Searched refs:ticket (Results 1 - 19 of 19) sorted by relevance

/openjdk7/jdk/src/share/classes/sun/security/jgss/krb5/
H A DSubjectComber.java132 KerberosTicket ticket = (KerberosTicket)obj;
134 System.out.println("Found ticket for "
135 + ticket.getClient()
137 + ticket.getServer()
139 + ticket.getEndTime());
141 if (!ticket.isCurrent()) {
142 // let us remove the ticket from the Subject
143 // Note that both TGT and service ticket will be
148 ticket.destroy();
152 + ticket);
[all...]
H A DKrb5Util.java67 * Retrieve the service ticket for serverPrincipal from caller's Subject
83 // 1. Try to find service ticket in acc subject
85 KerberosTicket ticket = SubjectComber.find(accSubj,
88 if (ticket != null) {
89 return ticket; // found it
94 // 2. Try to get ticket from login
97 ticket = SubjectComber.find(loginSubj,
99 if (ticket != null) {
100 return ticket; // found it
108 // Service ticket no
[all...]
/openjdk7/jdk/src/share/classes/sun/security/krb5/
H A DKrbApReq.java65 * session key from the ticket will be used.
89 * session key from the ticket will be used.
180 Ticket ticket,
192 init(apOptions, ticket, key, crealm, cname,
209 tgs_creds.ticket,
222 Ticket ticket,
235 createMessage(apOptions, ticket, key, crealm, cname,
268 int encPartKeyType = apReqMessg.ticket.encPart.getEType();
269 Integer kvno = apReqMessg.ticket.encPart.getKeyVersionNumber();
278 byte[] bytes = apReqMessg.ticket
179 KrbApReq(APOptions apOptions, Ticket ticket, EncryptionKey key, Realm crealm, PrincipalName cname, Checksum cksum, KerberosTime ctime, EncryptionKey subKey, SeqNumber seqNumber, AuthorizationData authorizationData) argument
221 init(APOptions apOptions, Ticket ticket, EncryptionKey key, Realm crealm, PrincipalName cname, Checksum cksum, KerberosTime ctime, EncryptionKey subKey, SeqNumber seqNumber, AuthorizationData authorizationData, int usage) argument
457 createMessage(APOptions apOptions, Ticket ticket, EncryptionKey key, Realm crealm, PrincipalName cname, Checksum cksum, KerberosTime ctime, EncryptionKey subKey, SeqNumber seqNumber, AuthorizationData authorizationData, int usage) argument
[all...]
H A DKrbTgsRep.java85 rep.ticket.sname.setRealm(rep.ticket.realm);
90 creds = new Credentials(rep.ticket,
92 rep.ticket.sname,
H A DKrbAsRep.java155 rep.ticket.sname.setRealm(rep.ticket.realm);
162 rep.ticket,
164 rep.ticket.sname,
H A DKrbCred.java43 * Supports delegation of one ticket only.
52 private Ticket ticket = null; field in class:KrbCred
116 Ticket[] tickets = {delegatedCreds.ticket};
129 ticket = credMessg.tickets[0];
164 creds = new Credentials(ticket, pname, sname, credInfoKey,
H A DCredentials.java44 * credential. That includes a Kerberos ticket and an associated
49 Ticket ticket; field in class:Credentials
93 ticket = new_ticket;
129 * Acquires a service ticket for the specified service
130 * principal. If the service ticket is not already available, it
200 retVal = ticket.asn1Encode();
220 return ticket;
231 * Checks if the service ticket returned by the KDC has the OK-AS-DELEGATE
244 * the service ticket is cached it still remembers the cross-realm
273 * Returns a TGT for the given client principal from a ticket cach
[all...]
H A DKrbTgsReq.java138 // there is only one additional ticket field.
