| /freebsd/crypto/openssl/test/ssl-tests/ |
| H A D | 06-sni-ticket.cnf | 5 test-0 = 0-sni-session-ticket 6 test-1 = 1-sni-session-ticket 7 test-2 = 2-sni-session-ticket 8 test-3 = 3-sni-session-ticket 9 test-4 = 4-sni-session-ticket 10 test-5 = 5-sni-session-ticket 11 test-6 = 6-sni-session-ticket 12 test-7 = 7-sni-session-ticket 13 test-8 = 8-sni-session-ticket 14 test-9 = 9-sni-session-ticket [all …]
|
| H A D | 27-ticket-appdata.cnf | 5 test-0 = 0-session-ticket-app-data12 6 test-1 = 1-session-ticket-app-data12 7 test-2 = 2-session-ticket-app-data13 8 test-3 = 3-session-ticket-app-data13 11 [0-session-ticket-app-data12] 12 ssl_conf = 0-session-ticket-app-data12-ssl 14 [0-session-ticket-app-data12-ssl] 15 server = 0-session-ticket-app-data12-server 16 client = 0-session-ticket-app-data12-client 17 resume-server = 0-session-ticket-app-data12-server [all …]
|
| H A D | 27-ticket-appdata.cnf.in | 10 ## Test session ticket app data 20 "name" => "session-ticket-app-data12", 40 "name" => "session-ticket-app-data12", 59 "name" => "session-ticket-app-data13", 79 "name" => "session-ticket-app-data13",
|
| /freebsd/sys/contrib/ck/include/spinlock/ |
| H A D | ticket.h | 78 ck_spinlock_ticket_init(struct ck_spinlock_ticket *ticket) in ck_spinlock_ticket_init() argument 81 ticket->value = 0; in ck_spinlock_ticket_init() 87 ck_spinlock_ticket_locked(struct ck_spinlock_ticket *ticket) in ck_spinlock_ticket_locked() argument 91 request = CK_SPINLOCK_TICKET_LOAD(&ticket->value); in ck_spinlock_ticket_locked() 100 ck_spinlock_ticket_lock(struct ck_spinlock_ticket *ticket) in ck_spinlock_ticket_lock() argument 105 request = CK_SPINLOCK_TICKET_FAA(&ticket->value, in ck_spinlock_ticket_lock() 113 position = CK_SPINLOCK_TICKET_LOAD(&ticket->value) & in ck_spinlock_ticket_lock() 122 ck_spinlock_ticket_lock_pb(struct ck_spinlock_ticket *ticket, unsigned int c) in ck_spinlock_ticket_lock_pb() argument 128 request = CK_SPINLOCK_TICKET_FAA(&ticket->value, in ck_spinlock_ticket_lock_pb() 136 position = CK_SPINLOCK_TICKET_LOAD(&ticket->value) & in ck_spinlock_ticket_lock_pb() [all …]
|
| /freebsd/crypto/heimdal/lib/krb5/ |
| H A D | rd_req.c | 126 if (ap_req->ticket.tkt_vno != 5){ in krb5_decode_ap_req() 135 check_transited(krb5_context context, Ticket *ticket, EncTicketPart *enc) in check_transited() argument 158 ticket->realm); in check_transited() 162 ticket->realm, in check_transited() 225 Ticket *ticket, in krb5_decrypt_ticket() argument 232 ret = decrypt_tkt_enc_part (context, key, &ticket->enc_part, &t); in krb5_decrypt_ticket() 257 ret = check_transited(context, ticket, &t); in krb5_decrypt_ticket() 322 krb5_ticket **ticket) in krb5_verify_ap_req() argument 331 ticket, in krb5_verify_ap_req() 343 krb5_ticket **ticket, in krb5_verify_ap_req2() argument [all …]
|
| H A D | ticket.c | 52 krb5_ticket *ticket) in krb5_free_ticket() argument 54 free_EncTicketPart(&ticket->ticket); in krb5_free_ticket() 55 krb5_free_principal(context, ticket->client); in krb5_free_ticket() 56 krb5_free_principal(context, ticket->server); in krb5_free_ticket() 57 free(ticket); in krb5_free_ticket() 89 if((ret = copy_EncTicketPart(&from->ticket, &tmp->ticket))){ in krb5_copy_ticket() 95 free_EncTicketPart(&tmp->ticket); in krb5_copy_ticket() 102 free_EncTicketPart(&tmp->ticket); in krb5_copy_ticket() 125 const krb5_ticket *ticket, in krb5_ticket_get_client() argument 128 return krb5_copy_principal(context, ticket->client, client); in krb5_ticket_get_client() [all …]
|
