tkt 216 source3/client/cifs.upcall.c DATA_BLOB tkt, tkt_wrapped;
tkt 222 source3/client/cifs.upcall.c retval = cli_krb5_get_ticket(principal, 0, &tkt, sess_key, 0, ccname,
tkt 234 source3/client/cifs.upcall.c tkt_wrapped = spnego_gen_krb5_wrap(tkt, TOK_ID_KRB_AP_REQ);
tkt 240 source3/client/cifs.upcall.c data_blob_free(&tkt);
tkt 939 source3/include/includes.h bool get_auth_data_from_tkt(TALLOC_CTX *mem_ctx, DATA_BLOB *auth_data, krb5_ticket *tkt);
tkt 940 source3/include/includes.h krb5_const_principal get_principal_from_tkt(krb5_ticket *tkt);
tkt 967 source3/include/includes.h time_t get_authtime_from_tkt(krb5_ticket *tkt);
tkt 355 source3/libads/authdata.c DATA_BLOB tkt, ap_rep, sesskey1, sesskey2;
tkt 362 source3/libads/authdata.c ZERO_STRUCT(tkt);
tkt 427 source3/libads/authdata.c &tkt,
tkt 442 source3/libads/authdata.c &tkt,
tkt 467 source3/libads/authdata.c data_blob_free(&tkt);
tkt 418 source3/libads/kerberos_verify.c krb5_ticket *tkt = NULL;
tkt 525 source3/libads/kerberos_verify.c host_princ, ticket, &tkt, &keyblock, &ret);
tkt 529 source3/libads/kerberos_verify.c ticket, &tkt, &keyblock, &ret);
tkt 533 source3/libads/kerberos_verify.c auth_context, ticket, &tkt, &keyblock, &ret);
tkt 540 source3/libads/kerberos_verify.c host_princ, ticket, &tkt, &keyblock, &ret);
tkt 548 source3/libads/kerberos_verify.c auth_context, ticket, &tkt, &keyblock,
tkt 580 source3/libads/kerberos_verify.c authtime = get_authtime_from_tkt(tkt);
tkt 581 source3/libads/kerberos_verify.c client_principal = get_principal_from_tkt(tkt);
tkt 607 source3/libads/kerberos_verify.c got_auth_data = get_auth_data_from_tkt(mem_ctx, &auth_data, tkt);
tkt 624 source3/libads/kerberos_verify.c if (tkt->enc_part2) {
tkt 626 source3/libads/kerberos_verify.c tkt->enc_part2->authorization_data[0]->contents,
tkt 627 source3/libads/kerberos_verify.c tkt->enc_part2->authorization_data[0]->length);
tkt 631 source3/libads/kerberos_verify.c if (tkt->ticket.authorization_data) {
tkt 633 source3/libads/kerberos_verify.c tkt->ticket.authorization_data->val->ad_data.data,
tkt 634 source3/libads/kerberos_verify.c tkt->ticket.authorization_data->val->ad_data.length);
tkt 668 source3/libads/kerberos_verify.c if (tkt != NULL) {
tkt 669 source3/libads/kerberos_verify.c krb5_free_ticket(context, tkt);
tkt 405 source3/libsmb/clikrb5.c bool get_auth_data_from_tkt(TALLOC_CTX *mem_ctx, DATA_BLOB *auth_data, krb5_ticket *tkt)
tkt 412 source3/libsmb/clikrb5.c if (tkt->enc_part2 && tkt->enc_part2->authorization_data &&
tkt 413 source3/libsmb/clikrb5.c tkt->enc_part2->authorization_data[0] &&
tkt 414 source3/libsmb/clikrb5.c tkt->enc_part2->authorization_data[0]->length)
tkt 416 source3/libsmb/clikrb5.c for (i = 0; tkt->enc_part2->authorization_data[i] != NULL; i++) {
tkt 418 source3/libsmb/clikrb5.c if (tkt->enc_part2->authorization_data[i]->ad_type !=
tkt 421 source3/libsmb/clikrb5.c tkt->enc_part2->authorization_data[i]->ad_type));
tkt 425 source3/libsmb/clikrb5.c auth_data_wrapped = data_blob(tkt->enc_part2->authorization_data[i]->contents,
tkt 426 source3/libsmb/clikrb5.c tkt->enc_part2->authorization_data[i]->length);
tkt 441 source3/libsmb/clikrb5.c if (tkt->ticket.authorization_data &&
tkt 442 source3/libsmb/clikrb5.c tkt->ticket.authorization_data->len)
tkt 444 source3/libsmb/clikrb5.c for (i = 0; i < tkt->ticket.authorization_data->len; i++) {
tkt 446 source3/libsmb/clikrb5.c if (tkt->ticket.authorization_data->val[i].ad_type !=
tkt 449 source3/libsmb/clikrb5.c tkt->ticket.authorization_data->val[i].ad_type));
