enctype 382 source3/include/ads.h #define KRB5_KEY_TYPE(k) ((k)->enctype)
enctype 938 source3/include/includes.h int create_kerberos_key_from_string(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, krb5_enctype enctype, bool no_salt);
enctype 948 source3/include/includes.h krb5_principal kerberos_fetch_salt_princ_for_host_princ(krb5_context context, krb5_principal host_princ, int enctype);
enctype 949 source3/include/includes.h void kerberos_set_creds_enctype(krb5_creds *pcreds, int enctype);
enctype 973 source3/include/includes.h krb5_enctype *enctype);
enctype 1010 source3/include/includes.h krb5_enctype enctype,
enctype 1780 source3/include/proto.h int enctype,
enctype 381 source3/libads/kerberos.c static char *kerberos_secrets_fetch_salting_principal(const char *service, int enctype)
enctype 387 source3/libads/kerberos.c SECRETS_SALTING_PRINCIPAL, service, enctype) == -1) {
enctype 537 source3/libads/kerberos.c int enctype)
enctype 551 source3/libads/kerberos.c if ((salt_princ_s = kerberos_secrets_fetch_salting_principal(unparsed_name, enctype)) == NULL) {
enctype 576 source3/libads/kerberos.c int enctype,
enctype 611 source3/libads/kerberos.c SECRETS_SALTING_PRINCIPAL, unparsed_name, enctype)
enctype 730 source3/libads/kerberos_keytab.c krb5_enctype enctype = 0;
enctype 737 source3/libads/kerberos_keytab.c enctype = smb_get_enctype_from_kt_entry(&kt_entry);
enctype 739 source3/libads/kerberos_keytab.c ret = smb_krb5_enctype_to_string(context, enctype, &etype_s);
enctype 741 source3/libads/kerberos_keytab.c if (asprintf(&etype_s, "UNKNOWN: %d\n", enctype) == -1)
enctype 49 source3/libads/kerberos_verify.c krb5_enctype enctype;
enctype 76 source3/libads/kerberos_verify.c enctype = dec_ticket->ticket.key.keytype;
enctype 78 source3/libads/kerberos_verify.c enctype = dec_ticket->enc_part.enctype;
enctype 84 source3/libads/kerberos_verify.c kvno, enctype, &kt_entry);
enctype 117 source3/libnet/libnet_keytab.c const krb5_enctype enctype,
enctype 143 source3/libnet/libnet_keytab.c if (KRB5_KEY_TYPE(keyp) != enctype) {
enctype 209 source3/libnet/libnet_keytab.c krb5_enctype enctype,
enctype 218 source3/libnet/libnet_keytab.c enctype, false);
enctype 238 source3/libnet/libnet_keytab.c &password, keyp, enctype, true))
enctype 274 source3/libnet/libnet_keytab.c entry->enctype,
enctype 279 source3/libnet/libnet_keytab.c entry->principal, entry->enctype,
enctype 299 source3/libnet/libnet_keytab.c entry->enctype,
enctype 314 source3/libnet/libnet_keytab.c const krb5_enctype enctype,
enctype 345 source3/libnet/libnet_keytab.c if (KRB5_KEY_TYPE(keyp) != enctype) {
enctype 409 source3/libnet/libnet_keytab.c const krb5_enctype enctype,
enctype 420 source3/libnet/libnet_keytab.c entry.enctype = enctype;
enctype 27 source3/libnet/libnet_keytab.h krb5_enctype enctype;
enctype 56 source3/libnet/libnet_proto.h const krb5_enctype enctype,
enctype 63 source3/libnet/libnet_proto.h const krb5_enctype enctype,
enctype 220 source3/libsmb/clikrb5.c krb5_enctype enctype)
enctype 231 source3/libsmb/clikrb5.c krb5_use_enctype(context, &eblock, enctype);
enctype 242 source3/libsmb/clikrb5.c krb5_enctype enctype)
enctype 253 source3/libsmb/clikrb5.c ret = krb5_string_to_key_salt(context, enctype, (const char *)password->data, salt, key);
