make mark-cstyle; make reindent
authorTom Yu <tlyu@mit.edu>
Fri, 6 Nov 2009 19:45:29 +0000 (19:45 +0000)
committerTom Yu <tlyu@mit.edu>
Fri, 6 Nov 2009 19:45:29 +0000 (19:45 +0000)
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@23136 dc483132-0cff-0310-8789-dd5450dbe970

src/slave/kprop.h
src/slave/kpropd_rpc.c
src/slave/kproplog.c

index 28425507d78f1e69de2ace39f151bef95aaa5b09..4ab53de74f6d51044d59a8373f86b74ca0fbd24a 100644 (file)
@@ -1,3 +1,4 @@
+/* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */
 /*
  * slave/kprop.h
  *
index cd9539533014012bd37b81b62246563a3773fdac..5abbc4f4135149f494e321b4b373b17d16825acc 100644 (file)
@@ -1,3 +1,4 @@
+/* -*- mode: c; c-file-style: "bsd"; indent-tabs-mode: t -*- */
 /*
  * Please do not edit this file.
  * It was generated using rpcgen.
index 6fb2e2288f57496264efdad68ef691c784abd90a..0134631b0785d22129838f32254472a00214f3e5 100644 (file)
@@ -1,9 +1,10 @@
+/* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */
 /*
  * Copyright 2008 Sun Microsystems, Inc.  All rights reserved.
  * Use is subject to license terms.
  */
 
-/* #pragma ident       "@(#)kproplog.c 1.4     04/03/19 SMI" */
+/* #pragma ident        "@(#)kproplog.c 1.4     04/03/19 SMI" */
 
 /*
  * This module will parse the update logs on the master or slave servers.
 #define textdomain(X) 0
 #endif
 
-static char    *progname;
+static char     *progname;
 
 static void
 usage()
 {
     (void) fprintf(stderr, _("\nUsage: %s [-h] [-v] [-v] [-e num]\n\n"),
-                  progname);
+                   progname);
     exit(1);
 }
 
@@ -41,35 +42,35 @@ print_flags(unsigned int flags)
 {
     unsigned int i;
     static char *prflags[] = {
-       "DISALLOW_POSTDATED",     /* 0x00000001 */
-       "DISALLOW_FORWARDABLE",   /* 0x00000002 */
-       "DISALLOW_TGT_BASED",     /* 0x00000004 */
-       "DISALLOW_RENEWABLE",     /* 0x00000008 */
-       "DISALLOW_PROXIABLE",     /* 0x00000010 */
-       "DISALLOW_DUP_SKEY",      /* 0x00000020 */
-       "DISALLOW_ALL_TIX",       /* 0x00000040 */
-       "REQUIRES_PRE_AUTH",      /* 0x00000080 */
-       "REQUIRES_HW_AUTH",       /* 0x00000100 */
-       "REQUIRES_PWCHANGE",      /* 0x00000200 */
-       "UNKNOWN_0x00000400",     /* 0x00000400 */
-       "UNKNOWN_0x00000800",     /* 0x00000800 */
-       "DISALLOW_SVR",           /* 0x00001000 */
-       "PWCHANGE_SERVICE",       /* 0x00002000 */
-       "SUPPORT_DESMD5",         /* 0x00004000 */
-       "NEW_PRINC",              /* 0x00008000 */
-       "UNKNOWN_0x00010000",     /* 0x00010000 */
-       "UNKNOWN_0x00020000",     /* 0x00020000 */
-       "UNKNOWN_0x00040000",     /* 0x00040000 */
-       "UNKNOWN_0x00080000",     /* 0x00080000 */
-       "OK_AS_DELEGATE",         /* 0x00100000 */
-       "OK_TO_AUTH_AS_DELEGATE", /* 0x00200000 */
-       "NO_AUTH_DATA_REQUIRED",  /* 0x00400000 */
+        "DISALLOW_POSTDATED",     /* 0x00000001 */
+        "DISALLOW_FORWARDABLE",   /* 0x00000002 */
+        "DISALLOW_TGT_BASED",     /* 0x00000004 */
+        "DISALLOW_RENEWABLE",     /* 0x00000008 */
+        "DISALLOW_PROXIABLE",     /* 0x00000010 */
+        "DISALLOW_DUP_SKEY",      /* 0x00000020 */
+        "DISALLOW_ALL_TIX",       /* 0x00000040 */
+        "REQUIRES_PRE_AUTH",      /* 0x00000080 */
+        "REQUIRES_HW_AUTH",       /* 0x00000100 */
+        "REQUIRES_PWCHANGE",      /* 0x00000200 */
+        "UNKNOWN_0x00000400",     /* 0x00000400 */
+        "UNKNOWN_0x00000800",     /* 0x00000800 */
+        "DISALLOW_SVR",           /* 0x00001000 */
+        "PWCHANGE_SERVICE",       /* 0x00002000 */
+        "SUPPORT_DESMD5",         /* 0x00004000 */
+        "NEW_PRINC",              /* 0x00008000 */
+        "UNKNOWN_0x00010000",     /* 0x00010000 */
+        "UNKNOWN_0x00020000",     /* 0x00020000 */
+        "UNKNOWN_0x00040000",     /* 0x00040000 */
+        "UNKNOWN_0x00080000",     /* 0x00080000 */
+        "OK_AS_DELEGATE",         /* 0x00100000 */
+        "OK_TO_AUTH_AS_DELEGATE", /* 0x00200000 */
+        "NO_AUTH_DATA_REQUIRED",  /* 0x00400000 */
 
