Home
last modified time | relevance | path

Searched refs:enc_part2 (Results 1 – 22 of 22) sorted by relevance

/illumos-gate/usr/src/cmd/krb5/krb5kdc/
H A Ddo_tgs_req.c132 header_ticket->enc_part2->client, in process_tgs_req()
295 header_ticket->enc_part2->times.starttime = in process_tgs_req()
296 header_ticket->enc_part2->times.authtime; in process_tgs_req()
348 enc_tkt_reply = *(header_ticket->enc_part2); in process_tgs_req()
358 enc_tkt_reply = *(header_ticket->enc_part2); in process_tgs_req()
382 min(header_ticket->enc_part2->times.endtime, in process_tgs_req()
449 header_ticket->enc_part2->session, in process_tgs_req()
565 ticket_reply.enc_part2 = &enc_tkt_reply; in process_tgs_req()
676 header_ticket->enc_part2->session, in process_tgs_req()
778 if (ticket && ticket->enc_part2) in prepare_error_tgs()
[all …]
H A Dkdc_util.c335 (*ticket)->enc_part2->client); in kdc_process_tgs_req()
1209 !isflagset(ticket->enc_part2->flags, TKT_FLG_PROXIABLE)) { in validate_tgs_request()
1224 !isflagset(ticket->enc_part2->flags, TKT_FLG_INVALID)) { in validate_tgs_request()
1232 !isflagset(ticket->enc_part2->flags, TKT_FLG_RENEWABLE)) { in validate_tgs_request()
1302 if (ticket->enc_part2->times.starttime > kdc_time) { in validate_tgs_request()
1313 (ticket->enc_part2->times.renew_till < kdc_time)) { in validate_tgs_request()
1340 !isflagset(ticket->enc_part2->flags,TKT_FLG_HW_AUTH)) { in validate_tgs_request()
1347 !isflagset(ticket->enc_part2->flags, TKT_FLG_PRE_AUTH)) { in validate_tgs_request()
1591 && rep->ticket->enc_part2 != NULL in rep_etypes2str()
1592 && rep->ticket->enc_part2->session != NULL) { in rep_etypes2str()
[all …]
H A Ddo_as_req.c331 ticket_reply.enc_part2 = &enc_tkt_reply; in process_as_req()
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dgc_via_tkt.c60 pkdcrep->enc_part2->session, in krb5_kdcrep2creds()
69 (*ppcreds)->ticket_flags = pkdcrep->enc_part2->flags; in krb5_kdcrep2creds()
70 (*ppcreds)->times = pkdcrep->enc_part2->times; in krb5_kdcrep2creds()
76 if (pkdcrep->enc_part2->caddrs) { in krb5_kdcrep2creds()
108 dec_rep->enc_part2->server)) in check_reply_server()
404 if (dec_rep->enc_part2->nonce != tgsrep.expected_nonce) in krb5_get_cred_via_tkt()
413 (dec_rep->enc_part2->times.endtime > in_cred->times.endtime)) in krb5_get_cred_via_tkt()
422 (dec_rep->enc_part2->flags & KDC_OPT_RENEWABLE) && in krb5_get_cred_via_tkt()
431 !in_clock_skew(dec_rep->enc_part2->times.starttime, in krb5_get_cred_via_tkt()
441 memset(dec_rep->enc_part2->session->contents, 0, in krb5_get_cred_via_tkt()
[all …]
H A Drd_req_dec.c155 req->ticket->enc_part2 == NULL; in krb5_rd_req_decoded_opt()
204 req->ticket->enc_part2->client)) { in krb5_rd_req_decoded_opt()
211 req->ticket->enc_part2->caddrs)) { in krb5_rd_req_decoded_opt()
223 krb5_transited *trans = &(req->ticket->enc_part2->transited); in krb5_rd_req_decoded_opt()
240 trans = &(req->ticket->enc_part2->transited); in krb5_rd_req_decoded_opt()
264 trans = &(req->ticket->enc_part2->transited); in krb5_rd_req_decoded_opt()
363 etype = req->ticket->enc_part2->session->enctype)) || in krb5_rd_req_decoded_opt()
398 req->ticket->enc_part2->session->enctype) in krb5_rd_req_decoded_opt()
494 if (req->ticket->enc_part2) in krb5_rd_req_decoded_opt()
496 req->ticket->enc_part2 = NULL; in krb5_rd_req_decoded_opt()
[all …]
H A Dget_in_tkt.c264 if (as_reply->enc_part2) in decrypt_as_reply()
330 if (!as_reply->enc_part2->times.starttime) in verify_as_reply()
331 as_reply->enc_part2->times.starttime = in verify_as_reply()
332 as_reply->enc_part2->times.authtime; in verify_as_reply()
337 || (request->nonce != as_reply->enc_part2->nonce) in verify_as_reply()
350 (as_reply->enc_part2->flags & KDC_OPT_RENEWABLE) && in verify_as_reply()
355 (as_reply->enc_part2->flags & KDC_OPT_RENEWABLE) && in verify_as_reply()
373 as_reply->enc_part2->times.authtime, 0); in verify_as_reply()
413 as_reply->enc_part2->session, in stash_as_reply()
