etypes 363 source4/auth/credentials/credentials_krb5.c krb5_enctype *etypes = NULL; etypes 407 source4/auth/credentials/credentials_krb5.c &etypes); etypes 411 source4/auth/credentials/credentials_krb5.c for (num_ktypes = 0; etypes[num_ktypes]; num_ktypes++); etypes 414 source4/auth/credentials/credentials_krb5.c num_ktypes, etypes); etypes 415 source4/auth/credentials/credentials_krb5.c krb5_xfree (etypes); etypes 740 source4/heimdal/kdc/kerberos4.c krb5_enctype etypes[] = { ETYPE_DES_CBC_MD5, etypes 745 source4/heimdal/kdc/kerberos4.c i < sizeof(etypes)/sizeof(etypes[0]) etypes 750 source4/heimdal/kdc/kerberos4.c while(hdb_next_enctype2key(context, &principal->entry, etypes[i], &key) == 0) { etypes 129 source4/heimdal/kdc/kerberos5.c krb5_enctype *etypes, unsigned len, etypes 141 source4/heimdal/kdc/kerberos5.c if (krb5_enctype_valid(context, etypes[i]) != 0 && etypes 142 source4/heimdal/kdc/kerberos5.c !_kdc_is_weak_expection(princ->entry.principal, etypes[i])) etypes 145 source4/heimdal/kdc/kerberos5.c while (hdb_next_enctype2key(context, &princ->entry, etypes[i], &key) == 0) { etypes 151 source4/heimdal/kdc/kerberos5.c *ret_etype = etypes[i]; etypes 465 source4/heimdal/kdc/kerberos5.c ENCTYPE *etypes, unsigned int etypes_len) etypes 488 source4/heimdal/kdc/kerberos5.c if(client->keys.val[i].key.keytype == etypes[j]) { etypes 489 source4/heimdal/kdc/kerberos5.c if (krb5_enctype_valid(context, etypes[j]) != 0) etypes 491 source4/heimdal/kdc/kerberos5.c if (!older_enctype(etypes[j])) etypes 509 source4/heimdal/kdc/kerberos5.c if(client->keys.val[i].key.keytype == etypes[j]) etypes 514 source4/heimdal/kdc/kerberos5.c if (!older_enctype(etypes[j])) etypes 627 source4/heimdal/kdc/kerberos5.c ENCTYPE *etypes, unsigned int etypes_len) etypes 649 source4/heimdal/kdc/kerberos5.c if(client->keys.val[i].key.keytype == etypes[j]) { etypes 650 source4/heimdal/kdc/kerberos5.c if (krb5_enctype_valid(context, etypes[j]) != 0) etypes 668 source4/heimdal/kdc/kerberos5.c if(client->keys.val[i].key.keytype == etypes[j]) etypes 42 source4/heimdal/lib/krb5/build_auth.c EtypeList etypes; etypes 49 source4/heimdal/lib/krb5/build_auth.c ret = krb5_init_etype(context, &etypes.len, &etypes.val, NULL); etypes 53 source4/heimdal/lib/krb5/build_auth.c ASN1_MALLOC_ENCODE(EtypeList, buf, buf_size, &etypes, &len, ret); etypes 55 source4/heimdal/lib/krb5/build_auth.c free_EtypeList(&etypes); etypes 60 source4/heimdal/lib/krb5/build_auth.c free_EtypeList(&etypes); etypes 61 source4/heimdal/lib/krb5/context.c krb5_enctype *etypes = NULL; etypes 68 source4/heimdal/lib/krb5/context.c etypes = malloc((i+1) * sizeof(*etypes)); etypes 69 source4/heimdal/lib/krb5/context.c if (etypes == NULL) { etypes 80 source4/heimdal/lib/krb5/context.c etypes[k++] = e; etypes 82 source4/heimdal/lib/krb5/context.c etypes[k] = ETYPE_NULL; etypes 85 source4/heimdal/lib/krb5/context.c *ret_enctypes = etypes; etypes 135 source4/heimdal/lib/krb5/context.c free(context->etypes); etypes 136 source4/heimdal/lib/krb5/context.c context->etypes = tmptypes; etypes 376 source4/heimdal/lib/krb5/context.c if (context->etypes) { etypes 377 source4/heimdal/lib/krb5/context.c ret = copy_etypes(context, context->etypes, &p->etypes); etypes 443 source4/heimdal/lib/krb5/context.c