etype 1660 source3/include/proto.h ADS_STATUS ads_build_error(enum ads_error_type etype,
etype 1662 source3/include/proto.h ADS_STATUS ads_build_nt_error(enum ads_error_type etype,
etype 28 source3/libads/ads_status.c ADS_STATUS ads_build_error(enum ads_error_type etype,
etype 33 source3/libads/ads_status.c if (etype == ENUM_ADS_ERROR_NT) {
etype 42 source3/libads/ads_status.c ret.error_type = etype;
etype 47 source3/libads/ads_status.c ADS_STATUS ads_build_nt_error(enum ads_error_type etype,
etype 52 source3/libads/ads_status.c if (etype != ENUM_ADS_ERROR_NT) {
etype 60 source3/libads/ads_status.c ret.error_type = etype;
etype 1053 source3/libsmb/clikrb5.c return ap_req->ticket.enc_part.etype;
etype 246 source4/heimdal/kdc/524.c ticket->etype = 0;
etype 322 source4/heimdal/kdc/524.c ret = hdb_enctype2key(context, &server->entry, t->enc_part.etype, &skey);
etype 93 source4/heimdal/kdc/kerberos5.c _kdc_is_weak_expection(krb5_principal principal, krb5_enctype etype)
etype 97 source4/heimdal/kdc/kerberos5.c (etype == ETYPE_DES_CBC_CRC
etype 98 source4/heimdal/kdc/kerberos5.c || etype == ETYPE_DES_CBC_MD4
etype 99 source4/heimdal/kdc/kerberos5.c || etype == ETYPE_DES_CBC_MD5))
etype 261 source4/heimdal/kdc/kerberos5.c krb5_enctype etype,
etype 286 source4/heimdal/kdc/kerberos5.c ret = krb5_crypto_init(context, skey, etype, &crypto);
etype 402 source4/heimdal/kdc/kerberos5.c for(i = 0; i < req->req_body.etype.len; i++) {
etype 403 source4/heimdal/kdc/kerberos5.c if (!older_enctype(req->req_body.etype.val[i]))
etype 416 source4/heimdal/kdc/kerberos5.c ent->etype = key->key.keytype;
etype 485 source4/heimdal/kdc/kerberos5.c if (pa.val[j].etype == client->keys.val[i].key.keytype)
etype 556 source4/heimdal/kdc/kerberos5.c ent->etype = key->key.keytype;
etype 646 source4/heimdal/kdc/kerberos5.c if (pa.val[j].etype == client->keys.val[i].key.keytype)
etype 719 source4/heimdal/kdc/kerberos5.c for (i = 0; i < b->etype.len; i++) {
etype 720 source4/heimdal/kdc/kerberos5.c ret = krb5_enctype_to_string(context, b->etype.val[i], &str);
etype 725 source4/heimdal/kdc/kerberos5.c p = rk_strpoolprintf(p, "%d", b->etype.val[i]);
etype 726 source4/heimdal/kdc/kerberos5.c if (p && i + 1 < b->etype.len)
etype 1173 source4/heimdal/kdc/kerberos5.c enc_data.etype, &pa_key);
etype 1178 source4/heimdal/kdc/kerberos5.c if(krb5_enctype_to_string(context, enc_data.etype, &estr))
etype 1183 source4/heimdal/kdc/kerberos5.c enc_data.etype, client_name);
etype 1224 source4/heimdal/kdc/kerberos5.c enc_data.etype, &pa_key) == 0)
etype 1344 source4/heimdal/kdc/kerberos5.c b->etype.val, b->etype.len);
etype 1347 source4/heimdal/kdc/kerberos5.c &client->entry, b->etype.val, b->etype.len);
etype 1372 source4/heimdal/kdc/kerberos5.c ret = _kdc_find_etype(context, client, b->etype.val, b->etype.len,
etype 1414 source4/heimdal/kdc/kerberos5.c for (j = 0; j < b->etype.len && sessionetype == ETYPE_NULL; j++) {
etype 1417 source4/heimdal/kdc/kerberos5.c if (p[i] != b->etype.val[j])
etype 154 source4/heimdal/kdc/krb5tgs.c sp.etype = enctype;
etype 231 source4/heimdal/kdc/krb5tgs.c ret = hdb_enctype2key(context, &krbtgt->entry, sp.etype, &key);
etype 1132 source4/heimdal/kdc/krb5tgs.c *krbtgt_etype = ap_req.ticket.enc_part.etype;
etype 1135 source4/heimdal/kdc/krb5tgs.c ap_req.ticket.enc_part.etype, &tkey);
etype 1139 source4/heimdal/kdc/krb5tgs.c krb5_enctype_to_string(context, ap_req.ticket.enc_part.etype, &str);