     };
 
     for (i = 0; i < sizeof (prflags) / sizeof (char *); i++) {
-       if (flags & (krb5_flags) 1 << i)
-           printf("\t\t\t%s\n", prflags[i]);
+        if (flags & (krb5_flags) 1 << i)
+            printf("\t\t\t%s\n", prflags[i]);
     }
 }
 
@@ -80,10 +81,10 @@ static void
 print_time(unsigned int *timep)
 {
     if (*timep == 0L)
-       printf("\t\t\tNone\n");
+        printf("\t\t\tNone\n");
     else {
-       time_t ltime = *timep;
-       printf("\t\t\t%s", ctime(&ltime));
+        time_t ltime = *timep;
+        printf("\t\t\t%s", ctime(&ltime));
     }
 }
 
@@ -100,7 +101,7 @@ print_hex(const char *tag, utf8str_t *str)
 
     (void) printf("\t\t\t%s(%d): 0x", tag, len);
     for (i = 0; i < len; i++) {
-       printf("%02x", (krb5_octet) str->utf8str_t_val[i]);
+        printf("%02x", (krb5_octet) str->utf8str_t_val[i]);
     }
     (void) printf("\n");
 }
@@ -119,8 +120,8 @@ print_str(const char *tag, utf8str_t *str)
     dis = (char *) malloc(len);
 
     if (!dis) {
-       (void) fprintf(stderr, _("\nCouldn't allocate memory"));
-       exit(1);
+        (void) fprintf(stderr, _("\nCouldn't allocate memory"));
+        exit(1);
     }
 
     (void) snprintf(dis, len, "%s", str->utf8str_t_val);
@@ -158,7 +159,7 @@ print_princ(kdbe_princ_t *princ)
 
     for (i = 0; i < len; i++, data++) {
 
-       print_data("princ", data);
+        print_data("princ", data);
     }
 }
 
@@ -176,13 +177,13 @@ print_key(kdbe_key_t *k)
     printf("\t\t\tkvno: %d\n", k->k_kvno);
 
     for (i = 0; i < k->k_enctype.k_enctype_len; i++) {
-       printf("\t\t\tenc type: 0x%x\n",
-              k->k_enctype.k_enctype_val[i]);
+        printf("\t\t\tenc type: 0x%x\n",
+               k->k_enctype.k_enctype_val[i]);
     }
 
     str = k->k_contents.k_contents_val;
     for (i = 0; i < k->k_contents.k_contents_len; i++, str++) {
-       print_hex("key", str);
+        print_hex("key", str);
     }
 }
 