enctype 266 source3/libsmb/clikrb5.c krb5_enctype enctype,
enctype 283 source3/libsmb/clikrb5.c KRB5_KEY_TYPE(key) = enctype;
enctype 286 source3/libsmb/clikrb5.c salt_princ = kerberos_fetch_salt_princ_for_host_princ(context, host_princ, enctype);
enctype 287 source3/libsmb/clikrb5.c ret = create_kerberos_key_from_string_direct(context, salt_princ ? salt_princ : host_princ, password, key, enctype);
enctype 587 source3/libsmb/clikrb5.c void kerberos_set_creds_enctype(krb5_creds *pcreds, int enctype)
enctype 590 source3/libsmb/clikrb5.c KRB5_KEY_TYPE((&pcreds->keyblock)) = enctype;
enctype 592 source3/libsmb/clikrb5.c KRB5_KEY_TYPE((&pcreds->session)) = enctype;
enctype 1055 source3/libsmb/clikrb5.c return ap_req->ticket->enc_part.enctype;
enctype 1063 source3/libsmb/clikrb5.c krb5_enctype enctype,
enctype 1087 source3/libsmb/clikrb5.c kvno, enctype, name));
enctype 1096 source3/libsmb/clikrb5.c enctype,
enctype 1124 source3/libsmb/clikrb5.c krb5_enctype *enctype)
enctype 1136 source3/libsmb/clikrb5.c *enctype = get_enctype_from_ap_req(&ap_req);
enctype 1158 source3/libsmb/clikrb5.c krb5_enctype enctype;
enctype 1173 source3/libsmb/clikrb5.c enctype = (*ticket)->enc_part.enctype;
enctype 1176 source3/libsmb/clikrb5.c ret = smb_krb5_get_keyinfo_from_ap_req(context, inbuf, &kvno, &enctype);
enctype 1184 source3/libsmb/clikrb5.c enctype,
enctype 1602 source3/libsmb/clikrb5.c krb5_enctype enctype,
enctype 1606 source3/libsmb/clikrb5.c return krb5_enctype_to_string(context, enctype, etype_s); /* Heimdal */
enctype 1609 source3/libsmb/clikrb5.c krb5_error_code ret = krb5_enctype_to_string(enctype, buf, 256); /* MIT */
enctype 35 source4/auth/kerberos/clikrb5.c krb5_enctype enctype)
enctype 46 source4/auth/kerberos/clikrb5.c krb5_use_enctype(context, &eblock, enctype);
enctype 56 source4/auth/kerberos/clikrb5.c krb5_enctype enctype)
enctype 66 source4/auth/kerberos/clikrb5.c ret = krb5_string_to_key_salt(context, enctype, password->data,
enctype 51 source4/auth/kerberos/kerberos.h #define KRB5_KEY_TYPE(k) ((k)->enctype)
enctype 78 source4/auth/kerberos/kerberos.h int create_kerberos_key_from_string(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, krb5_enctype enctype);
enctype 79 source4/auth/kerberos/kerberos.h int create_kerberos_key_from_string_direct(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, krb5_enctype enctype);
enctype 99 source4/auth/kerberos/kerberos.h int enctype);
enctype 100 source4/auth/kerberos/kerberos.h void kerberos_set_creds_enctype(krb5_creds *pcreds, int enctype);
enctype 298 source4/auth/kerberos/kerberos_util.c krb5_enctype enctype;
enctype 299 source4/auth/kerberos/kerberos_util.c ret = krb5_string_to_enctype(smb_krb5_context->krb5_context, enctype_strings[i], &enctype);
enctype 309 source4/auth/kerberos/kerberos_util.c salt_princ, &password, &entry.keyblock, enctype);
enctype 64 source4/heimdal/kdc/digest.c krb5_enctype enctype;
enctype 71 source4/heimdal/kdc/digest.c &enctype,
enctype 375 source4/heimdal/kdc/kerberos5.c older_enctype(krb5_enctype enctype)
enctype 377 source4/heimdal/kdc/kerberos5.c switch (enctype) {
enctype 108 source4/heimdal/kdc/krb5tgs.c krb5_enctype enctype,