etype 1434 source4/heimdal/kdc/krb5tgs.c t->enc_part.etype, &uukey);
etype 1571 source4/heimdal/kdc/krb5tgs.c krb5_enctype etype;
etype 1576 source4/heimdal/kdc/krb5tgs.c for(i = 0; i < b->etype.len; i++)
etype 1577 source4/heimdal/kdc/krb5tgs.c if (b->etype.val[i] == adtkt.key.keytype)
etype 1579 source4/heimdal/kdc/krb5tgs.c if(i == b->etype.len) {
etype 1585 source4/heimdal/kdc/krb5tgs.c etype = b->etype.val[i];
etype 1590 source4/heimdal/kdc/krb5tgs.c ret = _kdc_find_etype(context, server, b->etype.val, b->etype.len,
etype 1591 source4/heimdal/kdc/krb5tgs.c &skey, &etype);
etype 1601 source4/heimdal/kdc/krb5tgs.c ret = krb5_generate_random_keyblock(context, etype, &sessionkey);
etype 1792 source4/heimdal/kdc/krb5tgs.c t->enc_part.etype, &clientkey);
etype 978 source4/heimdal/kdc/pkinit.c if (req->req_body.etype.len > 0) {
etype 979 source4/heimdal/kdc/pkinit.c for (i = 0; i < req->req_body.etype.len; i++)
etype 980 source4/heimdal/kdc/pkinit.c if (krb5_enctype_valid(context, req->req_body.etype.val[i]) == 0)
etype 982 source4/heimdal/kdc/pkinit.c if (req->req_body.etype.len <= i) {
etype 988 source4/heimdal/kdc/pkinit.c enctype = req->req_body.etype.val[i];
etype 63 source4/heimdal/lib/hdb/mkey.c int kvno, krb5_keyblock *key, krb5_enctype etype,
etype 80 source4/heimdal/lib/hdb/mkey.c if(etype != 0)
etype 81 source4/heimdal/lib/hdb/mkey.c (*mkey)->keytab.keyblock.keytype = etype;
etype 83 source4/heimdal/lib/hdb/mkey.c ret = krb5_crypto_init(context, key, etype, &(*mkey)->crypto);
etype 391 source4/heimdal/lib/krb5/auth_context.c krb5_enctype etype)
etype 398 source4/heimdal/lib/krb5/auth_context.c auth_context->keyblock->keytype = etype;
etype 405 source4/heimdal/lib/krb5/auth_context.c krb5_enctype *etype)
etype 65 source4/heimdal/lib/krb5/build_ap_req.c ap.authenticator.etype = enctype;
etype 696 source4/heimdal/lib/krb5/context.c default_etypes(krb5_context context, krb5_enctype **etype)
etype 718 source4/heimdal/lib/krb5/context.c *etype = e;
etype 894 source4/heimdal/lib/krb5/crypto.c krb5_enctype etype,
etype 901 source4/heimdal/lib/krb5/crypto.c e = _find_enctype (etype);
etype 905 source4/heimdal/lib/krb5/crypto.c etype);
etype 926 source4/heimdal/lib/krb5/crypto.c krb5_enctype etype,
etype 933 source4/heimdal/lib/krb5/crypto.c e = _find_enctype (etype);
etype 937 source4/heimdal/lib/krb5/crypto.c etype);
etype 2608 source4/heimdal/lib/krb5/crypto.c krb5_enctype etype,
etype 2612 source4/heimdal/lib/krb5/crypto.c e = _find_enctype(etype);
etype 2616 source4/heimdal/lib/krb5/crypto.c etype);
etype 2631 source4/heimdal/lib/krb5/crypto.c krb5_enctype *etype)
etype 2636 source4/heimdal/lib/krb5/crypto.c *etype = etypes[i]->type;
etype 2647 source4/heimdal/lib/krb5/crypto.c krb5_enctype etype,
etype 2650 source4/heimdal/lib/krb5/crypto.c struct encryption_type *e = _find_enctype(etype);
etype 2654 source4/heimdal/lib/krb5/crypto.c etype);
etype 2663 source4/heimdal/lib/krb5/crypto.c krb5_enctype etype)
etype 2665 source4/heimdal/lib/krb5/crypto.c struct encryption_type *e = _find_enctype(etype);
etype 2669 source4/heimdal/lib/krb5/crypto.c etype);
etype 2697 source4/heimdal/lib/krb5/crypto.c krb5_enctype *etype)
etype 2701 source4/heimdal/lib/krb5/crypto.c *etype = ETYPE_NULL;
etype 2707 source4/heimdal/lib/krb5/crypto.c *etype = etypes[i]->type;
