Home
last modified time | relevance | path

Searched refs:ticket (Results 1 – 25 of 150) sorted by relevance

123456

/freebsd/crypto/openssl/test/ssl-tests/
H A D06-sni-ticket.cnf5 test-0 = 0-sni-session-ticket
6 test-1 = 1-sni-session-ticket
7 test-2 = 2-sni-session-ticket
8 test-3 = 3-sni-session-ticket
9 test-4 = 4-sni-session-ticket
10 test-5 = 5-sni-session-ticket
11 test-6 = 6-sni-session-ticket
12 test-7 = 7-sni-session-ticket
13 test-8 = 8-sni-session-ticket
14 test-9 = 9-sni-session-ticket
[all …]
H A D27-ticket-appdata.cnf5 test-0 = 0-session-ticket-app-data12
6 test-1 = 1-session-ticket-app-data12
7 test-2 = 2-session-ticket-app-data13
8 test-3 = 3-session-ticket-app-data13
11 [0-session-ticket-app-data12]
12 ssl_conf = 0-session-ticket-app-data12-ssl
14 [0-session-ticket-app-data12-ssl]
15 server = 0-session-ticket-app-data12-server
16 client = 0-session-ticket-app-data12-client
17 resume-server = 0-session-ticket-app-data12-server
[all …]
H A D27-ticket-appdata.cnf.in10 ## Test session ticket app data
20 "name" => "session-ticket-app-data12",
40 "name" => "session-ticket-app-data12",
59 "name" => "session-ticket-app-data13",
79 "name" => "session-ticket-app-data13",
/freebsd/sys/contrib/ck/include/spinlock/
H A Dticket.h78 ck_spinlock_ticket_init(struct ck_spinlock_ticket *ticket) in ck_spinlock_ticket_init() argument
81 ticket->value = 0; in ck_spinlock_ticket_init()
87 ck_spinlock_ticket_locked(struct ck_spinlock_ticket *ticket) in ck_spinlock_ticket_locked() argument
91 request = CK_SPINLOCK_TICKET_LOAD(&ticket->value); in ck_spinlock_ticket_locked()
100 ck_spinlock_ticket_lock(struct ck_spinlock_ticket *ticket) in ck_spinlock_ticket_lock() argument
105 request = CK_SPINLOCK_TICKET_FAA(&ticket->value, in ck_spinlock_ticket_lock()
113 position = CK_SPINLOCK_TICKET_LOAD(&ticket->value) & in ck_spinlock_ticket_lock()
122 ck_spinlock_ticket_lock_pb(struct ck_spinlock_ticket *ticket, unsigned int c) in ck_spinlock_ticket_lock_pb() argument
128 request = CK_SPINLOCK_TICKET_FAA(&ticket->value, in ck_spinlock_ticket_lock_pb()
136 position = CK_SPINLOCK_TICKET_LOAD(&ticket->value) & in ck_spinlock_ticket_lock_pb()
[all …]
/freebsd/crypto/heimdal/lib/krb5/
H A Drd_req.c126 if (ap_req->ticket.tkt_vno != 5){ in krb5_decode_ap_req()
135 check_transited(krb5_context context, Ticket *ticket, EncTicketPart *enc) in check_transited() argument
158 ticket->realm); in check_transited()
162 ticket->realm, in check_transited()
225 Ticket *ticket, in krb5_decrypt_ticket() argument
232 ret = decrypt_tkt_enc_part (context, key, &ticket->enc_part, &t); in krb5_decrypt_ticket()
257 ret = check_transited(context, ticket, &t); in krb5_decrypt_ticket()
322 krb5_ticket **ticket) in krb5_verify_ap_req() argument
331 ticket, in krb5_verify_ap_req()
343 krb5_ticket **ticket, in krb5_verify_ap_req2() argument
[all …]
H A Dticket.c52 krb5_ticket *ticket) in krb5_free_ticket() argument
54 free_EncTicketPart(&ticket->ticket); in krb5_free_ticket()
55 krb5_free_principal(context, ticket->client); in krb5_free_ticket()
56 krb5_free_principal(context, ticket->server); in krb5_free_ticket()
57 free(ticket); in krb5_free_ticket()
89 if((ret = copy_EncTicketPart(&from->ticket, &tmp->ticket))){ in krb5_copy_ticket()
95 free_EncTicketPart(&tmp->ticket); in krb5_copy_ticket()
102 free_EncTicketPart(&tmp->ticket); in krb5_copy_ticket()
125 const krb5_ticket *ticket, in krb5_ticket_get_client() argument
