/freebsd/crypto/openssl/test/ssl-tests/ |
H A D | 06-sni-ticket.cnf | 5 test-0 = 0-sni-session-ticket 6 test-1 = 1-sni-session-ticket 7 test-2 = 2-sni-session-ticket 8 test-3 = 3-sni-session-ticket 9 test-4 = 4-sni-session-ticket 10 test-5 = 5-sni-session-ticket 11 test-6 = 6-sni-session-ticket 12 test-7 = 7-sni-session-ticket 13 test-8 = 8-sni-session-ticket 14 test-9 = 9-sni-session-ticket [all …]
|
H A D | 27-ticket-appdata.cnf | 5 test-0 = 0-session-ticket-app-data12 6 test-1 = 1-session-ticket-app-data12 7 test-2 = 2-session-ticket-app-data13 8 test-3 = 3-session-ticket-app-data13 11 [0-session-ticket-app-data12] 12 ssl_conf = 0-session-ticket-app-data12-ssl 14 [0-session-ticket-app-data12-ssl] 15 server = 0-session-ticket-app-data12-server 16 client = 0-session-ticket-app-data12-client 17 resume-server = 0-session-ticket-app-data12-server [all …]
|
H A D | 27-ticket-appdata.cnf.in | 10 ## Test session ticket app data 20 "name" => "session-ticket-app-data12", 40 "name" => "session-ticket-app-data12", 59 "name" => "session-ticket-app-data13", 79 "name" => "session-ticket-app-data13",
|
/freebsd/sys/contrib/ck/include/spinlock/ |
H A D | ticket.h | 78 ck_spinlock_ticket_init(struct ck_spinlock_ticket *ticket) in ck_spinlock_ticket_init() argument 81 ticket->value = 0; in ck_spinlock_ticket_init() 87 ck_spinlock_ticket_locked(struct ck_spinlock_ticket *ticket) in ck_spinlock_ticket_locked() argument 91 request = CK_SPINLOCK_TICKET_LOAD(&ticket->value); in ck_spinlock_ticket_locked() 100 ck_spinlock_ticket_lock(struct ck_spinlock_ticket *ticket) in ck_spinlock_ticket_lock() argument 105 request = CK_SPINLOCK_TICKET_FAA(&ticket->value, in ck_spinlock_ticket_lock() 113 position = CK_SPINLOCK_TICKET_LOAD(&ticket->value) & in ck_spinlock_ticket_lock() 122 ck_spinlock_ticket_lock_pb(struct ck_spinlock_ticket *ticket, unsigned int c) in ck_spinlock_ticket_lock_pb() argument 128 request = CK_SPINLOCK_TICKET_FAA(&ticket->value, in ck_spinlock_ticket_lock_pb() 136 position = CK_SPINLOCK_TICKET_LOAD(&ticket->value) & in ck_spinlock_ticket_lock_pb() [all …]
|
/freebsd/crypto/heimdal/lib/krb5/ |
H A D | rd_req.c | 126 if (ap_req->ticket.tkt_vno != 5){ in krb5_decode_ap_req() 135 check_transited(krb5_context context, Ticket *ticket, EncTicketPart *enc) in check_transited() argument 158 ticket->realm); in check_transited() 162 ticket->realm, in check_transited() 225 Ticket *ticket, in krb5_decrypt_ticket() argument 232 ret = decrypt_tkt_enc_part (context, key, &ticket->enc_part, &t); in krb5_decrypt_ticket() 257 ret = check_transited(context, ticket, &t); in krb5_decrypt_ticket() 322 krb5_ticket **ticket) in krb5_verify_ap_req() argument 331 ticket, in krb5_verify_ap_req() 343 krb5_ticket **ticket, in krb5_verify_ap_req2() argument [all …]
|
H A D | ticket.c | 52 krb5_ticket *ticket) in krb5_free_ticket() argument 54 free_EncTicketPart(&ticket->ticket); in krb5_free_ticket() 55 krb5_free_principal(context, ticket->client); in krb5_free_ticket() 56 krb5_free_principal(context, ticket->server); in krb5_free_ticket() 57 free(ticket); in krb5_free_ticket() 89 if((ret = copy_EncTicketPart(&from->ticket, &tmp->ticket))){ in krb5_copy_ticket() 95 free_EncTicketPart(&tmp->ticket); in krb5_copy_ticket() 102 free_EncTicketPart(&tmp->ticket); in krb5_copy_ticket() 125 const krb5_ticket *ticket, in krb5_ticket_get_client() argument 128 return krb5_copy_principal(context, ticket->client, client); in krb5_ticket_get_client() [all …]
|
