svn rev #23136: trunk/src/slave/

tlyu@MIT.EDU tlyu at MIT.EDU
Fri Nov 6 14:45:29 EST 2009


http://src.mit.edu/fisheye/changelog/krb5/?cs=23136
Commit By: tlyu
Log Message:
make mark-cstyle; make reindent


Changed Files:
U   trunk/src/slave/kprop.h
U   trunk/src/slave/kpropd_rpc.c
U   trunk/src/slave/kproplog.c
Modified: trunk/src/slave/kprop.h
===================================================================
--- trunk/src/slave/kprop.h	2009-11-06 19:45:25 UTC (rev 23135)
+++ trunk/src/slave/kprop.h	2009-11-06 19:45:29 UTC (rev 23136)
@@ -1,3 +1,4 @@
+/* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */
 /*
  * slave/kprop.h
  *

Modified: trunk/src/slave/kpropd_rpc.c
===================================================================
--- trunk/src/slave/kpropd_rpc.c	2009-11-06 19:45:25 UTC (rev 23135)
+++ trunk/src/slave/kpropd_rpc.c	2009-11-06 19:45:29 UTC (rev 23136)
@@ -1,3 +1,4 @@
+/* -*- mode: c; c-file-style: "bsd"; indent-tabs-mode: t -*- */
 /*
  * Please do not edit this file.
  * It was generated using rpcgen.

Modified: trunk/src/slave/kproplog.c
===================================================================
--- trunk/src/slave/kproplog.c	2009-11-06 19:45:25 UTC (rev 23135)
+++ trunk/src/slave/kproplog.c	2009-11-06 19:45:29 UTC (rev 23136)
@@ -1,3 +1,4 @@
+/* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */
 /*
  * Copyright 2008 Sun Microsystems, Inc.  All rights reserved.
  * Use is subject to license terms.
@@ -3,5 +4,5 @@
  */
 
-/* #pragma ident	"@(#)kproplog.c	1.4	04/03/19 SMI" */
+/* #pragma ident        "@(#)kproplog.c 1.4     04/03/19 SMI" */
 
 /*
@@ -23,13 +24,13 @@
 #define textdomain(X) 0
 #endif
 
-static char	*progname;
+static char     *progname;
 
 static void
 usage()
 {
     (void) fprintf(stderr, _("\nUsage: %s [-h] [-v] [-v] [-e num]\n\n"),
-		   progname);
+                   progname);
     exit(1);
 }
 
