enctype 382 source3/include/ads.h #define KRB5_KEY_TYPE(k) ((k)->enctype) enctype 938 source3/include/includes.h int create_kerberos_key_from_string(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, krb5_enctype enctype, bool no_salt); enctype 948 source3/include/includes.h krb5_principal kerberos_fetch_salt_princ_for_host_princ(krb5_context context, krb5_principal host_princ, int enctype); enctype 949 source3/include/includes.h void kerberos_set_creds_enctype(krb5_creds *pcreds, int enctype); enctype 973 source3/include/includes.h krb5_enctype *enctype); enctype 1010 source3/include/includes.h krb5_enctype enctype, enctype 1780 source3/include/proto.h int enctype, enctype 381 source3/libads/kerberos.c static char *kerberos_secrets_fetch_salting_principal(const char *service, int enctype) enctype 387 source3/libads/kerberos.c SECRETS_SALTING_PRINCIPAL, service, enctype) == -1) { enctype 537 source3/libads/kerberos.c int enctype) enctype 551 source3/libads/kerberos.c if ((salt_princ_s = kerberos_secrets_fetch_salting_principal(unparsed_name, enctype)) == NULL) { enctype 576 source3/libads/kerberos.c int enctype, enctype 611 source3/libads/kerberos.c SECRETS_SALTING_PRINCIPAL, unparsed_name, enctype) enctype 730 source3/libads/kerberos_keytab.c krb5_enctype enctype = 0; enctype 737 source3/libads/kerberos_keytab.c enctype = smb_get_enctype_from_kt_entry(&kt_entry); enctype 739 source3/libads/kerberos_keytab.c ret = smb_krb5_enctype_to_string(context, enctype, &etype_s); enctype 741 source3/libads/kerberos_keytab.c if (asprintf(&etype_s, "UNKNOWN: %d\n", enctype) == -1) enctype 49 source3/libads/kerberos_verify.c krb5_enctype enctype; enctype 76 source3/libads/kerberos_verify.c enctype = dec_ticket->ticket.key.keytype; enctype 78 source3/libads/kerberos_verify.c enctype = dec_ticket->enc_part.enctype; enctype 84 source3/libads/kerberos_verify.c kvno, enctype, &kt_entry); enctype 117 source3/libnet/libnet_keytab.c const krb5_enctype enctype, enctype 143 source3/libnet/libnet_keytab.c if (KRB5_KEY_TYPE(keyp) != enctype) { enctype 209 source3/libnet/libnet_keytab.c krb5_enctype enctype, enctype 218 source3/libnet/libnet_keytab.c enctype, false); enctype 238 source3/libnet/libnet_keytab.c &password, keyp, enctype, true)) enctype 274 source3/libnet/libnet_keytab.c entry->enctype, enctype 279 source3/libnet/libnet_keytab.c entry->principal, entry->enctype, enctype 299 source3/libnet/libnet_keytab.c entry->enctype, enctype 314 source3/libnet/libnet_keytab.c const krb5_enctype enctype, enctype 345 source3/libnet/libnet_keytab.c if (KRB5_KEY_TYPE(keyp) != enctype) { enctype 409 source3/libnet/libnet_keytab.c const krb5_enctype enctype, enctype 420 source3/libnet/libnet_keytab.c entry.enctype = enctype; enctype 27 source3/libnet/libnet_keytab.h krb5_enctype enctype; enctype 56 source3/libnet/libnet_proto.h const krb5_enctype enctype, enctype 63 source3/libnet/libnet_proto.h const krb5_enctype enctype, enctype 220 source3/libsmb/clikrb5.c krb5_enctype enctype) enctype 231 source3/libsmb/clikrb5.c krb5_use_enctype(context, &eblock, enctype); enctype 242 source3/libsmb/clikrb5.c krb5_enctype enctype) enctype 253 source3/libsmb/clikrb5.c ret = krb5_string_to_key_salt(context, enctype, (const