8322 nl: misleading-indentation
[unleashed/tickless.git] / usr / src / lib / gss_mechs / mech_krb5 / et / krb5_err.c
blob9c48055fe3b4090836a528b32e3cfc2157b92571
1 /*
2 * Copyright (c) 1999, 2010, Oracle and/or its affiliates. All rights reserved.
3 */
5 #include <locale.h>
6 #include <security/cryptoki.h>
7 #include <security/pkcs11.h>
9 const char *
10 krb5_error_table(long errorno) {
12 switch (errorno) {
13 case 0:
14 return (dgettext(TEXT_DOMAIN,
15 "No error"));
16 case 1:
17 return (dgettext(TEXT_DOMAIN,
18 "Client's entry in database has expired"));
19 case 2:
20 return (dgettext(TEXT_DOMAIN,
21 "Server's entry in database has expired"));
22 case 3:
23 return (dgettext(TEXT_DOMAIN,
24 "Requested protocol version not supported"));
25 case 4:
26 return (dgettext(TEXT_DOMAIN,
27 "Client's key is encrypted in an old master key"));
28 case 5:
29 return (dgettext(TEXT_DOMAIN,
30 "Server's key is encrypted in an old master key"));
31 case 6:
32 return (dgettext(TEXT_DOMAIN,
33 "Client not found in Kerberos database"));
34 case 7:
35 return (dgettext(TEXT_DOMAIN,
36 "Server not found in Kerberos database"));
37 case 8:
38 return (dgettext(TEXT_DOMAIN,
39 "Principal has multiple entries in Kerberos database"));
40 case 9:
41 return (dgettext(TEXT_DOMAIN,
42 "Client or server has a null key"));
43 case 10:
44 return (dgettext(TEXT_DOMAIN,
45 "Ticket is ineligible for postdating"));
46 case 11:
47 return (dgettext(TEXT_DOMAIN,
48 "Requested effective lifetime is negative or too short"));
49 case 12:
50 return (dgettext(TEXT_DOMAIN,
51 "KDC policy rejects request"));
52 case 13:
53 return (dgettext(TEXT_DOMAIN,
54 "KDC can't fulfill requested option"));
55 case 14:
56 return (dgettext(TEXT_DOMAIN,
57 "KDC has no support for encryption type"));
58 case 15:
59 return (dgettext(TEXT_DOMAIN,
60 "KDC has no support for checksum type"));
61 case 16:
62 return (dgettext(TEXT_DOMAIN,
63 "KDC has no support for padata type"));
64 case 17:
65 return (dgettext(TEXT_DOMAIN,
66 "KDC has no support for transited type"));
67 case 18:
68 return (dgettext(TEXT_DOMAIN,
69 "Clients credentials have been revoked"));
70 case 19:
71 return (dgettext(TEXT_DOMAIN,
72 "Credentials for server have been revoked"));
73 case 20:
74 return (dgettext(TEXT_DOMAIN,
75 "TGT has been revoked"));
76 case 21:
77 return (dgettext(TEXT_DOMAIN,
78 "Client not yet valid - try again later"));
79 case 22:
80 return (dgettext(TEXT_DOMAIN,
81 "Server not yet valid - try again later"));
82 case 23:
83 return (dgettext(TEXT_DOMAIN,
84 "Password has expired"));
85 case 24:
86 return (dgettext(TEXT_DOMAIN,
87 "Preauthentication failed"));
88 case 25:
89 return (dgettext(TEXT_DOMAIN,
90 "Additional pre-authentication required"));
91 case 26:
92 return (dgettext(TEXT_DOMAIN,
93 "Requested server and ticket don't match"));
94 case 27:
95 return (dgettext(TEXT_DOMAIN,
96 "Server principal valid for user2user only"));
97 case 28:
98 return (dgettext(TEXT_DOMAIN,
99 "KDC policy rejects transited path"));
100 case 29:
101 return (dgettext(TEXT_DOMAIN,
102 "A service is not available that is required to "
103 "process the request"));
104 case 30:
105 return (dgettext(TEXT_DOMAIN,
106 "KRB5 error code 30"));
107 case 31:
108 return (dgettext(TEXT_DOMAIN,
109 "Decrypt integrity check failed"));
110 case 32:
111 return (dgettext(TEXT_DOMAIN,