@@ -41,35 +42,35 @@
 {
     unsigned int i;
     static char *prflags[] = {
-	"DISALLOW_POSTDATED",     /* 0x00000001 */
-	"DISALLOW_FORWARDABLE",   /* 0x00000002 */
-	"DISALLOW_TGT_BASED",     /* 0x00000004 */
-	"DISALLOW_RENEWABLE",     /* 0x00000008 */
-	"DISALLOW_PROXIABLE",     /* 0x00000010 */
-	"DISALLOW_DUP_SKEY",      /* 0x00000020 */
-	"DISALLOW_ALL_TIX",       /* 0x00000040 */
-	"REQUIRES_PRE_AUTH",      /* 0x00000080 */
-	"REQUIRES_HW_AUTH",       /* 0x00000100 */
-	"REQUIRES_PWCHANGE",      /* 0x00000200 */
-	"UNKNOWN_0x00000400",     /* 0x00000400 */
-	"UNKNOWN_0x00000800",     /* 0x00000800 */
-	"DISALLOW_SVR",           /* 0x00001000 */
-	"PWCHANGE_SERVICE",       /* 0x00002000 */
-	"SUPPORT_DESMD5",         /* 0x00004000 */
-	"NEW_PRINC",              /* 0x00008000 */
-	"UNKNOWN_0x00010000",     /* 0x00010000 */
-	"UNKNOWN_0x00020000",     /* 0x00020000 */
-	"UNKNOWN_0x00040000",     /* 0x00040000 */
-	"UNKNOWN_0x00080000",     /* 0x00080000 */
-	"OK_AS_DELEGATE",         /* 0x00100000 */
-	"OK_TO_AUTH_AS_DELEGATE", /* 0x00200000 */
-	"NO_AUTH_DATA_REQUIRED",  /* 0x00400000 */
+        "DISALLOW_POSTDATED",     /* 0x00000001 */
+        "DISALLOW_FORWARDABLE",   /* 0x00000002 */
+        "DISALLOW_TGT_BASED",     /* 0x00000004 */
+        "DISALLOW_RENEWABLE",     /* 0x00000008 */
+        "DISALLOW_PROXIABLE",     /* 0x00000010 */
+        "DISALLOW_DUP_SKEY",      /* 0x00000020 */
+        "DISALLOW_ALL_TIX",       /* 0x00000040 */
+        "REQUIRES_PRE_AUTH",      /* 0x00000080 */
+        "REQUIRES_HW_AUTH",       /* 0x00000100 */
+        "REQUIRES_PWCHANGE",      /* 0x00000200 */
+        "UNKNOWN_0x00000400",     /* 0x00000400 */
+        "UNKNOWN_0x00000800",     /* 0x00000800 */
+        "DISALLOW_SVR",           /* 0x00001000 */
+        "PWCHANGE_SERVICE",       /* 0x00002000 */
+        "SUPPORT_DESMD5",         /* 0x00004000 */
+        "NEW_PRINC",              /* 0x00008000 */
+        "UNKNOWN_0x00010000",     /* 0x00010000 */
+        "UNKNOWN_0x00020000",     /* 0x00020000 */
+        "UNKNOWN_0x00040000",     /* 0x00040000 */
+        "UNKNOWN_0x00080000",     /* 0x00080000 */
+        "OK_AS_DELEGATE",         /* 0x00100000 */
+        "OK_TO_AUTH_AS_DELEGATE", /* 0x00200000 */
+        "NO_AUTH_DATA_REQUIRED",  /* 0x00400000 */
 
     };
 
     for (i = 0; i < sizeof (prflags) / sizeof (char *); i++) {
-	if (flags & (krb5_flags) 1 << i)
-	    printf("\t\t\t%s\n", prflags[i]);
+        if (flags & (krb5_flags) 1 << i)
+            printf("\t\t\t%s\n", prflags[i]);
     }
 }
 
@@ -80,10 +81,10 @@
 print_time(unsigned int *timep)
 {
     if (*timep == 0L)
-	printf("\t\t\tNone\n");
+        printf("\t\t\tNone\n");
     else {
-	time_t ltime = *timep;
-	printf("\t\t\t%s", ctime(&ltime));
+        time_t ltime = *timep;
+        printf("\t\t\t%s", ctime(&ltime));
     }
 }
 
@@ -100,7 +101,7 @@
 
     (void) printf("\t\t\t%s(%d): 0x", tag, len);
     for (i = 0; i < len; i++) {
-	printf("%02x", (krb5_octet) str->utf8str_t_val[i]);
+        printf("%02x", (krb5_octet) str->utf8str_t_val[i]);
     }
     (void) printf("\n");
 }
@@ -119,8 +120,8 @@
     dis = (char *) malloc(len);
 
     if (!dis) {
-	(void) fprintf(stderr, _("\nCouldn't allocate memory"));
-	exit(1);
+        (void) fprintf(stderr, _("\nCouldn't allocate memory"));
+        exit(1);
     }
 
     (void) snprintf(dis, len, "%s", str->utf8str_t_val);
@@ -158,7 +159,7 @@
 
     for (i = 0; i < len; i++, data++) {
 
-	print_data("princ", data);
+        print_data("princ", data);
     }
 }
 
@@ -176,13 +177,13 @@
     printf("\t\t\tkvno: %d\n", k->k_kvno);
 
     for (i = 0; i < k->k_enctype.k_enctype_len; i++) {
-	printf("\t\t\tenc type: 0x%x\n",
-	       k->k_enctype.k_enctype_val[i]);
+        printf("\t\t\tenc type: 0x%x\n",
+               k->k_enctype.k_enctype_val[i]);
     }
 
     str = k->k_contents.k_contents_val;
     for (i = 0; i < k->k_contents.k_contents_len; i++, str++) {
-	print_hex("key", str);
+        print_hex("key", str);
     }
 }
 