@@ -195,7 +196,7 @@ print_keydata(kdbe_key_t *keys, unsigned int len)
     unsigned int i;
 
     for (i = 0; i < len; i++, keys++) {
-       print_key(keys);
+        print_key(keys);
     }
 }
 
@@ -213,7 +214,7 @@ print_tl(kdbe_tl_t *tl)
 
     printf("\t\t\tvalue(%d): 0x", len);
     for (i = 0; i < len; i++) {
-       printf("%02x", (krb5_octet) tl->tl_data.tl_data_val[i]);
+        printf("%02x", (krb5_octet) tl->tl_data.tl_data_val[i]);
     }
     printf("\n");
 }
@@ -229,7 +230,7 @@ print_tldata(kdbe_tl_t *tldata, int len)
     printf("\t\t\titems: %d\n", len);
 
     for (i = 0; i < len; i++, tldata++) {
-       print_tl(tldata);
+        print_tl(tldata);
     }
 }
 
@@ -242,135 +243,135 @@ print_attr(kdbe_val_t *val, int vverbose)
 {
     switch (val->av_type) {
     case AT_ATTRFLAGS:
-       (void) printf(_("\t\tAttribute flags\n"));
-       if (vverbose) {
-           print_flags(val->kdbe_val_t_u.av_attrflags);
-       }
-       break;
+        (void) printf(_("\t\tAttribute flags\n"));
+        if (vverbose) {
+            print_flags(val->kdbe_val_t_u.av_attrflags);
+        }
+        break;
     case AT_MAX_LIFE:
-       (void) printf(_("\t\tMaximum ticket life\n"));
-       if (vverbose) {
-           print_time(&val->kdbe_val_t_u.av_max_life);
-       }
-       break;
+        (void) printf(_("\t\tMaximum ticket life\n"));
+        if (vverbose) {
+            print_time(&val->kdbe_val_t_u.av_max_life);
+        }
+        break;
     case AT_MAX_RENEW_LIFE:
-       (void) printf(_("\t\tMaximum renewable life\n"));
-       if (vverbose) {
-           print_time(&val->kdbe_val_t_u.av_max_renew_life);
-       }
-       break;
+        (void) printf(_("\t\tMaximum renewable life\n"));
+        if (vverbose) {
+            print_time(&val->kdbe_val_t_u.av_max_renew_life);
+        }
+        break;
     case AT_EXP:
-       (void) printf(_("\t\tPrincipal expiration\n"));
-       if (vverbose) {
-           print_time(&val->kdbe_val_t_u.av_exp);
-       }
-       break;
+        (void) printf(_("\t\tPrincipal expiration\n"));
+        if (vverbose) {
+            print_time(&val->kdbe_val_t_u.av_exp);
+        }
+        break;
     case AT_PW_EXP:
-       (void) printf(_("\t\tPassword expiration\n"));
-       if (vverbose) {
-           print_time(&val->kdbe_val_t_u.av_pw_exp);
-       }
-       break;
+        (void) printf(_("\t\tPassword expiration\n"));
+        if (vverbose) {
+            print_time(&val->kdbe_val_t_u.av_pw_exp);
+        }
+        break;
     case AT_LAST_SUCCESS:
-       (void) printf(_("\t\tLast successful auth\n"));
-       if (vverbose) {
-           print_time(&val->kdbe_val_t_u.av_last_success);
-       }
-       break;
+        (void) printf(_("\t\tLast successful auth\n"));
+        if (vverbose) {
+            print_time(&val->kdbe_val_t_u.av_last_success);
+        }
+        break;
     case AT_LAST_FAILED:
-       (void) printf(_("\t\tLast failed auth\n"));
-       if (vverbose) {
-           print_time(&val->kdbe_val_t_u.av_last_failed);
-       }
-       break;
+        (void) printf(_("\t\tLast failed auth\n"));
+        if (vverbose) {
+            print_time(&val->kdbe_val_t_u.av_last_failed);
+        }
+        break;
     case AT_FAIL_AUTH_COUNT:
-       (void) printf(_("\t\tFailed passwd attempt\n"));
-       if (vverbose) {
-           (void) printf("\t\t\t%d\n",
-                         val->kdbe_val_t_u.av_fail_auth_count);
-       }
-       break;
+        (void) printf(_("\t\tFailed passwd attempt\n"));
+        if (vverbose) {
+            (void) printf("\t\t\t%d\n",
+                          val->kdbe_val_t_u.av_fail_auth_count);
+        }
+        break;
     case AT_PRINC:
-       (void) printf(_("\t\tPrincipal\n"));
-       if (vverbose) {
-           print_princ(&val->kdbe_val_t_u.av_princ);
-       }
-       break;
+        (void) printf(_("\t\tPrincipal\n"));
+        if (vverbose) {
+            print_princ(&val->kdbe_val_t_u.av_princ);
+        }
+        break;
     case AT_KEYDATA:
-       (void) printf(_("\t\tKey data\n"));
-       if (vverbose) {
-           print_keydata(
-               val->kdbe_val_t_u.av_keydata.av_keydata_val,
-               val->kdbe_val_t_u.av_keydata.av_keydata_len);
-       }
-       break;
