/illumos-gate/usr/src/cmd/krb5/krb5kdc/ |
H A D | do_tgs_req.c | 130 if (header_ticket && header_ticket->enc_part2 && in process_tgs_req() 132 header_ticket->enc_part2->client, in process_tgs_req() 157 authtime = header_ticket->enc_part2->times.authtime; in process_tgs_req() 249 etype = request->second_ticket[st_idx]->enc_part2->session->enctype; in process_tgs_req() 294 if (!(header_ticket->enc_part2->times.starttime)) in process_tgs_req() 295 header_ticket->enc_part2->times.starttime = in process_tgs_req() 296 header_ticket->enc_part2->times.authtime; in process_tgs_req() 300 enc_tkt_reply.caddrs = header_ticket->enc_part2->caddrs; in process_tgs_req() 319 if (isflagset(header_ticket->enc_part2->flags, TKT_FLG_FORWARDED)) in process_tgs_req() 348 enc_tkt_reply = *(header_ticket->enc_part2); in process_tgs_req() [all …]
|
H A D | kdc_util.c | 183 if ((retval = krb5_c_verify_checksum(kcontext, ticket->enc_part2->session, in comp_cksum() 312 if (isflagset((*ticket)->enc_part2->flags, TKT_FLG_INVALID) in kdc_process_tgs_req() 335 (*ticket)->enc_part2->client); in kdc_process_tgs_req() 1200 !isflagset(ticket->enc_part2->flags, TKT_FLG_FORWARDABLE)) { in validate_tgs_request() 1209 !isflagset(ticket->enc_part2->flags, TKT_FLG_PROXIABLE)) { in validate_tgs_request() 1217 !isflagset(ticket->enc_part2->flags, TKT_FLG_MAY_POSTDATE)) { in validate_tgs_request() 1224 !isflagset(ticket->enc_part2->flags, TKT_FLG_INVALID)) { in validate_tgs_request() 1232 !isflagset(ticket->enc_part2->flags, TKT_FLG_RENEWABLE)) { in validate_tgs_request() 1302 if (ticket->enc_part2->times.starttime > kdc_time) { in validate_tgs_request() 1313 (ticket->enc_part2->times.renew_till < kdc_time)) { in validate_tgs_request() [all …]
|
H A D | do_as_req.c | 331 ticket_reply.enc_part2 = &enc_tkt_reply; in process_as_req()
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | gc_via_tkt.c | 55 if ((retval = krb5_copy_principal(context, pkdcrep->enc_part2->server, in krb5_kdcrep2creds() 60 pkdcrep->enc_part2->session, in krb5_kdcrep2creds() 69 (*ppcreds)->ticket_flags = pkdcrep->enc_part2->flags; in krb5_kdcrep2creds() 70 (*ppcreds)->times = pkdcrep->enc_part2->times; in krb5_kdcrep2creds() 76 if (pkdcrep->enc_part2->caddrs) { in krb5_kdcrep2creds() 77 if ((retval = krb5_copy_addresses(context, pkdcrep->enc_part2->caddrs, in krb5_kdcrep2creds() 108 dec_rep->enc_part2->server)) in check_reply_server() 126 krb5int_dbgref_dump_principal("gc_via_tkt: encoded server",dec_rep->enc_part2->server); in check_reply_server() 404 if (dec_rep->enc_part2->nonce != tgsrep.expected_nonce) in krb5_get_cred_via_tkt() 409 (in_cred->times.starttime != dec_rep->enc_part2->times.starttime)) in krb5_get_cred_via_tkt() [all …]
|
H A D | rd_req_dec.c | 155 req->ticket->enc_part2 == NULL; in krb5_rd_req_decoded_opt() 204 req->ticket->enc_part2->client)) { in krb5_rd_req_decoded_opt() 211 req->ticket->enc_part2->caddrs)) { in krb5_rd_req_decoded_opt() 223 krb5_transited *trans = &(req->ticket->enc_part2->transited); in krb5_rd_req_decoded_opt() 239 realm = krb5_princ_realm(context, req->ticket->enc_part2->client); in krb5_rd_req_decoded_opt() 240 trans = &(req->ticket->enc_part2->transited); in krb5_rd_req_decoded_opt() 263 realm = krb5_princ_realm(context, req->ticket->enc_part2->client); in krb5_rd_req_decoded_opt() 264 trans = &(req->ticket->enc_part2->transited); in krb5_rd_req_decoded_opt() 305 retval = krb5_validate_times(context, &req->ticket->enc_part2->times); in krb5_rd_req_decoded_opt() 318 cerr = krb5_unparse_name(context, req->ticket->enc_part2->client, in krb5_rd_req_decoded_opt() [all …]
|
H A D | get_in_tkt.c | 264 if (as_reply->enc_part2) in decrypt_as_reply() 330 if (!as_reply->enc_part2->times.starttime) in verify_as_reply() 331 as_reply->enc_part2->times.starttime = in verify_as_reply() 332 as_reply->enc_part2->times.authtime; in verify_as_reply() 335 || !krb5_principal_compare(context, as_reply->enc_part2->server, request->server) in verify_as_reply() 337 || (request->nonce != as_reply->enc_part2->nonce) in verify_as_reply() 342 (request->from != as_reply->enc_part2->times.starttime)) in verify_as_reply() 344 (as_reply->enc_part2->times.endtime > request->till)) in verify_as_reply() 350 (as_reply->enc_part2->flags & KDC_OPT_RENEWABLE) && in verify_as_reply() 352 (as_reply->enc_part2->times.renew_till > request->rtime)) in verify_as_reply() [all …]
