Fix some typos.
This commit is contained in:
@@ -192,7 +192,7 @@ setpeer(int argc, char **argv)
|
|||||||
if (overbose &&
|
if (overbose &&
|
||||||
!strncmp(reply_string, "215 TOPS20", 10))
|
!strncmp(reply_string, "215 TOPS20", 10))
|
||||||
printf(
|
printf(
|
||||||
"Remember to set tenex mode when transfering binary files from this machine.\n");
|
"Remember to set tenex mode when transferring binary files from this machine.\n");
|
||||||
}
|
}
|
||||||
verbose = overbose;
|
verbose = overbose;
|
||||||
#endif /* unix */
|
#endif /* unix */
|
||||||
|
@@ -206,7 +206,7 @@ current remote machine working directory.
|
|||||||
Change the permission modes of the file
|
Change the permission modes of the file
|
||||||
.Ar file-name
|
.Ar file-name
|
||||||
on the remote
|
on the remote
|
||||||
sytem to
|
system to
|
||||||
.Ar mode .
|
.Ar mode .
|
||||||
.It Ic close
|
.It Ic close
|
||||||
Terminate the
|
Terminate the
|
||||||
|
@@ -31,7 +31,7 @@ or
|
|||||||
.It
|
.It
|
||||||
The second field is a comma separated list of users or groups for
|
The second field is a comma separated list of users or groups for
|
||||||
which the current entry applies. NIS netgroups can used (if
|
which the current entry applies. NIS netgroups can used (if
|
||||||
configured) if preceeded by @. The magic string ALL matches all users.
|
configured) if preceded by @. The magic string ALL matches all users.
|
||||||
A group will match if the user is a member of that group, or it is the
|
A group will match if the user is a member of that group, or it is the
|
||||||
user's primary group.
|
user's primary group.
|
||||||
.It
|
.It
|
||||||
|
@@ -350,7 +350,7 @@ main (int argc, char **argv)
|
|||||||
errx (1, "Only root can set an initial OTP");
|
errx (1, "Only root can set an initial OTP");
|
||||||
} else { /* Check the next OTP (RFC 1938/8.0: SHOULD) */
|
} else { /* Check the next OTP (RFC 1938/8.0: SHOULD) */
|
||||||
if (verify_user_otp(user) != 0) {
|
if (verify_user_otp(user) != 0) {
|
||||||
errx (1, "User authentification failed");
|
errx (1, "User authentication failed");
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@@ -458,7 +458,7 @@ main(int argc, char **argv)
|
|||||||
for (j = 0; j < i; j++) {
|
for (j = 0; j < i; j++) {
|
||||||
char *p = strchr(newenv[j], '=');
|
char *p = strchr(newenv[j], '=');
|
||||||
if (p == NULL)
|
if (p == NULL)
|
||||||
errx(1, "enviroment '%s' missing '='", newenv[j]);
|
errx(1, "environment '%s' missing '='", newenv[j]);
|
||||||
*p++ = 0;
|
*p++ = 0;
|
||||||
esetenv (newenv[j], p, 1);
|
esetenv (newenv[j], p, 1);
|
||||||
}
|
}
|
||||||
|
@@ -108,7 +108,7 @@ SRV-record for your realm, or your Kerberos server has DNS CNAME
|
|||||||
|
|
||||||
@cindex KRB5_CONFIG
|
@cindex KRB5_CONFIG
|
||||||
If you want to use a different configuration file then the default you
|
If you want to use a different configuration file then the default you
|
||||||
can point a file with the enviroment variable @samp{KRB5_CONFIG}.
|
can point a file with the environment variable @samp{KRB5_CONFIG}.
|
||||||
|
|
||||||
@example
|
@example
|
||||||
env KRB5_CONFIG=$HOME/etc/krb5.conf kinit user@@REALM
|
env KRB5_CONFIG=$HOME/etc/krb5.conf kinit user@@REALM
|
||||||
@@ -1295,21 +1295,21 @@ the mapping in the principals entry in the kerberos database.
|
|||||||
|
|
||||||
This and following subsection documents the requirements on the KDC
|
This and following subsection documents the requirements on the KDC
|
||||||
and client certificates and the format used in the id-pkinit-san
|
and client certificates and the format used in the id-pkinit-san
|
||||||
OtherName extention.
|
OtherName extension.
