Home
last modified time | relevance | path

Searched refs:ticket (Results 1 – 25 of 270) sorted by relevance

1234567891011

/freebsd/crypto/openssl/test/ssl-tests/
H A D06-sni-ticket.cnf5 test-0 = 0-sni-session-ticket
6 test-1 = 1-sni-session-ticket
7 test-2 = 2-sni-session-ticket
8 test-3 = 3-sni-session-ticket
9 test-4 = 4-sni-session-ticket
10 test-5 = 5-sni-session-ticket
11 test-6 = 6-sni-session-ticket
12 test-7 = 7-sni-session-ticket
13 test-8 = 8-sni-session-ticket
14 test-9 = 9-sni-session-ticket
[all …]
H A D27-ticket-appdata.cnf5 test-0 = 0-session-ticket-app-data12
6 test-1 = 1-session-ticket-app-data12
7 test-2 = 2-session-ticket-app-data13
8 test-3 = 3-session-ticket-app-data13
11 [0-session-ticket-app-data12]
12 ssl_conf = 0-session-ticket-app-data12-ssl
14 [0-session-ticket-app-data12-ssl]
15 server = 0-session-ticket-app-data12-server
16 client = 0-session-ticket-app-data12-client
17 resume-server = 0-session-ticket-app-data12-server
[all …]
H A D27-ticket-appdata.cnf.in10 ## Test session ticket app data
20 "name" => "session-ticket-app-data12",
40 "name" => "session-ticket-app-data12",
59 "name" => "session-ticket-app-data13",
79 "name" => "session-ticket-app-data13",
/freebsd/sys/contrib/ck/include/spinlock/
H A Dticket.h78 ck_spinlock_ticket_init(struct ck_spinlock_ticket *ticket) in ck_spinlock_ticket_init() argument
81 ticket->value = 0; in ck_spinlock_ticket_init()
87 ck_spinlock_ticket_locked(struct ck_spinlock_ticket *ticket) in ck_spinlock_ticket_locked() argument
91 request = CK_SPINLOCK_TICKET_LOAD(&ticket->value); in ck_spinlock_ticket_locked()
100 ck_spinlock_ticket_lock(struct ck_spinlock_ticket *ticket) in ck_spinlock_ticket_lock() argument
105 request = CK_SPINLOCK_TICKET_FAA(&ticket->value, in ck_spinlock_ticket_lock()
113 position = CK_SPINLOCK_TICKET_LOAD(&ticket->value) & in ck_spinlock_ticket_lock()
122 ck_spinlock_ticket_lock_pb(struct ck_spinlock_ticket *ticket, unsigned int c) in ck_spinlock_ticket_lock_pb() argument
128 request = CK_SPINLOCK_TICKET_FAA(&ticket->value, in ck_spinlock_ticket_lock_pb()
136 position = CK_SPINLOCK_TICKET_LOAD(&ticket->value) & in ck_spinlock_ticket_lock_pb()
[all …]
/freebsd/crypto/heimdal/lib/krb5/
H A Drd_req.c126 if (ap_req->ticket.tkt_vno != 5){ in krb5_decode_ap_req()
135 check_transited(krb5_context context, Ticket *ticket, EncTicketPart *enc) in check_transited() argument
158 ticket->realm); in check_transited()
162 ticket->realm, in check_transited()
225 Ticket *ticket, in krb5_decrypt_ticket() argument
232 ret = decrypt_tkt_enc_part (context, key, &ticket->enc_part, &t); in krb5_decrypt_ticket()
257 ret = check_transited(context, ticket, &t); in krb5_decrypt_ticket()
322 krb5_ticket **ticket) in krb5_verify_ap_req() argument
331 ticket, in krb5_verify_ap_req()
343 krb5_ticket **ticket, in krb5_verify_ap_req2() argument
[all …]
H A Dticket.c52 krb5_ticket *ticket) in krb5_free_ticket() argument
54 free_EncTicketPart(&ticket->ticket); in krb5_free_ticket()
55 krb5_free_principal(context, ticket->client); in krb5_free_ticket()
56 krb5_free_principal(context, ticket->server); in krb5_free_ticket()
57 free(ticket); in krb5_free_ticket()
89 if((ret = copy_EncTicketPart(&from->ticket, &tmp->ticket))){ in krb5_copy_ticket()
95 free_EncTicketPart(&tmp->ticket); in krb5_copy_ticket()
102 free_EncTicketPart(&tmp->ticket); in krb5_copy_ticket()
125 const krb5_ticket *ticket, in krb5_ticket_get_client() argument
