summaryrefslogtreecommitdiffstats
path: root/src/clients/klist
diff options
context:
space:
mode:
authorTom Yu <tlyu@mit.edu>2009-10-31 00:48:38 +0000
committerTom Yu <tlyu@mit.edu>2009-10-31 00:48:38 +0000
commit02d6bcbc98a214e7aeaaa9f45f0db8784a7b743b (patch)
tree61b9147863cd8be3eff63903dc36cae168254bd5 /src/clients/klist
parent162ab371748cba0cc6f172419bd6e71fa04bb878 (diff)
downloadkrb5-02d6bcbc98a214e7aeaaa9f45f0db8784a7b743b.tar.gz
krb5-02d6bcbc98a214e7aeaaa9f45f0db8784a7b743b.tar.xz
krb5-02d6bcbc98a214e7aeaaa9f45f0db8784a7b743b.zip
make mark-cstyle
make reindent git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@23100 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/clients/klist')
-rw-r--r--src/clients/klist/klist.c749
1 files changed, 375 insertions, 374 deletions
diff --git a/src/clients/klist/klist.c b/src/clients/klist/klist.c
index 9e93f7b354..1a6309eb13 100644
--- a/src/clients/klist/klist.c
+++ b/src/clients/klist/klist.c
@@ -1,3 +1,4 @@
+/* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */
/*
* clients/klist/klist.c
*
@@ -8,7 +9,7 @@
* require a specific license from the United States Government.
* It is the responsibility of any person or organization contemplating
* export to obtain such a license before exporting.
- *
+ *
* WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
* distribute this software and its documentation for any purpose and
* without fee is hereby granted, provided that the above copyright
@@ -22,7 +23,7 @@
* M.I.T. makes no representations about the suitability of
* this software for any purpose. It is provided "as is" without express
* or implied warranty.
- *
+ *
*
* List out the contents of your credential cache or keytab.
*/
@@ -67,7 +68,7 @@ krb5_context kcontext;
char * etype_string (krb5_enctype );
void show_credential (krb5_creds *);
-
+
void do_ccache (char *);
void do_keytab (char *);
void printtime (time_t);
@@ -83,7 +84,7 @@ static void usage()
#define KRB_AVAIL_STRING(x) ((x)?"available":"not available")
fprintf(stderr, "Usage: %s [-e] [-V] [[-c] [-d] [-f] [-s] [-a [-n]]] %s",
- progname, "[-k [-t] [-K]] [name]\n");
+ progname, "[-k [-t] [-K]] [name]\n");
fprintf(stderr, "\t-c specifies credentials cache\n");
fprintf(stderr, "\t-k specifies keytab\n");
fprintf(stderr, "\t (Default is credentials cache)\n");
@@ -116,194 +117,194 @@ main(argc, argv)
mode = DEFAULT;
/* V=version so v can be used for verbose later if desired. */
while ((c = getopt(argc, argv, "dfetKsnack45V")) != -1) {
- switch (c) {
- case 'd':
- show_adtype = 1;
- break;
- case 'f':
- show_flags = 1;
- break;
- case 'e':
- show_etype = 1;
- break;
- case 't':
- show_time = 1;
- break;
- case 'K':
- show_keys = 1;
- break;
- case 's':
- status_only = 1;
- break;
- case 'n':
- no_resolve = 1;
- break;
- case 'a':
- show_addresses = 1;
- break;
- case 'c':
- if (mode != DEFAULT) usage();
- mode = CCACHE;
- break;
- case 'k':
- if (mode != DEFAULT) usage();
- mode = KEYTAB;
- break;
- case '4':
- fprintf(stderr, "Kerberos 4 is no longer supported\n");
- exit(3);
- break;
- case '5':
- break;
- case 'V':
- print_version = 1;
- break;
- default:
- usage();
- break;
- }
+ switch (c) {
+ case 'd':
+ show_adtype = 1;
+ break;
+ case 'f':
+ show_flags = 1;
+ break;
+ case 'e':
+ show_etype = 1;
+ break;
+ case 't':