128 return krb5_copy_principal(context, ticket->client, client); in krb5_ticket_get_client()
[all …]
H A Dkrb_err.et24 ec GC_TKFIL, "Can't read Kerberos 4 ticket file"
25 ec GC_NOTKT, "Can't find Kerberos 4 ticket or TGT"
30 ec RD_AP_EXP, "Kerberos 4 ticket expired"
31 ec RD_AP_NYV, "Kerberos 4 ticket not yet valid"
33 ec RD_AP_NOT_US, "The Kerberos 4 ticket isn't for us"
47 ec GT_PW_NULLTKT, "Null Kerberos 4 ticket returned by KDC"
56 ec AD_NOTGT, "Don't have Kerberos 4 ticket-granting ticket"
58 ec NO_TKT_FIL, "No Kerberos 4 ticket file found"
59 ec TKT_FIL_ACC, "Couldn't access Kerberos 4 ticket file"
60 ec TKT_FIL_LCK, "Couldn't lock Kerberos 4 ticket file"
[all …]
H A Drecvauth.c54 krb5_ticket **ticket) in krb5_recvauth() argument
59 keytab, ticket); in krb5_recvauth()
72 krb5_ticket **ticket) in krb5_recvauth_match_version() argument
178 ticket); in krb5_recvauth_match_version()
204 krb5_free_ticket(context, *ticket); in krb5_recvauth_match_version()
205 *ticket = NULL; in krb5_recvauth_match_version()
212 krb5_free_ticket(context, *ticket); in krb5_recvauth_match_version()
213 *ticket = NULL; in krb5_recvauth_match_version()
219 krb5_free_ticket(context, *ticket); in krb5_recvauth_match_version()
220 *ticket = NULL; in krb5_recvauth_match_version()
H A Dbuild_ap_req.c55 ap.ticket.tkt_vno = 5; in krb5_build_ap_req()
56 copy_Realm(&cred->server->realm, &ap.ticket.realm); in krb5_build_ap_req()
57 copy_PrincipalName(&cred->server->name, &ap.ticket.sname); in krb5_build_ap_req()
59 decode_Ticket(cred->ticket.data, cred->ticket.length, &t, &len); in krb5_build_ap_req()
60 copy_EncryptedData(&t.enc_part, &ap.ticket.enc_part); in krb5_build_ap_req()
H A Dget_cred.c931 krb5_creds tgt, referral, ticket; in get_cred_kdc_referral() local
942 memset(&ticket, 0, sizeof(ticket)); in get_cred_kdc_referral()
990 ret = krb5_cc_retrieve_cred(context, ccache, 0, &mcreds, &ticket); in get_cred_kdc_referral()
997 second_ticket, &ticket); in get_cred_kdc_referral()
1005 ticket.server)) in get_cred_kdc_referral()
1008 if (!krb5_principal_is_krbtgt(context, ticket.server)) { in get_cred_kdc_referral()
1016 referral_realm = ticket.server->name.name_string.val[1]; in get_cred_kdc_referral()
1022 mcreds.server = ticket.server; in get_cred_kdc_referral()
1046 if (ok_as_delegate == 0 || ticket.flags.b.ok_as_delegate == 0) { in get_cred_kdc_referral()
1048 ticket.flags.b.ok_as_delegate = 0; in get_cred_kdc_referral()
[all …]
/freebsd/crypto/openssl/doc/man3/
H A DSSL_CTX_set_session_ticket_cb.pod9 SSL_CTX_decrypt_session_ticket_fn - manage session ticket application data
32 with a session, and placed into a session ticket. Either callback function may
35 B<gen_cb> is the application defined callback invoked when a session ticket is
37 at this time to add application data to the session ticket. The value of B<arg>
41 B<dec_cb> is the application defined callback invoked after session ticket
42 decryption has been attempted and any session ticket application data is
43 available. If ticket decryption was successful then the B<ss> argument contains
45 used to decrypt the session ticket. The B<status> argument is the result of the
46 ticket decryption. See the L</NOTES> section below for further details. The value
52 tickets. It can be called at any time before a session ticket is created to
[all …]
H A DSSL_SESSION_has_ticket.pod7 - get details about the ticket associated with a session
24 associated with the session ticket.
