/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | rd_req_dec.c | 79 enctype = req->ticket->enc_part.enctype; in krb5_rd_req_decrypt_tkt_part() 83 if ((retval = krb5_kt_get_entry(context, keytab, req->ticket->server, in krb5_rd_req_decrypt_tkt_part() 84 req->ticket->enc_part.kvno, in krb5_rd_req_decrypt_tkt_part() 97 retval = krb5_decrypt_tkt_part(context, &ktent.key, req->ticket); in krb5_rd_req_decrypt_tkt_part() 102 krb5_principal princ = (krb5_principal) req->ticket->server; in krb5_rd_req_decrypt_tkt_part() 110 req->ticket->enc_part.kvno, in krb5_rd_req_decrypt_tkt_part() 149 krb5_ticket **ticket, int check_valid_flag) in krb5_rd_req_decoded_opt() argument 155 req->ticket->enc_part2 == NULL; in krb5_rd_req_decoded_opt() 166 if (server && !krb5_principal_compare(context, server, req->ticket->server)) { in krb5_rd_req_decoded_opt() 169 && krb5_unparse_name(context, req->ticket->server, &found_name) == 0) in krb5_rd_req_decoded_opt() [all …]
|
H A D | decrypt_tk.c | 44 …_decrypt_tkt_part(krb5_context context, const krb5_keyblock *srv_key, register krb5_ticket *ticket) in krb5_decrypt_tkt_part() argument 50 if (!krb5_c_valid_enctype(ticket->enc_part.enctype)) in krb5_decrypt_tkt_part() 53 scratch.length = ticket->enc_part.ciphertext.length; in krb5_decrypt_tkt_part() 54 if (!(scratch.data = malloc(ticket->enc_part.ciphertext.length))) in krb5_decrypt_tkt_part() 60 &ticket->enc_part, &scratch))) { in krb5_decrypt_tkt_part() 71 ticket->enc_part2 = dec_tkt_part; in krb5_decrypt_tkt_part()
|
H A D | copy_creds.c | 60 retval = krb5_copy_data(context, &incred->ticket, &scratch); in krb5_copy_creds() 63 tempcred->ticket = *scratch; in krb5_copy_creds() 80 memset(tempcred->ticket.data,0,tempcred->ticket.length); in krb5_copy_creds() 82 free(tempcred->ticket.data); in krb5_copy_creds()
|
H A D | recvauth.c | 55 krb5_ticket ** ticket, in recvauth_common() argument 173 keytab, &ap_option, ticket); in recvauth_common() 256 …r *appl_version, krb5_principal server, krb5_int32 flags, krb5_keytab keytab, krb5_ticket **ticket) in krb5_recvauth() argument 259 server, flags, keytab, ticket, 0); in krb5_recvauth() 271 krb5_ticket **ticket, in krb5_recvauth_version() argument 275 server, flags, keytab, ticket, version); in krb5_recvauth_version()
|
H A D | mk_req_ext.c | 145 request.ticket = 0; in krb5_mk_req_extended() 147 if (!in_creds->ticket.length) in krb5_mk_req_extended() 151 if ((retval = decode_krb5_ticket(&(in_creds)->ticket, &request.ticket))) in krb5_mk_req_extended() 264 if (request.ticket) in krb5_mk_req_extended() 265 krb5_free_ticket(context, request.ticket); in krb5_mk_req_extended()
|
H A D | rd_req.c | 49 … krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) in krb5_rd_req() argument 83 server = request->ticket->server; in krb5_rd_req() 102 keytab, ap_req_options, ticket); in krb5_rd_req()
|
H A D | send_tgs.c | 96 request.ticket = 0; in krb5_send_tgs_basic() 98 if ((retval = decode_krb5_ticket(&(in_cred)->ticket, &request.ticket))) in krb5_send_tgs_basic() 121 krb5_free_ticket(context, request.ticket); in krb5_send_tgs_basic() 176 if (!in_cred->ticket.length) in krb5_send_tgs2()
|
H A D | gc_via_tkt.c | 87 if ((retval = encode_krb5_ticket(pkdcrep->ticket, &pdata))) in krb5_kdcrep2creds() 90 (*ppcreds)->ticket = *pdata; in krb5_kdcrep2creds() 107 if (!krb5_principal_compare(context, dec_rep->ticket->server, in check_reply_server() 113 if (krb5_principal_compare(context, dec_rep->ticket->server, in check_reply_server() 135 !IS_TGS_PRINC(context, dec_rep->ticket->server)) { in check_reply_server() 193 if (!tkt->ticket.length) in krb5_get_cred_via_tkt()
