et 87 source4/heimdal/kdc/524.c const EncTicketPart *et,
et 96 source4/heimdal/kdc/524.c et->cname, et->crealm);
et 118 source4/heimdal/kdc/524.c const EncTicketPart *et,
et 121 source4/heimdal/kdc/524.c if(et->endtime < kdc_time){
et 125 source4/heimdal/kdc/524.c if(et->flags.invalid){
et 140 source4/heimdal/kdc/524.c EncTicketPart *et,
et 158 source4/heimdal/kdc/524.c if (et->caddr && !krb5_address_search (context, v4_addr, et->caddr)) {
et 169 source4/heimdal/kdc/524.c if (et->caddr != NULL) {
et 170 source4/heimdal/kdc/524.c free_HostAddresses(et->caddr);
et 172 source4/heimdal/kdc/524.c et->caddr = malloc (sizeof (*et->caddr));
et 173 source4/heimdal/kdc/524.c if (et->caddr == NULL) {
et 179 source4/heimdal/kdc/524.c et->caddr->val = v4_addr;
et 180 source4/heimdal/kdc/524.c et->caddr->len = 1;
et 226 source4/heimdal/kdc/524.c const char *spn, const EncTicketPart et,
et 253 source4/heimdal/kdc/524.c if (!config->enable_v4_cross_realm && strcmp (et.crealm, t->realm) != 0) {
et 254 source4/heimdal/kdc/524.c kdc_log(context, config, 0, "524 cross-realm %s -> %s disabled", et.crealm,
et 261 source4/heimdal/kdc/524.c &et, &t->sname, &len);
et 302 source4/heimdal/kdc/524.c EncTicketPart et;
et 346 source4/heimdal/kdc/524.c &et, &len);
et 354 source4/heimdal/kdc/524.c ret = log_524 (context, config, &et, from, spn);
et 356 source4/heimdal/kdc/524.c free_EncTicketPart(&et);
et 360 source4/heimdal/kdc/524.c ret = verify_flags (context, config, &et, spn);
et 362 source4/heimdal/kdc/524.c free_EncTicketPart(&et);
et 366 source4/heimdal/kdc/524.c ret = set_address (context, config, &et, addr, from);
et 368 source4/heimdal/kdc/524.c free_EncTicketPart(&et);
et 372 source4/heimdal/kdc/524.c ret = encode_524_response(context, config, spn, et, t,
et 374 source4/heimdal/kdc/524.c free_EncTicketPart(&et);
et 645 source4/heimdal/kdc/kerberos4.c void *buf, size_t len, const EncTicketPart *et,
et 658 source4/heimdal/kdc/kerberos4.c et->crealm);
et 670 source4/heimdal/kdc/kerberos4.c et->cname,
et 671 source4/heimdal/kdc/kerberos4.c et->crealm);
et 692 source4/heimdal/kdc/kerberos4.c if(et->caddr){
et 693 source4/heimdal/kdc/kerberos4.c for(i = 0; i < et->caddr->len; i++)
et 694 source4/heimdal/kdc/kerberos4.c if(et->caddr->val[i].addr_type == AF_INET &&
et 695 source4/heimdal/kdc/kerberos4.c et->caddr->val[i].address.length == 4){
et 696 source4/heimdal/kdc/kerberos4.c memcpy(tmp, et->caddr->val[i].address.data, 4);
et 703 source4/heimdal/kdc/kerberos4.c if((et->key.keytype != ETYPE_DES_CBC_MD5 &&
et 704 source4/heimdal/kdc/kerberos4.c et->key.keytype != ETYPE_DES_CBC_MD4 &&
et 705 source4/heimdal/kdc/kerberos4.c et->key.keytype != ETYPE_DES_CBC_CRC) ||
et 706 source4/heimdal/kdc/kerberos4.c et->key.keyvalue.length != 8)
et 708 source4/heimdal/kdc/kerberos4.c krb5_storage_write(sp, et->key.keyvalue.data, 8);
et 711 source4/heimdal/kdc/kerberos4.c time_t start = et->starttime ? *et->starttime : et->authtime;
et 712 source4/heimdal/kdc/kerberos4.c krb5_store_int8(sp, krb_time_to_life(start, et->endtime));
et 260 source4/heimdal/kdc/kerberos5.c KDC_REP *rep, const EncTicketPart *et, EncKDCRepPart *ek,
et 273 source4/heimdal/kdc/kerberos5.c ASN1_MALLOC_ENCODE(EncTicketPart, buf, buf_size, et, &len, ret);
et 979 source4/heimdal/kdc/kerberos5.c EncTicketPart et;
et 1083 source4/heimdal/kdc/kerberos5.c memset(&et, 0, sizeof(et));
et 1136 source4/heimdal/kdc/kerberos5.c et.flags.pre_authent = 1;
et 1276 source4/heimdal/kdc/kerberos5.c et.flags.pre_authent = 1;
et 1295 source4/heimdal/kdc/kerberos5.c if(found_pa && et.flags.pre_authent == 0){
et 1469 source4/heimdal/kdc/kerberos5.c et.flags.initial = 1;
et 1471 source4/heimdal/kdc/kerberos5.c et.flags.forwardable = f.forwardable;
et 1479 source4/heimdal/kdc/kerberos5.c et.flags.proxiable = f.proxiable;
et 1487 source4/heimdal/kdc/kerberos5.c et.flags.may_postdate = f.allow_postdate;