|
||||||
|
|
||||||
On how to create certificates, you should read @ref{Use OpenSSL to
|
On how to create certificates, you should read @ref{Use OpenSSL to
|
||||||
create certificates}.
|
create certificates}.
|
||||||
|
|
||||||
@subsection KDC certificate
|
@subsection KDC certificate
|
||||||
|
|
||||||
The certificate for the KDC has serveral requirements.
|
The certificate for the KDC has several requirements.
|
||||||
|
|
||||||
First, the certificate should have an Extended Key Usage (EKU)
|
First, the certificate should have an Extended Key Usage (EKU)
|
||||||
id-pkkdcekuoid (1.3.6.1.5.2.3.5) set. Second, there must be a
|
id-pkkdcekuoid (1.3.6.1.5.2.3.5) set. Second, there must be a
|
||||||
subjectAltName otherName using OID id-pkinit-san (1.3.6.1.5.2.2) in
|
subjectAltName otherName using OID id-pkinit-san (1.3.6.1.5.2.2) in
|
||||||
the type field and a DER encoded KRB5PrincipalName that matches the
|
the type field and a DER encoded KRB5PrincipalName that matches the
|
||||||
name of the TGS of the target realm. Also, if the certificate has a
|
name of the TGS of the target realm. Also, if the certificate has a
|
||||||
nameConstraints extention with a Generalname with dNSName or iPAdress,
|
nameConstraints extension with a Generalname with dNSName or iPAdress,
|
||||||
it must match the hostname or adress of the KDC.
|
it must match the hostname or adress of the KDC.
|
||||||
|
|
||||||
The client is not required by the standard to check the server
|
The client is not required by the standard to check the server
|
||||||
@@ -1343,7 +1343,7 @@ This behavior is controlled by KDC configuration option:
|
|||||||
|
|
||||||
@subsubsection Using KRB5PrincipalName in id-pkinit-san
|
@subsubsection Using KRB5PrincipalName in id-pkinit-san
|
||||||
|
|
||||||
The OtherName extention in the GeneralName is used to do the mapping
|
The OtherName extension in the GeneralName is used to do the mapping
|
||||||
between certificate and principal. For the KDC certificate, this
|
between certificate and principal. For the KDC certificate, this
|
||||||
stores the krbtgt principal name for that KDC. For the client
|
stores the krbtgt principal name for that KDC. For the client
|
||||||
certificate, this stores the principal for which that certificate is
|
certificate, this stores the principal for which that certificate is
|
||||||
|
@@ -95,7 +95,7 @@
|
|||||||
is a process based credential cache.
|
is a process based credential cache.
|
||||||
To use it, set the
|
To use it, set the
|
||||||
.Ev KRB5CCNAME
|
.Ev KRB5CCNAME
|
||||||
enviroment variable to
|
environment variable to
|
||||||
.Ql KCM: Ns Ar uid
|
.Ql KCM: Ns Ar uid
|
||||||
or add the stanza
|
or add the stanza
|
||||||
.Bd -literal
|
.Bd -literal
|
||||||
|
@@ -554,7 +554,7 @@ the default syntax is used for all mechanism the GSS-API
|
|||||||
implementation supports.
|
implementation supports.
|
||||||
When compare the imported name of
|
When compare the imported name of
|
||||||
.Dv GSS_C_NO_OID
|
.Dv GSS_C_NO_OID
|
||||||
it may match serveral mechanism names (MN).
|
it may match several mechanism names (MN).
|
||||||
.Pp
|
.Pp
|
||||||
The resulting name from
|
The resulting name from
|
||||||
.Fn gss_display_name
|
.Fn gss_display_name
|
||||||
@@ -584,7 +584,7 @@ Information is available even after the context have expired.
|
|||||||
.Fa lifetime_rec
|
.Fa lifetime_rec
|
||||||
argument is set to
|
argument is set to
|
||||||
.Dv GSS_C_INDEFINITE
|
.Dv GSS_C_INDEFINITE
|
||||||
(dont expire) or the number of seconds that the context is still valid.
|
(don't expire) or the number of seconds that the context is still valid.
|
||||||
A value of 0 means that the context is expired.
|
A value of 0 means that the context is expired.
|
||||||
.Fa mech_type
|
.Fa mech_type
|
||||||
argument should be considered readonly and must not be released.
|
argument should be considered readonly and must not be released.