|
H A D | sendauth.c | 101 if (!in_creds || !in_creds->ticket.length) { in krb5_sendauth() 129 if (!in_creds->ticket.length) { in krb5_sendauth()
|
H A D | get_in_tkt.c | 328 || !krb5_principal_compare(context, as_reply->ticket->server, request->server) in verify_as_reply() 420 if ((retval = encode_krb5_ticket(as_reply->ticket, &packet))) in stash_as_reply() 423 creds->ticket = *packet; in stash_as_reply() 449 if (creds->ticket.data) { in stash_as_reply() 450 krb5_xfree(creds->ticket.data); in stash_as_reply() 451 creds->ticket.data = 0; in stash_as_reply()
|
/titanic_41/usr/src/cmd/krb5/krb5kdc/ |
H A D | kdc_util.c | 169 comp_cksum(krb5_context kcontext, krb5_data *source, krb5_ticket *ticket, in comp_cksum() argument 183 if ((retval = krb5_c_verify_checksum(kcontext, ticket->enc_part2->session, in comp_cksum() 196 krb5_data *pkt, krb5_ticket **ticket, in kdc_process_tgs_req() argument 242 if ((krb5_princ_realm(kdc_context, apreq->ticket->server)->length != in kdc_process_tgs_req() 244 memcmp(krb5_princ_realm(kdc_context, apreq->ticket->server)->data, in kdc_process_tgs_req() 278 apreq->ticket->server, in kdc_process_tgs_req() 280 NULL, ticket))) { in kdc_process_tgs_req() 298 apreq, apreq->ticket->server, in kdc_process_tgs_req() 300 NULL, ticket)) in kdc_process_tgs_req() 312 if (isflagset((*ticket)->enc_part2->flags, TKT_FLG_INVALID) in kdc_process_tgs_req() [all …]
|
H A D | policy.c | 56 krb5_ticket *ticket, const char **status) in against_local_policy_tgs() argument
|
H A D | do_tgs_req.c | 644 reply.ticket = &ticket_reply; in process_tgs_req() 763 prepare_error_tgs (krb5_kdc_req *request, krb5_ticket *ticket, int error, in prepare_error_tgs() argument 778 if (ticket && ticket->enc_part2) in prepare_error_tgs() 779 errpkt.client = ticket->enc_part2->client; in prepare_error_tgs()
|
/titanic_41/usr/src/cmd/ssh/sshd/ |
H A D | auth-krb5.c | 82 krb5_ticket *ticket; in auth_krb5() local 87 ticket = NULL; in auth_krb5() 118 auth, server, NULL, NULL, &ticket); in auth_krb5() 123 problem = krb5_copy_principal(authctxt->krb5_ctx, ticket->client, in auth_krb5() 127 ticket->enc_part2->client, in auth_krb5() 152 if (ticket) in auth_krb5() 153 krb5_free_ticket(authctxt->krb5_ctx, ticket); in auth_krb5()
|
/titanic_41/usr/src/lib/krb5/kadm5/srv/ |
H A D | chgpwd.c | 59 krb5_ticket *ticket; in process_chpw_request() local 78 ticket = NULL; in process_chpw_request() 181 NULL, &ticket); in process_chpw_request() 311 if (!(ticket->enc_part2->flags & TKT_FLG_INITIAL)) { in process_chpw_request() 344 ret = krb5_unparse_name(context, ticket->enc_part2->client, &clientstr); in process_chpw_request() 366 ticket->enc_part2->client, in process_chpw_request() 548 if (ticket) in process_chpw_request() 549 krb5_free_ticket(context, ticket); in process_chpw_request()
|
/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/krb5/krb/ |
H A D | kfree.c | 74 if (val->ticket) { in krb5_free_ap_req() 75 krb5_free_ticket(context, val->ticket); in krb5_free_ap_req() 76 val->ticket = 0; in krb5_free_ap_req() 191 if (val->ticket.data) { in krb5_free_cred_contents() 192 krb5_xfree(val->ticket.data); in krb5_free_cred_contents() 193 val->ticket.data = 0; in krb5_free_cred_contents() 349 if (val->ticket) { in krb5_free_kdc_rep() 350 krb5_free_ticket(context, val->ticket); in krb5_free_kdc_rep() 351 val->ticket = 0; in krb5_free_kdc_rep() 644 if (val->ticket) { in krb5_free_tkt_authent() [all …]
|
/titanic_41/usr/src/cmd/cmd-inet/usr.sbin/ |