| H A D | krb_err.et | 24 ec GC_TKFIL, "Can't read Kerberos 4 ticket file" 25 ec GC_NOTKT, "Can't find Kerberos 4 ticket or TGT" 30 ec RD_AP_EXP, "Kerberos 4 ticket expired" 31 ec RD_AP_NYV, "Kerberos 4 ticket not yet valid" 33 ec RD_AP_NOT_US, "The Kerberos 4 ticket isn't for us" 47 ec GT_PW_NULLTKT, "Null Kerberos 4 ticket returned by KDC" 56 ec AD_NOTGT, "Don't have Kerberos 4 ticket-granting ticket" 58 ec NO_TKT_FIL, "No Kerberos 4 ticket file found" 59 ec TKT_FIL_ACC, "Couldn't access Kerberos 4 ticket file" 60 ec TKT_FIL_LCK, "Couldn't lock Kerberos 4 ticket file" [all …]
|
| H A D | recvauth.c | 54 krb5_ticket **ticket) in krb5_recvauth() argument 59 keytab, ticket); in krb5_recvauth() 72 krb5_ticket **ticket) in krb5_recvauth_match_version() argument 178 ticket); in krb5_recvauth_match_version() 204 krb5_free_ticket(context, *ticket); in krb5_recvauth_match_version() 205 *ticket = NULL; in krb5_recvauth_match_version() 212 krb5_free_ticket(context, *ticket); in krb5_recvauth_match_version() 213 *ticket = NULL; in krb5_recvauth_match_version() 219 krb5_free_ticket(context, *ticket); in krb5_recvauth_match_version() 220 *ticket = NULL; in krb5_recvauth_match_version()
|
| H A D | build_ap_req.c | 55 ap.ticket.tkt_vno = 5; in krb5_build_ap_req() 56 copy_Realm(&cred->server->realm, &ap.ticket.realm); in krb5_build_ap_req() 57 copy_PrincipalName(&cred->server->name, &ap.ticket.sname); in krb5_build_ap_req() 59 decode_Ticket(cred->ticket.data, cred->ticket.length, &t, &len); in krb5_build_ap_req() 60 copy_EncryptedData(&t.enc_part, &ap.ticket.enc_part); in krb5_build_ap_req()
|
| H A D | get_cred.c | 931 krb5_creds tgt, referral, ticket; in get_cred_kdc_referral() local 942 memset(&ticket, 0, sizeof(ticket)); in get_cred_kdc_referral() 990 ret = krb5_cc_retrieve_cred(context, ccache, 0, &mcreds, &ticket); in get_cred_kdc_referral() 997 second_ticket, &ticket); in get_cred_kdc_referral() 1005 ticket.server)) in get_cred_kdc_referral() 1008 if (!krb5_principal_is_krbtgt(context, ticket.server)) { in get_cred_kdc_referral() 1016 referral_realm = ticket.server->name.name_string.val[1]; in get_cred_kdc_referral() 1022 mcreds.server = ticket.server; in get_cred_kdc_referral() 1046 if (ok_as_delegate == 0 || ticket.flags.b.ok_as_delegate == 0) { in get_cred_kdc_referral() 1048 ticket.flags.b.ok_as_delegate = 0; in get_cred_kdc_referral() [all …]
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | SSL_CTX_set_session_ticket_cb.pod | 9 SSL_CTX_decrypt_session_ticket_fn - manage session ticket application data 32 with a session, and placed into a session ticket. Either callback function may 35 B<gen_cb> is the application defined callback invoked when a session ticket is 37 at this time to add application data to the session ticket. The value of B<arg> 41 B<dec_cb> is the application defined callback invoked after session ticket 42 decryption has been attempted and any session ticket application data is 43 available. If ticket decryption was successful then the B<ss> argument contains 45 used to decrypt the session ticket. The B<status> argument is the result of the 46 ticket decryption. See the L</NOTES> section below for further details. The value 52 tickets. It can be called at any time before a session ticket is created to [all …]
|
| H A D | SSL_SESSION_has_ticket.pod | 7 - get details about the ticket associated with a session 24 associated with the session ticket. 26 SSL_SESSION_get0_ticket obtains a pointer to the ticket associated with a 27 session. The length of the ticket is written to B<*len>. If B<tick> is non 28 NULL then a pointer to the ticket is written to B<*tick>. The pointer is only 29 valid while the connection is in use. The session (and hence the ticket pointer) 34 SSL_SESSION_has_ticket() returns 1 if session ticket exists or 0 otherwise.
