-.\" $Source$
-.\" $Author$
-.\" $Id$
+.\" admin/aname/kdb5_anadd.M
+.\"
.\" Copyright 1990 by the Massachusetts Institute of Technology.
.\"
.\" Export of this software from the United States of America may
-.\" $Source$
-.\" $Author$
-.\" $Id$
+.\" admin/convert/kdb5_convert.M
+.\"
.\" Copyright 1991 by the Massachusetts Institute of Technology.
.\"
.\" Export of this software from the United States of America may
-.\" $Source$
-.\" $Author$
-.\" $Id$
+.\" admin/create/kdb5_create.M
+.\"
.\" Copyright 1990 by the Massachusetts Institute of Technology.
.\"
.\" Export of this software from the United States of America may
-.\" $Source$
-.\" $Author$
-.\" $Id$
+.\" admin/destroy/kdb5_destroy.M
+.\"
.\" Copyright 1990 by the Massachusetts Institute of Technology.
.\"
.\" Export of this software from the United States of America may
-# $Source$
-# $Author$
-# $Id$
+# admin/edit/kdb5_ed_ct.ct
#
# Copyright 1990 by the Massachusetts Institute of Technology.
# All Rights Reserved.
-.\" $Source$
-.\" $Author$
-.\" $Id$
+.\" admin/edit/kdb5_edit.M
+.\"
.\" Copyright 1990 by the Massachusetts Institute of Technology.
.\"
.\" Export of this software from the United States of America may
-.\" $Source$
-.\" $Author$
-.\" $Id$
+.\" admin/stash/kdb5_stash.M
+.\"
.\" Copyright 1990 by the Massachusetts Institute of Technology.
.\"
.\" Export of this software from the United States of America may
-.\" $Source$
-.\" $Author$
-.\" $Header$
+.\" appl/bsd/rcp.M
.\"
.\" Copyright (c) 1983 The Regents of the University of California.
.\" All rights reserved.
-.\" $Source$
-.\" $Author$
-.\" $Header$
+.\" appl/bsd/rlogin.M
.\"
.\" Copyright (c) 1983 The Regents of the University of California.
.\" All rights reserved.
-.\" $Source$
-.\" $Author$
-.\" $Header$
+.\" appl/bsd/rsh.M
.\"
.\" Copyright (c) 1983 The Regents of the University of California.
.\" All rights reserved.
Barry Jaspan, bjaspan@security.ov.com
OpenVision Technologies, Inc.
-
-$Id$
-.\" $Source$
-.\" $Author$
-.\" $Id$
+.\" appl/sample/sclient/sclient.M
+.\"
.\" Copyright 1990 by the Massachusetts Institute of Technology.
.\"
.\" Export of this software from the United States of America may
-.\" $Source$
-.\" $Author$
-.\" $Id$
+.\" appl/sample/sserver/sserver.M
+.\"
.\" Copyright 1990 by the Massachusetts Institute of Technology.
.\"
.\" Export of this software from the United States of America may
-.\" $Source$
-.\" $Author$
-.\" $Id$
+.\" clients/kdestroy/kdestroy.M
+.\"
.\" Copyright 1992 by the Massachusetts Institute of Technology.
.\"
.\" Export of this software from the United States of America may
-.\" $Source$
-.\" $Author$
-.\" $Id$
+.\" clients/kinit/kinit.M
+.\"
.\" Copyright 1990 by the Massachusetts Institute of Technology.
.\"
.\" Export of this software from the United States of America may
-.\" $Source$
-.\" $Author$
-.\" $Id$
+.\" clients/klist/klist.M
+.\"
.\" Copyright 1990 by the Massachusetts Institute of Technology.
.\"
.\" Export of this software from the United States of America may
-# $Source$
-# $Author$
-# $Header$
+# kadmin.v4/server/kadm_err.et
+#
# Copyright 1988 by the Massachusetts Institute of Technology.
#
# For copying and distribution information, please see the file
-.\" $Source$
-.\" $Author$
-.\" $Id$
+.\" kadmin/kpasswd/kpasswd.M
.\"
.\" Copyright 1995 by the Massachusetts Institute of Technology.
.\"
-.\" $Source$
-.\" $Author$
-.\" $Id$
+.\" kadmin/v5client/kadmin5.M
+.\"
.\" Copyright 1995 by the Massachusetts Institute of Technology.