+ show_time = 1;
+ break;
+ case 'K':
+ show_keys = 1;
+ break;
+ case 's':
+ status_only = 1;
+ break;
+ case 'n':
+ no_resolve = 1;
+ break;
+ case 'a':
+ show_addresses = 1;
+ break;
+ case 'c':
+ if (mode != DEFAULT) usage();
+ mode = CCACHE;
+ break;
+ case 'k':
+ if (mode != DEFAULT) usage();
+ mode = KEYTAB;
+ break;
+ case '4':
+ fprintf(stderr, "Kerberos 4 is no longer supported\n");
+ exit(3);
+ break;
+ case '5':
+ break;
+ case 'V':
+ print_version = 1;
+ break;
+ default:
+ usage();
+ break;
+ }
}
if (no_resolve && !show_addresses) {
- usage();
+ usage();
}
if (mode == DEFAULT || mode == CCACHE) {
- if (show_time || show_keys)
- usage();
+ if (show_time || show_keys)
+ usage();
} else {
- if (show_flags || status_only || show_addresses)
- usage();
+ if (show_flags || status_only || show_addresses)
+ usage();
}
if (argc - optind > 1) {
- fprintf(stderr, "Extra arguments (starting with \"%s\").\n",
- argv[optind+1]);
- usage();
+ fprintf(stderr, "Extra arguments (starting with \"%s\").\n",
+ argv[optind+1]);
+ usage();
}
if (print_version) {
- printf("%s version %s\n", PACKAGE_NAME, PACKAGE_VERSION);
- exit(0);
+ printf("%s version %s\n", PACKAGE_NAME, PACKAGE_VERSION);
+ exit(0);
}
name = (optind == argc-1) ? argv[optind] : 0;
now = time(0);
{
- char tmp[BUFSIZ];
-
- if (!krb5_timestamp_to_sfstring(now, tmp, 20, (char *) NULL) ||
- !krb5_timestamp_to_sfstring(now, tmp, sizeof(tmp),
- (char *) NULL))
- timestamp_width = (int) strlen(tmp);
- else
- timestamp_width = 15;
+ char tmp[BUFSIZ];
+
+ if (!krb5_timestamp_to_sfstring(now, tmp, 20, (char *) NULL) ||
+ !krb5_timestamp_to_sfstring(now, tmp, sizeof(tmp),
+ (char *) NULL))
+ timestamp_width = (int) strlen(tmp);
+ else
+ timestamp_width = 15;
}
{
- krb5_error_code retval;
- retval = krb5_init_context(&kcontext);
- if (retval) {
- com_err(progname, retval, "while initializing krb5");
- exit(1);
- }
-
- if (mode == DEFAULT || mode == CCACHE)
- do_ccache(name);
- else
- do_keytab(name);
+ krb5_error_code retval;
+ retval = krb5_init_context(&kcontext);
+ if (retval) {
+ com_err(progname, retval, "while initializing krb5");
+ exit(1);
+ }
+
+ if (mode == DEFAULT || mode == CCACHE)
+ do_ccache(name);
+ else
+ do_keytab(name);
}
return 0;
-}
+}
void do_keytab(name)
- char *name;
+ char *name;
{
- krb5_keytab kt;
- krb5_keytab_entry entry;
- krb5_kt_cursor cursor;
- char buf[BUFSIZ]; /* hopefully large enough for any type */
- char *pname;
- int code;
-
- if (name == NULL) {
- if ((code = krb5_kt_default(kcontext, &kt))) {
- com_err(progname, code, "while getting default keytab");
- exit(1);
- }
- } else {
- if ((code = krb5_kt_resolve(kcontext, name, &kt))) {
- com_err(progname, code, "while resolving keytab %s",
- name);
- exit(1);
- }
- }
-
- if ((code = krb5_kt_get_name(kcontext, kt, buf, BUFSIZ))) {
- com_err(progname, code, "while getting keytab name");
- exit(1);
- }
-
- printf("Keytab name: %s\n", buf);
-
- if ((code = krb5_kt_start_seq_get(kcontext, kt, &cursor))) {
- com_err(progname, code, "while starting keytab scan");
- exit(1);
- }
-
- if (show_time) {
- printf("KVNO Timestamp");
- fillit(stdout, timestamp_width - sizeof("Timestamp") + 2, (int) ' ');
- printf("Principal\n");
- printf("---- ");
- fillit(stdout, timestamp_width, (int) '-');
- printf(" ");
