ad 675 source4/heimdal/kdc/kaserver.c struct _krb5_krb_auth_data ad;
ad 680 source4/heimdal/kdc/kaserver.c memset(&ad, 0, sizeof(ad));
ad 739 source4/heimdal/kdc/kaserver.c &sinstance, &ad);
ad 752 source4/heimdal/kdc/kaserver.c ad.pname, ad.pinst, ad.prealm);
ad 761 source4/heimdal/kdc/kaserver.c if (kdc_time > _krb5_krb_life_to_time(ad.time_sec, ad.life)) {
ad 763 source4/heimdal/kdc/kaserver.c ad.pname, ad.pinst, ad.prealm);
ad 770 source4/heimdal/kdc/kaserver.c "%s.%s@%s", ad.pname, ad.pinst, ad.prealm);
ad 776 source4/heimdal/kdc/kaserver.c ad.pname, ad.pinst, ad.prealm, HDB_F_GET_CLIENT,
ad 785 source4/heimdal/kdc/kaserver.c if (client_entry == NULL && strcmp(ad.prealm, config->v4_realm) == 0) {
ad 803 source4/heimdal/kdc/kaserver.c memcpy(&session, ad.session.keyvalue.data, sizeof(session));
ad 844 source4/heimdal/kdc/kaserver.c ad.pname, ad.pinst, ad.prealm,
ad 849 source4/heimdal/kdc/kaserver.c &ad.session, reply);
ad 852 source4/heimdal/kdc/kaserver.c _krb5_krb_free_auth_data(context, &ad);
ad 342 source4/heimdal/kdc/kerberos4.c struct _krb5_krb_auth_data ad;
ad 354 source4/heimdal/kdc/kerberos4.c memset(&ad, 0, sizeof(ad));
ad 419 source4/heimdal/kdc/kerberos4.c address, &tkey->key, &ad);
ad 437 source4/heimdal/kdc/kerberos4.c ad.pname, ad.pinst, ad.prealm);
ad 442 source4/heimdal/kdc/kerberos4.c if(strcmp(ad.prealm, realm)){
ad 444 source4/heimdal/kdc/kerberos4.c "Can't hop realms (krb4) %s -> %s", realm, ad.prealm);
ad 467 source4/heimdal/kdc/kerberos4.c ret = _kdc_db_fetch4(context, config, ad.pname, ad.pinst, ad.prealm,
ad 478 source4/heimdal/kdc/kerberos4.c if (client == NULL && strcmp(ad.prealm, config->v4_realm) == 0) {
ad 519 source4/heimdal/kdc/kerberos4.c max_end = _krb5_krb_life_to_time(ad.time_sec, ad.life);
ad 557 source4/heimdal/kdc/kerberos4.c ad.pname,
ad 558 source4/heimdal/kdc/kerberos4.c ad.pinst,
ad 559 source4/heimdal/kdc/kerberos4.c ad.prealm,
ad 584 source4/heimdal/kdc/kerberos4.c &ad.session,
ad 594 source4/heimdal/kdc/kerberos4.c ad.pname,
ad 595 source4/heimdal/kdc/kerberos4.c ad.pinst,
ad 596 source4/heimdal/kdc/kerberos4.c ad.prealm,
ad 606 source4/heimdal/kdc/kerberos4.c _krb5_krb_free_auth_data(context, &ad);
ad 1836 source4/heimdal/kdc/kerberos5.c AuthorizationData ad = { 0, NULL };
ad 1842 source4/heimdal/kdc/kerberos5.c ret = add_AuthorizationData(&ad, &ade);
ad 1852 source4/heimdal/kdc/kerberos5.c &ad, &size, ret);
ad 1853 source4/heimdal/kdc/kerberos5.c free_AuthorizationData(&ad);
ad 63 source4/heimdal/kdc/krb5tgs.c const AuthorizationData *ad,
ad 70 source4/heimdal/kdc/krb5tgs.c if (ad == NULL || ad->len == 0)
ad 73 source4/heimdal/kdc/krb5tgs.c pos = ad->len - 1;
ad 75 source4/heimdal/kdc/krb5tgs.c if (ad->val[pos].ad_type != KRB5_AUTHDATA_IF_RELEVANT)
ad 78 source4/heimdal/kdc/krb5tgs.c ret = decode_AuthorizationData(ad->val[pos].ad_data.data,
ad 79 source4/heimdal/kdc/krb5tgs.c ad->val[pos].ad_data.length,
ad 203 source4/heimdal/kdc/krb5tgs.c AuthorizationData *ad;
ad 213 source4/heimdal/kdc/krb5tgs.c ad = spd.encticket.authorization_data;
ad 214 source4/heimdal/kdc/krb5tgs.c if (--ad->len == 0)
ad 220 source4/heimdal/kdc/krb5tgs.c ad->len++;
ad 221 source4/heimdal/kdc/krb5tgs.c spd.encticket.authorization_data = ad;