+        (void) printf(_("\t\tKey data\n"));
+        if (vverbose) {
+            print_keydata(
+                val->kdbe_val_t_u.av_keydata.av_keydata_val,
+                val->kdbe_val_t_u.av_keydata.av_keydata_len);
+        }
+        break;
     case AT_TL_DATA:
-       (void) printf(_("\t\tTL data\n"));
-       if (vverbose) {
-           print_tldata(
-               val->kdbe_val_t_u.av_tldata.av_tldata_val,
-               val->kdbe_val_t_u.av_tldata.av_tldata_len);
-       }
-       break;
+        (void) printf(_("\t\tTL data\n"));
+        if (vverbose) {
+            print_tldata(
+                val->kdbe_val_t_u.av_tldata.av_tldata_val,
+                val->kdbe_val_t_u.av_tldata.av_tldata_len);
+        }
+        break;
     case AT_LEN:
-       (void) printf(_("\t\tLength\n"));
-       if (vverbose) {
-           (void) printf("\t\t\t%d\n",
-                         val->kdbe_val_t_u.av_len);
-       }
-       break;
+        (void) printf(_("\t\tLength\n"));
+        if (vverbose) {
+            (void) printf("\t\t\t%d\n",
+                          val->kdbe_val_t_u.av_len);
+        }
+        break;
     case AT_PW_LAST_CHANGE:
-       (void) printf(_("\t\tPassword last changed\n"));
-       if (vverbose) {
-           print_time(&val->kdbe_val_t_u.av_pw_last_change);
-       }
-       break;
+        (void) printf(_("\t\tPassword last changed\n"));
+        if (vverbose) {
+            print_time(&val->kdbe_val_t_u.av_pw_last_change);
+        }
+        break;
     case AT_MOD_PRINC:
-       (void) printf(_("\t\tModifying principal\n"));
-       if (vverbose) {
-           print_princ(&val->kdbe_val_t_u.av_mod_princ);
-       }
-       break;
+        (void) printf(_("\t\tModifying principal\n"));
+        if (vverbose) {
+            print_princ(&val->kdbe_val_t_u.av_mod_princ);
+        }
+        break;
     case AT_MOD_TIME:
-       (void) printf(_("\t\tModification time\n"));
-       if (vverbose) {
-           print_time(&val->kdbe_val_t_u.av_mod_time);
-       }
-       break;
+        (void) printf(_("\t\tModification time\n"));
+        if (vverbose) {
+            print_time(&val->kdbe_val_t_u.av_mod_time);
+        }
+        break;
     case AT_MOD_WHERE:
-       (void) printf(_("\t\tModified where\n"));
-       if (vverbose) {
-           print_str("where",
-                     &val->kdbe_val_t_u.av_mod_where);
-       }
-       break;
+        (void) printf(_("\t\tModified where\n"));
+        if (vverbose) {
+            print_str("where",
+                      &val->kdbe_val_t_u.av_mod_where);
+        }
+        break;
     case AT_PW_POLICY:
-       (void) printf(_("\t\tPassword policy\n"));
-       if (vverbose) {
-           print_str("policy",
-                     &val->kdbe_val_t_u.av_pw_policy);
-       }
-       break;
+        (void) printf(_("\t\tPassword policy\n"));
+        if (vverbose) {
+            print_str("policy",
+                      &val->kdbe_val_t_u.av_pw_policy);
+        }
+        break;
     case AT_PW_POLICY_SWITCH:
-       (void) printf(_("\t\tPassword policy switch\n"));
-       if (vverbose) {
-           (void) printf("\t\t\t%d\n",
-                         val->kdbe_val_t_u.av_pw_policy_switch);
-       }
-       break;
+        (void) printf(_("\t\tPassword policy switch\n"));
+        if (vverbose) {
+            (void) printf("\t\t\t%d\n",
+                          val->kdbe_val_t_u.av_pw_policy_switch);
+        }
+        break;
     case AT_PW_HIST_KVNO:
-       (void) printf(_("\t\tPassword history KVNO\n"));
-       if (vverbose) {
-           (void) printf("\t\t\t%d\n",
-                         val->kdbe_val_t_u.av_pw_hist_kvno);
-       }
-       break;
+        (void) printf(_("\t\tPassword history KVNO\n"));
+        if (vverbose) {
+            (void) printf("\t\t\t%d\n",
+                          val->kdbe_val_t_u.av_pw_hist_kvno);
+        }
+        break;
     case AT_PW_HIST:
-       (void) printf(_("\t\tPassword history\n"));
-       if (vverbose) {
-           (void) printf("\t\t\tPW history elided\n");
-       }
-       break;
+        (void) printf(_("\t\tPassword history\n"));
+        if (vverbose) {
+            (void) printf("\t\t\tPW history elided\n");
+        }
+        break;
     } /* switch */
 
