Lines Matching defs:kdb

37 #include	<kdb.h>
185 /* This is in lib/kdb/kdb_cpw.c, but is static */
215 krb5_db_entry kdb;
245 ret = kdb_get_entry(handle, entry->principal, &kdb, &adb);
250 memset(&kdb, 0, sizeof(krb5_db_entry));
258 if (kdb.n_key_data != 0) {
260 kdb_free_entry(handle, &kdb, &adb);
265 * keep the existing kdb tl_data (specifically the LDAP plugin
307 kdb.magic = KRB5_KDB_MAGIC_NUMBER;
308 kdb.len = KRB5_KDB_V1_BASE_LENGTH; /* gag me with a chainsaw */
317 kdb.attributes = handle->params.flags;
318 kdb.attributes |= entry->attributes;
320 kdb.attributes = handle->params.flags;
324 kdb.max_life = entry->max_life;
326 kdb.max_life = handle->params.max_life;
329 kdb.max_renewable_life = entry->max_renewable_life;
331 kdb.max_renewable_life = handle->params.max_rlife;
334 kdb.expiration = entry->princ_expire_time;
336 kdb.expiration = handle->params.expiration;
338 kdb.pw_expiration = 0;
341 kdb.pw_expiration = now + polent.pw_max_life;
343 kdb.pw_expiration = 0;
346 kdb.pw_expiration = entry->pw_expiration;
348 kdb.last_success = 0;
349 kdb.last_failed = 0;
350 kdb.fail_auth_count = 0;
353 to free the entire kdb entry, and that will try to free the
357 entry->principal, &(kdb.princ)))) {
363 if ((ret = krb5_dbe_update_last_pwd_change(handle->context, &kdb, now))) {
364 krb5_db_free_principal(handle->context, &kdb, 1);
371 /* splice entry->tl_data onto the front of kdb.tl_data */
372 tl_data_orig = kdb.tl_data;
376 ret = krb5_dbe_update_tl_data(handle->context, &kdb, tl_data_tail);
379 krb5_db_free_principal(handle->context, &kdb, 1);
394 FALSE, &kdb))) {
395 krb5_db_free_principal(handle->context, &kdb, 1);
424 krb5_db_free_principal(handle->context, &kdb, 1);
432 kdb.mask = mask | KADM5_KEY_DATA | KADM5_PRINCIPAL ;
435 ret = kdb_put_entry(handle, &kdb, &adb);
437 krb5_db_free_principal(handle->context, &kdb, 1);
469 krb5_db_entry kdb;
480 if ((ret = kdb_get_entry(handle, principal, &kdb, &adb)))
492 kdb_free_entry(handle, &kdb, &adb);
497 kdb_free_entry(handle, &kdb, &adb);
504 kdb_free_entry(handle, &kdb, &adb);
516 krb5_db_entry kdb;
546 ret = kdb_get_entry(handle, entry->principal, &kdb, &adb);
602 ret = krb5_dbe_lookup_last_pwd_change(handle->context, &kdb,
603 &(kdb.pw_expiration));
606 kdb.pw_expiration += npol.pw_max_life;
608 kdb.pw_expiration = 0;
628 kdb.pw_expiration = 0;
649 kdb.attributes = entry->attributes;
651 kdb.max_life = entry->max_life;
653 kdb.expiration = entry->princ_expire_time;
655 kdb.pw_expiration = entry->pw_expiration;
657 kdb.max_renewable_life = entry->max_renewable_life;
659 kdb.fail_auth_count = entry->fail_auth_count;
662 for (i = 0; i < kdb.n_key_data; i++)
663 kdb.key_data[i].key_data_kvno = entry->kvno;
674 ret = krb5_dbe_update_tl_data(handle->context, &kdb, tl);
683 kdb.mask = mask;
685 ret = kdb_put_entry(handle, &kdb, &adb);
698 kdb_free_entry(handle, &kdb, &adb);