26 SSL_SESSION_get0_ticket obtains a pointer to the ticket associated with a
27 session. The length of the ticket is written to B<*len>. If B<tick> is non
28 NULL then a pointer to the ticket is written to B<*tick>. The pointer is only
29 valid while the connection is in use. The session (and hence the ticket pointer)
34 SSL_SESSION_has_ticket() returns 1 if session ticket exists or 0 otherwise.
H A DSSL_CTX_set_tlsext_ticket_key_cb.pod7 - set a callback for session ticket processing
36 session when session ticket extension is presented in the TLS hello
41 ticket construction state according to RFC5077 Section 4 such that per session
45 In order to reuse a session, a TLS client must send the session ticket
46 extension to the server. The client must send exactly one session ticket.
48 ticket information or it starts a full TLS handshake to create a new session
49 ticket.
55 For new sessions tickets, when the client doesn't present a session ticket, or
56 an attempted retrieval of the ticket failed, or a renew option was indicated,
72 When the client presents a session ticket, the callback function with be called
[all …]
H A DSSL_CTX_set_num_tickets.pod47 ticket be sent when it is safe to do so. New tickets are only allowed to be
49 TLS 1.3 connections. By default, the ticket generation and transmission are
53 SSL_new_session_ticket() was called, the ticket can be sent immediately
59 SSL_new_session_ticket() indicates only that the request to send a ticket was
60 processed, not that the ticket itself was sent. To be notified when the
61 ticket itself is sent, a new-session callback can be registered with
62 L<SSL_CTX_sess_set_new_cb(3)> that will be invoked as the ticket or tickets
/freebsd/crypto/openssl/util/perl/TLSProxy/
H A DNewSessionTicket.pm33 $self->{ticket} = "";
44 my $ticket = substr($self->data, 6, $ticket_len);
47 $self->ticket($ticket);
58 $data .= pack('n', length($self->ticket));
59 $data .= $self->ticket;
73 sub ticket subroutine
77 $self->{ticket} = shift;
79 return $self->{ticket};
/freebsd/crypto/heimdal/lib/kafs/
H A Dafskrb5.c52 kt->ticket = NULL; in v5_to_kt()
66 ret = decode_Ticket(cred->ticket.data, cred->ticket.length, &t, &len); in v5_to_kt()
82 kt->ticket = buf; in v5_to_kt()
87 kt->ticket = malloc(cred->ticket.length); in v5_to_kt()
88 if (kt->ticket == NULL) in v5_to_kt()
90 kt->ticket_len = cred->ticket.length; in v5_to_kt()
91 memcpy(kt->ticket, cred->ticket.data, kt->ticket_len); in v5_to_kt()
225 kt.ticket = NULL; in afslog_uid_int()
230 ret = kafs_settoken_rxkad(cell, &kt.ct, kt.ticket, kt.ticket_len); in afslog_uid_int()
231 free(kt.ticket); in afslog_uid_int()
[all …]
/freebsd/sys/contrib/ck/include/
H A Dck_pflock.h87 uint32_t ticket; in ck_pflock_write_lock() local
90 ticket = ck_pr_faa_32(&pf->win, 1); in ck_pflock_write_lock()
91 while (ck_pr_load_32(&pf->wout) != ticket) in ck_pflock_write_lock()
99 ticket = ck_pr_faa_32(&pf->rin, in ck_pflock_write_lock()
100 (ticket & CK_PFLOCK_PHID) | CK_PFLOCK_PRES); in ck_pflock_write_lock()
103 while (ck_pr_load_32(&pf->rout) != ticket) in ck_pflock_write_lock()
H A Dck_ring.h256 unsigned int *ticket, in _ck_ring_enqueue_reserve_mp() argument
292 *ticket = producer; in _ck_ring_enqueue_reserve_mp()
567 unsigned int *ticket) in ck_ring_enqueue_reserve_mpmc() argument
571 ticket, NULL); in ck_ring_enqueue_reserve_mpmc()
577 unsigned int *ticket, in ck_ring_enqueue_reserve_mpmc_size() argument
582 ticket, size); in ck_ring_enqueue_reserve_mpmc_size()
586 ck_ring_enqueue_commit_mpmc(struct ck_ring *ring, unsigned int ticket) in ck_ring_enqueue_commit_mpmc() argument