|
||||||
|
@@ -546,7 +546,7 @@ main(int argc, char **argv)
|
|||||||
else if (strcmp(type_string, "krb5-principal-name") == 0)
|
else if (strcmp(type_string, "krb5-principal-name") == 0)
|
||||||
nameoid = GSS_KRB5_NT_PRINCIPAL_NAME;
|
nameoid = GSS_KRB5_NT_PRINCIPAL_NAME;
|
||||||
else
|
else
|
||||||
errx(1, "%s not suppported", type_string);
|
errx(1, "%s not supported", type_string);
|
||||||
|
|
||||||
if (mech_string == NULL)
|
if (mech_string == NULL)
|
||||||
mechoid = GSS_KRB5_MECHANISM;
|
mechoid = GSS_KRB5_MECHANISM;
|
||||||
|
@@ -92,7 +92,7 @@ done
|
|||||||
|
|
||||||
#
|
#
|
||||||
# Last time we run is w/o HOME and RANDFILE to make sure we can do
|
# Last time we run is w/o HOME and RANDFILE to make sure we can do
|
||||||
# RAND_file_name() when the enviroment is lacking those.
|
# RAND_file_name() when the environment is lacking those.
|
||||||
#
|
#
|
||||||
|
|
||||||
if [ -r /dev/random -o -r /dev/urandom -o -r /dev/srandom -o -r /dev/arandom ] ; then
|
if [ -r /dev/random -o -r /dev/urandom -o -r /dev/srandom -o -r /dev/arandom ] ; then
|
||||||
|
@@ -101,7 +101,7 @@ hdb_replace_extension(krb5_context context,
|
|||||||
ext2 = hdb_find_extension(entry, ext->data.element);
|
ext2 = hdb_find_extension(entry, ext->data.element);
|
||||||
} else {
|
} else {
|
||||||
/*
|
/*
|
||||||
* This is an unknown extention, and we are asked to replace a
|
* This is an unknown extension, and we are asked to replace a
|
||||||
* possible entry in `entry' that is of the same type. This
|
* possible entry in `entry' that is of the same type. This
|
||||||
* might seem impossible, but ASN.1 CHOICE comes to our
|
* might seem impossible, but ASN.1 CHOICE comes to our
|
||||||
* rescue. The first tag in each branch in the CHOICE is
|
* rescue. The first tag in each branch in the CHOICE is
|
||||||
@@ -120,7 +120,7 @@ hdb_replace_extension(krb5_context context,
|
|||||||
&size);
|
&size);
|
||||||
if (ret) {
|
if (ret) {
|
||||||
krb5_set_error_message(context, ret, "hdb: failed to decode "
|
krb5_set_error_message(context, ret, "hdb: failed to decode "
|
||||||
"replacement hdb extention");
|
"replacement hdb extension");
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -136,7 +136,7 @@ hdb_replace_extension(krb5_context context,
|
|||||||
&size);
|
&size);
|
||||||
if (ret) {
|
if (ret) {
|
||||||
krb5_set_error_message(context, ret, "hdb: failed to decode "
|
krb5_set_error_message(context, ret, "hdb: failed to decode "
|
||||||
"present hdb extention");
|
"present hdb extension");
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -153,7 +153,7 @@ hdb_replace_extension(krb5_context context,
|
|||||||
ret = copy_HDB_extension(ext, ext2);
|
ret = copy_HDB_extension(ext, ext2);
|
||||||
if (ret)
|
if (ret)
|
||||||
krb5_set_error_message(context, ret, "hdb: failed to copy replacement "
|
krb5_set_error_message(context, ret, "hdb: failed to copy replacement "
|
||||||
"hdb extention");
|
"hdb extension");
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -892,7 +892,7 @@ hx509_ca_tbs_set_unique(hx509_context context,
|
|||||||
*
|
*
|
||||||
* @param context A hx509 context.
|
* @param context A hx509 context.
|
||||||
* @param tbs object to be signed.
|
* @param tbs object to be signed.
|
||||||
* @param env enviroment variable to expand variables in the subject
|
* @param env environment variable to expand variables in the subject
|
||||||
* name, see hx509_env_init().
|
* name, see hx509_env_init().
|
||||||
*
|
*
|
||||||
* @return An hx509 error code, see hx509_get_error_string().
|
* @return An hx509 error code, see hx509_get_error_string().
|
||||||
|
@@ -82,7 +82,7 @@ certs = .