tkt 453 source3/libsmb/clikrb5.c auth_data_wrapped = data_blob(tkt->ticket.authorization_data->val[i].ad_data.data,
tkt 454 source3/libsmb/clikrb5.c tkt->ticket.authorization_data->val[i].ad_data.length);
tkt 471 source3/libsmb/clikrb5.c krb5_const_principal get_principal_from_tkt(krb5_ticket *tkt)
tkt 474 source3/libsmb/clikrb5.c return tkt->enc_part2->client;
tkt 476 source3/libsmb/clikrb5.c return tkt->client;
tkt 1028 source3/libsmb/clikrb5.c time_t get_authtime_from_tkt(krb5_ticket *tkt)
tkt 1031 source3/libsmb/clikrb5.c return tkt->enc_part2->times.authtime;
tkt 1033 source3/libsmb/clikrb5.c return tkt->ticket.authtime;
tkt 385 source3/libsmb/clispnego.c DATA_BLOB tkt, tkt_wrapped;
tkt 390 source3/libsmb/clispnego.c &tkt, session_key_krb5, extra_ap_opts, NULL,
tkt 397 source3/libsmb/clispnego.c tkt_wrapped = spnego_gen_krb5_wrap(tkt, TOK_ID_KRB_AP_REQ);
tkt 403 source3/libsmb/clispnego.c data_blob_free(&tkt);
tkt 1481 source3/rpc_client/cli_pipe.c DATA_BLOB tkt = data_blob_null;
tkt 1492 source3/rpc_client/cli_pipe.c ret = cli_krb5_get_ticket(a->service_principal, 0, &tkt,
tkt 1501 source3/rpc_client/cli_pipe.c data_blob_free(&tkt);
tkt 1507 source3/rpc_client/cli_pipe.c tkt_wrapped = spnego_gen_krb5_wrap(tkt, TOK_ID_KRB_AP_REQ);
tkt 1509 source3/rpc_client/cli_pipe.c data_blob_free(&tkt);
tkt 1489 source3/utils/ntlm_auth.c DATA_BLOB tkt, to_server;
tkt 1516 source3/utils/ntlm_auth.c retval = cli_krb5_get_ticket(principal, 0, &tkt, &session_key_krb5, 0, NULL, NULL);
tkt 1540 source3/utils/ntlm_auth.c retval = cli_krb5_get_ticket(principal, 0, &tkt, &session_key_krb5, 0, NULL, NULL);
tkt 1555 source3/utils/ntlm_auth.c reply.negTokenInit.mechToken = tkt;
tkt 1559 source3/utils/ntlm_auth.c data_blob_free(&tkt);
tkt 80 source4/auth/kerberos/kerberos.h krb5_const_principal get_principal_from_tkt(krb5_ticket *tkt);
tkt 90 source4/auth/kerberos/kerberos.h bool get_auth_data_from_tkt(TALLOC_CTX *mem_ctx, DATA_BLOB *auth_data, krb5_ticket *tkt);
tkt 1819 source4/heimdal/kdc/kerberos5.c EncTicketPart *tkt,
tkt 1826 source4/heimdal/kdc/kerberos5.c if (tkt->authorization_data == NULL) {
tkt 1827 source4/heimdal/kdc/kerberos5.c tkt->authorization_data = calloc(1, sizeof(*tkt->authorization_data));
tkt 1828 source4/heimdal/kdc/kerberos5.c if (tkt->authorization_data == NULL) {
tkt 1862 source4/heimdal/kdc/kerberos5.c ret = add_AuthorizationData(tkt->authorization_data, &ade);
tkt 111 source4/heimdal/kdc/krb5tgs.c EncTicketPart *tkt)
tkt 128 source4/heimdal/kdc/krb5tgs.c spd.encticket = *tkt;
tkt 177 source4/heimdal/kdc/krb5tgs.c ret = _kdc_tkt_add_if_relevant_ad(context, tkt,
tkt 188 source4/heimdal/kdc/krb5tgs.c EncTicketPart *tkt,
tkt 199 source4/heimdal/kdc/krb5tgs.c ret = find_KRB5SignedPath(context, tkt->authorization_data, &data);
tkt 211 source4/heimdal/kdc/krb5tgs.c spd.encticket = *tkt;
tkt 286 source4/heimdal/kdc/krb5tgs.c EncTicketPart *tkt,
tkt 290 source4/heimdal/kdc/krb5tgs.c AuthorizationData *ad = tkt->authorization_data;
tkt 326 source4/heimdal/kdc/krb5tgs.c ret = krb5_pac_verify(context, pac, tkt->authtime,
tkt 342 source4/heimdal/kdc/krb5tgs.c ret = _krb5_pac_sign(context, pac, tkt->authtime,
tkt 1497 source4/heimdal/kdc/pkinit.c EncTicketPart *tkt)
tkt 1515 source4/heimdal/kdc/pkinit.c ret = _kdc_tkt_add_if_relevant_ad(context, tkt,
tkt 711 source4/heimdal/lib/krb5/get_cred.c add_cred(krb5_context context, krb5_creds const *tkt, krb5_creds ***tgts)
tkt 725 source4/heimdal/lib/krb5/get_cred.c ret = krb5_copy_creds(context, tkt, &tmp[i]);