et 1503 source4/heimdal/kdc/kerberos5.c ret = krb5_generate_random_keyblock(context, sessionetype, &et.key);
et 1506 source4/heimdal/kdc/kerberos5.c copy_PrincipalName(&rep.cname, &et.cname);
et 1507 source4/heimdal/kdc/kerberos5.c copy_Realm(&rep.crealm, &et.crealm);
et 1513 source4/heimdal/kdc/kerberos5.c start = et.authtime = kdc_time;
et 1516 source4/heimdal/kdc/kerberos5.c ALLOC(et.starttime);
et 1517 source4/heimdal/kdc/kerberos5.c start = *et.starttime = *req->req_body.from;
et 1518 source4/heimdal/kdc/kerberos5.c et.flags.invalid = 1;
et 1519 source4/heimdal/kdc/kerberos5.c et.flags.postdated = 1; /* XXX ??? */
et 1533 source4/heimdal/kdc/kerberos5.c et.endtime = t;
et 1534 source4/heimdal/kdc/kerberos5.c if(f.renewable_ok && et.endtime < *b->till){
et 1554 source4/heimdal/kdc/kerberos5.c ALLOC(et.renew_till);
et 1555 source4/heimdal/kdc/kerberos5.c *et.renew_till = t;
et 1556 source4/heimdal/kdc/kerberos5.c et.flags.renewable = 1;
et 1561 source4/heimdal/kdc/kerberos5.c et.flags.anonymous = 1;
et 1564 source4/heimdal/kdc/kerberos5.c ALLOC(et.caddr);
et 1565 source4/heimdal/kdc/kerberos5.c copy_HostAddresses(b->addresses, et.caddr);
et 1568 source4/heimdal/kdc/kerberos5.c et.transited.tr_type = DOMAIN_X500_COMPRESS;
et 1569 source4/heimdal/kdc/kerberos5.c krb5_data_zero(&et.transited.contents);
et 1571 source4/heimdal/kdc/kerberos5.c copy_EncryptionKey(&et.key, &ek.key);
et 1618 source4/heimdal/kdc/kerberos5.c ek.flags = et.flags;
et 1619 source4/heimdal/kdc/kerberos5.c ek.authtime = et.authtime;
et 1620 source4/heimdal/kdc/kerberos5.c if (et.starttime) {
et 1622 source4/heimdal/kdc/kerberos5.c *ek.starttime = *et.starttime;
et 1624 source4/heimdal/kdc/kerberos5.c ek.endtime = et.endtime;
et 1625 source4/heimdal/kdc/kerberos5.c if (et.renew_till) {
et 1627 source4/heimdal/kdc/kerberos5.c *ek.renew_till = *et.renew_till;
et 1631 source4/heimdal/kdc/kerberos5.c if(et.caddr){
et 1633 source4/heimdal/kdc/kerberos5.c copy_HostAddresses(et.caddr, ek.caddr);
et 1651 source4/heimdal/kdc/kerberos5.c &et);
et 1680 source4/heimdal/kdc/kerberos5.c ret = krb5_crypto_init(context, &et.key, 0, &crypto);
et 1728 source4/heimdal/kdc/kerberos5.c ret = _krb5_pac_sign(context, p, et.authtime,
et 1740 source4/heimdal/kdc/kerberos5.c ret = _kdc_tkt_add_if_relevant_ad(context, &et,
et 1749 source4/heimdal/kdc/kerberos5.c _kdc_log_timestamp(context, config, "AS-REQ", et.authtime, et.starttime,
et 1750 source4/heimdal/kdc/kerberos5.c et.endtime, et.renew_till);
et 1759 source4/heimdal/kdc/kerberos5.c &et);
et 1764 source4/heimdal/kdc/kerberos5.c &rep, &et, &ek, setype, server->entry.kvno,
et 1767 source4/heimdal/kdc/kerberos5.c free_EncTicketPart(&et);
et 363 source4/heimdal/kdc/krb5tgs.c KDC_REQ_BODY *b, const EncTicketPart *tgt, EncTicketPart *et)
et 379 source4/heimdal/kdc/krb5tgs.c et->flags.invalid = 0;
et 392 source4/heimdal/kdc/krb5tgs.c et->flags.forwardable = 1;
et 400 source4/heimdal/kdc/krb5tgs.c et->flags.forwarded = 1;
et 401 source4/heimdal/kdc/krb5tgs.c et->caddr = b->addresses;
et 404 source4/heimdal/kdc/krb5tgs.c et->flags.forwarded = 1;
et 412 source4/heimdal/kdc/krb5tgs.c et->flags.proxiable = 1;
et 420 source4/heimdal/kdc/krb5tgs.c et->flags.proxy = 1;
et 421 source4/heimdal/kdc/krb5tgs.c et->caddr = b->addresses;
et 424 source4/heimdal/kdc/krb5tgs.c et->flags.proxy = 1;
et 432 source4/heimdal/kdc/krb5tgs.c et->flags.may_postdate = 1;
et 441 source4/heimdal/kdc/krb5tgs.c *et->starttime = *b->from;
et 442 source4/heimdal/kdc/krb5tgs.c et->flags.postdated = 1;
et 443 source4/heimdal/kdc/krb5tgs.c et->flags.invalid = 1;
et 455 source4/heimdal/kdc/krb5tgs.c et->flags.renewable = 1;
et 456 source4/heimdal/kdc/krb5tgs.c ALLOC(et->renew_till);
et 458 source4/heimdal/kdc/krb5tgs.c *et->renew_till = *b->rtime;
