etype 1660 source3/include/proto.h ADS_STATUS ads_build_error(enum ads_error_type etype, etype 1662 source3/include/proto.h ADS_STATUS ads_build_nt_error(enum ads_error_type etype, etype 28 source3/libads/ads_status.c ADS_STATUS ads_build_error(enum ads_error_type etype, etype 33 source3/libads/ads_status.c if (etype == ENUM_ADS_ERROR_NT) { etype 42 source3/libads/ads_status.c ret.error_type = etype; etype 47 source3/libads/ads_status.c ADS_STATUS ads_build_nt_error(enum ads_error_type etype, etype 52 source3/libads/ads_status.c if (etype != ENUM_ADS_ERROR_NT) { etype 60 source3/libads/ads_status.c ret.error_type = etype; etype 1053 source3/libsmb/clikrb5.c return ap_req->ticket.enc_part.etype; etype 246 source4/heimdal/kdc/524.c ticket->etype = 0; etype 322 source4/heimdal/kdc/524.c ret = hdb_enctype2key(context, &server->entry, t->enc_part.etype, &skey); etype 93 source4/heimdal/kdc/kerberos5.c _kdc_is_weak_expection(krb5_principal principal, krb5_enctype etype) etype 97 source4/heimdal/kdc/kerberos5.c (etype == ETYPE_DES_CBC_CRC etype 98 source4/heimdal/kdc/kerberos5.c || etype == ETYPE_DES_CBC_MD4 etype 99 source4/heimdal/kdc/kerberos5.c || etype == ETYPE_DES_CBC_MD5)) etype 261 source4/heimdal/kdc/kerberos5.c krb5_enctype etype, etype 286 source4/heimdal/kdc/kerberos5.c ret = krb5_crypto_init(context, skey, etype, &crypto); etype 402 source4/heimdal/kdc/kerberos5.c for(i = 0; i < req->req_body.etype.len; i++) { etype 403 source4/heimdal/kdc/kerberos5.c if (!older_enctype(req->req_body.etype.val[i])) etype 416 source4/heimdal/kdc/kerberos5.c ent->etype = key->key.keytype; etype 485 source4/heimdal/kdc/kerberos5.c if (pa.val[j].etype == client->keys.val[i].key.keytype) etype 556 source4/heimdal/kdc/kerberos5.c ent->etype = key->key.keytype; etype 646 source4/heimdal/kdc/kerberos5.c if (pa.val[j].etype == client->keys.val[i].key.keytype) etype 719 source4/heimdal/kdc/kerberos5.c for (i = 0; i < b->etype.len; i++) { etype 720 source4/heimdal/kdc/kerberos5.c ret = krb5_enctype_to_string(context, b->etype.val[i], &str); etype 725 source4/heimdal/kdc/kerberos5.c p = rk_strpoolprintf(p, "%d", b->etype.val[i]); etype 726 source4/heimdal/kdc/kerberos5.c if (p && i + 1 < b->etype.len) etype 1173 source4/heimdal/kdc/kerberos5.c enc_data.etype, &pa_key); etype 1178 source4/heimdal/kdc/kerberos5.c if(krb5_enctype_to_string(context, enc_data.etype, &estr)) etype 1183 source4/heimdal/kdc/kerberos5.c enc_data.etype, client_name); etype 1224 source4/heimdal/kdc/kerberos5.c enc_data.etype, &pa_key) == 0) etype 1344 source4/heimdal/kdc/kerberos5.c b->etype.val, b->etype.len); etype 1347 source4/heimdal/kdc/kerberos5.c &client->entry, b->etype.val, b->etype.len); etype 1372 source4/heimdal/kdc/kerberos5.c ret = _kdc_find_etype(context, client, b->etype.val, b->etype.len, etype 1414 source4/heimdal/kdc/kerberos5.c for (j = 0; j < b->etype.len && sessionetype == ETYPE_NULL; j++) { etype 1417 source4/heimdal/kdc/kerberos5.c if (p[i] != b->etype.val[j]) etype 154 source4/heimdal/kdc/krb5tgs.c sp.etype = enctype; etype 231 source4/heimdal/kdc/krb5tgs.c ret = hdb_enctype2key(context, &krbtgt->entry, sp.etype, &key); etype 1132 source4/heimdal/kdc/krb5tgs.c *krbtgt_etype = ap_req.ticket.enc_part.etype; etype 1135 source4/heimdal/kdc/krb5tgs.c ap_req.ticket.enc_part.etype, &tkey); etype 1139 source4/heimdal/kdc/krb5tgs.c