et                 87 source4/heimdal/kdc/524.c 	 const EncTicketPart *et,
et                 96 source4/heimdal/kdc/524.c 					     et->cname, et->crealm);
et                118 source4/heimdal/kdc/524.c 	      const EncTicketPart *et,
et                121 source4/heimdal/kdc/524.c     if(et->endtime < kdc_time){
et                125 source4/heimdal/kdc/524.c     if(et->flags.invalid){
et                140 source4/heimdal/kdc/524.c 	     EncTicketPart *et,
et                158 source4/heimdal/kdc/524.c     if (et->caddr && !krb5_address_search (context, v4_addr, et->caddr)) {
et                169 source4/heimdal/kdc/524.c 	if (et->caddr != NULL) {
et                170 source4/heimdal/kdc/524.c 	    free_HostAddresses(et->caddr);
et                172 source4/heimdal/kdc/524.c 	    et->caddr = malloc (sizeof (*et->caddr));
et                173 source4/heimdal/kdc/524.c 	    if (et->caddr == NULL) {
et                179 source4/heimdal/kdc/524.c 	et->caddr->val = v4_addr;
et                180 source4/heimdal/kdc/524.c 	et->caddr->len = 1;
et                226 source4/heimdal/kdc/524.c 		    const char *spn, const EncTicketPart et,
et                253 source4/heimdal/kdc/524.c 	if (!config->enable_v4_cross_realm && strcmp (et.crealm, t->realm) != 0) {
et                254 source4/heimdal/kdc/524.c 	    kdc_log(context, config, 0, "524 cross-realm %s -> %s disabled", et.crealm,
et                261 source4/heimdal/kdc/524.c 				    &et, &t->sname, &len);
et                302 source4/heimdal/kdc/524.c     EncTicketPart et;
et                346 source4/heimdal/kdc/524.c 				    &et, &len);
et                354 source4/heimdal/kdc/524.c     ret = log_524 (context, config, &et, from, spn);
et                356 source4/heimdal/kdc/524.c 	free_EncTicketPart(&et);
et                360 source4/heimdal/kdc/524.c     ret = verify_flags (context, config, &et, spn);
et                362 source4/heimdal/kdc/524.c 	free_EncTicketPart(&et);
et                366 source4/heimdal/kdc/524.c     ret = set_address (context, config, &et, addr, from);
et                368 source4/heimdal/kdc/524.c 	free_EncTicketPart(&et);
et                372 source4/heimdal/kdc/524.c     ret = encode_524_response(context, config, spn, et, t,
et                374 source4/heimdal/kdc/524.c     free_EncTicketPart(&et);
et                645 source4/heimdal/kdc/kerberos4.c 		      void *buf, size_t len, const EncTicketPart *et,
et                658 source4/heimdal/kdc/kerberos4.c 					   et->crealm);
et                670 source4/heimdal/kdc/kerberos4.c 					   et->cname,
et                671 source4/heimdal/kdc/kerberos4.c 					   et->crealm);
et                692 source4/heimdal/kdc/kerberos4.c 	if(et->caddr){
et                693 source4/heimdal/kdc/kerberos4.c 	    for(i = 0; i < et->caddr->len; i++)
et                694 source4/heimdal/kdc/kerberos4.c 		if(et->caddr->val[i].addr_type == AF_INET &&
et                695 source4/heimdal/kdc/kerberos4.c 		   et->caddr->val[i].address.length == 4){
et                696 source4/heimdal/kdc/kerberos4.c 		    memcpy(tmp, et->caddr->val[i].address.data, 4);
et                703 source4/heimdal/kdc/kerberos4.c     if((et->key.keytype != ETYPE_DES_CBC_MD5 &&
et                704 source4/heimdal/kdc/kerberos4.c 	et->key.keytype != ETYPE_DES_CBC_MD4 &&
et                705 source4/heimdal/kdc/kerberos4.c 	et->key.keytype != ETYPE_DES_CBC_CRC) ||
et                706 source4/heimdal/kdc/kerberos4.c        et->key.keyvalue.length != 8)
et                708 source4/heimdal/kdc/kerberos4.c     krb5_storage_write(sp, et->key.keyvalue.data, 8);
et                711 source4/heimdal/kdc/kerberos4.c 	time_t start = et->starttime ? *et->starttime : et->authtime;
et                712 source4/heimdal/kdc/kerberos4.c 	krb5_store_int8(sp, krb_time_to_life(start, et->endtime));
et                260 source4/heimdal/kdc/kerberos5.c 		  KDC_REP *rep, const EncTicketPart *et, EncKDCRepPart *ek,
et                273 source4/heimdal/kdc/kerberos5.c     ASN1_MALLOC_ENCODE(EncTicketPart, buf, buf_size, et, &len, ret);
et                979 source4/heimdal/kdc/kerberos5.c     EncTicketPart et;
et               1083 source4/heimdal/kdc/kerberos5.c     memset(&et, 0, sizeof(et));
et               1136 source4/heimdal/kdc/kerberos5.c 	    et.flags.pre_authent = 1;
et               1276 source4/heimdal/kdc/kerberos5.c 	    et.flags.pre_authent = 1;
et               1295 source4/heimdal/kdc/kerberos5.c 	if(found_pa && et.flags.pre_authent == 0){
et               1469 source4/heimdal/kdc/kerberos5.c     et.flags.initial = 1;
et               1471 source4/heimdal/kdc/kerberos5.c 	et.flags.forwardable = f.forwardable;
et               1479 source4/heimdal/kdc/kerberos5.c 	et.flags.proxiable = f.proxiable;