|
|||||||
|
|
||||||
[req]
|
[req]
|
||||||
distinguished_name = req_distinguished_name
|
distinguished_name = req_distinguished_name
|
||||||
x509_extensions = v3_ca # The extentions to add to the self signed cert
|
x509_extensions = v3_ca # The extensions to add to the self signed cert
|
||||||
|
|
||||||
string_mask = utf8only
|
string_mask = utf8only
|
||||||
|
|
||||||
|
@@ -82,4 +82,4 @@
|
|||||||
* See the @ref page_ca for description and examples. */
|
* See the @ref page_ca for description and examples. */
|
||||||
/** @defgroup hx509_peer hx509 certificate selecting functions */
|
/** @defgroup hx509_peer hx509 certificate selecting functions */
|
||||||
/** @defgroup hx509_print hx509 printing functions */
|
/** @defgroup hx509_print hx509 printing functions */
|
||||||
/** @defgroup hx509_env hx509 enviroment functions */
|
/** @defgroup hx509_env hx509 environment functions */
|
||||||
|
@@ -34,7 +34,7 @@
|
|||||||
#include "hx_locl.h"
|
#include "hx_locl.h"
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @page page_env Hx509 enviroment functions
|
* @page page_env Hx509 environment functions
|
||||||
*
|
*
|
||||||
* See the library functions here: @ref hx509_env
|
* See the library functions here: @ref hx509_env
|
||||||
*/
|
*/
|
||||||
@@ -43,7 +43,7 @@
|
|||||||
* Add a new key/value pair to the hx509_env.
|
* Add a new key/value pair to the hx509_env.
|
||||||
*
|
*
|
||||||
* @param context A hx509 context.
|
* @param context A hx509 context.
|
||||||
* @param env enviroment to add the enviroment variable too.
|
* @param env environment to add the environment variable too.
|
||||||
* @param key key to add
|
* @param key key to add
|
||||||
* @param value value to add
|
* @param value value to add
|
||||||
*
|
*
|
||||||
@@ -94,7 +94,7 @@ hx509_env_add(hx509_context context, hx509_env *env,
|
|||||||
* Add a new key/binding pair to the hx509_env.
|
* Add a new key/binding pair to the hx509_env.
|
||||||
*
|
*
|
||||||
* @param context A hx509 context.
|
* @param context A hx509 context.
|
||||||
* @param env enviroment to add the enviroment variable too.
|
* @param env environment to add the environment variable too.
|
||||||
* @param key key to add
|
* @param key key to add
|
||||||
* @param list binding list to add
|
* @param list binding list to add
|
||||||
*
|
*
|
||||||
@@ -141,7 +141,7 @@ hx509_env_add_binding(hx509_context context, hx509_env *env,
|
|||||||
* Search the hx509_env for a length based key.
|
* Search the hx509_env for a length based key.
|
||||||
*
|
*
|
||||||
* @param context A hx509 context.
|
* @param context A hx509 context.
|
||||||
* @param env enviroment to add the enviroment variable too.
|
* @param env environment to add the environment variable too.
|
||||||
* @param key key to search for.
|
* @param key key to search for.
|
||||||
* @param len length of key.
|
* @param len length of key.
|
||||||
*
|
*
|
||||||
@@ -167,7 +167,7 @@ hx509_env_lfind(hx509_context context, hx509_env env,
|
|||||||
* Search the hx509_env for a key.
|
* Search the hx509_env for a key.
|
||||||
*
|
*
|
||||||
* @param context A hx509 context.
|
* @param context A hx509 context.
|
||||||
* @param env enviroment to add the enviroment variable too.
|
* @param env environment to add the environment variable too.
|
||||||
* @param key key to search for.
|
* @param key key to search for.
|
||||||
*
|
*
|
||||||
* @return the value if the key is found, NULL otherwise.
|
* @return the value if the key is found, NULL otherwise.
|
||||||
@@ -190,7 +190,7 @@ hx509_env_find(hx509_context context, hx509_env env, const char *key)
|
|||||||
* Search the hx509_env for a binding.
|
* Search the hx509_env for a binding.
|
||||||
*
|
*
|
||||||
* @param context A hx509 context.
|
* @param context A hx509 context.
|
||||||
* @param env enviroment to add the enviroment variable too.
|
* @param env environment to add the environment variable too.
|
||||||
* @param key key to search for.
|
* @param key key to search for.
|
||||||
*
|
*
|
||||||
* @return the binding if the key is found, NULL if not found.