417 creds->times = as_reply->enc_part2->times; in stash_as_reply()
[all …]
H A Dgic_pwd.c441 as_reply->enc_part2->key_exp && in __krb5_get_init_creds_password()
442 ((hours = ((as_reply->enc_part2->key_exp-now)/(60*60))) <= 7*24) && in __krb5_get_init_creds_password()
460 as_reply->enc_part2 && as_reply->enc_part2->last_req) { in __krb5_get_init_creds_password()
465 for (last_req = as_reply->enc_part2->last_req; *last_req; last_req++) in __krb5_get_init_creds_password()
H A Dcopy_tick.c117 retval = krb5_copy_enc_tkt_part(context, from->enc_part2, &tempto->enc_part2); in krb5_copy_ticket()
H A Dencrypt_tk.c49 register krb5_enc_tkt_part *dec_tkt_part = dec_ticket->enc_part2; in krb5_encrypt_tkt_part()
H A Ddecrypt_tk.c70 ticket->enc_part2 = dec_tkt_part; in krb5_decrypt_tkt_part()
H A Dkdc_rep_dc.c77 dec_rep->enc_part2 = local_encpart; in krb5_kdc_rep_decrypt_proc()
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/
H A Din.rshd.c1510 if ((status = krb5_unparse_name(bsd_context, ticket->enc_part2->client, in recvauth()
1515 ticket->enc_part2->client, &client))) in recvauth()
1556 key.magic = ticket->enc_part2->session->magic; in recvauth()
1557 key.enctype = ticket->enc_part2->session->enctype; in recvauth()
1558 key.contents = ticket->enc_part2->session->contents; in recvauth()
1559 key.length = ticket->enc_part2->session->length; in recvauth()
1626 ticket->enc_part2->session, in recvauth()
1660 ticket->enc_part2->session = 0; in recvauth()
H A Din.rlogind.c503 key.contents = (*ticket)->enc_part2->session->contents; in recvauth()
504 key.length = (*ticket)->enc_part2->session->length; in recvauth()
526 (*ticket)->enc_part2->client, in recvauth()
581 (*ticket)->enc_part2->session, in recvauth()
H A Din.telnetd.c482 ticket->enc_part2->client)) != 0) in rd_and_store_forwarded_creds()
518 (void) krb5_kuserok(context, ticket->enc_part2->client, in rd_and_store_forwarded_creds()
719 ticket->enc_part2->client, in kerberos5_is()
747 ticket->enc_part2->session, &session_key); in kerberos5_is()
954 (retval = krb5_kuserok(telnet_context, ticket->enc_part2->client, in krb5_user_status()
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/krb5/krb/
H A Dkfree.c357 if (val->enc_part2) { in krb5_free_kdc_rep()
358 krb5_free_enc_kdc_rep_part(context, val->enc_part2); in krb5_free_kdc_rep()
359 val->enc_part2 = 0; in krb5_free_kdc_rep()
616 if (val->enc_part2) in krb5_free_ticket()
617 krb5_free_enc_tkt_part(context, val->enc_part2); in krb5_free_ticket()
/illumos-gate/usr/src/cmd/cmd-inet/common/
H A Dstore_forw_creds.c71 ticket->enc_part2->client)) != 0) { in store_forw_creds()
/illumos-gate/usr/src/lib/krb5/kadm5/srv/
H A Dchgpwd.c311 if (!(ticket->enc_part2->flags & TKT_FLG_INITIAL)) { in process_chpw_request()
344 ret = krb5_unparse_name(context, ticket->enc_part2->client, &clientstr); in process_chpw_request()
366 ticket->enc_part2->client, in process_chpw_request()
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/
H A Daccept_sec_context.c630 (authdat->ticket->enc_part2 == NULL)) {
863 ticket->enc_part2->authorization_data,
989 ctx->endtime = ticket->enc_part2->times.endtime;
990 ctx->krb_flags = ticket->enc_part2->flags;
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/telnet/
H A Dkerberos5.c501 ticket->enc_part2->client, UserNameRequested)) { in kerberos5_status()
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/include/
H A Dkrb5.h1088 krb5_enc_tkt_part *enc_part2; /* ptr to decrypted version, if member
1191 krb5_enc_kdc_rep_part *enc_part2;/* unencrypted version, if available */ member
1264 krb5_cred_enc_part *enc_part2; /* unencrypted version, if available*/ member
/illumos-gate/usr/src/lib/pam_modules/krb5/
H A Dkrb5_authenticate.c857 kmd->expiration = as_reply->enc_part2->key_exp; in attempt_krb5_auth()
/illumos-gate/usr/src/cmd/krb5/slave/
H A Dkpropd.c1487 retval = krb5_copy_principal(context, ticket->enc_part2->client, clientp);