et               1487 source4/heimdal/kdc/kerberos5.c 	et.flags.may_postdate = f.allow_postdate;
et               1503 source4/heimdal/kdc/kerberos5.c     ret = krb5_generate_random_keyblock(context, sessionetype, &et.key);
et               1506 source4/heimdal/kdc/kerberos5.c     copy_PrincipalName(&rep.cname, &et.cname);
et               1507 source4/heimdal/kdc/kerberos5.c     copy_Realm(&rep.crealm, &et.crealm);
et               1513 source4/heimdal/kdc/kerberos5.c 	start = et.authtime = kdc_time;
et               1516 source4/heimdal/kdc/kerberos5.c 	    ALLOC(et.starttime);
et               1517 source4/heimdal/kdc/kerberos5.c 	    start = *et.starttime = *req->req_body.from;
et               1518 source4/heimdal/kdc/kerberos5.c 	    et.flags.invalid = 1;
et               1519 source4/heimdal/kdc/kerberos5.c 	    et.flags.postdated = 1; /* XXX ??? */
et               1533 source4/heimdal/kdc/kerberos5.c 	et.endtime = t;
et               1534 source4/heimdal/kdc/kerberos5.c 	if(f.renewable_ok && et.endtime < *b->till){
et               1554 source4/heimdal/kdc/kerberos5.c 	    ALLOC(et.renew_till);
et               1555 source4/heimdal/kdc/kerberos5.c 	    *et.renew_till = t;
et               1556 source4/heimdal/kdc/kerberos5.c 	    et.flags.renewable = 1;
et               1561 source4/heimdal/kdc/kerberos5.c 	et.flags.anonymous = 1;
et               1564 source4/heimdal/kdc/kerberos5.c 	ALLOC(et.caddr);
et               1565 source4/heimdal/kdc/kerberos5.c 	copy_HostAddresses(b->addresses, et.caddr);
et               1568 source4/heimdal/kdc/kerberos5.c     et.transited.tr_type = DOMAIN_X500_COMPRESS;
et               1569 source4/heimdal/kdc/kerberos5.c     krb5_data_zero(&et.transited.contents);
et               1571 source4/heimdal/kdc/kerberos5.c     copy_EncryptionKey(&et.key, &ek.key);
et               1618 source4/heimdal/kdc/kerberos5.c     ek.flags = et.flags;
et               1619 source4/heimdal/kdc/kerberos5.c     ek.authtime = et.authtime;
et               1620 source4/heimdal/kdc/kerberos5.c     if (et.starttime) {
et               1622 source4/heimdal/kdc/kerberos5.c 	*ek.starttime = *et.starttime;
et               1624 source4/heimdal/kdc/kerberos5.c     ek.endtime = et.endtime;
et               1625 source4/heimdal/kdc/kerberos5.c     if (et.renew_till) {
et               1627 source4/heimdal/kdc/kerberos5.c 	*ek.renew_till = *et.renew_till;
et               1631 source4/heimdal/kdc/kerberos5.c     if(et.caddr){
et               1633 source4/heimdal/kdc/kerberos5.c 	copy_HostAddresses(et.caddr, ek.caddr);
et               1651 source4/heimdal/kdc/kerberos5.c 					   &et);
et               1680 source4/heimdal/kdc/kerberos5.c 	ret = krb5_crypto_init(context, &et.key, 0, &crypto);
et               1728 source4/heimdal/kdc/kerberos5.c 	    ret = _krb5_pac_sign(context, p, et.authtime,
et               1740 source4/heimdal/kdc/kerberos5.c 	    ret = _kdc_tkt_add_if_relevant_ad(context, &et,
et               1749 source4/heimdal/kdc/kerberos5.c     _kdc_log_timestamp(context, config, "AS-REQ", et.authtime, et.starttime,
et               1750 source4/heimdal/kdc/kerberos5.c 		       et.endtime, et.renew_till);
et               1759 source4/heimdal/kdc/kerberos5.c 				  &et);
et               1764 source4/heimdal/kdc/kerberos5.c 			    &rep, &et, &ek, setype, server->entry.kvno,
et               1767 source4/heimdal/kdc/kerberos5.c     free_EncTicketPart(&et);
et                363 source4/heimdal/kdc/krb5tgs.c 		KDC_REQ_BODY *b, const EncTicketPart *tgt, EncTicketPart *et)
et                379 source4/heimdal/kdc/krb5tgs.c 	et->flags.invalid = 0;
et                392 source4/heimdal/kdc/krb5tgs.c 	et->flags.forwardable = 1;
et                400 source4/heimdal/kdc/krb5tgs.c 	et->flags.forwarded = 1;
et                401 source4/heimdal/kdc/krb5tgs.c 	et->caddr = b->addresses;
et                404 source4/heimdal/kdc/krb5tgs.c 	et->flags.forwarded = 1;
et                412 source4/heimdal/kdc/krb5tgs.c 	et->flags.proxiable = 1;
et                420 source4/heimdal/kdc/krb5tgs.c 	et->flags.proxy = 1;
et                421 source4/heimdal/kdc/krb5tgs.c 	et->caddr = b->addresses;
et                424 source4/heimdal/kdc/krb5tgs.c 	et->flags.proxy = 1;
et                432 source4/heimdal/kdc/krb5tgs.c 	et->flags.may_postdate = 1;
et                441 source4/heimdal/kdc/krb5tgs.c 	    *et->starttime = *b->from;
et                442 source4/heimdal/kdc/krb5tgs.c 	et->flags.postdated = 1;
et                443 source4/heimdal/kdc/krb5tgs.c 	et->flags.invalid = 1;
et                455 source4/heimdal/kdc/krb5tgs.c 	et->flags.renewable = 1;
et                456 source4/heimdal/kdc/krb5tgs.c 	ALLOC(et->renew_till);