- fillit(stdout, 78 - timestamp_width - sizeof("KVNO"), (int) '-');
- printf("\n");
- } else {
- printf("KVNO Principal\n");
- printf("---- --------------------------------------------------------------------------\n");
- }
-
- while ((code = krb5_kt_next_entry(kcontext, kt, &entry, &cursor)) == 0) {
- if ((code = krb5_unparse_name(kcontext, entry.principal, &pname))) {
- com_err(progname, code, "while unparsing principal name");
- exit(1);
- }
- printf("%4d ", entry.vno);
- if (show_time) {
- printtime(entry.timestamp);
- printf(" ");
- }
- printf("%s", pname);
- if (show_etype)
- printf(" (%s) " , etype_string(entry.key.enctype));
- if (show_keys) {
- printf(" (0x");
- {
- int i;
- for (i = 0; i < entry.key.length; i++)
- printf("%02x", entry.key.contents[i]);
- }
- printf(")");
- }
- printf("\n");
- krb5_free_unparsed_name(kcontext, pname);
- }
- if (code && code != KRB5_KT_END) {
- com_err(progname, code, "while scanning keytab");
- exit(1);
- }
- if ((code = krb5_kt_end_seq_get(kcontext, kt, &cursor))) {
- com_err(progname, code, "while ending keytab scan");
- exit(1);
- }
- exit(0);
+ krb5_keytab kt;
+ krb5_keytab_entry entry;
+ krb5_kt_cursor cursor;
+ char buf[BUFSIZ]; /* hopefully large enough for any type */
+ char *pname;
+ int code;
+
+ if (name == NULL) {
+ if ((code = krb5_kt_default(kcontext, &kt))) {
+ com_err(progname, code, "while getting default keytab");
+ exit(1);
+ }
+ } else {
+ if ((code = krb5_kt_resolve(kcontext, name, &kt))) {
+ com_err(progname, code, "while resolving keytab %s",
+ name);
+ exit(1);
+ }
+ }
+
+ if ((code = krb5_kt_get_name(kcontext, kt, buf, BUFSIZ))) {
+ com_err(progname, code, "while getting keytab name");
+ exit(1);
+ }
+
+ printf("Keytab name: %s\n", buf);
+
+ if ((code = krb5_kt_start_seq_get(kcontext, kt, &cursor))) {
+ com_err(progname, code, "while starting keytab scan");
+ exit(1);
+ }
+
+ if (show_time) {
+ printf("KVNO Timestamp");
+ fillit(stdout, timestamp_width - sizeof("Timestamp") + 2, (int) ' ');
+ printf("Principal\n");
+ printf("---- ");
+ fillit(stdout, timestamp_width, (int) '-');
+ printf(" ");
+ fillit(stdout, 78 - timestamp_width - sizeof("KVNO"), (int) '-');
+ printf("\n");
+ } else {
+ printf("KVNO Principal\n");
+ printf("---- --------------------------------------------------------------------------\n");
+ }
+
+ while ((code = krb5_kt_next_entry(kcontext, kt, &entry, &cursor)) == 0) {
+ if ((code = krb5_unparse_name(kcontext, entry.principal, &pname))) {
+ com_err(progname, code, "while unparsing principal name");
+ exit(1);
+ }
+ printf("%4d ", entry.vno);
+ if (show_time) {
+ printtime(entry.timestamp);
+ printf(" ");
+ }
+ printf("%s", pname);
+ if (show_etype)
+ printf(" (%s) " , etype_string(entry.key.enctype));
+ if (show_keys) {
+ printf(" (0x");
+ {
+ int i;
+ for (i = 0; i < entry.key.length; i++)
+ printf("%02x", entry.key.contents[i]);
+ }
+ printf(")");
+ }
+ printf("\n");
+ krb5_free_unparsed_name(kcontext, pname);
+ }
+ if (code && code != KRB5_KT_END) {
+ com_err(progname, code, "while scanning keytab");
+ exit(1);
+ }
+ if ((code = krb5_kt_end_seq_get(kcontext, kt, &cursor))) {
+ com_err(progname, code, "while ending keytab scan");
+ exit(1);
+ }
+ exit(0);
}
void do_ccache(name)
- char *name;
+ char *name;
{
krb5_ccache cache = NULL;
krb5_cc_cursor cur;
@@ -311,111 +312,111 @@ void do_ccache(name)
