etypes            363 source4/auth/credentials/credentials_krb5.c 	krb5_enctype *etypes = NULL;
etypes            407 source4/auth/credentials/credentials_krb5.c 						  &etypes);
etypes            411 source4/auth/credentials/credentials_krb5.c 		for (num_ktypes = 0; etypes[num_ktypes]; num_ktypes++);
etypes            414 source4/auth/credentials/credentials_krb5.c 							   num_ktypes, etypes);
etypes            415 source4/auth/credentials/credentials_krb5.c 		krb5_xfree (etypes);
etypes            740 source4/heimdal/kdc/kerberos4.c     krb5_enctype etypes[] = { ETYPE_DES_CBC_MD5,
etypes            745 source4/heimdal/kdc/kerberos4.c 	i < sizeof(etypes)/sizeof(etypes[0])
etypes            750 source4/heimdal/kdc/kerberos4.c 	while(hdb_next_enctype2key(context, &principal->entry, etypes[i], &key) == 0) {
etypes            129 source4/heimdal/kdc/kerberos5.c 		krb5_enctype *etypes, unsigned len,
etypes            141 source4/heimdal/kdc/kerberos5.c 	if (krb5_enctype_valid(context, etypes[i]) != 0 &&
etypes            142 source4/heimdal/kdc/kerberos5.c 	    !_kdc_is_weak_expection(princ->entry.principal, etypes[i]))
etypes            145 source4/heimdal/kdc/kerberos5.c 	while (hdb_next_enctype2key(context, &princ->entry, etypes[i], &key) == 0) {
etypes            151 source4/heimdal/kdc/kerberos5.c 	    *ret_etype = etypes[i];
etypes            465 source4/heimdal/kdc/kerberos5.c 		  ENCTYPE *etypes, unsigned int etypes_len)
etypes            488 source4/heimdal/kdc/kerberos5.c 	    if(client->keys.val[i].key.keytype == etypes[j]) {
etypes            489 source4/heimdal/kdc/kerberos5.c  		if (krb5_enctype_valid(context, etypes[j]) != 0)
etypes            491 source4/heimdal/kdc/kerberos5.c 		if (!older_enctype(etypes[j]))
etypes            509 source4/heimdal/kdc/kerberos5.c 	    if(client->keys.val[i].key.keytype == etypes[j])
etypes            514 source4/heimdal/kdc/kerberos5.c 	if (!older_enctype(etypes[j]))
etypes            627 source4/heimdal/kdc/kerberos5.c 		   ENCTYPE *etypes, unsigned int etypes_len)
etypes            649 source4/heimdal/kdc/kerberos5.c 	    if(client->keys.val[i].key.keytype == etypes[j]) {
etypes            650 source4/heimdal/kdc/kerberos5.c 		if (krb5_enctype_valid(context, etypes[j]) != 0)
etypes            668 source4/heimdal/kdc/kerberos5.c 	    if(client->keys.val[i].key.keytype == etypes[j])
etypes             42 source4/heimdal/lib/krb5/build_auth.c     EtypeList etypes;
etypes             49 source4/heimdal/lib/krb5/build_auth.c     ret = krb5_init_etype(context, &etypes.len, &etypes.val, NULL);
etypes             53 source4/heimdal/lib/krb5/build_auth.c     ASN1_MALLOC_ENCODE(EtypeList, buf, buf_size, &etypes, &len, ret);
etypes             55 source4/heimdal/lib/krb5/build_auth.c 	free_EtypeList(&etypes);
etypes             60 source4/heimdal/lib/krb5/build_auth.c     free_EtypeList(&etypes);
etypes             61 source4/heimdal/lib/krb5/context.c     krb5_enctype *etypes = NULL;
etypes             68 source4/heimdal/lib/krb5/context.c 	etypes = malloc((i+1) * sizeof(*etypes));
etypes             69 source4/heimdal/lib/krb5/context.c 	if (etypes == NULL) {
etypes             80 source4/heimdal/lib/krb5/context.c 	    etypes[k++] = e;
etypes             82 source4/heimdal/lib/krb5/context.c 	etypes[k] = ETYPE_NULL;
etypes             85 source4/heimdal/lib/krb5/context.c     *ret_enctypes = etypes;
etypes            135 source4/heimdal/lib/krb5/context.c     free(context->etypes);
etypes            136 source4/heimdal/lib/krb5/context.c     context->etypes = tmptypes;
etypes            376 source4/heimdal/lib/krb5/context.c     if (context->etypes) {
etypes            377 source4/heimdal/lib/krb5/context.c 	ret = copy_etypes(context, context->etypes, &p->etypes);
etypes            443 source4/heimdal/lib/krb5/context.c     free(context->etypes);
