Home
last modified time | relevance | path

Searched refs:ticket (Results 1 – 25 of 50) sorted by relevance

12

/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Drd_req_dec.c79 enctype = req->ticket->enc_part.enctype; in krb5_rd_req_decrypt_tkt_part()
83 if ((retval = krb5_kt_get_entry(context, keytab, req->ticket->server, in krb5_rd_req_decrypt_tkt_part()
84 req->ticket->enc_part.kvno, in krb5_rd_req_decrypt_tkt_part()
97 retval = krb5_decrypt_tkt_part(context, &ktent.key, req->ticket); in krb5_rd_req_decrypt_tkt_part()
102 krb5_principal princ = (krb5_principal) req->ticket->server; in krb5_rd_req_decrypt_tkt_part()
110 req->ticket->enc_part.kvno, in krb5_rd_req_decrypt_tkt_part()
149 krb5_ticket **ticket, int check_valid_flag) in krb5_rd_req_decoded_opt() argument
155 req->ticket->enc_part2 == NULL; in krb5_rd_req_decoded_opt()
166 if (server && !krb5_principal_compare(context, server, req->ticket->server)) { in krb5_rd_req_decoded_opt()
169 && krb5_unparse_name(context, req->ticket->server, &found_name) == 0) in krb5_rd_req_decoded_opt()
[all …]
H A Ddecrypt_tk.c44 …_decrypt_tkt_part(krb5_context context, const krb5_keyblock *srv_key, register krb5_ticket *ticket) in krb5_decrypt_tkt_part() argument
50 if (!krb5_c_valid_enctype(ticket->enc_part.enctype)) in krb5_decrypt_tkt_part()
53 scratch.length = ticket->enc_part.ciphertext.length; in krb5_decrypt_tkt_part()
54 if (!(scratch.data = malloc(ticket->enc_part.ciphertext.length))) in krb5_decrypt_tkt_part()
60 &ticket->enc_part, &scratch))) { in krb5_decrypt_tkt_part()
71 ticket->enc_part2 = dec_tkt_part; in krb5_decrypt_tkt_part()
H A Dcopy_creds.c60 retval = krb5_copy_data(context, &incred->ticket, &scratch); in krb5_copy_creds()
63 tempcred->ticket = *scratch; in krb5_copy_creds()
80 memset(tempcred->ticket.data,0,tempcred->ticket.length); in krb5_copy_creds()
82 free(tempcred->ticket.data); in krb5_copy_creds()
H A Drecvauth.c55 krb5_ticket ** ticket, in recvauth_common() argument
173 keytab, &ap_option, ticket); in recvauth_common()
256 …r *appl_version, krb5_principal server, krb5_int32 flags, krb5_keytab keytab, krb5_ticket **ticket) in krb5_recvauth() argument
259 server, flags, keytab, ticket, 0); in krb5_recvauth()
271 krb5_ticket **ticket, in krb5_recvauth_version() argument
275 server, flags, keytab, ticket, version); in krb5_recvauth_version()
H A Dmk_req_ext.c145 request.ticket = 0; in krb5_mk_req_extended()
147 if (!in_creds->ticket.length) in krb5_mk_req_extended()
151 if ((retval = decode_krb5_ticket(&(in_creds)->ticket, &request.ticket))) in krb5_mk_req_extended()
264 if (request.ticket) in krb5_mk_req_extended()
265 krb5_free_ticket(context, request.ticket); in krb5_mk_req_extended()
H A Drd_req.c49 … krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) in krb5_rd_req() argument
83 server = request->ticket->server; in krb5_rd_req()
102 keytab, ap_req_options, ticket); in krb5_rd_req()
H A Dsend_tgs.c96 request.ticket = 0; in krb5_send_tgs_basic()
98 if ((retval = decode_krb5_ticket(&(in_cred)->ticket, &request.ticket))) in krb5_send_tgs_basic()
121 krb5_free_ticket(context, request.ticket); in krb5_send_tgs_basic()
176 if (!in_cred->ticket.length) in krb5_send_tgs2()
H A Dgc_via_tkt.c87 if ((retval = encode_krb5_ticket(pkdcrep->ticket, &pdata))) in krb5_kdcrep2creds()
90 (*ppcreds)->ticket = *pdata; in krb5_kdcrep2creds()
107 if (!krb5_principal_compare(context, dec_rep->ticket->server, in check_reply_server()
113 if (krb5_principal_compare(context, dec_rep->ticket->server, in check_reply_server()