@@ -195,7 +196,7 @@
     unsigned int i;
 
     for (i = 0; i < len; i++, keys++) {
-	print_key(keys);
+        print_key(keys);
     }
 }
 
@@ -213,7 +214,7 @@
 
     printf("\t\t\tvalue(%d): 0x", len);
     for (i = 0; i < len; i++) {
-	printf("%02x", (krb5_octet) tl->tl_data.tl_data_val[i]);
+        printf("%02x", (krb5_octet) tl->tl_data.tl_data_val[i]);
     }
     printf("\n");
 }
@@ -229,7 +230,7 @@
     printf("\t\t\titems: %d\n", len);
 
     for (i = 0; i < len; i++, tldata++) {
-	print_tl(tldata);
+        print_tl(tldata);
     }
 }
 
@@ -242,135 +243,135 @@
 {
     switch (val->av_type) {
     case AT_ATTRFLAGS:
-	(void) printf(_("\t\tAttribute flags\n"));
-	if (vverbose) {
-	    print_flags(val->kdbe_val_t_u.av_attrflags);
-	}
-	break;
+        (void) printf(_("\t\tAttribute flags\n"));
+        if (vverbose) {
+            print_flags(val->kdbe_val_t_u.av_attrflags);
+        }
+        break;
     case AT_MAX_LIFE:
-	(void) printf(_("\t\tMaximum ticket life\n"));
-	if (vverbose) {
-	    print_time(&val->kdbe_val_t_u.av_max_life);
-	}
-	break;
+        (void) printf(_("\t\tMaximum ticket life\n"));
+        if (vverbose) {
+            print_time(&val->kdbe_val_t_u.av_max_life);
+        }
+        break;
     case AT_MAX_RENEW_LIFE:
-	(void) printf(_("\t\tMaximum renewable life\n"));
-	if (vverbose) {
-	    print_time(&val->kdbe_val_t_u.av_max_renew_life);
-	}
-	break;
+        (void) printf(_("\t\tMaximum renewable life\n"));
+        if (vverbose) {
+            print_time(&val->kdbe_val_t_u.av_max_renew_life);
+        }
+        break;
     case AT_EXP:
-	(void) printf(_("\t\tPrincipal expiration\n"));
-	if (vverbose) {
-	    print_time(&val->kdbe_val_t_u.av_exp);
-	}
-	break;
+        (void) printf(_("\t\tPrincipal expiration\n"));
+        if (vverbose) {
+            print_time(&val->kdbe_val_t_u.av_exp);
+        }
+        break;
     case AT_PW_EXP:
-	(void) printf(_("\t\tPassword expiration\n"));
-	if (vverbose) {
-	    print_time(&val->kdbe_val_t_u.av_pw_exp);
-	}
-	break;
+        (void) printf(_("\t\tPassword expiration\n"));
+        if (vverbose) {
+            print_time(&val->kdbe_val_t_u.av_pw_exp);
+        }
+        break;
     case AT_LAST_SUCCESS:
-	(void) printf(_("\t\tLast successful auth\n"));
-	if (vverbose) {
-	    print_time(&val->kdbe_val_t_u.av_last_success);
-	}
-	break;
+        (void) printf(_("\t\tLast successful auth\n"));
+        if (vverbose) {
+            print_time(&val->kdbe_val_t_u.av_last_success);
+        }
+        break;
     case AT_LAST_FAILED:
-	(void) printf(_("\t\tLast failed auth\n"));
-	if (vverbose) {
-	    print_time(&val->kdbe_val_t_u.av_last_failed);
-	}
-	break;
+        (void) printf(_("\t\tLast failed auth\n"));
+        if (vverbose) {
+            print_time(&val->kdbe_val_t_u.av_last_failed);
+        }
+        break;
     case AT_FAIL_AUTH_COUNT:
-	(void) printf(_("\t\tFailed passwd attempt\n"));
-	if (vverbose) {
-	    (void) printf("\t\t\t%d\n",
-			  val->kdbe_val_t_u.av_fail_auth_count);
-	}
-	break;
+        (void) printf(_("\t\tFailed passwd attempt\n"));
+        if (vverbose) {
+            (void) printf("\t\t\t%d\n",
+                          val->kdbe_val_t_u.av_fail_auth_count);
+        }
+        break;
     case AT_PRINC:
-	(void) printf(_("\t\tPrincipal\n"));
-	if (vverbose) {
-	    print_princ(&val->kdbe_val_t_u.av_princ);
-	}
-	break;
+        (void) printf(_("\t\tPrincipal\n"));
+        if (vverbose) {
+            print_princ(&val->kdbe_val_t_u.av_princ);
+        }
+        break;
     case AT_KEYDATA:
-	(void) printf(_("\t\tKey data\n"));
-	if (vverbose) {
-	    print_keydata(
-		val->kdbe_val_t_u.av_keydata.av_keydata_val,
-		val->kdbe_val_t_u.av_keydata.av_keydata_len);
-	}
-	break;
+        (void) printf(_("\t\tKey data\n"));
+        if (vverbose) {