H A D | krb_err.et | 24 ec GC_TKFIL, "Can't read Kerberos 4 ticket file" 25 ec GC_NOTKT, "Can't find Kerberos 4 ticket or TGT" 30 ec RD_AP_EXP, "Kerberos 4 ticket expired" 31 ec RD_AP_NYV, "Kerberos 4 ticket not yet valid" 33 ec RD_AP_NOT_US, "The Kerberos 4 ticket isn't for us" 47 ec GT_PW_NULLTKT, "Null Kerberos 4 ticket returned by KDC" 56 ec AD_NOTGT, "Don't have Kerberos 4 ticket-granting ticket" 58 ec NO_TKT_FIL, "No Kerberos 4 ticket file found" 59 ec TKT_FIL_ACC, "Couldn't access Kerberos 4 ticket file" 60 ec TKT_FIL_LCK, "Couldn't lock Kerberos 4 ticket file" [all …]
|
H A D | recvauth.c | 54 krb5_ticket **ticket) in krb5_recvauth() argument 59 keytab, ticket); in krb5_recvauth() 72 krb5_ticket **ticket) in krb5_recvauth_match_version() argument 178 ticket); in krb5_recvauth_match_version() 204 krb5_free_ticket(context, *ticket); in krb5_recvauth_match_version() 205 *ticket = NULL; in krb5_recvauth_match_version() 212 krb5_free_ticket(context, *ticket); in krb5_recvauth_match_version() 213 *ticket = NULL; in krb5_recvauth_match_version() 219 krb5_free_ticket(context, *ticket); in krb5_recvauth_match_version() 220 *ticket = NULL; in krb5_recvauth_match_version()
|
H A D | build_ap_req.c | 55 ap.ticket.tkt_vno = 5; in krb5_build_ap_req() 56 copy_Realm(&cred->server->realm, &ap.ticket.realm); in krb5_build_ap_req() 57 copy_PrincipalName(&cred->server->name, &ap.ticket.sname); in krb5_build_ap_req() 59 decode_Ticket(cred->ticket.data, cred->ticket.length, &t, &len); in krb5_build_ap_req() 60 copy_EncryptedData(&t.enc_part, &ap.ticket.enc_part); in krb5_build_ap_req()
|
H A D | get_cred.c | 931 krb5_creds tgt, referral, ticket; in get_cred_kdc_referral() local 942 memset(&ticket, 0, sizeof(ticket)); in get_cred_kdc_referral() 990 ret = krb5_cc_retrieve_cred(context, ccache, 0, &mcreds, &ticket); in get_cred_kdc_referral() 997 second_ticket, &ticket); in get_cred_kdc_referral() 1005 ticket.server)) in get_cred_kdc_referral() 1008 if (!krb5_principal_is_krbtgt(context, ticket.server)) { in get_cred_kdc_referral() 1016 referral_realm = ticket.server->name.name_string.val[1]; in get_cred_kdc_referral() 1022 mcreds.server = ticket.server; in get_cred_kdc_referral() 1046 if (ok_as_delegate == 0 || ticket.flags.b.ok_as_delegate == 0) { in get_cred_kdc_referral() 1048 ticket.flags.b.ok_as_delegate = 0; in get_cred_kdc_referral() [all …]
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_CTX_set_session_ticket_cb.pod | 9 SSL_CTX_decrypt_session_ticket_fn - manage session ticket application data 32 with a session, and placed into a session ticket. Either callback function may 35 B<gen_cb> is the application defined callback invoked when a session ticket is 37 at this time to add application data to the session ticket. The value of B<arg> 41 B<dec_cb> is the application defined callback invoked after session ticket 42 decryption has been attempted and any session ticket application data is 43 available. If ticket decryption was successful then the B<ss> argument contains 45 used to decrypt the session ticket. The B<status> argument is the result of the 46 ticket decryption. See the L</NOTES> section below for further details. The value 52 tickets. It can be called at any time before a session ticket is created to [all …]
|
H A D | SSL_SESSION_has_ticket.pod | 7 - get details about the ticket associated with a session 24 associated with the session ticket. 26 SSL_SESSION_get0_ticket obtains a pointer to the ticket associated with a 27 session. The length of the ticket is written to B<*len>. If B<tick> is non 28 NULL then a pointer to the ticket is written to B<*tick>. The pointer is only 29 valid while the connection is in use. The session (and hence the ticket pointer) 34 SSL_SESSION_has_ticket() returns 1 if session ticket exists or 0 otherwise.
