keytype           199 librpc/gen_ndr/drsblobs.h 	uint32_t keytype;
keytype           222 librpc/gen_ndr/drsblobs.h 	uint32_t keytype;
keytype          1537 librpc/gen_ndr/ndr_drsblobs.c 		NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, r->keytype));
keytype          1574 librpc/gen_ndr/ndr_drsblobs.c 		NDR_CHECK(ndr_pull_uint32(ndr, NDR_SCALARS, &r->keytype));
keytype          1621 librpc/gen_ndr/ndr_drsblobs.c 	ndr_print_uint32(ndr, "keytype", r->keytype);
keytype          1759 librpc/gen_ndr/ndr_drsblobs.c 		NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, r->keytype));
keytype          1797 librpc/gen_ndr/ndr_drsblobs.c 		NDR_CHECK(ndr_pull_uint32(ndr, NDR_SCALARS, &r->keytype));
keytype          1845 librpc/gen_ndr/ndr_drsblobs.c 	ndr_print_uint32(ndr, "keytype", r->keytype);
keytype           377 source3/include/ads.h #define KRB5_KEY_TYPE(k)	((k)->keytype)
keytype            76 source3/libads/kerberos_verify.c 	enctype = dec_ticket->ticket.key.keytype;
keytype           442 source3/libnet/libnet_dssync_keytab.c 								     pkb4->keys[i].keytype,
keytype           455 source3/libnet/libnet_dssync_keytab.c 								     pkb4->old_keys[i].keytype,
keytype           468 source3/libnet/libnet_dssync_keytab.c 								     pkb4->older_keys[i].keytype,
keytype           483 source3/libnet/libnet_dssync_keytab.c 								     pkb3->keys[i].keytype,
keytype           496 source3/libnet/libnet_dssync_keytab.c 								     pkb3->old_keys[i].keytype,
keytype           206 source3/utils/dbwrap_tool.c 	const char *keytype = "int32";
keytype           240 source3/utils/dbwrap_tool.c 		keytype = argv[4];
keytype           250 source3/utils/dbwrap_tool.c 		keytype = argv[4];
keytype           282 source3/utils/dbwrap_tool.c 	if (strcmp(keytype, "int32") == 0) {
keytype           285 source3/utils/dbwrap_tool.c 	} else if (strcmp(keytype, "uint32") == 0) {
keytype           291 source3/utils/dbwrap_tool.c 				  keytype);
keytype            47 source4/auth/kerberos/kerberos.h #define KRB5_KEY_TYPE(k)	((k)->keytype)
keytype           463 source4/dsdb/samdb/ldb_modules/password_hash.c 	pkb3->keys[0].keytype	= ENCTYPE_DES_CBC_MD5;
keytype           465 source4/dsdb/samdb/ldb_modules/password_hash.c 	pkb3->keys[1].keytype	= ENCTYPE_DES_CBC_CRC;
keytype           570 source4/dsdb/samdb/ldb_modules/password_hash.c 	pkb4->keys[0].keytype		= ENCTYPE_AES256_CTS_HMAC_SHA1_96;
keytype           573 source4/dsdb/samdb/ldb_modules/password_hash.c 	pkb4->keys[1].keytype		= ENCTYPE_AES128_CTS_HMAC_SHA1_96;
keytype           576 source4/dsdb/samdb/ldb_modules/password_hash.c 	pkb4->keys[2].keytype		= ENCTYPE_DES_CBC_MD5;
keytype           579 source4/dsdb/samdb/ldb_modules/password_hash.c 	pkb4->keys[3].keytype		= ENCTYPE_DES_CBC_CRC;
keytype           703 source4/heimdal/kdc/kerberos4.c     if((et->key.keytype != ETYPE_DES_CBC_MD5 &&
keytype           704 source4/heimdal/kdc/kerberos4.c 	et->key.keytype != ETYPE_DES_CBC_MD4 &&
keytype           705 source4/heimdal/kdc/kerberos4.c 	et->key.keytype != ETYPE_DES_CBC_CRC) ||
keytype           416 source4/heimdal/kdc/kerberos5.c     ent->etype = key->key.keytype;
keytype           485 source4/heimdal/kdc/kerberos5.c 	    if (pa.val[j].etype == client->keys.val[i].key.keytype)
keytype           488 source4/heimdal/kdc/kerberos5.c 	    if(client->keys.val[i].key.keytype == etypes[j]) {
keytype           509 source4/heimdal/kdc/kerberos5.c 	    if(client->keys.val[i].key.keytype == etypes[j])