+            print_keydata(
+                val->kdbe_val_t_u.av_keydata.av_keydata_val,
+                val->kdbe_val_t_u.av_keydata.av_keydata_len);
+        }
+        break;
     case AT_TL_DATA:
-	(void) printf(_("\t\tTL data\n"));
-	if (vverbose) {
-	    print_tldata(
-		val->kdbe_val_t_u.av_tldata.av_tldata_val,
-		val->kdbe_val_t_u.av_tldata.av_tldata_len);
-	}
-	break;
+        (void) printf(_("\t\tTL data\n"));
+        if (vverbose) {
+            print_tldata(
+                val->kdbe_val_t_u.av_tldata.av_tldata_val,
+                val->kdbe_val_t_u.av_tldata.av_tldata_len);
+        }
+        break;
     case AT_LEN:
-	(void) printf(_("\t\tLength\n"));
-	if (vverbose) {
-	    (void) printf("\t\t\t%d\n",
-			  val->kdbe_val_t_u.av_len);
-	}
-	break;
+        (void) printf(_("\t\tLength\n"));
+        if (vverbose) {
+            (void) printf("\t\t\t%d\n",
+                          val->kdbe_val_t_u.av_len);
+        }
+        break;
     case AT_PW_LAST_CHANGE:
-	(void) printf(_("\t\tPassword last changed\n"));
-	if (vverbose) {
-	    print_time(&val->kdbe_val_t_u.av_pw_last_change);
-	}
-	break;
+        (void) printf(_("\t\tPassword last changed\n"));
+        if (vverbose) {
+            print_time(&val->kdbe_val_t_u.av_pw_last_change);
+        }
+        break;
     case AT_MOD_PRINC:
-	(void) printf(_("\t\tModifying principal\n"));
-	if (vverbose) {
-	    print_princ(&val->kdbe_val_t_u.av_mod_princ);
-	}
-	break;
+        (void) printf(_("\t\tModifying principal\n"));
+        if (vverbose) {
+            print_princ(&val->kdbe_val_t_u.av_mod_princ);
+        }
+        break;
     case AT_MOD_TIME:
-	(void) printf(_("\t\tModification time\n"));
-	if (vverbose) {
-	    print_time(&val->kdbe_val_t_u.av_mod_time);
-	}
-	break;
+        (void) printf(_("\t\tModification time\n"));
+        if (vverbose) {
+            print_time(&val->kdbe_val_t_u.av_mod_time);
+        }
+        break;
     case AT_MOD_WHERE:
-	(void) printf(_("\t\tModified where\n"));
-	if (vverbose) {
-	    print_str("where",
-		      &val->kdbe_val_t_u.av_mod_where);
-	}
-	break;
+        (void) printf(_("\t\tModified where\n"));
+        if (vverbose) {
+            print_str("where",
+                      &val->kdbe_val_t_u.av_mod_where);
+        }
+        break;
     case AT_PW_POLICY:
-	(void) printf(_("\t\tPassword policy\n"));
-	if (vverbose) {
-	    print_str("policy",
-		      &val->kdbe_val_t_u.av_pw_policy);
-	}
-	break;
+        (void) printf(_("\t\tPassword policy\n"));
+        if (vverbose) {
+            print_str("policy",
+                      &val->kdbe_val_t_u.av_pw_policy);
+        }
+        break;
     case AT_PW_POLICY_SWITCH:
-	(void) printf(_("\t\tPassword policy switch\n"));
-	if (vverbose) {
-	    (void) printf("\t\t\t%d\n",
-			  val->kdbe_val_t_u.av_pw_policy_switch);
-	}
-	break;
+        (void) printf(_("\t\tPassword policy switch\n"));
+        if (vverbose) {
+            (void) printf("\t\t\t%d\n",
+                          val->kdbe_val_t_u.av_pw_policy_switch);
+        }
+        break;
     case AT_PW_HIST_KVNO:
-	(void) printf(_("\t\tPassword history KVNO\n"));
-	if (vverbose) {
-	    (void) printf("\t\t\t%d\n",
-			  val->kdbe_val_t_u.av_pw_hist_kvno);
-	}
-	break;
+        (void) printf(_("\t\tPassword history KVNO\n"));
+        if (vverbose) {
+            (void) printf("\t\t\t%d\n",
+                          val->kdbe_val_t_u.av_pw_hist_kvno);
+        }
+        break;
     case AT_PW_HIST:
-	(void) printf(_("\t\tPassword history\n"));
-	if (vverbose) {
-	    (void) printf("\t\t\tPW history elided\n");
-	}
-	break;
+        (void) printf(_("\t\tPassword history\n"));
+        if (vverbose) {
+            (void) printf("\t\t\tPW history elided\n");
+        }
+        break;
     } /* switch */
 