147 asCreds.ticket,
167 * If this is based on a forwarded ticket, record that in the
213 Ticket ticket,
240 * the session key from the ticket-granting ticket used
316 ticket,
211 createRequest( KDCOptions kdc_options, Ticket ticket, EncryptionKey key, KerberosTime ctime, PrincipalName cname, Realm crealm, PrincipalName sname, KerberosTime from, KerberosTime till, KerberosTime rtime, int[] eTypes, HostAddresses addresses, AuthorizationData authorizationData, Ticket[] additionalTickets, EncryptionKey subKey) argument
/openjdk7/jdk/test/java/util/concurrent/ThreadPoolExecutor/
H A DScheduledTickleService.java79 // remember my own scheduled ticket
80 private ScheduledFuture ticket = null; field in class:ScheduledTickleService.ScheduledTickle
97 // cancel & remove previously created ticket
98 if (ticket != null) {
99 ticket.cancel(false);
100 ticket = null;
105 ticket = service.scheduleAtFixedRate(this, interval,
/openjdk7/jdk/src/share/classes/sun/security/krb5/internal/ccache/
H A DCredentials.java49 public boolean isEncInSKey; // true if ticket is encrypted in another ticket's skey
51 Ticket ticket; field in class:Credentials
98 ticket = (Ticket) (new_ticket.clone());
115 ticket = (Ticket) kdcRep.ticket.clone();
175 ticket = (Ticket) kdcRep.ticket.clone();
212 return new sun.security.krb5.Credentials(ticket,
H A DCCacheOutputStream.java97 writeTicket(creds.ticket);
/openjdk7/jdk/src/share/classes/sun/security/ssl/krb5/
H A DKerberosClientKeyExchangeImpl.java63 * (CLIENT -> SERVER). It holds the Kerberos ticket and the encrypted
64 * premaster secret encrypted with the session key sealed in the ticket.
71 * // which is sealed in the ticket
96 * Kerberos service ticket, authenticator and encrypted premaster secret.
100 * this is used to get the Kerberos service ticket
111 // Get service ticket
112 KerberosTicket ticket = getServiceTicket(serverName, isLoopback, acc);
113 encodedTicket = ticket.getEncoded();
116 peerPrincipal = ticket.getServer();
117 localPrincipal = ticket
[all...]
/openjdk7/jdk/src/share/classes/sun/security/krb5/internal/
H A DAPReq.java46 * ticket [3] Ticket,
62 public Ticket ticket; field in class:APReq
72 ticket = new_ticket;
121 ticket = Ticket.parse(der.getData(), (byte) 0x03, false);
143 bytes.write(DerValue.createTag(DerValue.TAG_CONTEXT, true, (byte) 0x03), ticket.asn1Encode());
H A DTicket.java135 * @return byte array of encoded ticket object.
150 DerOutputStream ticket = new DerOutputStream();
151 ticket.write(DerValue.createTag(DerValue.TAG_APPLICATION, true, (byte)0x01), temp);
152 return ticket.toByteArray();
H A DKDCRep.java49 * ticket [5] Ticket,
66 public Ticket ticket; field in class:KDCRep
95 ticket = new_ticket;
179 ticket = Ticket.parse(der.getData(), (byte) 0x05, false);
219 true, (byte) 0x05), ticket.asn1Encode());
/openjdk7/jdk/src/share/native/sun/security/krb5/
H A Dnativeccache.c309 jobject ticket, clientPrincipal, targetPrincipal, encryptionKey; local
313 ticket = clientPrincipal = targetPrincipal = encryptionKey = NULL;
325 ticket = BuildTicket(env, &creds.ticket);
326 if (ticket == NULL) goto cleanup;
332 // and the ticket flags
366 ticket,
377 if (ticket) (*env)->DeleteLocalRef(env, ticket);
397 printiferr (err, "while retrieving a ticket");
425 jobject derValue, ticket; local
[all...]
/openjdk7/jdk/src/windows/native/sun/security/krb5/
H A DNativeCreds.c395 jobject ticket, clientPrincipal, targetPrincipal, encryptionKey; local
494 printf("LSA: MS TGT in cache is invalid/not supported; request new ticket\n");
583 ticket = BuildTicket(env, msticket->EncodedTicket,
585 if (ticket == NULL) {
608 // and the ticket flags
644 ticket,
708 // The ticket request buffer needs to be a single buffer. That buffer
874 jobject derValue, ticket; local
896 ticket = (*env)->NewObject(env, ticketClass, ticketConstructor, derValue);
902 return ticket;
[all...]
/openjdk7/hotspot/src/share/vm/runtime/
H A DvmThread.cpp620 // Get ticket number for non-concurrent VM operations
621 int ticket = 0; local
623 ticket = t->vm_operation_ticket();
647 while(t->vm_operation_completed_count() < ticket) {
/openjdk7/jdk/test/sun/security/krb5/auto/
H A DKDC.java661 int e3 = eTypes[0]; // etype for outgoing ticket
674 tkt = apReq.ticket;
689 // Session key for original ticket, TGT
761 // Next 5 and last MUST be same with ticket
780 + " ticket for " + tgsRep.ticket.sname);
1032 // Next 5 and last MUST be same with ticket
1050 + " ticket for " + asRep.ticket.sname);

Completed in 52 milliseconds