| /src/crypto/krb5/src/lib/krb5/krb/ |
| H A D | gc_via_tkt.c | 53 if ((retval = krb5_copy_principal(context, pkdcrep->enc_part2->server, in kdcrep2creds() 58 pkdcrep->enc_part2->session, in kdcrep2creds() 69 (*ppcreds)->ticket_flags = pkdcrep->enc_part2->flags; in kdcrep2creds() 70 (*ppcreds)->times = pkdcrep->enc_part2->times; in kdcrep2creds() 76 if (pkdcrep->enc_part2->caddrs) { in kdcrep2creds() 77 if ((retval = krb5_copy_addresses(context, pkdcrep->enc_part2->caddrs, in kdcrep2creds() 109 dec_rep->enc_part2->server)) in check_reply_server() 125 dec_rep->enc_part2->server); in check_reply_server() 252 dec_rep->enc_part2->flags &= ~TKT_FLG_OK_AS_DELEGATE; in krb5int_process_tgs_reply() 275 if (dec_rep->enc_part2->nonce != nonce) in krb5int_process_tgs_reply() [all …]
|
| H A D | rd_req_dec.c | 488 req->ticket->enc_part2 = NULL; in rd_req_decoded_opt() 518 TRACE_RD_REQ_TICKET(context, req->ticket->enc_part2->client, in rd_req_decoded_opt() 519 req->ticket->server, req->ticket->enc_part2->session); in rd_req_decoded_opt() 531 req->ticket->enc_part2->client)) { in rd_req_decoded_opt() 538 req->ticket->enc_part2->caddrs)) { in rd_req_decoded_opt() 557 krb5_transited *trans = &(req->ticket->enc_part2->transited); in rd_req_decoded_opt() 573 realm = &req->ticket->enc_part2->client->realm; in rd_req_decoded_opt() 574 trans = &(req->ticket->enc_part2->transited); in rd_req_decoded_opt() 597 realm = &req->ticket->enc_part2->client->realm; in rd_req_decoded_opt() 598 trans = &(req->ticket->enc_part2->transited); in rd_req_decoded_opt() [all …]
|
| H A D | srv_dec_tkt.c | 55 trans = &ticket->enc_part2->transited; in decrypt_ticket_keyblock() 56 realm = &ticket->enc_part2->client->realm; in decrypt_ticket_keyblock() 63 if (ticket->enc_part2->flags & TKT_FLG_INVALID) { /* ie, KDC_OPT_POSTDATED */ in decrypt_ticket_keyblock()
|
| H A D | get_in_tkt.c | 155 krb5_keyblock *session = reply->enc_part2->session; in verify_anonymous() 218 if (!as_reply->enc_part2->times.starttime) in verify_as_reply() 219 as_reply->enc_part2->times.starttime = in verify_as_reply() 220 as_reply->enc_part2->times.authtime; in verify_as_reply() 232 IS_TGS_PRINC(as_reply->enc_part2->server); in verify_as_reply() 237 !krb5_principal_compare(context, as_reply->enc_part2->server, request->server)) in verify_as_reply() 239 || !krb5_principal_compare(context, as_reply->enc_part2->server, as_reply->ticket->server) in verify_as_reply() 240 || (request->nonce != as_reply->enc_part2->nonce) in verify_as_reply() 245 (request->from != as_reply->enc_part2->times.starttime)) in verify_as_reply() 247 ts_after(as_reply->enc_part2->times.endtime, request->till)) in verify_as_reply() [all …]
|
| H A D | t_pac.c | 738 ret = krb5_kdc_verify_ticket(context, ticket->enc_part2, sprinc, in test_pac_ticket_signature() 745 ret = krb5_pac_verify(context, pac, ticket->enc_part2->times.authtime, in test_pac_ticket_signature() 751 authdata1 = ticket->enc_part2->authorization_data; in test_pac_ticket_signature() 752 ticket->enc_part2->authorization_data = NULL; in test_pac_ticket_signature() 754 ret = krb5_kdc_sign_ticket(context, ticket->enc_part2, pac, sprinc, in test_pac_ticket_signature() 760 authdata2 = ticket->enc_part2->authorization_data; in test_pac_ticket_signature() 795 krb5_free_authdata(context, ticket->enc_part2->authorization_data); in test_pac_ticket_signature() 796 ticket->enc_part2->authorization_data = NULL; in test_pac_ticket_signature() 798 ret = krb5_kdc_sign_ticket(context, ticket->enc_part2, pac2, sprinc, NULL, in test_pac_ticket_signature() 805 ret = krb5_kdc_verify_ticket(context, ticket->enc_part2, sprinc, in test_pac_ticket_signature()