ad 290 source4/heimdal/kdc/krb5tgs.c AuthorizationData *ad = tkt->authorization_data;
ad 294 source4/heimdal/kdc/krb5tgs.c if (ad == NULL || ad->len == 0)
ad 297 source4/heimdal/kdc/krb5tgs.c for (i = 0; i < ad->len; i++) {
ad 300 source4/heimdal/kdc/krb5tgs.c if (ad->val[i].ad_type != KRB5_AUTHDATA_IF_RELEVANT)
ad 303 source4/heimdal/kdc/krb5tgs.c ret = decode_AuthorizationData(ad->val[i].ad_data.data,
ad 304 source4/heimdal/kdc/krb5tgs.c ad->val[i].ad_data.length,
ad 817 source4/heimdal/kdc/krb5tgs.c AuthorizationData *ad = et.authorization_data;
ad 818 source4/heimdal/kdc/krb5tgs.c free_AuthorizationDataElement(&ad->val[ad->len - 1]);
ad 819 source4/heimdal/kdc/krb5tgs.c ad->len--;
ad 1206 source4/heimdal/kdc/krb5tgs.c krb5_data ad;
ad 1245 source4/heimdal/kdc/krb5tgs.c &ad);
ad 1261 source4/heimdal/kdc/krb5tgs.c ret = decode_AuthorizationData(ad.data, ad.length, *auth_data, NULL);
ad 44 source4/heimdal/lib/krb5/build_auth.c krb5_authdata ad;
ad 62 source4/heimdal/lib/krb5/build_auth.c ALLOC_SEQ(&ad, 1);
ad 63 source4/heimdal/lib/krb5/build_auth.c if (ad.val == NULL) {
ad 69 source4/heimdal/lib/krb5/build_auth.c ad.val[0].ad_type = KRB5_AUTHDATA_GSS_API_ETYPE_NEGOTIATION;
ad 70 source4/heimdal/lib/krb5/build_auth.c ad.val[0].ad_data.length = len;
ad 71 source4/heimdal/lib/krb5/build_auth.c ad.val[0].ad_data.data = buf;
ad 73 source4/heimdal/lib/krb5/build_auth.c ASN1_MALLOC_ENCODE(AD_IF_RELEVANT, buf, buf_size, &ad, &len, ret);
ad 75 source4/heimdal/lib/krb5/build_auth.c free_AuthorizationData(&ad);
ad 80 source4/heimdal/lib/krb5/build_auth.c free_AuthorizationData(&ad);
ad 65 source4/heimdal/lib/krb5/get_for_creds.c krb5_address ad;
ad 67 source4/heimdal/lib/krb5/get_for_creds.c ret = krb5_sockaddr2address (context, a->ai_addr, &ad);
ad 69 source4/heimdal/lib/krb5/get_for_creds.c if (krb5_address_search(context, &ad, addr))
ad 70 source4/heimdal/lib/krb5/get_for_creds.c krb5_free_address(context, &ad);
ad 72 source4/heimdal/lib/krb5/get_for_creds.c addr->val[i++] = ad;
ad 172 source4/heimdal/lib/krb5/rd_req.c krb5_authdata *ad;
ad 181 source4/heimdal/lib/krb5/rd_req.c ad = auth_context->authenticator->authorization_data;
ad 182 source4/heimdal/lib/krb5/rd_req.c if (ad == NULL)
ad 185 source4/heimdal/lib/krb5/rd_req.c for (i = 0; i < ad->len; i++) {
ad 186 source4/heimdal/lib/krb5/rd_req.c if (ad->val[i].ad_type == KRB5_AUTHDATA_IF_RELEVANT) {
ad 187 source4/heimdal/lib/krb5/rd_req.c ret = decode_AD_IF_RELEVANT(ad->val[i].ad_data.data,
ad 188 source4/heimdal/lib/krb5/rd_req.c ad->val[i].ad_data.length,
ad 132 source4/heimdal/lib/krb5/ticket.c const AuthorizationData *ad,
ad 152 source4/heimdal/lib/krb5/ticket.c for (i = 0; i < ad->len; i++) {
ad 153 source4/heimdal/lib/krb5/ticket.c if (!*found && ad->val[i].ad_type == type) {
ad 154 source4/heimdal/lib/krb5/ticket.c ret = der_copy_octet_string(&ad->val[i].ad_data, data);
ad 163 source4/heimdal/lib/krb5/ticket.c switch (ad->val[i].ad_type) {
ad 166 source4/heimdal/lib/krb5/ticket.c ret = decode_AuthorizationData(ad->val[i].ad_data.data,
ad 167 source4/heimdal/lib/krb5/ticket.c ad->val[i].ad_data.length,
ad 188 source4/heimdal/lib/krb5/ticket.c ret = decode_AD_KDCIssued(ad->val[i].ad_data.data,
