krb5 commit: Replace "First introduced" with concise "New"
Zhanna A Tsitkova
tsitkova at MIT.EDU
Mon Mar 25 15:29:51 EDT 2013
https://github.com/krb5/krb5/commit/18d52ef70d7f518d78263f475b9ffad87f2c91e7
commit 18d52ef70d7f518d78263f475b9ffad87f2c91e7
Author: Zhanna Tsitkov <tsitkova at mit.edu>
Date: Mon Mar 25 15:18:53 2013 -0400
Replace "First introduced" with concise "New"
doc/admin/admin_commands/kadmin_local.rst | 3 +-
doc/admin/admin_commands/kadmind.rst | 2 +-
doc/admin/admin_commands/krb5kdc.rst | 3 +-
doc/admin/conf_files/kdc_conf.rst | 7 +--
doc/admin/conf_files/krb5_conf.rst | 8 ++--
src/include/krb5/krb5.hin | 74 ++++++++++++++--------------
6 files changed, 47 insertions(+), 50 deletions(-)
diff --git a/doc/admin/admin_commands/kadmin_local.rst b/doc/admin/admin_commands/kadmin_local.rst
index e9acb53..3072eec 100644
--- a/doc/admin/admin_commands/kadmin_local.rst
+++ b/doc/admin/admin_commands/kadmin_local.rst
@@ -161,8 +161,7 @@ OPTIONS
**-x debug=**\ *level*
sets the OpenLDAP client library debug level. *level* is an
integer to be interpreted by the library. Debugging messages
- are printed to standard error. First introduced in release
- 1.12.
+ are printed to standard error. New in release 1.12.
.. _kadmin_options_end:
diff --git a/doc/admin/admin_commands/kadmind.rst b/doc/admin/admin_commands/kadmind.rst
index 28268fa..09efd22 100644
--- a/doc/admin/admin_commands/kadmind.rst
+++ b/doc/admin/admin_commands/kadmind.rst
@@ -128,7 +128,7 @@ OPTIONS
an integer to be interpreted by the library. Debugging
messages are printed to standard error, so this option
must be used with the **-nofork** option to be useful.
- First introduced in release 1.12.
+ New in release 1.12.
SEE ALSO
--------
diff --git a/doc/admin/admin_commands/krb5kdc.rst b/doc/admin/admin_commands/krb5kdc.rst
index 6e47c69..21a18ae 100644
--- a/doc/admin/admin_commands/krb5kdc.rst
+++ b/doc/admin/admin_commands/krb5kdc.rst
@@ -106,8 +106,7 @@ Options supported for the LDAP database module are:
sets the OpenLDAP client library debug level. *level* is an
integer to be interpreted by the library. Debugging messages
are printed to standard error, so this option must be used
- with the **-n** option to be useful. First introduced in
- release 1.12.
+ with the **-n** option to be useful. New in release 1.12.
The **-T** *offset* option specifies a time offset, in seconds, which
the KDC will operate under. It is intended only for testing purposes.
diff --git a/doc/admin/conf_files/kdc_conf.rst b/doc/admin/conf_files/kdc_conf.rst
index c10e81e..79599ee 100644
--- a/doc/admin/conf_files/kdc_conf.rst
+++ b/doc/admin/conf_files/kdc_conf.rst
@@ -210,7 +210,7 @@ For each realm, the following tags may be specified:
(Delta time string.) Specifies the amount of time to wait for a
full propagation to complete. This is optional in configuration
files, and is used by slave KDCs only. The default value is 5
- minutes (``5m``). First introduced in release 1.11.
+ minutes (``5m``). New in release 1.11.
**iprop_logfile**
(File name.) Specifies where the update log file for the realm
@@ -282,8 +282,7 @@ For each realm, the following tags may be specified:
principals support des-cbc-crc for session key enctype negotiation
purposes. If **allow_weak_crypto** in :ref:`libdefaults` is
false, or if des-cbc-crc is not a permitted enctype, then this
- variable has no effect. Defaults to true.
- First introduced in release 1.11.
+ variable has no effect. Defaults to true. New in release 1.11.