|
H A D | SSL_CTX_set_tlsext_ticket_key_cb.pod | 7 - set a callback for session ticket processing 36 session when session ticket extension is presented in the TLS hello 41 ticket construction state according to RFC5077 Section 4 such that per session 45 In order to reuse a session, a TLS client must send the session ticket 46 extension to the server. The client must send exactly one session ticket. 48 ticket information or it starts a full TLS handshake to create a new session 49 ticket. 55 For new sessions tickets, when the client doesn't present a session ticket, or 56 an attempted retrieval of the ticket failed, or a renew option was indicated, 72 When the client presents a session ticket, the callback function with be called [all …]
|
H A D | SSL_CTX_set_num_tickets.pod | 47 ticket be sent when it is safe to do so. New tickets are only allowed to be 49 TLS 1.3 connections. By default, the ticket generation and transmission are 53 SSL_new_session_ticket() was called, the ticket can be sent immediately 59 SSL_new_session_ticket() indicates only that the request to send a ticket was 60 processed, not that the ticket itself was sent. To be notified when the 61 ticket itself is sent, a new-session callback can be registered with 62 L<SSL_CTX_sess_set_new_cb(3)> that will be invoked as the ticket or tickets
|
/freebsd/crypto/openssl/util/perl/TLSProxy/ |
H A D | NewSessionTicket.pm | 33 $self->{ticket} = ""; 44 my $ticket = substr($self->data, 6, $ticket_len); 47 $self->ticket($ticket); 58 $data .= pack('n', length($self->ticket)); 59 $data .= $self->ticket; 73 sub ticket subroutine 77 $self->{ticket} = shift; 79 return $self->{ticket};
|
/freebsd/crypto/heimdal/lib/kafs/ |
H A D | afskrb5.c | 52 kt->ticket = NULL; in v5_to_kt() 66 ret = decode_Ticket(cred->ticket.data, cred->ticket.length, &t, &len); in v5_to_kt() 82 kt->ticket = buf; in v5_to_kt() 87 kt->ticket = malloc(cred->ticket.length); in v5_to_kt() 88 if (kt->ticket == NULL) in v5_to_kt() 90 kt->ticket_len = cred->ticket.length; in v5_to_kt() 91 memcpy(kt->ticket, cred->ticket.data, kt->ticket_len); in v5_to_kt() 225 kt.ticket = NULL; in afslog_uid_int() 230 ret = kafs_settoken_rxkad(cell, &kt.ct, kt.ticket, kt.ticket_len); in afslog_uid_int() 231 free(kt.ticket); in afslog_uid_int() [all …]
|
/freebsd/sys/contrib/ck/include/ |
H A D | ck_pflock.h | 87 uint32_t ticket; in ck_pflock_write_lock() local 90 ticket = ck_pr_faa_32(&pf->win, 1); in ck_pflock_write_lock() 91 while (ck_pr_load_32(&pf->wout) != ticket) in ck_pflock_write_lock() 99 ticket = ck_pr_faa_32(&pf->rin, in ck_pflock_write_lock() 100 (ticket & CK_PFLOCK_PHID) | CK_PFLOCK_PRES); in ck_pflock_write_lock() 103 while (ck_pr_load_32(&pf->rout) != ticket) in ck_pflock_write_lock()
|
H A D | ck_ring.h | 256 unsigned int *ticket, in _ck_ring_enqueue_reserve_mp() argument 292 *ticket = producer; in _ck_ring_enqueue_reserve_mp() 567 unsigned int *ticket) in ck_ring_enqueue_reserve_mpmc() argument 571 ticket, NULL); in ck_ring_enqueue_reserve_mpmc() 577 unsigned int *ticket, in ck_ring_enqueue_reserve_mpmc_size() argument 582 ticket, size); in ck_ring_enqueue_reserve_mpmc_size() 586 ck_ring_enqueue_commit_mpmc(struct ck_ring *ring, unsigned int ticket) in ck_ring_enqueue_commit_mpmc() argument 589 _ck_ring_enqueue_commit_mp(ring, ticket); in ck_ring_enqueue_commit_mpmc() 690 unsigned int *ticket) in ck_ring_enqueue_reserve_mpsc() argument 694 ticket, NULL); in ck_ring_enqueue_reserve_mpsc() [all …]
|