 }
@@ -380,104 +381,104 @@
 static void
 print_update(kdb_hlog_t *ulog, uint32_t entry, unsigned int verbose)
 {
-    XDR			xdrs;
-    uint32_t		start_sno, i, j, indx;
-    char		*dbprinc;
-    kdb_ent_header_t	*indx_log;
-    kdb_incr_update_t	upd;
+    XDR                 xdrs;
+    uint32_t            start_sno, i, j, indx;
+    char                *dbprinc;
+    kdb_ent_header_t    *indx_log;
+    kdb_incr_update_t   upd;
 
     if (entry && (entry < ulog->kdb_num))
-	start_sno = ulog->kdb_last_sno - entry;
+        start_sno = ulog->kdb_last_sno - entry;
     else
-	start_sno = ulog->kdb_first_sno - 1;
+        start_sno = ulog->kdb_first_sno - 1;
 
     for (i = start_sno; i < ulog->kdb_last_sno; i++) {
-	indx = i % ulog->kdb_num;
+        indx = i % ulog->kdb_num;
 
-	indx_log = (kdb_ent_header_t *)INDEX(ulog, indx);
+        indx_log = (kdb_ent_header_t *)INDEX(ulog, indx);
 
-	/*
-	 * Check for corrupt update entry
-	 */
-	if (indx_log->kdb_umagic != KDB_ULOG_MAGIC) {
-	    (void) fprintf(stderr,
-			   _("Corrupt update entry\n\n"));
-	    exit(1);
-	}
+        /*
+         * Check for corrupt update entry
+         */
+        if (indx_log->kdb_umagic != KDB_ULOG_MAGIC) {
+            (void) fprintf(stderr,
+                           _("Corrupt update entry\n\n"));
+            exit(1);
+        }
 