krb5_enctype_to_string(context, ap_req.ticket.enc_part.etype, &str); etype 1434 source4/heimdal/kdc/krb5tgs.c t->enc_part.etype, &uukey); etype 1571 source4/heimdal/kdc/krb5tgs.c krb5_enctype etype; etype 1576 source4/heimdal/kdc/krb5tgs.c for(i = 0; i < b->etype.len; i++) etype 1577 source4/heimdal/kdc/krb5tgs.c if (b->etype.val[i] == adtkt.key.keytype) etype 1579 source4/heimdal/kdc/krb5tgs.c if(i == b->etype.len) { etype 1585 source4/heimdal/kdc/krb5tgs.c etype = b->etype.val[i]; etype 1590 source4/heimdal/kdc/krb5tgs.c ret = _kdc_find_etype(context, server, b->etype.val, b->etype.len, etype 1591 source4/heimdal/kdc/krb5tgs.c &skey, &etype); etype 1601 source4/heimdal/kdc/krb5tgs.c ret = krb5_generate_random_keyblock(context, etype, &sessionkey); etype 1792 source4/heimdal/kdc/krb5tgs.c t->enc_part.etype, &clientkey); etype 978 source4/heimdal/kdc/pkinit.c if (req->req_body.etype.len > 0) { etype 979 source4/heimdal/kdc/pkinit.c for (i = 0; i < req->req_body.etype.len; i++) etype 980 source4/heimdal/kdc/pkinit.c if (krb5_enctype_valid(context, req->req_body.etype.val[i]) == 0) etype 982 source4/heimdal/kdc/pkinit.c if (req->req_body.etype.len <= i) { etype 988 source4/heimdal/kdc/pkinit.c enctype = req->req_body.etype.val[i]; etype 63 source4/heimdal/lib/hdb/mkey.c int kvno, krb5_keyblock *key, krb5_enctype etype, etype 80 source4/heimdal/lib/hdb/mkey.c if(etype != 0) etype 81 source4/heimdal/lib/hdb/mkey.c (*mkey)->keytab.keyblock.keytype = etype; etype 83 source4/heimdal/lib/hdb/mkey.c ret = krb5_crypto_init(context, key, etype, &(*mkey)->crypto); etype 391 source4/heimdal/lib/krb5/auth_context.c krb5_enctype etype) etype 398 source4/heimdal/lib/krb5/auth_context.c auth_context->keyblock->keytype = etype; etype 405 source4/heimdal/lib/krb5/auth_context.c krb5_enctype *etype) etype 65 source4/heimdal/lib/krb5/build_ap_req.c ap.authenticator.etype = enctype; etype 696 source4/heimdal/lib/krb5/context.c default_etypes(krb5_context context, krb5_enctype **etype) etype 718 source4/heimdal/lib/krb5/context.c *etype = e; etype 894 source4/heimdal/lib/krb5/crypto.c krb5_enctype etype, etype 901 source4/heimdal/lib/krb5/crypto.c e = _find_enctype (etype); etype 905 source4/heimdal/lib/krb5/crypto.c etype); etype 926 source4/heimdal/lib/krb5/crypto.c krb5_enctype etype, etype 933 source4/heimdal/lib/krb5/crypto.c e = _find_enctype (etype); etype 937 source4/heimdal/lib/krb5/crypto.c etype); etype 2608 source4/heimdal/lib/krb5/crypto.c krb5_enctype etype, etype 2612 source4/heimdal/lib/krb5/crypto.c e = _find_enctype(etype); etype 2616 source4/heimdal/lib/krb5/crypto.c etype); etype 2631 source4/heimdal/lib/krb5/crypto.c krb5_enctype *etype) etype 2636 source4/heimdal/lib/krb5/crypto.c *etype = etypes[i]->type; etype 2647 source4/heimdal/lib/krb5/crypto.c krb5_enctype etype, etype 2650 source4/heimdal/lib/krb5/crypto.c struct encryption_type *e = _find_enctype(etype); etype 2654 source4/heimdal/lib/krb5/crypto.c etype); etype 2663 source4/heimdal/lib/krb5/crypto.c krb5_enctype etype) etype 2665 source4/heimdal/lib/krb5/crypto.c struct encryption_type *e = _find_enctype(etype); etype 2669 source4/heimdal/lib/krb5/crypto.c etype); etype 2697 source4/heimdal/lib/krb5/crypto.c krb5_enctype *etype) etype 2701 source4/heimdal/lib/krb5/crypto.c *etype = ETYPE_NULL; etype 2707 source4/heimdal/lib/krb5/crypto.c *etype = etypes[i]->type; etype 3645 