Lines Matching +full:- +full:_
1 /* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */
11 #include "k5-int.h"
12 #include "k5-hex.h"
29 fprintf(stderr, _("\nUsage: %s [-h] [-v] [-v] [-e num]\n\t%s -R\n\n"), in usage()
95 len = str->utf8str_t_len; in print_hex()
97 if (k5_hex_encode(str->utf8str_t_val, len, FALSE, &hex) != 0) in print_hex()
110 s = k5memdup0(str->utf8str_t_val, str->utf8str_t_len, &ret); in print_str()
112 fprintf(stderr, _("\nCouldn't allocate memory")); in print_str()
115 printf("\t\t\t%s(%d): %s\n", tag, str->utf8str_t_len, s); in print_str()
123 printf("\t\t\tmagic: 0x%x\n", data->k_magic); in print_data()
124 print_str(tag, &data->k_data); in print_data()
134 print_str("realm", &princ->k_realm); in print_princ()
136 len = princ->k_components.k_components_len; in print_princ()
137 data = princ->k_components.k_components_val; in print_princ()
149 printf("\t\t\tver: %d\n", k->k_ver); in print_key()
150 printf("\t\t\tkvno: %d\n", k->k_kvno); in print_key()
152 for (i = 0; i < k->k_enctype.k_enctype_len; i++) in print_key()
153 printf("\t\t\tenc type: 0x%x\n", k->k_enctype.k_enctype_val[i]); in print_key()
155 str = k->k_contents.k_contents_val; in print_key()
156 for (i = 0; i < k->k_contents.k_contents_len; i++, str++) in print_key()
176 printf("\t\t\ttype: 0x%x\n", tl->tl_type); in print_tl()
178 len = tl->tl_data.tl_data_len; in print_tl()
182 printf("%02x", (krb5_octet)tl->tl_data.tl_data_val[i]); in print_tl()
199 * If verbose-verbose then print types along with respective values.
204 switch (val->av_type) { in print_attr()
206 printf(_("\t\tAttribute flags\n")); in print_attr()
208 print_flags(val->kdbe_val_t_u.av_attrflags); in print_attr()
211 printf(_("\t\tMaximum ticket life\n")); in print_attr()
213 print_deltat(&val->kdbe_val_t_u.av_max_life); in print_attr()
216 printf(_("\t\tMaximum renewable life\n")); in print_attr()
218 print_deltat(&val->kdbe_val_t_u.av_max_renew_life); in print_attr()
221 printf(_("\t\tPrincipal expiration\n")); in print_attr()
223 print_time(&val->kdbe_val_t_u.av_exp); in print_attr()
226 printf(_("\t\tPassword expiration\n")); in print_attr()
228 print_time(&val->kdbe_val_t_u.av_pw_exp); in print_attr()
231 printf(_("\t\tLast successful auth\n")); in print_attr()
233 print_time(&val->kdbe_val_t_u.av_last_success); in print_attr()
236 printf(_("\t\tLast failed auth\n")); in print_attr()
238 print_time(&val->kdbe_val_t_u.av_last_failed); in print_attr()
241 printf(_("\t\tFailed passwd attempt\n")); in print_attr()
243 printf("\t\t\t%d\n", val->kdbe_val_t_u.av_fail_auth_count); in print_attr()
246 printf(_("\t\tPrincipal\n")); in print_attr()
248 print_princ(&val->kdbe_val_t_u.av_princ); in print_attr()
251 printf(_("\t\tKey data\n")); in print_attr()
253 print_keydata(val->kdbe_val_t_u.av_keydata.av_keydata_val, in print_attr()
254 val->kdbe_val_t_u.av_keydata.av_keydata_len); in print_attr()
258 printf(_("\t\tTL data\n")); in print_attr()
260 print_tldata(val->kdbe_val_t_u.av_tldata.av_tldata_val, in print_attr()
261 val->kdbe_val_t_u.av_tldata.av_tldata_len); in print_attr()
265 printf(_("\t\tLength\n")); in print_attr()
267 printf("\t\t\t%d\n", val->kdbe_val_t_u.av_len); in print_attr()
270 printf(_("\t\tPassword last changed\n")); in print_attr()
272 print_time(&val->kdbe_val_t_u.av_pw_last_change); in print_attr()
275 printf(_("\t\tModifying principal\n")); in print_attr()
277 print_princ(&val->kdbe_val_t_u.av_mod_princ); in print_attr()
280 printf(_("\t\tModification time\n")); in print_attr()
282 print_time(&val->kdbe_val_t_u.av_mod_time); in print_attr()
285 printf(_("\t\tModified where\n")); in print_attr()
287 print_str("where", &val->kdbe_val_t_u.av_mod_where); in print_attr()
290 printf(_("\t\tPassword policy\n")); in print_attr()
292 print_str("policy", &val->kdbe_val_t_u.av_pw_policy); in print_attr()
295 printf(_("\t\tPassword policy switch\n")); in print_attr()
297 printf("\t\t\t%d\n", val->kdbe_val_t_u.av_pw_policy_switch); in print_attr()
300 printf(_("\t\tPassword history KVNO\n")); in print_attr()