et                458 source4/heimdal/kdc/krb5tgs.c 	*et->renew_till = *b->rtime;
et                472 source4/heimdal/kdc/krb5tgs.c 	et->endtime = *et->starttime + old_life;
et                473 source4/heimdal/kdc/krb5tgs.c 	if (et->renew_till != NULL)
et                474 source4/heimdal/kdc/krb5tgs.c 	    et->endtime = min(*et->renew_till, et->endtime);
et                526 source4/heimdal/kdc/krb5tgs.c 	      const EncTicketPart *et,
et                529 source4/heimdal/kdc/krb5tgs.c     if(et->endtime < kdc_time){
et                533 source4/heimdal/kdc/krb5tgs.c     if(et->flags.invalid){
et                549 source4/heimdal/kdc/krb5tgs.c 		       EncTicketPart *et,
et                640 source4/heimdal/kdc/krb5tgs.c 	et->flags.transited_policy_checked = 1;
et                642 source4/heimdal/kdc/krb5tgs.c     et->transited.tr_type = DOMAIN_X500_COMPRESS;
et                643 source4/heimdal/kdc/krb5tgs.c     ret = krb5_domain_x500_encode(realms, num_realms, &et->transited.contents);
et                679 source4/heimdal/kdc/krb5tgs.c     EncTicketPart et;
et                685 source4/heimdal/kdc/krb5tgs.c     memset(&et, 0, sizeof(et));
et                691 source4/heimdal/kdc/krb5tgs.c     et.authtime = tgt->authtime;
et                693 source4/heimdal/kdc/krb5tgs.c     et.endtime = min(tgt->endtime, *b->till);
et                694 source4/heimdal/kdc/krb5tgs.c     ALLOC(et.starttime);
et                695 source4/heimdal/kdc/krb5tgs.c     *et.starttime = kdc_time;
et                697 source4/heimdal/kdc/krb5tgs.c     ret = check_tgs_flags(context, config, b, tgt, &et);
et                727 source4/heimdal/kdc/krb5tgs.c 				 &tgt->transited, &et,
et                746 source4/heimdal/kdc/krb5tgs.c     ek.caddr = et.caddr;
et                747 source4/heimdal/kdc/krb5tgs.c     if(et.caddr == NULL)
et                748 source4/heimdal/kdc/krb5tgs.c 	et.caddr = tgt->caddr;
et                752 source4/heimdal/kdc/krb5tgs.c 	life = et.endtime - *et.starttime;
et                757 source4/heimdal/kdc/krb5tgs.c 	et.endtime = *et.starttime + life;
et                760 source4/heimdal/kdc/krb5tgs.c        et.renew_till == NULL && et.endtime < *b->till){
et                761 source4/heimdal/kdc/krb5tgs.c 	et.flags.renewable = 1;
et                762 source4/heimdal/kdc/krb5tgs.c 	ALLOC(et.renew_till);
et                763 source4/heimdal/kdc/krb5tgs.c 	*et.renew_till = *b->till;
et                765 source4/heimdal/kdc/krb5tgs.c     if(et.renew_till){
et                767 source4/heimdal/kdc/krb5tgs.c 	renew = *et.renew_till - et.authtime;
et                772 source4/heimdal/kdc/krb5tgs.c 	*et.renew_till = et.authtime + renew;
et                775 source4/heimdal/kdc/krb5tgs.c     if(et.renew_till){
et                776 source4/heimdal/kdc/krb5tgs.c 	*et.renew_till = min(*et.renew_till, *tgt->renew_till);
et                777 source4/heimdal/kdc/krb5tgs.c 	*et.starttime = min(*et.starttime, *et.renew_till);
et                778 source4/heimdal/kdc/krb5tgs.c 	et.endtime = min(et.endtime, *et.renew_till);
et                781 source4/heimdal/kdc/krb5tgs.c     *et.starttime = min(*et.starttime, et.endtime);
et                783 source4/heimdal/kdc/krb5tgs.c     if(*et.starttime == et.endtime){
et                787 source4/heimdal/kdc/krb5tgs.c     if(et.renew_till && et.endtime == *et.renew_till){
et                788 source4/heimdal/kdc/krb5tgs.c 	free(et.renew_till);
et                789 source4/heimdal/kdc/krb5tgs.c 	et.renew_till = NULL;
et                790 source4/heimdal/kdc/krb5tgs.c 	et.flags.renewable = 0;
et                793 source4/heimdal/kdc/krb5tgs.c     et.flags.pre_authent = tgt->flags.pre_authent;
et                794 source4/heimdal/kdc/krb5tgs.c     et.flags.hw_authent  = tgt->flags.hw_authent;
et                795 source4/heimdal/kdc/krb5tgs.c     et.flags.anonymous   = tgt->flags.anonymous;
et                796 source4/heimdal/kdc/krb5tgs.c     et.flags.ok_as_delegate = server->entry.flags.ok_as_delegate;
et                800 source4/heimdal/kdc/krb5tgs.c 	et.authorization_data = calloc(1, sizeof(*et.authorization_data));
et                801 source4/heimdal/kdc/krb5tgs.c 	if (et.authorization_data == NULL) {
et                805 source4/heimdal/kdc/krb5tgs.c 	ret = copy_AuthorizationData(auth_data, et.authorization_data);
et                810 source4/heimdal/kdc/krb5tgs.c 	ret = find_KRB5SignedPath(context, et.authorization_data, NULL);
et                812 source4/heimdal/kdc/krb5tgs.c 	    if (et.authorization_data->len == 1) {
et                813 source4/heimdal/kdc/krb5tgs.c 		free_AuthorizationData(et.authorization_data);
et                814 source4/heimdal/kdc/krb5tgs.c 		free(et.authorization_data);