 }
@@ -380,104 +381,104 @@ print_attr(kdbe_val_t *val, int vverbose)
 static void
 print_update(kdb_hlog_t *ulog, uint32_t entry, unsigned int verbose)
 {
-    XDR                        xdrs;
-    uint32_t           start_sno, i, j, indx;
-    char               *dbprinc;
-    kdb_ent_header_t   *indx_log;
-    kdb_incr_update_t  upd;
+    XDR                 xdrs;
+    uint32_t            start_sno, i, j, indx;
+    char                *dbprinc;
+    kdb_ent_header_t    *indx_log;
+    kdb_incr_update_t   upd;
 
     if (entry && (entry < ulog->kdb_num))
-       start_sno = ulog->kdb_last_sno - entry;
+        start_sno = ulog->kdb_last_sno - entry;
     else
-       start_sno = ulog->kdb_first_sno - 1;
+        start_sno = ulog->kdb_first_sno - 1;
 
     for (i = start_sno; i < ulog->kdb_last_sno; i++) {
-       indx = i % ulog->kdb_num;
-
-       indx_log = (kdb_ent_header_t *)INDEX(ulog, indx);
-
-       /*
-        * Check for corrupt update entry
-        */
-       if (indx_log->kdb_umagic != KDB_ULOG_MAGIC) {
-           (void) fprintf(stderr,
-                          _("Corrupt update entry\n\n"));
-           exit(1);
-       }
-
-       (void) memset(&upd, 0, sizeof (kdb_incr_update_t));
-       xdrmem_create(&xdrs, (char *)indx_log->entry_data,
-                     indx_log->kdb_entry_size, XDR_DECODE);
-       if (!xdr_kdb_incr_update_t(&xdrs, &upd)) {
-           (void) printf(_("Entry data decode failure\n\n"));
-           exit(1);
-       }
-
-       (void) printf("---\n");
-       (void) printf(_("Update Entry\n"));
-
-       (void) printf(_("\tUpdate serial # : %u\n"),
-                     indx_log->kdb_entry_sno);
-
-       (void) printf(_("\tUpdate operation : "));
-       if (upd.kdb_deleted)
-           (void) printf(_("Delete\n"));
-       else
-           (void) printf(_("Add\n"));
-
-       dbprinc = malloc(upd.kdb_princ_name.utf8str_t_len + 1);
-       if (dbprinc == NULL) {
-           (void) printf(_("Could not allocate "
-                           "principal name\n\n"));
-           exit(1);
-       }
-       (void) strncpy(dbprinc, upd.kdb_princ_name.utf8str_t_val,
-                      upd.kdb_princ_name.utf8str_t_len);
-       dbprinc[upd.kdb_princ_name.utf8str_t_len] = 0;
-       (void) printf(_("\tUpdate principal : %s\n"), dbprinc);
-
-       (void) printf(_("\tUpdate size : %u\n"),
-                     indx_log->kdb_entry_size);
-
-       (void) printf(_("\tUpdate committed : %s\n"),
-                     indx_log->kdb_commit ? "True" : "False");
-
-       if (indx_log->kdb_time.seconds == 0L)
-           (void) printf(_("\tUpdate time stamp : None\n"));
-       else
-           (void) printf(_("\tUpdate time stamp : %s"),
-                         ctime((time_t *)&(indx_log->kdb_time.seconds)));
-