enctype 141 source4/heimdal/kdc/krb5tgs.c ret = hdb_enctype2key(context, &krbtgt->entry, enctype, &key);
enctype 154 source4/heimdal/kdc/krb5tgs.c sp.etype = enctype;
enctype 100 source4/heimdal/kdc/misc.c krb5_enctype *enctype,
enctype 114 source4/heimdal/kdc/misc.c *enctype = p[i];
enctype 180 source4/heimdal/kdc/pkinit.c krb5_enctype enctype, krb5_keyblock *reply_key)
enctype 223 source4/heimdal/kdc/pkinit.c enctype,
enctype 968 source4/heimdal/kdc/pkinit.c krb5_enctype enctype;
enctype 988 source4/heimdal/kdc/pkinit.c enctype = req->req_body.etype.val[i];
enctype 990 source4/heimdal/kdc/pkinit.c enctype = ETYPE_DES3_CBC_SHA1;
enctype 1007 source4/heimdal/kdc/pkinit.c ret = krb5_generate_random_keyblock(context, enctype,
enctype 1046 source4/heimdal/kdc/pkinit.c ret = generate_dh_keyblock(context, client_params, enctype,
enctype 1103 source4/heimdal/kdc/pkinit.c ret = krb5_generate_random_keyblock(context, enctype,
enctype 390 source4/heimdal/kuser/kinit.c krb5_enctype *enctype = NULL;
enctype 483 source4/heimdal/kuser/kinit.c enctype = malloc(etype_str.num_strings * sizeof(*enctype));
enctype 484 source4/heimdal/kuser/kinit.c if(enctype == NULL)
enctype 489 source4/heimdal/kuser/kinit.c &enctype[i]);
enctype 493 source4/heimdal/kuser/kinit.c krb5_get_init_creds_opt_set_etype_list(opt, enctype,
enctype 633 source4/heimdal/kuser/kinit.c if (enctype)
enctype 634 source4/heimdal/kuser/kinit.c free(enctype);
enctype 499 source4/heimdal/lib/gssapi/krb5/init_sec_context.c krb5_enctype enctype;
enctype 593 source4/heimdal/lib/gssapi/krb5/init_sec_context.c enctype = ctx->auth_context->keyblock->keytype;
enctype 612 source4/heimdal/lib/gssapi/krb5/init_sec_context.c enctype,
enctype 628 source4/heimdal/lib/gssapi/krb5/init_sec_context.c enctype,
enctype 71 source4/heimdal/lib/hdb/hdb.c krb5_enctype enctype,
enctype 80 source4/heimdal/lib/hdb/hdb.c if(k->key.keytype == enctype){
enctype 87 source4/heimdal/lib/hdb/hdb.c (int)enctype);
enctype 94 source4/heimdal/lib/hdb/hdb.c krb5_enctype enctype,
enctype 98 source4/heimdal/lib/hdb/hdb.c return hdb_next_enctype2key(context, e, enctype, key);
enctype 202 source4/heimdal/lib/hdb/keys.c krb5_enctype enctype, krb5_salt *salt)
enctype 215 source4/heimdal/lib/hdb/keys.c key.key.keytype = enctype;
enctype 193 source4/heimdal/lib/hdb/keytab.c krb5_enctype enctype,
enctype 239 source4/heimdal/lib/hdb/keytab.c if(enctype == 0)
enctype 241 source4/heimdal/lib/hdb/keytab.c enctype = ent.entry.keys.val[0].key.keytype;
enctype 244 source4/heimdal/lib/hdb/keytab.c if(ent.entry.keys.val[i].key.keytype == enctype) {
enctype 156 source4/heimdal/lib/hdb/mkey.c int16_t enctype;
enctype 177 source4/heimdal/lib/hdb/mkey.c ret = krb5_ret_int16(sp, &enctype);
enctype 178 source4/heimdal/lib/hdb/mkey.c if((htons(enctype) & 0xff00) == 0x3000) {
enctype 181 source4/heimdal/lib/hdb/mkey.c filename, htons(enctype), 0x3000);
enctype 184 source4/heimdal/lib/hdb/mkey.c key.keytype = enctype;
enctype 1959 source4/heimdal/lib/hx509/crypto.c const heim_oid *enctype,
enctype 1966 source4/heimdal/lib/hx509/crypto.c cipher = find_cipher_by_oid(enctype);
enctype 1982 source4/heimdal/lib/hx509/crypto.c if (der_copy_oid(enctype, &(*crypto)->oid)) {
