From: Jonathan Kamens Date: Tue, 13 Sep 1994 18:33:17 +0000 (+0000) Subject: Back out randkey changes X-Git-Tag: krb5-1.0-beta4.3~124 X-Git-Url: http://git.tremily.us/?a=commitdiff_plain;h=3217ed6229b8e43ec8d29c67536ff9e47a1baffc;p=krb5.git Back out randkey changes git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@4227 dc483132-0cff-0310-8789-dd5450dbe970 --- diff --git a/doc/kadm5/api-funcspec.tex b/doc/kadm5/api-funcspec.tex index ecf4d0652..05fb9576c 100644 --- a/doc/kadm5/api-funcspec.tex +++ b/doc/kadm5/api-funcspec.tex @@ -676,9 +676,7 @@ for this connection, to be used in all subsequent API calls. The caller should always specify OVSEC_KADM_STRUCT_VERSION for the struct_version argument, a valid and supported API version constant -for the api_version argument (the version of the API specified in this -document is OVSEC_KADM_API_VERSION_2; currently, the only other valid -API version +for the api_version argument (currently, theonly valid API version constant is OVSEC_KADM_API_VERSION_1), and a valid pointer in which the server handle will be stored. @@ -1114,7 +1112,7 @@ life. \begin{verbatim} ovsec_kadm_ret_t ovsec_kadm_randkey_principal(void *server_handle, krb5_principal princ, - krb5_keyblock **new_key, krb5_kvno *new_kvno) + krb5_keyblock **new_key) \end{verbatim} AUTHORIZATION REQUIRED: modify, or the calling principal being the @@ -1125,9 +1123,6 @@ Generate and assign a new random key to the named principal, and return the generated key in allocated storage. The caller must free the returned krb5_keyblock * with krb5_free_keyblock. -if new_kvno is non-null, the key version number of the new key is -returned in it. - If the principal's POLICY bit is set in aux_attributes and the caller does not have modify privilege , compliance with the password minimum life specified by the policy is verified and an appropriate error code is returned