**reject_bad_transit**
(Boolean value.) If set to true, the KDC will check the list of
@@ -312,7 +311,7 @@ For each realm, the following tags may be specified:
than the realm's ticket-granting service. This option allows
anonymous PKINIT to be enabled for use as FAST armor tickets
without allowing anonymous authentication to services. The
- default value is false. First introduced in release 1.9.
+ default value is false. New in release 1.9.
**supported_enctypes**
(List of *key*:*salt* strings.) Specifies the default key/salt
diff --git a/doc/admin/conf_files/krb5_conf.rst b/doc/admin/conf_files/krb5_conf.rst
index e326cf3..f2f22af 100644
--- a/doc/admin/conf_files/krb5_conf.rst
+++ b/doc/admin/conf_files/krb5_conf.rst
@@ -137,13 +137,13 @@ The libdefaults section may contain any of the following relations:
**default_ccache_name**
This relation specifies the name of the default credential cache.
The default is |ccache|. This relation is subject to parameter
- expansion (see below). First introduced in release 1.11.
+ expansion (see below). New in release 1.11.
**default_client_keytab_name**
This relation specifies the name of the default keytab for
obtaining client credentials. The default is |ckeytab|. This
relation is subject to parameter expansion (see below).
- First introduced in release 1.11.
+ New in release 1.11.
**default_keytab_name**
This relation specifies the default keytab name to be used by
@@ -220,7 +220,7 @@ The libdefaults section may contain any of the following relations:
(if given). This option can improve the administrative
flexibility of server applications on multihomed hosts, but could
compromise the security of virtual hosting environments. The
- default value is false. First introduced in release 1.10.
+ default value is false. New in release 1.10.
**k5login_authoritative**
If this flag is true, principals must be listed in a local user's
@@ -636,7 +636,7 @@ modules and to turn modules on and off. Not every krb5 pluggable
interface uses the [plugins] section; the ones that do are documented
here.
-First introduced in release 1.9.
+New in release 1.9.
Each pluggable interface corresponds to a subsection of [plugins].
All subsections support the same tags:
diff --git a/src/include/krb5/krb5.hin b/src/include/krb5/krb5.hin
index e95d029..e0c6f12 100644
--- a/src/include/krb5/krb5.hin
+++ b/src/include/krb5/krb5.hin
@@ -2275,7 +2275,7 @@ krb5_cc_get_name(krb5_context context, krb5_ccache cache);
*
* Use krb5_free_string() to free @a fullname_out when it is no longer needed.
*
- * @version First introduced in 1.10
+ * @version New in 1.10
*/
krb5_error_code KRB5_CALLCONV
krb5_cc_get_full_name(krb5_context context, krb5_ccache cache,
@@ -2646,7 +2646,7 @@ krb5_cccol_cursor_free(krb5_context context, krb5_cccol_cursor *cursor);
*
* @param [in] context Library context
*
- * @version First introduced in 1.11
+ * @version New in 1.11
*
* @retval 0 Credentials are available in the collection
* @retval KRB5_CC_NOTFOUND The collection contains no credentials
@@ -2901,7 +2901,7 @@ krb5_kt_end_seq_get(krb5_context context, krb5_keytab keytab,
* @param [in] context Library context
* @param [in] keytab Key table handle
*
- * @version First introduced in 1.11
+ * @version New in 1.11
*
* @retval 0 Keytab exists and contains entries
* @retval KRB5_KT_NOTFOUND Keytab does not contain entries
@@ -3896,7 +3896,7 @@ krb5_copy_authdata(krb5_context context,
* found in either list. Use krb5_free_authdata() to free @a results when it
* is no longer needed.
*
- * @version First introduced in 1.10
+ * @version New in 1.10
*/
krb5_error_code KRB5_CALLCONV
krb5_find_authdata(krb5_context context, krb5_authdata *const *ticket_authdata,
@@ -4233,7 +4233,7 @@ krb5_kt_default(krb5_context context, krb5_keytab *id);
*
* Fill @a keytab_out with a handle to the default client key table.