keytype           512 source4/heimdal/kdc/kerberos5.c 	if (krb5_enctype_valid(context, client->keys.val[i].key.keytype) != 0)
keytype           556 source4/heimdal/kdc/kerberos5.c     ent->etype = key->key.keytype;
keytype           574 source4/heimdal/kdc/kerberos5.c     switch (key->key.keytype) {
keytype           646 source4/heimdal/kdc/kerberos5.c 	    if (pa.val[j].etype == client->keys.val[i].key.keytype)
keytype           649 source4/heimdal/kdc/kerberos5.c 	    if(client->keys.val[i].key.keytype == etypes[j]) {
keytype           668 source4/heimdal/kdc/kerberos5.c 	    if(client->keys.val[i].key.keytype == etypes[j])
keytype           671 source4/heimdal/kdc/kerberos5.c 	if (krb5_enctype_valid(context, client->keys.val[i].key.keytype) != 0)
keytype          1212 source4/heimdal/kdc/kerberos5.c 					      pa_key->key.keytype, &str);
keytype          1278 source4/heimdal/kdc/kerberos5.c 	    ret = krb5_enctype_to_string(context,pa_key->key.keytype, &str);
keytype           890 source4/heimdal/kdc/krb5tgs.c     if (krb5_enctype_valid(context, et.key.keytype) != 0
keytype           891 source4/heimdal/kdc/krb5tgs.c 	&& _kdc_is_weak_expection(server->entry.principal, et.key.keytype))
keytype           893 source4/heimdal/kdc/krb5tgs.c 	krb5_enctype_enable(context, et.key.keytype);
keytype           909 source4/heimdal/kdc/krb5tgs.c 			    &rep, &et, &ek, et.key.keytype,
keytype           913 source4/heimdal/kdc/krb5tgs.c 	krb5_enctype_disable(context, et.key.keytype);
keytype          1577 source4/heimdal/kdc/krb5tgs.c 		if (b->etype.val[i] == adtkt.key.keytype)
keytype           101 source4/heimdal/lib/gssapi/krb5/accept_sec_context.c     switch (key->keytype) {
keytype            91 source4/heimdal/lib/gssapi/krb5/arcfour.c     if (key->keytype == KEYTYPE_ARCFOUR_56) {
keytype           105 source4/heimdal/lib/gssapi/krb5/arcfour.c     key5.keytype = KEYTYPE_ARCFOUR;
keytype           445 source4/heimdal/lib/gssapi/krb5/arcfour.c 	Klocal.keytype = key->keytype;
keytype           605 source4/heimdal/lib/gssapi/krb5/arcfour.c 	Klocal.keytype = key->keytype;
keytype           157 source4/heimdal/lib/gssapi/krb5/export_sec_context.c     kret = krb5_store_int32 (sp, ac->keytype);
keytype           283 source4/heimdal/lib/gssapi/krb5/get_mic.c   krb5_keytype keytype;
keytype           294 source4/heimdal/lib/gssapi/krb5/get_mic.c   krb5_enctype_to_keytype (context, key->keytype, &keytype);
keytype           296 source4/heimdal/lib/gssapi/krb5/get_mic.c   switch (keytype) {
keytype           148 source4/heimdal/lib/gssapi/krb5/import_sec_context.c     ac->keytype = tmp;
keytype           212 source4/heimdal/lib/gssapi/krb5/init_sec_context.c     this_cred.session.keytype = KEYTYPE_NULL;
keytype           593 source4/heimdal/lib/gssapi/krb5/init_sec_context.c     enctype = ctx->auth_context->keyblock->keytype;
keytype           129 source4/heimdal/lib/gssapi/krb5/inquire_sec_context_by_oid.c     switch(keytype) {
keytype           140 source4/heimdal/lib/gssapi/krb5/inquire_sec_context_by_oid.c 	_gsskrb5_set_status(EINVAL, "%d is not a valid subkey type", keytype);
keytype           148 source4/heimdal/lib/gssapi/krb5/inquire_sec_context_by_oid.c 	_gsskrb5_set_status(EINVAL, "have no subkey of type %d", keytype);
keytype           255 source4/heimdal/lib/gssapi/krb5/inquire_sec_context_by_oid.c 	    is_updated = (acceptor_subkey->keytype !=
keytype           256 source4/heimdal/lib/gssapi/krb5/inquire_sec_context_by_oid.c 			  context_handle->auth_context->keyblock->keytype);