.\"
.\" Export of this software from the United States of America may
-# $Source$
-# $Author$
-# $Id$
+# kadmin/v5client/kadmin5_ct.ct
#
# Copyright 1995 by the Massachusetts Institute of Technology.
# All Rights Reserved.
-.\" $Source$
-.\" $Author$
-.\" $Id$
+.\" kadmin/v5server/kadmind5.M
.\"
.\" Copyright 1995 by the Massachusetts Institute of Technology.
.\"
#
-# $Source$
-# $Author$
+# kdc/kdc5_err.et
#
# Copyright 1990 by the Massachusetts Institute of Technology.
#
-.\" $Source$
-.\" $Author$
-.\" $Id$
+.\" kdc/krb5kdc.M
+.\"
.\" Copyright 1990 by the Massachusetts Institute of Technology.
.\"
.\" Export of this software from the United States of America may
# OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
# PERFORMANCE OF THIS SOFTWARE.
#
-# $Id$
CFLAGS = $(CCOPTS) -DUSE_MASTER $(DEFS) $(LOCALINCLUDE)
OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
PERFORMANCE OF THIS SOFTWARE.
-$Id$
Kerberos V5 to Kerberos V4 Credentials Converting Service, ALPHA RELEASE
========================================================================
-$Id$
Kerberos V5 to Kerberos V4 Credentials Converting Service, ALPHA RELEASE
========================================================================
# OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
# PERFORMANCE OF THIS SOFTWARE.
#
-# $Id$
error_table k524
/*
- * $Source$
- * $Author$
+ * lib/des425/util.c
*
* Copyright 1988 by the Massachusetts Institute of Technology.
*
* Miscellaneous debug printing utilities
*/
-#ifndef lint
-static char rcsid_util_c[] =
-"$Header$";
-#endif /* lint */
-
#include <stdio.h>
/* Application include files */
# PERFORMANCE OF THIS SOFTWARE.
#
-# $Id$
-
TOP = ../..
include $(TOP)/config.mk/template
# PERFORMANCE OF THIS SOFTWARE.
#
-# $Id$
-
TOP = ../../..
include $(TOP)/config.mk/template
* correctly.
*/
#if sizeof(gss_uint32) != sizeof(OM_uint32)
-#error Incompatible definition of OM_uint32 from xom.h
+/**/#error Incompatible definition of OM_uint32 from xom.h
#endif
typedef OM_object_identifier gss_OID_desc, *gss_OID;
* Expiration time of 2^32-1 seconds means infinite lifetime for a
* credential or security context
*/
-#define GSS_C_INDEFINITE 0xfffffffful
+#define GSS_C_INDEFINITE 0xffffffffl
/* Major status codes */
#define GSS_C_CALLING_ERROR_OFFSET 24
#define GSS_C_ROUTINE_ERROR_OFFSET 16
#define GSS_C_SUPPLEMENTARY_OFFSET 0
-#define GSS_C_CALLING_ERROR_MASK 0377ul
-#define GSS_C_ROUTINE_ERROR_MASK 0377ul
-#define GSS_C_SUPPLEMENTARY_MASK 0177777ul
+#define GSS_C_CALLING_ERROR_MASK 0377l
+#define GSS_C_ROUTINE_ERROR_MASK 0377l
+#define GSS_C_SUPPLEMENTARY_MASK 0177777l
/*
* The macros that test status codes for error conditions. Note that the
* Calling errors:
*/
#define GSS_S_CALL_INACCESSIBLE_READ \
- (1ul << GSS_C_CALLING_ERROR_OFFSET)
+ (1l << GSS_C_CALLING_ERROR_OFFSET)
#define GSS_S_CALL_INACCESSIBLE_WRITE \
