xref: /illumos-gate/usr/src/cmd/krb5/kadmin/cli/kadmin_ct.c (revision d48be21240dfd051b689384ce2b23479d757f2d8)
1 /*
2  * WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING
3  *
4  *	Openvision retains the copyright to derivative works of
5  *	this source code.  Do *NOT* create a derivative of this
6  *	source code before consulting with your legal department.
7  *	Do *NOT* integrate *ANY* of this source code into another
8  *	product before consulting with your legal department.
9  *
10  *	For further information, read the top-level Openvision
11  *	copyright which is contained in the top-level MIT Kerberos
12  *	copyright.
13  *
14  * WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING
15  *
16  */
17 
18 
19 
20 /* kadmin_ct.c - automatically generated from kadmin_ct.ct */
21 /* Above no longer appears to be true */
22 
23 /*
24  * I18n hack. We sill define gettext(s) to be s here. That way the info_strings
25  * will be extracted to the .po file.
26  */
27 
28 #define	gettext(s) s
29 
30 #include <ss/ss.h>
31 
32 #ifndef __STDC__
33 #define const
34 #endif
35 
36 static char const * const ssu00001[] = {
37 "add_principal",
38     "addprinc",
39     "ank",
40     (char const *)0
41 };
42 extern void kadmin_addprinc __SS_PROTO;
43 static char const * const ssu00002[] = {
44 "delete_principal",
45     "delprinc",
46     (char const *)0
47 };
48 extern void kadmin_delprinc __SS_PROTO;
49 static char const * const ssu00003[] = {
50 "modify_principal",
51     "modprinc",
52     (char const *)0
53 };
54 extern void kadmin_modprinc __SS_PROTO;
55 static char const * const ssu00004[] = {
56 "change_password",
57     "cpw",
58     (char const *)0
59 };
60 extern void kadmin_cpw __SS_PROTO;
61 static char const * const ssu00005[] = {
62 "get_principal",
63     "getprinc",
64     (char const *)0
65 };
66 extern void kadmin_getprinc __SS_PROTO;
67 static char const * const ssu00006[] = {
68 "list_principals",
69     "listprincs",
70     "get_principals",
71     "getprincs",
72     (char const *)0
73 };
74 extern void kadmin_getprincs __SS_PROTO;
75 static char const * const ssu00007[] = {
76 "add_policy",
77     "addpol",
78     (char const *)0
79 };
80 extern void kadmin_addpol __SS_PROTO;
81 static char const * const ssu00008[] = {
82 "modify_policy",
83     "modpol",
84     (char const *)0
85 };
86 extern void kadmin_modpol __SS_PROTO;
87 static char const * const ssu00009[] = {
88 "delete_policy",
89     "delpol",
90     (char const *)0
91 };
92 extern void kadmin_delpol __SS_PROTO;
93 static char const * const ssu00010[] = {
94 "get_policy",
95     "getpol",
96     (char const *)0
97 };
98 extern void kadmin_getpol __SS_PROTO;
99 static char const * const ssu00011[] = {
100 "list_policies",
101     "listpols",
102     "get_policies",
103     "getpols",
104     (char const *)0
105 };
106 extern void kadmin_getpols __SS_PROTO;
107 static char const * const ssu00012[] = {
108 "get_privs",
109     "getprivs",
110     (char const *)0
111 };
112 extern void kadmin_getprivs __SS_PROTO;
113 static char const * const ssu00013[] = {
114 "ktadd",
115     "xst",
116     (char const *)0
117 };
118 extern void kadmin_keytab_add __SS_PROTO;
119 static char const * const ssu00014[] = {
120 "ktremove",
121     "ktrem",
122     (char const *)0
123 };
124 extern void kadmin_keytab_remove __SS_PROTO;
125 
126 static char const * const ssu00015[] = {
127 "lock",
128     (char const *)0
129 };
130 extern void kadmin_lock __SS_PROTO;
131 static char const * const ssu00016[] = {
132 "unlock",
133     (char const *)0
134 };
135 extern void kadmin_unlock __SS_PROTO;
136 
137 static char const * const ssu00017[] = {
138 "list_requests",
139     "lr",
140     "?",
141     (char const *)0
142 };
143 
144 extern void ss_list_requests __SS_PROTO;
145 static char const * const ssu00018[] = {
146 "quit",
147     "exit",
148     "q",
149     (char const *)0
150 };
151 extern void ss_quit __SS_PROTO;
152 static ss_request_entry ssu00019[] = {
153     { ssu00001,
154       kadmin_addprinc,
155       gettext("Add principal"),
156       0 },
157     { ssu00002,
158       kadmin_delprinc,
159       gettext("Delete principal"),
160       0 },
161     { ssu00003,
162       kadmin_modprinc,
163       gettext("Modify principal"),
164       0 },
165     { ssu00004,
166       kadmin_cpw,
167       gettext("Change password"),
168       0 },
169     { ssu00005,
170       kadmin_getprinc,
171       gettext("Get principal"),
172       0 },
173     { ssu00006,
174       kadmin_getprincs,
175       gettext("List principals"),
176       0 },
177     { ssu00007,
178       kadmin_addpol,
179       gettext("Add policy"),
180       0 },
181     { ssu00008,
182       kadmin_modpol,
183       gettext("Modify policy"),
184       0 },
185     { ssu00009,
186       kadmin_delpol,
187       gettext("Delete policy"),
188       0 },
189     { ssu00010,
190       kadmin_getpol,
191       gettext("Get policy"),
192       0 },
193     { ssu00011,
194       kadmin_getpols,
195       gettext("List policies"),
196       0 },
197     { ssu00012,
198       kadmin_getprivs,
199       gettext("Get privileges"),
200       0 },
201     { ssu00013,
202       kadmin_keytab_add,
203       gettext("Add entry(s) to a keytab"),
204       0 },
205     { ssu00014,
206       kadmin_keytab_remove,
207       gettext("Remove entry(s) from a keytab"),
208       0 },
209     { ssu00015,
210       kadmin_lock,
211       gettext("Lock database exclusively (use with extreme caution!)"),
212       0 },
213     { ssu00016,
214       kadmin_unlock,
215       gettext("Release exclusive database lock"),
216       0 },
217     { ssu00017,
218       ss_list_requests,
219       gettext("List available requests."),
220       0 },
221     { ssu00018,
222       ss_quit,
223       gettext("Exit program."),
224       0 },
225     { 0, 0, 0, 0 }
226 };
227 
228 ss_request_table kadmin_cmds = { 2, ssu00019 };
229 
230 #undef gettext
231