etypes            737 source4/heimdal/lib/krb5/context.c 			       const krb5_enctype *etypes)
etypes            742 source4/heimdal/lib/krb5/context.c     if(etypes) {
etypes            743 source4/heimdal/lib/krb5/context.c 	for (i = 0; etypes[i]; ++i) {
etypes            745 source4/heimdal/lib/krb5/context.c 	    ret = krb5_enctype_valid(context, etypes[i]);
etypes            755 source4/heimdal/lib/krb5/context.c 	memmove(p, etypes, i * sizeof(krb5_enctype));
etypes            757 source4/heimdal/lib/krb5/context.c     if(context->etypes)
etypes            758 source4/heimdal/lib/krb5/context.c 	free(context->etypes);
etypes            759 source4/heimdal/lib/krb5/context.c     context->etypes = p;
etypes            779 source4/heimdal/lib/krb5/context.c 			       krb5_enctype **etypes)
etypes            785 source4/heimdal/lib/krb5/context.c     if(context->etypes) {
etypes            786 source4/heimdal/lib/krb5/context.c 	for(i = 0; context->etypes[i]; i++);
etypes            793 source4/heimdal/lib/krb5/context.c 	memmove(p, context->etypes, i * sizeof(krb5_enctype));
etypes            799 source4/heimdal/lib/krb5/context.c     *etypes = p;
etypes           2571 source4/heimdal/lib/krb5/crypto.c static struct encryption_type *etypes[] = {
etypes           2592 source4/heimdal/lib/krb5/crypto.c static unsigned num_etypes = sizeof(etypes) / sizeof(etypes[0]);
etypes           2600 source4/heimdal/lib/krb5/crypto.c 	if(etypes[i]->type == type)
etypes           2601 source4/heimdal/lib/krb5/crypto.c 	    return etypes[i];
etypes           2635 source4/heimdal/lib/krb5/crypto.c 	if(strcasecmp(etypes[i]->name, string) == 0){
etypes           2636 source4/heimdal/lib/krb5/crypto.c 	    *etype = etypes[i]->type;
etypes           2704 source4/heimdal/lib/krb5/crypto.c 	if(etypes[i]->keyed_checksum &&
etypes           2705 source4/heimdal/lib/krb5/crypto.c 	   etypes[i]->keyed_checksum->type == ctype)
etypes           2707 source4/heimdal/lib/krb5/crypto.c 		*etype = etypes[i]->type;
etypes           4693 source4/heimdal/lib/krb5/crypto.c 	if (etypes[i]->keytype->type == keytype
etypes           4694 source4/heimdal/lib/krb5/crypto.c 	    && !(etypes[i]->flags & F_PSEUDO))
etypes           4704 source4/heimdal/lib/krb5/crypto.c 	if (etypes[i]->keytype->type == keytype
etypes           4705 source4/heimdal/lib/krb5/crypto.c 	    && !(etypes[i]->flags & F_PSEUDO))
etypes           4706 source4/heimdal/lib/krb5/crypto.c 	    ret[n++] = etypes[i]->type;
etypes             42 source4/heimdal/lib/krb5/get_in_tkt.c 		 const krb5_enctype *etypes)
etypes             49 source4/heimdal/lib/krb5/get_in_tkt.c     if (etypes == NULL) {
etypes             54 source4/heimdal/lib/krb5/get_in_tkt.c 	etypes = tmp;
etypes             57 source4/heimdal/lib/krb5/get_in_tkt.c     for (i = 0; etypes[i]; ++i)
etypes             67 source4/heimdal/lib/krb5/get_in_tkt.c 	     etypes,
etypes            632 source4/heimdal/lib/krb5/get_in_tkt.c 	enctypes = context->etypes;
etypes            667 source4/heimdal/lib/krb5/get_in_tkt.c 	     const krb5_enctype *etypes,
etypes            731 source4/heimdal/lib/krb5/get_in_tkt.c 			   etypes);
etypes            885 source4/heimdal/lib/krb5/get_in_tkt.c 		 const krb5_enctype *etypes,
etypes            921 source4/heimdal/lib/krb5/get_in_tkt.c 			   etypes,
etypes           1049 source4/heimdal/lib/krb5/get_in_tkt.c 		const krb5_enctype *etypes,
etypes           1064 source4/heimdal/lib/krb5/get_in_tkt.c 			    etypes,
etypes             75 source4/heimdal/lib/krb5/get_in_tkt_with_keytab.c 			     const krb5_enctype *etypes,
etypes             90 source4/heimdal/lib/krb5/get_in_tkt_with_keytab.c 			    etypes,
etypes             42 source4/heimdal/lib/krb5/init_creds_pw.c     krb5_enctype *etypes;
etypes             93 source4/heimdal/lib/krb5/init_creds_pw.c     if (ctx->etypes)