enctype 40 source4/heimdal/lib/krb5/build_ap_req.c krb5_enctype enctype,
enctype 65 source4/heimdal/lib/krb5/build_ap_req.c ap.authenticator.etype = enctype;
enctype 105 source4/heimdal/lib/krb5/build_auth.c krb5_enctype enctype,
enctype 172 source4/heimdal/lib/krb5/build_auth.c ret = krb5_crypto_init(context, &cred->session, enctype, &crypto);
enctype 283 source4/heimdal/lib/krb5/crypto.c krb5_enctype enctype,
enctype 294 source4/heimdal/lib/krb5/crypto.c key->keytype = enctype;
enctype 336 source4/heimdal/lib/krb5/crypto.c krb5_enctype enctype,
enctype 351 source4/heimdal/lib/krb5/crypto.c return DES_AFS3_string_to_key(context, enctype, password,
enctype 365 source4/heimdal/lib/krb5/crypto.c key->keytype = enctype;
enctype 427 source4/heimdal/lib/krb5/crypto.c krb5_enctype enctype,
enctype 481 source4/heimdal/lib/krb5/crypto.c key->keytype = enctype;
enctype 492 source4/heimdal/lib/krb5/crypto.c krb5_enctype enctype,
enctype 512 source4/heimdal/lib/krb5/crypto.c enctype,
enctype 568 source4/heimdal/lib/krb5/crypto.c krb5_enctype enctype,
enctype 619 source4/heimdal/lib/krb5/crypto.c key->keytype = enctype;
enctype 643 source4/heimdal/lib/krb5/crypto.c krb5_enctype enctype,
enctype 663 source4/heimdal/lib/krb5/crypto.c et = _find_enctype(enctype);
enctype 673 source4/heimdal/lib/krb5/crypto.c kd.key->keytype = enctype;
enctype 990 source4/heimdal/lib/krb5/crypto.c krb5_enctype enctype,
enctype 1001 source4/heimdal/lib/krb5/crypto.c ret = krb5_string_to_key_data_salt(context, enctype, password, salt, key);
enctype 1008 source4/heimdal/lib/krb5/crypto.c krb5_enctype enctype,
enctype 1016 source4/heimdal/lib/krb5/crypto.c return krb5_string_to_key_data(context, enctype, pw, principal, key);
enctype 1021 source4/heimdal/lib/krb5/crypto.c krb5_enctype enctype,
enctype 1028 source4/heimdal/lib/krb5/crypto.c return krb5_string_to_key_data_salt_opaque(context, enctype, password,
enctype 1040 source4/heimdal/lib/krb5/crypto.c krb5_enctype enctype,
enctype 1046 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et =_find_enctype(enctype);
enctype 1051 source4/heimdal/lib/krb5/crypto.c enctype);
enctype 1056 source4/heimdal/lib/krb5/crypto.c return (*st->string_to_key)(context, enctype, password,
enctype 1072 source4/heimdal/lib/krb5/crypto.c krb5_enctype enctype,
enctype 1080 source4/heimdal/lib/krb5/crypto.c return krb5_string_to_key_data_salt(context, enctype, pw, salt, key);
enctype 1085 source4/heimdal/lib/krb5/crypto.c krb5_enctype enctype,
enctype 1094 source4/heimdal/lib/krb5/crypto.c return krb5_string_to_key_data_salt_opaque(context, enctype,
enctype 4031 source4/heimdal/lib/krb5/crypto.c krb5_enctype *enctype)
enctype 4033 source4/heimdal/lib/krb5/crypto.c *enctype = crypto->et->type;
enctype 4069 source4/heimdal/lib/krb5/crypto.c krb5_enctype enctype)
enctype 4071 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = _find_enctype(enctype);
enctype 4076 source4/heimdal/lib/krb5/crypto.c enctype);
enctype 4096 source4/heimdal/lib/krb5/crypto.c krb5_enctype enctype)
enctype 4098 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = _find_enctype(enctype);
enctype 4103 source4/heimdal/lib/krb5/crypto.c enctype);
enctype 4388 source4/heimdal/lib/krb5/crypto.c krb5_enctype enctype,