*
- * @version First introduced in 1.11
+ * @version New in 1.11
*
* @retval
* 0 Success
@@ -4499,7 +4499,7 @@ krb5_cc_switch(krb5_context context, krb5_ccache cache);
* @param [in] context Library context
* @param [in] type Credential cache type
*
- * @version First introduced in 1.10
+ * @version New in 1.10
*
* @retval TRUE if @a type supports switching
* @retval FALSE if it does not or is not a valid credential cache type.
@@ -4522,7 +4522,7 @@ krb5_cc_support_switch(krb5_context context, const char *type);
*
* @sa krb5_cccol_cursor_new
*
- * @version First introduced in 1.10
+ * @version New in 1.10
*/
krb5_error_code KRB5_CALLCONV
krb5_cc_cache_match(krb5_context context, krb5_principal client,
@@ -4560,7 +4560,7 @@ krb5_cc_cache_match(krb5_context context, krb5_principal client,
* Any other error code indicates a fatal error in the processing of a cache
* selection mechanism.
*
- * @version First introduced in 1.10
+ * @version New in 1.10
*/
krb5_error_code KRB5_CALLCONV
krb5_cc_select(krb5_context context, krb5_principal server,
@@ -4753,7 +4753,7 @@ krb5_free_unparsed_name(krb5_context context, char *val);
* @param [in] context Library context
* @param [in] val String to be freed
*
- * @version First introduced in 1.10
+ * @version New in 1.10
*/
void KRB5_CALLCONV
krb5_free_string(krb5_context context, char *val);
@@ -4764,7 +4764,7 @@ krb5_free_string(krb5_context context, char *val);
* @param [in] context Library context
* @param [in] val Array of enctypes to be freed
*
- * @version First introduced in 1.12
+ * @version New in 1.12
*/
void KRB5_CALLCONV
krb5_free_enctypes(krb5_context context, krb5_enctype *val);
@@ -4826,7 +4826,7 @@ krb5_timeofday(krb5_context context, register krb5_timestamp *timeret);
* This function checks if @a date is close enough to the current time
* according to the configured allowable clock skew.
*
- * @version First introduced in 1.10
+ * @version New in 1.10
*
* @retval 0 Success
* @retval KRB5KRB_AP_ERR_SKEW @a date is not within allowable clock skew
@@ -5067,7 +5067,7 @@ krb5_set_password_using_ccache(krb5_context context, krb5_ccache ccache,
* @return
* Kerberos error codes
*
- * @version First introduced in 1.11
+ * @version New in 1.11
*/
krb5_error_code KRB5_CALLCONV
krb5_chpw_message(krb5_context context, const krb5_data *server_string,
@@ -5805,7 +5805,7 @@ krb5_auth_con_setsendsubkey(krb5_context ctx, krb5_auth_context ac,
* This function sets the send subkey in @a ac to @a key, incrementing its
* reference count.
*
- * @version First introduced in 1.9
+ * @version New in 1.9
*
* @retval 0 Success; otherwise - Kerberos error codes
*/
@@ -5837,7 +5837,7 @@ krb5_auth_con_setrecvsubkey(krb5_context ctx, krb5_auth_context ac,
* This function sets the receiving subkey in @a ac to @a key, incrementing its
* reference count.
*
- * @version First introduced in 1.9
+ * @version New in 1.9
*
* @retval 0 Success; otherwise - Kerberos error codes
*/
@@ -6248,7 +6248,7 @@ krb5_enctype_to_string(krb5_enctype enctype, char *buffer, size_t buflen);
* (like "aes128-cts-hmac-sha1-96"). If @a shortest is TRUE, it return the
* enctype's shortest alias (like "aes128-cts").
*
- * @version First introduced in 1.9
+ * @version New in 1.9
*
* @retval 0 Success; otherwise - Kerberos error codes
*/
@@ -6383,7 +6383,7 @@ krb5_prompter_posix(krb5_context context, void *data, const char *name,
* This question is asked when the long-term password is needed. It has no
* challenge and the response is simply the password string.
*
- * @version First introduced in 1.11
+ * @version New in 1.11
*/
#define KRB5_RESPONDER_QUESTION_PASSWORD "password"
@@ -6420,7 +6420,7 @@ krb5_prompter_posix(krb5_context context, void *data, const char *name,
*
* For more detail, please see RFC 6560.