H A D | in.rlogind.c | 117 krb5_ticket **ticket, 372 krb5_ticket **ticket, in recvauth() argument 425 ticket, /* return ticket */ in recvauth() 503 key.contents = (*ticket)->enc_part2->session->contents; in recvauth() 504 key.length = (*ticket)->enc_part2->session->length; in recvauth() 526 (*ticket)->enc_part2->client, in recvauth() 581 (*ticket)->enc_part2->session, in recvauth() 620 creds, *ticket, lusername, in recvauth() 643 krb5_ticket *ticket = NULL; in do_krb_login() local 652 status = recvauth(f, krb_context, &valid_checksum, &ticket, in do_krb_login() [all …]
|
H A D | in.rshd.c | 1422 krb5_ticket *ticket; in recvauth() local 1476 &ticket, /* return ticket */ in recvauth() 1510 if ((status = krb5_unparse_name(bsd_context, ticket->enc_part2->client, in recvauth() 1515 ticket->enc_part2->client, &client))) in recvauth() 1556 key.magic = ticket->enc_part2->session->magic; in recvauth() 1557 key.enctype = ticket->enc_part2->session->enctype; in recvauth() 1558 key.contents = ticket->enc_part2->session->contents; in recvauth() 1559 key.length = ticket->enc_part2->session->length; in recvauth() 1626 ticket->enc_part2->session, in recvauth() 1660 ticket->enc_part2->session = 0; in recvauth() [all …]
|
H A D | in.telnetd.c | 178 static krb5_ticket *ticket = NULL; variable 463 krb5_data *inbuf, krb5_ticket *ticket, in rd_and_store_forwarded_creds() argument 482 ticket->enc_part2->client)) != 0) in rd_and_store_forwarded_creds() 518 (void) krb5_kuserok(context, ticket->enc_part2->client, in rd_and_store_forwarded_creds() 603 NULL, keytabid, NULL, &ticket); in kerberos5_is() 615 ticket->server, 0)->length < MAXPRINCLEN) { in kerberos5_is() 619 ticket->server, 0)->data, in kerberos5_is() 621 ticket->server, 0)->length); in kerberos5_is() 623 ticket->server, 0)->length] = '\0'; in kerberos5_is() 719 ticket->enc_part2->client, in kerberos5_is() [all …]
|
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/ccache/ |
H A D | cc_retr.c | 371 equal = (in_creds->ticket.length == in_compare_creds->ticket.length && in krb5_creds_compare() 372 (!in_creds->ticket.length || in krb5_creds_compare() 373 !memcmp (in_creds->ticket.data, in_compare_creds->ticket.data, in krb5_creds_compare() 374 in_creds->ticket.length))); in krb5_creds_compare()
|
H A D | cc_memory.c | 367 retval = krb5_copy_data(context, &mcursor->creds->ticket, &scratch); in krb5_mcc_next_cred() 370 creds->ticket = *scratch; in krb5_mcc_next_cred() 386 memset(creds->ticket.data,0, (unsigned) creds->ticket.length); in krb5_mcc_next_cred() 388 krb5_xfree(creds->ticket.data); in krb5_mcc_next_cred()
|
/titanic_41/usr/src/cmd/cmd-inet/common/ |
H A D | store_forw_creds.c | 46 krb5_ticket *ticket, in store_forw_creds() argument 74 ticket->enc_part2->client)) != 0) { in store_forw_creds()
|
H A D | store_forw_creds.h | 39 krb5_ticket *ticket,
|
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | accept_sec_context.c | 306 krb5_ticket * ticket = NULL; local 462 if ((code = krb5_copy_principal(context, request->ticket->server, 576 cred->princ, cred->keytab, NULL, &ticket))) { 585 request->ticket->enc_part.kvno, 629 (authdat->ticket->enc_part2 == NULL)) { 862 ticket->enc_part2->authorization_data, 988 ctx->endtime = ticket->enc_part2->times.endtime; 989 ctx->krb_flags = ticket->enc_part2->flags; 991 krb5_free_ticket(context, ticket); /* Done with ticket */
|
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/rcache/ |
H A D | rc_conv.c | 31 if ((retval = krb5_unparse_name(context, auth->ticket->server, &rep->server))) in krb5_auth_to_rep()
|