krb5_principal princ;
krb5_flags flags;
krb5_error_code code;
- int exit_status = 0;
-
+ int exit_status = 0;
+
if (status_only)
- /* exit_status is set back to 0 if a valid tgt is found */
- exit_status = 1;
+ /* exit_status is set back to 0 if a valid tgt is found */
+ exit_status = 1;
if (name == NULL) {
- if ((code = krb5_cc_default(kcontext, &cache))) {
- if (!status_only)
- com_err(progname, code, "while getting default ccache");
- exit(1);
- }
+ if ((code = krb5_cc_default(kcontext, &cache))) {
+ if (!status_only)
+ com_err(progname, code, "while getting default ccache");
+ exit(1);
+ }
} else {
- if ((code = krb5_cc_resolve(kcontext, name, &cache))) {
- if (!status_only)
- com_err(progname, code, "while resolving ccache %s",
- name);
- exit(1);
- }
- }
-
- flags = 0; /* turns off OPENCLOSE mode */
+ if ((code = krb5_cc_resolve(kcontext, name, &cache))) {
+ if (!status_only)
+ com_err(progname, code, "while resolving ccache %s",
+ name);
+ exit(1);
+ }
+ }
+
+ flags = 0; /* turns off OPENCLOSE mode */
if ((code = krb5_cc_set_flags(kcontext, cache, flags))) {
- if (code == KRB5_FCC_NOFILE) {
- if (!status_only) {
- com_err(progname, code, "(ticket cache %s:%s)",
- krb5_cc_get_type(kcontext, cache),
- krb5_cc_get_name(kcontext, cache));
+ if (code == KRB5_FCC_NOFILE) {
+ if (!status_only) {
+ com_err(progname, code, "(ticket cache %s:%s)",
+ krb5_cc_get_type(kcontext, cache),
+ krb5_cc_get_name(kcontext, cache));
#ifdef KRB5_KRB4_COMPAT
- if (name == NULL)
- do_v4_ccache(0);
+ if (name == NULL)
+ do_v4_ccache(0);
#endif
- }
- } else {
- if (!status_only)
- com_err(progname, code,
- "while setting cache flags (ticket cache %s:%s)",
- krb5_cc_get_type(kcontext, cache),
- krb5_cc_get_name(kcontext, cache));
- }
- exit(1);
+ }
+ } else {
+ if (!status_only)
+ com_err(progname, code,
+ "while setting cache flags (ticket cache %s:%s)",
+ krb5_cc_get_type(kcontext, cache),
+ krb5_cc_get_name(kcontext, cache));
+ }
+ exit(1);
}
if ((code = krb5_cc_get_principal(kcontext, cache, &princ))) {
- if (!status_only)
- com_err(progname, code, "while retrieving principal name");
- exit(1);
+ if (!status_only)
+ com_err(progname, code, "while retrieving principal name");
+ exit(1);
}
if ((code = krb5_unparse_name(kcontext, princ, &defname))) {
- if (!status_only)
- com_err(progname, code, "while unparsing principal name");
- exit(1);
+ if (!status_only)
+ com_err(progname, code, "while unparsing principal name");
+ exit(1);
}
if (!status_only) {
- printf("Ticket cache: %s:%s\nDefault principal: %s\n\n",
- krb5_cc_get_type(kcontext, cache),
- krb5_cc_get_name(kcontext, cache), defname);
- fputs("Valid starting", stdout);
- fillit(stdout, timestamp_width - sizeof("Valid starting") + 3,
- (int) ' ');
- fputs("Expires", stdout);
- fillit(stdout, timestamp_width - sizeof("Expires") + 3,
- (int) ' ');
- fputs("Service principal\n", stdout);
+ printf("Ticket cache: %s:%s\nDefault principal: %s\n\n",
+ krb5_cc_get_type(kcontext, cache),
+ krb5_cc_get_name(kcontext, cache), defname);
+ fputs("Valid starting", stdout);
+ fillit(stdout, timestamp_width - sizeof("Valid starting") + 3,
+ (int) ' ');
+ fputs("Expires", stdout);
+ fillit(stdout, timestamp_width - sizeof("Expires") + 3,
+ (int) ' ');
+ fputs("Service principal\n", stdout);
}
