etype            1660 source3/include/proto.h ADS_STATUS ads_build_error(enum ads_error_type etype, 
etype            1662 source3/include/proto.h ADS_STATUS ads_build_nt_error(enum ads_error_type etype, 
etype              28 source3/libads/ads_status.c ADS_STATUS ads_build_error(enum ads_error_type etype, 
etype              33 source3/libads/ads_status.c 	if (etype == ENUM_ADS_ERROR_NT) {
etype              42 source3/libads/ads_status.c 	ret.error_type = etype;		
etype              47 source3/libads/ads_status.c ADS_STATUS ads_build_nt_error(enum ads_error_type etype, 
etype              52 source3/libads/ads_status.c 	if (etype != ENUM_ADS_ERROR_NT) {
etype              60 source3/libads/ads_status.c 	ret.error_type = etype;		
etype            1053 source3/libsmb/clikrb5.c 	return ap_req->ticket.enc_part.etype;
etype             246 source4/heimdal/kdc/524.c 	ticket->etype = 0;
etype             322 source4/heimdal/kdc/524.c     ret = hdb_enctype2key(context, &server->entry, t->enc_part.etype, &skey);
etype              93 source4/heimdal/kdc/kerberos5.c _kdc_is_weak_expection(krb5_principal principal, krb5_enctype etype)
etype              97 source4/heimdal/kdc/kerberos5.c 	(etype == ETYPE_DES_CBC_CRC
etype              98 source4/heimdal/kdc/kerberos5.c 	 || etype == ETYPE_DES_CBC_MD4
etype              99 source4/heimdal/kdc/kerberos5.c 	 || etype == ETYPE_DES_CBC_MD5))
etype             261 source4/heimdal/kdc/kerberos5.c 		  krb5_enctype etype,
etype             286 source4/heimdal/kdc/kerberos5.c     ret = krb5_crypto_init(context, skey, etype, &crypto);
etype             402 source4/heimdal/kdc/kerberos5.c     for(i = 0; i < req->req_body.etype.len; i++) {
etype             403 source4/heimdal/kdc/kerberos5.c 	if (!older_enctype(req->req_body.etype.val[i]))
etype             416 source4/heimdal/kdc/kerberos5.c     ent->etype = key->key.keytype;
etype             485 source4/heimdal/kdc/kerberos5.c 	    if (pa.val[j].etype == client->keys.val[i].key.keytype)
etype             556 source4/heimdal/kdc/kerberos5.c     ent->etype = key->key.keytype;
etype             646 source4/heimdal/kdc/kerberos5.c 	    if (pa.val[j].etype == client->keys.val[i].key.keytype)
etype             719 source4/heimdal/kdc/kerberos5.c     for (i = 0; i < b->etype.len; i++) {
etype             720 source4/heimdal/kdc/kerberos5.c 	ret = krb5_enctype_to_string(context, b->etype.val[i], &str);
etype             725 source4/heimdal/kdc/kerberos5.c 	    p = rk_strpoolprintf(p, "%d", b->etype.val[i]);
etype             726 source4/heimdal/kdc/kerberos5.c 	if (p && i + 1 < b->etype.len)
etype            1173 source4/heimdal/kdc/kerberos5.c 				  enc_data.etype, &pa_key);
etype            1178 source4/heimdal/kdc/kerberos5.c 		if(krb5_enctype_to_string(context, enc_data.etype, &estr))
etype            1183 source4/heimdal/kdc/kerberos5.c 			    enc_data.etype, client_name);
etype            1224 source4/heimdal/kdc/kerberos5.c 					enc_data.etype, &pa_key) == 0)
etype            1344 source4/heimdal/kdc/kerberos5.c 				    b->etype.val, b->etype.len);
etype            1347 source4/heimdal/kdc/kerberos5.c 				 &client->entry, b->etype.val, b->etype.len);