free(context->etypes); etypes 737 source4/heimdal/lib/krb5/context.c const krb5_enctype *etypes) etypes 742 source4/heimdal/lib/krb5/context.c if(etypes) { etypes 743 source4/heimdal/lib/krb5/context.c for (i = 0; etypes[i]; ++i) { etypes 745 source4/heimdal/lib/krb5/context.c ret = krb5_enctype_valid(context, etypes[i]); etypes 755 source4/heimdal/lib/krb5/context.c memmove(p, etypes, i * sizeof(krb5_enctype)); etypes 757 source4/heimdal/lib/krb5/context.c if(context->etypes) etypes 758 source4/heimdal/lib/krb5/context.c free(context->etypes); etypes 759 source4/heimdal/lib/krb5/context.c context->etypes = p; etypes 779 source4/heimdal/lib/krb5/context.c krb5_enctype **etypes) etypes 785 source4/heimdal/lib/krb5/context.c if(context->etypes) { etypes 786 source4/heimdal/lib/krb5/context.c for(i = 0; context->etypes[i]; i++); etypes 793 source4/heimdal/lib/krb5/context.c memmove(p, context->etypes, i * sizeof(krb5_enctype)); etypes 799 source4/heimdal/lib/krb5/context.c *etypes = p; etypes 2571 source4/heimdal/lib/krb5/crypto.c static struct encryption_type *etypes[] = { etypes 2592 source4/heimdal/lib/krb5/crypto.c static unsigned num_etypes = sizeof(etypes) / sizeof(etypes[0]); etypes 2600 source4/heimdal/lib/krb5/crypto.c if(etypes[i]->type == type) etypes 2601 source4/heimdal/lib/krb5/crypto.c return etypes[i]; etypes 2635 source4/heimdal/lib/krb5/crypto.c if(strcasecmp(etypes[i]->name, string) == 0){ etypes 2636 source4/heimdal/lib/krb5/crypto.c *etype = etypes[i]->type; etypes 2704 source4/heimdal/lib/krb5/crypto.c if(etypes[i]->keyed_checksum && etypes 2705 source4/heimdal/lib/krb5/crypto.c etypes[i]->keyed_checksum->type == ctype) etypes 2707 source4/heimdal/lib/krb5/crypto.c *etype = etypes[i]->type; etypes 4693 source4/heimdal/lib/krb5/crypto.c if (etypes[i]->keytype->type == keytype etypes 4694 source4/heimdal/lib/krb5/crypto.c && !(etypes[i]->flags & F_PSEUDO)) etypes 4704 source4/heimdal/lib/krb5/crypto.c if (etypes[i]->keytype->type == keytype etypes 4705 source4/heimdal/lib/krb5/crypto.c && !(etypes[i]->flags & F_PSEUDO)) etypes 4706 source4/heimdal/lib/krb5/crypto.c ret[n++] = etypes[i]->type; etypes 42 source4/heimdal/lib/krb5/get_in_tkt.c const krb5_enctype *etypes) etypes 49 source4/heimdal/lib/krb5/get_in_tkt.c if (etypes == NULL) { etypes 54 source4/heimdal/lib/krb5/get_in_tkt.c etypes = tmp; etypes 57 source4/heimdal/lib/krb5/get_in_tkt.c for (i = 0; etypes[i]; ++i) etypes 67 source4/heimdal/lib/krb5/get_in_tkt.c etypes, etypes 632 source4/heimdal/lib/krb5/get_in_tkt.c enctypes = context->etypes; etypes 667 source4/heimdal/lib/krb5/get_in_tkt.c const krb5_enctype *etypes, etypes 731 source4/heimdal/lib/krb5/get_in_tkt.c etypes); etypes 885 source4/heimdal/lib/krb5/get_in_tkt.c const krb5_enctype *etypes, etypes 921 source4/heimdal/lib/krb5/get_in_tkt.c etypes, etypes 1049 source4/heimdal/lib/krb5/get_in_tkt.c const krb5_enctype *etypes, etypes 1064 source4/heimdal/lib/krb5/get_in_tkt.c etypes, etypes 75 source4/heimdal/lib/krb5/get_in_tkt_with_keytab.c const krb5_enctype *etypes, etypes 90 source4/heimdal/lib/krb5/get_in_tkt_with_keytab.c etypes, etypes 42 source4/heimdal/lib/krb5/init_creds_pw.c krb5_enctype *etypes; etypes 93 source4/heimdal/lib/krb5/init_creds_pw.c if (ctx->etypes) etypes 