|
* @return the binding if the key is found, NULL if not found.
|
||||||
@@ -229,9 +229,9 @@ env_free(hx509_env b)
|
|||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Free an hx509_env enviroment context.
|
* Free an hx509_env environment context.
|
||||||
*
|
*
|
||||||
* @param env the enviroment to free.
|
* @param env the environment to free.
|
||||||
*
|
*
|
||||||
* @ingroup hx509_env
|
* @ingroup hx509_env
|
||||||
*/
|
*/
|
||||||
|
@@ -107,7 +107,7 @@ command = {
|
|||||||
option = {
|
option = {
|
||||||
long = "embedded-certs"
|
long = "embedded-certs"
|
||||||
type = "-flag"
|
type = "-flag"
|
||||||
help = "dont embedded certficiates"
|
help = "don't embed certificates"
|
||||||
}
|
}
|
||||||
option = {
|
option = {
|
||||||
long = "embed-leaf-only"
|
long = "embed-leaf-only"
|
||||||
|
@@ -1935,7 +1935,7 @@ hxtool_ca(struct certificate_sign_options *opt, int argc, char **argv)
|
|||||||
else if (strcasecmp(opt->signature_algorithm_string, "rsa-with-sha256") == 0)
|
else if (strcasecmp(opt->signature_algorithm_string, "rsa-with-sha256") == 0)
|
||||||
sigalg = hx509_signature_rsa_with_sha256();
|
sigalg = hx509_signature_rsa_with_sha256();
|
||||||
else
|
else
|
||||||
errx(1, "unsupported sigature algorith");
|
errx(1, "unsupported sigature algorithm");
|
||||||
hx509_ca_tbs_set_signature_algorithm(context, tbs, sigalg);
|
hx509_ca_tbs_set_signature_algorithm(context, tbs, sigalg);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -969,7 +969,7 @@ hx509_validate_cert(hx509_context context,
|
|||||||
}
|
}
|
||||||
validate_print(ctx,
|
validate_print(ctx,
|
||||||
HX509_VALIDATE_F_VALIDATE|HX509_VALIDATE_F_VERBOSE,
|
HX509_VALIDATE_F_VALIDATE|HX509_VALIDATE_F_VERBOSE,
|
||||||
"checking extention: %s\n",
|
"checking extension: %s\n",
|
||||||
check_extension[j].name);
|
check_extension[j].name);
|
||||||
(*check_extension[j].func)(ctx,
|
(*check_extension[j].func)(ctx,
|
||||||
&status,
|
&status,
|
||||||
@@ -977,7 +977,7 @@ hx509_validate_cert(hx509_context context,
|
|||||||
&t->extensions->val[i]);
|
&t->extensions->val[i]);
|
||||||
}
|
}
|
||||||
} else
|
} else
|
||||||
validate_print(ctx, HX509_VALIDATE_F_VERBOSE, "no extentions\n");
|
validate_print(ctx, HX509_VALIDATE_F_VERBOSE, "no extensions\n");
|
||||||
|
|
||||||
if (status.isca) {
|
if (status.isca) {
|
||||||
if (!status.haveSKI)
|
if (!status.haveSKI)
|
||||||
|
@@ -236,7 +236,7 @@ int krb5_dfs_getpag()
|
|||||||
* user.
|
* user.
|
||||||
*
|
*
|
||||||
* And it should be called before access to the home directory
|
* And it should be called before access to the home directory
|
||||||
* as this may be in DFS, not accessable by root, and require
|
* as this may be in DFS, not accessible by root, and require
|
||||||
* the PAG to have been setup.
|
* the PAG to have been setup.
|
||||||
*
|
*
|
||||||
* The krb5_afs_pag can be called after this routine to
|
* The krb5_afs_pag can be called after this routine to
|
||||||
|
@@ -87,7 +87,7 @@ the above three. Plugins are typically invoked in no particular order
|
|||||||
until one succeeds or fails, or all return a special return value such
|
until one succeeds or fails, or all return a special return value such
|
||||||
as KRB5_PLUGIN_NO_HANDLE to indicate that the plugin was not applicable.
|
as KRB5_PLUGIN_NO_HANDLE to indicate that the plugin was not applicable.
