Lines Matching refs:et

324 		  KDC_REP *rep, const EncTicketPart *et, EncKDCRepPart *ek,
338 ASN1_MALLOC_ENCODE(EncTicketPart, buf, buf_size, et, &len, ret);
972 EncTicketPart et;
1084 memset(&et, 0, sizeof(et));
1171 et.flags.pre_authent = 1;
1322 et.flags.pre_authent = 1;
1345 if(found_pa && et.flags.pre_authent == 0){
1501 et.flags.initial = 1;
1503 et.flags.forwardable = f.forwardable;
1512 et.flags.proxiable = f.proxiable;
1521 et.flags.may_postdate = f.allow_postdate;
1539 ret = copy_PrincipalName(&rep.cname, &et.cname);
1542 ret = copy_Realm(&rep.crealm, &et.crealm);
1550 start = et.authtime = kdc_time;
1553 ALLOC(et.starttime);
1554 start = *et.starttime = *req->req_body.from;
1555 et.flags.invalid = 1;
1556 et.flags.postdated = 1; /* XXX ??? */
1570 et.endtime = t;
1571 if(f.renewable_ok && et.endtime < *b->till){
1591 ALLOC(et.renew_till);
1592 *et.renew_till = t;
1593 et.flags.renewable = 1;
1598 et.flags.anonymous = 1;
1601 ALLOC(et.caddr);
1602 copy_HostAddresses(b->addresses, et.caddr);
1605 et.transited.tr_type = DOMAIN_X500_COMPRESS;
1606 krb5_data_zero(&et.transited.contents);
1653 ek.flags = et.flags;
1654 ek.authtime = et.authtime;
1655 if (et.starttime) {
1657 *ek.starttime = *et.starttime;
1659 ek.endtime = et.endtime;
1660 if (et.renew_till) {
1662 *ek.renew_till = *et.renew_till;
1666 if(et.caddr){
1668 copy_HostAddresses(et.caddr, ek.caddr);
1676 &reply_key, &et.key, rep.padata);
1682 &et);
1689 ret = krb5_generate_random_keyblock(context, sessionetype, &et.key);
1700 ret = copy_EncryptionKey(&et.key, &ek.key);
1725 ret = krb5_crypto_init(context, &et.key, 0, &cryptox);
1773 ret = _krb5_pac_sign(context, p, et.authtime,
1785 ret = _kdc_tkt_add_if_relevant_ad(context, &et,
1794 _kdc_log_timestamp(context, config, "AS-REQ", et.authtime, et.starttime,
1795 et.endtime, et.renew_till);
1805 &et);
1812 &rep, &et, &ek, setype, server->entry.kvno,
1815 free_EncTicketPart(&et);