-	(void) memset(&upd, 0, sizeof (kdb_incr_update_t));
-	xdrmem_create(&xdrs, (char *)indx_log->entry_data,
-		      indx_log->kdb_entry_size, XDR_DECODE);
-	if (!xdr_kdb_incr_update_t(&xdrs, &upd)) {
-	    (void) printf(_("Entry data decode failure\n\n"));
-	    exit(1);
-	}
+        (void) memset(&upd, 0, sizeof (kdb_incr_update_t));
+        xdrmem_create(&xdrs, (char *)indx_log->entry_data,
+                      indx_log->kdb_entry_size, XDR_DECODE);
+        if (!xdr_kdb_incr_update_t(&xdrs, &upd)) {
+            (void) printf(_("Entry data decode failure\n\n"));
+            exit(1);
+        }
 
-	(void) printf("---\n");
-	(void) printf(_("Update Entry\n"));
+        (void) printf("---\n");
+        (void) printf(_("Update Entry\n"));
 
-	(void) printf(_("\tUpdate serial # : %u\n"),
-		      indx_log->kdb_entry_sno);
+        (void) printf(_("\tUpdate serial # : %u\n"),
+                      indx_log->kdb_entry_sno);
 
-	(void) printf(_("\tUpdate operation : "));
-	if (upd.kdb_deleted)
-	    (void) printf(_("Delete\n"));
-	else
-	    (void) printf(_("Add\n"));
+        (void) printf(_("\tUpdate operation : "));
+        if (upd.kdb_deleted)
+            (void) printf(_("Delete\n"));
+        else
+            (void) printf(_("Add\n"));
 
-	dbprinc = malloc(upd.kdb_princ_name.utf8str_t_len + 1);
-	if (dbprinc == NULL) {
-	    (void) printf(_("Could not allocate "
-			    "principal name\n\n"));
-	    exit(1);
-	}
-	(void) strncpy(dbprinc, upd.kdb_princ_name.utf8str_t_val,
-		       upd.kdb_princ_name.utf8str_t_len);
-	dbprinc[upd.kdb_princ_name.utf8str_t_len] = 0;
-	(void) printf(_("\tUpdate principal : %s\n"), dbprinc);
+        dbprinc = malloc(upd.kdb_princ_name.utf8str_t_len + 1);
+        if (dbprinc == NULL) {
+            (void) printf(_("Could not allocate "
+                            "principal name\n\n"));
+            exit(1);
+        }
+        (void) strncpy(dbprinc, upd.kdb_princ_name.utf8str_t_val,
+                       upd.kdb_princ_name.utf8str_t_len);
+        dbprinc[upd.kdb_princ_name.utf8str_t_len] = 0;
+        (void) printf(_("\tUpdate principal : %s\n"), dbprinc);
 
-	(void) printf(_("\tUpdate size : %u\n"),
-		      indx_log->kdb_entry_size);
+        (void) printf(_("\tUpdate size : %u\n"),
+                      indx_log->kdb_entry_size);
 
-	(void) printf(_("\tUpdate committed : %s\n"),
-		      indx_log->kdb_commit ? "True" : "False");
+        (void) printf(_("\tUpdate committed : %s\n"),
+                      indx_log->kdb_commit ? "True" : "False");
 
-	if (indx_log->kdb_time.seconds == 0L)
-	    (void) printf(_("\tUpdate time stamp : None\n"));
-	else
-	    (void) printf(_("\tUpdate time stamp : %s"),
-			  ctime((time_t *)&(indx_log->kdb_time.seconds)));
+        if (indx_log->kdb_time.seconds == 0L)
+            (void) printf(_("\tUpdate time stamp : None\n"));
+        else
+            (void) printf(_("\tUpdate time stamp : %s"),
+                          ctime((time_t *)&(indx_log->kdb_time.seconds)));
 