et                815 source4/heimdal/kdc/krb5tgs.c 		et.authorization_data = NULL;
et                817 source4/heimdal/kdc/krb5tgs.c 		AuthorizationData *ad = et.authorization_data;
et                829 source4/heimdal/kdc/krb5tgs.c 	ret = _kdc_tkt_add_if_relevant_ad(context, &et,
et                836 source4/heimdal/kdc/krb5tgs.c     ret = krb5_copy_keyblock_contents(context, sessionkey, &et.key);
et                839 source4/heimdal/kdc/krb5tgs.c     et.crealm = tgt->crealm;
et                840 source4/heimdal/kdc/krb5tgs.c     et.cname = tgt_name->name;
et                842 source4/heimdal/kdc/krb5tgs.c     ek.key = et.key;
et                851 source4/heimdal/kdc/krb5tgs.c     ek.flags = et.flags;
et                852 source4/heimdal/kdc/krb5tgs.c     ek.authtime = et.authtime;
et                853 source4/heimdal/kdc/krb5tgs.c     ek.starttime = et.starttime;
et                854 source4/heimdal/kdc/krb5tgs.c     ek.endtime = et.endtime;
et                855 source4/heimdal/kdc/krb5tgs.c     ek.renew_till = et.renew_till;
et                859 source4/heimdal/kdc/krb5tgs.c     _kdc_log_timestamp(context, config, "TGS-REQ", et.authtime, et.starttime,
et                860 source4/heimdal/kdc/krb5tgs.c 		       et.endtime, et.renew_till);
et                873 source4/heimdal/kdc/krb5tgs.c 					  &et);
et                890 source4/heimdal/kdc/krb5tgs.c     if (krb5_enctype_valid(context, et.key.keytype) != 0
et                891 source4/heimdal/kdc/krb5tgs.c 	&& _kdc_is_weak_expection(server->entry.principal, et.key.keytype))
et                893 source4/heimdal/kdc/krb5tgs.c 	krb5_enctype_enable(context, et.key.keytype);
et                909 source4/heimdal/kdc/krb5tgs.c 			    &rep, &et, &ek, et.key.keytype,
et                913 source4/heimdal/kdc/krb5tgs.c 	krb5_enctype_disable(context, et.key.keytype);
et                917 source4/heimdal/kdc/krb5tgs.c     free_TransitedEncoding(&et.transited);
et                918 source4/heimdal/kdc/krb5tgs.c     if(et.starttime)
et                919 source4/heimdal/kdc/krb5tgs.c 	free(et.starttime);
et                920 source4/heimdal/kdc/krb5tgs.c     if(et.renew_till)
et                921 source4/heimdal/kdc/krb5tgs.c 	free(et.renew_till);
et                922 source4/heimdal/kdc/krb5tgs.c     if(et.authorization_data) {
et                923 source4/heimdal/kdc/krb5tgs.c 	free_AuthorizationData(et.authorization_data);
et                924 source4/heimdal/kdc/krb5tgs.c 	free(et.authorization_data);
et                927 source4/heimdal/kdc/krb5tgs.c     memset(et.key.keyvalue.data, 0, et.key.keyvalue.length);
et                928 source4/heimdal/kdc/krb5tgs.c     free_EncryptionKey(&et.key);
et                163 source4/heimdal/lib/com_err/com_err.c     struct et_list *et;
et                165 source4/heimdal/lib/com_err/com_err.c     for (et = _et_list; et; et = et->next) {
et                166 source4/heimdal/lib/com_err/com_err.c 	if (et->table->base == new_table->table->base)
et                 69 source4/heimdal/lib/com_err/error.c     struct error_table et;
et                 78 source4/heimdal/lib/com_err/error.c     struct et_list *et, **end;
et                 80 source4/heimdal/lib/com_err/error.c     for (end = list, et = *list; et; end = &et->next, et = et->next)
et                 81 source4/heimdal/lib/com_err/error.c         if (et->table->msgs == messages)
et                 86 source4/heimdal/lib/com_err/error.c     et = &f->etl;
et                 87 source4/heimdal/lib/com_err/error.c     et->table = &f->et;
et                 88 source4/heimdal/lib/com_err/error.c     et->table->msgs = messages;
et                 89 source4/heimdal/lib/com_err/error.c     et->table->n_msgs = num_errors;
et                 90 source4/heimdal/lib/com_err/error.c     et->table->base = base;
et                 91 source4/heimdal/lib/com_err/error.c     et->next = NULL;
et                 92 source4/heimdal/lib/com_err/error.c     *end = et;
et                 97 source4/heimdal/lib/com_err/error.c free_error_table(struct et_list *et)
et                 99 source4/heimdal/lib/com_err/error.c     while(et){
et                100 source4/heimdal/lib/com_err/error.c 	struct et_list *p = et;
et                101 source4/heimdal/lib/com_err/error.c 	et = et->next;
et                 68 source4/heimdal/lib/com_err/parse.y header		: id et
et                 69 source4/heimdal/lib/com_err/parse.y 		| et
et                 78 source4/heimdal/lib/com_err/parse.y et		: ET STRING
et                 66 source4/heimdal/lib/krb5/crypto.c     struct encryption_type *et;
et                 72 source4/heimdal/lib/krb5/crypto.c #define CRYPTO_ETYPE(C) ((C)->et->type)
et                153 source4/heimdal/lib/krb5/crypto.c 				  struct encryption_type *et,
