X-Git-Url: http://review.tizen.org/git/?a=blobdiff_plain;f=src%2Fkadmin%2Fcli%2Fkadmin.c;h=f3ea6fae1766ccc042dabdc3237b3a1502db3e94;hb=c2f234c139894aebb32be1238c052b33d03ec2e9;hp=ed581ee791abdb03ddbf33962d75137cc7ad0e38;hpb=5218de8a2a1c8797fea608e55fa0097fff0e1f34;p=platform%2Fupstream%2Fkrb5.git diff --git a/src/kadmin/cli/kadmin.c b/src/kadmin/cli/kadmin.c index ed581ee..f3ea6fa 100644 --- a/src/kadmin/cli/kadmin.c +++ b/src/kadmin/cli/kadmin.c @@ -104,9 +104,9 @@ usage() "[clnt|local args]\n" " [command args...]\n" "\tclnt args: [-s admin_server[:port]] " - "[[-c ccache]|[-k [-t keytab]]]|[-n]\n" + "[[-c ccache]|[-k [-t keytab]]]|[-n] [-O | -N]\n" "\tlocal args: [-x db_args]* [-d dbname] " - "[-e \"enc:salt ...\"] [-m]" + "[-e \"enc:salt ...\"] [-m] [-w password] " "where,\n\t[-x db_args]* - any number of database specific " "arguments.\n" "\t\t\tLook at each database documentation for supported " @@ -442,7 +442,7 @@ kadmin_startup(int argc, char *argv[], char **request_out, char ***args_out) /* * If no principal name is specified: If authenticating anonymously, use - * the anonymouse principal for the local realm, else if a ccache was + * the anonymous principal for the local realm, else if a ccache was * specified and its primary principal name can be read, it is used, else * if a keytab was specified, the principal name is host/hostname, * otherwise append "/admin" to the primary name of the default ccache, @@ -797,11 +797,11 @@ kadmin_cpw(int argc, char *argv[]) char **db_args = NULL; int db_args_size = 0; - if (argc < 2) { + if (argc < 1) { cpw_usage(NULL); return; } - for (argv++, argc--; argc > 1; argc--, argv++) { + for (argv++, argc--; argc > 0 && **argv == '-'; argc--, argv++) { if (!strcmp("-x", *argv)) { argc--; if (argc < 1) { @@ -841,12 +841,16 @@ kadmin_cpw(int argc, char *argv[]) goto cleanup; } } else { + com_err("change_password", 0, _("unrecognized option %s"), *argv); cpw_usage(NULL); goto cleanup; } } - if (*argv == NULL) { - com_err("change_password", 0, _("missing principal name")); + if (argc != 1) { + if (argc < 1) + com_err("change_password", 0, _("missing principal name")); + else + com_err("change_password", 0, _("too many arguments")); cpw_usage(NULL); goto cleanup; } @@ -1225,13 +1229,13 @@ kadmin_addprinc(int argc, char *argv[]) /* If the policy "default" exists, assign it. */ if (policy_exists("default")) { if (!script_mode) { - fprintf(stderr, _("NOTICE: no policy specified for %s; " + fprintf(stderr, _("No policy specified for %s; " "assigning \"default\"\n"), canon); } princ.policy = "default"; mask |= KADM5_POLICY; } else if (!script_mode) { - fprintf(stderr, _("WARNING: no policy specified for %s; " + fprintf(stderr, _("No policy specified for %s; " "defaulting to no policy\n"), canon); } } @@ -1451,12 +1455,18 @@ kadmin_getprinc(int argc, char *argv[]) for (i = 0; i < dprinc.n_key_data; i++) { krb5_key_data *key_data = &dprinc.key_data[i]; char enctype[BUFSIZ], salttype[BUFSIZ]; + char *deprecated = ""; if (krb5_enctype_to_name(key_data->key_data_type[0], FALSE, enctype, sizeof(enctype))) snprintf(enctype, sizeof(enctype), _(""), key_data->key_data_type[0]); - printf("Key: vno %d, %s", key_data->key_data_kvno, enctype); + if (!krb5_c_valid_enctype(key_data->key_data_type[0])) + deprecated = "UNSUPPORTED:"; + else if (krb5int_c_deprecated_enctype(key_data->key_data_type[0])) + deprecated = "DEPRECATED:"; + printf("Key: vno %d, %s%s", key_data->key_data_kvno, deprecated, + enctype); if (key_data->key_data_ver > 1 && key_data->key_data_type[1] != KRB5_KDB_SALTTYPE_NORMAL) { if (krb5_salttype_to_string(key_data->key_data_type[1],