|
| H A D | copy_tick.c | 113 retval = copy_enc_tkt_part(context, from->enc_part2, &tempto->enc_part2); in krb5_copy_ticket()
|
| H A D | encrypt_tk.c | 47 krb5_enc_tkt_part *dec_tkt_part = dec_ticket->enc_part2; in krb5_encrypt_tkt_part()
|
| H A D | decrypt_tk.c | 67 ticket->enc_part2 = dec_tkt_part; in krb5_decrypt_tkt_part()
|
| H A D | kdc_rep_dc.c | 74 dec_rep->enc_part2 = local_encpart; in krb5_kdc_rep_decrypt_proc()
|
| H A D | fast.c | 648 if (rep->enc_part2->flags& TKT_FLG_ENC_PA_REP) { in krb5int_fast_verify_nego() 649 pa = krb5int_find_pa_data(context, rep->enc_part2->enc_padata, in krb5int_fast_verify_nego() 666 pa = krb5int_find_pa_data(context, rep->enc_part2->enc_padata, in krb5int_fast_verify_nego()
|
| H A D | authdata.c | 514 ticket_authdata = ap_req->ticket->enc_part2->authorization_data; in k5_get_kdc_issued_authdata() 527 ap_req->ticket->enc_part2->session, in k5_get_kdc_issued_authdata() 596 ticket_authdata = ap_req->ticket->enc_part2->authorization_data; in get_cammac_authdata() 627 ticket_authdata = ap_req->ticket->enc_part2->authorization_data; in krb5int_authdata_verify()
|
| H A D | kfree.c | 323 krb5_free_enc_kdc_rep_part(context, val->enc_part2); in krb5_free_kdc_rep() 456 krb5_free_enc_tkt_part(context, val->enc_part2); in krb5_free_ticket()
|
| H A D | s4u_creds.c | 1223 if (evidence_tkt->enc_part2 != NULL && in krb5_get_credentials_for_proxy() 1224 !krb5_principal_compare(context, evidence_tkt->enc_part2->client, in krb5_get_credentials_for_proxy()
|
| H A D | pac.c | 853 req->ticket->enc_part2->times.authtime, in mspac_verify() 854 req->ticket->enc_part2->client, key, NULL); in mspac_verify()
|
| /src/crypto/krb5/src/kdc/ |
| H A D | tgs_policy.c | 91 if (!(r->checkflag & tkt->enc_part2->flags)) { in check_tgs_opts() 98 if (isflagset(tkt->enc_part2->flags, TKT_FLG_INVALID) && in check_tgs_opts() 175 if (!(tkt->enc_part2->flags & TKT_FLG_HW_AUTH)) { in check_tgs_svc_reqd_flags() 181 if (!(tkt->enc_part2->flags & TKT_FLG_PRE_AUTH)) { in check_tgs_svc_reqd_flags() 253 if (is_crossrealm && data_eq(tkt->enc_part2->client->realm, in check_tgs_lineage() 274 !is_client_db_alias(context, server, tkt->enc_part2->client)) { in check_tgs_s4u2self() 337 if (krb5_pac_verify(context, pac, tkt->enc_part2->times.authtime, in check_tgs_s4u2self() 338 tkt->enc_part2->client, NULL, NULL) != 0) { in check_tgs_s4u2self() 349 if (krb5_pac_verify_ext(context, pac, tkt->enc_part2->times.authtime, in check_tgs_s4u2self() 435 if (!(stkt->enc_part2->flags & TKT_FLG_FORWARDABLE)) { in check_tgs_s4u2proxy() [all …]
|