etype 3645 source4/heimdal/lib/krb5/crypto.c result->etype = CRYPTO_ETYPE(crypto);
etype 3884 source4/heimdal/lib/krb5/crypto.c krb5_enctype etype,
etype 3895 source4/heimdal/lib/krb5/crypto.c et = _find_enctype (etype);
etype 3899 source4/heimdal/lib/krb5/crypto.c etype);
etype 3946 source4/heimdal/lib/krb5/crypto.c krb5_enctype etype,
etype 3955 source4/heimdal/lib/krb5/crypto.c if(etype == ETYPE_NULL)
etype 3956 source4/heimdal/lib/krb5/crypto.c etype = key->keytype;
etype 3957 source4/heimdal/lib/krb5/crypto.c (*crypto)->et = _find_enctype(etype);
etype 3963 source4/heimdal/lib/krb5/crypto.c etype);
etype 4115 source4/heimdal/lib/krb5/crypto.c krb5_enctype etype,
etype 4118 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = _find_enctype(etype);
etype 4127 source4/heimdal/lib/krb5/crypto.c etype);
etype 4143 source4/heimdal/lib/krb5/crypto.c kd.key->keytype = etype;
etype 49 source4/heimdal/lib/krb5/generate_subkey.c krb5_enctype etype,
etype 60 source4/heimdal/lib/krb5/generate_subkey.c if (etype == ETYPE_NULL)
etype 61 source4/heimdal/lib/krb5/generate_subkey.c etype = key->keytype; /* use session key etype */
etype 64 source4/heimdal/lib/krb5/generate_subkey.c ret = krb5_generate_random_keyblock(context, etype, *subkey);
etype 154 source4/heimdal/lib/krb5/get_cred.c ALLOC_SEQ(&t->req_body.etype, 1);
etype 155 source4/heimdal/lib/krb5/get_cred.c if(t->req_body.etype.val == NULL) {
etype 161 source4/heimdal/lib/krb5/get_cred.c t->req_body.etype.val[0] = in_creds->session.keytype;
etype 164 source4/heimdal/lib/krb5/get_cred.c &t->req_body.etype.len,
etype 165 source4/heimdal/lib/krb5/get_cred.c &t->req_body.etype.val,
etype 413 source4/heimdal/lib/krb5/get_for_creds.c cred.enc_part.etype = ENCTYPE_NULL;
etype 560 source4/heimdal/lib/krb5/get_in_tkt.c krb5_enctype etype, krb5_keyblock *key)
etype 729 source4/heimdal/lib/krb5/get_in_tkt.c &a->req_body.etype.len,
etype 730 source4/heimdal/lib/krb5/get_in_tkt.c &a->req_body.etype.val,
etype 794 source4/heimdal/lib/krb5/get_in_tkt.c &preauth->val[i].info.val[j].etype, 1,
etype 817 source4/heimdal/lib/krb5/get_in_tkt.c key_proc, keyseed, a->req_body.etype.val,
etype 818 source4/heimdal/lib/krb5/get_in_tkt.c a->req_body.etype.len, NULL);
etype 824 source4/heimdal/lib/krb5/get_in_tkt.c key_proc, keyseed, a->req_body.etype.val,
etype 825 source4/heimdal/lib/krb5/get_in_tkt.c a->req_body.etype.len, &salt);
etype 905 source4/heimdal/lib/krb5/get_in_tkt.c krb5_enctype etype;
etype 987 source4/heimdal/lib/krb5/get_in_tkt.c etype = rep.kdc_rep.enc_part.etype;
etype 1003 source4/heimdal/lib/krb5/get_in_tkt.c ret = (*key_proc)(context, etype, salt, keyseed, &key);
etype 1010 source4/heimdal/lib/krb5/get_in_tkt.c ret = (*key_proc)(context, etype, salt, keyseed, &key);
etype 606 source4/heimdal/lib/krb5/init_creds_pw.c &a->req_body.etype.len,
etype 607 source4/heimdal/lib/krb5/init_creds_pw.c &a->req_body.etype.val,
etype 652 source4/heimdal/lib/krb5/init_creds_pw.c krb5_enctype etype;
etype 668 source4/heimdal/lib/krb5/init_creds_pw.c krb5_enctype etype,
etype 672 source4/heimdal/lib/krb5/init_creds_pw.c paid->etype = etype;
etype 715 source4/heimdal/lib/krb5/init_creds_pw.c for (j = 0; j < asreq->req_body.etype.len; j++) {
etype 717 source4/heimdal/lib/krb5/init_creds_pw.c if (asreq->req_body.etype.val[j] == e.val[i].etype) {
etype 727 source4/heimdal/lib/krb5/init_creds_pw.c ret = set_paid(paid, context, e.val[i].etype,
