tkt 216 source3/client/cifs.upcall.c DATA_BLOB tkt, tkt_wrapped; tkt 222 source3/client/cifs.upcall.c retval = cli_krb5_get_ticket(principal, 0, &tkt, sess_key, 0, ccname, tkt 234 source3/client/cifs.upcall.c tkt_wrapped = spnego_gen_krb5_wrap(tkt, TOK_ID_KRB_AP_REQ); tkt 240 source3/client/cifs.upcall.c data_blob_free(&tkt); tkt 939 source3/include/includes.h bool get_auth_data_from_tkt(TALLOC_CTX *mem_ctx, DATA_BLOB *auth_data, krb5_ticket *tkt); tkt 940 source3/include/includes.h krb5_const_principal get_principal_from_tkt(krb5_ticket *tkt); tkt 967 source3/include/includes.h time_t get_authtime_from_tkt(krb5_ticket *tkt); tkt 355 source3/libads/authdata.c DATA_BLOB tkt, ap_rep, sesskey1, sesskey2; tkt 362 source3/libads/authdata.c ZERO_STRUCT(tkt); tkt 427 source3/libads/authdata.c &tkt, tkt 442 source3/libads/authdata.c &tkt, tkt 467 source3/libads/authdata.c data_blob_free(&tkt); tkt 418 source3/libads/kerberos_verify.c krb5_ticket *tkt = NULL; tkt 525 source3/libads/kerberos_verify.c host_princ, ticket, &tkt, &keyblock, &ret); tkt 529 source3/libads/kerberos_verify.c ticket, &tkt, &keyblock, &ret); tkt 533 source3/libads/kerberos_verify.c auth_context, ticket, &tkt, &keyblock, &ret); tkt 540 source3/libads/kerberos_verify.c host_princ, ticket, &tkt, &keyblock, &ret); tkt 548 source3/libads/kerberos_verify.c auth_context, ticket, &tkt, &keyblock, tkt 580 source3/libads/kerberos_verify.c authtime = get_authtime_from_tkt(tkt); tkt 581 source3/libads/kerberos_verify.c client_principal = get_principal_from_tkt(tkt); tkt 607 source3/libads/kerberos_verify.c got_auth_data = get_auth_data_from_tkt(mem_ctx, &auth_data, tkt); tkt 624 source3/libads/kerberos_verify.c if (tkt->enc_part2) { tkt 626 source3/libads/kerberos_verify.c tkt->enc_part2->authorization_data[0]->contents, tkt 627 source3/libads/kerberos_verify.c tkt->enc_part2->authorization_data[0]->length); tkt 631 source3/libads/kerberos_verify.c if (tkt->ticket.authorization_data) { tkt 633 source3/libads/kerberos_verify.c tkt->ticket.authorization_data->val->ad_data.data, tkt 634 source3/libads/kerberos_verify.c tkt->ticket.authorization_data->val->ad_data.length); tkt 668 source3/libads/kerberos_verify.c if (tkt != NULL) { tkt 669 source3/libads/kerberos_verify.c krb5_free_ticket(context, tkt); tkt 405 source3/libsmb/clikrb5.c bool get_auth_data_from_tkt(TALLOC_CTX *mem_ctx, DATA_BLOB *auth_data, krb5_ticket *tkt) tkt 412 source3/libsmb/clikrb5.c if (tkt->enc_part2 && tkt->enc_part2->authorization_data && tkt 413 source3/libsmb/clikrb5.c tkt->enc_part2->authorization_data[0] && tkt 414 source3/libsmb/clikrb5.c tkt->enc_part2->authorization_data[0]->length) tkt 416 source3/libsmb/clikrb5.c for (i = 0; tkt->enc_part2->authorization_data[i] != NULL; i++) { tkt 418 source3/libsmb/clikrb5.c if (tkt->enc_part2->authorization_data[i]->ad_type != tkt 421 source3/libsmb/clikrb5.c tkt->enc_part2->authorization_data[i]->ad_type)); tkt 425 source3/libsmb/clikrb5.c auth_data_wrapped = data_blob(tkt->enc_part2->authorization_data[i]->contents, tkt 426 source3/libsmb/clikrb5.c tkt->enc_part2->authorization_data[i]->length); tkt 441 source3/libsmb/clikrb5.c if (tkt->ticket.authorization_data && tkt 442 source3/libsmb/clikrb5.c tkt->ticket.authorization_data->len) tkt 444 source3/libsmb/clikrb5.c for (i = 0; i < tkt->ticket.authorization_data->len; i++) { tkt 446 source3/libsmb/clikrb5.c if (tkt->ticket.authorization_data->val[i].ad_type != tkt 449 source3/libsmb/clikrb5.c tkt->ticket.authorization_data->val[i].ad_type)); tkt 