char *)password->data, salt, key); enctype 266 source3/libsmb/clikrb5.c krb5_enctype enctype, enctype 283 source3/libsmb/clikrb5.c KRB5_KEY_TYPE(key) = enctype; enctype 286 source3/libsmb/clikrb5.c salt_princ = kerberos_fetch_salt_princ_for_host_princ(context, host_princ, enctype); enctype 287 source3/libsmb/clikrb5.c ret = create_kerberos_key_from_string_direct(context, salt_princ ? salt_princ : host_princ, password, key, enctype); enctype 587 source3/libsmb/clikrb5.c void kerberos_set_creds_enctype(krb5_creds *pcreds, int enctype) enctype 590 source3/libsmb/clikrb5.c KRB5_KEY_TYPE((&pcreds->keyblock)) = enctype; enctype 592 source3/libsmb/clikrb5.c KRB5_KEY_TYPE((&pcreds->session)) = enctype; enctype 1055 source3/libsmb/clikrb5.c return ap_req->ticket->enc_part.enctype; enctype 1063 source3/libsmb/clikrb5.c krb5_enctype enctype, enctype 1087 source3/libsmb/clikrb5.c kvno, enctype, name)); enctype 1096 source3/libsmb/clikrb5.c enctype, enctype 1124 source3/libsmb/clikrb5.c krb5_enctype *enctype) enctype 1136 source3/libsmb/clikrb5.c *enctype = get_enctype_from_ap_req(&ap_req); enctype 1158 source3/libsmb/clikrb5.c krb5_enctype enctype; enctype 1173 source3/libsmb/clikrb5.c enctype = (*ticket)->enc_part.enctype; enctype 1176 source3/libsmb/clikrb5.c ret = smb_krb5_get_keyinfo_from_ap_req(context, inbuf, &kvno, &enctype); enctype 1184 source3/libsmb/clikrb5.c enctype, enctype 1602 source3/libsmb/clikrb5.c krb5_enctype enctype, enctype 1606 source3/libsmb/clikrb5.c return krb5_enctype_to_string(context, enctype, etype_s); /* Heimdal */ enctype 1609 source3/libsmb/clikrb5.c krb5_error_code ret = krb5_enctype_to_string(enctype, buf, 256); /* MIT */ enctype 35 source4/auth/kerberos/clikrb5.c krb5_enctype enctype) enctype 46 source4/auth/kerberos/clikrb5.c krb5_use_enctype(context, &eblock, enctype); enctype 56 source4/auth/kerberos/clikrb5.c krb5_enctype enctype) enctype 66 source4/auth/kerberos/clikrb5.c ret = krb5_string_to_key_salt(context, enctype, password->data, enctype 51 source4/auth/kerberos/kerberos.h #define KRB5_KEY_TYPE(k) ((k)->enctype) enctype 78 source4/auth/kerberos/kerberos.h int create_kerberos_key_from_string(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, krb5_enctype enctype); enctype 79 source4/auth/kerberos/kerberos.h int create_kerberos_key_from_string_direct(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, krb5_enctype enctype); enctype 99 source4/auth/kerberos/kerberos.h int enctype); enctype 100 source4/auth/kerberos/kerberos.h void kerberos_set_creds_enctype(krb5_creds *pcreds, int enctype); enctype 298 source4/auth/kerberos/kerberos_util.c krb5_enctype enctype; enctype 299 source4/auth/kerberos/kerberos_util.c ret = krb5_string_to_enctype(smb_krb5_context->krb5_context, enctype_strings[i], &enctype); enctype 309 source4/auth/kerberos/kerberos_util.c salt_princ, &password, &entry.keyblock, enctype); enctype 64 source4/heimdal/kdc/digest.c krb5_enctype enctype; enctype 71 source4/heimdal/kdc/digest.c &enctype, enctype 375 source4/heimdal/kdc/kerberos5.c older_enctype(krb5_enctype enctype) enctype 377 source4/heimdal/kdc/kerberos5.c switch (enctype) { enctype 108 source4/heimdal/kdc/krb5tgs.c krb5_enctype enctype, enctype 