589 _ck_ring_enqueue_commit_mp(ring, ticket); in ck_ring_enqueue_commit_mpmc()
690 unsigned int *ticket) in ck_ring_enqueue_reserve_mpsc() argument
694 ticket, NULL); in ck_ring_enqueue_reserve_mpsc()
[all …]
/freebsd/crypto/heimdal/kpasswd/
H A Dkpasswdd.c435 krb5_ticket **ticket, in verify() argument
491 ticket); in verify()
512 same = krb5_principal_compare(context, principal, (*ticket)->server); in verify()
519 krb5_unparse_name(context, (*ticket)->server, &str); in verify()
527 if (strcmp((*ticket)->server->realm, (*ticket)->client->realm) != 0) { in verify()
529 (*ticket)->server->realm, (*ticket)->client->realm); in verify()
530 reply_error ((*ticket)->server->realm, s, sa, sa_size, ret, 1, in verify()
535 if (!(*ticket)->ticket.flags.initial) { in verify()
537 reply_error ((*ticket)->server->realm, s, sa, sa_size, ret, 1, in verify()
550 if ((*ticket)->ticket.caddr && (*ticket)->ticket.caddr->len > 0) { in verify()
[all …]
/freebsd/crypto/heimdal/appl/test/
H A Duu_client.c53 krb5_ticket *ticket; in proto() local
124 status = krb5_write_message(context, &sock, &cred.ticket); in proto()
133 VERSION, client, 0, NULL, &ticket); in proto()
138 if (ticket->ticket.authorization_data) { in proto()
144 authz = ticket->ticket.authorization_data; in proto()
/freebsd/crypto/heimdal/kuser/
H A Dkimpersonate.c73 Ticket ticket; in encode_ticket() local
76 memset (&ticket, 0, sizeof(ticket)); in encode_ticket()
117 &ticket.enc_part); in encode_ticket()
128 ticket.tkt_vno = 5; in encode_ticket()
129 ticket.realm = cred->server->realm; in encode_ticket()
130 copy_PrincipalName(&cred->server->name, &ticket.sname); in encode_ticket()
132 ASN1_MALLOC_ENCODE(Ticket, buf, len, &ticket, &size, ret); in encode_ticket()
136 krb5_data_copy(&cred->ticket, buf, len); in encode_ticket()
H A Dkgetcred.c159 Ticket ticket; in main() local
174 ret = decode_Ticket(c.ticket.data, c.ticket.length, &ticket, NULL); in main()
181 ret = krb5_get_creds_opt_set_ticket(context, opt, &ticket); in main()
184 free_Ticket(&ticket); in main()
/freebsd/lib/libpfctl/
H A Dlibpfctl.h75 uint32_t ticket; member
159 uint32_t ticket; member
270 uint32_t ticket; member
434 int pfctl_get_eth_rule(int dev, uint32_t nr, uint32_t ticket,
438 const char *anchor, const char *anchor_call, uint32_t ticket);
444 int pfctl_get_rule(int dev, uint32_t nr, uint32_t ticket,
447 int pfctl_get_rule_h(struct pfctl_handle *h, uint32_t nr, uint32_t ticket,
450 int pfctl_get_clear_rule(int dev, uint32_t nr, uint32_t ticket,
453 int pfctl_get_clear_rule_h(struct pfctl_handle *h, uint32_t nr, uint32_t ticket,
457 const char *anchor, const char *anchor_call, uint32_t ticket,
[all …]
/freebsd/crypto/heimdal/lib/gssapi/krb5/
H A Dticket_flags.c47 if (ctx->ticket == NULL) { in _gsskrb5_get_tkt_flags()
53 *tkt_flags = TicketFlags2int(ctx->ticket->ticket.flags); in _gsskrb5_get_tkt_flags()
/freebsd/crypto/heimdal/doc/
H A Dwhatis.texi69 To obtain a ticket for a specific service, @var{A} sends a ticket
77 of the ticket (@var{life}), and a secret @dfn{session key}
80 (@var{K@sub{B}}). The actual ticket (@var{T@sub{AB}}) looks like this:
84 The reply to @var{A} consists of the ticket (@var{T@sub{AB}}), @var{B}'s
85 name, the current time, the lifetime of the ticket, and the session key, all
96 @var{checksum}@}@var{K@sub{AB}}). This is sent together with the ticket
98 decrypts the ticket using @var{B}'s secret key. Since the ticket
101 really is @var{A}, @var{B} now has to compare the contents of the ticket
111 An impostor, @var{C} could steal the authenticator and the ticket as it
113 @var{A}. The address in the ticket and the authenticator was added to

123456