112 "Ticket expired"));
113 case 33:
114 return (dgettext(TEXT_DOMAIN,
115 "Ticket not yet valid"));
116 case 34:
117 return (dgettext(TEXT_DOMAIN,
118 "Request is a replay"));
119 case 35:
120 return (dgettext(TEXT_DOMAIN,
121 "The ticket isn't for us"));
122 case 36:
123 return (dgettext(TEXT_DOMAIN,
124 "Ticket/authenticator don't match"));
125 case 37:
126 return (dgettext(TEXT_DOMAIN,
127 "Clock skew too great"));
128 case 38:
129 return (dgettext(TEXT_DOMAIN,
130 "Incorrect net address"));
131 case 39:
132 return (dgettext(TEXT_DOMAIN,
133 "Protocol version mismatch"));
134 case 40:
135 return (dgettext(TEXT_DOMAIN,
136 "Invalid message type"));
137 case 41:
138 return (dgettext(TEXT_DOMAIN,
139 "Message stream modified"));
140 case 42:
141 return (dgettext(TEXT_DOMAIN,
142 "Message out of order"));
143 case 43:
144 return (dgettext(TEXT_DOMAIN,
145 "Illegal cross-realm ticket"));
146 case 44:
147 return (dgettext(TEXT_DOMAIN,
148 "Key version is not available"));
149 case 45:
150 return (dgettext(TEXT_DOMAIN,
151 "Service key not available"));
152 case 46:
153 return (dgettext(TEXT_DOMAIN,
154 "Mutual authentication failed"));
155 case 47:
156 return (dgettext(TEXT_DOMAIN,
157 "Incorrect message direction"));
158 case 48:
159 return (dgettext(TEXT_DOMAIN,
160 "Alternative authentication method required"));
161 case 49:
162 return (dgettext(TEXT_DOMAIN,
163 "Incorrect sequence number in message"));
164 case 50:
165 return (dgettext(TEXT_DOMAIN,
166 "Inappropriate type of checksum in message"));
167 case 51:
168 return (dgettext(TEXT_DOMAIN,
169 "Policy rejects transited path"));
170 case 52:
171 return (dgettext(TEXT_DOMAIN,
172 "Response too big for UDP, retry with TCP"));
173 case 53:
174 return (dgettext(TEXT_DOMAIN,
175 "KRB5 error code 53"));
176 case 54:
177 return (dgettext(TEXT_DOMAIN,
178 "KRB5 error code 54"));
179 case 55:
180 return (dgettext(TEXT_DOMAIN,
181 "KRB5 error code 55"));
182 case 56:
183 return (dgettext(TEXT_DOMAIN,
184 "KRB5 error code 56"));
185 case 57:
186 return (dgettext(TEXT_DOMAIN,
187 "KRB5 error code 57"));
188 case 58:
189 return (dgettext(TEXT_DOMAIN,
190 "KRB5 error code 58"));
191 case 59:
192 return (dgettext(TEXT_DOMAIN,
193 "KRB5 error code 59"));
194 case 60:
195 return (dgettext(TEXT_DOMAIN,
196 "Generic error (see e-text)"));
197 case 61:
198 return (dgettext(TEXT_DOMAIN,
199 "Field is too long for this implementation"));
200 case 62:
201 return (dgettext(TEXT_DOMAIN,
202 "Client not trusted"));
203 case 63:
204 return (dgettext(TEXT_DOMAIN,
205 "KDC not trusted"));
206 case 64:
207 return (dgettext(TEXT_DOMAIN,
208 "Invalid signature"));
209 case 65:
210 return (dgettext(TEXT_DOMAIN,
211 "Key parameters not accepted"));
212 case 66:
213 return (dgettext(TEXT_DOMAIN,
214 "Certificate mismatch"));
215 case 67:
216 return (dgettext(TEXT_DOMAIN,
217 "No ticket granting ticket"));
218 case 68:
219 return (dgettext(TEXT_DOMAIN,
220 "Realm not local to KDC"));
221 case 69:
222 return (dgettext(TEXT_DOMAIN,
223 "User to user required"));
224 case 70:
225 return (dgettext(TEXT_DOMAIN,
226 "Can't verify certificate"));
227 case 71:
228 return (dgettext(TEXT_DOMAIN,
229 "Invalid certificate"));
230 case 72:
231 return (dgettext(TEXT_DOMAIN,
232 "Revoked certificate"));
233 case 73:
234 return (dgettext(TEXT_DOMAIN,
235 "Revocation status unknown"));