141 source4/heimdal/kdc/krb5tgs.c ret = hdb_enctype2key(context, &krbtgt->entry, enctype, &key); enctype 154 source4/heimdal/kdc/krb5tgs.c sp.etype = enctype; enctype 100 source4/heimdal/kdc/misc.c krb5_enctype *enctype, enctype 114 source4/heimdal/kdc/misc.c *enctype = p[i]; enctype 180 source4/heimdal/kdc/pkinit.c krb5_enctype enctype, krb5_keyblock *reply_key) enctype 223 source4/heimdal/kdc/pkinit.c enctype, enctype 968 source4/heimdal/kdc/pkinit.c krb5_enctype enctype; enctype 988 source4/heimdal/kdc/pkinit.c enctype = req->req_body.etype.val[i]; enctype 990 source4/heimdal/kdc/pkinit.c enctype = ETYPE_DES3_CBC_SHA1; enctype 1007 source4/heimdal/kdc/pkinit.c ret = krb5_generate_random_keyblock(context, enctype, enctype 1046 source4/heimdal/kdc/pkinit.c ret = generate_dh_keyblock(context, client_params, enctype, enctype 1103 source4/heimdal/kdc/pkinit.c ret = krb5_generate_random_keyblock(context, enctype, enctype 390 source4/heimdal/kuser/kinit.c krb5_enctype *enctype = NULL; enctype 483 source4/heimdal/kuser/kinit.c enctype = malloc(etype_str.num_strings * sizeof(*enctype)); enctype 484 source4/heimdal/kuser/kinit.c if(enctype == NULL) enctype 489 source4/heimdal/kuser/kinit.c &enctype[i]); enctype 493 source4/heimdal/kuser/kinit.c krb5_get_init_creds_opt_set_etype_list(opt, enctype, enctype 633 source4/heimdal/kuser/kinit.c if (enctype) enctype 634 source4/heimdal/kuser/kinit.c free(enctype); enctype 499 source4/heimdal/lib/gssapi/krb5/init_sec_context.c krb5_enctype enctype; enctype 593 source4/heimdal/lib/gssapi/krb5/init_sec_context.c enctype = ctx->auth_context->keyblock->keytype; enctype 612 source4/heimdal/lib/gssapi/krb5/init_sec_context.c enctype, enctype 628 source4/heimdal/lib/gssapi/krb5/init_sec_context.c enctype, enctype 71 source4/heimdal/lib/hdb/hdb.c krb5_enctype enctype, enctype 80 source4/heimdal/lib/hdb/hdb.c if(k->key.keytype == enctype){ enctype 87 source4/heimdal/lib/hdb/hdb.c (int)enctype); enctype 94 source4/heimdal/lib/hdb/hdb.c krb5_enctype enctype, enctype 98 source4/heimdal/lib/hdb/hdb.c return hdb_next_enctype2key(context, e, enctype, key); enctype 202 source4/heimdal/lib/hdb/keys.c krb5_enctype enctype, krb5_salt *salt) enctype 215 source4/heimdal/lib/hdb/keys.c key.key.keytype = enctype; enctype 193 source4/heimdal/lib/hdb/keytab.c krb5_enctype enctype, enctype 239 source4/heimdal/lib/hdb/keytab.c if(enctype == 0) enctype 241 source4/heimdal/lib/hdb/keytab.c enctype = ent.entry.keys.val[0].key.keytype; enctype 244 source4/heimdal/lib/hdb/keytab.c if(ent.entry.keys.val[i].key.keytype == enctype) { enctype 156 source4/heimdal/lib/hdb/mkey.c int16_t enctype; enctype 177 source4/heimdal/lib/hdb/mkey.c ret = krb5_ret_int16(sp, &enctype); enctype 178 source4/heimdal/lib/hdb/mkey.c if((htons(enctype) & 0xff00) == 0x3000) { enctype 181 source4/heimdal/lib/hdb/mkey.c filename, htons(enctype), 0x3000); enctype 184 source4/heimdal/lib/hdb/mkey.c key.keytype = enctype; enctype 1959 source4/heimdal/lib/hx509/crypto.c const heim_oid *enctype, enctype 1966 source4/heimdal/lib/hx509/crypto.c cipher = find_cipher_by_oid(enctype); enctype 1982 source4/heimdal/lib/hx509/crypto.c if (der_copy_oid(enctype, &(*crypto)->oid)) { enctype 40 