-	(void) printf(_("\tAttributes changed : %d\n"),
-		      upd.kdb_update.kdbe_t_len);
+        (void) printf(_("\tAttributes changed : %d\n"),
+                      upd.kdb_update.kdbe_t_len);
 
-	if (verbose)
-	    for (j = 0; j < upd.kdb_update.kdbe_t_len; j++)
-		print_attr(&upd.kdb_update.kdbe_t_val[j],
-			   verbose > 1 ? 1 : 0);
+        if (verbose)
+            for (j = 0; j < upd.kdb_update.kdbe_t_len; j++)
+                print_attr(&upd.kdb_update.kdbe_t_val[j],
+                           verbose > 1 ? 1 : 0);
 
-	xdr_free(xdr_kdb_incr_update_t, (char *)&upd);
-	free(dbprinc);
+        xdr_free(xdr_kdb_incr_update_t, (char *)&upd);
+        free(dbprinc);
     } /* for */
 }
 
 int
 main(int argc, char **argv)
 {
-    int			c;
-    unsigned int	verbose = 0;
-    bool_t		headeronly = FALSE;
-    uint32_t		entry = 0;
-    krb5_context	context;
-    kadm5_config_params	params;
-    kdb_log_context	*log_ctx;
-    kdb_hlog_t		*ulog = NULL;
-    char		**db_args = NULL; /* XXX */
+    int                 c;
+    unsigned int        verbose = 0;
+    bool_t              headeronly = FALSE;
+    uint32_t            entry = 0;
+    krb5_context        context;
+    kadm5_config_params params;
+    kdb_log_context     *log_ctx;
+    kdb_hlog_t          *ulog = NULL;
+    char                **db_args = NULL; /* XXX */
 
     (void) setlocale(LC_ALL, "");
 
 #if !defined(TEXT_DOMAIN)
-#define	TEXT_DOMAIN "SYS_TEST"
+#define TEXT_DOMAIN "SYS_TEST"
 #endif /* TEXT_DOMAIN */
 
     (void) textdomain(TEXT_DOMAIN);
@@ -485,57 +486,57 @@
     progname = argv[0];
 
     while ((c = getopt(argc, argv, "vhe:")) != -1) {
-	switch (c) {
-	case 'h':
-	    headeronly = TRUE;
-	    break;
-	case 'e':
-	    entry = atoi(optarg);
-	    break;
-	case 'v':
-	    verbose++;
-	    break;
-	default:
-	    usage();
-	}
+        switch (c) {
+        case 'h':
+            headeronly = TRUE;
+            break;
+        case 'e':
+            entry = atoi(optarg);
+            break;
+        case 'v':
+            verbose++;
+            break;
+        default:
+            usage();
+        }
     }
 
     if (krb5_init_context(&context)) {
-	(void) fprintf(stderr,
-		       _("Unable to initialize Kerberos\n\n"));
-	exit(1);
+        (void) fprintf(stderr,
+                       _("Unable to initialize Kerberos\n\n"));
+        exit(1);
     }
 
     (void) memset(&params, 0, sizeof (params));
 
     if (kadm5_get_config_params(context, 1, &params, &params)) {
-	(void) fprintf(stderr,
-		       _("Couldn't read database_name\n\n"));
-	exit(1);
+        (void) fprintf(stderr,
+                       _("Couldn't read database_name\n\n"));
+        exit(1);
     }
 
     (void) printf(_("\nKerberos update log (%s)\n"),
-		  params.iprop_logfile);
+                  params.iprop_logfile);
 
     if (ulog_map(context, params.iprop_logfile, 0, FKPROPLOG, db_args)) {
-	(void) fprintf(stderr, _("Unable to map log file %s\n\n"),
-		       params.iprop_logfile);
-	exit(1);
+        (void) fprintf(stderr, _("Unable to map log file %s\n\n"),
+                       params.iprop_logfile);
+        exit(1);
     }
 