et 472 source4/heimdal/kdc/krb5tgs.c et->endtime = *et->starttime + old_life;
et 473 source4/heimdal/kdc/krb5tgs.c if (et->renew_till != NULL)
et 474 source4/heimdal/kdc/krb5tgs.c et->endtime = min(*et->renew_till, et->endtime);
et 526 source4/heimdal/kdc/krb5tgs.c const EncTicketPart *et,
et 529 source4/heimdal/kdc/krb5tgs.c if(et->endtime < kdc_time){
et 533 source4/heimdal/kdc/krb5tgs.c if(et->flags.invalid){
et 549 source4/heimdal/kdc/krb5tgs.c EncTicketPart *et,
et 640 source4/heimdal/kdc/krb5tgs.c et->flags.transited_policy_checked = 1;
et 642 source4/heimdal/kdc/krb5tgs.c et->transited.tr_type = DOMAIN_X500_COMPRESS;
et 643 source4/heimdal/kdc/krb5tgs.c ret = krb5_domain_x500_encode(realms, num_realms, &et->transited.contents);
et 679 source4/heimdal/kdc/krb5tgs.c EncTicketPart et;
et 685 source4/heimdal/kdc/krb5tgs.c memset(&et, 0, sizeof(et));
et 691 source4/heimdal/kdc/krb5tgs.c et.authtime = tgt->authtime;
et 693 source4/heimdal/kdc/krb5tgs.c et.endtime = min(tgt->endtime, *b->till);
et 694 source4/heimdal/kdc/krb5tgs.c ALLOC(et.starttime);
et 695 source4/heimdal/kdc/krb5tgs.c *et.starttime = kdc_time;
et 697 source4/heimdal/kdc/krb5tgs.c ret = check_tgs_flags(context, config, b, tgt, &et);
et 727 source4/heimdal/kdc/krb5tgs.c &tgt->transited, &et,
et 746 source4/heimdal/kdc/krb5tgs.c ek.caddr = et.caddr;
et 747 source4/heimdal/kdc/krb5tgs.c if(et.caddr == NULL)
et 748 source4/heimdal/kdc/krb5tgs.c et.caddr = tgt->caddr;
et 752 source4/heimdal/kdc/krb5tgs.c life = et.endtime - *et.starttime;
et 757 source4/heimdal/kdc/krb5tgs.c et.endtime = *et.starttime + life;
et 760 source4/heimdal/kdc/krb5tgs.c et.renew_till == NULL && et.endtime < *b->till){
et 761 source4/heimdal/kdc/krb5tgs.c et.flags.renewable = 1;
et 762 source4/heimdal/kdc/krb5tgs.c ALLOC(et.renew_till);
et 763 source4/heimdal/kdc/krb5tgs.c *et.renew_till = *b->till;
et 765 source4/heimdal/kdc/krb5tgs.c if(et.renew_till){
et 767 source4/heimdal/kdc/krb5tgs.c renew = *et.renew_till - et.authtime;
et 772 source4/heimdal/kdc/krb5tgs.c *et.renew_till = et.authtime + renew;
et 775 source4/heimdal/kdc/krb5tgs.c if(et.renew_till){
et 776 source4/heimdal/kdc/krb5tgs.c *et.renew_till = min(*et.renew_till, *tgt->renew_till);
et 777 source4/heimdal/kdc/krb5tgs.c *et.starttime = min(*et.starttime, *et.renew_till);
et 778 source4/heimdal/kdc/krb5tgs.c et.endtime = min(et.endtime, *et.renew_till);
et 781 source4/heimdal/kdc/krb5tgs.c *et.starttime = min(*et.starttime, et.endtime);
et 783 source4/heimdal/kdc/krb5tgs.c if(*et.starttime == et.endtime){
et 787 source4/heimdal/kdc/krb5tgs.c if(et.renew_till && et.endtime == *et.renew_till){
et 788 source4/heimdal/kdc/krb5tgs.c free(et.renew_till);
et 789 source4/heimdal/kdc/krb5tgs.c et.renew_till = NULL;
et 790 source4/heimdal/kdc/krb5tgs.c et.flags.renewable = 0;
et 793 source4/heimdal/kdc/krb5tgs.c et.flags.pre_authent = tgt->flags.pre_authent;
et 794 source4/heimdal/kdc/krb5tgs.c et.flags.hw_authent = tgt->flags.hw_authent;
et 795 source4/heimdal/kdc/krb5tgs.c et.flags.anonymous = tgt->flags.anonymous;
et 796 source4/heimdal/kdc/krb5tgs.c et.flags.ok_as_delegate = server->entry.flags.ok_as_delegate;
et 800 source4/heimdal/kdc/krb5tgs.c et.authorization_data = calloc(1, sizeof(*et.authorization_data));
et 801 source4/heimdal/kdc/krb5tgs.c if (et.authorization_data == NULL) {
et 805 source4/heimdal/kdc/krb5tgs.c ret = copy_AuthorizationData(auth_data, et.authorization_data);
et 810 source4/heimdal/kdc/krb5tgs.c ret = find_KRB5SignedPath(context, et.authorization_data, NULL);
et 812 source4/heimdal/kdc/krb5tgs.c if (et.authorization_data->len == 1) {
et 813 source4/heimdal/kdc/krb5tgs.c free_AuthorizationData(et.authorization_data);
et 814 source4/heimdal/kdc/krb5tgs.c free(et.authorization_data);
et 815 source4/heimdal/kdc/krb5tgs.c et.authorization_data = NULL;