etype            1372 source4/heimdal/kdc/kerberos5.c     ret = _kdc_find_etype(context, client, b->etype.val, b->etype.len,
etype            1414 source4/heimdal/kdc/kerberos5.c 	    for (j = 0; j < b->etype.len && sessionetype == ETYPE_NULL; j++) {
etype            1417 source4/heimdal/kdc/kerberos5.c 		if (p[i] != b->etype.val[j])
etype             154 source4/heimdal/kdc/krb5tgs.c     sp.etype = enctype;
etype             231 source4/heimdal/kdc/krb5tgs.c 	    ret = hdb_enctype2key(context, &krbtgt->entry, sp.etype, &key);
etype            1132 source4/heimdal/kdc/krb5tgs.c     *krbtgt_etype = ap_req.ticket.enc_part.etype;
etype            1135 source4/heimdal/kdc/krb5tgs.c 			  ap_req.ticket.enc_part.etype, &tkey);
etype            1139 source4/heimdal/kdc/krb5tgs.c 	krb5_enctype_to_string(context, ap_req.ticket.enc_part.etype, &str);
etype            1434 source4/heimdal/kdc/krb5tgs.c 			      t->enc_part.etype, &uukey);
etype            1571 source4/heimdal/kdc/krb5tgs.c 	krb5_enctype etype;
etype            1576 source4/heimdal/kdc/krb5tgs.c 	    for(i = 0; i < b->etype.len; i++)
etype            1577 source4/heimdal/kdc/krb5tgs.c 		if (b->etype.val[i] == adtkt.key.keytype)
etype            1579 source4/heimdal/kdc/krb5tgs.c 	    if(i == b->etype.len) {
etype            1585 source4/heimdal/kdc/krb5tgs.c 	    etype = b->etype.val[i];
etype            1590 source4/heimdal/kdc/krb5tgs.c 	    ret = _kdc_find_etype(context, server, b->etype.val, b->etype.len,
etype            1591 source4/heimdal/kdc/krb5tgs.c 				  &skey, &etype);
etype            1601 source4/heimdal/kdc/krb5tgs.c 	ret = krb5_generate_random_keyblock(context, etype, &sessionkey);
etype            1792 source4/heimdal/kdc/krb5tgs.c 			      t->enc_part.etype, &clientkey);
etype             978 source4/heimdal/kdc/pkinit.c     if (req->req_body.etype.len > 0) {
etype             979 source4/heimdal/kdc/pkinit.c 	for (i = 0; i < req->req_body.etype.len; i++)
etype             980 source4/heimdal/kdc/pkinit.c 	    if (krb5_enctype_valid(context, req->req_body.etype.val[i]) == 0)
etype             982 source4/heimdal/kdc/pkinit.c 	if (req->req_body.etype.len <= i) {
etype             988 source4/heimdal/kdc/pkinit.c 	enctype = req->req_body.etype.val[i];
etype              63 source4/heimdal/lib/hdb/mkey.c 		       int kvno, krb5_keyblock *key, krb5_enctype etype,
etype              80 source4/heimdal/lib/hdb/mkey.c     if(etype != 0)
etype              81 source4/heimdal/lib/hdb/mkey.c 	(*mkey)->keytab.keyblock.keytype = etype;
etype              83 source4/heimdal/lib/hdb/mkey.c     ret = krb5_crypto_init(context, key, etype, &(*mkey)->crypto);
etype             391 source4/heimdal/lib/krb5/auth_context.c 			 krb5_enctype etype)
etype             398 source4/heimdal/lib/krb5/auth_context.c     auth_context->keyblock->keytype = etype;
etype             405 source4/heimdal/lib/krb5/auth_context.c 			 krb5_enctype *etype)
etype              65 source4/heimdal/lib/krb5/build_ap_req.c   ap.authenticator.etype = enctype;
etype             696 source4/heimdal/lib/krb5/context.c default_etypes(krb5_context context, krb5_enctype **etype)
etype             718 source4/heimdal/lib/krb5/context.c     *etype = e;
etype             894 source4/heimdal/lib/krb5/crypto.c 			 krb5_enctype etype,