ad 189 source4/heimdal/lib/krb5/ticket.c ad->val[i].ad_data.length,
ad 252 source4/heimdal/lib/krb5/ticket.c ad->val[i].ad_type);
ad 278 source4/heimdal/lib/krb5/ticket.c AuthorizationData *ad;
ad 284 source4/heimdal/lib/krb5/ticket.c ad = ticket->ticket.authorization_data;
ad 292 source4/heimdal/lib/krb5/ticket.c &ticket->ticket.key, ad, 0);
ad 653 source4/heimdal/lib/krb5/v4_glue.c struct _krb5_krb_auth_data *ad)
ad 661 source4/heimdal/lib/krb5/v4_glue.c memset(ad, 0, sizeof(*ad));
ad 678 source4/heimdal/lib/krb5/v4_glue.c RCHECK(ret, krb5_ret_int8(sp, &ad->k_flags), error);
ad 679 source4/heimdal/lib/krb5/v4_glue.c RCHECK(ret, get_v4_stringz(sp, &ad->pname, ANAME_SZ), error);
ad 680 source4/heimdal/lib/krb5/v4_glue.c RCHECK(ret, get_v4_stringz(sp, &ad->pinst, INST_SZ), error);
ad 681 source4/heimdal/lib/krb5/v4_glue.c RCHECK(ret, get_v4_stringz(sp, &ad->prealm, REALM_SZ), error);
ad 682 source4/heimdal/lib/krb5/v4_glue.c RCHECK(ret, krb5_ret_uint32(sp, &ad->address), error);
ad 690 source4/heimdal/lib/krb5/v4_glue.c RCHECK(ret, krb5_ret_uint8(sp, &ad->life), error);
ad 692 source4/heimdal/lib/krb5/v4_glue.c if (ad->k_flags & 1)
ad 697 source4/heimdal/lib/krb5/v4_glue.c RCHECK(ret, krb5_ret_uint32(sp, &ad->time_sec), error);
ad 703 source4/heimdal/lib/krb5/v4_glue.c des_key, sizeof(des_key), &ad->session);
ad 707 source4/heimdal/lib/krb5/v4_glue.c if (strlen(ad->prealm) == 0) {
ad 708 source4/heimdal/lib/krb5/v4_glue.c free(ad->prealm);
ad 709 source4/heimdal/lib/krb5/v4_glue.c ad->prealm = strdup(local_realm);
ad 710 source4/heimdal/lib/krb5/v4_glue.c if (ad->prealm == NULL) {
ad 730 source4/heimdal/lib/krb5/v4_glue.c _krb5_krb_free_auth_data(context, ad);
ad 748 source4/heimdal/lib/krb5/v4_glue.c struct _krb5_krb_auth_data *ad)
ad 829 source4/heimdal/lib/krb5/v4_glue.c &sname, &sinstance, ad);
ad 846 source4/heimdal/lib/krb5/v4_glue.c ret = decrypt_etext(context, &ad->session, &eaut, &aut);
ad 866 source4/heimdal/lib/krb5/v4_glue.c RCHECK(ret, krb5_ret_uint32(sp, &ad->checksum), error);
ad 870 source4/heimdal/lib/krb5/v4_glue.c if (strcmp(ad->pname, r_name) != 0 ||
ad 871 source4/heimdal/lib/krb5/v4_glue.c strcmp(ad->pinst, r_instance) != 0 ||
ad 872 source4/heimdal/lib/krb5/v4_glue.c strcmp(ad->prealm, r_realm) != 0) {
ad 878 source4/heimdal/lib/krb5/v4_glue.c if (from_addr && ad->address && from_addr != ad->address) {
ad 895 source4/heimdal/lib/krb5/v4_glue.c tkt_age = tv.tv_sec - ad->time_sec;
ad 904 source4/heimdal/lib/krb5/v4_glue.c if (tv.tv_sec > _krb5_krb_life_to_time(ad->time_sec, ad->life)) {
ad 941 source4/heimdal/lib/krb5/v4_glue.c _krb5_krb_free_auth_data(krb5_context context, struct _krb5_krb_auth_data *ad)
ad 943 source4/heimdal/lib/krb5/v4_glue.c if (ad->pname)
ad 944 source4/heimdal/lib/krb5/v4_glue.c free(ad->pname);
ad 945 source4/heimdal/lib/krb5/v4_glue.c if (ad->pinst)
ad 946 source4/heimdal/lib/krb5/v4_glue.c free(ad->pinst);
ad 947 source4/heimdal/lib/krb5/v4_glue.c if (ad->prealm)
ad 948 source4/heimdal/lib/krb5/v4_glue.c free(ad->prealm);
ad 949 source4/heimdal/lib/krb5/v4_glue.c krb5_free_keyblock_contents(context, &ad->session);
ad 950 source4/heimdal/lib/krb5/v4_glue.c memset(ad, 0, sizeof(*ad));