ad 675 source4/heimdal/kdc/kaserver.c struct _krb5_krb_auth_data ad; ad 680 source4/heimdal/kdc/kaserver.c memset(&ad, 0, sizeof(ad)); ad 739 source4/heimdal/kdc/kaserver.c &sinstance, &ad); ad 752 source4/heimdal/kdc/kaserver.c ad.pname, ad.pinst, ad.prealm); ad 761 source4/heimdal/kdc/kaserver.c if (kdc_time > _krb5_krb_life_to_time(ad.time_sec, ad.life)) { ad 763 source4/heimdal/kdc/kaserver.c ad.pname, ad.pinst, ad.prealm); ad 770 source4/heimdal/kdc/kaserver.c "%s.%s@%s", ad.pname, ad.pinst, ad.prealm); ad 776 source4/heimdal/kdc/kaserver.c ad.pname, ad.pinst, ad.prealm, HDB_F_GET_CLIENT, ad 785 source4/heimdal/kdc/kaserver.c if (client_entry == NULL && strcmp(ad.prealm, config->v4_realm) == 0) { ad 803 source4/heimdal/kdc/kaserver.c memcpy(&session, ad.session.keyvalue.data, sizeof(session)); ad 844 source4/heimdal/kdc/kaserver.c ad.pname, ad.pinst, ad.prealm, ad 849 source4/heimdal/kdc/kaserver.c &ad.session, reply); ad 852 source4/heimdal/kdc/kaserver.c _krb5_krb_free_auth_data(context, &ad); ad 342 source4/heimdal/kdc/kerberos4.c struct _krb5_krb_auth_data ad; ad 354 source4/heimdal/kdc/kerberos4.c memset(&ad, 0, sizeof(ad)); ad 419 source4/heimdal/kdc/kerberos4.c address, &tkey->key, &ad); ad 437 source4/heimdal/kdc/kerberos4.c ad.pname, ad.pinst, ad.prealm); ad 442 source4/heimdal/kdc/kerberos4.c if(strcmp(ad.prealm, realm)){ ad 444 source4/heimdal/kdc/kerberos4.c "Can't hop realms (krb4) %s -> %s", realm, ad.prealm); ad 467 source4/heimdal/kdc/kerberos4.c ret = _kdc_db_fetch4(context, config, ad.pname, ad.pinst, ad.prealm, ad 478 source4/heimdal/kdc/kerberos4.c if (client == NULL && strcmp(ad.prealm, config->v4_realm) == 0) { ad 519 source4/heimdal/kdc/kerberos4.c max_end = _krb5_krb_life_to_time(ad.time_sec, ad.life); ad 557 source4/heimdal/kdc/kerberos4.c ad.pname, ad 558 source4/heimdal/kdc/kerberos4.c ad.pinst, ad 559 source4/heimdal/kdc/kerberos4.c ad.prealm, ad 584 source4/heimdal/kdc/kerberos4.c &ad.session, ad 594 source4/heimdal/kdc/kerberos4.c ad.pname, ad 595 source4/heimdal/kdc/kerberos4.c ad.pinst, ad 596 source4/heimdal/kdc/kerberos4.c ad.prealm, ad 606 source4/heimdal/kdc/kerberos4.c _krb5_krb_free_auth_data(context, &ad); ad 1836 source4/heimdal/kdc/kerberos5.c AuthorizationData ad = { 0, NULL }; ad 1842 source4/heimdal/kdc/kerberos5.c ret = add_AuthorizationData(&ad, &ade); ad 1852 source4/heimdal/kdc/kerberos5.c &ad, &size, ret); ad 1853 source4/heimdal/kdc/kerberos5.c free_AuthorizationData(&ad); ad 63 source4/heimdal/kdc/krb5tgs.c const AuthorizationData *ad, ad 70 source4/heimdal/kdc/krb5tgs.c if (ad == NULL || ad->len == 0) ad 73 source4/heimdal/kdc/krb5tgs.c pos = ad->len - 1; ad 75 source4/heimdal/kdc/krb5tgs.c if (ad->val[pos].ad_type != KRB5_AUTHDATA_IF_RELEVANT) ad 78 source4/heimdal/kdc/krb5tgs.c ret = decode_AuthorizationData(ad->val[pos].ad_data.data, ad 79 source4/heimdal/kdc/krb5tgs.c ad->val[pos].ad_data.length, ad 203 source4/heimdal/kdc/krb5tgs.c AuthorizationData *ad; ad 213 source4/heimdal/kdc/krb5tgs.c ad = spd.encticket.authorization_data; ad 214 source4/heimdal/kdc/krb5tgs.c if (--ad->len == 0) ad 220 source4/heimdal/kdc/krb5tgs.c ad->len++; ad 221 source4/heimdal/kdc/krb5tgs.c spd.encticket.authorization_data = ad; ad 290 source4/heimdal/kdc/krb5tgs.c AuthorizationData *ad = tkt->authorization_data; ad 294 source4/heimdal/kdc/krb5tgs.c if (ad == NULL || ad->len == 0) ad 297 source4/heimdal/kdc/krb5tgs.c for (i = 0; i < ad->len; i++) { ad 300 source4/heimdal/kdc/krb5tgs.c if (ad->val[i].ad_type != KRB5_AUTHDATA_IF_RELEVANT) ad 303 source4/heimdal/kdc/krb5tgs.c ret = decode_AuthorizationData(ad->val[i].ad_data.data, ad 304 source4/heimdal/kdc/krb5tgs.c ad->val[i].ad_data.length, ad 817 source4/heimdal/kdc/krb5tgs.c AuthorizationData *ad = et.authorization_data; ad 818 source4/heimdal/kdc/krb5tgs.c free_AuthorizationDataElement(&ad->val[ad->len - 1]); ad 819 source4/heimdal/kdc/krb5tgs.c ad->len--; ad 1206 source4/heimdal/kdc/krb5tgs.c krb5_data ad; ad 1245 source4/heimdal/kdc/krb5tgs.c &ad); ad 1261 source4/heimdal/kdc/krb5tgs.c ret = decode_AuthorizationData(ad.data, ad.length, *auth_data, NULL); ad 44 source4/heimdal/lib/krb5/build_auth.c krb5_authdata ad; ad 62 source4/heimdal/lib/krb5/build_auth.c ALLOC_SEQ(&ad, 1); ad 63 source4/heimdal/lib/krb5/build_auth.c if (ad.val == NULL) { ad 69 source4/heimdal/lib/krb5/build_auth.c ad.val[0].ad_type = KRB5_AUTHDATA_GSS_API_ETYPE_NEGOTIATION; ad 70 source4/heimdal/lib/krb5/build_auth.c ad.val[0].ad_data.length = len; ad 71 source4/heimdal/lib/krb5/build_auth.c ad.val[0].ad_data.data = buf; ad 73 source4/heimdal/lib/krb5/build_auth.c ASN1_MALLOC_ENCODE(AD_IF_RELEVANT, buf, buf_size, &ad, &len, ret); ad 75 source4/heimdal/lib/krb5/build_auth.c free_AuthorizationData(&ad); ad 80 source4/heimdal/lib/krb5/build_auth.c free_AuthorizationData(&ad); ad 65 source4/heimdal/lib/krb5/get_for_creds.c krb5_address ad; ad 67 source4/heimdal/lib/krb5/get_for_creds.c ret = krb5_sockaddr2address (context, a->ai_addr, &ad); ad 69 source4/heimdal/lib/krb5/get_for_creds.c if (krb5_address_search(context, &ad, addr)) ad 70 source4/heimdal/lib/krb5/get_for_creds.c krb5_free_address(context, &ad); ad 72 source4/heimdal/lib/krb5/get_for_creds.c addr->val[i++] = ad; ad 172 source4/heimdal/lib/krb5/rd_req.c krb5_authdata *ad; ad 181 source4/heimdal/lib/krb5/rd_req.c ad = auth_context->authenticator->authorization_data; ad 182 source4/heimdal/lib/krb5/rd_req.c if (ad == NULL) ad 185 source4/heimdal/lib/krb5/rd_req.c for (i = 0; i < ad->len; i++) { ad 186 source4/heimdal/lib/krb5/rd_req.c if (ad->val[i].ad_type == KRB5_AUTHDATA_IF_RELEVANT) { ad 187 source4/heimdal/lib/krb5/rd_req.c ret = decode_AD_IF_RELEVANT(ad->val[i].ad_data.data, ad 188 source4/heimdal/lib/krb5/rd_req.c ad->val[i].ad_data.length, ad 132 source4/heimdal/lib/krb5/ticket.c const AuthorizationData *ad, ad 152 source4/heimdal/lib/krb5/ticket.c for (i = 0; i < ad->len; i++) { ad 153 source4/heimdal/lib/krb5/ticket.c if (!