source4/heimdal/lib/krb5/build_ap_req.c krb5_enctype enctype, enctype 65 source4/heimdal/lib/krb5/build_ap_req.c ap.authenticator.etype = enctype; enctype 105 source4/heimdal/lib/krb5/build_auth.c krb5_enctype enctype, enctype 172 source4/heimdal/lib/krb5/build_auth.c ret = krb5_crypto_init(context, &cred->session, enctype, &crypto); enctype 283 source4/heimdal/lib/krb5/crypto.c krb5_enctype enctype, enctype 294 source4/heimdal/lib/krb5/crypto.c key->keytype = enctype; enctype 336 source4/heimdal/lib/krb5/crypto.c krb5_enctype enctype, enctype 351 source4/heimdal/lib/krb5/crypto.c return DES_AFS3_string_to_key(context, enctype, password, enctype 365 source4/heimdal/lib/krb5/crypto.c key->keytype = enctype; enctype 427 source4/heimdal/lib/krb5/crypto.c krb5_enctype enctype, enctype 481 source4/heimdal/lib/krb5/crypto.c key->keytype = enctype; enctype 492 source4/heimdal/lib/krb5/crypto.c krb5_enctype enctype, enctype 512 source4/heimdal/lib/krb5/crypto.c enctype, enctype 568 source4/heimdal/lib/krb5/crypto.c krb5_enctype enctype, enctype 619 source4/heimdal/lib/krb5/crypto.c key->keytype = enctype; enctype 643 source4/heimdal/lib/krb5/crypto.c krb5_enctype enctype, enctype 663 source4/heimdal/lib/krb5/crypto.c et = _find_enctype(enctype); enctype 673 source4/heimdal/lib/krb5/crypto.c kd.key->keytype = enctype; enctype 990 source4/heimdal/lib/krb5/crypto.c krb5_enctype enctype, enctype 1001 source4/heimdal/lib/krb5/crypto.c ret = krb5_string_to_key_data_salt(context, enctype, password, salt, key); enctype 1008 source4/heimdal/lib/krb5/crypto.c krb5_enctype enctype, enctype 1016 source4/heimdal/lib/krb5/crypto.c return krb5_string_to_key_data(context, enctype, pw, principal, key); enctype 1021 source4/heimdal/lib/krb5/crypto.c krb5_enctype enctype, enctype 1028 source4/heimdal/lib/krb5/crypto.c return krb5_string_to_key_data_salt_opaque(context, enctype, password, enctype 1040 source4/heimdal/lib/krb5/crypto.c krb5_enctype enctype, enctype 1046 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et =_find_enctype(enctype); enctype 1051 source4/heimdal/lib/krb5/crypto.c enctype); enctype 1056 source4/heimdal/lib/krb5/crypto.c return (*st->string_to_key)(context, enctype, password, enctype 1072 source4/heimdal/lib/krb5/crypto.c krb5_enctype enctype, enctype 1080 source4/heimdal/lib/krb5/crypto.c return krb5_string_to_key_data_salt(context, enctype, pw, salt, key); enctype 1085 source4/heimdal/lib/krb5/crypto.c krb5_enctype enctype, enctype 1094 source4/heimdal/lib/krb5/crypto.c return krb5_string_to_key_data_salt_opaque(context, enctype, enctype 4031 source4/heimdal/lib/krb5/crypto.c krb5_enctype *enctype) enctype 4033 source4/heimdal/lib/krb5/crypto.c *enctype = crypto->et->type; enctype 4069 source4/heimdal/lib/krb5/crypto.c krb5_enctype enctype) enctype 4071 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = _find_enctype(enctype); enctype 4076 source4/heimdal/lib/krb5/crypto.c enctype); enctype 4096 source4/heimdal/lib/krb5/crypto.c krb5_enctype enctype) enctype 4098 source4/heimdal/lib/krb5/crypto.c struct encryption_type *et = _find_enctype(enctype); enctype 4103 source4/heimdal/lib/krb5/crypto.c enctype); enctype 4388 source4/heimdal/lib/krb5/crypto.c krb5_enctype