et                651 source4/heimdal/lib/krb5/crypto.c     struct encryption_type *et;
et                663 source4/heimdal/lib/krb5/crypto.c     et = _find_enctype(enctype);
et                664 source4/heimdal/lib/krb5/crypto.c     if (et == NULL)
et                674 source4/heimdal/lib/krb5/crypto.c     ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size);
et                683 source4/heimdal/lib/krb5/crypto.c 				 et->keytype->size, kd.key->keyvalue.data);
et                685 source4/heimdal/lib/krb5/crypto.c 	free_key_data(context, &kd, et);
et                691 source4/heimdal/lib/krb5/crypto.c     ret = derive_key(context, et, &kd, "kerberos", strlen("kerberos"));
et                694 source4/heimdal/lib/krb5/crypto.c     free_key_data(context, &kd, et);
et               1046 source4/heimdal/lib/krb5/crypto.c     struct encryption_type *et =_find_enctype(enctype);
et               1048 source4/heimdal/lib/krb5/crypto.c     if(et == NULL) {
et               1054 source4/heimdal/lib/krb5/crypto.c     for(st = et->keytype->string_to_key; st && st->type; st++)
et               1103 source4/heimdal/lib/krb5/crypto.c     struct encryption_type *et = _find_enctype(type);
et               1104 source4/heimdal/lib/krb5/crypto.c     if(et == NULL) {
et               1110 source4/heimdal/lib/krb5/crypto.c     *keysize = et->keytype->size;
et               1119 source4/heimdal/lib/krb5/crypto.c     struct encryption_type *et = _find_enctype(type);
et               1120 source4/heimdal/lib/krb5/crypto.c     if(et == NULL) {
et               1126 source4/heimdal/lib/krb5/crypto.c     *keybits = et->keytype->bits;
et               1136 source4/heimdal/lib/krb5/crypto.c     struct encryption_type *et = _find_enctype(type);
et               1137 source4/heimdal/lib/krb5/crypto.c     if(et == NULL) {
et               1143 source4/heimdal/lib/krb5/crypto.c     ret = krb5_data_alloc(&key->keyvalue, et->keytype->size);
et               1147 source4/heimdal/lib/krb5/crypto.c     if(et->keytype->random_key)
et               1148 source4/heimdal/lib/krb5/crypto.c 	(*et->keytype->random_key)(context, key);
et               1160 source4/heimdal/lib/krb5/crypto.c     struct encryption_type *et = _find_enctype(key->key->keytype);
et               1161 source4/heimdal/lib/krb5/crypto.c     struct key_type *kt = et->keytype;
et               1796 source4/heimdal/lib/krb5/crypto.c 	ct = crypto->et->keyed_checksum;
et               1798 source4/heimdal/lib/krb5/crypto.c 	    ct = crypto->et->checksum;
et               1918 source4/heimdal/lib/krb5/crypto.c         ct = crypto->et->keyed_checksum;
et               1920 source4/heimdal/lib/krb5/crypto.c             ct = crypto->et->checksum;
et               2317 source4/heimdal/lib/krb5/crypto.c     struct checksum_type *ct = crypto->et->checksum;
et               2335 source4/heimdal/lib/krb5/crypto.c     if (result.checksum.length < crypto->et->blocksize)
et               2340 source4/heimdal/lib/krb5/crypto.c 			  crypto->et->type, "prf", 3, &derived);
et               2344 source4/heimdal/lib/krb5/crypto.c     ret = krb5_data_alloc(out, crypto->et->blocksize);
et               2349 source4/heimdal/lib/krb5/crypto.c 	const EVP_CIPHER *c = (*crypto->et->keytype->evp)();
et               2755 source4/heimdal/lib/krb5/crypto.c     return (crypto->et->flags & F_DERIVED) != 0;
et               2762 source4/heimdal/lib/krb5/crypto.c     return (crypto->et->flags & F_SPECIAL) != 0;
et               2782 source4/heimdal/lib/krb5/crypto.c     const struct encryption_type *et = crypto->et;
et               2784 source4/heimdal/lib/krb5/crypto.c     checksum_sz = CHECKSUMSIZE(et->keyed_checksum);
et               2786 source4/heimdal/lib/krb5/crypto.c     sz = et->confoundersize + len;
et               2787 source4/heimdal/lib/krb5/crypto.c     block_sz = (sz + et->padsize - 1) &~ (et->padsize - 1); /* pad */
et               2796 source4/heimdal/lib/krb5/crypto.c     krb5_generate_random_block(q, et->confoundersize); /* XXX */
et               2797 source4/heimdal/lib/krb5/crypto.c     q += et->confoundersize;
et               2801 source4/heimdal/lib/krb5/crypto.c 			  et->keyed_checksum,
et               2822 source4/heimdal/lib/krb5/crypto.c     ret = (*et->encrypt)(context, dkey, p, block_sz, 1, usage, ivec);
et               2847 source4/heimdal/lib/krb5/crypto.c     const struct encryption_type *et = crypto->et;
et               2849 source4/heimdal/lib/krb5/crypto.c     checksum_sz = CHECKSUMSIZE(et->checksum);
et               2851 source4/heimdal/lib/krb5/crypto.c     sz = et->confoundersize + checksum_sz + len;
et               2852 source4/heimdal/lib/krb5/crypto.c     block_sz = (sz + et->padsize - 1) &~ (et->padsize - 1); /* pad */