453 source3/libsmb/clikrb5.c auth_data_wrapped = data_blob(tkt->ticket.authorization_data->val[i].ad_data.data, tkt 454 source3/libsmb/clikrb5.c tkt->ticket.authorization_data->val[i].ad_data.length); tkt 471 source3/libsmb/clikrb5.c krb5_const_principal get_principal_from_tkt(krb5_ticket *tkt) tkt 474 source3/libsmb/clikrb5.c return tkt->enc_part2->client; tkt 476 source3/libsmb/clikrb5.c return tkt->client; tkt 1028 source3/libsmb/clikrb5.c time_t get_authtime_from_tkt(krb5_ticket *tkt) tkt 1031 source3/libsmb/clikrb5.c return tkt->enc_part2->times.authtime; tkt 1033 source3/libsmb/clikrb5.c return tkt->ticket.authtime; tkt 385 source3/libsmb/clispnego.c DATA_BLOB tkt, tkt_wrapped; tkt 390 source3/libsmb/clispnego.c &tkt, session_key_krb5, extra_ap_opts, NULL, tkt 397 source3/libsmb/clispnego.c tkt_wrapped = spnego_gen_krb5_wrap(tkt, TOK_ID_KRB_AP_REQ); tkt 403 source3/libsmb/clispnego.c data_blob_free(&tkt); tkt 1481 source3/rpc_client/cli_pipe.c DATA_BLOB tkt = data_blob_null; tkt 1492 source3/rpc_client/cli_pipe.c ret = cli_krb5_get_ticket(a->service_principal, 0, &tkt, tkt 1501 source3/rpc_client/cli_pipe.c data_blob_free(&tkt); tkt 1507 source3/rpc_client/cli_pipe.c tkt_wrapped = spnego_gen_krb5_wrap(tkt, TOK_ID_KRB_AP_REQ); tkt 1509 source3/rpc_client/cli_pipe.c data_blob_free(&tkt); tkt 1489 source3/utils/ntlm_auth.c DATA_BLOB tkt, to_server; tkt 1516 source3/utils/ntlm_auth.c retval = cli_krb5_get_ticket(principal, 0, &tkt, &session_key_krb5, 0, NULL, NULL); tkt 1540 source3/utils/ntlm_auth.c retval = cli_krb5_get_ticket(principal, 0, &tkt, &session_key_krb5, 0, NULL, NULL); tkt 1555 source3/utils/ntlm_auth.c reply.negTokenInit.mechToken = tkt; tkt 1559 source3/utils/ntlm_auth.c data_blob_free(&tkt); tkt 80 source4/auth/kerberos/kerberos.h krb5_const_principal get_principal_from_tkt(krb5_ticket *tkt); tkt 90 source4/auth/kerberos/kerberos.h bool get_auth_data_from_tkt(TALLOC_CTX *mem_ctx, DATA_BLOB *auth_data, krb5_ticket *tkt); tkt 1819 source4/heimdal/kdc/kerberos5.c EncTicketPart *tkt, tkt 1826 source4/heimdal/kdc/kerberos5.c if (tkt->authorization_data == NULL) { tkt 1827 source4/heimdal/kdc/kerberos5.c tkt->authorization_data = calloc(1, sizeof(*tkt->authorization_data)); tkt 1828 source4/heimdal/kdc/kerberos5.c if (tkt->authorization_data == NULL) { tkt 1862 source4/heimdal/kdc/kerberos5.c ret = add_AuthorizationData(tkt->authorization_data, &ade); tkt 111 source4/heimdal/kdc/krb5tgs.c EncTicketPart *tkt) tkt 128 source4/heimdal/kdc/krb5tgs.c spd.encticket = *tkt; tkt 177 source4/heimdal/kdc/krb5tgs.c ret = _kdc_tkt_add_if_relevant_ad(context, tkt, tkt 188 source4/heimdal/kdc/krb5tgs.c EncTicketPart *tkt, tkt 199 source4/heimdal/kdc/krb5tgs.c ret = find_KRB5SignedPath(context, tkt->authorization_data, &data); tkt 211 source4/heimdal/kdc/krb5tgs.c spd.encticket = *tkt; tkt 286 source4/heimdal/kdc/krb5tgs.c EncTicketPart *tkt, tkt 290 source4/heimdal/kdc/krb5tgs.c AuthorizationData *ad = tkt->authorization_data; tkt 326 source4/heimdal/kdc/krb5tgs.c ret = krb5_pac_verify(context, pac, tkt->authtime, tkt 342 source4/heimdal/kdc/krb5tgs.c ret = _krb5_pac_sign(context, pac, tkt->authtime, tkt 1497 source4/heimdal/kdc/pkinit.c EncTicketPart *tkt) tkt 1515 source4/heimdal/kdc/pkinit.c ret = _kdc_tkt_add_if_relevant_ad(context, tkt, tkt 711 source4/heimdal/lib/krb5/get_cred.c add_cred(krb5_context context, krb5_creds const *tkt, krb5_creds ***tgts) tkt 725 source4/heimdal/lib/krb5/get_cred.c ret = krb5_copy_creds(context, tkt, &tmp[i]);