-       (void) printf(_("\tAttributes changed : %d\n"),
-                     upd.kdb_update.kdbe_t_len);
-
-       if (verbose)
-           for (j = 0; j < upd.kdb_update.kdbe_t_len; j++)
-               print_attr(&upd.kdb_update.kdbe_t_val[j],
-                          verbose > 1 ? 1 : 0);
-
-       xdr_free(xdr_kdb_incr_update_t, (char *)&upd);
-       free(dbprinc);
+        indx = i % ulog->kdb_num;
+
+        indx_log = (kdb_ent_header_t *)INDEX(ulog, indx);
+
+        /*
+         * Check for corrupt update entry
+         */
+        if (indx_log->kdb_umagic != KDB_ULOG_MAGIC) {
+            (void) fprintf(stderr,
+                           _("Corrupt update entry\n\n"));
+            exit(1);
+        }
+
+        (void) memset(&upd, 0, sizeof (kdb_incr_update_t));
+        xdrmem_create(&xdrs, (char *)indx_log->entry_data,
+                      indx_log->kdb_entry_size, XDR_DECODE);
+        if (!xdr_kdb_incr_update_t(&xdrs, &upd)) {
+            (void) printf(_("Entry data decode failure\n\n"));
+            exit(1);
+        }
+
+        (void) printf("---\n");
+        (void) printf(_("Update Entry\n"));
+
+        (void) printf(_("\tUpdate serial # : %u\n"),
+                      indx_log->kdb_entry_sno);
+
+        (void) printf(_("\tUpdate operation : "));
+        if (upd.kdb_deleted)
+            (void) printf(_("Delete\n"));
+        else
+            (void) printf(_("Add\n"));
+
+        dbprinc = malloc(upd.kdb_princ_name.utf8str_t_len + 1);
+        if (dbprinc == NULL) {
+            (void) printf(_("Could not allocate "
+                            "principal name\n\n"));
+            exit(1);
+        }
+        (void) strncpy(dbprinc, upd.kdb_princ_name.utf8str_t_val,
+                       upd.kdb_princ_name.utf8str_t_len);
+        dbprinc[upd.kdb_princ_name.utf8str_t_len] = 0;
+        (void) printf(_("\tUpdate principal : %s\n"), dbprinc);
+
+        (void) printf(_("\tUpdate size : %u\n"),
+                      indx_log->kdb_entry_size);
+
+        (void) printf(_("\tUpdate committed : %s\n"),
+                      indx_log->kdb_commit ? "True" : "False");
+
+        if (indx_log->kdb_time.seconds == 0L)
+            (void) printf(_("\tUpdate time stamp : None\n"));
+        else
+            (void) printf(_("\tUpdate time stamp : %s"),
+                          ctime((time_t *)&(indx_log->kdb_time.seconds)));
+
+        (void) printf(_("\tAttributes changed : %d\n"),
+                      upd.kdb_update.kdbe_t_len);
+
+        if (verbose)
+            for (j = 0; j < upd.kdb_update.kdbe_t_len; j++)
+                print_attr(&upd.kdb_update.kdbe_t_val[j],
+                           verbose > 1 ? 1 : 0);
+
+        xdr_free(xdr_kdb_incr_update_t, (char *)&upd);
+        free(dbprinc);
     } /* for */
 }
 