keytype           323 source4/heimdal/lib/gssapi/krb5/inquire_sec_context_by_oid.c 	switch (key->keytype) {
keytype           391 source4/heimdal/lib/gssapi/krb5/unwrap.c   krb5_keytype keytype;
keytype           408 source4/heimdal/lib/gssapi/krb5/unwrap.c   krb5_enctype_to_keytype (context, key->keytype, &keytype);
keytype           412 source4/heimdal/lib/gssapi/krb5/unwrap.c   switch (keytype) {
keytype           279 source4/heimdal/lib/gssapi/krb5/verify_mic.c     krb5_keytype keytype;
keytype           289 source4/heimdal/lib/gssapi/krb5/verify_mic.c     krb5_enctype_to_keytype (context, key->keytype, &keytype);
keytype           290 source4/heimdal/lib/gssapi/krb5/verify_mic.c     switch (keytype) {
keytype           152 source4/heimdal/lib/gssapi/krb5/wrap.c   krb5_keytype keytype;
keytype           164 source4/heimdal/lib/gssapi/krb5/wrap.c   krb5_enctype_to_keytype (context, key->keytype, &keytype);
keytype           166 source4/heimdal/lib/gssapi/krb5/wrap.c   switch (keytype) {
keytype           530 source4/heimdal/lib/gssapi/krb5/wrap.c   krb5_keytype keytype;
keytype           542 source4/heimdal/lib/gssapi/krb5/wrap.c   krb5_enctype_to_keytype (context, key->keytype, &keytype);
keytype           544 source4/heimdal/lib/gssapi/krb5/wrap.c   switch (keytype) {
keytype           246 source4/heimdal/lib/gssapi/mech/gss_krb5.c     key->type = keyblock->keytype;
keytype            80 source4/heimdal/lib/hdb/hdb.c 	if(k->key.keytype == enctype){
keytype           215 source4/heimdal/lib/hdb/keys.c     key.key.keytype = enctype;
keytype           315 source4/heimdal/lib/hdb/keys.c 		if (k->key.keytype == enctypes[i]) {
keytype           387 source4/heimdal/lib/hdb/keys.c 				       (*keys)[i].key.keytype,
keytype           241 source4/heimdal/lib/hdb/keytab.c 	    enctype = ent.entry.keys.val[0].key.keytype;
keytype           244 source4/heimdal/lib/hdb/keytab.c 	if(ent.entry.keys.val[i].key.keytype == enctype) {
keytype            81 source4/heimdal/lib/hdb/mkey.c 	(*mkey)->keytab.keyblock.keytype = etype;
keytype           184 source4/heimdal/lib/hdb/mkey.c     key.keytype = enctype;
keytype           236 source4/heimdal/lib/hdb/mkey.c     if(key.keytype == KEYTYPE_DES || key.keytype == ETYPE_DES_CBC_MD5)
keytype           237 source4/heimdal/lib/hdb/mkey.c 	key.keytype = ETYPE_DES_CFB64_NONE;
keytype           278 source4/heimdal/lib/hdb/mkey.c     key.keytype = ETYPE_DES_PCBC_NONE;
keytype           437 source4/heimdal/lib/hdb/mkey.c     ret = krb5_enctype_keysize(context, k->key.keytype, &keysize);
keytype          2571 source4/heimdal/lib/hx509/crypto.c 	const heim_oid *keytype = NULL;
keytype          2573 source4/heimdal/lib/hx509/crypto.c 	keytype = find_keytype(source);
keytype          2582 source4/heimdal/lib/hx509/crypto.c 		if (keytype && sig_algs[j]->key_oid &&
keytype          2583 source4/heimdal/lib/hx509/crypto.c 		    der_heim_oid_cmp(keytype, (*sig_algs[j]->key_oid)()))
keytype          2622 source4/heimdal/lib/hx509/crypto.c     const heim_oid *keytype = NULL;
keytype          2642 source4/heimdal/lib/hx509/crypto.c 	keytype = find_keytype(_hx509_cert_private_key(source));
keytype          2650 source4/heimdal/lib/hx509/crypto.c 	if (keytype && sig_algs[i]->key_oid &&
keytype          2651 source4/heimdal/lib/hx509/crypto.c 	    der_heim_oid_cmp((*sig_algs[i]->key_oid)(), keytype))