etype             901 source4/heimdal/lib/krb5/crypto.c     e = _find_enctype (etype);
etype             905 source4/heimdal/lib/krb5/crypto.c 			       etype);
etype             926 source4/heimdal/lib/krb5/crypto.c 			 krb5_enctype etype,
etype             933 source4/heimdal/lib/krb5/crypto.c     e = _find_enctype (etype);
etype             937 source4/heimdal/lib/krb5/crypto.c 			       etype);
etype            2608 source4/heimdal/lib/krb5/crypto.c 		       krb5_enctype etype,
etype            2612 source4/heimdal/lib/krb5/crypto.c     e = _find_enctype(etype);
etype            2616 source4/heimdal/lib/krb5/crypto.c 				etype);
etype            2631 source4/heimdal/lib/krb5/crypto.c 		       krb5_enctype *etype)
etype            2636 source4/heimdal/lib/krb5/crypto.c 	    *etype = etypes[i]->type;
etype            2647 source4/heimdal/lib/krb5/crypto.c 			krb5_enctype etype,
etype            2650 source4/heimdal/lib/krb5/crypto.c     struct encryption_type *e = _find_enctype(etype);
etype            2654 source4/heimdal/lib/krb5/crypto.c 				etype);
etype            2663 source4/heimdal/lib/krb5/crypto.c 		   krb5_enctype etype)
etype            2665 source4/heimdal/lib/krb5/crypto.c     struct encryption_type *e = _find_enctype(etype);
etype            2669 source4/heimdal/lib/krb5/crypto.c 				etype);
etype            2697 source4/heimdal/lib/krb5/crypto.c 			  krb5_enctype *etype)
etype            2701 source4/heimdal/lib/krb5/crypto.c     *etype = ETYPE_NULL;
etype            2707 source4/heimdal/lib/krb5/crypto.c 		*etype = etypes[i]->type;
etype            3645 source4/heimdal/lib/krb5/crypto.c     result->etype = CRYPTO_ETYPE(crypto);
etype            3884 source4/heimdal/lib/krb5/crypto.c 		krb5_enctype etype,
etype            3895 source4/heimdal/lib/krb5/crypto.c     et = _find_enctype (etype);
etype            3899 source4/heimdal/lib/krb5/crypto.c 			       etype);
etype            3946 source4/heimdal/lib/krb5/crypto.c 		 krb5_enctype etype,
etype            3955 source4/heimdal/lib/krb5/crypto.c     if(etype == ETYPE_NULL)
etype            3956 source4/heimdal/lib/krb5/crypto.c 	etype = key->keytype;
etype            3957 source4/heimdal/lib/krb5/crypto.c     (*crypto)->et = _find_enctype(etype);
etype            3963 source4/heimdal/lib/krb5/crypto.c 				etype);
etype            4115 source4/heimdal/lib/krb5/crypto.c 			   krb5_enctype etype,
etype            4118 source4/heimdal/lib/krb5/crypto.c     struct encryption_type *et = _find_enctype(etype);
etype            4127 source4/heimdal/lib/krb5/crypto.c 				etype);
etype            4143 source4/heimdal/lib/krb5/crypto.c     kd.key->keytype = etype;
etype              49 source4/heimdal/lib/krb5/generate_subkey.c 			      krb5_enctype etype,
etype              60 source4/heimdal/lib/krb5/generate_subkey.c     if (etype == ETYPE_NULL)
etype              61 source4/heimdal/lib/krb5/generate_subkey.c 	etype = key->keytype; /* use session key etype */
etype              64 source4/heimdal/lib/krb5/generate_subkey.c     ret = krb5_generate_random_keyblock(context, etype, *subkey);
etype             154 source4/heimdal/lib/krb5/get_cred.c 	ALLOC_SEQ(&t->req_body.etype, 1);
