dmake: do not set MAKEFLAGS=k
[unleashed/tickless.git] / usr / src / cmd / krb5 / kadmin / cli / kadmin_ct.c
blobb29c36a7be2d5de4ccc4670e447c3982b7e53ad0
1 #pragma ident "%Z%%M% %I% %E% SMI"
3 /*
4 * WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING
6 * Openvision retains the copyright to derivative works of
7 * this source code. Do *NOT* create a derivative of this
8 * source code before consulting with your legal department.
9 * Do *NOT* integrate *ANY* of this source code into another
10 * product before consulting with your legal department.
12 * For further information, read the top-level Openvision
13 * copyright which is contained in the top-level MIT Kerberos
14 * copyright.
16 * WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING
22 /* kadmin_ct.c - automatically generated from kadmin_ct.ct */
23 /* Above no longer appears to be true */
26 * I18n hack. We sill define gettext(s) to be s here. That way the info_strings
27 * will be extracted to the .po file.
30 #define gettext(s) s
32 #include <ss/ss.h>
34 #ifndef __STDC__
35 #define const
36 #endif
38 static char const * const ssu00001[] = {
39 "add_principal",
40 "addprinc",
41 "ank",
42 (char const *)0
44 extern void kadmin_addprinc __SS_PROTO;
45 static char const * const ssu00002[] = {
46 "delete_principal",
47 "delprinc",
48 (char const *)0
50 extern void kadmin_delprinc __SS_PROTO;
51 static char const * const ssu00003[] = {
52 "modify_principal",
53 "modprinc",
54 (char const *)0
56 extern void kadmin_modprinc __SS_PROTO;
57 static char const * const ssu00004[] = {
58 "change_password",
59 "cpw",
60 (char const *)0
62 extern void kadmin_cpw __SS_PROTO;
63 static char const * const ssu00005[] = {
64 "get_principal",
65 "getprinc",
66 (char const *)0
68 extern void kadmin_getprinc __SS_PROTO;
69 static char const * const ssu00006[] = {
70 "list_principals",
71 "listprincs",
72 "get_principals",
73 "getprincs",
74 (char const *)0
76 extern void kadmin_getprincs __SS_PROTO;
77 static char const * const ssu00007[] = {
78 "add_policy",
79 "addpol",
80 (char const *)0
82 extern void kadmin_addpol __SS_PROTO;
83 static char const * const ssu00008[] = {
84 "modify_policy",
85 "modpol",
86 (char const *)0
88 extern void kadmin_modpol __SS_PROTO;
89 static char const * const ssu00009[] = {
90 "delete_policy",
91 "delpol",
92 (char const *)0
94 extern void kadmin_delpol __SS_PROTO;
95 static char const * const ssu00010[] = {
96 "get_policy",
97 "getpol",
98 (char const *)0
100 extern void kadmin_getpol __SS_PROTO;
101 static char const * const ssu00011[] = {
102 "list_policies",
103 "listpols",
104 "get_policies",
105 "getpols",
106 (char const *)0
108 extern void kadmin_getpols __SS_PROTO;
109 static char const * const ssu00012[] = {
110 "get_privs",
111 "getprivs",
112 (char const *)0
114 extern void kadmin_getprivs __SS_PROTO;
115 static char const * const ssu00013[] = {
116 "ktadd",
117 "xst",
118 (char const *)0
120 extern void kadmin_keytab_add __SS_PROTO;
121 static char const * const ssu00014[] = {
122 "ktremove",
123 "ktrem",
124 (char const *)0
126 extern void kadmin_keytab_remove __SS_PROTO;
128 static char const * const ssu00015[] = {
129 "lock",
130 (char const *)0
132 extern void kadmin_lock __SS_PROTO;
133 static char const * const ssu00016[] = {
134 "unlock",
135 (char const *)0
137 extern void kadmin_unlock __SS_PROTO;
139 static char const * const ssu00017[] = {
140 "list_requests",
141 "lr",
142 "?",
143 (char const *)0
146 extern void ss_list_requests __SS_PROTO;
147 static char const * const ssu00018[] = {
148 "quit",
149 "exit",
150 "q",
151 (char const *)0
153 extern void ss_quit __SS_PROTO;
154 static ss_request_entry ssu00019[] = {
155 { ssu00001,
156 kadmin_addprinc,
157 gettext("Add principal"),
158 0 },
159 { ssu00002,
160 kadmin_delprinc,
161 gettext("Delete principal"),
162 0 },
163 { ssu00003,
164 kadmin_modprinc,
165 gettext("Modify principal"),
166 0 },
167 { ssu00004,
168 kadmin_cpw,
169 gettext("Change password"),
170 0 },
171 { ssu00005,
172 kadmin_getprinc,
173 gettext("Get principal"),
174 0 },
175 { ssu00006,
176 kadmin_getprincs,
177 gettext("List principals"),
178 0 },
179 { ssu00007,
180 kadmin_addpol,
181 gettext("Add policy"),
182 0 },
183 { ssu00008,
184 kadmin_modpol,
185 gettext("Modify policy"),
186 0 },
187 { ssu00009,
188 kadmin_delpol,
189 gettext("Delete policy"),
190 0 },
191 { ssu00010,
192 kadmin_getpol,
193 gettext("Get policy"),
194 0 },
195 { ssu00011,
196 kadmin_getpols,
197 gettext("List policies"),
198 0 },
199 { ssu00012,
200 kadmin_getprivs,
201 gettext("Get privileges"),
202 0 },
203 { ssu00013,
204 kadmin_keytab_add,
205 gettext("Add entry(s) to a keytab"),
206 0 },
207 { ssu00014,
208 kadmin_keytab_remove,
209 gettext("Remove entry(s) from a keytab"),
210 0 },
211 { ssu00015,
212 kadmin_lock,
213 gettext("Lock database exclusively (use with extreme caution!)"),
214 0 },
215 { ssu00016,
216 kadmin_unlock,
217 gettext("Release exclusive database lock"),
218 0 },
219 { ssu00017,
220 ss_list_requests,
221 gettext("List available requests."),
222 0 },
223 { ssu00018,
224 ss_quit,
225 gettext("Exit program."),
226 0 },
227 { 0, 0, 0, 0 }
230 ss_request_table kadmin_cmds = { 2, ssu00019 };
232 #undef gettext