et 817 source4/heimdal/kdc/krb5tgs.c AuthorizationData *ad = et.authorization_data;
et 829 source4/heimdal/kdc/krb5tgs.c ret = _kdc_tkt_add_if_relevant_ad(context, &et,
et 836 source4/heimdal/kdc/krb5tgs.c ret = krb5_copy_keyblock_contents(context, sessionkey, &et.key);
et 839 source4/heimdal/kdc/krb5tgs.c et.crealm = tgt->crealm;
et 840 source4/heimdal/kdc/krb5tgs.c et.cname = tgt_name->name;
et 842 source4/heimdal/kdc/krb5tgs.c ek.key = et.key;
et 851 source4/heimdal/kdc/krb5tgs.c ek.flags = et.flags;
et 852 source4/heimdal/kdc/krb5tgs.c ek.authtime = et.authtime;
et 853 source4/heimdal/kdc/krb5tgs.c ek.starttime = et.starttime;
et 854 source4/heimdal/kdc/krb5tgs.c ek.endtime = et.endtime;
et 855 source4/heimdal/kdc/krb5tgs.c ek.renew_till = et.renew_till;
et 859 source4/heimdal/kdc/krb5tgs.c _kdc_log_timestamp(context, config, "TGS-REQ", et.authtime, et.starttime,
et 860 source4/heimdal/kdc/krb5tgs.c et.endtime, et.renew_till);
et 873 source4/heimdal/kdc/krb5tgs.c &et);
et 890 source4/heimdal/kdc/krb5tgs.c if (krb5_enctype_valid(context, et.key.keytype) != 0
et 891 source4/heimdal/kdc/krb5tgs.c && _kdc_is_weak_expection(server->entry.principal, et.key.keytype))
et 893 source4/heimdal/kdc/krb5tgs.c krb5_enctype_enable(context, et.key.keytype);
et 909 source4/heimdal/kdc/krb5tgs.c &rep, &et, &ek, et.key.keytype,
et 913 source4/heimdal/kdc/krb5tgs.c krb5_enctype_disable(context, et.key.keytype);
et 917 source4/heimdal/kdc/krb5tgs.c free_TransitedEncoding(&et.transited);
et 918 source4/heimdal/kdc/krb5tgs.c if(et.starttime)
et 919 source4/heimdal/kdc/krb5tgs.c free(et.starttime);
et 920 source4/heimdal/kdc/krb5tgs.c if(et.renew_till)
et 921 source4/heimdal/kdc/krb5tgs.c free(et.renew_till);
et 922 source4/heimdal/kdc/krb5tgs.c if(et.authorization_data) {
et 923 source4/heimdal/kdc/krb5tgs.c free_AuthorizationData(et.authorization_data);
et 924 source4/heimdal/kdc/krb5tgs.c free(et.authorization_data);
et 927 source4/heimdal/kdc/krb5tgs.c memset(et.key.keyvalue.data, 0, et.key.keyvalue.length);
et 928 source4/heimdal/kdc/krb5tgs.c free_EncryptionKey(&et.key);
et 163 source4/heimdal/lib/com_err/com_err.c struct et_list *et;
et 165 source4/heimdal/lib/com_err/com_err.c for (et = _et_list; et; et = et->next) {
et 166 source4/heimdal/lib/com_err/com_err.c if (et->table->base == new_table->table->base)
et 69 source4/heimdal/lib/com_err/error.c struct error_table et;
et 78 source4/heimdal/lib/com_err/error.c struct et_list *et, **end;
et 80 source4/heimdal/lib/com_err/error.c for (end = list, et = *list; et; end = &et->next, et = et->next)
et 81 source4/heimdal/lib/com_err/error.c if (et->table->msgs == messages)
et 86 source4/heimdal/lib/com_err/error.c et = &f->etl;
et 87 source4/heimdal/lib/com_err/error.c et->table = &f->et;
et 88 source4/heimdal/lib/com_err/error.c et->table->msgs = messages;
et 89 source4/heimdal/lib/com_err/error.c et->table->n_msgs = num_errors;
et 90 source4/heimdal/lib/com_err/error.c et->table->base = base;
et 91 source4/heimdal/lib/com_err/error.c et->next = NULL;
et 92 source4/heimdal/lib/com_err/error.c *end = et;
et 97 source4/heimdal/lib/com_err/error.c free_error_table(struct et_list *et)
et 99 source4/heimdal/lib/com_err/error.c while(et){
et 100 source4/heimdal/lib/com_err/error.c struct et_list *p = et;
et 101 source4/heimdal/lib/com_err/error.c et = et->next;
et 68 source4/heimdal/lib/com_err/parse.y header : id et
et 69 source4/heimdal/lib/com_err/parse.y | et
et 78 source4/heimdal/lib/com_err/parse.y et : ET STRING
et 66 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et;
et 72 source4/heimdal/lib/krb5/crypto.c #define CRYPTO_ETYPE(C) ((C)->et->type)
et 153 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et,
et 651 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et;
et 663 source4/heimdal/lib/krb5/crypto.c et = _find_enctype(enctype);