| H A D | do_tgs_req.c | 201 if (ticket && ticket->enc_part2) in prepare_error_tgs() 202 errpkt.client = ticket->enc_part2->client; in prepare_error_tgs() 291 retval = get_verified_pac(context, stkt->enc_part2, server, key, local_tgt, in decrypt_2ndtkt() 317 etype = stkt->enc_part2->session->enctype; in get_2ndtkt_enctype() 620 if (t->header_tkt != NULL && t->header_tkt->enc_part2 != NULL) in gather_tgs_req_info() 621 t->cprinc = t->header_tkt->enc_part2->client; in gather_tgs_req_info() 629 header_enc = t->header_tkt->enc_part2; in gather_tgs_req_info() 748 t->s4u_cprinc = t->stkt->enc_part2->client; in gather_tgs_req_info() 750 t->subject_tkt = t->stkt->enc_part2; in gather_tgs_req_info() 818 krb5_ticket_times *htimes = &t->header_tkt->enc_part2->times; in compute_ticket_times() [all …]
|
| H A D | kdc_util.c | 131 if ((retval = krb5_c_verify_checksum(kcontext, ticket->enc_part2->session, in comp_cksum() 217 retval = krb5_find_authdata(context, ticket->enc_part2->authorization_data, in kdc_process_tgs_req() 272 if (apreq->ticket->enc_part2 != NULL) { in kdc_process_tgs_req() 342 if (apreq->ticket->enc_part2 != NULL) in kdc_rd_ap_req() 1221 if (rep->ticket != NULL && rep->ticket->enc_part2 != NULL && in rep_etypes2str() 1222 rep->ticket->enc_part2->session != NULL) { in rep_etypes2str() 1223 etype = rep->ticket->enc_part2->session->enctype; in rep_etypes2str()
|
| H A D | fast_util.c | 81 ticket->enc_part2->session, "ticketarmor", in armor_ap_request()
|
| H A D | do_as_req.c | 216 state->ticket_reply.enc_part2 = &state->enc_tkt_reply; in finish_process_as_req()
|
| /src/crypto/krb5/src/lib/gssapi/krb5/ |
| H A D | accept_sec_context.c | 132 krb_creds.client = ticket->enc_part2->client; in create_constrained_deleg_creds() 134 krb_creds.keyblock = *(ticket->enc_part2->session); in create_constrained_deleg_creds() 135 krb_creds.ticket_flags = ticket->enc_part2->flags; in create_constrained_deleg_creds() 136 krb_creds.times = ticket->enc_part2->times; in create_constrained_deleg_creds() 881 ticket->enc_part2->authorization_data, in kg_accept_krb5() 941 ctx->krb_times = ticket->enc_part2->times; /* struct copy */ in kg_accept_krb5() 942 ctx->krb_flags = ticket->enc_part2->flags; in kg_accept_krb5()
|
| /src/crypto/krb5/src/plugins/audit/ |
| H A D | kdc_j_encode.c | 367 ret = princ_to_value(req->second_ticket[0]->enc_part2->client, in kau_j_tgs_s4u2proxy() 422 ret = princ_to_value(req->second_ticket[0]->enc_part2->client, in kau_j_tgs_u2u() 427 ret = int32_to_value(req->second_ticket[0]->enc_part2->session->enctype, in kau_j_tgs_u2u() 859 if (tkt->enc_part2) in tkt_to_value() 860 part2 = tkt->enc_part2; in tkt_to_value()
|
| /src/crypto/krb5/src/kadmin/server/ |
| H A D | schpw.c | 168 client = ticket->enc_part2->client; in process_chpw_request() 210 (ticket->enc_part2->flags & TKT_FLG_INITIAL) != 0, in process_chpw_request()
|
| /src/crypto/krb5/src/appl/sample/sserver/ |
| H A D | sserver.c | 215 retval = krb5_unparse_name(context, ticket->enc_part2->client, &cname); in main()
|
| /src/crypto/krb5/src/appl/simple/server/ |
| H A D | sim_server.c | 190 if ((retval = krb5_unparse_name(context, ticket->enc_part2->client, in main()
|
| /src/crypto/krb5/src/appl/user_user/ |
| H A D | client.c | 247 retval = krb5_unparse_name(context, ticket->enc_part2->client, &princ); in main()
|