/freebsd/crypto/heimdal/kpasswd/ |
H A D | kpasswdd.c | 435 krb5_ticket **ticket, in verify() argument 491 ticket); in verify() 512 same = krb5_principal_compare(context, principal, (*ticket)->server); in verify() 519 krb5_unparse_name(context, (*ticket)->server, &str); in verify() 527 if (strcmp((*ticket)->server->realm, (*ticket)->client->realm) != 0) { in verify() 529 (*ticket)->server->realm, (*ticket)->client->realm); in verify() 530 reply_error ((*ticket)->server->realm, s, sa, sa_size, ret, 1, in verify() 535 if (!(*ticket)->ticket.flags.initial) { in verify() 537 reply_error ((*ticket)->server->realm, s, sa, sa_size, ret, 1, in verify() 550 if ((*ticket)->ticket.caddr && (*ticket)->ticket.caddr->len > 0) { in verify() [all …]
|
/freebsd/crypto/heimdal/appl/test/ |
H A D | uu_client.c | 53 krb5_ticket *ticket; in proto() local 124 status = krb5_write_message(context, &sock, &cred.ticket); in proto() 133 VERSION, client, 0, NULL, &ticket); in proto() 138 if (ticket->ticket.authorization_data) { in proto() 144 authz = ticket->ticket.authorization_data; in proto()
|
/freebsd/crypto/heimdal/kuser/ |
H A D | kimpersonate.c | 73 Ticket ticket; in encode_ticket() local 76 memset (&ticket, 0, sizeof(ticket)); in encode_ticket() 117 &ticket.enc_part); in encode_ticket() 128 ticket.tkt_vno = 5; in encode_ticket() 129 ticket.realm = cred->server->realm; in encode_ticket() 130 copy_PrincipalName(&cred->server->name, &ticket.sname); in encode_ticket() 132 ASN1_MALLOC_ENCODE(Ticket, buf, len, &ticket, &size, ret); in encode_ticket() 136 krb5_data_copy(&cred->ticket, buf, len); in encode_ticket()
|
H A D | kgetcred.c | 159 Ticket ticket; in main() local 174 ret = decode_Ticket(c.ticket.data, c.ticket.length, &ticket, NULL); in main() 181 ret = krb5_get_creds_opt_set_ticket(context, opt, &ticket); in main() 184 free_Ticket(&ticket); in main()
|
/freebsd/lib/libpfctl/ |
H A D | libpfctl.h | 75 uint32_t ticket; member 159 uint32_t ticket; member 270 uint32_t ticket; member 434 int pfctl_get_eth_rule(int dev, uint32_t nr, uint32_t ticket, 438 const char *anchor, const char *anchor_call, uint32_t ticket); 444 int pfctl_get_rule(int dev, uint32_t nr, uint32_t ticket, 447 int pfctl_get_rule_h(struct pfctl_handle *h, uint32_t nr, uint32_t ticket, 450 int pfctl_get_clear_rule(int dev, uint32_t nr, uint32_t ticket, 453 int pfctl_get_clear_rule_h(struct pfctl_handle *h, uint32_t nr, uint32_t ticket, 457 const char *anchor, const char *anchor_call, uint32_t ticket, [all …]
|
/freebsd/crypto/heimdal/lib/gssapi/krb5/ |
H A D | ticket_flags.c | 47 if (ctx->ticket == NULL) { in _gsskrb5_get_tkt_flags() 53 *tkt_flags = TicketFlags2int(ctx->ticket->ticket.flags); in _gsskrb5_get_tkt_flags()
|
/freebsd/crypto/heimdal/doc/ |
H A D | whatis.texi | 69 To obtain a ticket for a specific service, @var{A} sends a ticket 77 of the ticket (@var{life}), and a secret @dfn{session key} 80 (@var{K@sub{B}}). The actual ticket (@var{T@sub{AB}}) looks like this: 84 The reply to @var{A} consists of the ticket (@var{T@sub{AB}}), @var{B}'s 85 name, the current time, the lifetime of the ticket, and the session key, all 96 @var{checksum}@}@var{K@sub{AB}}). This is sent together with the ticket 98 decrypts the ticket using @var{B}'s secret key. Since the ticket 101 really is @var{A}, @var{B} now has to compare the contents of the ticket 111 An impostor, @var{C} could steal the authenticator and the ticket as it 113 @var{A}. The address in the ticket and the authenticator was added to
|