et 664 source4/heimdal/lib/krb5/crypto.c if (et == NULL)
et 674 source4/heimdal/lib/krb5/crypto.c ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size);
et 683 source4/heimdal/lib/krb5/crypto.c et->keytype->size, kd.key->keyvalue.data);
et 685 source4/heimdal/lib/krb5/crypto.c free_key_data(context, &kd, et);
et 691 source4/heimdal/lib/krb5/crypto.c ret = derive_key(context, et, &kd, "kerberos", strlen("kerberos"));
et 694 source4/heimdal/lib/krb5/crypto.c free_key_data(context, &kd, et);
et 1046 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et =_find_enctype(enctype);
et 1048 source4/heimdal/lib/krb5/crypto.c if(et == NULL) {
et 1054 source4/heimdal/lib/krb5/crypto.c for(st = et->keytype->string_to_key; st && st->type; st++)
et 1103 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = _find_enctype(type);
et 1104 source4/heimdal/lib/krb5/crypto.c if(et == NULL) {
et 1110 source4/heimdal/lib/krb5/crypto.c *keysize = et->keytype->size;
et 1119 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = _find_enctype(type);
et 1120 source4/heimdal/lib/krb5/crypto.c if(et == NULL) {
et 1126 source4/heimdal/lib/krb5/crypto.c *keybits = et->keytype->bits;
et 1136 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = _find_enctype(type);
et 1137 source4/heimdal/lib/krb5/crypto.c if(et == NULL) {
et 1143 source4/heimdal/lib/krb5/crypto.c ret = krb5_data_alloc(&key->keyvalue, et->keytype->size);
et 1147 source4/heimdal/lib/krb5/crypto.c if(et->keytype->random_key)
et 1148 source4/heimdal/lib/krb5/crypto.c (*et->keytype->random_key)(context, key);
et 1160 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = _find_enctype(key->key->keytype);
et 1161 source4/heimdal/lib/krb5/crypto.c struct key_type *kt = et->keytype;
et 1796 source4/heimdal/lib/krb5/crypto.c ct = crypto->et->keyed_checksum;
et 1798 source4/heimdal/lib/krb5/crypto.c ct = crypto->et->checksum;
et 1918 source4/heimdal/lib/krb5/crypto.c ct = crypto->et->keyed_checksum;
et 1920 source4/heimdal/lib/krb5/crypto.c ct = crypto->et->checksum;
et 2317 source4/heimdal/lib/krb5/crypto.c struct checksum_type *ct = crypto->et->checksum;
et 2335 source4/heimdal/lib/krb5/crypto.c if (result.checksum.length < crypto->et->blocksize)
et 2340 source4/heimdal/lib/krb5/crypto.c crypto->et->type, "prf", 3, &derived);
et 2344 source4/heimdal/lib/krb5/crypto.c ret = krb5_data_alloc(out, crypto->et->blocksize);
et 2349 source4/heimdal/lib/krb5/crypto.c const EVP_CIPHER *c = (*crypto->et->keytype->evp)();
et 2755 source4/heimdal/lib/krb5/crypto.c return (crypto->et->flags & F_DERIVED) != 0;
et 2762 source4/heimdal/lib/krb5/crypto.c return (crypto->et->flags & F_SPECIAL) != 0;
et 2782 source4/heimdal/lib/krb5/crypto.c const struct encryption_type *et = crypto->et;
et 2784 source4/heimdal/lib/krb5/crypto.c checksum_sz = CHECKSUMSIZE(et->keyed_checksum);
et 2786 source4/heimdal/lib/krb5/crypto.c sz = et->confoundersize + len;
et 2787 source4/heimdal/lib/krb5/crypto.c block_sz = (sz + et->padsize - 1) &~ (et->padsize - 1); /* pad */
et 2796 source4/heimdal/lib/krb5/crypto.c krb5_generate_random_block(q, et->confoundersize); /* XXX */
et 2797 source4/heimdal/lib/krb5/crypto.c q += et->confoundersize;
et 2801 source4/heimdal/lib/krb5/crypto.c et->keyed_checksum,
et 2822 source4/heimdal/lib/krb5/crypto.c ret = (*et->encrypt)(context, dkey, p, block_sz, 1, usage, ivec);
et 2847 source4/heimdal/lib/krb5/crypto.c const struct encryption_type *et = crypto->et;
et 2849 source4/heimdal/lib/krb5/crypto.c checksum_sz = CHECKSUMSIZE(et->checksum);
et 2851 source4/heimdal/lib/krb5/crypto.c sz = et->confoundersize + checksum_sz + len;
et 2852 source4/heimdal/lib/krb5/crypto.c block_sz = (sz + et->padsize - 1) &~ (et->padsize - 1); /* pad */
et 2860 source4/heimdal/lib/krb5/crypto.c krb5_generate_random_block(q, et->confoundersize); /* XXX */
