Home | History | Annotate | Download | only in kdc

Lines Matching defs:et

399 		EncTicketPart *et)
415 et->flags.invalid = 0;
428 et->flags.forwardable = 1;
436 et->flags.forwarded = 1;
437 et->caddr = b->addresses;
440 et->flags.forwarded = 1;
448 et->flags.proxiable = 1;
456 et->flags.proxy = 1;
457 et->caddr = b->addresses;
460 et->flags.proxy = 1;
468 et->flags.may_postdate = 1;
477 *et->starttime = *b->from;
478 et->flags.postdated = 1;
479 et->flags.invalid = 1;
491 et->flags.renewable = 1;
492 ALLOC(et->renew_till);
494 *et->renew_till = *b->rtime;
508 et->endtime = *et->starttime + old_life;
509 if (et->renew_till != NULL)
510 et->endtime = min(*et->renew_till, et->endtime);
530 et->flags.anonymous = 1;
629 const EncTicketPart *et,
632 if(et->endtime < kdc_time){
636 if(et->flags.invalid){
652 EncTicketPart *et,
747 et->flags.transited_policy_checked = 1;
749 et->transited.tr_type = DOMAIN_X500_COMPRESS;
750 ret = krb5_domain_x500_encode(realms, num_realms, &et->transited.contents);
789 EncTicketPart et;
795 memset(&et, 0, sizeof(et));
801 et.authtime = tgt->authtime;
803 et.endtime = min(tgt->endtime, *b->till);
804 ALLOC(et.starttime);
805 *et.starttime = kdc_time;
807 ret = check_tgs_flags(context, config, b, tgt_name, tgt, &et);
837 &tgt->transited, &et,
858 if (et.flags.anonymous && !tgt->flags.anonymous)
866 ek.caddr = et.caddr;
870 life = et.endtime - *et.starttime;
875 et.endtime = *et.starttime + life;
878 et.renew_till == NULL && et.endtime < *b->till &&
881 et.flags.renewable = 1;
882 ALLOC(et.renew_till);
883 *et.renew_till = *b->till;
885 if(et.renew_till){
887 renew = *et.renew_till - *et.starttime;
892 *et.renew_till = *et.starttime + renew;
895 if(et.renew_till){
896 *et.renew_till = min(*et.renew_till, *tgt->renew_till);
897 *et.starttime = min(*et.starttime, *et.renew_till);
898 et.endtime = min(et.endtime, *et.renew_till);
901 *et.starttime = min(*et.starttime, et.endtime);
903 if(*et.starttime == et.endtime){
907 if(et.renew_till && et.endtime == *et.renew_till){
908 free(et.renew_till);
909 et.renew_till = NULL;
910 et.flags.renewable = 0;
913 et.flags.pre_authent = tgt->flags.pre_authent;
914 et.flags.hw_authent = tgt->flags.hw_authent;
915 et.flags.ok_as_delegate = server->entry.flags.ok_as_delegate;
919 et.flags.forwardable = 0;
921 et.flags.proxiable = 0;
929 if (rspac->length && !et.flags.anonymous) {
934 ret = _kdc_tkt_add_if_relevant_ad(context, &et,
945 if (et.authorization_data == NULL) {
946 et.authorization_data = calloc(1, sizeof(*et.authorization_data));
947 if (et.authorization_data == NULL) {
954 ret = add_AuthorizationData(et.authorization_data, &auth_data->val[i]);
962 ret = find_KRB5SignedPath(context, et.authorization_data, NULL);
964 if (et.authorization_data->len == 1) {
965 free_AuthorizationData(et.authorization_data);
966 free(et.authorization_data);
967 et.authorization_data = NULL;
969 AuthorizationData *ad = et.authorization_data;
976 ret = krb5_copy_keyblock_contents(context, sessionkey, &et.key);
979 et.crealm = rep.crealm;
980 et.cname = rep.cname;
982 ek.key = et.key;
991 ek.flags = et.flags;
992 ek.authtime = et.authtime;
993 ek.starttime = et.starttime;
994 ek.endtime = et.endtime;
995 ek.renew_till = et.renew_till;
999 _kdc_log_timestamp(context, config, "TGS-REQ", et.authtime, et.starttime,
1000 et.endtime, et.renew_till);
1014 &et);
1050 &rep, &et, &ek, serverkey->keytype,
1059 free_TransitedEncoding(&et.transited);
1060 if(et.starttime)
1061 free(et.starttime);
1062 if(et.renew_till)
1063 free(et.renew_till);
1064 if(et.authorization_data) {
1065 free_AuthorizationData(et.authorization_data);
1066 free(et.authorization_data);
1069 memset(et.key.keyvalue.data, 0, et.key.keyvalue.length);
1070 free_EncryptionKey(&et.key);