Lines Matching refs:entry

58                            krb5_db_entry *entry)
86 content->length = entry->len + entry->e_length;
88 if ((retval = krb5_unparse_name(context, entry->princ, &unparse_princ)))
97 for (tl_data = entry->tl_data; tl_data; tl_data = tl_data->tl_data_next) {
103 if (i != entry->n_tl_data) {
109 for (i = 0; i < entry->n_key_data; i++) {
111 for (j = 0; j < entry->key_data[i].key_data_ver; j++) {
112 content->length += entry->key_data[i].key_data_length[j];
123 * Now we go through entry again, this time copying data
129 krb5_kdb_encode_int16(entry->len, nextloc);
133 krb5_kdb_encode_int32(entry->attributes, nextloc);
137 krb5_kdb_encode_int32(entry->max_life, nextloc);
141 krb5_kdb_encode_int32(entry->max_renewable_life, nextloc);
145 krb5_kdb_encode_int32(entry->expiration, nextloc);
149 krb5_kdb_encode_int32(entry->pw_expiration, nextloc);
153 krb5_kdb_encode_int32(entry->last_success, nextloc);
157 krb5_kdb_encode_int32(entry->last_failed, nextloc);
161 krb5_kdb_encode_int32(entry->fail_auth_count, nextloc);
165 krb5_kdb_encode_int16(entry->n_tl_data, nextloc);
169 krb5_kdb_encode_int16(entry->n_key_data, nextloc);
173 if (entry->len != KRB5_KDB_V1_BASE_LENGTH)
177 if (entry->e_length) {
178 memcpy(nextloc, entry->e_data, entry->e_length);
179 nextloc += entry->e_length;
194 for (tl_data = entry->tl_data; tl_data; tl_data = tl_data->tl_data_next) {
205 for (i = 0; i < entry->n_key_data; i++) {
206 krb5_kdb_encode_int16(entry->key_data[i].key_data_ver, nextloc);
208 krb5_kdb_encode_int16(entry->key_data[i].key_data_kvno, nextloc);
211 for (j = 0; j < entry->key_data[i].key_data_ver; j++) {
212 krb5_int16 type = entry->key_data[i].key_data_type[j];
213 krb5_ui_2 length = entry->key_data[i].key_data_length[j];
221 memcpy(nextloc, entry->key_data[i].key_data_contents[j],length);
241 krb5_db_entry *entry)
250 /* Zero out entry and NULL pointers */
251 memset(entry, 0, sizeof(krb5_db_entry));
269 krb5_kdb_decode_int16(nextloc, entry->len);
273 krb5_kdb_decode_int32(nextloc, entry->attributes);
277 krb5_kdb_decode_int32(nextloc, entry->max_life);
281 krb5_kdb_decode_int32(nextloc, entry->max_renewable_life);
285 krb5_kdb_decode_int32(nextloc, entry->expiration);
289 krb5_kdb_decode_int32(nextloc, entry->pw_expiration);
293 krb5_kdb_decode_int32(nextloc, entry->last_success);
297 krb5_kdb_decode_int32(nextloc, entry->last_failed);
301 krb5_kdb_decode_int32(nextloc, entry->fail_auth_count);
305 krb5_kdb_decode_int16(nextloc, entry->n_tl_data);
308 if (entry->n_tl_data < 0)
312 krb5_kdb_decode_int16(nextloc, entry->n_key_data);
315 if (entry->n_key_data < 0)
319 if (entry->len > KRB5_KDB_V1_BASE_LENGTH) {
320 entry->e_length = entry->len - KRB5_KDB_V1_BASE_LENGTH;
321 if ((entry->e_data = (krb5_octet *)malloc(entry->e_length))) {
322 memcpy(entry->e_data, nextloc, entry->e_length);
323 nextloc += entry->e_length;
330 * Get the principal name for the entry
343 if ((retval = krb5_parse_name(context, (char *)nextloc, &(entry->princ))))
353 tl_data = &entry->tl_data;
354 for (i = 0; i < entry->n_tl_data; i++) {
386 if (entry->n_key_data && ((entry->key_data = (krb5_key_data *)
387 malloc(sizeof(krb5_key_data) * entry->n_key_data)) == NULL)) {
391 for (i = 0; i < entry->n_key_data; i++) {
399 key_data = entry->key_data + i;
441 krb5_dbe_free_contents(context, entry);
446 krb5_dbe_free_contents(krb5_context context, krb5_db_entry *entry)
452 if (entry->e_data)
453 free(entry->e_data);
454 if (entry->princ)
455 krb5_free_principal(context, entry->princ);
456 for (tl_data = entry->tl_data; tl_data; tl_data = tl_data_next) {
462 if (entry->key_data) {
463 for (i = 0; i < entry->n_key_data; i++) {
464 for (j = 0; j < entry->key_data[i].key_data_ver; j++) {
465 if (entry->key_data[i].key_data_length[j]) {
466 if (entry->key_data[i].key_data_contents[j]) {
467 memset(entry->key_data[i].key_data_contents[j],
469 (unsigned) entry->key_data[i].key_data_length[j]);
470 free (entry->key_data[i].key_data_contents[j]);
473 entry->key_data[i].key_data_contents[j] = NULL;
474 entry->key_data[i].key_data_length[j] = 0;
475 entry->key_data[i].key_data_type[j] = 0;
478 free(entry->key_data);
480 memset(entry, 0, sizeof(*entry));