*
- * @version First introduced in 1.11
+ * @version New in 1.11
*/
#define KRB5_RESPONDER_QUESTION_OTP "otp"
@@ -6468,7 +6468,7 @@ krb5_prompter_posix(krb5_context context, void *data, const char *name,
* krb5_responder_set_answer(). The form of a question's challenge and
* answer depend on the question name.
*
- * @version First introduced in 1.11
+ * @version New in 1.11
*/
typedef struct krb5_responder_context_st *krb5_responder_context;
@@ -6484,7 +6484,7 @@ typedef struct krb5_responder_context_st *krb5_responder_context;
* question's challenge can be retrieved using krb5_responder_get_challenge()
* and answered using krb5_responder_set_answer().
*
- * @version First introduced in 1.11
+ * @version New in 1.11
*/
const char * const * KRB5_CALLCONV
krb5_responder_list_questions(krb5_context ctx, krb5_responder_context rctx);
@@ -6503,7 +6503,7 @@ krb5_responder_list_questions(krb5_context ctx, krb5_responder_context rctx);
* as the lifetime of @a rctx, and should not be modified or freed by the
* caller.
*
- * @version First introduced in 1.11
+ * @version New in 1.11
*/
const char * KRB5_CALLCONV
krb5_responder_get_challenge(krb5_context ctx, krb5_responder_context rctx,
@@ -6522,7 +6522,7 @@ krb5_responder_get_challenge(krb5_context ctx, krb5_responder_context rctx,
*
* @retval EINVAL @a question is not present within @a rctx
*
- * @version First introduced in 1.11
+ * @version New in 1.11
*/
krb5_error_code KRB5_CALLCONV
krb5_responder_set_answer(krb5_context ctx, krb5_responder_context rctx,
@@ -6582,7 +6582,7 @@ typedef struct _krb5_responder_otp_challenge {
* @param [in] rctx Responder context
* @param [out] chl Challenge structure
*
- * @version First introduced in 1.11
+ * @version New in 1.11
*/
krb5_error_code KRB5_CALLCONV
krb5_responder_otp_get_challenge(krb5_context ctx,
@@ -6598,7 +6598,7 @@ krb5_responder_otp_get_challenge(krb5_context ctx,
* @param [in] value The value to set, or NULL for none
* @param [in] pin The pin to set, or NULL for none
*
- * @version First introduced in 1.11
+ * @version New in 1.11
*/
krb5_error_code KRB5_CALLCONV
krb5_responder_otp_set_answer(krb5_context ctx, krb5_responder_context rctx,
@@ -6611,7 +6611,7 @@ krb5_responder_otp_set_answer(krb5_context ctx, krb5_responder_context rctx,
* @param [in] rctx Responder context
* @param [in] chl The challenge to free
*
- * @version First introduced in 1.11
+ * @version New in 1.11
*/
void KRB5_CALLCONV
krb5_responder_otp_challenge_free(krb5_context ctx,
@@ -6864,7 +6864,7 @@ krb5_get_init_creds_opt_set_fast_ccache_name(krb5_context context,
* This function is similar to krb5_get_init_creds_opt_set_fast_ccache_name(),
* but uses a credential cache handle instead of a name.
*
- * @version First introduced in 1.9
+ * @version New in 1.9
*/
krb5_error_code KRB5_CALLCONV
krb5_get_init_creds_opt_set_fast_ccache(krb5_context context,
@@ -6885,7 +6885,7 @@ krb5_get_init_creds_opt_set_fast_ccache(krb5_context context,
* sensitive choices) as the previous authentication attempt, which stored
* information in the passed-in ccache.
*
- * @version First introduced in 1.11
+ * @version New in 1.11
*/
krb5_error_code KRB5_CALLCONV
krb5_get_init_creds_opt_set_in_ccache(krb5_context context,
@@ -6989,7 +6989,7 @@ typedef void
* krb5_get_init_creds_password() not to send password expiry warnings to the
* prompter, as it ordinarily may.
