; 134 System.out.println("Found ticket for " 135 + ticket.getClient() 137 + ticket.getServer() 139 + ticket.getEndTime()); 141 if (!ticket.isCurrent()) { 142 // let us remove the ticket from the Subject 143 // Note that both TGT and service ticket will be 148 ticket.destroy(); 152 + ticket); [all...] |
H A D | Krb5Util.java | 67 * Retrieve the service ticket for serverPrincipal from caller's Subject 83 // 1. Try to find service ticket in acc subject 85 KerberosTicket ticket = SubjectComber.find(accSubj, 88 if (ticket != null) { 89 return ticket; // found it 94 // 2. Try to get ticket from login 97 ticket = SubjectComber.find(loginSubj, 99 if (ticket != null) { 100 return ticket; // found it 108 // Service ticket no [all...] |
/openjdk7/jdk/src/share/classes/sun/security/krb5/ |
H A D | KrbApReq.java | 65 * session key from the ticket will be used. 89 * session key from the ticket will be used. 180 Ticket ticket, 192 init(apOptions, ticket, key, crealm, cname, 209 tgs_creds.ticket, 222 Ticket ticket, 235 createMessage(apOptions, ticket, key, crealm, cname, 268 int encPartKeyType = apReqMessg.ticket.encPart.getEType(); 269 Integer kvno = apReqMessg.ticket.encPart.getKeyVersionNumber(); 278 byte[] bytes = apReqMessg.ticket 179 KrbApReq(APOptions apOptions, Ticket ticket, EncryptionKey key, Realm crealm, PrincipalName cname, Checksum cksum, KerberosTime ctime, EncryptionKey subKey, SeqNumber seqNumber, AuthorizationData authorizationData) argument 221 init(APOptions apOptions, Ticket ticket, EncryptionKey key, Realm crealm, PrincipalName cname, Checksum cksum, KerberosTime ctime, EncryptionKey subKey, SeqNumber seqNumber, AuthorizationData authorizationData, int usage) argument 457 createMessage(APOptions apOptions, Ticket ticket, EncryptionKey key, Realm crealm, PrincipalName cname, Checksum cksum, KerberosTime ctime, EncryptionKey subKey, SeqNumber seqNumber, AuthorizationData authorizationData, int usage) argument [all...] |
H A D | KrbTgsRep.java | 85 rep.ticket.sname.setRealm(rep.ticket.realm); 90 creds = new Credentials(rep.ticket, 92 rep.ticket.sname,
|
H A D | KrbAsRep.java | 155 rep.ticket.sname.setRealm(rep.ticket.realm); 162 rep.ticket, 164 rep.ticket.sname,
|
H A D | KrbCred.java | 43 * Supports delegation of one ticket only. 52 private Ticket ticket = null; field in class:KrbCred 116 Ticket[] tickets = {delegatedCreds.ticket}; 129 ticket = credMessg.tickets[0]; 164 creds = new Credentials(ticket, pname, sname, credInfoKey,
|
H A D | Credentials.java | 44 * credential. That includes a Kerberos ticket and an associated 49 Ticket ticket; field in class:Credentials 93 ticket = new_ticket; 129 * Acquires a service ticket for the specified service 130 * principal. If the service ticket is not already available, it 200 retVal = ticket.asn1Encode(); 220 return ticket; 231 * Checks if the service ticket returned by the KDC has the OK-AS-DELEGATE 244 * the service ticket is cached it still remembers the cross-realm 273 * Returns a TGT for the given client principal from a ticket cach [all...] |
H A D | KrbTgsReq.java | 138 // there is only one additional ticket field. 147 asCreds.ticket, 167 * If this is based on a forwarded ticket, record that in the 213 Ticket ticket, 240 * the session key from the ticket-granting ticket used 316 ticket, 211 createRequest( KDCOptions kdc_options, Ticket ticket, EncryptionKey key, KerberosTime ctime, PrincipalName cname, Realm crealm, PrincipalName sname, KerberosTime from, KerberosTime till, KerberosTime rtime, int[] eTypes, HostAddresses addresses, AuthorizationData authorizationData, Ticket[] additionalTickets, EncryptionKey subKey) argument
|
/openjdk7/jdk/test/java/util/concurrent/ThreadPoolExecutor/ |
