ek 260 source4/heimdal/kdc/kerberos5.c KDC_REP *rep, const EncTicketPart *et, EncKDCRepPart *ek, ek 310 source4/heimdal/kdc/kerberos5.c ASN1_MALLOC_ENCODE(EncASRepPart, buf, buf_size, ek, &len, ret); ek 312 source4/heimdal/kdc/kerberos5.c ASN1_MALLOC_ENCODE(EncTGSRepPart, buf, buf_size, ek, &len, ret); ek 980 source4/heimdal/kdc/kerberos5.c EncKDCRepPart ek; ek 1084 source4/heimdal/kdc/kerberos5.c memset(&ek, 0, sizeof(ek)); ek 1571 source4/heimdal/kdc/kerberos5.c copy_EncryptionKey(&et.key, &ek.key); ek 1582 source4/heimdal/kdc/kerberos5.c ek.last_req.val = malloc(2 * sizeof(*ek.last_req.val)); ek 1583 source4/heimdal/kdc/kerberos5.c if (ek.last_req.val == NULL) { ek 1587 source4/heimdal/kdc/kerberos5.c ek.last_req.len = 0; ek 1591 source4/heimdal/kdc/kerberos5.c ek.last_req.val[ek.last_req.len].lr_type = LR_PW_EXPTIME; ek 1592 source4/heimdal/kdc/kerberos5.c ek.last_req.val[ek.last_req.len].lr_value = *client->entry.pw_end; ek 1593 source4/heimdal/kdc/kerberos5.c ++ek.last_req.len; ek 1596 source4/heimdal/kdc/kerberos5.c ek.last_req.val[ek.last_req.len].lr_type = LR_ACCT_EXPTIME; ek 1597 source4/heimdal/kdc/kerberos5.c ek.last_req.val[ek.last_req.len].lr_value = *client->entry.valid_end; ek 1598 source4/heimdal/kdc/kerberos5.c ++ek.last_req.len; ek 1600 source4/heimdal/kdc/kerberos5.c if (ek.last_req.len == 0) { ek 1601 source4/heimdal/kdc/kerberos5.c ek.last_req.val[ek.last_req.len].lr_type = LR_NONE; ek 1602 source4/heimdal/kdc/kerberos5.c ek.last_req.val[ek.last_req.len].lr_value = 0; ek 1603 source4/heimdal/kdc/kerberos5.c ++ek.last_req.len; ek 1605 source4/heimdal/kdc/kerberos5.c ek.nonce = b->nonce; ek 1607 source4/heimdal/kdc/kerberos5.c ALLOC(ek.key_expiration); ek 1610 source4/heimdal/kdc/kerberos5.c *ek.key_expiration = min(*client->entry.valid_end, ek 1613 source4/heimdal/kdc/kerberos5.c *ek.key_expiration = *client->entry.valid_end; ek 1615 source4/heimdal/kdc/kerberos5.c *ek.key_expiration = *client->entry.pw_end; ek 1617 source4/heimdal/kdc/kerberos5.c ek.key_expiration = NULL; ek 1618 source4/heimdal/kdc/kerberos5.c ek.flags = et.flags; ek 1619 source4/heimdal/kdc/kerberos5.c ek.authtime = et.authtime; ek 1621 source4/heimdal/kdc/kerberos5.c ALLOC(ek.starttime); ek 1622 source4/heimdal/kdc/kerberos5.c *ek.starttime = *et.starttime; ek 1624 source4/heimdal/kdc/kerberos5.c ek.endtime = et.endtime; ek 1626 source4/heimdal/kdc/kerberos5.c ALLOC(ek.renew_till); ek 1627 source4/heimdal/kdc/kerberos5.c *ek.renew_till = *et.renew_till; ek 1629 source4/heimdal/kdc/kerberos5.c copy_Realm(&rep.ticket.realm, &ek.srealm); ek 1630 source4/heimdal/kdc/kerberos5.c copy_PrincipalName(&rep.ticket.sname, &ek.sname); ek 1632 source4/heimdal/kdc/kerberos5.c ALLOC(ek.caddr); ek 1633 source4/heimdal/kdc/kerberos5.c copy_HostAddresses(et.caddr, ek.caddr); ek 1764 source4/heimdal/kdc/kerberos5.c &rep, &et, &ek, setype, server->entry.kvno, ek 1768 source4/heimdal/kdc/kerberos5.c free_EncKDCRepPart(&ek); ek 678 source4/heimdal/kdc/krb5tgs.c EncKDCRepPart ek; ek 686 source4/heimdal/kdc/krb5tgs.c memset(&ek, 0, sizeof(ek)); ek 746 source4/heimdal/kdc/krb5tgs.c ek.caddr = et.caddr; ek 842 source4/heimdal/kdc/krb5tgs.c ek.key = et.key; ek 844 source4/heimdal/kdc/krb5tgs.c ek.last_req.len = 1; ek 845 source4/heimdal/kdc/krb5tgs.c ek.last_req.val = calloc(1, sizeof(*ek.last_req.val)); ek 846 source4/heimdal/kdc/krb5tgs.c if (ek.last_req.val == NULL) { ek 850 source4/heimdal/kdc/krb5tgs.c ek.nonce = b->nonce; ek 851 source4/heimdal/kdc/krb5tgs.c ek.flags = et.flags; ek 852 source4/heimdal/kdc/krb5tgs.c ek.authtime = et.authtime; ek 853 source4/heimdal/kdc/krb5tgs.c ek.starttime = et.starttime; ek 854 source4/heimdal/kdc/krb5tgs.c ek.endtime = et.endtime; ek 855 source4/heimdal/kdc/krb5tgs.c ek.renew_till = et.renew_till; ek 856 source4/heimdal/kdc/krb5tgs.c ek.srealm = rep.ticket.realm; ek 857 source4/heimdal/kdc/krb5tgs.c ek.sname = rep.ticket.sname; ek 864 source4/heimdal/kdc/krb5tgs.c char *r = get_krbtgt_realm(&ek.sname); ek 866 source4/heimdal/kdc/krb5tgs.c if (r == NULL || strcmp(r, ek.srealm) == 0) { ek 909 source4/heimdal/kdc/krb5tgs.c &rep, &et, &ek, et.key.keytype, ek 926 source4/heimdal/kdc/krb5tgs.c free_LastReq(&ek.last_req);