ad                675 source4/heimdal/kdc/kaserver.c     struct _krb5_krb_auth_data ad;
ad                680 source4/heimdal/kdc/kaserver.c     memset(&ad, 0, sizeof(ad));
ad                739 source4/heimdal/kdc/kaserver.c 				      &sinstance, &ad);
ad                752 source4/heimdal/kdc/kaserver.c 		    ad.pname, ad.pinst, ad.prealm);
ad                761 source4/heimdal/kdc/kaserver.c 	if (kdc_time > _krb5_krb_life_to_time(ad.time_sec, ad.life)) {
ad                763 source4/heimdal/kdc/kaserver.c 		    ad.pname, ad.pinst, ad.prealm);
ad                770 source4/heimdal/kdc/kaserver.c 	      "%s.%s@%s", ad.pname, ad.pinst, ad.prealm);
ad                776 source4/heimdal/kdc/kaserver.c 			  ad.pname, ad.pinst, ad.prealm, HDB_F_GET_CLIENT,
ad                785 source4/heimdal/kdc/kaserver.c     if (client_entry == NULL && strcmp(ad.prealm, config->v4_realm) == 0) {
ad                803 source4/heimdal/kdc/kaserver.c     memcpy(&session, ad.session.keyvalue.data, sizeof(session));
ad                844 source4/heimdal/kdc/kaserver.c 			 ad.pname, ad.pinst, ad.prealm,
ad                849 source4/heimdal/kdc/kaserver.c 			 &ad.session, reply);
ad                852 source4/heimdal/kdc/kaserver.c     _krb5_krb_free_auth_data(context, &ad);
ad                342 source4/heimdal/kdc/kerberos4.c 	struct _krb5_krb_auth_data ad;
ad                354 source4/heimdal/kdc/kerberos4.c 	memset(&ad, 0, sizeof(ad));
ad                419 source4/heimdal/kdc/kerberos4.c 			       address, &tkey->key, &ad);
ad                437 source4/heimdal/kdc/kerberos4.c 		  ad.pname, ad.pinst, ad.prealm);
ad                442 source4/heimdal/kdc/kerberos4.c 	if(strcmp(ad.prealm, realm)){
ad                444 source4/heimdal/kdc/kerberos4.c 		    "Can't hop realms (krb4) %s -> %s", realm, ad.prealm);
ad                467 source4/heimdal/kdc/kerberos4.c 	ret = _kdc_db_fetch4(context, config, ad.pname, ad.pinst, ad.prealm,
ad                478 source4/heimdal/kdc/kerberos4.c 	if (client == NULL && strcmp(ad.prealm, config->v4_realm) == 0) {
ad                519 source4/heimdal/kdc/kerberos4.c 	max_end = _krb5_krb_life_to_time(ad.time_sec, ad.life);
ad                557 source4/heimdal/kdc/kerberos4.c 					  ad.pname,
ad                558 source4/heimdal/kdc/kerberos4.c 					  ad.pinst,
ad                559 source4/heimdal/kdc/kerberos4.c 					  ad.prealm,
ad                584 source4/heimdal/kdc/kerberos4.c 					&ad.session,
ad                594 source4/heimdal/kdc/kerberos4.c 					      ad.pname,
ad                595 source4/heimdal/kdc/kerberos4.c 					      ad.pinst,
ad                596 source4/heimdal/kdc/kerberos4.c 					      ad.prealm,
ad                606 source4/heimdal/kdc/kerberos4.c 	_krb5_krb_free_auth_data(context, &ad);
ad               1836 source4/heimdal/kdc/kerberos5.c 	AuthorizationData ad = { 0, NULL };
ad               1842 source4/heimdal/kdc/kerberos5.c 	ret = add_AuthorizationData(&ad, &ade);
ad               1852 source4/heimdal/kdc/kerberos5.c 			   &ad, &size, ret);
ad               1853 source4/heimdal/kdc/kerberos5.c 	free_AuthorizationData(&ad);
ad                 63 source4/heimdal/kdc/krb5tgs.c 		    const AuthorizationData *ad,
ad                 70 source4/heimdal/kdc/krb5tgs.c     if (ad == NULL || ad->len == 0)
ad                 73 source4/heimdal/kdc/krb5tgs.c     pos = ad->len - 1;
ad                 75 source4/heimdal/kdc/krb5tgs.c     if (ad->val[pos].ad_type != KRB5_AUTHDATA_IF_RELEVANT)
ad                 78 source4/heimdal/kdc/krb5tgs.c     ret = decode_AuthorizationData(ad->val[pos].ad_data.data,
ad                 79 source4/heimdal/kdc/krb5tgs.c 				   ad->val[pos].ad_data.length,
ad                203 source4/heimdal/kdc/krb5tgs.c 	AuthorizationData *ad;
ad                213 source4/heimdal/kdc/krb5tgs.c 	ad = spd.encticket.authorization_data;
ad                214 source4/heimdal/kdc/krb5tgs.c 	if (--ad->len == 0)
ad                220 source4/heimdal/kdc/krb5tgs.c 	ad->len++;