135 !IS_TGS_PRINC(context, dec_rep->ticket->server)) { in check_reply_server()
193 if (!tkt->ticket.length) in krb5_get_cred_via_tkt()
H A Dsendauth.c101 if (!in_creds || !in_creds->ticket.length) { in krb5_sendauth()
129 if (!in_creds->ticket.length) { in krb5_sendauth()
H A Dget_in_tkt.c328 || !krb5_principal_compare(context, as_reply->ticket->server, request->server) in verify_as_reply()
420 if ((retval = encode_krb5_ticket(as_reply->ticket, &packet))) in stash_as_reply()
423 creds->ticket = *packet; in stash_as_reply()
449 if (creds->ticket.data) { in stash_as_reply()
450 krb5_xfree(creds->ticket.data); in stash_as_reply()
451 creds->ticket.data = 0; in stash_as_reply()
/titanic_41/usr/src/cmd/krb5/krb5kdc/
H A Dkdc_util.c169 comp_cksum(krb5_context kcontext, krb5_data *source, krb5_ticket *ticket, in comp_cksum() argument
183 if ((retval = krb5_c_verify_checksum(kcontext, ticket->enc_part2->session, in comp_cksum()
196 krb5_data *pkt, krb5_ticket **ticket, in kdc_process_tgs_req() argument
242 if ((krb5_princ_realm(kdc_context, apreq->ticket->server)->length != in kdc_process_tgs_req()
244 memcmp(krb5_princ_realm(kdc_context, apreq->ticket->server)->data, in kdc_process_tgs_req()
278 apreq->ticket->server, in kdc_process_tgs_req()
280 NULL, ticket))) { in kdc_process_tgs_req()
298 apreq, apreq->ticket->server, in kdc_process_tgs_req()
300 NULL, ticket)) in kdc_process_tgs_req()
312 if (isflagset((*ticket)->enc_part2->flags, TKT_FLG_INVALID) in kdc_process_tgs_req()
[all …]
H A Dpolicy.c56 krb5_ticket *ticket, const char **status) in against_local_policy_tgs() argument
H A Ddo_tgs_req.c644 reply.ticket = &ticket_reply; in process_tgs_req()
763 prepare_error_tgs (krb5_kdc_req *request, krb5_ticket *ticket, int error, in prepare_error_tgs() argument
778 if (ticket && ticket->enc_part2) in prepare_error_tgs()
779 errpkt.client = ticket->enc_part2->client; in prepare_error_tgs()
/titanic_41/usr/src/cmd/ssh/sshd/
H A Dauth-krb5.c82 krb5_ticket *ticket; in auth_krb5() local
87 ticket = NULL; in auth_krb5()
118 auth, server, NULL, NULL, &ticket); in auth_krb5()
123 problem = krb5_copy_principal(authctxt->krb5_ctx, ticket->client, in auth_krb5()
127 ticket->enc_part2->client, in auth_krb5()
152 if (ticket) in auth_krb5()
153 krb5_free_ticket(authctxt->krb5_ctx, ticket); in auth_krb5()
/titanic_41/usr/src/lib/krb5/kadm5/srv/
H A Dchgpwd.c59 krb5_ticket *ticket; in process_chpw_request() local
78 ticket = NULL; in process_chpw_request()
181 NULL, &ticket); in process_chpw_request()
311 if (!(ticket->enc_part2->flags & TKT_FLG_INITIAL)) { in process_chpw_request()
344 ret = krb5_unparse_name(context, ticket->enc_part2->client, &clientstr); in process_chpw_request()
366 ticket->enc_part2->client, in process_chpw_request()
548 if (ticket) in process_chpw_request()
549 krb5_free_ticket(context, ticket); in process_chpw_request()
/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/krb5/krb/
H A Dkfree.c74 if (val->ticket) { in krb5_free_ap_req()
75 krb5_free_ticket(context, val->ticket); in krb5_free_ap_req()
76 val->ticket = 0; in krb5_free_ap_req()
191 if (val->ticket.data) { in krb5_free_cred_contents()
192 krb5_xfree(val->ticket.data); in krb5_free_cred_contents()
193 val->ticket.data = 0; in krb5_free_cred_contents()
349 if (val->ticket) { in krb5_free_kdc_rep()
350 krb5_free_ticket(context, val->ticket); in krb5_free_kdc_rep()
351 val->ticket = 0; in krb5_free_kdc_rep()
644 if (val->ticket) { in krb5_free_tkt_authent()
[all …]