302 printf("\t\t\t%d\n", val->kdbe_val_t_u.av_pw_hist_kvno); in print_attr()
305 printf(_("\t\tPassword history\n")); in print_attr()
325 if (entry && (entry < ulog->kdb_num)) in print_update()
326 start_sno = ulog->kdb_last_sno - entry; in print_update()
328 start_sno = ulog->kdb_first_sno - 1; in print_update()
330 for (i = start_sno; i < ulog->kdb_last_sno; i++) { in print_update()
338 if (indx_log->kdb_umagic != KDB_ULOG_MAGIC) { in print_update()
339 fprintf(stderr, _("Corrupt update entry\n\n")); in print_update()
343 printf("---\n"); in print_update()
344 printf(_("Update Entry\n")); in print_update()
346 printf(_("\tUpdate serial # : %u\n"), indx_log->kdb_entry_sno); in print_update()
349 if (indx_log->kdb_entry_size == 0) { in print_update()
350 printf(_("\tDummy entry\n")); in print_update()
355 xdrmem_create(&xdrs, (char *)indx_log->entry_data, in print_update()
356 indx_log->kdb_entry_size, XDR_DECODE); in print_update()
358 printf(_("Entry data decode failure\n\n")); in print_update()
362 printf(_("\tUpdate operation : ")); in print_update()
364 printf(_("Delete\n")); in print_update()
366 printf(_("Add\n")); in print_update()
370 printf(_("Could not allocate principal name\n\n")); in print_update()
376 printf(_("\tUpdate principal : %s\n"), dbprinc); in print_update()
378 printf(_("\tUpdate size : %u\n"), indx_log->kdb_entry_size); in print_update()
379 printf(_("\tUpdate committed : %s\n"), in print_update()
380 indx_log->kdb_commit ? "True" : "False"); in print_update()
382 if (indx_log->kdb_time.seconds == 0L) { in print_update()
383 printf(_("\tUpdate time stamp : None\n")); in print_update()
385 printf(_("\tUpdate time stamp : %s"), in print_update()
386 ctime_uint32(&indx_log->kdb_time.seconds)); in print_update()
389 printf(_("\tAttributes changed : %d\n"), upd.kdb_update.kdbe_t_len); in print_update()
401 /* Return a read-only mmap of the ulog, or NULL on failure. */
409 *fd_out = -1; in map_ulog()
412 if (fd == -1) in map_ulog()
430 int c, ulog_fd = -1; in main()
442 while ((c = getopt(argc, argv, "Rvhe:")) != -1) { in main()
462 fprintf(stderr, _("Unable to initialize Kerberos\n\n")); in main()
469 fprintf(stderr, _("Couldn't read database_name\n\n")); in main()
473 printf(_("\nKerberos update log (%s)\n"), params.iprop_logfile); in main()
477 fprintf(stderr, _("Unable to map log file %s\n\n"), in main()
482 fprintf(stderr, _("Couldn't reinitialize ulog file %s\n\n"), in main()
486 printf(_("Reinitialized the ulog.\n")); in main()
493 fprintf(stderr, _("Unable to map log file %s\n\n"), in main()
498 if (ulog->kdb_hmagic != KDB_ULOG_HDR_MAGIC) { in main()
499 fprintf(stderr, _("Corrupt header log, exiting\n\n")); in main()
503 printf(_("Update log dump :\n")); in main()
504 printf(_("\tLog version # : %u\n"), ulog->db_version_num); in main()
505 printf(_("\tLog state : ")); in main()
506 switch (ulog->kdb_state) { in main()
508 printf(_("Stable\n")); in main()
511 printf(_("Unstable\n")); in main()
514 printf(_("Corrupt\n")); in main()
517 printf(_("Unknown state: %d\n"), ulog->kdb_state); in main()
520 printf(_("\tEntry block size : %u\n"), ulog->kdb_block); in main()
521 printf(_("\tNumber of entries : %u\n"), ulog->kdb_num); in main()
523 if (ulog->kdb_last_sno == 0) { in main()
524 printf(_("\tLast serial # : None\n")); in main()
526 if (ulog->kdb_first_sno == 0) { in main()
527 printf(_("\tFirst serial # : None\n")); in main()
529 printf(_("\tFirst serial # : ")); in main()
530 printf("%u\n", ulog->kdb_first_sno); in main()
533 printf(_("\tLast serial # : ")); in main()
534 printf("%u\n", ulog->kdb_last_sno); in main()
537 if (ulog->kdb_last_time.seconds == 0L) { in main()
538 printf(_("\tLast time stamp : None\n")); in main()
540 if (ulog->kdb_first_time.seconds == 0L) { in main()
541 printf(_("\tFirst time stamp : None\n")); in main()
543 printf(_("\tFirst time stamp : %s"), in main()
544 ctime_uint32(&ulog->kdb_first_time.seconds)); in main()
547 printf(_("\tLast time stamp : %s\n"), in main()
548 ctime_uint32(&ulog->kdb_last_time.seconds)); in main()
551 if (!headeronly && ulog->kdb_num) in main()