ad                221 source4/heimdal/kdc/krb5tgs.c 	spd.encticket.authorization_data = ad;
ad                290 source4/heimdal/kdc/krb5tgs.c     AuthorizationData *ad = tkt->authorization_data;
ad                294 source4/heimdal/kdc/krb5tgs.c     if (ad == NULL || ad->len == 0)
ad                297 source4/heimdal/kdc/krb5tgs.c     for (i = 0; i < ad->len; i++) {
ad                300 source4/heimdal/kdc/krb5tgs.c 	if (ad->val[i].ad_type != KRB5_AUTHDATA_IF_RELEVANT)
ad                303 source4/heimdal/kdc/krb5tgs.c 	ret = decode_AuthorizationData(ad->val[i].ad_data.data,
ad                304 source4/heimdal/kdc/krb5tgs.c 				       ad->val[i].ad_data.length,
ad                817 source4/heimdal/kdc/krb5tgs.c 		AuthorizationData *ad = et.authorization_data;
ad                818 source4/heimdal/kdc/krb5tgs.c 		free_AuthorizationDataElement(&ad->val[ad->len - 1]);
ad                819 source4/heimdal/kdc/krb5tgs.c 		ad->len--;
ad               1206 source4/heimdal/kdc/krb5tgs.c 	krb5_data ad;
ad               1245 source4/heimdal/kdc/krb5tgs.c 					  &ad);
ad               1261 source4/heimdal/kdc/krb5tgs.c 	ret = decode_AuthorizationData(ad.data, ad.length, *auth_data, NULL);
ad                 44 source4/heimdal/lib/krb5/build_auth.c     krb5_authdata ad;
ad                 62 source4/heimdal/lib/krb5/build_auth.c     ALLOC_SEQ(&ad, 1);
ad                 63 source4/heimdal/lib/krb5/build_auth.c     if (ad.val == NULL) {
ad                 69 source4/heimdal/lib/krb5/build_auth.c     ad.val[0].ad_type = KRB5_AUTHDATA_GSS_API_ETYPE_NEGOTIATION;
ad                 70 source4/heimdal/lib/krb5/build_auth.c     ad.val[0].ad_data.length = len;
ad                 71 source4/heimdal/lib/krb5/build_auth.c     ad.val[0].ad_data.data = buf;
ad                 73 source4/heimdal/lib/krb5/build_auth.c     ASN1_MALLOC_ENCODE(AD_IF_RELEVANT, buf, buf_size, &ad, &len, ret);
ad                 75 source4/heimdal/lib/krb5/build_auth.c 	free_AuthorizationData(&ad);
ad                 80 source4/heimdal/lib/krb5/build_auth.c     free_AuthorizationData(&ad);
ad                 65 source4/heimdal/lib/krb5/get_for_creds.c 	krb5_address ad;
ad                 67 source4/heimdal/lib/krb5/get_for_creds.c 	ret = krb5_sockaddr2address (context, a->ai_addr, &ad);
ad                 69 source4/heimdal/lib/krb5/get_for_creds.c 	    if (krb5_address_search(context, &ad, addr))
ad                 70 source4/heimdal/lib/krb5/get_for_creds.c 		krb5_free_address(context, &ad);
ad                 72 source4/heimdal/lib/krb5/get_for_creds.c 		addr->val[i++] = ad;
ad                172 source4/heimdal/lib/krb5/rd_req.c     krb5_authdata *ad;
ad                181 source4/heimdal/lib/krb5/rd_req.c     ad = auth_context->authenticator->authorization_data;
ad                182 source4/heimdal/lib/krb5/rd_req.c     if (ad == NULL)
ad                185 source4/heimdal/lib/krb5/rd_req.c     for (i = 0; i < ad->len; i++) {
ad                186 source4/heimdal/lib/krb5/rd_req.c 	if (ad->val[i].ad_type == KRB5_AUTHDATA_IF_RELEVANT) {
ad                187 source4/heimdal/lib/krb5/rd_req.c 	    ret = decode_AD_IF_RELEVANT(ad->val[i].ad_data.data,
ad                188 source4/heimdal/lib/krb5/rd_req.c 					ad->val[i].ad_data.length,
ad                132 source4/heimdal/lib/krb5/ticket.c 		const AuthorizationData *ad,
ad                152 source4/heimdal/lib/krb5/ticket.c     for (i = 0; i < ad->len; i++) {
ad                153 source4/heimdal/lib/krb5/ticket.c 	if (!*found && ad->val[i].ad_type == type) {
ad                154 source4/heimdal/lib/krb5/ticket.c 	    ret = der_copy_octet_string(&ad->val[i].ad_data, data);
ad                163 source4/heimdal/lib/krb5/ticket.c 	switch (ad->val[i].ad_type) {
ad                166 source4/heimdal/lib/krb5/ticket.c 	    ret = decode_AuthorizationData(ad->val[i].ad_data.data,
ad                167 source4/heimdal/lib/krb5/ticket.c 					   ad->val[i].ad_data.length,