*
- * @version First introduced in 1.9
+ * @version New in 1.9
*/
krb5_error_code KRB5_CALLCONV
krb5_get_init_creds_opt_set_expire_callback(krb5_context context,
@@ -7005,7 +7005,7 @@ krb5_get_init_creds_opt_set_expire_callback(krb5_context context,
* @param [in] responder Responder function
* @param [in] data Responder data argument
*
- * @version First introduced in 1.11
+ * @version New in 1.11
*/
krb5_error_code KRB5_CALLCONV
krb5_get_init_creds_opt_set_responder(krb5_context context,
@@ -7266,7 +7266,7 @@ typedef struct _krb5_tkt_creds_context *krb5_tkt_creds_context;
*
* Use krb5_tkt_creds_free() to free @a ctx when it is no longer needed.
*
- * @version First introduced in 1.9
+ * @version New in 1.9
*
* @retval 0 Success; otherwise - Kerberos error codes
*/
@@ -7285,7 +7285,7 @@ krb5_tkt_creds_init(krb5_context context, krb5_ccache ccache,
* krb5_tkt_creds_init(). On successful return, the credentials can be
* retrieved with krb5_tkt_creds_get_creds().
*
- * @version First introduced in 1.9
+ * @version New in 1.9
*
* @retval 0 Success; otherwise - Kerberos error codes
*/
@@ -7304,7 +7304,7 @@ krb5_tkt_creds_get(krb5_context context, krb5_tkt_creds_context ctx);
* krb5_tkt_creds_step(). Use krb5_free_cred_contents() to free @a creds when
* it is no longer needed.
*
- * @version First introduced in 1.9
+ * @version New in 1.9
*
* @retval 0 Success; otherwise - Kerberos error codes
*/
@@ -7318,7 +7318,7 @@ krb5_tkt_creds_get_creds(krb5_context context, krb5_tkt_creds_context ctx,
* @param[in] context Library context
* @param[in] ctx TGS request context
*
- * @version First introduced in 1.9
+ * @version New in 1.9
*/
void KRB5_CALLCONV
krb5_tkt_creds_free(krb5_context context, krb5_tkt_creds_context ctx);
@@ -7349,7 +7349,7 @@ krb5_tkt_creds_free(krb5_context context, krb5_tkt_creds_context ctx);
* transmit the next request using TCP rather than UDP. If this function
* returns any other error, the TGS exchange has failed.
*
- * @version First introduced in 1.9
+ * @version New in 1.9
*
* @retval 0 Success; otherwise - Kerberos error codes
*/
@@ -7368,7 +7368,7 @@ krb5_tkt_creds_step(krb5_context context, krb5_tkt_creds_context ctx,
* The TGS request context must have completed obtaining credentials via either
* krb5_tkt_creds_get() or krb5_tkt_creds_step().
*
- * @version First introduced in 1.9
+ * @version New in 1.9
*
* @retval 0 Success; otherwise - Kerberos error codes
*/
@@ -7947,7 +7947,7 @@ krb5_pac_verify(krb5_context context, const krb5_pac pac,
* the server and KDC checksum buffers. Use krb5_free_data_contents() to free
* @a data when it is no longer needed.
*
- * @version First introduced in 1.10
+ * @version New in 1.10
*/
krb5_error_code KRB5_CALLCONV
krb5_pac_sign(krb5_context context, krb5_pac pac, krb5_timestamp authtime,
@@ -8002,7 +8002,7 @@ typedef void
* @note This function overrides the information passed through the
* @a KRB5_TRACE environment variable.
*
- * @version First introduced in 1.9
+ * @version New in 1.9
*
* @return Returns KRB5_TRACE_NOSUPP if tracing is not supported in the library
* (unless @a fn is NULL).
@@ -8023,7 +8023,7 @@ krb5_set_trace_callback(krb5_context context, krb5_trace_callback fn,
* @note This function overrides the information passed through the
* @a KRB5_TRACE environment variable.
*
- * @version First introduced in 1.9
+ * @version New in 1.9
*
* @retval KRB5_TRACE_NOSUPP Tracing is not supported in the library.
*/
More information about the cvs-krb5
mailing list