ek                260 source4/heimdal/kdc/kerberos5.c 		  KDC_REP *rep, const EncTicketPart *et, EncKDCRepPart *ek,
ek                310 source4/heimdal/kdc/kerberos5.c 	ASN1_MALLOC_ENCODE(EncASRepPart, buf, buf_size, ek, &len, ret);
ek                312 source4/heimdal/kdc/kerberos5.c 	ASN1_MALLOC_ENCODE(EncTGSRepPart, buf, buf_size, ek, &len, ret);
ek                980 source4/heimdal/kdc/kerberos5.c     EncKDCRepPart ek;
ek               1084 source4/heimdal/kdc/kerberos5.c     memset(&ek, 0, sizeof(ek));
ek               1571 source4/heimdal/kdc/kerberos5.c     copy_EncryptionKey(&et.key, &ek.key);
ek               1582 source4/heimdal/kdc/kerberos5.c     ek.last_req.val = malloc(2 * sizeof(*ek.last_req.val));
ek               1583 source4/heimdal/kdc/kerberos5.c     if (ek.last_req.val == NULL) {
ek               1587 source4/heimdal/kdc/kerberos5.c     ek.last_req.len = 0;
ek               1591 source4/heimdal/kdc/kerberos5.c 	ek.last_req.val[ek.last_req.len].lr_type  = LR_PW_EXPTIME;
ek               1592 source4/heimdal/kdc/kerberos5.c 	ek.last_req.val[ek.last_req.len].lr_value = *client->entry.pw_end;
ek               1593 source4/heimdal/kdc/kerberos5.c 	++ek.last_req.len;
ek               1596 source4/heimdal/kdc/kerberos5.c 	ek.last_req.val[ek.last_req.len].lr_type  = LR_ACCT_EXPTIME;
ek               1597 source4/heimdal/kdc/kerberos5.c 	ek.last_req.val[ek.last_req.len].lr_value = *client->entry.valid_end;
ek               1598 source4/heimdal/kdc/kerberos5.c 	++ek.last_req.len;
ek               1600 source4/heimdal/kdc/kerberos5.c     if (ek.last_req.len == 0) {
ek               1601 source4/heimdal/kdc/kerberos5.c 	ek.last_req.val[ek.last_req.len].lr_type  = LR_NONE;
ek               1602 source4/heimdal/kdc/kerberos5.c 	ek.last_req.val[ek.last_req.len].lr_value = 0;
ek               1603 source4/heimdal/kdc/kerberos5.c 	++ek.last_req.len;
ek               1605 source4/heimdal/kdc/kerberos5.c     ek.nonce = b->nonce;
ek               1607 source4/heimdal/kdc/kerberos5.c 	ALLOC(ek.key_expiration);
ek               1610 source4/heimdal/kdc/kerberos5.c 		*ek.key_expiration = min(*client->entry.valid_end,
ek               1613 source4/heimdal/kdc/kerberos5.c 		*ek.key_expiration = *client->entry.valid_end;
ek               1615 source4/heimdal/kdc/kerberos5.c 	    *ek.key_expiration = *client->entry.pw_end;
ek               1617 source4/heimdal/kdc/kerberos5.c 	ek.key_expiration = NULL;
ek               1618 source4/heimdal/kdc/kerberos5.c     ek.flags = et.flags;
ek               1619 source4/heimdal/kdc/kerberos5.c     ek.authtime = et.authtime;
ek               1621 source4/heimdal/kdc/kerberos5.c 	ALLOC(ek.starttime);
ek               1622 source4/heimdal/kdc/kerberos5.c 	*ek.starttime = *et.starttime;
ek               1624 source4/heimdal/kdc/kerberos5.c     ek.endtime = et.endtime;
ek               1626 source4/heimdal/kdc/kerberos5.c 	ALLOC(ek.renew_till);
ek               1627 source4/heimdal/kdc/kerberos5.c 	*ek.renew_till = *et.renew_till;
ek               1629 source4/heimdal/kdc/kerberos5.c     copy_Realm(&rep.ticket.realm, &ek.srealm);
ek               1630 source4/heimdal/kdc/kerberos5.c     copy_PrincipalName(&rep.ticket.sname, &ek.sname);
ek               1632 source4/heimdal/kdc/kerberos5.c 	ALLOC(ek.caddr);
ek               1633 source4/heimdal/kdc/kerberos5.c 	copy_HostAddresses(et.caddr, ek.caddr);
ek               1764 source4/heimdal/kdc/kerberos5.c 			    &rep, &et, &ek, setype, server->entry.kvno,
ek               1768 source4/heimdal/kdc/kerberos5.c     free_EncKDCRepPart(&ek);
ek                678 source4/heimdal/kdc/krb5tgs.c     EncKDCRepPart ek;
ek                686 source4/heimdal/kdc/krb5tgs.c     memset(&ek, 0, sizeof(ek));
ek                746 source4/heimdal/kdc/krb5tgs.c     ek.caddr = et.caddr;
ek                842 source4/heimdal/kdc/krb5tgs.c     ek.key = et.key;
ek                844 source4/heimdal/kdc/krb5tgs.c     ek.last_req.len = 1;
ek                845 source4/heimdal/kdc/krb5tgs.c     ek.last_req.val = calloc(1, sizeof(*ek.last_req.val));
ek                846 source4/heimdal/kdc/krb5tgs.c     if (ek.last_req.val == NULL) {
ek                850 source4/heimdal/kdc/krb5tgs.c     ek.nonce = b->nonce;
ek                851 source4/heimdal/kdc/krb5tgs.c     ek.flags = et.flags;
ek                852 source4/heimdal/kdc/krb5tgs.c     ek.authtime = et.authtime;
ek                853 source4/heimdal/kdc/krb5tgs.c     ek.starttime = et.starttime;
ek                854 source4/heimdal/kdc/krb5tgs.c     ek.endtime = et.endtime;
ek                855 source4/heimdal/kdc/krb5tgs.c     ek.renew_till = et.renew_till;
ek                856 source4/heimdal/kdc/krb5tgs.c     ek.srealm = rep.ticket.realm;
ek                857 source4/heimdal/kdc/krb5tgs.c     ek.sname = rep.ticket.sname;
ek                864 source4/heimdal/kdc/krb5tgs.c 	char *r = get_krbtgt_realm(&ek.sname);
ek                866 source4/heimdal/kdc/krb5tgs.c 	if (r == NULL || strcmp(r, ek.srealm) == 0) {
ek                909 source4/heimdal/kdc/krb5tgs.c 			    &rep, &et, &ek, et.key.keytype,
ek                926 source4/heimdal/kdc/krb5tgs.c     free_LastReq(&ek.last_req);