ret = kerberos_kinit_password_ext(s, ads->auth.password,
ads->auth.time_offset,
- &ads->auth.tgt_expire, NULL,
+ NULL, NULL,
ads->auth.ccache_name, false, false,
0,
NULL, NULL, NULL, NULL);
struct auth_generic_state *auth_generic_state;
const char *sasl = "GSS-SPNEGO";
const char *sasl_list[] = { sasl, NULL };
- NTTIME end_nt_time;
struct ads_saslwrap *wrap = &ads->ldap_wrap_data;
const DATA_BLOB *tls_cb = NULL;
}
}
- ads->auth.tgs_expire = LONG_MAX;
- end_nt_time = gensec_expire_time(auth_generic_state->gensec_security);
- if (end_nt_time != GENSEC_EXPIRE_TIME_INFINITY) {
- struct timeval tv;
- nttime_to_timeval(&tv, end_nt_time);
- ads->auth.tgs_expire = tv.tv_sec;
- }
+ ads->auth.expire_time = gensec_expire_time(auth_generic_state->gensec_security);
if (wrap->wrap_type > ADS_SASLWRAP_TYPE_PLAIN) {
size_t max_wrapped =
time_t expire;
time_t now = time(NULL);
- expire = MIN(ads->auth.tgt_expire, ads->auth.tgs_expire);
+ expire = nt_time_to_unix(ads->auth.expire_time);
DEBUG(7, ("Current tickets expire in %d seconds (at %d, time "
"is now %d)\n", (uint32_t)expire - (uint32_t)now,