|
| H A D | SSL_CTX_set_tlsext_ticket_key_cb.pod | 7 - set a callback for session ticket processing 36 session when session ticket extension is presented in the TLS hello 41 ticket construction state according to RFC5077 Section 4 such that per session 45 In order to reuse a session, a TLS client must send the session ticket 46 extension to the server. The client must send exactly one session ticket. 48 ticket information or it starts a full TLS handshake to create a new session 49 ticket. 55 For new sessions tickets, when the client doesn't present a session ticket, or 56 an attempted retrieval of the ticket failed, or a renew option was indicated, 72 When the client presents a session ticket, the callback function with be called [all …]
|
| /freebsd/crypto/krb5/src/lib/krb5/krb/ |
| H A D | srv_dec_tkt.c | 45 krb5_ticket *ticket) in decrypt_ticket_keyblock() argument 51 retval = krb5_decrypt_tkt_part(context, key, ticket); in decrypt_ticket_keyblock() 55 trans = &ticket->enc_part2->transited; in decrypt_ticket_keyblock() 56 realm = &ticket->enc_part2->client->realm; in decrypt_ticket_keyblock() 59 realm, &ticket->server->realm); in decrypt_ticket_keyblock() 63 if (ticket->enc_part2->flags & TKT_FLG_INVALID) { /* ie, KDC_OPT_POSTDATED */ in decrypt_ticket_keyblock() 76 krb5_ticket *ticket) in krb5_server_decrypt_ticket_keytab() argument 83 ticket->server, in krb5_server_decrypt_ticket_keytab() 84 ticket->enc_part.kvno, in krb5_server_decrypt_ticket_keytab() 85 ticket->enc_part.enctype, &ktent); in krb5_server_decrypt_ticket_keytab() [all …]
|
| H A D | rd_req_dec.c | 297 ret = krb5_decrypt_tkt_part(context, &ent->key, req->ticket); in try_one_entry() 316 krb5_free_principal(context, req->ticket->server); in try_one_entry() 317 req->ticket->server = tmp; in try_one_entry() 331 krb5_kvno tkt_kvno = req->ticket->enc_part.kvno; in try_one_princ() 332 krb5_enctype tkt_etype = req->ticket->enc_part.enctype; in try_one_princ() 333 krb5_principal tkt_server = req->ticket->server; in try_one_princ() 345 return integrity_error(context, princ, req->ticket->server); in try_one_princ() 362 krb5_principal tkt_server = req->ticket->server; in decrypt_try_server() 363 krb5_kvno tkt_kvno = req->ticket->enc_part.kvno; in decrypt_try_server() 364 krb5_enctype tkt_etype = req->ticket->enc_part.enctype; in decrypt_try_server() [all …]
|
| H A D | decrypt_tk.c | 40 krb5_ticket *ticket) in krb5_decrypt_tkt_part() argument 46 if (!krb5_c_valid_enctype(ticket->enc_part.enctype)) in krb5_decrypt_tkt_part() 49 if (!krb5_is_permitted_enctype(context, ticket->enc_part.enctype)) in krb5_decrypt_tkt_part() 52 scratch.length = ticket->enc_part.ciphertext.length; in krb5_decrypt_tkt_part() 53 if (!(scratch.data = malloc(ticket->enc_part.ciphertext.length))) in krb5_decrypt_tkt_part() 59 &ticket->enc_part, &scratch))) { in krb5_decrypt_tkt_part() 67 ticket->enc_part2 = dec_tkt_part; in krb5_decrypt_tkt_part()
|
| H A D | rd_req.c | 49 krb5_ticket **ticket) in krb5_rd_req() argument 89 if (!retval && ticket != NULL) { in krb5_rd_req() 91 *ticket = request->ticket; in krb5_rd_req() 92 request->ticket = NULL; in krb5_rd_req()
|
| H A D | copy_creds.c | 78 retval = krb5_copy_data(context, &incred->ticket, &scratch); in k5_copy_creds_contents() 81 tempcred->ticket = *scratch; in k5_copy_creds_contents() 100 memset(tempcred->ticket.data,0,tempcred->ticket.length); in k5_copy_creds_contents() 101 free(tempcred->ticket.data); in k5_copy_creds_contents()
|
| /freebsd/crypto/openssl/util/perl/TLSProxy/ |