|
||||||
Most plugin types obtain deterministic plugin behavior in spite of the
|
Most plugin types obtain deterministic plugin behavior in spite of the
|
||||||
non-deterministic invokation order by, for example, invoking all plugins
|
non-deterministic invocation order by, for example, invoking all plugins
|
||||||
for each "rule" and passing the rule to each plugin with the expectation
|
for each "rule" and passing the rule to each plugin with the expectation
|
||||||
that just one plugin will match any given rule.
|
that just one plugin will match any given rule.
|
||||||
.Pp
|
.Pp
|
||||||
|
@@ -168,7 +168,7 @@ The functions starting with krb5_c are compat functions with MIT kerberos.
|
|||||||
The
|
The
|
||||||
.Li krb5_enc_data
|
.Li krb5_enc_data
|
||||||
structure holds and encrypted data.
|
structure holds and encrypted data.
|
||||||
There are two public accessable members of
|
There are two public accessible members of
|
||||||
.Li krb5_enc_data .
|
.Li krb5_enc_data .
|
||||||
.Li enctype
|
.Li enctype
|
||||||
that holds the encryption type of the data encrypted and
|
that holds the encryption type of the data encrypted and
|
||||||
|
@@ -64,7 +64,7 @@
|
|||||||
.Nm krb5_digest_get_tickets ,
|
.Nm krb5_digest_get_tickets ,
|
||||||
.Nm krb5_digest_get_client_binding ,
|
.Nm krb5_digest_get_client_binding ,
|
||||||
.Nm krb5_digest_get_a1_hash
|
.Nm krb5_digest_get_a1_hash
|
||||||
.Nd remote digest (HTTP-DIGEST, SASL, CHAP) suppport
|
.Nd remote digest (HTTP-DIGEST, SASL, CHAP) support
|
||||||
.Sh LIBRARY
|
.Sh LIBRARY
|
||||||
Kerberos 5 Library (libkrb5, -lkrb5)
|
Kerberos 5 Library (libkrb5, -lkrb5)
|
||||||
.Sh SYNOPSIS
|
.Sh SYNOPSIS
|
||||||
|
@@ -318,7 +318,7 @@ krb5_addlog_dest(krb5_context context, krb5_log_facility *f, const char *orig)
|
|||||||
if(i < 0) {
|
if(i < 0) {
|
||||||
ret = errno;
|
ret = errno;
|
||||||
krb5_set_error_message(context, ret,
|
krb5_set_error_message(context, ret,
|
||||||
N_("open(%s) logile: %s", ""), fn,
|
N_("open(%s) logfile: %s", ""), fn,
|
||||||
strerror(ret));
|
strerror(ret));
|
||||||
free(fn);
|
free(fn);
|
||||||
return ret;
|
return ret;
|
||||||
|
@@ -334,7 +334,7 @@ the options come in the correct order.
|
|||||||
.Pp
|
.Pp
|
||||||
Options with multiple arguments should be handled better.
|
Options with multiple arguments should be handled better.
|
||||||
.Pp
|
.Pp
|
||||||
Should be integreated with SL.
|
Should be integrated with SL.
|
||||||
.Pp
|
.Pp
|
||||||
It's very confusing that the struct you pass in is called getargS.
|
It's very confusing that the struct you pass in is called getargS.
|
||||||
.Sh SEE ALSO
|
.Sh SEE ALSO
|
||||||
|
@@ -24892,7 +24892,7 @@ static int openDirectory(const char*, int*);