et 2861 source4/heimdal/lib/krb5/crypto.c q += et->confoundersize;
et 2867 source4/heimdal/lib/krb5/crypto.c et->checksum,
et 2880 source4/heimdal/lib/krb5/crypto.c memcpy(p + et->confoundersize, cksum.checksum.data, cksum.checksum.length);
et 2885 source4/heimdal/lib/krb5/crypto.c ret = (*et->encrypt)(context, &crypto->key, p, block_sz, 1, 0, ivec);
et 2909 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = crypto->et;
et 2910 source4/heimdal/lib/krb5/crypto.c size_t cksum_sz = CHECKSUMSIZE(et->checksum);
et 2911 source4/heimdal/lib/krb5/crypto.c size_t sz = len + cksum_sz + et->confoundersize;
et 2923 source4/heimdal/lib/krb5/crypto.c krb5_generate_random_block(p, et->confoundersize);
et 2924 source4/heimdal/lib/krb5/crypto.c p += et->confoundersize;
et 2926 source4/heimdal/lib/krb5/crypto.c ret = (*et->encrypt)(context, &crypto->key, tmp, sz, TRUE, usage, ivec);
et 2951 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = crypto->et;
et 2954 source4/heimdal/lib/krb5/crypto.c checksum_sz = CHECKSUMSIZE(et->keyed_checksum);
et 2955 source4/heimdal/lib/krb5/crypto.c if (len < checksum_sz + et->confoundersize) {
et 2962 source4/heimdal/lib/krb5/crypto.c if (((len - checksum_sz) % et->padsize) != 0) {
et 2986 source4/heimdal/lib/krb5/crypto.c ret = (*et->encrypt)(context, dkey, p, len, 0, usage, ivec);
et 2994 source4/heimdal/lib/krb5/crypto.c cksum.cksumtype = CHECKSUMTYPE(et->keyed_checksum);
et 3006 source4/heimdal/lib/krb5/crypto.c l = len - et->confoundersize;
et 3007 source4/heimdal/lib/krb5/crypto.c memmove(p, p + et->confoundersize, l);
et 3030 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = crypto->et;
et 3032 source4/heimdal/lib/krb5/crypto.c if ((len % et->padsize) != 0) {
et 3037 source4/heimdal/lib/krb5/crypto.c checksum_sz = CHECKSUMSIZE(et->checksum);
et 3050 source4/heimdal/lib/krb5/crypto.c ret = (*et->encrypt)(context, &crypto->key, p, len, 0, 0, ivec);
et 3055 source4/heimdal/lib/krb5/crypto.c ret = krb5_data_copy(&cksum.checksum, p + et->confoundersize, checksum_sz);
et 3060 source4/heimdal/lib/krb5/crypto.c memset(p + et->confoundersize, 0, checksum_sz);
et 3061 source4/heimdal/lib/krb5/crypto.c cksum.cksumtype = CHECKSUMTYPE(et->checksum);
et 3068 source4/heimdal/lib/krb5/crypto.c l = len - et->confoundersize - checksum_sz;
et 3069 source4/heimdal/lib/krb5/crypto.c memmove(p, p + et->confoundersize + checksum_sz, l);
et 3089 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = crypto->et;
et 3090 source4/heimdal/lib/krb5/crypto.c size_t cksum_sz = CHECKSUMSIZE(et->checksum);
et 3091 source4/heimdal/lib/krb5/crypto.c size_t sz = len - cksum_sz - et->confoundersize;
et 3095 source4/heimdal/lib/krb5/crypto.c if ((len % et->padsize) != 0) {
et 3107 source4/heimdal/lib/krb5/crypto.c ret = (*et->encrypt)(context, &crypto->key, p, len, FALSE, usage, ivec);
et 3113 source4/heimdal/lib/krb5/crypto.c memmove (p, p + cksum_sz + et->confoundersize, sz);
et 3172 source4/heimdal/lib/krb5/crypto.c const struct encryption_type *et = crypto->et;
et 3180 source4/heimdal/lib/krb5/crypto.c headersz = et->confoundersize;
et 3181 source4/heimdal/lib/krb5/crypto.c trailersz = CHECKSUMSIZE(et->keyed_checksum);
et 3191 source4/heimdal/lib/krb5/crypto.c block_sz = (sz + et->padsize - 1) &~ (et->padsize - 1); /* pad */
et 3251 source4/heimdal/lib/krb5/crypto.c et->keyed_checksum,
et 3314 source4/heimdal/lib/krb5/crypto.c ret = (*et->encrypt)(context, dkey, p, len, 1, usage, ivec);
et 3372 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = crypto->et;
et 3380 source4/heimdal/lib/krb5/crypto.c headersz = et->confoundersize;
et 3381 source4/heimdal/lib/krb5/crypto.c trailersz = CHECKSUMSIZE(et->keyed_checksum);
et 3388 source4/heimdal/lib/krb5/crypto.c block_sz = (sz + et->padsize - 1) &~ (et->padsize - 1); /* pad */
et 3442 source4/heimdal/lib/krb5/crypto.c ret = (*et->encrypt)(context, dkey, p, len, 0, usage, ivec);