- (2ul << GSS_C_CALLING_ERROR_OFFSET)
+ (2l << GSS_C_CALLING_ERROR_OFFSET)
#define GSS_S_CALL_BAD_STRUCTURE \
- (3ul << GSS_C_CALLING_ERROR_OFFSET)
+ (3l << GSS_C_CALLING_ERROR_OFFSET)
/*
* Routine errors:
*/
-#define GSS_S_BAD_MECH (1ul << GSS_C_ROUTINE_ERROR_OFFSET)
-#define GSS_S_BAD_NAME (2ul << GSS_C_ROUTINE_ERROR_OFFSET)
-#define GSS_S_BAD_NAMETYPE (3ul << GSS_C_ROUTINE_ERROR_OFFSET)
-#define GSS_S_BAD_BINDINGS (4ul << GSS_C_ROUTINE_ERROR_OFFSET)
-#define GSS_S_BAD_STATUS (5ul << GSS_C_ROUTINE_ERROR_OFFSET)
-#define GSS_S_BAD_SIG (6ul << GSS_C_ROUTINE_ERROR_OFFSET)
-#define GSS_S_NO_CRED (7ul << GSS_C_ROUTINE_ERROR_OFFSET)
-#define GSS_S_NO_CONTEXT (8ul << GSS_C_ROUTINE_ERROR_OFFSET)
-#define GSS_S_DEFECTIVE_TOKEN (9ul << GSS_C_ROUTINE_ERROR_OFFSET)
-#define GSS_S_DEFECTIVE_CREDENTIAL (10ul << GSS_C_ROUTINE_ERROR_OFFSET)
-#define GSS_S_CREDENTIALS_EXPIRED (11ul << GSS_C_ROUTINE_ERROR_OFFSET)
-#define GSS_S_CONTEXT_EXPIRED (12ul << GSS_C_ROUTINE_ERROR_OFFSET)
-#define GSS_S_FAILURE (13ul << GSS_C_ROUTINE_ERROR_OFFSET)
-#define GSS_S_BAD_QOP (14ul << GSS_C_ROUTINE_ERROR_OFFSET)
-#define GSS_S_UNAUTHORIZED (15ul << GSS_C_ROUTINE_ERROR_OFFSET)
-#define GSS_S_UNAVAILABLE (16ul << GSS_C_ROUTINE_ERROR_OFFSET)
+#define GSS_S_BAD_MECH (1l << GSS_C_ROUTINE_ERROR_OFFSET)
+#define GSS_S_BAD_NAME (2l << GSS_C_ROUTINE_ERROR_OFFSET)
+#define GSS_S_BAD_NAMETYPE (3l << GSS_C_ROUTINE_ERROR_OFFSET)
+#define GSS_S_BAD_BINDINGS (4l << GSS_C_ROUTINE_ERROR_OFFSET)
+#define GSS_S_BAD_STATUS (5l << GSS_C_ROUTINE_ERROR_OFFSET)
+#define GSS_S_BAD_SIG (6l << GSS_C_ROUTINE_ERROR_OFFSET)
+#define GSS_S_NO_CRED (7l << GSS_C_ROUTINE_ERROR_OFFSET)
+#define GSS_S_NO_CONTEXT (8l << GSS_C_ROUTINE_ERROR_OFFSET)
+#define GSS_S_DEFECTIVE_TOKEN (9l << GSS_C_ROUTINE_ERROR_OFFSET)
+#define GSS_S_DEFECTIVE_CREDENTIAL (10l << GSS_C_ROUTINE_ERROR_OFFSET)
+#define GSS_S_CREDENTIALS_EXPIRED (11l << GSS_C_ROUTINE_ERROR_OFFSET)
+#define GSS_S_CONTEXT_EXPIRED (12l << GSS_C_ROUTINE_ERROR_OFFSET)
+#define GSS_S_FAILURE (13l << GSS_C_ROUTINE_ERROR_OFFSET)
+#define GSS_S_BAD_QOP (14l << GSS_C_ROUTINE_ERROR_OFFSET)
+#define GSS_S_UNAUTHORIZED (15l << GSS_C_ROUTINE_ERROR_OFFSET)
+#define GSS_S_UNAVAILABLE (16l << GSS_C_ROUTINE_ERROR_OFFSET)
/*
* Supplementary info bits:
*/
-#define GSS_S_CONTINUE_NEEDED (1ul << (GSS_C_SUPPLEMENTARY_OFFSET + 0))
-#define GSS_S_DUPLICATE_TOKEN (1ul << (GSS_C_SUPPLEMENTARY_OFFSET + 1))
-#define GSS_S_OLD_TOKEN (1ul << (GSS_C_SUPPLEMENTARY_OFFSET + 2))
-#define GSS_S_UNSEQ_TOKEN (1ul << (GSS_C_SUPPLEMENTARY_OFFSET + 3))
+#define GSS_S_CONTINUE_NEEDED (1l << (GSS_C_SUPPLEMENTARY_OFFSET + 0))
+#define GSS_S_DUPLICATE_TOKEN (1l << (GSS_C_SUPPLEMENTARY_OFFSET + 1))
+#define GSS_S_OLD_TOKEN (1l << (GSS_C_SUPPLEMENTARY_OFFSET + 2))
+#define GSS_S_UNSEQ_TOKEN (1l << (GSS_C_SUPPLEMENTARY_OFFSET + 3))