etype             155 source4/heimdal/lib/krb5/get_cred.c 	if(t->req_body.etype.val == NULL) {
etype             161 source4/heimdal/lib/krb5/get_cred.c 	t->req_body.etype.val[0] = in_creds->session.keytype;
etype             164 source4/heimdal/lib/krb5/get_cred.c 			      &t->req_body.etype.len,
etype             165 source4/heimdal/lib/krb5/get_cred.c 			      &t->req_body.etype.val,
etype             413 source4/heimdal/lib/krb5/get_for_creds.c 	cred.enc_part.etype = ENCTYPE_NULL;
etype             560 source4/heimdal/lib/krb5/get_in_tkt.c 		      krb5_enctype etype, krb5_keyblock *key)
etype             729 source4/heimdal/lib/krb5/get_in_tkt.c 			   &a->req_body.etype.len,
etype             730 source4/heimdal/lib/krb5/get_in_tkt.c 			   &a->req_body.etype.val,
etype             794 source4/heimdal/lib/krb5/get_in_tkt.c 				     &preauth->val[i].info.val[j].etype, 1,
etype             817 source4/heimdal/lib/krb5/get_in_tkt.c 		   key_proc, keyseed, a->req_body.etype.val,
etype             818 source4/heimdal/lib/krb5/get_in_tkt.c 		   a->req_body.etype.len, NULL);
etype             824 source4/heimdal/lib/krb5/get_in_tkt.c 		   key_proc, keyseed, a->req_body.etype.val,
etype             825 source4/heimdal/lib/krb5/get_in_tkt.c 		   a->req_body.etype.len, &salt);
etype             905 source4/heimdal/lib/krb5/get_in_tkt.c     krb5_enctype etype;
etype             987 source4/heimdal/lib/krb5/get_in_tkt.c     etype = rep.kdc_rep.enc_part.etype;
etype            1003 source4/heimdal/lib/krb5/get_in_tkt.c 	ret = (*key_proc)(context, etype, salt, keyseed, &key);
etype            1010 source4/heimdal/lib/krb5/get_in_tkt.c 	ret = (*key_proc)(context, etype, salt, keyseed, &key);
etype             606 source4/heimdal/lib/krb5/init_creds_pw.c 			   &a->req_body.etype.len,
etype             607 source4/heimdal/lib/krb5/init_creds_pw.c 			   &a->req_body.etype.val,
etype             652 source4/heimdal/lib/krb5/init_creds_pw.c     krb5_enctype etype;
etype             668 source4/heimdal/lib/krb5/init_creds_pw.c 	 krb5_enctype etype,
etype             672 source4/heimdal/lib/krb5/init_creds_pw.c     paid->etype = etype;
etype             715 source4/heimdal/lib/krb5/init_creds_pw.c     for (j = 0; j < asreq->req_body.etype.len; j++) {
etype             717 source4/heimdal/lib/krb5/init_creds_pw.c 	    if (asreq->req_body.etype.val[j] == e.val[i].etype) {
etype             727 source4/heimdal/lib/krb5/init_creds_pw.c 		    ret = set_paid(paid, context, e.val[i].etype,
etype             764 source4/heimdal/lib/krb5/init_creds_pw.c     for (j = 0; j < asreq->req_body.etype.len; j++) {
etype             766 source4/heimdal/lib/krb5/init_creds_pw.c 	    if (asreq->req_body.etype.val[j] == e.val[i].etype) {
etype             778 source4/heimdal/lib/krb5/init_creds_pw.c 		    ret = set_paid(paid, context, e.val[i].etype,
etype             806 source4/heimdal/lib/krb5/init_creds_pw.c     if (paid->etype == ENCTYPE_NULL)
etype             809 source4/heimdal/lib/krb5/init_creds_pw.c 		   paid->etype,
etype             871 source4/heimdal/lib/krb5/init_creds_pw.c 		      krb5_enctype etype, krb5_keyblock *key)
etype             982 source4/heimdal/lib/krb5/init_creds_pw.c 			  &ppaid->etype, 1,