 int
 main(int argc, char **argv)
 {
-    int                        c;
-    unsigned int       verbose = 0;
-    bool_t             headeronly = FALSE;
-    uint32_t           entry = 0;
-    krb5_context       context;
-    kadm5_config_params        params;
-    kdb_log_context    *log_ctx;
-    kdb_hlog_t         *ulog = NULL;
-    char               **db_args = NULL; /* XXX */
+    int                 c;
+    unsigned int        verbose = 0;
+    bool_t              headeronly = FALSE;
+    uint32_t            entry = 0;
+    krb5_context        context;
+    kadm5_config_params params;
+    kdb_log_context     *log_ctx;
+    kdb_hlog_t          *ulog = NULL;
+    char                **db_args = NULL; /* XXX */
 
     (void) setlocale(LC_ALL, "");
 
 #if !defined(TEXT_DOMAIN)
-#define        TEXT_DOMAIN "SYS_TEST"
+#define TEXT_DOMAIN "SYS_TEST"
 #endif /* TEXT_DOMAIN */
 
     (void) textdomain(TEXT_DOMAIN);
@@ -485,57 +486,57 @@ main(int argc, char **argv)
     progname = argv[0];
 
     while ((c = getopt(argc, argv, "vhe:")) != -1) {
-       switch (c) {
-       case 'h':
-           headeronly = TRUE;
-           break;
-       case 'e':
-           entry = atoi(optarg);
-           break;
-       case 'v':
-           verbose++;
-           break;
-       default:
-           usage();
-       }
+        switch (c) {
+        case 'h':
+            headeronly = TRUE;
+            break;
+        case 'e':
+            entry = atoi(optarg);
+            break;
+        case 'v':
+            verbose++;
+            break;
+        default:
+            usage();
+        }
     }
 
     if (krb5_init_context(&context)) {
-       (void) fprintf(stderr,
-                      _("Unable to initialize Kerberos\n\n"));
-       exit(1);
+        (void) fprintf(stderr,
+                       _("Unable to initialize Kerberos\n\n"));
+        exit(1);
     }
 
     (void) memset(&params, 0, sizeof (params));
 
     if (kadm5_get_config_params(context, 1, &params, &params)) {
-       (void) fprintf(stderr,
-                      _("Couldn't read database_name\n\n"));
-       exit(1);
+        (void) fprintf(stderr,
+                       _("Couldn't read database_name\n\n"));
+        exit(1);
     }
 
     (void) printf(_("\nKerberos update log (%s)\n"),
-                 params.iprop_logfile);
+                  params.iprop_logfile);
 
     if (ulog_map(context, params.iprop_logfile, 0, FKPROPLOG, db_args)) {
-       (void) fprintf(stderr, _("Unable to map log file %s\n\n"),
-                      params.iprop_logfile);
-       exit(1);
+        (void) fprintf(stderr, _("Unable to map log file %s\n\n"),
+                       params.iprop_logfile);
+        exit(1);
     }
 