*found && ad->val[i].ad_type == type) { ad 154 source4/heimdal/lib/krb5/ticket.c ret = der_copy_octet_string(&ad->val[i].ad_data, data); ad 163 source4/heimdal/lib/krb5/ticket.c switch (ad->val[i].ad_type) { ad 166 source4/heimdal/lib/krb5/ticket.c ret = decode_AuthorizationData(ad->val[i].ad_data.data, ad 167 source4/heimdal/lib/krb5/ticket.c ad->val[i].ad_data.length, ad 188 source4/heimdal/lib/krb5/ticket.c ret = decode_AD_KDCIssued(ad->val[i].ad_data.data, ad 189 source4/heimdal/lib/krb5/ticket.c ad->val[i].ad_data.length, ad 252 source4/heimdal/lib/krb5/ticket.c ad->val[i].ad_type); ad 278 source4/heimdal/lib/krb5/ticket.c AuthorizationData *ad; ad 284 source4/heimdal/lib/krb5/ticket.c ad = ticket->ticket.authorization_data; ad 292 source4/heimdal/lib/krb5/ticket.c &ticket->ticket.key, ad, 0); ad 653 source4/heimdal/lib/krb5/v4_glue.c struct _krb5_krb_auth_data *ad) ad 661 source4/heimdal/lib/krb5/v4_glue.c memset(ad, 0, sizeof(*ad)); ad 678 source4/heimdal/lib/krb5/v4_glue.c RCHECK(ret, krb5_ret_int8(sp, &ad->k_flags), error); ad 679 source4/heimdal/lib/krb5/v4_glue.c RCHECK(ret, get_v4_stringz(sp, &ad->pname, ANAME_SZ), error); ad 680 source4/heimdal/lib/krb5/v4_glue.c RCHECK(ret, get_v4_stringz(sp, &ad->pinst, INST_SZ), error); ad 681 source4/heimdal/lib/krb5/v4_glue.c RCHECK(ret, get_v4_stringz(sp, &ad->prealm, REALM_SZ), error); ad 682 source4/heimdal/lib/krb5/v4_glue.c RCHECK(ret, krb5_ret_uint32(sp, &ad->address), error); ad 690 source4/heimdal/lib/krb5/v4_glue.c RCHECK(ret, krb5_ret_uint8(sp, &ad->life), error); ad 692 source4/heimdal/lib/krb5/v4_glue.c if (ad->k_flags & 1) ad 697 source4/heimdal/lib/krb5/v4_glue.c RCHECK(ret, krb5_ret_uint32(sp, &ad->time_sec), error); ad 703 source4/heimdal/lib/krb5/v4_glue.c des_key, sizeof(des_key), &ad->session); ad 707 source4/heimdal/lib/krb5/v4_glue.c if (strlen(ad->prealm) == 0) { ad 708 source4/heimdal/lib/krb5/v4_glue.c free(ad->prealm); ad 709 source4/heimdal/lib/krb5/v4_glue.c ad->prealm = strdup(local_realm); ad 710 source4/heimdal/lib/krb5/v4_glue.c if (ad->prealm == NULL) { ad 730 source4/heimdal/lib/krb5/v4_glue.c _krb5_krb_free_auth_data(context, ad); ad 748 source4/heimdal/lib/krb5/v4_glue.c struct _krb5_krb_auth_data *ad) ad 829 source4/heimdal/lib/krb5/v4_glue.c &sname, &sinstance, ad); ad 846 source4/heimdal/lib/krb5/v4_glue.c ret = decrypt_etext(context, &ad->session, &eaut, &aut); ad 866 source4/heimdal/lib/krb5/v4_glue.c RCHECK(ret, krb5_ret_uint32(sp, &ad->checksum), error); ad 870 source4/heimdal/lib/krb5/v4_glue.c if (strcmp(ad->pname, r_name) != 0 || ad 871 source4/heimdal/lib/krb5/v4_glue.c strcmp(ad->pinst, r_instance) != 0 || ad 872 source4/heimdal/lib/krb5/v4_glue.c strcmp(ad->prealm, r_realm) != 0) { ad 878 source4/heimdal/lib/krb5/v4_glue.c if (from_addr && ad->address && from_addr != ad->address) { ad 895 source4/heimdal/lib/krb5/v4_glue.c tkt_age = tv.tv_sec - ad->time_sec; ad 904 source4/heimdal/lib/krb5/v4_glue.c if (tv.tv_sec > _krb5_krb_life_to_time(ad->time_sec, ad->life)) { ad 941 source4/heimdal/lib/krb5/v4_glue.c _krb5_krb_free_auth_data(krb5_context context, struct _krb5_krb_auth_data *ad) ad 943 source4/heimdal/lib/krb5/v4_glue.c if (ad->pname) ad 944 source4/heimdal/lib/krb5/v4_glue.c free(ad->pname); ad 945 source4/heimdal/lib/krb5/v4_glue.c if (ad->pinst) ad 946 source4/heimdal/lib/krb5/v4_glue.c free(ad->pinst); ad 947 source4/heimdal/lib/krb5/v4_glue.c if (ad->prealm) ad 948 source4/heimdal/lib/krb5/v4_glue.c free(ad->prealm); ad 949 source4/heimdal/lib/krb5/v4_glue.c krb5_free_keyblock_contents(context, &ad->session); ad 950 source4/heimdal/lib/krb5/v4_glue.c memset(ad, 0, sizeof(*ad));