236 case 74:
237 return (dgettext(TEXT_DOMAIN,
238 "Revocation status unavailable"));
239 case 75:
240 return (dgettext(TEXT_DOMAIN,
241 "Client name mismatch"));
242 case 76:
243 return (dgettext(TEXT_DOMAIN,
244 "KDC name mismatch"));
245 case 77:
246 return (dgettext(TEXT_DOMAIN,
247 "Inconsistent key purpose"));
248 case 78:
249 return (dgettext(TEXT_DOMAIN,
250 "Digest in certificate not accepted"));
251 case 79:
252 return (dgettext(TEXT_DOMAIN,
253 "Checksum must be included"));
254 case 80:
255 return (dgettext(TEXT_DOMAIN,
256 "Digest in signed-data not accepted"));
257 case 81:
258 return (dgettext(TEXT_DOMAIN,
259 "Public key encryption not supported"));
260 case 82:
261 return (dgettext(TEXT_DOMAIN,
262 "KRB5 error code 82"));
263 case 83:
264 return (dgettext(TEXT_DOMAIN,
265 "KRB5 error code 83"));
266 case 84:
267 return (dgettext(TEXT_DOMAIN,
268 "KRB5 error code 84"));
269 case 85:
270 return (dgettext(TEXT_DOMAIN,
271 "KRB5 error code 85"));
272 case 86:
273 return (dgettext(TEXT_DOMAIN,
274 "KRB5 error code 86"));
275 case 87:
276 return (dgettext(TEXT_DOMAIN,
277 "KRB5 error code 87"));
278 case 88:
279 return (dgettext(TEXT_DOMAIN,
280 "KRB5 error code 88"));
281 case 89:
282 return (dgettext(TEXT_DOMAIN,
283 "KRB5 error code 89"));
284 case 90:
285 return (dgettext(TEXT_DOMAIN,
286 "KRB5 error code 90"));
287 case 91:
288 return (dgettext(TEXT_DOMAIN,
289 "KRB5 error code 91"));
290 case 92:
291 return (dgettext(TEXT_DOMAIN,
292 "KRB5 error code 92"));
293 case 93:
294 return (dgettext(TEXT_DOMAIN,
295 "KRB5 error code 93"));
296 case 94:
297 return (dgettext(TEXT_DOMAIN,
298 "KRB5 error code 94"));
299 case 95:
300 return (dgettext(TEXT_DOMAIN,
301 "KRB5 error code 95"));
302 case 96:
303 return (dgettext(TEXT_DOMAIN,
304 "KRB5 error code 96"));
305 case 97:
306 return (dgettext(TEXT_DOMAIN,
307 "KRB5 error code 97"));
308 case 98:
309 return (dgettext(TEXT_DOMAIN,
310 "KRB5 error code 98"));
311 case 99:
312 return (dgettext(TEXT_DOMAIN,
313 "KRB5 error code 99"));
314 case 100:
315 return (dgettext(TEXT_DOMAIN,
316 "KRB5 error code 100"));
317 case 101:
318 return (dgettext(TEXT_DOMAIN,
319 "KRB5 error code 101"));
320 case 102:
321 return (dgettext(TEXT_DOMAIN,
322 "KRB5 error code 102"));
323 case 103:
324 return (dgettext(TEXT_DOMAIN,
325 "KRB5 error code 103"));
326 case 104:
327 return (dgettext(TEXT_DOMAIN,
328 "KRB5 error code 104"));
329 case 105:
330 return (dgettext(TEXT_DOMAIN,
331 "KRB5 error code 105"));
332 case 106:
333 return (dgettext(TEXT_DOMAIN,
334 "KRB5 error code 106"));
335 case 107:
336 return (dgettext(TEXT_DOMAIN,
337 "KRB5 error code 107"));
338 case 108:
339 return (dgettext(TEXT_DOMAIN,
340 "KRB5 error code 108"));
341 case 109:
342 return (dgettext(TEXT_DOMAIN,
343 "KRB5 error code 109"));
344 case 110:
345 return (dgettext(TEXT_DOMAIN,
346 "KRB5 error code 110"));
347 case 111:
348 return (dgettext(TEXT_DOMAIN,
349 "KRB5 error code 111"));
350 case 112:
351 return (dgettext(TEXT_DOMAIN,
352 "KRB5 error code 112"));
353 case 113:
354 return (dgettext(TEXT_DOMAIN,
355 "KRB5 error code 113"));
356 case 114:
357 return (dgettext(TEXT_DOMAIN,
358 "KRB5 error code 114"));
359 case 115:
360 return (dgettext(TEXT_DOMAIN,
361 "KRB5 error code 115"));
362 case 116:
363 return (dgettext(TEXT_DOMAIN,
364 "KRB5 error code 116"));
365 case 117:
366 return (dgettext(TEXT_DOMAIN,
367 "KRB5 error code 117"));
368 case 118:
369 return (dgettext(TEXT_DOMAIN,
370 "KRB5 error code 118"));
371 case 119:
372 return (dgettext(TEXT_DOMAIN,
373 "KRB5 error code 119"));
374 case 120:
375 return (dgettext(TEXT_DOMAIN,
376 "KRB5 error code 120"));
377 case 121:
378 return (dgettext(TEXT_DOMAIN,
379 "KRB5 error code 121"));
380 case 122:
381 return (dgettext(TEXT_DOMAIN,
382 "KRB5 error code 122"));
383 case 123:
384 return (dgettext(TEXT_DOMAIN,
385 "KRB5 error code 123"));
386 case 124:
387 return (dgettext(TEXT_DOMAIN,
388 "KRB5 error code 124"));
389 case 125:
390 return (dgettext(TEXT_DOMAIN,
391 "KRB5 error code 125"));
392 case 126:
393 return (dgettext(TEXT_DOMAIN,
394 "KRB5 error code 126"));
395 case 127:
396 return (dgettext(TEXT_DOMAIN,
397 "KRB5 error code 127"));
398 case 128:
399 return (
400 "$Id: krb5_err.et,v 5.66 1999/12/06 21:45:03 raeburn Exp $");
401 case 129:
402 return (dgettext(TEXT_DOMAIN,
403 "Invalid flag for file lock mode"));
404 case 130:
405 return (dgettext(TEXT_DOMAIN,
406 "Cannot read password"));
407 case 131:
408 return (dgettext(TEXT_DOMAIN,
409 "Password mismatch"));
410 case 132:
411 return (dgettext(TEXT_DOMAIN,
412 "Password read interrupted"));
413 case 133:
414 return (dgettext(TEXT_DOMAIN,
415 "Illegal character in component name"));
416 case 134:
417 return (dgettext(TEXT_DOMAIN,
418 "Malformed representation of principal"));
419 case 135:
420 return (dgettext(TEXT_DOMAIN,
421 "Can't open/find Kerberos /etc/krb5/krb5.conf configuration "
422 "file"));
423 case 136:
424 return (dgettext(TEXT_DOMAIN,
425 "Improper format of Kerberos /etc/krb5/krb5.conf configuration file"));
426 case 137:
427 return (dgettext(TEXT_DOMAIN,
428 "Insufficient space to return complete information"));
429 case 138:
430 return (dgettext(TEXT_DOMAIN,
431 "Invalid message type specified for encoding"));
432 case 139:
433 return (dgettext(TEXT_DOMAIN,
434 "Credential cache name malformed"));
435 case 140:
436 return (dgettext(TEXT_DOMAIN,
437 "Unknown credential cache type"));
438 case 141:
439 return (dgettext(TEXT_DOMAIN,
440 "Matching credential not found"));
441 case 142:
442 return (dgettext(TEXT_DOMAIN,
443 "End of credential cache reached"));
444 case 143:
445 return (dgettext(TEXT_DOMAIN,
446 "Request did not supply a ticket"));
447 case 144:
448 return (dgettext(TEXT_DOMAIN,
449 "Wrong principal in request"));
450 case 145:
451 return (dgettext(TEXT_DOMAIN,
452 "Ticket has invalid flag set"));
453 case 146:
454 return (dgettext(TEXT_DOMAIN,
455 "Requested principal and ticket don't match"));
456 case 147:
457 return (dgettext(TEXT_DOMAIN,
458 "KDC reply did not match expectations"));
459 case 148:
460 return (dgettext(TEXT_DOMAIN,
461 "Clock skew too great in KDC reply"));
462 case 149:
463 return (dgettext(TEXT_DOMAIN,
464 "Client/server realm mismatch in initial ticket "
465 "request"));
466 case 150:
467 return (dgettext(TEXT_DOMAIN,
468 "Program lacks support for encryption type"));
469 case 151:
470 return (dgettext(TEXT_DOMAIN,
471 "Program lacks support for key type"));
472 case 152:
473 return (dgettext(TEXT_DOMAIN,
474 "Requested encryption type not used in message"));
475 case 153:
476 return (dgettext(TEXT_DOMAIN,
477 "Program lacks support for checksum type"));
478 case 154:
479 return (dgettext(TEXT_DOMAIN,