|
H A D | gic_pwd.c | 441 as_reply->enc_part2->key_exp && in __krb5_get_init_creds_password() 442 ((hours = ((as_reply->enc_part2->key_exp-now)/(60*60))) <= 7*24) && in __krb5_get_init_creds_password() 460 as_reply->enc_part2 && as_reply->enc_part2->last_req) { in __krb5_get_init_creds_password() 465 for (last_req = as_reply->enc_part2->last_req; *last_req; last_req++) in __krb5_get_init_creds_password()
|
H A D | copy_tick.c | 117 retval = krb5_copy_enc_tkt_part(context, from->enc_part2, &tempto->enc_part2); in krb5_copy_ticket()
|
H A D | encrypt_tk.c | 49 register krb5_enc_tkt_part *dec_tkt_part = dec_ticket->enc_part2; in krb5_encrypt_tkt_part()
|
H A D | decrypt_tk.c | 70 ticket->enc_part2 = dec_tkt_part; in krb5_decrypt_tkt_part()
|
H A D | kdc_rep_dc.c | 77 dec_rep->enc_part2 = local_encpart; in krb5_kdc_rep_decrypt_proc()
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/ |
H A D | in.rshd.c | 1510 if ((status = krb5_unparse_name(bsd_context, ticket->enc_part2->client, in recvauth() 1515 ticket->enc_part2->client, &client))) in recvauth() 1556 key.magic = ticket->enc_part2->session->magic; in recvauth() 1557 key.enctype = ticket->enc_part2->session->enctype; in recvauth() 1558 key.contents = ticket->enc_part2->session->contents; in recvauth() 1559 key.length = ticket->enc_part2->session->length; in recvauth() 1626 ticket->enc_part2->session, in recvauth() 1660 ticket->enc_part2->session = 0; in recvauth()
|
H A D | in.rlogind.c | 503 key.contents = (*ticket)->enc_part2->session->contents; in recvauth() 504 key.length = (*ticket)->enc_part2->session->length; in recvauth() 526 (*ticket)->enc_part2->client, in recvauth() 581 (*ticket)->enc_part2->session, in recvauth()
|
H A D | in.telnetd.c | 482 ticket->enc_part2->client)) != 0) in rd_and_store_forwarded_creds() 518 (void) krb5_kuserok(context, ticket->enc_part2->client, in rd_and_store_forwarded_creds() 719 ticket->enc_part2->client, in kerberos5_is() 747 ticket->enc_part2->session, &session_key); in kerberos5_is() 954 (retval = krb5_kuserok(telnet_context, ticket->enc_part2->client, in krb5_user_status()
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/krb5/krb/ |
H A D | kfree.c | 357 if (val->enc_part2) { in krb5_free_kdc_rep() 358 krb5_free_enc_kdc_rep_part(context, val->enc_part2); in krb5_free_kdc_rep() 359 val->enc_part2 = 0; in krb5_free_kdc_rep() 616 if (val->enc_part2) in krb5_free_ticket() 617 krb5_free_enc_tkt_part(context, val->enc_part2); in krb5_free_ticket()
|
/illumos-gate/usr/src/cmd/cmd-inet/common/ |
H A D | store_forw_creds.c | 71 ticket->enc_part2->client)) != 0) { in store_forw_creds()
|
/illumos-gate/usr/src/lib/krb5/kadm5/srv/ |
H A D | chgpwd.c | 311 if (!(ticket->enc_part2->flags & TKT_FLG_INITIAL)) { in process_chpw_request() 344 ret = krb5_unparse_name(context, ticket->enc_part2->client, &clientstr); in process_chpw_request() 366 ticket->enc_part2->client, in process_chpw_request()
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | accept_sec_context.c | 630 (authdat->ticket->enc_part2 == NULL)) { 863 ticket->enc_part2->authorization_data, 989 ctx->endtime = ticket->enc_part2->times.endtime; 990 ctx->krb_flags = ticket->enc_part2->flags;
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/telnet/ |
H A D | kerberos5.c | 501 ticket->enc_part2->client, UserNameRequested)) { in kerberos5_status()
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/include/ |
H A D | krb5.h | 1088 krb5_enc_tkt_part *enc_part2; /* ptr to decrypted version, if member 1191 krb5_enc_kdc_rep_part *enc_part2;/* unencrypted version, if available */ member 1264 krb5_cred_enc_part *enc_part2; /* unencrypted version, if available*/ member
|
/illumos-gate/usr/src/lib/pam_modules/krb5/ |
H A D | krb5_authenticate.c | 850 kmd->expiration = as_reply->enc_part2->key_exp; in attempt_krb5_auth()
|
/illumos-gate/usr/src/cmd/krb5/slave/ |
H A D | kpropd.c | 1487 retval = krb5_copy_principal(context, ticket->enc_part2->client, clientp);
|