enctype 4404 source4/heimdal/lib/krb5/crypto.c pubinfo.enctype = enctype;
enctype 4454 source4/heimdal/lib/krb5/crypto.c krb5_enctype enctype,
enctype 4483 source4/heimdal/lib/krb5/crypto.c et = _find_enctype(enctype);
enctype 4487 source4/heimdal/lib/krb5/crypto.c enctype);
enctype 4499 source4/heimdal/lib/krb5/crypto.c enctype, as_req, pk_as_rep, ticket, &other);
enctype 4529 source4/heimdal/lib/krb5/crypto.c ret = krb5_random_to_key(context, enctype, keydata, keylen, key);
enctype 1198 source4/heimdal/lib/krb5/get_cred.c krb5_enctype enctype;
enctype 1243 source4/heimdal/lib/krb5/get_cred.c krb5_enctype enctype)
enctype 1245 source4/heimdal/lib/krb5/get_cred.c opt->enctype = enctype;
enctype 1325 source4/heimdal/lib/krb5/get_cred.c if (opt->enctype) {
enctype 1326 source4/heimdal/lib/krb5/get_cred.c in_creds.session.keytype = opt->enctype;
enctype 1336 source4/heimdal/lib/krb5/get_cred.c opt->enctype ? KRB5_TC_MATCH_KEYTYPE : 0,
enctype 40 source4/heimdal/lib/krb5/get_in_tkt_with_keytab.c krb5_enctype enctype,
enctype 58 source4/heimdal/lib/krb5/get_in_tkt_with_keytab.c 0, enctype, &entry);
enctype 239 source4/heimdal/lib/krb5/init_creds.c krb5_get_init_creds_opt_set_etype_list(opt, enctype,
enctype 1118 source4/heimdal/lib/krb5/kcm.c krb5_enctype enctype,
enctype 1141 source4/heimdal/lib/krb5/kcm.c ret = krb5_store_int32(request, enctype);
enctype 191 source4/heimdal/lib/krb5/keytab.c krb5_enctype enctype,
enctype 206 source4/heimdal/lib/krb5/keytab.c ret = krb5_kt_get_entry (context, keytab, principal, vno, enctype, &entry);
enctype 306 source4/heimdal/lib/krb5/keytab.c krb5_enctype enctype)
enctype 313 source4/heimdal/lib/krb5/keytab.c if(enctype && enctype != entry->keyblock.keytype)
enctype 330 source4/heimdal/lib/krb5/keytab.c krb5_enctype enctype,
enctype 338 source4/heimdal/lib/krb5/keytab.c return (*id->get)(context, id, principal, kvno, enctype, entry);
enctype 350 source4/heimdal/lib/krb5/keytab.c if (krb5_kt_compare(context, &tmp, principal, 0, enctype)) {
enctype 376 source4/heimdal/lib/krb5/keytab.c krb5_enctype_to_string(context, enctype, &enctype_str);
enctype 104 source4/heimdal/lib/krb5/krb5.h krb5_enctype enctype;
enctype 185 source4/heimdal/lib/krb5/mit_glue.c krb5_enctype enctype,
enctype 192 source4/heimdal/lib/krb5/mit_glue.c ret = krb5_generate_random_keyblock(context, enctype, &key);
enctype 217 source4/heimdal/lib/krb5/mit_glue.c ret = krb5_crypto_init(context, &key, input->enctype, &crypto);
enctype 281 source4/heimdal/lib/krb5/mit_glue.c krb5_crypto_getenctype(context, crypto, &output->enctype);
enctype 290 source4/heimdal/lib/krb5/mit_glue.c krb5_enctype enctype,
enctype 298 source4/heimdal/lib/krb5/mit_glue.c ret = krb5_generate_random_keyblock(context, enctype, &key);
enctype 325 source4/heimdal/lib/krb5/mit_glue.c krb5_enctype enctype,
enctype 328 source4/heimdal/lib/krb5/mit_glue.c return krb5_generate_random_keyblock(context, enctype, random_key);
enctype 333 source4/heimdal/lib/krb5/mit_glue.c krb5_enctype enctype,
enctype 339 source4/heimdal/lib/krb5/mit_glue.c ret = krb5_enctype_keybits(context, enctype, ilen);
enctype 343 source4/heimdal/lib/krb5/mit_glue.c return krb5_enctype_keysize(context, enctype, keylen);