ad                188 source4/heimdal/lib/krb5/ticket.c 	    ret = decode_AD_KDCIssued(ad->val[i].ad_data.data,
ad                189 source4/heimdal/lib/krb5/ticket.c 				      ad->val[i].ad_data.length,
ad                252 source4/heimdal/lib/krb5/ticket.c 				   ad->val[i].ad_type);
ad                278 source4/heimdal/lib/krb5/ticket.c     AuthorizationData *ad;
ad                284 source4/heimdal/lib/krb5/ticket.c     ad = ticket->ticket.authorization_data;
ad                292 source4/heimdal/lib/krb5/ticket.c 			  &ticket->ticket.key, ad, 0);
ad                653 source4/heimdal/lib/krb5/v4_glue.c 			struct _krb5_krb_auth_data *ad)
ad                661 source4/heimdal/lib/krb5/v4_glue.c     memset(ad, 0, sizeof(*ad));
ad                678 source4/heimdal/lib/krb5/v4_glue.c     RCHECK(ret, krb5_ret_int8(sp, &ad->k_flags), error);
ad                679 source4/heimdal/lib/krb5/v4_glue.c     RCHECK(ret, get_v4_stringz(sp, &ad->pname, ANAME_SZ), error);
ad                680 source4/heimdal/lib/krb5/v4_glue.c     RCHECK(ret, get_v4_stringz(sp, &ad->pinst, INST_SZ), error);
ad                681 source4/heimdal/lib/krb5/v4_glue.c     RCHECK(ret, get_v4_stringz(sp, &ad->prealm, REALM_SZ), error);
ad                682 source4/heimdal/lib/krb5/v4_glue.c     RCHECK(ret, krb5_ret_uint32(sp, &ad->address), error);
ad                690 source4/heimdal/lib/krb5/v4_glue.c     RCHECK(ret, krb5_ret_uint8(sp, &ad->life), error);
ad                692 source4/heimdal/lib/krb5/v4_glue.c     if (ad->k_flags & 1)
ad                697 source4/heimdal/lib/krb5/v4_glue.c     RCHECK(ret, krb5_ret_uint32(sp, &ad->time_sec), error);
ad                703 source4/heimdal/lib/krb5/v4_glue.c 			     des_key, sizeof(des_key), &ad->session);
ad                707 source4/heimdal/lib/krb5/v4_glue.c     if (strlen(ad->prealm) == 0) {
ad                708 source4/heimdal/lib/krb5/v4_glue.c 	free(ad->prealm);
ad                709 source4/heimdal/lib/krb5/v4_glue.c 	ad->prealm = strdup(local_realm);
ad                710 source4/heimdal/lib/krb5/v4_glue.c 	if (ad->prealm == NULL) {
ad                730 source4/heimdal/lib/krb5/v4_glue.c 	_krb5_krb_free_auth_data(context, ad);
ad                748 source4/heimdal/lib/krb5/v4_glue.c 		 struct _krb5_krb_auth_data *ad)
ad                829 source4/heimdal/lib/krb5/v4_glue.c 				  &sname, &sinstance, ad);
ad                846 source4/heimdal/lib/krb5/v4_glue.c     ret = decrypt_etext(context, &ad->session, &eaut, &aut);
ad                866 source4/heimdal/lib/krb5/v4_glue.c     RCHECK(ret, krb5_ret_uint32(sp, &ad->checksum), error);
ad                870 source4/heimdal/lib/krb5/v4_glue.c     if (strcmp(ad->pname, r_name) != 0 ||
ad                871 source4/heimdal/lib/krb5/v4_glue.c 	strcmp(ad->pinst, r_instance) != 0 ||
ad                872 source4/heimdal/lib/krb5/v4_glue.c 	strcmp(ad->prealm, r_realm) != 0) {
ad                878 source4/heimdal/lib/krb5/v4_glue.c     if (from_addr && ad->address && from_addr != ad->address) {
ad                895 source4/heimdal/lib/krb5/v4_glue.c     tkt_age = tv.tv_sec - ad->time_sec;
ad                904 source4/heimdal/lib/krb5/v4_glue.c     if (tv.tv_sec > _krb5_krb_life_to_time(ad->time_sec, ad->life)) {
ad                941 source4/heimdal/lib/krb5/v4_glue.c _krb5_krb_free_auth_data(krb5_context context, struct _krb5_krb_auth_data *ad)
ad                943 source4/heimdal/lib/krb5/v4_glue.c     if (ad->pname)
ad                944 source4/heimdal/lib/krb5/v4_glue.c 	free(ad->pname);
ad                945 source4/heimdal/lib/krb5/v4_glue.c     if (ad->pinst)
ad                946 source4/heimdal/lib/krb5/v4_glue.c 	free(ad->pinst);
ad                947 source4/heimdal/lib/krb5/v4_glue.c     if (ad->prealm)
ad                948 source4/heimdal/lib/krb5/v4_glue.c 	free(ad->prealm);
ad                949 source4/heimdal/lib/krb5/v4_glue.c     krb5_free_keyblock_contents(context, &ad->session);
ad                950 source4/heimdal/lib/krb5/v4_glue.c     memset(ad, 0, sizeof(*ad));