/*
# PERFORMANCE OF THIS SOFTWARE.
#
-#
-# $Id$
-#
-
error_table ggss
error_code G_BAD_SERVICE_NAME, "No @ in SERVICE-NAME name string"
# PERFORMANCE OF THIS SOFTWARE.
#
-# $Id$
-
TOP = ../../..
include $(TOP)/config.mk/template
# PERFORMANCE OF THIS SOFTWARE.
#
-#
-# $Id$
-#
-
error_table k5g
error_code KG_CCACHE_NOMATCH, "Principal in credential cache does not match desired name"
# For copying and distribution information, see the file
# "mit-copyright.h".
#
-# $Source$
-# $Author$
-# $Header$
+# lib/krb425/krb_err.et
#
error_table krb
--- $Source$
--- $Author$
--- $Id$
+-- lib/krb5/asn.1/KRB5-asn.py
--
-- Copyright 1989 by the Massachusetts Institute of Technology.
--
-# $Source$
-# $Author$
-# $Header$
+# lib/krb5/error_tables/adm_err.et
+#
# Copyright 1988 by the Massachusetts Institute of Technology.
#
# For copying and distribution information, please see the file
#
-# $Source$
-# $Author$
+# lib/krb5/error_tables/kdb5_err.et
#
# Copyright 1990 by the Massachusetts Institute of Technology.
# All Rights Reserved.
#
-# $Source$
-# $Author$
+# lib/krb5/error_tables/krb5_err.et
#
# Copyright 1989,1990,1991 by the Massachusetts Institute of Technology.
# All Rights Reserved.
-.\" $Source$
-.\" $Author$
-.\" $Id$
+.\" slave/kprop.M
+.\"
.\" Copyright 1992 by the Massachusetts Institute of Technology.
.\"
.\" Export of this software from the United States of America may
-.\" $Source$
-.\" $Author$
-.\" $Id$
+.\" slave/kpropd.M
+.\"
.\" Copyright 1992 by the Massachusetts Institute of Technology.
.\"
.\" Export of this software from the United States of America may
-# $Source$
-# $Author$
-# $Id$
+# tests/create/Imakefile
#
# Copyright 1990,1991 by the Massachusetts Institute of Technology.
# All Rights Reserved.
-.\" $Source$
-.\" $Author$
-.\" $Id$
+.\" tests/create/kdb5_mkdums.M
+.\"
.\" Copyright 1990 by the Massachusetts Institute of Technology.
.\"
.\" Export of this software from the United States of America may
-# $Source$
-# $Author$
-# $Id$
+# tests/hammer/Imakefile
#
# Copyright 1990,1991 by the Massachusetts Institute of Technology.
# All Rights Reserved.
-# $Source$
-# $Author$
-# $Id$
+# tests/verify/Imakefile
#
# Copyright 1990,1991 by the Massachusetts Institute of Technology.
# All Rights Reserved.
.\" Copyright (c) 1988 Massachusetts Institute of Technology,
.\" Student Information Processing Board. All rights reserved.
.\"
-.\" $Header$
+.\" util/et/com_err.3
.\"
.TH COM_ERR 3 "22 Nov 1988" SIPB
.SH NAME
\input texinfo @c -*-texinfo-*-
-@c $Header$
-@c $Source$
-@c $Locker$
+@c util/et/com_err.texinfo
@c Note that although this source file is in texinfo format (more
@c or less), it is not yet suitable for turning into an ``info''
.\" Copyright (c) 1988 Massachusetts Institute of Technology,
.\" Student Information Processing Board. All rights reserved.
.\"
-.\" $Header$
+.\" util/et/compile_et.1
.\"
.TH COMPILE_ET 1 "22 Nov 1988" SIPB
.SH NAME