ek 260 source4/heimdal/kdc/kerberos5.c KDC_REP *rep, const EncTicketPart *et, EncKDCRepPart *ek,
ek 310 source4/heimdal/kdc/kerberos5.c ASN1_MALLOC_ENCODE(EncASRepPart, buf, buf_size, ek, &len, ret);
ek 312 source4/heimdal/kdc/kerberos5.c ASN1_MALLOC_ENCODE(EncTGSRepPart, buf, buf_size, ek, &len, ret);
ek 980 source4/heimdal/kdc/kerberos5.c EncKDCRepPart ek;
ek 1084 source4/heimdal/kdc/kerberos5.c memset(&ek, 0, sizeof(ek));
ek 1571 source4/heimdal/kdc/kerberos5.c copy_EncryptionKey(&et.key, &ek.key);
ek 1582 source4/heimdal/kdc/kerberos5.c ek.last_req.val = malloc(2 * sizeof(*ek.last_req.val));
ek 1583 source4/heimdal/kdc/kerberos5.c if (ek.last_req.val == NULL) {
ek 1587 source4/heimdal/kdc/kerberos5.c ek.last_req.len = 0;
ek 1591 source4/heimdal/kdc/kerberos5.c ek.last_req.val[ek.last_req.len].lr_type = LR_PW_EXPTIME;
ek 1592 source4/heimdal/kdc/kerberos5.c ek.last_req.val[ek.last_req.len].lr_value = *client->entry.pw_end;
ek 1593 source4/heimdal/kdc/kerberos5.c ++ek.last_req.len;
ek 1596 source4/heimdal/kdc/kerberos5.c ek.last_req.val[ek.last_req.len].lr_type = LR_ACCT_EXPTIME;
ek 1597 source4/heimdal/kdc/kerberos5.c ek.last_req.val[ek.last_req.len].lr_value = *client->entry.valid_end;
ek 1598 source4/heimdal/kdc/kerberos5.c ++ek.last_req.len;
ek 1600 source4/heimdal/kdc/kerberos5.c if (ek.last_req.len == 0) {
ek 1601 source4/heimdal/kdc/kerberos5.c ek.last_req.val[ek.last_req.len].lr_type = LR_NONE;
ek 1602 source4/heimdal/kdc/kerberos5.c ek.last_req.val[ek.last_req.len].lr_value = 0;
ek 1603 source4/heimdal/kdc/kerberos5.c ++ek.last_req.len;
ek 1605 source4/heimdal/kdc/kerberos5.c ek.nonce = b->nonce;
ek 1607 source4/heimdal/kdc/kerberos5.c ALLOC(ek.key_expiration);
ek 1610 source4/heimdal/kdc/kerberos5.c *ek.key_expiration = min(*client->entry.valid_end,
ek 1613 source4/heimdal/kdc/kerberos5.c *ek.key_expiration = *client->entry.valid_end;
ek 1615 source4/heimdal/kdc/kerberos5.c *ek.key_expiration = *client->entry.pw_end;
ek 1617 source4/heimdal/kdc/kerberos5.c ek.key_expiration = NULL;
ek 1618 source4/heimdal/kdc/kerberos5.c ek.flags = et.flags;
ek 1619 source4/heimdal/kdc/kerberos5.c ek.authtime = et.authtime;
ek 1621 source4/heimdal/kdc/kerberos5.c ALLOC(ek.starttime);
ek 1622 source4/heimdal/kdc/kerberos5.c *ek.starttime = *et.starttime;
ek 1624 source4/heimdal/kdc/kerberos5.c ek.endtime = et.endtime;
ek 1626 source4/heimdal/kdc/kerberos5.c ALLOC(ek.renew_till);
ek 1627 source4/heimdal/kdc/kerberos5.c *ek.renew_till = *et.renew_till;
ek 1629 source4/heimdal/kdc/kerberos5.c copy_Realm(&rep.ticket.realm, &ek.srealm);
ek 1630 source4/heimdal/kdc/kerberos5.c copy_PrincipalName(&rep.ticket.sname, &ek.sname);
ek 1632 source4/heimdal/kdc/kerberos5.c ALLOC(ek.caddr);
ek 1633 source4/heimdal/kdc/kerberos5.c copy_HostAddresses(et.caddr, ek.caddr);
ek 1764 source4/heimdal/kdc/kerberos5.c &rep, &et, &ek, setype, server->entry.kvno,
ek 1768 source4/heimdal/kdc/kerberos5.c free_EncKDCRepPart(&ek);
ek 678 source4/heimdal/kdc/krb5tgs.c EncKDCRepPart ek;
ek 686 source4/heimdal/kdc/krb5tgs.c memset(&ek, 0, sizeof(ek));
ek 746 source4/heimdal/kdc/krb5tgs.c ek.caddr = et.caddr;
ek 842 source4/heimdal/kdc/krb5tgs.c ek.key = et.key;
ek 844 source4/heimdal/kdc/krb5tgs.c ek.last_req.len = 1;
ek 845 source4/heimdal/kdc/krb5tgs.c ek.last_req.val = calloc(1, sizeof(*ek.last_req.val));
ek 846 source4/heimdal/kdc/krb5tgs.c if (ek.last_req.val == NULL) {
ek 850 source4/heimdal/kdc/krb5tgs.c ek.nonce = b->nonce;
ek 851 source4/heimdal/kdc/krb5tgs.c ek.flags = et.flags;
ek 852 source4/heimdal/kdc/krb5tgs.c ek.authtime = et.authtime;
ek 853 source4/heimdal/kdc/krb5tgs.c ek.starttime = et.starttime;
ek 854 source4/heimdal/kdc/krb5tgs.c ek.endtime = et.endtime;
ek 855 source4/heimdal/kdc/krb5tgs.c ek.renew_till = et.renew_till;
ek 856 source4/heimdal/kdc/krb5tgs.c ek.srealm = rep.ticket.realm;
ek 857 source4/heimdal/kdc/krb5tgs.c ek.sname = rep.ticket.sname;
ek 864 source4/heimdal/kdc/krb5tgs.c char *r = get_krbtgt_realm(&ek.sname);
ek 866 source4/heimdal/kdc/krb5tgs.c if (r == NULL || strcmp(r, ek.srealm) == 0) {
ek 909 source4/heimdal/kdc/krb5tgs.c &rep, &et, &ek, et.key.keytype,
ek 926 source4/heimdal/kdc/krb5tgs.c free_LastReq(&ek.last_req);