keytype           161 source4/heimdal/lib/krb5/acache.c     cred->session.keytype = incred->keyblock.type;
keytype           308 source4/heimdal/lib/krb5/acache.c     cred->keyblock.type = incred->session.keytype;
keytype            63 source4/heimdal/lib/krb5/auth_context.c     p->keytype        = KEYTYPE_NULL;
keytype           330 source4/heimdal/lib/krb5/auth_context.c 					 auth_context->keytype,
keytype           374 source4/heimdal/lib/krb5/auth_context.c     auth_context->keytype = keytype;
keytype           383 source4/heimdal/lib/krb5/auth_context.c     *keytype = auth_context->keytype;
keytype           398 source4/heimdal/lib/krb5/auth_context.c     auth_context->keyblock->keytype = etype;
keytype           172 source4/heimdal/lib/krb5/convert_creds.c     krb5_keytype keytype;
keytype           174 source4/heimdal/lib/krb5/convert_creds.c     keytype = v5_creds->session.keytype;
keytype           176 source4/heimdal/lib/krb5/convert_creds.c     if (keytype != ENCTYPE_DES_CBC_CRC) {
keytype           182 source4/heimdal/lib/krb5/convert_creds.c 	template.session.keytype = ENCTYPE_DES_CBC_CRC;
keytype           239 source4/heimdal/lib/krb5/creds.c 					      mcreds->session.keytype,
keytype           240 source4/heimdal/lib/krb5/creds.c 					      creds->session.keytype);
keytype           128 source4/heimdal/lib/krb5/crypto.c     struct key_type *keytype;
keytype           294 source4/heimdal/lib/krb5/crypto.c     key->keytype = enctype;
keytype           365 source4/heimdal/lib/krb5/crypto.c     key->keytype = enctype;
keytype           481 source4/heimdal/lib/krb5/crypto.c     key->keytype = enctype;
keytype           619 source4/heimdal/lib/krb5/crypto.c     key->keytype = enctype;
keytype           673 source4/heimdal/lib/krb5/crypto.c     kd.key->keytype = enctype;
keytype           674 source4/heimdal/lib/krb5/crypto.c     ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size);
keytype           683 source4/heimdal/lib/krb5/crypto.c 				 et->keytype->size, kd.key->keyvalue.data);
keytype           908 source4/heimdal/lib/krb5/crypto.c     for (st = e->keytype->string_to_key; st && st->type; st++) {
keytype           940 source4/heimdal/lib/krb5/crypto.c     for (st = e->keytype->string_to_key; st && st->type; st++) {
keytype          1054 source4/heimdal/lib/krb5/crypto.c     for(st = et->keytype->string_to_key; st && st->type; st++)
keytype          1110 source4/heimdal/lib/krb5/crypto.c     *keysize = et->keytype->size;
keytype          1126 source4/heimdal/lib/krb5/crypto.c     *keybits = et->keytype->bits;
keytype          1143 source4/heimdal/lib/krb5/crypto.c     ret = krb5_data_alloc(&key->keyvalue, et->keytype->size);
keytype          1146 source4/heimdal/lib/krb5/crypto.c     key->keytype = type;
keytype          1147 source4/heimdal/lib/krb5/crypto.c     if(et->keytype->random_key)
keytype          1148 source4/heimdal/lib/krb5/crypto.c 	(*et->keytype->random_key)(context, key);
keytype          1160 source4/heimdal/lib/krb5/crypto.c     struct encryption_type *et = _find_enctype(key->key->keytype);
keytype          1161 source4/heimdal/lib/krb5/crypto.c     struct key_type *kt = et->keytype;
keytype          1777 source4/heimdal/lib/krb5/crypto.c 	(crypto->key.key->keytype == KEYTYPE_ARCFOUR);
keytype          2349 source4/heimdal/lib/krb5/crypto.c 	const EVP_CIPHER *c = (*crypto->et->keytype->evp)();
keytype          2657 source4/heimdal/lib/krb5/crypto.c     *keytype = e->keytype->type; /* XXX */