etypes             94 source4/heimdal/lib/krb5/init_creds_pw.c 	free(ctx->etypes);
etypes            268 source4/heimdal/lib/krb5/init_creds_pw.c     krb5_enctype *etypes;
etypes            297 source4/heimdal/lib/krb5/init_creds_pw.c     ctx->etypes = NULL;
etypes            336 source4/heimdal/lib/krb5/init_creds_pw.c 	etypes = malloc((options->etype_list_length + 1)
etypes            338 source4/heimdal/lib/krb5/init_creds_pw.c 	if (etypes == NULL) {
etypes            342 source4/heimdal/lib/krb5/init_creds_pw.c 	memcpy (etypes, options->etype_list,
etypes            344 source4/heimdal/lib/krb5/init_creds_pw.c 	etypes[options->etype_list_length] = ETYPE_NULL;
etypes            345 source4/heimdal/lib/krb5/init_creds_pw.c 	ctx->etypes = etypes;
etypes            518 source4/heimdal/lib/krb5/init_creds_pw.c 			    ctx.etypes,
etypes            548 source4/heimdal/lib/krb5/init_creds_pw.c 			const krb5_enctype *etypes,
etypes            608 source4/heimdal/lib/krb5/init_creds_pw.c 			   etypes);
etypes            945 source4/heimdal/lib/krb5/init_creds_pw.c 	enctypes = context->etypes;
etypes           1236 source4/heimdal/lib/krb5/init_creds_pw.c 				 ctx->addrs, ctx->etypes, &ctx->as_req);
etypes           1586 source4/heimdal/lib/krb5/init_creds_pw.c 			    ctx.etypes,
etypes            225 source4/heimdal/lib/krb5/krb5_locl.h     krb5_enctype *etypes;
etypes            169 source4/heimdal/lib/krb5/rd_req.c 	       EtypeList *etypes)
etypes            178 source4/heimdal/lib/krb5/rd_req.c     etypes->len = 0;
etypes            179 source4/heimdal/lib/krb5/rd_req.c     etypes->val = NULL;
etypes            209 source4/heimdal/lib/krb5/rd_req.c 			   etypes,
etypes            345 source4/heimdal/lib/krb5/rd_req.c     EtypeList etypes;
etypes            460 source4/heimdal/lib/krb5/rd_req.c     ret = find_etypelist(context, ac, &etypes);
etypes            466 source4/heimdal/lib/krb5/rd_req.c     if (etypes.val) {
etypes            469 source4/heimdal/lib/krb5/rd_req.c 	for (i = 0; i < etypes.len; i++) {
etypes            470 source4/heimdal/lib/krb5/rd_req.c 	    if (krb5_enctype_valid(context, etypes.val[i]) == 0) {
etypes            471 source4/heimdal/lib/krb5/rd_req.c 		ac->keytype = etypes.val[i];
etypes            500 source4/heimdal/lib/krb5/rd_req.c     free_EtypeList(&etypes);
etypes            664 source4/kdc/hdb-samba4.c 	entry_ex->entry.etypes = malloc(sizeof(*(entry_ex->entry.etypes)));
etypes            665 source4/kdc/hdb-samba4.c 	if (entry_ex->entry.etypes == NULL) {
etypes            670 source4/kdc/hdb-samba4.c 	entry_ex->entry.etypes->len = entry_ex->entry.keys.len;
etypes            671 source4/kdc/hdb-samba4.c 	entry_ex->entry.etypes->val = calloc(entry_ex->entry.etypes->len, sizeof(int));
etypes            672 source4/kdc/hdb-samba4.c 	if (entry_ex->entry.etypes->val == NULL) {
etypes            677 source4/kdc/hdb-samba4.c 	for (i=0; i < entry_ex->entry.etypes->len; i++) {
etypes            678 source4/kdc/hdb-samba4.c 		entry_ex->entry.etypes->val[i] = entry_ex->entry.keys.val[i].key.keytype;
etypes            853 source4/kdc/hdb-samba4.c 	entry_ex->entry.etypes = malloc(sizeof(*(entry_ex->entry.etypes)));
etypes            854 source4/kdc/hdb-samba4.c 	if (entry_ex->entry.etypes == NULL) {
etypes            859 source4/kdc/hdb-samba4.c 	entry_ex->entry.etypes->len = entry_ex->entry.keys.len;
etypes            860 source4/kdc/hdb-samba4.c 	entry_ex->entry.etypes->val = calloc(entry_ex->entry.etypes->len, sizeof(int));
etypes            861 source4/kdc/hdb-samba4.c 	if (entry_ex->entry.etypes->val == NULL) {
etypes            866 source4/kdc/hdb-samba4.c 	for (i=0; i < entry_ex->entry.etypes->len; i++) {
etypes            867 source4/kdc/hdb-samba4.c 		entry_ex->entry.etypes->val[i] = entry_ex->entry.keys.val[i].key.keytype;