e_text 264 source4/heimdal/kdc/kerberos5.c const char **e_text, e_text 282 source4/heimdal/kdc/kerberos5.c *e_text = "KDC internal error"; e_text 321 source4/heimdal/kdc/kerberos5.c *e_text = "KDC internal error"; e_text 361 source4/heimdal/kdc/kerberos5.c *e_text = "KDC internal error"; e_text 984 source4/heimdal/kdc/kerberos5.c const char *e_text = NULL; e_text 1001 source4/heimdal/kdc/kerberos5.c e_text = "No server in request"; e_text 1018 source4/heimdal/kdc/kerberos5.c e_text = "No client in request"; e_text 1097 source4/heimdal/kdc/kerberos5.c e_text = "No PKINIT PA found"; e_text 1127 source4/heimdal/kdc/kerberos5.c e_text = "PKINIT certificate not allowed to " e_text 1131 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0, "%s", e_text); e_text 1150 source4/heimdal/kdc/kerberos5.c e_text = "No ENC-TS found"; e_text 1176 source4/heimdal/kdc/kerberos5.c e_text = "No key matches pa-data"; e_text 1226 source4/heimdal/kdc/kerberos5.c e_text = "Failed to decrypt PA-DATA"; e_text 1239 source4/heimdal/kdc/kerberos5.c e_text = "Failed to decode PA-ENC-TS-ENC"; e_text 1270 source4/heimdal/kdc/kerberos5.c e_text = NULL; e_text 1272 source4/heimdal/kdc/kerberos5.c e_text = "Too large time skew"; e_text 1296 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0, "%s -- %s", e_text, client_name); e_text 1297 source4/heimdal/kdc/kerberos5.c e_text = NULL; e_text 1355 source4/heimdal/kdc/kerberos5.c e_text ="Need to use PA-ENC-TIMESTAMP/PA-PK-AS-REQ", e_text 1766 source4/heimdal/kdc/kerberos5.c reply_key, &e_text, reply); e_text 1776 source4/heimdal/kdc/kerberos5.c e_text = "Reply packet too large"; e_text 1784 source4/heimdal/kdc/kerberos5.c e_text, e_text 674 source4/heimdal/kdc/krb5tgs.c const char **e_text, e_text 911 source4/heimdal/kdc/krb5tgs.c serverkey, 0, &tgt->key, e_text, reply); e_text 937 source4/heimdal/kdc/krb5tgs.c const char **e_text, e_text 979 source4/heimdal/kdc/krb5tgs.c *e_text = "KDC internal error"; e_text 1056 source4/heimdal/kdc/krb5tgs.c const char **e_text, e_text 1197 source4/heimdal/kdc/krb5tgs.c ac, b, e_text, &(*ticket)->ticket.key); e_text 1366 source4/heimdal/kdc/krb5tgs.c const char **e_text, e_text 1950 source4/heimdal/kdc/krb5tgs.c e_text, e_text 1999 source4/heimdal/kdc/krb5tgs.c const char *e_text = NULL; e_text 2026 source4/heimdal/kdc/krb5tgs.c &e_text, e_text 2045 source4/heimdal/kdc/krb5tgs.c &e_text, e_text 2059 source4/heimdal/kdc/krb5tgs.c e_text = "Reply packet too large"; e_text 126 source4/heimdal/kdc/kx509.c if (rep->e_text) e_text 127 source4/heimdal/kdc/kx509.c HMAC_Update(&ctx, (unsigned char *)*rep->e_text, strlen(*rep->e_text)); e_text 41 source4/heimdal/lib/krb5/mk_error.c const char *e_text, e_text 66 source4/heimdal/lib/krb5/mk_error.c if(e_text == NULL) e_text 67 source4/heimdal/lib/krb5/mk_error.c e_text = krb5_get_err_text(context, error_code); e_text 71 source4/heimdal/lib/krb5/mk_error.c if (e_text) e_text 72 source4/heimdal/lib/krb5/mk_error.c msg.e_text = rk_UNCONST(&e_text); e_text 80 source4/heimdal/lib/krb5/rd_error.c if (error->e_text != NULL) { e_text 81 source4/heimdal/lib/krb5/rd_error.c krb5_set_error_message(context, ret, "%s", *error->e_text);