krb5_ticket
krb5_ticket *ticket,
krb5_ticket *ticket,
static krb5_ticket *ticket = NULL;
krb5_ticket **ticket,
krb5_ticket **ticket,
krb5_ticket *ticket = NULL;
krb5_ticket **ticket, /* OUT */
krb5_ticket *ticket;
static krb5_ticket *ticket = NULL;
krb5_data *inbuf, krb5_ticket *ticket,
krb5_ticket *tkt;
krb5_ticket ticket_reply;
static krb5_error_code prepare_error_tgs (krb5_kdc_req *, krb5_ticket *,
krb5_ticket ticket_reply, *header_ticket = 0;
prepare_error_tgs (krb5_kdc_req *request, krb5_ticket *ticket, int error,
krb5_ticket *ticket, krb5_timestamp kdc_time,
comp_cksum(krb5_context kcontext, krb5_data *source, krb5_ticket *ticket,
krb5_data *pkt, krb5_ticket **ticket,
kdc_get_server_key(krb5_ticket *ticket, krb5_keyblock **key, krb5_kvno *kvno)
check_hot_list(krb5_ticket *ticket)
krb5_ticket *, const char **);
krb5_error_code check_hot_list (krb5_ticket *);
krb5_ticket **,
krb5_error_code kdc_get_server_key (krb5_ticket *,
krb5_ticket *, krb5_timestamp,
krb5_ticket *ticket, const char **status)
const krb5_ticket *);
krb5_ticket * ticket;
asn1_error_code asn1_decode_ticket(asn1buf *buf, krb5_ticket *val)
alloc_field(val->ticket,krb5_ticket);
asn1_error_code asn1_decode_sequence_of_ticket(asn1buf *buf, krb5_ticket ***val)
decode_array_body(krb5_ticket,asn1_decode_ticket);
(asn1buf *buf, krb5_ticket *val);
(asn1buf *buf, krb5_ticket ***val);
FIELDOF_NORM(krb5_ticket, realm_of_principal, server, 1),
FIELDOF_NORM(krb5_ticket, principal, server, 2),
FIELDOF_NORM(krb5_ticket, encrypted_data, enc_part, 3),
DEFSEQTYPE(untagged_ticket, krb5_ticket, ticket_fields, 0);
krb5_decode_ticket(const krb5_data *code, krb5_ticket **rep)
krb5_error_code decode_krb5_ticket(const krb5_data *code, krb5_ticket **rep)
alloc_field(*rep,krb5_ticket);
alloc_field((*rep)->ticket,krb5_ticket);
krb5_ticket *tkt;
if (!(tempto = (krb5_ticket *)malloc(sizeof(*tempto))))
krb5_copy_ticket(krb5_context context, const krb5_ticket *from, krb5_ticket **pto)
krb5_ticket *tempto;
krb5_decrypt_tkt_part(krb5_context context, const krb5_keyblock *srv_key, register krb5_ticket *ticket)
krb5_encrypt_tkt_part(krb5_context context, const krb5_keyblock *srv_key, register krb5_ticket *dec_ticket)
= (krb5_ticket **)malloc(sizeof(krb5_ticket *) * (ncred + 1))) == NULL) {
memset(pcred->tickets, 0, sizeof(krb5_ticket *) * (ncred +1));
krb5_rd_req(krb5_context context, krb5_auth_context *auth_context, const krb5_data *inbuf, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket)
krb5_ticket **ticket, int check_valid_flag)
krb5_ticket **ticket)
krb5_flags *ap_req_options, krb5_ticket **ticket)
krb5_recvauth(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fd, char *appl_version, krb5_principal server, krb5_int32 flags, krb5_keytab keytab, krb5_ticket **ticket)
krb5_ticket **ticket,
krb5_ticket ** ticket,
krb5_ticket *sec_ticket = 0;
krb5_ticket *sec_ticket_arr[2];
krb5_ticket * ticket = NULL;
krb5_ticket *ticket;
(const krb5_ticket *rep, krb5_data **code);
(const krb5_data *code, krb5_ticket **rep);
krb5_ticket * );
krb5_ticket *ticket;
krb5_ticket **second_ticket;/* second ticket array; OPTIONAL */
krb5_ticket *ticket; /* ticket */
krb5_ticket *ticket; /* ticket */
krb5_ticket **tickets; /* tickets */
krb5_ticket * );
const krb5_ticket *,
krb5_ticket **);
(krb5_context, krb5_ticket * );
(krb5_context, krb5_ticket ** );
krb5_ticket **);
krb5_ticket **);
krb5_ticket **);
krb5_ticket **);
krb5_ticket **,
krb5_ticket **rep);
krb5_free_ticket(krb5_context context, krb5_ticket *val)
krb5_free_tickets(krb5_context context, krb5_ticket **val)
register krb5_ticket **temp;