etype             990 source4/heimdal/lib/krb5/init_creds_pw.c 			  a->req_body.etype.val, a->req_body.etype.len,
etype             998 source4/heimdal/lib/krb5/init_creds_pw.c 			  a->req_body.etype.val, a->req_body.etype.len,
etype            1010 source4/heimdal/lib/krb5/init_creds_pw.c 		     krb5_enctype etype,
etype            1015 source4/heimdal/lib/krb5/init_creds_pw.c     ret = (*ctx->key_proc)(context, etype, ctx->password,
etype            1117 source4/heimdal/lib/krb5/init_creds_pw.c 	paid.etype = ENCTYPE_NULL;
etype            1146 source4/heimdal/lib/krb5/init_creds_pw.c     krb5_enctype etype;
etype            1151 source4/heimdal/lib/krb5/init_creds_pw.c     etype = rep->kdc_rep.enc_part.etype;
etype            1154 source4/heimdal/lib/krb5/init_creds_pw.c 	paid.etype = etype;
etype            1162 source4/heimdal/lib/krb5/init_creds_pw.c 	paid.etype = etype;
etype            1186 source4/heimdal/lib/krb5/init_creds_pw.c 				   etype,
etype            1198 source4/heimdal/lib/krb5/init_creds_pw.c 				   paid.salt, paid.s2kparams, etype, key);
etype             142 source4/heimdal/lib/krb5/mit_glue.c krb5_c_valid_enctype (krb5_enctype etype)
etype             144 source4/heimdal/lib/krb5/mit_glue.c     return krb5_enctype_valid(NULL, etype);
etype             109 source4/heimdal/lib/krb5/mk_priv.c     s.enc_part.etype = key->keytype;
etype              93 source4/heimdal/lib/krb5/mk_rep.c     ap.enc_part.etype = auth_context->keyblock->keytype;
etype             987 source4/heimdal/lib/krb5/pkinit.c 		      krb5_enctype etype,
etype            1126 source4/heimdal/lib/krb5/pkinit.c 		  krb5_enctype etype,
etype            1273 source4/heimdal/lib/krb5/pkinit.c 				   etype,
etype            1306 source4/heimdal/lib/krb5/pkinit.c 		     krb5_enctype etype,
etype            1364 source4/heimdal/lib/krb5/pkinit.c 	    ret = pk_rd_pa_reply_dh(context, &data, &oid, realm, ctx, etype, hi,
etype            1371 source4/heimdal/lib/krb5/pkinit.c 					ctx, etype, hi, nonce, req_buffer, pa, key);
etype            1423 source4/heimdal/lib/krb5/pkinit.c 					ctx, etype, hi, nonce, req_buffer, pa, key);
etype             100 source4/heimdal/lib/krb5/rd_cred.c     if (cred.enc_part.etype == ETYPE_NULL) {
etype             754 source4/heimdal/lib/krb5/rd_req.c 			     ap_req->ticket.enc_part.etype,
etype             571 source4/kdc/kdc.c 	krb5_enctype etype;
etype             604 source4/kdc/kdc.c 		etype = ETYPE_ARCFOUR_HMAC_MD5;
etype             607 source4/kdc/kdc.c 						&etype);
etype             635 source4/kdc/kdc.c 	ret = hdb_enctype2key(kdc->smb_krb5_context->krb5_context, &ent.entry, etype, &key);
etype              31 source4/libcli/raw/clierror.c 	switch (tree->session->transport->error.etype) {
etype              51 source4/libcli/raw/clierror.c 	switch (tree->session->transport->error.etype) {
etype             466 source4/libcli/raw/clitransport.c 		transport->error.etype = ETYPE_NONE;
etype             468 source4/libcli/raw/clitransport.c 		transport->error.etype = ETYPE_SMB;
etype             472 source4/libcli/raw/clitransport.c 		transport->error.etype = ETYPE_SOCKET;
etype             137 source4/libcli/raw/libcliraw.h 		enum {ETYPE_NONE, ETYPE_SMB, ETYPE_SOCKET, ETYPE_NBT} etype;