xref: /titanic_50/usr/src/cmd/krb5/kadmin/cli/kadmin_ct.c (revision dfb96a4f56fb431b915bc67e5d9d5c8d4f4f6679)
1 #pragma ident	"%Z%%M%	%I%	%E% SMI"
2 
3 /*
4  * WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING
5  *
6  *	Openvision retains the copyright to derivative works of
7  *	this source code.  Do *NOT* create a derivative of this
8  *	source code before consulting with your legal department.
9  *	Do *NOT* integrate *ANY* of this source code into another
10  *	product before consulting with your legal department.
11  *
12  *	For further information, read the top-level Openvision
13  *	copyright which is contained in the top-level MIT Kerberos
14  *	copyright.
15  *
16  * WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING
17  *
18  */
19 
20 
21 
22 /* kadmin_ct.c - automatically generated from kadmin_ct.ct */
23 /* Above no longer appears to be true */
24 
25 /*
26  * I18n hack. We sill define gettext(s) to be s here. That way the info_strings
27  * will be extracted to the .po file.
28  */
29 
30 #define	gettext(s) s
31 
32 #include <ss/ss.h>
33 
34 #ifndef __STDC__
35 #define const
36 #endif
37 
38 static char const * const ssu00001[] = {
39 "add_principal",
40     "addprinc",
41     "ank",
42     (char const *)0
43 };
44 extern void kadmin_addprinc __SS_PROTO;
45 static char const * const ssu00002[] = {
46 "delete_principal",
47     "delprinc",
48     (char const *)0
49 };
50 extern void kadmin_delprinc __SS_PROTO;
51 static char const * const ssu00003[] = {
52 "modify_principal",
53     "modprinc",
54     (char const *)0
55 };
56 extern void kadmin_modprinc __SS_PROTO;
57 static char const * const ssu00004[] = {
58 "change_password",
59     "cpw",
60     (char const *)0
61 };
62 extern void kadmin_cpw __SS_PROTO;
63 static char const * const ssu00005[] = {
64 "get_principal",
65     "getprinc",
66     (char const *)0
67 };
68 extern void kadmin_getprinc __SS_PROTO;
69 static char const * const ssu00006[] = {
70 "list_principals",
71     "listprincs",
72     "get_principals",
73     "getprincs",
74     (char const *)0
75 };
76 extern void kadmin_getprincs __SS_PROTO;
77 static char const * const ssu00007[] = {
78 "add_policy",
79     "addpol",
80     (char const *)0
81 };
82 extern void kadmin_addpol __SS_PROTO;
83 static char const * const ssu00008[] = {
84 "modify_policy",
85     "modpol",
86     (char const *)0
87 };
88 extern void kadmin_modpol __SS_PROTO;
89 static char const * const ssu00009[] = {
90 "delete_policy",
91     "delpol",
92     (char const *)0
93 };
94 extern void kadmin_delpol __SS_PROTO;
95 static char const * const ssu00010[] = {
96 "get_policy",
97     "getpol",
98     (char const *)0
99 };
100 extern void kadmin_getpol __SS_PROTO;
101 static char const * const ssu00011[] = {
102 "list_policies",
103     "listpols",
104     "get_policies",
105     "getpols",
106     (char const *)0
107 };
108 extern void kadmin_getpols __SS_PROTO;
109 static char const * const ssu00012[] = {
110 "get_privs",
111     "getprivs",
112     (char const *)0
113 };
114 extern void kadmin_getprivs __SS_PROTO;
115 static char const * const ssu00013[] = {
116 "ktadd",
117     "xst",
118     (char const *)0
119 };
120 extern void kadmin_keytab_add __SS_PROTO;
121 static char const * const ssu00014[] = {
122 "ktremove",
123     "ktrem",
124     (char const *)0
125 };
126 extern void kadmin_keytab_remove __SS_PROTO;
127 
128 static char const * const ssu00015[] = {
129 "lock",
130     (char const *)0
131 };
132 extern void kadmin_lock __SS_PROTO;
133 static char const * const ssu00016[] = {
134 "unlock",
135     (char const *)0
136 };
137 extern void kadmin_unlock __SS_PROTO;
138 
139 static char const * const ssu00017[] = {
140 "list_requests",
141     "lr",
142     "?",
143     (char const *)0
144 };
145 
146 extern void ss_list_requests __SS_PROTO;
147 static char const * const ssu00018[] = {
148 "quit",
149     "exit",
150     "q",
151     (char const *)0
152 };
153 extern void ss_quit __SS_PROTO;
154 static ss_request_entry ssu00019[] = {
155     { ssu00001,
156       kadmin_addprinc,
157       gettext("Add principal"),
158       0 },
159     { ssu00002,
160       kadmin_delprinc,
161       gettext("Delete principal"),
162       0 },
163     { ssu00003,
164       kadmin_modprinc,
165       gettext("Modify principal"),
166       0 },
167     { ssu00004,
168       kadmin_cpw,
169       gettext("Change password"),
170       0 },
171     { ssu00005,
172       kadmin_getprinc,
173       gettext("Get principal"),
174       0 },
175     { ssu00006,
176       kadmin_getprincs,
177       gettext("List principals"),
178       0 },
179     { ssu00007,
180       kadmin_addpol,
181       gettext("Add policy"),
182       0 },
183     { ssu00008,
184       kadmin_modpol,
185       gettext("Modify policy"),
186       0 },
187     { ssu00009,
188       kadmin_delpol,
189       gettext("Delete policy"),
190       0 },
191     { ssu00010,
192       kadmin_getpol,
193       gettext("Get policy"),
194       0 },
195     { ssu00011,
196       kadmin_getpols,
197       gettext("List policies"),
198       0 },
199     { ssu00012,
200       kadmin_getprivs,
201       gettext("Get privileges"),
202       0 },
203     { ssu00013,
204       kadmin_keytab_add,
205       gettext("Add entry(s) to a keytab"),
206       0 },
207     { ssu00014,
208       kadmin_keytab_remove,
209       gettext("Remove entry(s) from a keytab"),
210       0 },
211     { ssu00015,
212       kadmin_lock,
213       gettext("Lock database exclusively (use with extreme caution!)"),
214       0 },
215     { ssu00016,
216       kadmin_unlock,
217       gettext("Release exclusive database lock"),
218       0 },
219     { ssu00017,
220       ss_list_requests,
221       gettext("List available requests."),
222       0 },
223     { ssu00018,
224       ss_quit,
225       gettext("Exit program."),
226       0 },
227     { 0, 0, 0, 0 }
228 };
229 
230 ss_request_table kadmin_cmds = { 2, ssu00019 };
231 
232 #undef gettext
233