keytype          2748 source4/heimdal/lib/krb5/crypto.c     return e1 != NULL && e2 != NULL && e1->keytype == e2->keytype;
keytype          3790 source4/heimdal/lib/krb5/crypto.c     struct key_type *kt = et->keytype;
keytype          3956 source4/heimdal/lib/krb5/crypto.c 	etype = key->keytype;
keytype          3966 source4/heimdal/lib/krb5/crypto.c     if((*crypto)->et->keytype->size != key->keyvalue.length) {
keytype          3991 source4/heimdal/lib/krb5/crypto.c 	if (et->keytype->cleanup)
keytype          3992 source4/heimdal/lib/krb5/crypto.c 	    (*et->keytype->cleanup)(context, key);
keytype          4130 source4/heimdal/lib/krb5/crypto.c     keylen = et->keytype->bits / 8;
keytype          4138 source4/heimdal/lib/krb5/crypto.c     ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size);
keytype          4143 source4/heimdal/lib/krb5/crypto.c     kd.key->keytype = etype;
keytype          4281 source4/heimdal/lib/krb5/crypto.c     if ((et->keytype->bits + 7) / 8 > size) {
keytype          4286 source4/heimdal/lib/krb5/crypto.c 			       et->name, (int)et->keytype->size);
keytype          4289 source4/heimdal/lib/krb5/crypto.c     ret = krb5_data_alloc(&key->keyvalue, et->keytype->size);
keytype          4292 source4/heimdal/lib/krb5/crypto.c     key->keytype = type;
keytype          4293 source4/heimdal/lib/krb5/crypto.c     if (et->keytype->random_to_key)
keytype          4294 source4/heimdal/lib/krb5/crypto.c  	(*et->keytype->random_to_key)(context, key, data, size);
keytype          4296 source4/heimdal/lib/krb5/crypto.c 	memcpy(key->keyvalue.data, data, et->keytype->size);
keytype          4323 source4/heimdal/lib/krb5/crypto.c     keylen = (et->keytype->bits + 7) / 8;
keytype          4490 source4/heimdal/lib/krb5/crypto.c     keylen = (et->keytype->bits + 7) / 8;
keytype          4617 source4/heimdal/lib/krb5/crypto.c     if (keytype != KEYTYPE_DES || context->etypes_des == NULL)
keytype          4618 source4/heimdal/lib/krb5/crypto.c 	return krb5_keytype_to_enctypes (context, keytype, len, val);
keytype          4640 source4/heimdal/lib/krb5/crypto.c     struct key_type *kt = _find_keytype(keytype);
keytype          4643 source4/heimdal/lib/krb5/crypto.c 			       "key type %d not supported", keytype);
keytype          4666 source4/heimdal/lib/krb5/crypto.c 	    *keytype = keytypes[i]->type;
keytype          4671 source4/heimdal/lib/krb5/crypto.c     *keytype = strtol(string, &end, 0);
keytype          4672 source4/heimdal/lib/krb5/crypto.c     if(*end == '\0' && *keytype != 0) {
keytype          4673 source4/heimdal/lib/krb5/crypto.c 	if (krb5_enctype_valid(context, *keytype) == 0)
keytype          4693 source4/heimdal/lib/krb5/crypto.c 	if (etypes[i]->keytype->type == keytype
keytype          4704 source4/heimdal/lib/krb5/crypto.c 	if (etypes[i]->keytype->type == keytype
keytype            43 source4/heimdal/lib/krb5/generate_subkey.c     return krb5_generate_subkey_extended(context, key, key->keytype, subkey);
keytype            61 source4/heimdal/lib/krb5/generate_subkey.c 	etype = key->keytype; /* use session key etype */
keytype           153 source4/heimdal/lib/krb5/get_cred.c     if (in_creds->session.keytype) {
keytype           161 source4/heimdal/lib/krb5/get_cred.c 	t->req_body.etype.val[0] = in_creds->session.keytype;
keytype          1123 source4/heimdal/lib/krb5/get_cred.c     if (in_creds->session.keytype)
keytype          1132 source4/heimdal/lib/krb5/get_cred.c                                 in_creds->session.keytype ?