480 "Cannot find KDC for requested realm"));
481 case 155:
482 return (dgettext(TEXT_DOMAIN,
483 "Kerberos service unknown"));
484 case 156:
485 return (dgettext(TEXT_DOMAIN,
486 "Cannot contact any KDC for requested realm"));
487 case 157:
488 return (dgettext(TEXT_DOMAIN,
489 "No local name found for principal name"));
490 case 158:
491 return (dgettext(TEXT_DOMAIN,
492 "Mutual authentication failed"));
493 case 159:
494 return (dgettext(TEXT_DOMAIN,
495 "Replay cache type is already registered"));
496 case 160:
497 return (dgettext(TEXT_DOMAIN,
498 "No more memory to allocate (in replay cache code)"));
499 case 161:
500 return (dgettext(TEXT_DOMAIN,
501 "Replay cache type is unknown"));
502 case 162:
503 return (dgettext(TEXT_DOMAIN,
504 "Generic unknown RC error"));
505 case 163:
506 return (dgettext(TEXT_DOMAIN,
507 "Message is a replay"));
508 case 164:
509 return (dgettext(TEXT_DOMAIN,
510 "Replay I/O operation failed XXX"));
511 case 165:
512 return (dgettext(TEXT_DOMAIN,
513 "Replay cache type does not support non-volatile "
514 "storage"));
515 case 166:
516 return (dgettext(TEXT_DOMAIN,
517 "Replay cache name parse/format error"));
518 case 167:
519 return (dgettext(TEXT_DOMAIN,
520 "End-of-file on replay cache I/O"));
521 case 168:
522 return (dgettext(TEXT_DOMAIN,
523 "No more memory to allocate (in replay cache I/O "
524 "code)"));
525 case 169:
526 return (dgettext(TEXT_DOMAIN,
527 "Permission denied in replay cache code"));
528 case 170:
529 return (dgettext(TEXT_DOMAIN,
530 "I/O error in replay cache i/o code"));
531 case 171:
532 return (dgettext(TEXT_DOMAIN,
533 "Generic unknown RC/IO error"));
534 case 172:
535 return (dgettext(TEXT_DOMAIN,
536 "Insufficient system space to store replay "
537 "information"));
538 case 173:
539 return (dgettext(TEXT_DOMAIN,
540 "Can't open/find realm translation file"));
541 case 174:
542 return (dgettext(TEXT_DOMAIN,
543 "Improper format of realm translation file"));
544 case 175:
545 return (dgettext(TEXT_DOMAIN,
546 "Can't open/find lname translation database"));
547 case 176:
548 return (dgettext(TEXT_DOMAIN,
549 "No translation available for requested principal"));
550 case 177:
551 return (dgettext(TEXT_DOMAIN,
552 "Improper format of translation database entry"));
553 case 178:
554 return (dgettext(TEXT_DOMAIN,
555 "Cryptosystem internal error"));
556 case 179:
557 return (dgettext(TEXT_DOMAIN,
558 "Key table name malformed"));
559 case 180:
560 return (dgettext(TEXT_DOMAIN,
561 "Unknown Key table type"));
562 case 181:
563 return (dgettext(TEXT_DOMAIN,
564 "Key table entry not found"));
565 case 182:
566 return (dgettext(TEXT_DOMAIN,
567 "End of key table reached"));
568 case 183:
569 return (dgettext(TEXT_DOMAIN,
570 "Cannot write to specified key table"));
571 case 184:
572 return (dgettext(TEXT_DOMAIN,
573 "Error writing to key table"));
574 case 185:
575 return (dgettext(TEXT_DOMAIN,
576 "Cannot find ticket for requested realm"));
577 case 186:
578 return (dgettext(TEXT_DOMAIN,
579 "DES key has bad parity"));
580 case 187:
581 return (dgettext(TEXT_DOMAIN,
582 "DES key is a weak key"));
583 case 188:
584 return (dgettext(TEXT_DOMAIN,
585 "Bad encryption type"));
586 case 189:
587 return (dgettext(TEXT_DOMAIN,
588 "Key size is incompatible with encryption type"));
589 case 190:
590 return (dgettext(TEXT_DOMAIN,