     log_ctx = context->kdblog_context;
     if (log_ctx)
-       ulog = log_ctx->ulog;
+        ulog = log_ctx->ulog;
     else {
-       (void) fprintf(stderr, _("Unable to map log file %s\n\n"),
-                      params.iprop_logfile);
-       exit(1);
+        (void) fprintf(stderr, _("Unable to map log file %s\n\n"),
+                       params.iprop_logfile);
+        exit(1);
     }
 
     if (ulog->kdb_hmagic != KDB_ULOG_HDR_MAGIC) {
-       (void) fprintf(stderr,
-                      _("Corrupt header log, exiting\n\n"));
-       exit(1);
+        (void) fprintf(stderr,
+                       _("Corrupt header log, exiting\n\n"));
+        exit(1);
     }
 
     (void) printf(_("Update log dump :\n"));
@@ -543,53 +544,53 @@ main(int argc, char **argv)
     (void) printf(_("\tLog state : "));
     switch (ulog->kdb_state) {
     case KDB_STABLE:
-       (void) printf(_("Stable\n"));
-       break;
+        (void) printf(_("Stable\n"));
+        break;
     case KDB_UNSTABLE:
-       (void) printf(_("Unstable\n"));
-       break;
+        (void) printf(_("Unstable\n"));
+        break;
     case KDB_CORRUPT:
-       (void) printf(_("Corrupt\n"));
-       break;
+        (void) printf(_("Corrupt\n"));
+        break;
     default:
-       (void) printf(_("Unknown state: %d\n"),
-                     ulog->kdb_state);
-       break;
+        (void) printf(_("Unknown state: %d\n"),
+                      ulog->kdb_state);
+        break;
     }
     (void) printf(_("\tEntry block size : %u\n"), ulog->kdb_block);
     (void) printf(_("\tNumber of entries : %u\n"), ulog->kdb_num);
 
     if (ulog->kdb_last_sno == 0)
-       (void) printf(_("\tLast serial # : None\n"));
+        (void) printf(_("\tLast serial # : None\n"));
     else {
-       if (ulog->kdb_first_sno == 0)
-           (void) printf(_("\tFirst serial # : None\n"));
-       else {
-           (void) printf(_("\tFirst serial # : "));
-           (void) printf("%u\n", ulog->kdb_first_sno);
-       }
-
-       (void) printf(_("\tLast serial # : "));
-       (void) printf("%u\n", ulog->kdb_last_sno);
+        if (ulog->kdb_first_sno == 0)
+            (void) printf(_("\tFirst serial # : None\n"));
+        else {
+            (void) printf(_("\tFirst serial # : "));
+            (void) printf("%u\n", ulog->kdb_first_sno);
+        }
+
+        (void) printf(_("\tLast serial # : "));
+        (void) printf("%u\n", ulog->kdb_last_sno);
     }
 
     if (ulog->kdb_last_time.seconds == 0L) {
-       (void) printf(_("\tLast time stamp : None\n"));
+        (void) printf(_("\tLast time stamp : None\n"));
     } else {
-       if (ulog->kdb_first_time.seconds == 0L)
-           (void) printf(_("\tFirst time stamp : None\n"));
-       else {
-           (void) printf(_("\tFirst time stamp : %s"),
-                         ctime((time_t *)
-                               &(ulog->kdb_first_time.seconds)));
-       }
-
-       (void) printf(_("\tLast time stamp : %s\n"),
-                     ctime((time_t *)&(ulog->kdb_last_time.seconds)));
+        if (ulog->kdb_first_time.seconds == 0L)
+            (void) printf(_("\tFirst time stamp : None\n"));
+        else {
+            (void) printf(_("\tFirst time stamp : %s"),
+                          ctime((time_t *)
+                                &(ulog->kdb_first_time.seconds)));
+        }
+
+        (void) printf(_("\tLast time stamp : %s\n"),
+                      ctime((time_t *)&(ulog->kdb_last_time.seconds)));
     }
 
     if ((!headeronly) && ulog->kdb_num) {
-       print_update(ulog, entry, verbose);
+        print_update(ulog, entry, verbose);
     }
 
     (void) printf("\n");