Lines Matching refs:et

376 		KDC_REQ_BODY *b, const EncTicketPart *tgt, EncTicketPart *et)
392 et->flags.invalid = 0;
405 et->flags.forwardable = 1;
413 et->flags.forwarded = 1;
414 et->caddr = b->addresses;
417 et->flags.forwarded = 1;
425 et->flags.proxiable = 1;
433 et->flags.proxy = 1;
434 et->caddr = b->addresses;
437 et->flags.proxy = 1;
445 et->flags.may_postdate = 1;
454 *et->starttime = *b->from;
455 et->flags.postdated = 1;
456 et->flags.invalid = 1;
468 et->flags.renewable = 1;
469 ALLOC(et->renew_till);
471 *et->renew_till = *b->rtime;
485 et->endtime = *et->starttime + old_life;
486 if (et->renew_till != NULL)
487 et->endtime = min(*et->renew_till, et->endtime);
595 const EncTicketPart *et,
598 if(et->endtime < kdc_time){
602 if(et->flags.invalid){
618 EncTicketPart *et,
713 et->flags.transited_policy_checked = 1;
715 et->transited.tr_type = DOMAIN_X500_COMPRESS;
716 ret = krb5_domain_x500_encode(realms, num_realms, &et->transited.contents);
755 EncTicketPart et;
761 memset(&et, 0, sizeof(et));
767 et.authtime = tgt->authtime;
769 et.endtime = min(tgt->endtime, *b->till);
770 ALLOC(et.starttime);
771 *et.starttime = kdc_time;
773 ret = check_tgs_flags(context, config, b, tgt, &et);
803 &tgt->transited, &et,
821 ek.caddr = et.caddr;
822 if(et.caddr == NULL)
823 et.caddr = tgt->caddr;
827 life = et.endtime - *et.starttime;
832 et.endtime = *et.starttime + life;
835 et.renew_till == NULL && et.endtime < *b->till &&
838 et.flags.renewable = 1;
839 ALLOC(et.renew_till);
840 *et.renew_till = *b->till;
842 if(et.renew_till){
844 renew = *et.renew_till - et.authtime;
849 *et.renew_till = et.authtime + renew;
852 if(et.renew_till){
853 *et.renew_till = min(*et.renew_till, *tgt->renew_till);
854 *et.starttime = min(*et.starttime, *et.renew_till);
855 et.endtime = min(et.endtime, *et.renew_till);
858 *et.starttime = min(*et.starttime, et.endtime);
860 if(*et.starttime == et.endtime){
864 if(et.renew_till && et.endtime == *et.renew_till){
865 free(et.renew_till);
866 et.renew_till = NULL;
867 et.flags.renewable = 0;
870 et.flags.pre_authent = tgt->flags.pre_authent;
871 et.flags.hw_authent = tgt->flags.hw_authent;
872 et.flags.anonymous = tgt->flags.anonymous;
873 et.flags.ok_as_delegate = server->entry.flags.ok_as_delegate;
880 ret = _kdc_tkt_add_if_relevant_ad(context, &et,
891 if (et.authorization_data == NULL) {
892 et.authorization_data = calloc(1, sizeof(*et.authorization_data));
893 if (et.authorization_data == NULL) {
900 ret = add_AuthorizationData(et.authorization_data, &auth_data->val[i]);
908 ret = find_KRB5SignedPath(context, et.authorization_data, NULL);
910 if (et.authorization_data->len == 1) {
911 free_AuthorizationData(et.authorization_data);
912 free(et.authorization_data);
913 et.authorization_data = NULL;
915 AuthorizationData *ad = et.authorization_data;
922 ret = krb5_copy_keyblock_contents(context, sessionkey, &et.key);
925 et.crealm = tgt_name->realm;
926 et.cname = tgt_name->name;
928 ek.key = et.key;
937 ek.flags = et.flags;
938 ek.authtime = et.authtime;
939 ek.starttime = et.starttime;
940 ek.endtime = et.endtime;
941 ek.renew_till = et.renew_till;
945 _kdc_log_timestamp(context, config, "TGS-REQ", et.authtime, et.starttime,
946 et.endtime, et.renew_till);
960 &et);
977 if (krb5_enctype_valid(context, et.key.keytype) != 0
978 && _kdc_is_weak_exception(server->entry.principal, et.key.keytype))
980 krb5_enctype_enable(context, et.key.keytype);
996 &rep, &et, &ek, et.key.keytype,
1001 krb5_enctype_disable(context, et.key.keytype);
1005 free_TransitedEncoding(&et.transited);
1006 if(et.starttime)
1007 free(et.starttime);
1008 if(et.renew_till)
1009 free(et.renew_till);
1010 if(et.authorization_data) {
1011 free_AuthorizationData(et.authorization_data);
1012 free(et.authorization_data);
1015 memset(et.key.keyvalue.data, 0, et.key.keyvalue.length);
1016 free_EncryptionKey(&et.key);