/titanic_41/usr/src/cmd/cmd-inet/usr.sbin/
H A Din.rlogind.c117 krb5_ticket **ticket,
372 krb5_ticket **ticket, in recvauth() argument
425 ticket, /* return ticket */ in recvauth()
503 key.contents = (*ticket)->enc_part2->session->contents; in recvauth()
504 key.length = (*ticket)->enc_part2->session->length; in recvauth()
526 (*ticket)->enc_part2->client, in recvauth()
581 (*ticket)->enc_part2->session, in recvauth()
620 creds, *ticket, lusername, in recvauth()
643 krb5_ticket *ticket = NULL; in do_krb_login() local
652 status = recvauth(f, krb_context, &valid_checksum, &ticket, in do_krb_login()
[all …]
H A Din.rshd.c1422 krb5_ticket *ticket; in recvauth() local
1476 &ticket, /* return ticket */ in recvauth()
1510 if ((status = krb5_unparse_name(bsd_context, ticket->enc_part2->client, in recvauth()
1515 ticket->enc_part2->client, &client))) in recvauth()
1556 key.magic = ticket->enc_part2->session->magic; in recvauth()
1557 key.enctype = ticket->enc_part2->session->enctype; in recvauth()
1558 key.contents = ticket->enc_part2->session->contents; in recvauth()
1559 key.length = ticket->enc_part2->session->length; in recvauth()
1626 ticket->enc_part2->session, in recvauth()
1660 ticket->enc_part2->session = 0; in recvauth()
[all …]
H A Din.telnetd.c178 static krb5_ticket *ticket = NULL; variable
463 krb5_data *inbuf, krb5_ticket *ticket, in rd_and_store_forwarded_creds() argument
482 ticket->enc_part2->client)) != 0) in rd_and_store_forwarded_creds()
518 (void) krb5_kuserok(context, ticket->enc_part2->client, in rd_and_store_forwarded_creds()
603 NULL, keytabid, NULL, &ticket); in kerberos5_is()
615 ticket->server, 0)->length < MAXPRINCLEN) { in kerberos5_is()
619 ticket->server, 0)->data, in kerberos5_is()
621 ticket->server, 0)->length); in kerberos5_is()
623 ticket->server, 0)->length] = '\0'; in kerberos5_is()
719 ticket->enc_part2->client, in kerberos5_is()
[all …]
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/ccache/
H A Dcc_retr.c371 equal = (in_creds->ticket.length == in_compare_creds->ticket.length && in krb5_creds_compare()
372 (!in_creds->ticket.length || in krb5_creds_compare()
373 !memcmp (in_creds->ticket.data, in_compare_creds->ticket.data, in krb5_creds_compare()
374 in_creds->ticket.length))); in krb5_creds_compare()
H A Dcc_memory.c367 retval = krb5_copy_data(context, &mcursor->creds->ticket, &scratch); in krb5_mcc_next_cred()
370 creds->ticket = *scratch; in krb5_mcc_next_cred()
386 memset(creds->ticket.data,0, (unsigned) creds->ticket.length); in krb5_mcc_next_cred()
388 krb5_xfree(creds->ticket.data); in krb5_mcc_next_cred()
/titanic_41/usr/src/cmd/cmd-inet/common/
H A Dstore_forw_creds.c46 krb5_ticket *ticket, in store_forw_creds() argument
74 ticket->enc_part2->client)) != 0) { in store_forw_creds()
H A Dstore_forw_creds.h39 krb5_ticket *ticket,
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/mech/
H A Daccept_sec_context.c306 krb5_ticket * ticket = NULL; local
462 if ((code = krb5_copy_principal(context, request->ticket->server,
576 cred->princ, cred->keytab, NULL, &ticket))) {
585 request->ticket->enc_part.kvno,
629 (authdat->ticket->enc_part2 == NULL)) {
862 ticket->enc_part2->authorization_data,
988 ctx->endtime = ticket->enc_part2->times.endtime;
989 ctx->krb_flags = ticket->enc_part2->flags;
991 krb5_free_ticket(context, ticket); /* Done with ticket */
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/rcache/
H A Drc_conv.c31 if ((retval = krb5_unparse_name(context, auth->ticket->server, &rep->server))) in krb5_auth_to_rep()

12