Searched refs:kdc_time (Results 1 – 4 of 4) sorted by relevance
/titanic_50/usr/src/cmd/krb5/krb5kdc/ |
H A D | do_as_req.c | 71 krb5_timestamp kdc_time, authtime, etime = 0; in process_as_req() local 169 if ((errcode = krb5_timeofday(kdc_context, &kdc_time))) { in process_as_req() 175 kdc_time, &status))) { in process_as_req() 224 enc_tkt_reply.times.authtime = kdc_time; in process_as_req() 231 enc_tkt_reply.times.starttime = kdc_time; in process_as_req() 308 client.last_failed = kdc_time; in process_as_req() 419 reply_encpart.times.authtime = authtime = kdc_time; in process_as_req() 470 client.last_success = kdc_time; in process_as_req()
|
H A D | do_tgs_req.c | 81 krb5_timestamp kdc_time, authtime=0; in process_tgs_req() local 202 if ((errcode = krb5_timeofday(kdc_context, &kdc_time))) { in process_tgs_req() 208 kdc_time, &status))) { in process_tgs_req() 342 enc_tkt_reply.times.starttime = kdc_time; in process_tgs_req() 362 enc_tkt_reply.times.starttime = kdc_time; in process_tgs_req() 365 kdc_time + old_life); in process_tgs_req() 368 enc_tkt_reply.times.starttime = kdc_time; in process_tgs_req()
|
H A D | kdc_util.c | 850 krb5_db_entry server, krb5_timestamp kdc_time, in validate_as_request() argument 865 if (client.pw_expiration && client.pw_expiration < kdc_time && in validate_as_request() 876 if (client.expiration && client.expiration < kdc_time) { in validate_as_request() 886 if (server.expiration && server.expiration < kdc_time) { in validate_as_request() 956 kdc_time, status); in validate_as_request() 1124 krb5_ticket *ticket, krb5_timestamp kdc_time, in validate_tgs_request() argument 1136 if (server.expiration && server.expiration < kdc_time) { in validate_tgs_request() 1302 if (ticket->enc_part2->times.starttime > kdc_time) { in validate_tgs_request() 1313 (ticket->enc_part2->times.renew_till < kdc_time)) { in validate_tgs_request()
|
H A D | policy.c | 37 krb5_db_entry server, krb5_timestamp kdc_time, in against_local_policy_as() argument
|