Lines Matching refs:data

80     tempprinc->data = krb5_db_alloc(context, NULL, nelems * sizeof(krb5_data));
81 if (tempprinc->data == 0) {
89 if (((krb5_princ_component(context, tempprinc, i)->data =
92 krb5_db_free(context, krb5_princ_component(context, tempprinc, i)->data);
93 krb5_db_free (context, tempprinc->data);
98 memcpy(krb5_princ_component(context, tempprinc, i)->data,
99 krb5_princ_component(context, inprinc, i)->data, len);
103 tempprinc->realm.data =
105 if (!tempprinc->realm.data && tempprinc->realm.length) {
107 krb5_db_free(context, krb5_princ_component(context, tempprinc, i)->data);
108 krb5_db_free(context, tempprinc->data);
113 memcpy(tempprinc->realm.data, inprinc->realm.data,
128 if (val->data) {
131 krb5_db_free(context, krb5_princ_component(context, val, i)->data);
132 krb5_db_free(context, val->data);
134 if (val->realm.data)
135 krb5_db_free(context, val->realm.data);
192 static void cleanup_key_data(context, count, data)
195 krb5_key_data * data;
200 for (j = 0; j < data[i].key_data_ver; j++)
201 if (data[i].key_data_length[j])
202 krb5_db_free(context, data[i].key_data_contents[j]);
203 krb5_db_free(context, data);
390 /* this is kind of gross, but in order to free the tl data, I need
523 /* In all cases key and the principal data is set, let the database provider know */
1091 * mkey (r) master keyblock to decrypt key data with
1092 * hist_key (r) history keyblock to encrypt key data with
1281 /* free the old pw history entry if it contains data */
1320 * and a block of data via stdin (data_buffer).
1563 memcpy (pstring, princ->data, princ->length);
1585 /* key data and attributes changed, let the database provider know */
1742 /* key data changed, let the database provider know */
1816 /* XXX data.magic? */
1817 keysalt.data.length = 0;
1818 keysalt.data.data = NULL;
2017 keysalt.data.length = 0;
2018 keysalt.data.data = NULL;
2070 /* copy old key data if necessary */