706 krb5_db_entry kdb;
718 if ((ret = kdb_get_entry(handle, target, &kdb, &adb)) == 0) {
719 kdb_free_entry(handle, &kdb, &adb);
723 if ((ret = kdb_get_entry(handle, source, &kdb, &adb)))
728 for (i=0; i<kdb.n_key_data; i++) {
729 if ((kdb.key_data[i].key_data_ver == 1) ||
730 (kdb.key_data[i].key_data_type[1] == KRB5_KDB_SALTTYPE_NORMAL)) {
736 kadm5_free_principal(handle->context, kdb.princ);
737 ret = kadm5_copy_principal(handle->context, target, &kdb.princ);
739 kdb.princ = NULL; /* so freeing the dbe doesn't lose */
743 if ((ret = kdb_put_entry(handle, &kdb, &adb)))
749 kdb_free_entry(handle, &kdb, &adb);
758 krb5_db_entry kdb;
788 if ((ret = kdb_get_entry(handle, principal, &kdb, &adb)))
810 entry->princ_expire_time = kdb.expiration;
813 (ret = krb5_dbe_lookup_last_pwd_change(handle->context, &kdb,
819 entry->pw_expiration = kdb.pw_expiration;
821 entry->max_life = kdb.max_life;
826 ret = krb5_dbe_lookup_mod_princ_data(handle->context, &kdb,
842 entry->attributes = kdb.attributes;
845 for (entry->kvno = 0, i=0; i<kdb.n_key_data; i++)
846 if (kdb.key_data[i].key_data_kvno > entry->kvno)
847 entry->kvno = kdb.key_data[i].key_data_kvno;
861 entry->max_renewable_life = kdb.max_renewable_life;
863 entry->last_success = kdb.last_success;
865 entry->last_failed = kdb.last_failed;
867 entry->fail_auth_count = kdb.fail_auth_count;
873 tl = kdb.tl_data;
889 entry->n_key_data = kdb.n_key_data;
902 &kdb.key_data[i],
944 kdb_free_entry(handle, &kdb, &adb);
1345 krb5_db_entry kdb, kdb_save;
1368 if ((ret = kdb_get_entry(handle, principal, &kdb, &adb)))
1373 kdb_free_entry(handle, &kdb, &adb);
1391 keepold, &kdb);
1395 kdb.attributes &= ~KRB5_KDB_REQUIRES_PWCHANGE;
1405 &kdb, &last_pwd);
1417 !(kdb.attributes & KRB5_KDB_REQUIRES_PWCHANGE)) {
1432 kdb.n_key_data, kdb.key_data,
1446 kdb.n_key_data, kdb.key_data,
1458 kdb.pw_expiration = now + pol.pw_max_life;
1460 kdb.pw_expiration = 0;
1462 kdb.pw_expiration = 0;
1501 ret = krb5_dbe_update_last_pwd_change(handle->context, &kdb, now);
1508 kdb.mask = KADM5_KEY_DATA | KADM5_ATTRIBUTES | KADM5_KEY_HIST
1511 kdb.mask = KADM5_KEY_DATA | KADM5_ATTRIBUTES /* | KADM5_CPW_FUNCTION */;
1513 if ((ret = kdb_put_entry(handle, &kdb, &adb)))
1520 kdb_free_entry(handle, &kdb, &adb);
1522 krb5_db_free_principal(handle->context, &kdb, 1);
1564 krb5_db_entry kdb;
1586 if ((ret = kdb_get_entry(handle, principal, &kdb, &adb)))
1593 &kdb);
1597 kdb.attributes &= ~KRB5_KDB_REQUIRES_PWCHANGE;
1610 &kdb, &last_pwd);
1622 !(kdb.attributes & KRB5_KDB_REQUIRES_PWCHANGE)) {
1637 kdb.n_key_data, kdb.key_data,
1643 kdb.pw_expiration = now + pol.pw_max_life;
1645 kdb.pw_expiration = 0;
1647 kdb.pw_expiration = 0;
1650 ret = krb5_dbe_update_last_pwd_change(handle->context, &kdb, now);
1657 ret = krb5_dbe_find_enctype(handle->context, &kdb,
1671 kdb.n_key_data, kdb.key_data,
1679 kdb.mask = KADM5_KEY_DATA /* | KADM5_RANDKEY_USED */;
