e_text            264 source4/heimdal/kdc/kerberos5.c 		  const char **e_text,
e_text            282 source4/heimdal/kdc/kerberos5.c 	*e_text = "KDC internal error";
e_text            321 source4/heimdal/kdc/kerberos5.c 	*e_text = "KDC internal error";
e_text            361 source4/heimdal/kdc/kerberos5.c 	*e_text = "KDC internal error";
e_text            984 source4/heimdal/kdc/kerberos5.c     const char *e_text = NULL;
e_text           1001 source4/heimdal/kdc/kerberos5.c 	e_text = "No server in request";
e_text           1018 source4/heimdal/kdc/kerberos5.c 	e_text = "No client in request";
e_text           1097 source4/heimdal/kdc/kerberos5.c 	e_text = "No PKINIT PA found";
e_text           1127 source4/heimdal/kdc/kerberos5.c 		e_text = "PKINIT certificate not allowed to "
e_text           1131 source4/heimdal/kdc/kerberos5.c 		kdc_log(context, config, 0, "%s", e_text);
e_text           1150 source4/heimdal/kdc/kerberos5.c 	e_text = "No ENC-TS found";
e_text           1176 source4/heimdal/kdc/kerberos5.c 		e_text = "No key matches pa-data";
e_text           1226 source4/heimdal/kdc/kerberos5.c 		e_text = "Failed to decrypt PA-DATA";
e_text           1239 source4/heimdal/kdc/kerberos5.c 		e_text = "Failed to decode PA-ENC-TS-ENC";
e_text           1270 source4/heimdal/kdc/kerberos5.c 		e_text = NULL;
e_text           1272 source4/heimdal/kdc/kerberos5.c 		e_text = "Too large time skew";
e_text           1296 source4/heimdal/kdc/kerberos5.c 	    kdc_log(context, config, 0, "%s -- %s", e_text, client_name);
e_text           1297 source4/heimdal/kdc/kerberos5.c 	    e_text = NULL;
e_text           1355 source4/heimdal/kdc/kerberos5.c 	e_text ="Need to use PA-ENC-TIMESTAMP/PA-PK-AS-REQ",
e_text           1766 source4/heimdal/kdc/kerberos5.c 			    reply_key, &e_text, reply);
e_text           1776 source4/heimdal/kdc/kerberos5.c 	e_text = "Reply packet too large";
e_text           1784 source4/heimdal/kdc/kerberos5.c 		      e_text,
e_text            674 source4/heimdal/kdc/krb5tgs.c 	       const char **e_text,
e_text            911 source4/heimdal/kdc/krb5tgs.c 			    serverkey, 0, &tgt->key, e_text, reply);
e_text            937 source4/heimdal/kdc/krb5tgs.c 			const char **e_text,
e_text            979 source4/heimdal/kdc/krb5tgs.c 	*e_text = "KDC internal error";
e_text           1056 source4/heimdal/kdc/krb5tgs.c 		  const char **e_text,
e_text           1197 source4/heimdal/kdc/krb5tgs.c 				  ac, b, e_text, &(*ticket)->ticket.key);
e_text           1366 source4/heimdal/kdc/krb5tgs.c 		const char **e_text,
e_text           1950 source4/heimdal/kdc/krb5tgs.c 			 e_text,
e_text           1999 source4/heimdal/kdc/krb5tgs.c     const char *e_text = NULL;
e_text           2026 source4/heimdal/kdc/krb5tgs.c 			    &e_text,
e_text           2045 source4/heimdal/kdc/krb5tgs.c 			  &e_text,
e_text           2059 source4/heimdal/kdc/krb5tgs.c 	e_text = "Reply packet too large";
e_text            126 source4/heimdal/kdc/kx509.c     if (rep->e_text)
e_text            127 source4/heimdal/kdc/kx509.c 	HMAC_Update(&ctx, (unsigned char *)*rep->e_text, strlen(*rep->e_text));
e_text             41 source4/heimdal/lib/krb5/mk_error.c 	      const char *e_text,
e_text             66 source4/heimdal/lib/krb5/mk_error.c 	if(e_text == NULL)
e_text             67 source4/heimdal/lib/krb5/mk_error.c 	    e_text = krb5_get_err_text(context, error_code);
e_text             71 source4/heimdal/lib/krb5/mk_error.c     if (e_text)
e_text             72 source4/heimdal/lib/krb5/mk_error.c 	msg.e_text = rk_UNCONST(&e_text);
e_text             80 source4/heimdal/lib/krb5/rd_error.c     if (error->e_text != NULL) {
e_text             81 source4/heimdal/lib/krb5/rd_error.c 	krb5_set_error_message(context, ret, "%s", *error->e_text);