et 3489 source4/heimdal/lib/krb5/crypto.c cksum.cksumtype = CHECKSUMTYPE(et->keyed_checksum);
et 3591 source4/heimdal/lib/krb5/crypto.c return crypto->et->blocksize;
et 3593 source4/heimdal/lib/krb5/crypto.c if (crypto->et->padsize > 1)
et 3594 source4/heimdal/lib/krb5/crypto.c return crypto->et->padsize;
et 3597 source4/heimdal/lib/krb5/crypto.c return CHECKSUMSIZE(crypto->et->keyed_checksum);
et 3599 source4/heimdal/lib/krb5/crypto.c if (crypto->et->keyed_checksum)
et 3600 source4/heimdal/lib/krb5/crypto.c return CHECKSUMSIZE(crypto->et->keyed_checksum);
et 3601 source4/heimdal/lib/krb5/crypto.c return CHECKSUMSIZE(crypto->et->checksum);
et 3782 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et,
et 3790 source4/heimdal/lib/krb5/crypto.c struct key_type *kt = et->keytype;
et 3795 source4/heimdal/lib/krb5/crypto.c if(et->blocksize * 8 < kt->bits || len != et->blocksize) {
et 3796 source4/heimdal/lib/krb5/crypto.c nblocks = (kt->bits + et->blocksize * 8 - 1) / (et->blocksize * 8);
et 3797 source4/heimdal/lib/krb5/crypto.c k = malloc(nblocks * et->blocksize);
et 3802 source4/heimdal/lib/krb5/crypto.c ret = _krb5_n_fold(constant, len, k, et->blocksize);
et 3810 source4/heimdal/lib/krb5/crypto.c memcpy(k + i * et->blocksize,
et 3811 source4/heimdal/lib/krb5/crypto.c k + (i - 1) * et->blocksize,
et 3812 source4/heimdal/lib/krb5/crypto.c et->blocksize);
et 3813 source4/heimdal/lib/krb5/crypto.c (*et->encrypt)(context, key, k + i * et->blocksize, et->blocksize,
et 3826 source4/heimdal/lib/krb5/crypto.c (*et->encrypt)(context, key, c, len, 1, 0, NULL);
et 3845 source4/heimdal/lib/krb5/crypto.c DES3_postproc(context, k, nblocks * et->blocksize, key);
et 3862 source4/heimdal/lib/krb5/crypto.c memset(k, 0, nblocks * et->blocksize);
et 3890 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et;
et 3895 source4/heimdal/lib/krb5/crypto.c et = _find_enctype (etype);
et 3896 source4/heimdal/lib/krb5/crypto.c if (et == NULL) {
et 3908 source4/heimdal/lib/krb5/crypto.c ret = derive_key(context, et, &d, constant, constant_len);
et 3911 source4/heimdal/lib/krb5/crypto.c free_key_data(context, &d, et);
et 3937 source4/heimdal/lib/krb5/crypto.c derive_key(context, crypto->et, d, constant, sizeof(constant));
et 3957 source4/heimdal/lib/krb5/crypto.c (*crypto)->et = _find_enctype(etype);
et 3958 source4/heimdal/lib/krb5/crypto.c if((*crypto)->et == NULL || ((*crypto)->et->flags & F_DISABLED)) {
et 3966 source4/heimdal/lib/krb5/crypto.c if((*crypto)->et->keytype->size != key->keyvalue.length) {
et 3987 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et)
et 3991 source4/heimdal/lib/krb5/crypto.c if (et->keytype->cleanup)
et 3992 source4/heimdal/lib/krb5/crypto.c (*et->keytype->cleanup)(context, key);
et 4000 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et)
et 4002 source4/heimdal/lib/krb5/crypto.c free_key_data(context, &ku->key, et);
et 4012 source4/heimdal/lib/krb5/crypto.c free_key_usage(context, &crypto->key_usage[i], crypto->et);
et 4014 source4/heimdal/lib/krb5/crypto.c free_key_data(context, &crypto->key, crypto->et);
et 4024 source4/heimdal/lib/krb5/crypto.c *blocksize = crypto->et->blocksize;
et 4033 source4/heimdal/lib/krb5/crypto.c *enctype = crypto->et->type;
et 4042 source4/heimdal/lib/krb5/crypto.c *padsize = crypto->et->padsize;
et 4051 source4/heimdal/lib/krb5/crypto.c *confoundersize = crypto->et->confoundersize;
et 4071 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = _find_enctype(enctype);
et 4072 source4/heimdal/lib/krb5/crypto.c if(et == NULL) {
et 4079 source4/heimdal/lib/krb5/crypto.c et->flags |= F_DISABLED;
et 4098 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = _find_enctype(enctype);
et 4099 source4/heimdal/lib/krb5/crypto.c if(et == NULL) {
et 4106 source4/heimdal/lib/krb5/crypto.c et->flags &= ~F_DISABLED;