H A D | ScheduledTickleService.java | 79 // remember my own scheduled ticket 80 private ScheduledFuture ticket = null; field in class:ScheduledTickleService.ScheduledTickle 97 // cancel & remove previously created ticket 98 if (ticket != null) { 99 ticket.cancel(false); 100 ticket = null; 105 ticket = service.scheduleAtFixedRate(this, interval,
|
/openjdk7/jdk/src/share/classes/sun/security/krb5/internal/ccache/ |
H A D | Credentials.java | 49 public boolean isEncInSKey; // true if ticket is encrypted in another ticket's skey 51 Ticket ticket; field in class:Credentials 98 ticket = (Ticket) (new_ticket.clone()); 115 ticket = (Ticket) kdcRep.ticket.clone(); 175 ticket = (Ticket) kdcRep.ticket.clone(); 212 return new sun.security.krb5.Credentials(ticket,
|
H A D | CCacheOutputStream.java | 97 writeTicket(creds.ticket);
|
/openjdk7/jdk/src/share/classes/sun/security/ssl/krb5/ |
H A D | KerberosClientKeyExchangeImpl.java | 63 * (CLIENT -> SERVER). It holds the Kerberos ticket and the encrypted 64 * premaster secret encrypted with the session key sealed in the ticket. 71 * // which is sealed in the ticket 96 * Kerberos service ticket, authenticator and encrypted premaster secret. 100 * this is used to get the Kerberos service ticket 111 // Get service ticket 112 KerberosTicket ticket = getServiceTicket(serverName, isLoopback, acc); 113 encodedTicket = ticket.getEncoded(); 116 peerPrincipal = ticket.getServer(); 117 localPrincipal = ticket [all...] |
/openjdk7/jdk/src/share/classes/sun/security/krb5/internal/ |
H A D | APReq.java | 46 * ticket [3] Ticket, 62 public Ticket ticket; field in class:APReq 72 ticket = new_ticket; 121 ticket = Ticket.parse(der.getData(), (byte) 0x03, false); 143 bytes.write(DerValue.createTag(DerValue.TAG_CONTEXT, true, (byte) 0x03), ticket.asn1Encode());
|
H A D | Ticket.java | 135 * @return byte array of encoded ticket object. 150 DerOutputStream ticket = new DerOutputStream(); 151 ticket.write(DerValue.createTag(DerValue.TAG_APPLICATION, true, (byte)0x01), temp); 152 return ticket.toByteArray();
|
H A D | KDCRep.java | 49 * ticket [5] Ticket, 66 public Ticket ticket; field in class:KDCRep 95 ticket = new_ticket; 179 ticket = Ticket.parse(der.getData(), (byte) 0x05, false); 219 true, (byte) 0x05), ticket.asn1Encode());
|
/openjdk7/jdk/src/share/native/sun/security/krb5/ |
H A D | nativeccache.c | 309 jobject ticket, clientPrincipal, targetPrincipal, encryptionKey; local 313 ticket = clientPrincipal = targetPrincipal = encryptionKey = NULL; 325 ticket = BuildTicket(env, &creds.ticket); 326 if (ticket == NULL) goto cleanup; 332 // and the ticket flags 366 ticket, 377 if (ticket) (*env)->DeleteLocalRef(env, ticket); 397 printiferr (err, "while retrieving a ticket"); 425 jobject derValue, ticket; local [all...] |
/openjdk7/jdk/src/windows/native/sun/security/krb5/ |
H A D | NativeCreds.c | 395 jobject ticket, clientPrincipal, targetPrincipal, encryptionKey; local 494 printf("LSA: MS TGT in cache is invalid/not supported; request new ticket\n"); 583 ticket = BuildTicket(env, msticket->EncodedTicket, 585 if (ticket == NULL) { 608 // and the ticket flags 644 ticket, 708 // The ticket request buffer needs to be a single buffer. That buffer 874 jobject derValue, ticket; local 896 ticket = (*env)->NewObject(env, ticketClass, ticketConstructor, derValue); 902 return ticket; [all...] |
/openjdk7/hotspot/src/share/vm/runtime/ |
H A D | vmThread.cpp | 620 // Get ticket number for non-concurrent VM operations 621 int ticket = 0; local 623 ticket = t->vm_operation_ticket(); 647 while(t->vm_operation_completed_count() < ticket) {
|
/openjdk7/jdk/test/sun/security/krb5/auto/ |
H A D | KDC.java | 661 int e3 = eTypes[0]; // etype for outgoing ticket 674 tkt = apReq.ticket; 689 // Session key for original ticket, TGT 761 // Next 5 and last MUST be same with ticket 780 + " ticket for " + tgsRep.ticket.sname); 1032 // Next 5 and last MUST be same with ticket 1050 + " ticket for " + asRep.ticket.sname);
|