| H A D | NewSessionTicket.pm | 89 $self->{ticket} = ""; 100 my $ticket = substr($self->data, 6, $ticket_len); 103 $self->ticket($ticket); 114 $data .= pack('n', length($self->ticket)); 115 $data .= $self->ticket; 129 sub ticket subroutine 133 $self->{ticket} = shift; 135 return $self->{ticket};
|
| /freebsd/crypto/heimdal/lib/kafs/ |
| H A D | afskrb5.c | 52 kt->ticket = NULL; in v5_to_kt() 66 ret = decode_Ticket(cred->ticket.data, cred->ticket.length, &t, &len); in v5_to_kt() 82 kt->ticket = buf; in v5_to_kt() 87 kt->ticket = malloc(cred->ticket.length); in v5_to_kt() 88 if (kt->ticket == NULL) in v5_to_kt() 90 kt->ticket_len = cred->ticket.length; in v5_to_kt() 91 memcpy(kt->ticket, cred->ticket.data, kt->ticket_len); in v5_to_kt() 225 kt.ticket = NULL; in afslog_uid_int() 230 ret = kafs_settoken_rxkad(cell, &kt.ct, kt.ticket, kt.ticket_len); in afslog_uid_int() 231 free(kt.ticket); in afslog_uid_int() [all …]
|
| /freebsd/sys/contrib/ck/include/ |
| H A D | ck_pflock.h | 87 uint32_t ticket; in ck_pflock_write_lock() local 90 ticket = ck_pr_faa_32(&pf->win, 1); in ck_pflock_write_lock() 91 while (ck_pr_load_32(&pf->wout) != ticket) in ck_pflock_write_lock() 99 ticket = ck_pr_faa_32(&pf->rin, in ck_pflock_write_lock() 100 (ticket & CK_PFLOCK_PHID) | CK_PFLOCK_PRES); in ck_pflock_write_lock() 103 while (ck_pr_load_32(&pf->rout) != ticket) in ck_pflock_write_lock()
|
| /freebsd/crypto/heimdal/kpasswd/ |
| H A D | kpasswdd.c | 435 krb5_ticket **ticket, in verify() argument 491 ticket); in verify() 512 same = krb5_principal_compare(context, principal, (*ticket)->server); in verify() 519 krb5_unparse_name(context, (*ticket)->server, &str); in verify() 527 if (strcmp((*ticket)->server->realm, (*ticket)->client->realm) != 0) { in verify() 529 (*ticket)->server->realm, (*ticket)->client->realm); in verify() 530 reply_error ((*ticket)->server->realm, s, sa, sa_size, ret, 1, in verify() 535 if (!(*ticket)->ticket.flags.initial) { in verify() 537 reply_error ((*ticket)->server->realm, s, sa, sa_size, ret, 1, in verify() 550 if ((*ticket)->ticket.caddr && (*ticket)->ticket.caddr->len > 0) { in verify() [all …]
|
| /freebsd/crypto/heimdal/appl/test/ |
| H A D | uu_client.c | 53 krb5_ticket *ticket; in proto() local 124 status = krb5_write_message(context, &sock, &cred.ticket); in proto() 133 VERSION, client, 0, NULL, &ticket); in proto() 138 if (ticket->ticket.authorization_data) { in proto() 144 authz = ticket->ticket.authorization_data; in proto()
|
| /freebsd/crypto/heimdal/kuser/ |
| H A D | kimpersonate.c | 73 Ticket ticket; in encode_ticket() local 76 memset (&ticket, 0, sizeof(ticket)); in encode_ticket() 117 &ticket.enc_part); in encode_ticket() 128 ticket.tkt_vno = 5; in encode_ticket() 129 ticket.realm = cred->server->realm; in encode_ticket() 130 copy_PrincipalName(&cred->server->name, &ticket.sname); in encode_ticket() 132 ASN1_MALLOC_ENCODE(Ticket, buf, len, &ticket, &size, ret); in encode_ticket() 136 krb5_data_copy(&cred->ticket, buf, len); in encode_ticket()
|
| /freebsd/lib/libpfctl/ |
| H A D | libpfctl.h | 77 uint32_t ticket; member 170 uint32_t ticket; member 309 uint32_t ticket; member 470 int pfctl_get_eth_rule(int dev, uint32_t nr, uint32_t ticket, 474 const char *anchor, const char *anchor_call, uint32_t ticket); 480 int pfctl_get_rule(int dev, uint32_t nr, uint32_t ticket, 483 int pfctl_get_rule_h(struct pfctl_handle *h, uint32_t nr, uint32_t ticket, 486 int pfctl_get_clear_rule(int dev, uint32_t nr, uint32_t ticket, 489 int pfctl_get_clear_rule_h(struct pfctl_handle *h, uint32_t nr, uint32_t ticket, 493 const char *anchor, const char *anchor_call, uint32_t ticket, [all …]
|