128 return krb5_copy_principal(context, ticket->client, client); in krb5_ticket_get_client()
[all …]
H A Dkrb_err.et24 ec GC_TKFIL, "Can't read Kerberos 4 ticket file"
25 ec GC_NOTKT, "Can't find Kerberos 4 ticket or TGT"
30 ec RD_AP_EXP, "Kerberos 4 ticket expired"
31 ec RD_AP_NYV, "Kerberos 4 ticket not yet valid"
33 ec RD_AP_NOT_US, "The Kerberos 4 ticket isn't for us"
47 ec GT_PW_NULLTKT, "Null Kerberos 4 ticket returned by KDC"
56 ec AD_NOTGT, "Don't have Kerberos 4 ticket-granting ticket"
58 ec NO_TKT_FIL, "No Kerberos 4 ticket file found"
59 ec TKT_FIL_ACC, "Couldn't access Kerberos 4 ticket file"
60 ec TKT_FIL_LCK, "Couldn't lock Kerberos 4 ticket file"
[all …]
H A Drecvauth.c54 krb5_ticket **ticket) in krb5_recvauth() argument
59 keytab, ticket); in krb5_recvauth()
72 krb5_ticket **ticket) in krb5_recvauth_match_version() argument
178 ticket); in krb5_recvauth_match_version()
204 krb5_free_ticket(context, *ticket); in krb5_recvauth_match_version()
205 *ticket = NULL; in krb5_recvauth_match_version()
212 krb5_free_ticket(context, *ticket); in krb5_recvauth_match_version()
213 *ticket = NULL; in krb5_recvauth_match_version()
219 krb5_free_ticket(context, *ticket); in krb5_recvauth_match_version()
220 *ticket = NULL; in krb5_recvauth_match_version()
H A Dbuild_ap_req.c55 ap.ticket.tkt_vno = 5; in krb5_build_ap_req()
56 copy_Realm(&cred->server->realm, &ap.ticket.realm); in krb5_build_ap_req()
57 copy_PrincipalName(&cred->server->name, &ap.ticket.sname); in krb5_build_ap_req()
59 decode_Ticket(cred->ticket.data, cred->ticket.length, &t, &len); in krb5_build_ap_req()
60 copy_EncryptedData(&t.enc_part, &ap.ticket.enc_part); in krb5_build_ap_req()
H A Dget_cred.c931 krb5_creds tgt, referral, ticket; in get_cred_kdc_referral() local
942 memset(&ticket, 0, sizeof(ticket)); in get_cred_kdc_referral()
990 ret = krb5_cc_retrieve_cred(context, ccache, 0, &mcreds, &ticket); in get_cred_kdc_referral()
997 second_ticket, &ticket); in get_cred_kdc_referral()
1005 ticket.server)) in get_cred_kdc_referral()
1008 if (!krb5_principal_is_krbtgt(context, ticket.server)) { in get_cred_kdc_referral()
1016 referral_realm = ticket.server->name.name_string.val[1]; in get_cred_kdc_referral()
1022 mcreds.server = ticket.server; in get_cred_kdc_referral()
1046 if (ok_as_delegate == 0 || ticket.flags.b.ok_as_delegate == 0) { in get_cred_kdc_referral()
1048 ticket.flags.b.ok_as_delegate = 0; in get_cred_kdc_referral()
[all …]
/freebsd/crypto/openssl/doc/man3/
H A DSSL_CTX_set_session_ticket_cb.pod9 SSL_CTX_decrypt_session_ticket_fn - manage session ticket application data
32 with a session, and placed into a session ticket. Either callback function may
35 B<gen_cb> is the application defined callback invoked when a session ticket is
37 at this time to add application data to the session ticket. The value of B<arg>
41 B<dec_cb> is the application defined callback invoked after session ticket
42 decryption has been attempted and any session ticket application data is
43 available. If ticket decryption was successful then the B<ss> argument contains
45 used to decrypt the session ticket. The B<status> argument is the result of the
46 ticket decryption. See the L</NOTES> section below for further details. The value
52 tickets. It can be called at any time before a session ticket is created to
[all …]
H A DSSL_SESSION_has_ticket.pod7 - get details about the ticket associated with a session
24 associated with the session ticket.