et 4118 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = _find_enctype(etype);
et 4124 source4/heimdal/lib/krb5/crypto.c if(et == NULL) {
et 4130 source4/heimdal/lib/krb5/crypto.c keylen = et->keytype->bits / 8;
et 4138 source4/heimdal/lib/krb5/crypto.c ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size);
et 4161 source4/heimdal/lib/krb5/crypto.c et,
et 4166 source4/heimdal/lib/krb5/crypto.c free_key_data(context, &kd, et);
et 4170 source4/heimdal/lib/krb5/crypto.c free_key_data(context, &kd, et);
et 4179 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = crypto->et;
et 4180 source4/heimdal/lib/krb5/crypto.c size_t padsize = et->padsize;
et 4181 source4/heimdal/lib/krb5/crypto.c size_t checksumsize = CHECKSUMSIZE(et->checksum);
et 4184 source4/heimdal/lib/krb5/crypto.c res = et->confoundersize + checksumsize + data_len;
et 4194 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = crypto->et;
et 4195 source4/heimdal/lib/krb5/crypto.c size_t padsize = et->padsize;
et 4198 source4/heimdal/lib/krb5/crypto.c res = et->confoundersize + data_len;
et 4200 source4/heimdal/lib/krb5/crypto.c if (et->keyed_checksum)
et 4201 source4/heimdal/lib/krb5/crypto.c res += et->keyed_checksum->checksumsize;
et 4203 source4/heimdal/lib/krb5/crypto.c res += et->checksum->checksumsize;
et 4230 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = crypto->et;
et 4233 source4/heimdal/lib/krb5/crypto.c res = CHECKSUMSIZE(et->checksum);
et 4234 source4/heimdal/lib/krb5/crypto.c res += et->confoundersize;
et 4235 source4/heimdal/lib/krb5/crypto.c if (et->padsize > 1)
et 4236 source4/heimdal/lib/krb5/crypto.c res += et->padsize;
et 4244 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = crypto->et;
et 4247 source4/heimdal/lib/krb5/crypto.c if (et->keyed_checksum)
et 4248 source4/heimdal/lib/krb5/crypto.c res = CHECKSUMSIZE(et->keyed_checksum);
et 4250 source4/heimdal/lib/krb5/crypto.c res = CHECKSUMSIZE(et->checksum);
et 4251 source4/heimdal/lib/krb5/crypto.c res += et->confoundersize;
et 4252 source4/heimdal/lib/krb5/crypto.c if (et->padsize > 1)
et 4253 source4/heimdal/lib/krb5/crypto.c res += et->padsize;
et 4274 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = _find_enctype(type);
et 4275 source4/heimdal/lib/krb5/crypto.c if(et == NULL) {
et 4281 source4/heimdal/lib/krb5/crypto.c if ((et->keytype->bits + 7) / 8 > size) {
et 4286 source4/heimdal/lib/krb5/crypto.c et->name, (int)et->keytype->size);
et 4289 source4/heimdal/lib/krb5/crypto.c ret = krb5_data_alloc(&key->keyvalue, et->keytype->size);
et 4293 source4/heimdal/lib/krb5/crypto.c if (et->keytype->random_to_key)
et 4294 source4/heimdal/lib/krb5/crypto.c (*et->keytype->random_to_key)(context, key, data, size);
et 4296 source4/heimdal/lib/krb5/crypto.c memcpy(key->keyvalue.data, data, et->keytype->size);
et 4310 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = _find_enctype(type);
et 4317 source4/heimdal/lib/krb5/crypto.c if(et == NULL) {
et 4323 source4/heimdal/lib/krb5/crypto.c keylen = (et->keytype->bits + 7) / 8;
et 4460 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et;
et 4483 source4/heimdal/lib/krb5/crypto.c et = _find_enctype(enctype);
et 4484 source4/heimdal/lib/krb5/crypto.c if(et == NULL) {
et 4490 source4/heimdal/lib/krb5/crypto.c keylen = (et->keytype->bits + 7) / 8;
et 4542 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = _find_enctype(type);
et 4544 source4/heimdal/lib/krb5/crypto.c if(et == NULL || et->prf_length == 0) {
et 4551 source4/heimdal/lib/krb5/crypto.c *length = et->prf_length;
et 4561 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = crypto->et;
et 4565 source4/heimdal/lib/krb5/crypto.c if(et->prf == NULL) {
et 4568 source4/heimdal/lib/krb5/crypto.c et->name);
et 4572 source4/heimdal/lib/krb5/crypto.c return (*et->prf)(context, crypto, input, output);