keytype          1326 source4/heimdal/lib/krb5/get_cred.c 	in_creds.session.keytype = opt->enctype;
keytype           378 source4/heimdal/lib/krb5/get_in_tkt.c     creds->session.keytype = rep->enc_part.key.keytype;
keytype            41 source4/heimdal/lib/krb5/keyblock.c     keyblock->keytype = 0;
keytype            53 source4/heimdal/lib/krb5/keyblock.c 	keyblock->keytype = ENCTYPE_NULL;
keytype            94 source4/heimdal/lib/krb5/keyblock.c     return block->keytype;
keytype           130 source4/heimdal/lib/krb5/keyblock.c     key->keytype = type;
keytype           313 source4/heimdal/lib/krb5/keytab.c     if(enctype && enctype != entry->keyblock.keytype)
keytype           148 source4/heimdal/lib/krb5/keytab_file.c     p->keytype = tmp;
keytype           165 source4/heimdal/lib/krb5/keytab_file.c     ret = krb5_store_int16(sp, p->keytype); /* keytype + etype */
keytype           718 source4/heimdal/lib/krb5/keytab_file.c 			   entry->vno, entry->keyblock.keytype)) {
keytype           260 source4/heimdal/lib/krb5/keytab_keyfile.c     entry->keyblock.keytype         = ETYPE_DES_CBC_MD5;
keytype           308 source4/heimdal/lib/krb5/keytab_keyfile.c     switch(entry->keyblock.keytype) {
keytype           207 source4/heimdal/lib/krb5/keytab_memory.c 			   entry->vno, entry->keyblock.keytype)) {
keytype           566 source4/heimdal/lib/krb5/krb5.h     krb5_keytype keytype;	/* ¿requested key type ? */
keytype           109 source4/heimdal/lib/krb5/mk_priv.c     s.enc_part.etype = key->keytype;
keytype            93 source4/heimdal/lib/krb5/mk_rep.c     ap.enc_part.etype = auth_context->keyblock->keytype;
keytype            64 source4/heimdal/lib/krb5/mk_req.c     if (auth_context && *auth_context && (*auth_context)->keytype)
keytype            65 source4/heimdal/lib/krb5/mk_req.c 	this_cred.session.keytype = (*auth_context)->keytype;
keytype            84 source4/heimdal/lib/krb5/mk_req_ext.c 	if(ac->keyblock->keytype == ETYPE_DES_CBC_CRC) {
keytype            93 source4/heimdal/lib/krb5/mk_req_ext.c 	} else if(ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5 ||
keytype            94 source4/heimdal/lib/krb5/mk_req_ext.c 		  ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5_56 ||
keytype            95 source4/heimdal/lib/krb5/mk_req_ext.c 		  ac->keyblock->keytype == ETYPE_DES_CBC_MD4 ||
keytype            96 source4/heimdal/lib/krb5/mk_req_ext.c 		  ac->keyblock->keytype == ETYPE_DES_CBC_MD5) {
keytype           130 source4/heimdal/lib/krb5/mk_req_ext.c 				    ac->keyblock->keytype,
keytype           141 source4/heimdal/lib/krb5/mk_req_ext.c     ret = krb5_build_ap_req (context, ac->keyblock->keytype,
keytype           464 source4/heimdal/lib/krb5/rd_req.c     ac->keytype = ETYPE_NULL;
keytype           471 source4/heimdal/lib/krb5/rd_req.c 		ac->keytype = etypes.val[i];
keytype           483 source4/heimdal/lib/krb5/rd_req.c 	if (ac->keytype != ETYPE_NULL)
keytype           601 source4/heimdal/lib/krb5/store.c     ret = krb5_store_int16(sp, p.keytype);
keytype           607 source4/heimdal/lib/krb5/store.c     ret = krb5_store_int16(sp, p.keytype);
keytype           623 source4/heimdal/lib/krb5/store.c     p->keytype = tmp;
keytype           894 source4/heimdal/lib/krb5/store.c     if (creds->session.keytype != ETYPE_NULL)
keytype           919 source4/heimdal/lib/krb5/store.c     if (creds->session.keytype != ETYPE_NULL) {
keytype           360 source4/kdc/hdb-samba4.c 				switch (pkb4->keys[i].keytype) {
keytype           399 source4/kdc/hdb-samba4.c 						 pkb4->keys[i].keytype,
keytype           423 source4/kdc/hdb-samba4.c 				switch (pkb3->keys[i].keytype) {
keytype           460 source4/kdc/hdb-samba4.c 						 pkb3->keys[i].keytype,
keytype           678 source4/kdc/hdb-samba4.c 		entry_ex->entry.etypes->val[i] = entry_ex->entry.keys.val[i].key.keytype;
keytype           867 source4/kdc/hdb-samba4.c 		entry_ex->entry.etypes->val[i] = entry_ex->entry.keys.val[i].key.keytype;