|
|||||||
** to all overrideable system calls.
|
** to all overrideable system calls.
|
||||||
*/
|
*/
|
||||||
static struct unix_syscall {
|
static struct unix_syscall {
|
||||||
const char *zName; /* Name of the sytem call */
|
const char *zName; /* Name of the system call */
|
||||||
sqlite3_syscall_ptr pCurrent; /* Current value of the system call */
|
sqlite3_syscall_ptr pCurrent; /* Current value of the system call */
|
||||||
sqlite3_syscall_ptr pDefault; /* Default value */
|
sqlite3_syscall_ptr pDefault; /* Default value */
|
||||||
} aSyscall[] = {
|
} aSyscall[] = {
|
||||||
|
@@ -1144,7 +1144,7 @@ msgstr ""
|
|||||||
|
|
||||||
#: lib/krb5/log.c:311
|
#: lib/krb5/log.c:311
|
||||||
#, c-format
|
#, c-format
|
||||||
msgid "open(%s) logile: %s"
|
msgid "open(%s) logfile: %s"
|
||||||
msgstr ""
|
msgstr ""
|
||||||
|
|
||||||
#: lib/krb5/log.c:322
|
#: lib/krb5/log.c:322
|
||||||
|
@@ -1126,7 +1126,7 @@ msgstr ""
|
|||||||
|
|
||||||
#: lib/krb5/log.c:311
|
#: lib/krb5/log.c:311
|
||||||
#, c-format
|
#, c-format
|
||||||
msgid "open(%s) logile: %s"
|
msgid "open(%s) logfile: %s"
|
||||||
msgstr ""
|
msgstr ""
|
||||||
|
|
||||||
#: lib/krb5/log.c:322
|
#: lib/krb5/log.c:322
|
||||||
|
@@ -78,7 +78,7 @@ cmp out-current-db-sort out-current-db2-sort || exit 1
|
|||||||
|
|
||||||
rm -f current-db*
|
rm -f current-db*
|
||||||
|
|
||||||
# check with no extentions
|
# check with no extensions
|
||||||
${kadmin} load ${srcdir}/text-dump-0.7 || exit 1
|
${kadmin} load ${srcdir}/text-dump-0.7 || exit 1
|
||||||
${propdb} > db-dump.tmp|| exit 1
|
${propdb} > db-dump.tmp|| exit 1
|
||||||
rm -f current-db*
|
rm -f current-db*
|
||||||
@@ -88,7 +88,7 @@ sort < ${srcdir}/text-dump-0.7 | \
|
|||||||
sed 's/[0-9]*$//' > out-text-dump-0.7-orig || exit 1
|
sed 's/[0-9]*$//' > out-text-dump-0.7-orig || exit 1
|
||||||
cmp out-text-dump-0.7-orig out-text-dump-0.7 || exit 1
|
cmp out-text-dump-0.7-orig out-text-dump-0.7 || exit 1
|
||||||
|
|
||||||
# check with no extentions
|
# check with no extensions
|
||||||
${kadmin} load ${srcdir}/text-dump-no-ext || exit 1
|
${kadmin} load ${srcdir}/text-dump-no-ext || exit 1
|
||||||
${propdb} > db-dump.tmp || exit 1
|
${propdb} > db-dump.tmp || exit 1
|
||||||
${propddb} < db-dump.tmp || exit 1
|
${propddb} < db-dump.tmp || exit 1
|
||||||
@@ -98,7 +98,7 @@ sort < ${srcdir}/text-dump-no-ext | \
|
|||||||
awk '{$11=""; print;}' > out-text-dump-no-ext-orig || exit 1
|
awk '{$11=""; print;}' > out-text-dump-no-ext-orig || exit 1
|
||||||
cmp out-text-dump-no-ext-orig out-text-dump-no-ext || exit 1
|
cmp out-text-dump-no-ext-orig out-text-dump-no-ext || exit 1
|
||||||
|
|
||||||
# check with known extentions
|
# check with known extensions
|
||||||
${kadmin} load ${srcdir}/text-dump-known-ext || exit 1
|
${kadmin} load ${srcdir}/text-dump-known-ext || exit 1
|
||||||
${propdb} > db-dump.tmp || exit 1
|
${propdb} > db-dump.tmp || exit 1
|
||||||
${propddb} < db-dump.tmp || exit 1
|
${propddb} < db-dump.tmp || exit 1
|
||||||
@@ -108,7 +108,7 @@ sort < ${srcdir}/text-dump-known-ext | \
|
|||||||
awk '{$11=""; print;}' > out-text-dump-known-ext-orig || exit 1
|
awk '{$11=""; print;}' > out-text-dump-known-ext-orig || exit 1
|
||||||
cmp out-text-dump-known-ext-orig out-text-dump-known-ext || exit 1
|
cmp out-text-dump-known-ext-orig out-text-dump-known-ext || exit 1
|
||||||
|
|
||||||
# check with unknown extentions
|
# check with unknown extensions
|
||||||
${kadmin} load ${srcdir}/text-dump-unknown-ext || exit 1
|
${kadmin} load ${srcdir}/text-dump-unknown-ext || exit 1
|
||||||
${propdb} > db-dump.tmp || exit 1
|
${propdb} > db-dump.tmp || exit 1
|
||||||
${propddb} < db-dump.tmp || exit 1
|
${propddb} < db-dump.tmp || exit 1
|
||||||
|
Reference in New Issue
Block a user