et               2860 source4/heimdal/lib/krb5/crypto.c     krb5_generate_random_block(q, et->confoundersize); /* XXX */
et               2861 source4/heimdal/lib/krb5/crypto.c     q += et->confoundersize;
et               2867 source4/heimdal/lib/krb5/crypto.c 			  et->checksum,
et               2880 source4/heimdal/lib/krb5/crypto.c     memcpy(p + et->confoundersize, cksum.checksum.data, cksum.checksum.length);
et               2885 source4/heimdal/lib/krb5/crypto.c     ret = (*et->encrypt)(context, &crypto->key, p, block_sz, 1, 0, ivec);
et               2909 source4/heimdal/lib/krb5/crypto.c     struct encryption_type *et = crypto->et;
et               2910 source4/heimdal/lib/krb5/crypto.c     size_t cksum_sz = CHECKSUMSIZE(et->checksum);
et               2911 source4/heimdal/lib/krb5/crypto.c     size_t sz = len + cksum_sz + et->confoundersize;
et               2923 source4/heimdal/lib/krb5/crypto.c     krb5_generate_random_block(p, et->confoundersize);
et               2924 source4/heimdal/lib/krb5/crypto.c     p += et->confoundersize;
et               2926 source4/heimdal/lib/krb5/crypto.c     ret = (*et->encrypt)(context, &crypto->key, tmp, sz, TRUE, usage, ivec);
et               2951 source4/heimdal/lib/krb5/crypto.c     struct encryption_type *et = crypto->et;
et               2954 source4/heimdal/lib/krb5/crypto.c     checksum_sz = CHECKSUMSIZE(et->keyed_checksum);
et               2955 source4/heimdal/lib/krb5/crypto.c     if (len < checksum_sz + et->confoundersize) {
et               2962 source4/heimdal/lib/krb5/crypto.c     if (((len - checksum_sz) % et->padsize) != 0) {
et               2986 source4/heimdal/lib/krb5/crypto.c     ret = (*et->encrypt)(context, dkey, p, len, 0, usage, ivec);
et               2994 source4/heimdal/lib/krb5/crypto.c     cksum.cksumtype       = CHECKSUMTYPE(et->keyed_checksum);
et               3006 source4/heimdal/lib/krb5/crypto.c     l = len - et->confoundersize;
et               3007 source4/heimdal/lib/krb5/crypto.c     memmove(p, p + et->confoundersize, l);
et               3030 source4/heimdal/lib/krb5/crypto.c     struct encryption_type *et = crypto->et;
et               3032 source4/heimdal/lib/krb5/crypto.c     if ((len % et->padsize) != 0) {
et               3037 source4/heimdal/lib/krb5/crypto.c     checksum_sz = CHECKSUMSIZE(et->checksum);
et               3050 source4/heimdal/lib/krb5/crypto.c     ret = (*et->encrypt)(context, &crypto->key, p, len, 0, 0, ivec);
et               3055 source4/heimdal/lib/krb5/crypto.c     ret = krb5_data_copy(&cksum.checksum, p + et->confoundersize, checksum_sz);
et               3060 source4/heimdal/lib/krb5/crypto.c     memset(p + et->confoundersize, 0, checksum_sz);
et               3061 source4/heimdal/lib/krb5/crypto.c     cksum.cksumtype = CHECKSUMTYPE(et->checksum);
et               3068 source4/heimdal/lib/krb5/crypto.c     l = len - et->confoundersize - checksum_sz;
et               3069 source4/heimdal/lib/krb5/crypto.c     memmove(p, p + et->confoundersize + checksum_sz, l);
et               3089 source4/heimdal/lib/krb5/crypto.c     struct encryption_type *et = crypto->et;
et               3090 source4/heimdal/lib/krb5/crypto.c     size_t cksum_sz = CHECKSUMSIZE(et->checksum);
et               3091 source4/heimdal/lib/krb5/crypto.c     size_t sz = len - cksum_sz - et->confoundersize;
et               3095 source4/heimdal/lib/krb5/crypto.c     if ((len % et->padsize) != 0) {
et               3107 source4/heimdal/lib/krb5/crypto.c     ret = (*et->encrypt)(context, &crypto->key, p, len, FALSE, usage, ivec);
et               3113 source4/heimdal/lib/krb5/crypto.c     memmove (p, p + cksum_sz + et->confoundersize, sz);
et               3172 source4/heimdal/lib/krb5/crypto.c     const struct encryption_type *et = crypto->et;
et               3180 source4/heimdal/lib/krb5/crypto.c     headersz = et->confoundersize;
et               3181 source4/heimdal/lib/krb5/crypto.c     trailersz = CHECKSUMSIZE(et->keyed_checksum);
et               3191 source4/heimdal/lib/krb5/crypto.c     block_sz = (sz + et->padsize - 1) &~ (et->padsize - 1); /* pad */
et               3251 source4/heimdal/lib/krb5/crypto.c 			  et->keyed_checksum,
et               3314 source4/heimdal/lib/krb5/crypto.c     ret = (*et->encrypt)(context, dkey, p, len, 1, usage, ivec);
et               3372 source4/heimdal/lib/krb5/crypto.c     struct encryption_type *et = crypto->et;
et               3380 source4/heimdal/lib/krb5/crypto.c     headersz = et->confoundersize;
et               3381 source4/heimdal/lib/krb5/crypto.c     trailersz = CHECKSUMSIZE(et->keyed_checksum);
et               3388 source4/heimdal/lib/krb5/crypto.c     block_sz = (sz + et->padsize - 1) &~ (et->padsize - 1); /* pad */
et               3442 source4/heimdal/lib/krb5/crypto.c     ret = (*et->encrypt)(context, dkey, p, len, 0, usage, ivec);
