enc_tkt_reply.times.starttime = kdc_time;
- until = (request->till == 0) ? infinity : request->till;
+ until = (request->till == 0) ? kdc_infinity : request->till;
enc_tkt_reply.times.endtime =
min(until,
setflag(request->kdc_options, KDC_OPT_RENEWABLE);
request->rtime = request->till;
}
- rtime = (request->rtime == 0) ? infinity : request->rtime;
+ rtime = (request->rtime == 0) ? kdc_infinity : request->rtime;
if (isflagset(request->kdc_options, KDC_OPT_RENEWABLE)) {
setflag(enc_tkt_reply.flags, TKT_FLG_RENEWABLE);
} else {
/* not a renew request */
enc_tkt_reply.times.starttime = kdc_time;
- until = (request->till == 0) ? infinity : request->till;
+ until = (request->till == 0) ? kdc_infinity : request->till;
enc_tkt_reply.times.endtime =
min(until, min(enc_tkt_reply.times.starttime + server.max_life,
min(enc_tkt_reply.times.starttime + max_life_for_realm,
header_ticket->enc_part2->times.renew_till);
}
}
- rtime = (request->rtime == 0) ? infinity : request->rtime;
+ rtime = (request->rtime == 0) ? kdc_infinity : request->rtime;
if (isflagset(request->kdc_options, KDC_OPT_RENEWABLE)) {
/* already checked above in policy check to reject request for a
/* real declarations of KDC's externs */
krb5_data empty_string = {0, ""};
-krb5_timestamp infinity = KRB5_INT32_MAX; /* XXX */
+krb5_timestamp kdc_infinity = KRB5_INT32_MAX; /* XXX */
krb5_deltat max_life_for_realm = KRB5_KDB_MAX_LIFE; /* XXX parameter per-realm? */
krb5_deltat max_renewable_life_for_realm = KRB5_KDB_MAX_RLIFE; /* XXX param per-realm? */
/* various externs for KDC */
extern krb5_data empty_string; /* an empty string */
-extern krb5_timestamp infinity; /* greater than all other timestamps */
+extern krb5_timestamp kdc_infinity; /* greater than all other timestamps */
extern krb5_deltat max_life_for_realm; /* XXX should be a parameter? */
extern krb5_deltat max_renewable_life_for_realm; /* XXX should be a parameter? */