591 "Message size is incompatible with encryption type"));
592 case 191:
593 return (dgettext(TEXT_DOMAIN,
594 "Credentials cache type is already registered."));
595 case 192:
596 return (dgettext(TEXT_DOMAIN,
597 "Key table type is already registered."));
598 case 193:
599 return (dgettext(TEXT_DOMAIN,
600 "Credentials cache I/O operation failed XXX"));
601 case 194:
602 return (dgettext(TEXT_DOMAIN,
603 "Credentials cache file permissions incorrect"));
604 case 195:
605 return (dgettext(TEXT_DOMAIN,
606 "No credentials cache file found"));
607 case 196:
608 return (dgettext(TEXT_DOMAIN,
609 "Internal file credentials cache error"));
610 case 197:
611 return (dgettext(TEXT_DOMAIN,
612 "Error writing to credentials cache file"));
613 case 198:
614 return (dgettext(TEXT_DOMAIN,
615 "No more memory to allocate (in credentials cache "
616 "code)"));
617 case 199:
618 return (dgettext(TEXT_DOMAIN,
619 "Bad format in credentials cache"));
620 case 200:
621 return (dgettext(TEXT_DOMAIN,
622 "No credentials found with supported encryption "
623 "types"));
624 case 201:
625 return (dgettext(TEXT_DOMAIN,
626 "Invalid KDC option combination (library internal "
627 "error)"));
628 case 202:
629 return (dgettext(TEXT_DOMAIN,
630 "Request missing second ticket"));
631 case 203:
632 return (dgettext(TEXT_DOMAIN,
633 "No credentials supplied to library routine"));
634 case 204:
635 return (dgettext(TEXT_DOMAIN,
636 "Bad sendauth version was sent"));
637 case 205:
638 return (dgettext(TEXT_DOMAIN,
639 "Bad application version was sent (via sendauth)"));
640 case 206:
641 return (dgettext(TEXT_DOMAIN,
642 "Bad response (during sendauth exchange)"));
643 case 207:
644 return (dgettext(TEXT_DOMAIN,
645 "Server rejected authentication (during sendauth "
646 "exchange)"));
647 case 208:
648 return (dgettext(TEXT_DOMAIN,
649 "Unsupported preauthentication type"));
650 case 209:
651 return (dgettext(TEXT_DOMAIN,
652 "Required preauthentication key not supplied"));
653 case 210:
654 return (dgettext(TEXT_DOMAIN,
655 "Generic preauthentication failure"));
656 case 211:
657 return (dgettext(TEXT_DOMAIN,
658 "Unsupported replay cache format version number"));
659 case 212:
660 return (dgettext(TEXT_DOMAIN,
661 "Unsupported credentials cache format version number"));
662 case 213:
663 return (dgettext(TEXT_DOMAIN,
664 "Unsupported key table format version number"));
665 case 214:
666 return (dgettext(TEXT_DOMAIN,
667 "Program lacks support for address type"));
668 case 215:
669 return (dgettext(TEXT_DOMAIN,
670 "Message replay detection requires rcache parameter"));
671 case 216:
672 return (dgettext(TEXT_DOMAIN,
673 "Hostname cannot be canonicalized"));
674 case 217:
675 return (dgettext(TEXT_DOMAIN,
676 "Cannot determine realm for host"));
677 case 218:
678 return (dgettext(TEXT_DOMAIN,
679 "Conversion to service principal undefined for name "
680 "type"));
681 case 219:
682 return (dgettext(TEXT_DOMAIN,
683 "Initial Ticket response appears to be Version 4 "
684 "error"));
685 case 220:
686 return (dgettext(TEXT_DOMAIN,
687 "Cannot resolve network address for KDC in requested "
688 "realm"));
689 case 221:
690 return (dgettext(TEXT_DOMAIN,
691 "Requesting ticket can't get forwardable tickets"));
692 case 222:
693 return (dgettext(TEXT_DOMAIN,
694 "Bad principal name while trying to forward "
695 "credentials"));
696 case 223:
697 return (dgettext(TEXT_DOMAIN,
698 "Looping detected inside krb5_get_in_tkt"));
699 case 224:
700 return (dgettext(TEXT_DOMAIN,
701 "Configuration file does not specify default realm"));
702 case 225:
703 return (dgettext(TEXT_DOMAIN,
704 "Bad SAM flags in obtain_sam_padata"));
705 case 226: /* KRB5_SAM_INVALID_ETYPE */
706 return (dgettext(TEXT_DOMAIN,
707 "Invalid encryption type in SAM challenge"));
708 case 227: /* KRB5_SAM_NO_CHECKSUM */
709 return (dgettext(TEXT_DOMAIN,
710 "Missing checksum in SAM challenge"));
711 case 228: /* KRB5_SAM_BAD_CHECKSUM */
712 return (dgettext(TEXT_DOMAIN,
713 "Bad checksum in SAM challenge"));
714 case 229: /* KRB5_KT_NAME_TOOLONG */
715 return (dgettext(TEXT_DOMAIN,
716 "Keytab name too long"));
717 case 230: /* KRB5_KT_KVNONOTFOUND */
718 return (dgettext(TEXT_DOMAIN,
719 "Key version number for principal in key table is "
720 "incorrect"));
721 case 231: /* KRB5_APPL_EXPIRED */
722 return (dgettext(TEXT_DOMAIN,
723 "This application has expired"));
724 case 232: /* KRB5_LIB_EXPIRED */
725 return (dgettext(TEXT_DOMAIN,
726 "This Krb5 library has expired"));
727 case 233: /* KRB5_CHPW_PWDNULL */
728 return (dgettext(TEXT_DOMAIN,
729 "New password cannot be zero length"));
730 case 234: /* KRB5_CHPW_FAIL */
731 return (dgettext(TEXT_DOMAIN,
732 "Password change failed"));
733 case 235: /* KRB5_KT_FORMAT */
734 return (dgettext(TEXT_DOMAIN,
735 "Bad format in keytab"));
736 case 236: /* KRB5_NOPERM_ETYPE */
737 return (dgettext(TEXT_DOMAIN,
738 "Encryption type not permitted"));
739 case 237: /* KRB5_CONFIG_ETYPE_NOSUPP */
740 return (dgettext(TEXT_DOMAIN,
741 "No supported encryption types (config file error?)"));
742 case 238: /* KRB5_OBSOLETE_FN */
743 return (dgettext(TEXT_DOMAIN,
744 "Program called an obsolete, deleted function"));
745 case 239: /* KRB5_EAI_FAIL */
746 return (dgettext(TEXT_DOMAIN,
747 "unknown getaddrinfo failure"));
748 case 240: /* KRB5_EAI_NODATA */
749 return (dgettext(TEXT_DOMAIN,
750 "no data available for host/domain name"));
751 case 241: /* KRB5_EAI_NONAME */
752 return (dgettext(TEXT_DOMAIN,
753 "host/domain name not found"));
754 case 242: /* KRB5_EAI_SERVICE */
755 return (dgettext(TEXT_DOMAIN,
756 "service name unknown"));
757 case 243: /* KRB5_ERR_NUMERIC_REALM */
758 return (dgettext(TEXT_DOMAIN,
759 "Cannot determine realm for numeric host address"));
760 case 244: /* KRB5_ERR_BAD_S2K_PARAMS */
761 return (dgettext(TEXT_DOMAIN,
762 "Invalid key generation parameters from KDC"));
763 case 245: /* KRB5_ERR_NO_SERVICE */
764 return (dgettext(TEXT_DOMAIN,
765 "service not available"));
766 case 246: /* KRB5_CC_READONLY */
767 return (dgettext(TEXT_DOMAIN,
768 "Ccache function not supported: read-only ccache "
769 "type"));
770 case 247: /* KRB5_CC_NOSUPP */
771 return (dgettext(TEXT_DOMAIN,
772 "Ccache function not supported: not implemented"));
773 case 248: /* KRB5_RC_BADNAME */
774 return (dgettext(TEXT_DOMAIN,
775 "Bad replay cache name"));
776 case 249: /* KRB5_CONF_NOT_CONFIGURED */
777 return (dgettext(TEXT_DOMAIN,
778 "krb5 conf file not configured"));
779 case 250: /* PKCS_ERR */
780 return (dgettext(TEXT_DOMAIN,
781 "Error in the PKCS 11 library calls"));
782 case 251: /* KRB5_DELTAT_BADFORMAT */
783 return (dgettext(TEXT_DOMAIN,
784 "Delta time bad format"));
785 default:
786 return ("unknown error");