94 source4/heimdal/lib/krb5/init_creds_pw.c free(ctx->etypes); etypes 268 source4/heimdal/lib/krb5/init_creds_pw.c krb5_enctype *etypes; etypes 297 source4/heimdal/lib/krb5/init_creds_pw.c ctx->etypes = NULL; etypes 336 source4/heimdal/lib/krb5/init_creds_pw.c etypes = malloc((options->etype_list_length + 1) etypes 338 source4/heimdal/lib/krb5/init_creds_pw.c if (etypes == NULL) { etypes 342 source4/heimdal/lib/krb5/init_creds_pw.c memcpy (etypes, options->etype_list, etypes 344 source4/heimdal/lib/krb5/init_creds_pw.c etypes[options->etype_list_length] = ETYPE_NULL; etypes 345 source4/heimdal/lib/krb5/init_creds_pw.c ctx->etypes = etypes; etypes 518 source4/heimdal/lib/krb5/init_creds_pw.c ctx.etypes, etypes 548 source4/heimdal/lib/krb5/init_creds_pw.c const krb5_enctype *etypes, etypes 608 source4/heimdal/lib/krb5/init_creds_pw.c etypes); etypes 945 source4/heimdal/lib/krb5/init_creds_pw.c enctypes = context->etypes; etypes 1236 source4/heimdal/lib/krb5/init_creds_pw.c ctx->addrs, ctx->etypes, &ctx->as_req); etypes 1586 source4/heimdal/lib/krb5/init_creds_pw.c ctx.etypes, etypes 225 source4/heimdal/lib/krb5/krb5_locl.h krb5_enctype *etypes; etypes 169 source4/heimdal/lib/krb5/rd_req.c EtypeList *etypes) etypes 178 source4/heimdal/lib/krb5/rd_req.c etypes->len = 0; etypes 179 source4/heimdal/lib/krb5/rd_req.c etypes->val = NULL; etypes 209 source4/heimdal/lib/krb5/rd_req.c etypes, etypes 345 source4/heimdal/lib/krb5/rd_req.c EtypeList etypes; etypes 460 source4/heimdal/lib/krb5/rd_req.c ret = find_etypelist(context, ac, &etypes); etypes 466 source4/heimdal/lib/krb5/rd_req.c if (etypes.val) { etypes 469 source4/heimdal/lib/krb5/rd_req.c for (i = 0; i < etypes.len; i++) { etypes 470 source4/heimdal/lib/krb5/rd_req.c if (krb5_enctype_valid(context, etypes.val[i]) == 0) { etypes 471 source4/heimdal/lib/krb5/rd_req.c ac->keytype = etypes.val[i]; etypes 500 source4/heimdal/lib/krb5/rd_req.c free_EtypeList(&etypes); etypes 664 source4/kdc/hdb-samba4.c entry_ex->entry.etypes = malloc(sizeof(*(entry_ex->entry.etypes))); etypes 665 source4/kdc/hdb-samba4.c if (entry_ex->entry.etypes == NULL) { etypes 670 source4/kdc/hdb-samba4.c entry_ex->entry.etypes->len = entry_ex->entry.keys.len; etypes 671 source4/kdc/hdb-samba4.c entry_ex->entry.etypes->val = calloc(entry_ex->entry.etypes->len, sizeof(int)); etypes 672 source4/kdc/hdb-samba4.c if (entry_ex->entry.etypes->val == NULL) { etypes 677 source4/kdc/hdb-samba4.c for (i=0; i < entry_ex->entry.etypes->len; i++) { etypes 678 source4/kdc/hdb-samba4.c entry_ex->entry.etypes->val[i] = entry_ex->entry.keys.val[i].key.keytype; etypes 853 source4/kdc/hdb-samba4.c entry_ex->entry.etypes = malloc(sizeof(*(entry_ex->entry.etypes))); etypes 854 source4/kdc/hdb-samba4.c if (entry_ex->entry.etypes == NULL) { etypes 859 source4/kdc/hdb-samba4.c entry_ex->entry.etypes->len = entry_ex->entry.keys.len; etypes 860 source4/kdc/hdb-samba4.c entry_ex->entry.etypes->val = calloc(entry_ex->entry.etypes->len, sizeof(int)); etypes 861 source4/kdc/hdb-samba4.c if (entry_ex->entry.etypes->val == NULL) { etypes 866 source4/kdc/hdb-samba4.c for (i=0; i < entry_ex->entry.etypes->len; i++) { etypes 867 source4/kdc/hdb-samba4.c entry_ex->entry.etypes->val[i] = entry_ex->entry.keys.val[i].key.keytype;