e_text 264 source4/heimdal/kdc/kerberos5.c const char **e_text,
e_text 282 source4/heimdal/kdc/kerberos5.c *e_text = "KDC internal error";
e_text 321 source4/heimdal/kdc/kerberos5.c *e_text = "KDC internal error";
e_text 361 source4/heimdal/kdc/kerberos5.c *e_text = "KDC internal error";
e_text 984 source4/heimdal/kdc/kerberos5.c const char *e_text = NULL;
e_text 1001 source4/heimdal/kdc/kerberos5.c e_text = "No server in request";
e_text 1018 source4/heimdal/kdc/kerberos5.c e_text = "No client in request";
e_text 1097 source4/heimdal/kdc/kerberos5.c e_text = "No PKINIT PA found";
e_text 1127 source4/heimdal/kdc/kerberos5.c e_text = "PKINIT certificate not allowed to "
e_text 1131 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0, "%s", e_text);
e_text 1150 source4/heimdal/kdc/kerberos5.c e_text = "No ENC-TS found";
e_text 1176 source4/heimdal/kdc/kerberos5.c e_text = "No key matches pa-data";
e_text 1226 source4/heimdal/kdc/kerberos5.c e_text = "Failed to decrypt PA-DATA";
e_text 1239 source4/heimdal/kdc/kerberos5.c e_text = "Failed to decode PA-ENC-TS-ENC";
e_text 1270 source4/heimdal/kdc/kerberos5.c e_text = NULL;
e_text 1272 source4/heimdal/kdc/kerberos5.c e_text = "Too large time skew";
e_text 1296 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0, "%s -- %s", e_text, client_name);
e_text 1297 source4/heimdal/kdc/kerberos5.c e_text = NULL;
e_text 1355 source4/heimdal/kdc/kerberos5.c e_text ="Need to use PA-ENC-TIMESTAMP/PA-PK-AS-REQ",
e_text 1766 source4/heimdal/kdc/kerberos5.c reply_key, &e_text, reply);
e_text 1776 source4/heimdal/kdc/kerberos5.c e_text = "Reply packet too large";
e_text 1784 source4/heimdal/kdc/kerberos5.c e_text,
e_text 674 source4/heimdal/kdc/krb5tgs.c const char **e_text,
e_text 911 source4/heimdal/kdc/krb5tgs.c serverkey, 0, &tgt->key, e_text, reply);
e_text 937 source4/heimdal/kdc/krb5tgs.c const char **e_text,
e_text 979 source4/heimdal/kdc/krb5tgs.c *e_text = "KDC internal error";
e_text 1056 source4/heimdal/kdc/krb5tgs.c const char **e_text,
e_text 1197 source4/heimdal/kdc/krb5tgs.c ac, b, e_text, &(*ticket)->ticket.key);
e_text 1366 source4/heimdal/kdc/krb5tgs.c const char **e_text,
e_text 1950 source4/heimdal/kdc/krb5tgs.c e_text,
e_text 1999 source4/heimdal/kdc/krb5tgs.c const char *e_text = NULL;
e_text 2026 source4/heimdal/kdc/krb5tgs.c &e_text,
e_text 2045 source4/heimdal/kdc/krb5tgs.c &e_text,
e_text 2059 source4/heimdal/kdc/krb5tgs.c e_text = "Reply packet too large";
e_text 126 source4/heimdal/kdc/kx509.c if (rep->e_text)
e_text 127 source4/heimdal/kdc/kx509.c HMAC_Update(&ctx, (unsigned char *)*rep->e_text, strlen(*rep->e_text));
e_text 41 source4/heimdal/lib/krb5/mk_error.c const char *e_text,
e_text 66 source4/heimdal/lib/krb5/mk_error.c if(e_text == NULL)
e_text 67 source4/heimdal/lib/krb5/mk_error.c e_text = krb5_get_err_text(context, error_code);
e_text 71 source4/heimdal/lib/krb5/mk_error.c if (e_text)
e_text 72 source4/heimdal/lib/krb5/mk_error.c msg.e_text = rk_UNCONST(&e_text);
e_text 80 source4/heimdal/lib/krb5/rd_error.c if (error->e_text != NULL) {
e_text 81 source4/heimdal/lib/krb5/rd_error.c krb5_set_error_message(context, ret, "%s", *error->e_text);