     log_ctx = context->kdblog_context;
     if (log_ctx)
-	ulog = log_ctx->ulog;
+        ulog = log_ctx->ulog;
     else {
-	(void) fprintf(stderr, _("Unable to map log file %s\n\n"),
-		       params.iprop_logfile);
-	exit(1);
+        (void) fprintf(stderr, _("Unable to map log file %s\n\n"),
+                       params.iprop_logfile);
+        exit(1);
     }
 
     if (ulog->kdb_hmagic != KDB_ULOG_HDR_MAGIC) {
-	(void) fprintf(stderr,
-		       _("Corrupt header log, exiting\n\n"));
-	exit(1);
+        (void) fprintf(stderr,
+                       _("Corrupt header log, exiting\n\n"));
+        exit(1);
     }
 
     (void) printf(_("Update log dump :\n"));
@@ -543,53 +544,53 @@
     (void) printf(_("\tLog state : "));
     switch (ulog->kdb_state) {
     case KDB_STABLE:
-	(void) printf(_("Stable\n"));
-	break;
+        (void) printf(_("Stable\n"));
+        break;
     case KDB_UNSTABLE:
-	(void) printf(_("Unstable\n"));
-	break;
+        (void) printf(_("Unstable\n"));
+        break;
     case KDB_CORRUPT:
-	(void) printf(_("Corrupt\n"));
-	break;
+        (void) printf(_("Corrupt\n"));
+        break;
     default:
-	(void) printf(_("Unknown state: %d\n"),
-		      ulog->kdb_state);
-	break;
+        (void) printf(_("Unknown state: %d\n"),
+                      ulog->kdb_state);
+        break;
     }
     (void) printf(_("\tEntry block size : %u\n"), ulog->kdb_block);
     (void) printf(_("\tNumber of entries : %u\n"), ulog->kdb_num);
 
     if (ulog->kdb_last_sno == 0)
-	(void) printf(_("\tLast serial # : None\n"));
+        (void) printf(_("\tLast serial # : None\n"));
     else {
-	if (ulog->kdb_first_sno == 0)
-	    (void) printf(_("\tFirst serial # : None\n"));
-	else {
-	    (void) printf(_("\tFirst serial # : "));
-	    (void) printf("%u\n", ulog->kdb_first_sno);
-	}
+        if (ulog->kdb_first_sno == 0)
+            (void) printf(_("\tFirst serial # : None\n"));
+        else {
+            (void) printf(_("\tFirst serial # : "));
+            (void) printf("%u\n", ulog->kdb_first_sno);
+        }
 
-	(void) printf(_("\tLast serial # : "));
-	(void) printf("%u\n", ulog->kdb_last_sno);
+        (void) printf(_("\tLast serial # : "));
+        (void) printf("%u\n", ulog->kdb_last_sno);
     }
 
     if (ulog->kdb_last_time.seconds == 0L) {
-	(void) printf(_("\tLast time stamp : None\n"));
+        (void) printf(_("\tLast time stamp : None\n"));
     } else {
-	if (ulog->kdb_first_time.seconds == 0L)
-	    (void) printf(_("\tFirst time stamp : None\n"));
-	else {
-	    (void) printf(_("\tFirst time stamp : %s"),
-			  ctime((time_t *)
-				&(ulog->kdb_first_time.seconds)));
-	}
+        if (ulog->kdb_first_time.seconds == 0L)
+            (void) printf(_("\tFirst time stamp : None\n"));
+        else {
+            (void) printf(_("\tFirst time stamp : %s"),
+                          ctime((time_t *)
+                                &(ulog->kdb_first_time.seconds)));
+        }
 
-	(void) printf(_("\tLast time stamp : %s\n"),
-		      ctime((time_t *)&(ulog->kdb_last_time.seconds)));
+        (void) printf(_("\tLast time stamp : %s\n"),
+                      ctime((time_t *)&(ulog->kdb_last_time.seconds)));
     }
 
     if ((!headeronly) && ulog->kdb_num) {
-	print_update(ulog, entry, verbose);
+        print_update(ulog, entry, verbose);
     }
 
     (void) printf("\n");




More information about the cvs-krb5 mailing list