26 SSL_SESSION_get0_ticket obtains a pointer to the ticket associated with a
27 session. The length of the ticket is written to B<*len>. If B<tick> is non
28 NULL then a pointer to the ticket is written to B<*tick>. The pointer is only
29 valid while the connection is in use. The session (and hence the ticket pointer)
34 SSL_SESSION_has_ticket() returns 1 if session ticket exists or 0 otherwise.
H A DSSL_CTX_set_tlsext_ticket_key_cb.pod7 - set a callback for session ticket processing
36 session when session ticket extension is presented in the TLS hello
41 ticket construction state according to RFC5077 Section 4 such that per session
45 In order to reuse a session, a TLS client must send the session ticket
46 extension to the server. The client must send exactly one session ticket.
48 ticket information or it starts a full TLS handshake to create a new session
49 ticket.
55 For new sessions tickets, when the client doesn't present a session ticket, or
56 an attempted retrieval of the ticket failed, or a renew option was indicated,
72 When the client presents a session ticket, the callback function with be called
[all …]
/freebsd/crypto/krb5/src/lib/krb5/krb/
H A Dsrv_dec_tkt.c45 krb5_ticket *ticket) in decrypt_ticket_keyblock() argument
51 retval = krb5_decrypt_tkt_part(context, key, ticket); in decrypt_ticket_keyblock()
55 trans = &ticket->enc_part2->transited; in decrypt_ticket_keyblock()
56 realm = &ticket->enc_part2->client->realm; in decrypt_ticket_keyblock()
59 realm, &ticket->server->realm); in decrypt_ticket_keyblock()
63 if (ticket->enc_part2->flags & TKT_FLG_INVALID) { /* ie, KDC_OPT_POSTDATED */ in decrypt_ticket_keyblock()
76 krb5_ticket *ticket) in krb5_server_decrypt_ticket_keytab() argument
83 ticket->server, in krb5_server_decrypt_ticket_keytab()
84 ticket->enc_part.kvno, in krb5_server_decrypt_ticket_keytab()
85 ticket->enc_part.enctype, &ktent); in krb5_server_decrypt_ticket_keytab()
[all …]
H A Drd_req_dec.c297 ret = krb5_decrypt_tkt_part(context, &ent->key, req->ticket); in try_one_entry()
316 krb5_free_principal(context, req->ticket->server); in try_one_entry()
317 req->ticket->server = tmp; in try_one_entry()
331 krb5_kvno tkt_kvno = req->ticket->enc_part.kvno; in try_one_princ()
332 krb5_enctype tkt_etype = req->ticket->enc_part.enctype; in try_one_princ()
333 krb5_principal tkt_server = req->ticket->server; in try_one_princ()
345 return integrity_error(context, princ, req->ticket->server); in try_one_princ()
362 krb5_principal tkt_server = req->ticket->server; in decrypt_try_server()
363 krb5_kvno tkt_kvno = req->ticket->enc_part.kvno; in decrypt_try_server()
364 krb5_enctype tkt_etype = req->ticket->enc_part.enctype; in decrypt_try_server()
[all …]
H A Ddecrypt_tk.c40 krb5_ticket *ticket) in krb5_decrypt_tkt_part() argument
46 if (!krb5_c_valid_enctype(ticket->enc_part.enctype)) in krb5_decrypt_tkt_part()
49 if (!krb5_is_permitted_enctype(context, ticket->enc_part.enctype)) in krb5_decrypt_tkt_part()
52 scratch.length = ticket->enc_part.ciphertext.length; in krb5_decrypt_tkt_part()
53 if (!(scratch.data = malloc(ticket->enc_part.ciphertext.length))) in krb5_decrypt_tkt_part()
59 &ticket->enc_part, &scratch))) { in krb5_decrypt_tkt_part()
67 ticket->enc_part2 = dec_tkt_part; in krb5_decrypt_tkt_part()
H A Drd_req.c49 krb5_ticket **ticket) in krb5_rd_req() argument
89 if (!retval && ticket != NULL) { in krb5_rd_req()
91 *ticket = request->ticket; in krb5_rd_req()
92 request->ticket = NULL; in krb5_rd_req()
H A Dcopy_creds.c78 retval = krb5_copy_data(context, &incred->ticket, &scratch); in k5_copy_creds_contents()
81 tempcred->ticket = *scratch; in k5_copy_creds_contents()
100 memset(tempcred->ticket.data,0,tempcred->ticket.length); in k5_copy_creds_contents()