enctype, enctype 4404 source4/heimdal/lib/krb5/crypto.c pubinfo.enctype = enctype; enctype 4454 source4/heimdal/lib/krb5/crypto.c krb5_enctype enctype, enctype 4483 source4/heimdal/lib/krb5/crypto.c et = _find_enctype(enctype); enctype 4487 source4/heimdal/lib/krb5/crypto.c enctype); enctype 4499 source4/heimdal/lib/krb5/crypto.c enctype, as_req, pk_as_rep, ticket, &other); enctype 4529 source4/heimdal/lib/krb5/crypto.c ret = krb5_random_to_key(context, enctype, keydata, keylen, key); enctype 1198 source4/heimdal/lib/krb5/get_cred.c krb5_enctype enctype; enctype 1243 source4/heimdal/lib/krb5/get_cred.c krb5_enctype enctype) enctype 1245 source4/heimdal/lib/krb5/get_cred.c opt->enctype = enctype; enctype 1325 source4/heimdal/lib/krb5/get_cred.c if (opt->enctype) { enctype 1326 source4/heimdal/lib/krb5/get_cred.c in_creds.session.keytype = opt->enctype; enctype 1336 source4/heimdal/lib/krb5/get_cred.c opt->enctype ? KRB5_TC_MATCH_KEYTYPE : 0, enctype 40 source4/heimdal/lib/krb5/get_in_tkt_with_keytab.c krb5_enctype enctype, enctype 58 source4/heimdal/lib/krb5/get_in_tkt_with_keytab.c 0, enctype, &entry); enctype 239 source4/heimdal/lib/krb5/init_creds.c krb5_get_init_creds_opt_set_etype_list(opt, enctype, enctype 1118 source4/heimdal/lib/krb5/kcm.c krb5_enctype enctype, enctype 1141 source4/heimdal/lib/krb5/kcm.c ret = krb5_store_int32(request, enctype); enctype 191 source4/heimdal/lib/krb5/keytab.c krb5_enctype enctype, enctype 206 source4/heimdal/lib/krb5/keytab.c ret = krb5_kt_get_entry (context, keytab, principal, vno, enctype, &entry); enctype 306 source4/heimdal/lib/krb5/keytab.c krb5_enctype enctype) enctype 313 source4/heimdal/lib/krb5/keytab.c if(enctype && enctype != entry->keyblock.keytype) enctype 330 source4/heimdal/lib/krb5/keytab.c krb5_enctype enctype, enctype 338 source4/heimdal/lib/krb5/keytab.c return (*id->get)(context, id, principal, kvno, enctype, entry); enctype 350 source4/heimdal/lib/krb5/keytab.c if (krb5_kt_compare(context, &tmp, principal, 0, enctype)) { enctype 376 source4/heimdal/lib/krb5/keytab.c krb5_enctype_to_string(context, enctype, &enctype_str); enctype 104 source4/heimdal/lib/krb5/krb5.h krb5_enctype enctype; enctype 185 source4/heimdal/lib/krb5/mit_glue.c krb5_enctype enctype, enctype 192 source4/heimdal/lib/krb5/mit_glue.c ret = krb5_generate_random_keyblock(context, enctype, &key); enctype 217 source4/heimdal/lib/krb5/mit_glue.c ret = krb5_crypto_init(context, &key, input->enctype, &crypto); enctype 281 source4/heimdal/lib/krb5/mit_glue.c krb5_crypto_getenctype(context, crypto, &output->enctype); enctype 290 source4/heimdal/lib/krb5/mit_glue.c krb5_enctype enctype, enctype 298 source4/heimdal/lib/krb5/mit_glue.c ret = krb5_generate_random_keyblock(context, enctype, &key); enctype 325 source4/heimdal/lib/krb5/mit_glue.c krb5_enctype enctype, enctype 328 source4/heimdal/lib/krb5/mit_glue.c return krb5_generate_random_keyblock(context, enctype, random_key); enctype 333 source4/heimdal/lib/krb5/mit_glue.c krb5_enctype enctype, enctype 339 source4/heimdal/lib/krb5/mit_glue.c ret = krb5_enctype_keybits(context, enctype, ilen); enctype 343 source4/heimdal/lib/krb5/mit_glue.c return krb5_enctype_keysize(context, enctype, keylen);