et               3489 source4/heimdal/lib/krb5/crypto.c     cksum.cksumtype       = CHECKSUMTYPE(et->keyed_checksum);
et               3591 source4/heimdal/lib/krb5/crypto.c 	return crypto->et->blocksize;
et               3593 source4/heimdal/lib/krb5/crypto.c 	if (crypto->et->padsize > 1)
et               3594 source4/heimdal/lib/krb5/crypto.c 	    return crypto->et->padsize;
et               3597 source4/heimdal/lib/krb5/crypto.c 	return CHECKSUMSIZE(crypto->et->keyed_checksum);
et               3599 source4/heimdal/lib/krb5/crypto.c 	if (crypto->et->keyed_checksum)
et               3600 source4/heimdal/lib/krb5/crypto.c 	    return CHECKSUMSIZE(crypto->et->keyed_checksum);
et               3601 source4/heimdal/lib/krb5/crypto.c 	return CHECKSUMSIZE(crypto->et->checksum);
et               3782 source4/heimdal/lib/krb5/crypto.c 	   struct encryption_type *et,
et               3790 source4/heimdal/lib/krb5/crypto.c     struct key_type *kt = et->keytype;
et               3795 source4/heimdal/lib/krb5/crypto.c     if(et->blocksize * 8 < kt->bits || len != et->blocksize) {
et               3796 source4/heimdal/lib/krb5/crypto.c 	nblocks = (kt->bits + et->blocksize * 8 - 1) / (et->blocksize * 8);
et               3797 source4/heimdal/lib/krb5/crypto.c 	k = malloc(nblocks * et->blocksize);
et               3802 source4/heimdal/lib/krb5/crypto.c 	ret = _krb5_n_fold(constant, len, k, et->blocksize);
et               3810 source4/heimdal/lib/krb5/crypto.c 		memcpy(k + i * et->blocksize,
et               3811 source4/heimdal/lib/krb5/crypto.c 		       k + (i - 1) * et->blocksize,
et               3812 source4/heimdal/lib/krb5/crypto.c 		       et->blocksize);
et               3813 source4/heimdal/lib/krb5/crypto.c 	    (*et->encrypt)(context, key, k + i * et->blocksize, et->blocksize,
et               3826 source4/heimdal/lib/krb5/crypto.c 	(*et->encrypt)(context, key, c, len, 1, 0, NULL);
et               3845 source4/heimdal/lib/krb5/crypto.c 	DES3_postproc(context, k, nblocks * et->blocksize, key);
et               3862 source4/heimdal/lib/krb5/crypto.c     memset(k, 0, nblocks * et->blocksize);
et               3890 source4/heimdal/lib/krb5/crypto.c     struct encryption_type *et;
et               3895 source4/heimdal/lib/krb5/crypto.c     et = _find_enctype (etype);
et               3896 source4/heimdal/lib/krb5/crypto.c     if (et == NULL) {
et               3908 source4/heimdal/lib/krb5/crypto.c     ret = derive_key(context, et, &d, constant, constant_len);
et               3911 source4/heimdal/lib/krb5/crypto.c     free_key_data(context, &d, et);
et               3937 source4/heimdal/lib/krb5/crypto.c     derive_key(context, crypto->et, d, constant, sizeof(constant));
et               3957 source4/heimdal/lib/krb5/crypto.c     (*crypto)->et = _find_enctype(etype);
et               3958 source4/heimdal/lib/krb5/crypto.c     if((*crypto)->et == NULL || ((*crypto)->et->flags & F_DISABLED)) {
et               3966 source4/heimdal/lib/krb5/crypto.c     if((*crypto)->et->keytype->size != key->keyvalue.length) {
et               3987 source4/heimdal/lib/krb5/crypto.c 	      struct encryption_type *et)
et               3991 source4/heimdal/lib/krb5/crypto.c 	if (et->keytype->cleanup)
et               3992 source4/heimdal/lib/krb5/crypto.c 	    (*et->keytype->cleanup)(context, key);
et               4000 source4/heimdal/lib/krb5/crypto.c 	       struct encryption_type *et)
et               4002 source4/heimdal/lib/krb5/crypto.c     free_key_data(context, &ku->key, et);
et               4012 source4/heimdal/lib/krb5/crypto.c 	free_key_usage(context, &crypto->key_usage[i], crypto->et);
et               4014 source4/heimdal/lib/krb5/crypto.c     free_key_data(context, &crypto->key, crypto->et);
et               4024 source4/heimdal/lib/krb5/crypto.c     *blocksize = crypto->et->blocksize;
et               4033 source4/heimdal/lib/krb5/crypto.c     *enctype = crypto->et->type;
et               4042 source4/heimdal/lib/krb5/crypto.c     *padsize = crypto->et->padsize;
et               4051 source4/heimdal/lib/krb5/crypto.c     *confoundersize = crypto->et->confoundersize;
et               4071 source4/heimdal/lib/krb5/crypto.c     struct encryption_type *et = _find_enctype(enctype);
et               4072 source4/heimdal/lib/krb5/crypto.c     if(et == NULL) {
et               4079 source4/heimdal/lib/krb5/crypto.c     et->flags |= F_DISABLED;
et               4098 source4/heimdal/lib/krb5/crypto.c     struct encryption_type *et = _find_enctype(enctype);
et               4099 source4/heimdal/lib/krb5/crypto.c     if(et == NULL) {
et               4106 source4/heimdal/lib/krb5/crypto.c     et->flags &= ~F_DISABLED;