source4/heimdal/lib/krb5/crypto.c result->etype = CRYPTO_ETYPE(crypto); etype 3884 source4/heimdal/lib/krb5/crypto.c krb5_enctype etype, etype 3895 source4/heimdal/lib/krb5/crypto.c et = _find_enctype (etype); etype 3899 source4/heimdal/lib/krb5/crypto.c etype); etype 3946 source4/heimdal/lib/krb5/crypto.c krb5_enctype etype, etype 3955 source4/heimdal/lib/krb5/crypto.c if(etype == ETYPE_NULL) etype 3956 source4/heimdal/lib/krb5/crypto.c etype = key->keytype; etype 3957 source4/heimdal/lib/krb5/crypto.c (*crypto)->et = _find_enctype(etype); etype 3963 source4/heimdal/lib/krb5/crypto.c etype); etype 4115 source4/heimdal/lib/krb5/crypto.c krb5_enctype etype, etype 4118 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = _find_enctype(etype); etype 4127 source4/heimdal/lib/krb5/crypto.c etype); etype 4143 source4/heimdal/lib/krb5/crypto.c kd.key->keytype = etype; etype 49 source4/heimdal/lib/krb5/generate_subkey.c krb5_enctype etype, etype 60 source4/heimdal/lib/krb5/generate_subkey.c if (etype == ETYPE_NULL) etype 61 source4/heimdal/lib/krb5/generate_subkey.c etype = key->keytype; /* use session key etype */ etype 64 source4/heimdal/lib/krb5/generate_subkey.c ret = krb5_generate_random_keyblock(context, etype, *subkey); etype 154 source4/heimdal/lib/krb5/get_cred.c ALLOC_SEQ(&t->req_body.etype, 1); etype 155 source4/heimdal/lib/krb5/get_cred.c if(t->req_body.etype.val == NULL) { etype 161 source4/heimdal/lib/krb5/get_cred.c t->req_body.etype.val[0] = in_creds->session.keytype; etype 164 source4/heimdal/lib/krb5/get_cred.c &t->req_body.etype.len, etype 165 source4/heimdal/lib/krb5/get_cred.c &t->req_body.etype.val, etype 413 source4/heimdal/lib/krb5/get_for_creds.c cred.enc_part.etype = ENCTYPE_NULL; etype 560 source4/heimdal/lib/krb5/get_in_tkt.c krb5_enctype etype, krb5_keyblock *key) etype 729 source4/heimdal/lib/krb5/get_in_tkt.c &a->req_body.etype.len, etype 730 source4/heimdal/lib/krb5/get_in_tkt.c &a->req_body.etype.val, etype 794 source4/heimdal/lib/krb5/get_in_tkt.c &preauth->val[i].info.val[j].etype, 1, etype 817 source4/heimdal/lib/krb5/get_in_tkt.c key_proc, keyseed, a->req_body.etype.val, etype 818 source4/heimdal/lib/krb5/get_in_tkt.c a->req_body.etype.len, NULL); etype 824 source4/heimdal/lib/krb5/get_in_tkt.c key_proc, keyseed, a->req_body.etype.val, etype 825 source4/heimdal/lib/krb5/get_in_tkt.c a->req_body.etype.len, &salt); etype 905 source4/heimdal/lib/krb5/get_in_tkt.c krb5_enctype etype; etype 987 source4/heimdal/lib/krb5/get_in_tkt.c etype = rep.kdc_rep.enc_part.etype; etype 1003 source4/heimdal/lib/krb5/get_in_tkt.c ret = (*key_proc)(context, etype, salt, keyseed, &key); etype 1010 source4/heimdal/lib/krb5/get_in_tkt.c ret = (*key_proc)(context, etype, salt, keyseed, &key); etype 606 source4/heimdal/lib/krb5/init_creds_pw.c &a->req_body.etype.len, etype 607 source4/heimdal/lib/krb5/init_creds_pw.c &a->req_body.etype.val, etype 652 source4/heimdal/lib/krb5/init_creds_pw.c krb5_enctype etype; etype 668 source4/heimdal/lib/krb5/init_creds_pw.c krb5_enctype etype, etype 672 source4/heimdal/lib/krb5/init_creds_pw.c paid->etype = etype; etype 715 source4/heimdal/lib/krb5/init_creds_pw.c for (j = 0; j < asreq->req_body.etype.len; j++) { etype 717 source4/heimdal/lib/krb5/init_creds_pw.c if (asreq->req_body.etype.val[j] == e.val[i].etype) { etype 727 source4/heimdal/lib/krb5/init_creds_pw.c ret = set_paid(paid, context, e.val[i].etype, etype 764 source4/heimdal/lib/krb5/init_creds_pw.c for (j = 0; j < asreq->req_body.etype.len; j++) { etype 766 source4/heimdal/lib/krb5/init_creds_pw.c if (asreq->req_body.etype.val[j] == e.val[i].etype) { etype 778 source4/heimdal/lib/krb5/init_creds_pw.c ret = set_paid(paid, context, e.val[i].etype, etype 806 source4/heimdal/lib/krb5/init_creds_pw.c if (paid->etype == ENCTYPE_NULL) etype 809 source4/heimdal/lib/krb5/init_creds_pw.c paid->etype, etype 871 source4/heimdal/lib/krb5/init_creds_pw.c krb5_enctype etype, krb5_keyblock *key) etype 982 source4/heimdal/lib/krb5/init_creds_pw.c &ppaid->etype, 1, etype 990 source4/heimdal/lib/krb5/init_creds_pw.c a->req_body.etype.val, a->req_body.etype.len, etype 998 source4/heimdal/lib/krb5/init_creds_pw.c a->req_body.etype.val, a->req_body.etype.len, etype 1010 source4/heimdal/lib/krb5/init_creds_pw.c krb5_enctype etype, etype 1015 source4/heimdal/lib/krb5/init_creds_pw.c ret = (*ctx->key_proc)(context, etype, ctx->password, etype 1117 source4/heimdal/lib/krb5/init_creds_pw.c paid.etype = ENCTYPE_NULL; etype 1146 source4/heimdal/lib/krb5/init_creds_pw.c krb5_enctype etype; etype 1151 source4/heimdal/lib/krb5/init_creds_pw.c etype = rep->kdc_rep.enc_part.etype; etype 1154 source4/heimdal/lib/krb5/init_creds_pw.c paid.etype = etype; etype 1162 source4/heimdal/lib/krb5/init_creds_pw.c paid.etype = etype; etype 1186 source4/heimdal/lib/krb5/init_creds_pw.c etype, etype 1198 source4/heimdal/lib/krb5/init_creds_pw.c paid.salt, paid.s2kparams, etype, key); etype 142 source4/heimdal/lib/krb5/mit_glue.c krb5_c_valid_enctype (krb5_enctype etype) etype 144 source4/heimdal/lib/krb5/mit_glue.c return krb5_enctype_valid(NULL, etype); etype 109 source4/heimdal/lib/krb5/mk_priv.c s.enc_part.etype = key->keytype; etype 93 source4/heimdal/lib/krb5/mk_rep.c ap.enc_part.etype = auth_context->keyblock->keytype; etype 987 source4/heimdal/lib/krb5/pkinit.c krb5_enctype etype, etype 1126 source4/heimdal/lib/krb5/pkinit.c krb5_enctype etype, etype 1273 source4/heimdal/lib/krb5/pkinit.c etype, etype 1306 source4/heimdal/lib/krb5/pkinit.c krb5_enctype etype, etype 1364 source4/heimdal/lib/krb5/pkinit.c ret = pk_rd_pa_reply_dh(context, &data, &oid, realm, ctx, etype, hi, etype 1371 source4/heimdal/lib/krb5/pkinit.c ctx, etype, hi, nonce, req_buffer, pa, key); etype 1423 source4/heimdal/lib/krb5/pkinit.c ctx, etype, hi, nonce, req_buffer, pa, key); etype 100 source4/heimdal/lib/krb5/rd_cred.c if (cred.enc_part.etype == ETYPE_NULL) { etype 754 source4/heimdal/lib/krb5/rd_req.c ap_req->ticket.enc_part.etype, etype 571 source4/kdc/kdc.c krb5_enctype etype; etype 604 source4/kdc/kdc.c etype = ETYPE_ARCFOUR_HMAC_MD5; etype 607 source4/kdc/kdc.c &etype); etype 635 source4/kdc/kdc.c ret = hdb_enctype2key(kdc->smb_krb5_context->krb5_context, &ent.entry, etype, &key); etype 31 source4/libcli/raw/clierror.c switch (tree->session->transport->error.etype) { etype 51 source4/libcli/raw/clierror.c switch (tree->session->transport->error.etype) { etype 466 source4/libcli/raw/clitransport.c transport->error.etype = ETYPE_NONE; etype 468 source4/libcli/raw/clitransport.c transport->error.etype = ETYPE_SMB; etype 472 source4/libcli/raw/clitransport.c transport->error.etype = ETYPE_SOCKET; etype 137 source4/libcli/raw/libcliraw.h enum {ETYPE_NONE, ETYPE_SMB, ETYPE_SOCKET, ETYPE_NBT} etype;