1681 if ((ret = kdb_put_entry(handle, &kdb, &adb)))
1686 kdb_free_entry(handle, &kdb, &adb);
1706 krb5_db_entry kdb;
1734 if ((ret = kdb_get_entry(handle, principal, &kdb, &adb)))
1737 for (kvno = 0, i=0; i<kdb.n_key_data; i++)
1738 if (kdb.key_data[i].key_data_kvno > kvno)
1739 kvno = kdb.key_data[i].key_data_kvno;
1741 if (kdb.key_data != NULL)
1742 cleanup_key_data(handle->context, kdb.n_key_data, kdb.key_data);
1744 kdb.key_data = (krb5_key_data*)krb5_db_alloc(handle->context, NULL, sizeof(krb5_key_data));
1745 if (kdb.key_data == NULL)
1747 memset(kdb.key_data, 0, sizeof(krb5_key_data));
1748 kdb.n_key_data = 1;
1763 kdb.key_data->key_data_type[k] = tmp_key_data.key_data_type[k];
1764 kdb.key_data->key_data_length[k] = tmp_key_data.key_data_length[k];
1766 kdb.key_data->key_data_contents[k] = krb5_db_alloc(handle->context, NULL, tmp_key_data.key_data_length[k]);
1767 if (kdb.key_data->key_data_contents[k] == NULL) {
1768 cleanup_key_data(handle->context, kdb.n_key_data, kdb.key_data);
1769 kdb.key_data = NULL;
1770 kdb.n_key_data = 0;
1774 memcpy (kdb.key_data->key_data_contents[k], tmp_key_data.key_data_contents[k], tmp_key_data.key_data_length[k]);
1784 kdb.attributes &= ~KRB5_KDB_REQUIRES_PWCHANGE;
1804 &kdb, &last_pwd))
1807 !(kdb.attributes & KRB5_KDB_REQUIRES_PWCHANGE)) {
1824 kdb.n_key_data, kdb.key_data,
1831 kdb.pw_expiration = now + pol.pw_max_life;
1833 kdb.pw_expiration = 0;
1835 kdb.pw_expiration = 0;
1838 ret = krb5_dbe_update_last_pwd_change(handle->context, &kdb, now);
1842 if ((ret = kdb_put_entry(handle, &kdb, &adb)))
1854 kdb_free_entry(handle, &kdb, &adb);
1882 krb5_db_entry kdb;
1929 if ((ret = kdb_get_entry(handle, principal, &kdb, &adb)))
1932 for (kvno = 0, i=0; i<kdb.n_key_data; i++)
1933 if (kdb.key_data[i].key_data_kvno > kvno)
1934 kvno = kdb.key_data[i].key_data_kvno;
1937 old_key_data = kdb.key_data;
1938 n_old_keys = kdb.n_key_data;
1940 if (kdb.key_data != NULL)
1941 cleanup_key_data(handle->context, kdb.n_key_data, kdb.key_data);
1946 kdb.key_data = (krb5_key_data*)krb5_db_alloc(handle->context, NULL, (n_keys+n_old_keys)
1948 if (kdb.key_data == NULL) {
1953 memset(kdb.key_data, 0, (n_keys+n_old_keys)*sizeof(krb5_key_data));
1954 kdb.n_key_data = 0;
1977 tptr = &kdb.key_data[i];
2002 kdb.n_key_data++;
2007 kdb.key_data[i+n_keys] = old_key_data[i];
2009 kdb.n_key_data++;
2015 /* assert(kdb.n_key_data == n_keys + n_old_keys) */
2016 kdb.attributes &= ~KRB5_KDB_REQUIRES_PWCHANGE;
2035 &kdb, &last_pwd))
2038 !(kdb.attributes & KRB5_KDB_REQUIRES_PWCHANGE)) {
2056 kdb.n_key_data, kdb.key_data,
2063 kdb.pw_expiration = now + pol.pw_max_life;
2065 kdb.pw_expiration = 0;
2067 kdb.pw_expiration = 0;
2070 if ((ret = krb5_dbe_update_last_pwd_change(handle->context, &kdb, now)))
2073 if ((ret = kdb_put_entry(handle, &kdb, &adb)))
2078 kdb_free_entry(handle, &kdb, &adb);