etype 764 source4/heimdal/lib/krb5/init_creds_pw.c for (j = 0; j < asreq->req_body.etype.len; j++) {
etype 766 source4/heimdal/lib/krb5/init_creds_pw.c if (asreq->req_body.etype.val[j] == e.val[i].etype) {
etype 778 source4/heimdal/lib/krb5/init_creds_pw.c ret = set_paid(paid, context, e.val[i].etype,
etype 806 source4/heimdal/lib/krb5/init_creds_pw.c if (paid->etype == ENCTYPE_NULL)
etype 809 source4/heimdal/lib/krb5/init_creds_pw.c paid->etype,
etype 871 source4/heimdal/lib/krb5/init_creds_pw.c krb5_enctype etype, krb5_keyblock *key)
etype 982 source4/heimdal/lib/krb5/init_creds_pw.c &ppaid->etype, 1,
etype 990 source4/heimdal/lib/krb5/init_creds_pw.c a->req_body.etype.val, a->req_body.etype.len,
etype 998 source4/heimdal/lib/krb5/init_creds_pw.c a->req_body.etype.val, a->req_body.etype.len,
etype 1010 source4/heimdal/lib/krb5/init_creds_pw.c krb5_enctype etype,
etype 1015 source4/heimdal/lib/krb5/init_creds_pw.c ret = (*ctx->key_proc)(context, etype, ctx->password,
etype 1117 source4/heimdal/lib/krb5/init_creds_pw.c paid.etype = ENCTYPE_NULL;
etype 1146 source4/heimdal/lib/krb5/init_creds_pw.c krb5_enctype etype;
etype 1151 source4/heimdal/lib/krb5/init_creds_pw.c etype = rep->kdc_rep.enc_part.etype;
etype 1154 source4/heimdal/lib/krb5/init_creds_pw.c paid.etype = etype;
etype 1162 source4/heimdal/lib/krb5/init_creds_pw.c paid.etype = etype;
etype 1186 source4/heimdal/lib/krb5/init_creds_pw.c etype,
etype 1198 source4/heimdal/lib/krb5/init_creds_pw.c paid.salt, paid.s2kparams, etype, key);
etype 142 source4/heimdal/lib/krb5/mit_glue.c krb5_c_valid_enctype (krb5_enctype etype)
etype 144 source4/heimdal/lib/krb5/mit_glue.c return krb5_enctype_valid(NULL, etype);
etype 109 source4/heimdal/lib/krb5/mk_priv.c s.enc_part.etype = key->keytype;
etype 93 source4/heimdal/lib/krb5/mk_rep.c ap.enc_part.etype = auth_context->keyblock->keytype;
etype 987 source4/heimdal/lib/krb5/pkinit.c krb5_enctype etype,
etype 1126 source4/heimdal/lib/krb5/pkinit.c krb5_enctype etype,
etype 1273 source4/heimdal/lib/krb5/pkinit.c etype,
etype 1306 source4/heimdal/lib/krb5/pkinit.c krb5_enctype etype,
etype 1364 source4/heimdal/lib/krb5/pkinit.c ret = pk_rd_pa_reply_dh(context, &data, &oid, realm, ctx, etype, hi,
etype 1371 source4/heimdal/lib/krb5/pkinit.c ctx, etype, hi, nonce, req_buffer, pa, key);
etype 1423 source4/heimdal/lib/krb5/pkinit.c ctx, etype, hi, nonce, req_buffer, pa, key);
etype 100 source4/heimdal/lib/krb5/rd_cred.c if (cred.enc_part.etype == ETYPE_NULL) {
etype 754 source4/heimdal/lib/krb5/rd_req.c ap_req->ticket.enc_part.etype,
etype 571 source4/kdc/kdc.c krb5_enctype etype;
etype 604 source4/kdc/kdc.c etype = ETYPE_ARCFOUR_HMAC_MD5;
etype 607 source4/kdc/kdc.c &etype);
etype 635 source4/kdc/kdc.c ret = hdb_enctype2key(kdc->smb_krb5_context->krb5_context, &ent.entry, etype, &key);
etype 31 source4/libcli/raw/clierror.c switch (tree->session->transport->error.etype) {
etype 51 source4/libcli/raw/clierror.c switch (tree->session->transport->error.etype) {
etype 466 source4/libcli/raw/clitransport.c transport->error.etype = ETYPE_NONE;
etype 468 source4/libcli/raw/clitransport.c transport->error.etype = ETYPE_SMB;
etype 472 source4/libcli/raw/clitransport.c transport->error.etype = ETYPE_SOCKET;
etype 137 source4/libcli/raw/libcliraw.h enum {ETYPE_NONE, ETYPE_SMB, ETYPE_SOCKET, ETYPE_NBT} etype;