et               4118 source4/heimdal/lib/krb5/crypto.c     struct encryption_type *et = _find_enctype(etype);
et               4124 source4/heimdal/lib/krb5/crypto.c     if(et == NULL) {
et               4130 source4/heimdal/lib/krb5/crypto.c     keylen = et->keytype->bits / 8;
et               4138 source4/heimdal/lib/krb5/crypto.c     ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size);
et               4161 source4/heimdal/lib/krb5/crypto.c 		     et,
et               4166 source4/heimdal/lib/krb5/crypto.c 	free_key_data(context, &kd, et);
et               4170 source4/heimdal/lib/krb5/crypto.c     free_key_data(context, &kd, et);
et               4179 source4/heimdal/lib/krb5/crypto.c     struct encryption_type *et = crypto->et;
et               4180 source4/heimdal/lib/krb5/crypto.c     size_t padsize = et->padsize;
et               4181 source4/heimdal/lib/krb5/crypto.c     size_t checksumsize = CHECKSUMSIZE(et->checksum);
et               4184 source4/heimdal/lib/krb5/crypto.c     res =  et->confoundersize + checksumsize + data_len;
et               4194 source4/heimdal/lib/krb5/crypto.c     struct encryption_type *et = crypto->et;
et               4195 source4/heimdal/lib/krb5/crypto.c     size_t padsize = et->padsize;
et               4198 source4/heimdal/lib/krb5/crypto.c     res =  et->confoundersize + data_len;
et               4200 source4/heimdal/lib/krb5/crypto.c     if (et->keyed_checksum)
et               4201 source4/heimdal/lib/krb5/crypto.c 	res += et->keyed_checksum->checksumsize;
et               4203 source4/heimdal/lib/krb5/crypto.c 	res += et->checksum->checksumsize;
et               4230 source4/heimdal/lib/krb5/crypto.c     struct encryption_type *et = crypto->et;
et               4233 source4/heimdal/lib/krb5/crypto.c     res = CHECKSUMSIZE(et->checksum);
et               4234 source4/heimdal/lib/krb5/crypto.c     res += et->confoundersize;
et               4235 source4/heimdal/lib/krb5/crypto.c     if (et->padsize > 1)
et               4236 source4/heimdal/lib/krb5/crypto.c 	res += et->padsize;
et               4244 source4/heimdal/lib/krb5/crypto.c     struct encryption_type *et = crypto->et;
et               4247 source4/heimdal/lib/krb5/crypto.c     if (et->keyed_checksum)
et               4248 source4/heimdal/lib/krb5/crypto.c 	res = CHECKSUMSIZE(et->keyed_checksum);
et               4250 source4/heimdal/lib/krb5/crypto.c 	res = CHECKSUMSIZE(et->checksum);
et               4251 source4/heimdal/lib/krb5/crypto.c     res += et->confoundersize;
et               4252 source4/heimdal/lib/krb5/crypto.c     if (et->padsize > 1)
et               4253 source4/heimdal/lib/krb5/crypto.c 	res += et->padsize;
et               4274 source4/heimdal/lib/krb5/crypto.c     struct encryption_type *et = _find_enctype(type);
et               4275 source4/heimdal/lib/krb5/crypto.c     if(et == NULL) {
et               4281 source4/heimdal/lib/krb5/crypto.c     if ((et->keytype->bits + 7) / 8 > size) {
et               4286 source4/heimdal/lib/krb5/crypto.c 			       et->name, (int)et->keytype->size);
et               4289 source4/heimdal/lib/krb5/crypto.c     ret = krb5_data_alloc(&key->keyvalue, et->keytype->size);
et               4293 source4/heimdal/lib/krb5/crypto.c     if (et->keytype->random_to_key)
et               4294 source4/heimdal/lib/krb5/crypto.c  	(*et->keytype->random_to_key)(context, key, data, size);
et               4296 source4/heimdal/lib/krb5/crypto.c 	memcpy(key->keyvalue.data, data, et->keytype->size);
et               4310 source4/heimdal/lib/krb5/crypto.c     struct encryption_type *et = _find_enctype(type);
et               4317 source4/heimdal/lib/krb5/crypto.c     if(et == NULL) {
et               4323 source4/heimdal/lib/krb5/crypto.c     keylen = (et->keytype->bits + 7) / 8;
et               4460 source4/heimdal/lib/krb5/crypto.c     struct encryption_type *et;
et               4483 source4/heimdal/lib/krb5/crypto.c     et = _find_enctype(enctype);
et               4484 source4/heimdal/lib/krb5/crypto.c     if(et == NULL) {
et               4490 source4/heimdal/lib/krb5/crypto.c     keylen = (et->keytype->bits + 7) / 8;
et               4542 source4/heimdal/lib/krb5/crypto.c     struct encryption_type *et = _find_enctype(type);
et               4544 source4/heimdal/lib/krb5/crypto.c     if(et == NULL || et->prf_length == 0) {
et               4551 source4/heimdal/lib/krb5/crypto.c     *length = et->prf_length;
et               4561 source4/heimdal/lib/krb5/crypto.c     struct encryption_type *et = crypto->et;
et               4565 source4/heimdal/lib/krb5/crypto.c     if(et->prf == NULL) {
et               4568 source4/heimdal/lib/krb5/crypto.c 			       et->name);
et               4572 source4/heimdal/lib/krb5/crypto.c     return (*et->prf)(context, crypto, input, output);