101 free(tempcred->ticket.data); in k5_copy_creds_contents()
/freebsd/crypto/openssl/util/perl/TLSProxy/
H A DNewSessionTicket.pm89 $self->{ticket} = "";
100 my $ticket = substr($self->data, 6, $ticket_len);
103 $self->ticket($ticket);
114 $data .= pack('n', length($self->ticket));
115 $data .= $self->ticket;
129 sub ticket subroutine
133 $self->{ticket} = shift;
135 return $self->{ticket};
/freebsd/crypto/heimdal/lib/kafs/
H A Dafskrb5.c52 kt->ticket = NULL; in v5_to_kt()
66 ret = decode_Ticket(cred->ticket.data, cred->ticket.length, &t, &len); in v5_to_kt()
82 kt->ticket = buf; in v5_to_kt()
87 kt->ticket = malloc(cred->ticket.length); in v5_to_kt()
88 if (kt->ticket == NULL) in v5_to_kt()
90 kt->ticket_len = cred->ticket.length; in v5_to_kt()
91 memcpy(kt->ticket, cred->ticket.data, kt->ticket_len); in v5_to_kt()
225 kt.ticket = NULL; in afslog_uid_int()
230 ret = kafs_settoken_rxkad(cell, &kt.ct, kt.ticket, kt.ticket_len); in afslog_uid_int()
231 free(kt.ticket); in afslog_uid_int()
[all …]
/freebsd/sys/contrib/ck/include/
H A Dck_pflock.h87 uint32_t ticket; in ck_pflock_write_lock() local
90 ticket = ck_pr_faa_32(&pf->win, 1); in ck_pflock_write_lock()
91 while (ck_pr_load_32(&pf->wout) != ticket) in ck_pflock_write_lock()
99 ticket = ck_pr_faa_32(&pf->rin, in ck_pflock_write_lock()
100 (ticket & CK_PFLOCK_PHID) | CK_PFLOCK_PRES); in ck_pflock_write_lock()
103 while (ck_pr_load_32(&pf->rout) != ticket) in ck_pflock_write_lock()
/freebsd/crypto/heimdal/kpasswd/
H A Dkpasswdd.c435 krb5_ticket **ticket, in verify() argument
491 ticket); in verify()
512 same = krb5_principal_compare(context, principal, (*ticket)->server); in verify()
519 krb5_unparse_name(context, (*ticket)->server, &str); in verify()
527 if (strcmp((*ticket)->server->realm, (*ticket)->client->realm) != 0) { in verify()
529 (*ticket)->server->realm, (*ticket)->client->realm); in verify()
530 reply_error ((*ticket)->server->realm, s, sa, sa_size, ret, 1, in verify()
535 if (!(*ticket)->ticket.flags.initial) { in verify()
537 reply_error ((*ticket)->server->realm, s, sa, sa_size, ret, 1, in verify()
550 if ((*ticket)->ticket.caddr && (*ticket)->ticket.caddr->len > 0) { in verify()
[all …]
/freebsd/crypto/heimdal/appl/test/
H A Duu_client.c53 krb5_ticket *ticket; in proto() local
124 status = krb5_write_message(context, &sock, &cred.ticket); in proto()
133 VERSION, client, 0, NULL, &ticket); in proto()
138 if (ticket->ticket.authorization_data) { in proto()
144 authz = ticket->ticket.authorization_data; in proto()
/freebsd/crypto/heimdal/kuser/
H A Dkimpersonate.c73 Ticket ticket; in encode_ticket() local
76 memset (&ticket, 0, sizeof(ticket)); in encode_ticket()
117 &ticket.enc_part); in encode_ticket()
128 ticket.tkt_vno = 5; in encode_ticket()
129 ticket.realm = cred->server->realm; in encode_ticket()
130 copy_PrincipalName(&cred->server->name, &ticket.sname); in encode_ticket()
132 ASN1_MALLOC_ENCODE(Ticket, buf, len, &ticket, &size, ret); in encode_ticket()
136 krb5_data_copy(&cred->ticket, buf, len); in encode_ticket()
/freebsd/lib/libpfctl/
H A Dlibpfctl.h77 uint32_t ticket; member
170 uint32_t ticket; member
309 uint32_t ticket; member
470 int pfctl_get_eth_rule(int dev, uint32_t nr, uint32_t ticket,
474 const char *anchor, const char *anchor_call, uint32_t ticket);
480 int pfctl_get_rule(int dev, uint32_t nr, uint32_t ticket,
483 int pfctl_get_rule_h(struct pfctl_handle *h, uint32_t nr, uint32_t ticket,
486 int pfctl_get_clear_rule(int dev, uint32_t nr, uint32_t ticket,
489 int pfctl_get_clear_rule_h(struct pfctl_handle *h, uint32_t nr, uint32_t ticket,
493 const char *anchor, const char *anchor_call, uint32_t ticket,
[all …]

1234567891011