Lines Matching refs:ticket
169 comp_cksum(krb5_context kcontext, krb5_data *source, krb5_ticket *ticket, in comp_cksum() argument
183 if ((retval = krb5_c_verify_checksum(kcontext, ticket->enc_part2->session, in comp_cksum()
196 krb5_data *pkt, krb5_ticket **ticket, in kdc_process_tgs_req() argument
242 if ((krb5_princ_realm(kdc_context, apreq->ticket->server)->length != in kdc_process_tgs_req()
244 memcmp(krb5_princ_realm(kdc_context, apreq->ticket->server)->data, in kdc_process_tgs_req()
278 apreq->ticket->server, in kdc_process_tgs_req()
280 NULL, ticket))) { in kdc_process_tgs_req()
298 apreq, apreq->ticket->server, in kdc_process_tgs_req()
300 NULL, ticket)) in kdc_process_tgs_req()
312 if (isflagset((*ticket)->enc_part2->flags, TKT_FLG_INVALID) in kdc_process_tgs_req()
335 (*ticket)->enc_part2->client); in kdc_process_tgs_req()
356 if (comp_cksum(kdc_context, &scratch1, *ticket, his_cksum)) { in kdc_process_tgs_req()
358 retval = comp_cksum(kdc_context, scratch, *ticket, his_cksum); in kdc_process_tgs_req()
386 kdc_get_server_key(krb5_ticket *ticket, krb5_keyblock **key, krb5_kvno *kvno) in kdc_get_server_key() argument
396 if ((retval = krb5_db_get_principal(kdc_context, ticket->server, in kdc_get_server_key()
408 if (!krb5_unparse_name(kdc_context, ticket->server, &sname)) { in kdc_get_server_key()
417 ticket->enc_part.enctype, -1, in kdc_get_server_key()
418 ticket->enc_part.kvno, &server_key); in kdc_get_server_key()
453 check_hot_list(krb5_ticket *ticket) in check_hot_list() argument
1124 krb5_ticket *ticket, krb5_timestamp kdc_time, in validate_tgs_request() argument
1147 if (!krb5_principal_compare(kdc_context, ticket->server, request->server)) { in validate_tgs_request()
1167 if (krb5_princ_size(kdc_context, ticket->server) != 2) { in validate_tgs_request()
1172 if (!krb5_is_tgs_principal(ticket->server)) { in validate_tgs_request()
1177 if ((krb5_princ_size(kdc_context, ticket->server) <= 1) || in validate_tgs_request()
1178 (krb5_princ_component(kdc_context, ticket->server, 1)->length != in validate_tgs_request()
1180 memcmp(krb5_princ_component(kdc_context, ticket->server, 1)->data, in validate_tgs_request()
1200 !isflagset(ticket->enc_part2->flags, TKT_FLG_FORWARDABLE)) { in validate_tgs_request()
1209 !isflagset(ticket->enc_part2->flags, TKT_FLG_PROXIABLE)) { in validate_tgs_request()
1217 !isflagset(ticket->enc_part2->flags, TKT_FLG_MAY_POSTDATE)) { in validate_tgs_request()
1224 !isflagset(ticket->enc_part2->flags, TKT_FLG_INVALID)) { in validate_tgs_request()
1232 !isflagset(ticket->enc_part2->flags, TKT_FLG_RENEWABLE)) { in validate_tgs_request()
1295 if (check_hot_list(ticket)) { in validate_tgs_request()
1302 if (ticket->enc_part2->times.starttime > kdc_time) { in validate_tgs_request()
1313 (ticket->enc_part2->times.renew_till < kdc_time)) { in validate_tgs_request()
1340 !isflagset(ticket->enc_part2->flags,TKT_FLG_HW_AUTH)) { in validate_tgs_request()
1347 !isflagset(ticket->enc_part2->flags, TKT_FLG_PRE_AUTH)) { in validate_tgs_request()
1355 errcode = against_local_policy_tgs(request, server, ticket, status); in validate_tgs_request()
1585 if (rep->ticket != NULL) { in rep_etypes2str()
1586 sprintf(stmp, " tkt=%ld", (long)rep->ticket->enc_part.enctype); in rep_etypes2str()
1590 if (rep->ticket != NULL in rep_etypes2str()
1591 && rep->ticket->enc_part2 != NULL in rep_etypes2str()
1592 && rep->ticket->enc_part2->session != NULL) { in rep_etypes2str()
1594 (long)rep->ticket->enc_part2->session->enctype); in rep_etypes2str()