nattrs
int i, nattrs;
ret = krb5_dbe_get_strings(util_context, dbe, &attrs, &nattrs);
for (i = 0; i < nattrs; i++) {
krb5_dbe_free_strings(util_context, attrs, nattrs);
*nattrs = i;
int i, j, cnt, final, nattrs, tmpint;
nattrs = tmpint = 0;
while (nattrs < MAXATTRS_SIZE - 8) {
attr_types[nattrs] = nattrs;
nattrs++;
find_changed_attrs(curr, entry, TRUE, attr_types, &nattrs);
for (i = 0; i < nattrs; i++) {
kdbe_attr_type_t *attrs, int *nattrs)
int i, j, cnt = 0, mod_time = 0, nattrs;
nattrs = update->kdb_update.kdbe_t_len;
for (i = 0; i < nattrs; i++) {
unsigned int nattrs = 0;
attrs[nattrs].type = CKA_CLASS;
attrs[nattrs].pValue = &cls;
attrs[nattrs].ulValueLen = sizeof cls;
nattrs++;
attrs[nattrs].type = usage;
attrs[nattrs].pValue = &true_false;
attrs[nattrs].ulValueLen = sizeof true_false;
nattrs++;
attrs[nattrs].type = CKA_ID;
attrs[nattrs].pValue = id_cryptoctx->cert_id;
attrs[nattrs].ulValueLen = id_cryptoctx->cert_id_len;
nattrs++;
nattrs);
unsigned int nattrs;
nattrs = 2;
attrs[nattrs].type = CKA_ID;
attrs[nattrs].pValue = id_cryptoctx->cert_id;
attrs[nattrs].ulValueLen = id_cryptoctx->cert_id_len;
nattrs++;
attrs[nattrs].type = CKA_LABEL;
attrs[nattrs].pValue = id_cryptoctx->cert_label;
attrs[nattrs].ulValueLen = strlen(id_cryptoctx->cert_label);
nattrs++;
nattrs);
CK_ULONG nattrs;
nattrs = 0;
FILL_ATTR(attrs, nattrs, CKA_CLASS, &key_class, sizeof(key_class));
FILL_ATTR(attrs, nattrs, CKA_ID, &keyid, sizeof(keyid));
if (pkcs11_find(p, slotidx, attrs, nattrs, &obj) == 0 &&
nattrs = 0;
FILL_ATTR(attrs, nattrs, CKA_CLASS, &key_class, sizeof(key_class));
FILL_ATTR(attrs, nattrs, CKA_ID, &keyid, sizeof(keyid));
if (pkcs11_find(p, slotidx, attrs, nattrs, &obj) == 0 &&
nattrs = 0;
FILL_ATTR(attrs, nattrs, CKA_KEY_TYPE, &key_type,
rv = f->C_GetAttributeValue(session, obj, attrs, nattrs);
if (sdp_search(ss, 1, &service, nattrs, attrs, nvalues, values) != 0)