if ((code = krb5_cc_start_seq_get(kcontext, cache, &cur))) {
- if (!status_only)
- com_err(progname, code, "while starting to retrieve tickets");
- exit(1);
+ if (!status_only)
+ com_err(progname, code, "while starting to retrieve tickets");
+ exit(1);
}
while (!(code = krb5_cc_next_cred(kcontext, cache, &cur, &creds))) {
- if (status_only) {
- if (exit_status && creds.server->length == 2 &&
- strcmp(creds.server->realm.data, princ->realm.data) == 0 &&
- strcmp((char *)creds.server->data[0].data, "krbtgt") == 0 &&
- strcmp((char *)creds.server->data[1].data,
- princ->realm.data) == 0 &&
- creds.times.endtime > now)
- exit_status = 0;
- } else {
- show_credential(&creds);
- }
- krb5_free_cred_contents(kcontext, &creds);
+ if (status_only) {
+ if (exit_status && creds.server->length == 2 &&
+ strcmp(creds.server->realm.data, princ->realm.data) == 0 &&
+ strcmp((char *)creds.server->data[0].data, "krbtgt") == 0 &&
+ strcmp((char *)creds.server->data[1].data,
+ princ->realm.data) == 0 &&
+ creds.times.endtime > now)
+ exit_status = 0;
+ } else {
+ show_credential(&creds);
+ }
+ krb5_free_cred_contents(kcontext, &creds);
}
if (code == KRB5_CC_END) {
- if ((code = krb5_cc_end_seq_get(kcontext, cache, &cur))) {
- if (!status_only)
- com_err(progname, code, "while finishing ticket retrieval");
- exit(1);
- }
- flags = KRB5_TC_OPENCLOSE; /* turns on OPENCLOSE mode */
- if ((code = krb5_cc_set_flags(kcontext, cache, flags))) {
- if (!status_only)
- com_err(progname, code, "while closing ccache");
- exit(1);
- }
+ if ((code = krb5_cc_end_seq_get(kcontext, cache, &cur))) {
+ if (!status_only)
+ com_err(progname, code, "while finishing ticket retrieval");
+ exit(1);
+ }
+ flags = KRB5_TC_OPENCLOSE; /* turns on OPENCLOSE mode */
+ if ((code = krb5_cc_set_flags(kcontext, cache, flags))) {
+ if (!status_only)
+ com_err(progname, code, "while closing ccache");
+ exit(1);
+ }
#ifdef KRB5_KRB4_COMPAT
- if (name == NULL && !status_only)
- do_v4_ccache(0);
+ if (name == NULL && !status_only)
+ do_v4_ccache(0);
#endif
- exit(exit_status);
+ exit(exit_status);
} else {
- if (!status_only)
- com_err(progname, code, "while retrieving a ticket");
- exit(1);
- }
+ if (!status_only)
+ com_err(progname, code, "while retrieving a ticket");
+ exit(1);
+ }
}
char *
@@ -424,10 +425,10 @@ etype_string(enctype)
{
static char buf[100];
krb5_error_code retval;
-
+
if ((retval = krb5_enctype_to_string(enctype, buf, sizeof(buf)))) {
- /* XXX if there's an error != EINVAL, I should probably report it */
- snprintf(buf, sizeof(buf), "etype %d", enctype);
+ /* XXX if there's an error != EINVAL, I should probably report it */
+ snprintf(buf, sizeof(buf), "etype %d", enctype);
}
return buf;
@@ -439,40 +440,40 @@ flags_string(cred)
{
static char buf[32];
int i = 0;
-
+
if (cred->ticket_flags & TKT_FLG_FORWARDABLE)
- buf[i++] = 'F';
+ buf[i++] = 'F';
if (cred->ticket_flags & TKT_FLG_FORWARDED)
- buf[i++] = 'f';
+ buf[i++] = 'f';
if (cred->ticket_flags & TKT_FLG_PROXIABLE)
- buf[i++] = 'P';
+ buf[i++] = 'P';
if (cred->ticket_flags & TKT_FLG_PROXY)
- buf[i++] = 'p';
+ buf[i++] = 'p';
if (cred->ticket_flags & TKT_FLG_MAY_POSTDATE)
- buf[i++] = 'D';
+ buf[i++] = 'D';
if (cred->ticket_flags & TKT_FLG_POSTDATED)
- buf[i++] = 'd';
+ buf[i++] = 'd';
if (cred->ticket_flags & TKT_FLG_INVALID)
- buf[i++] = 'i';
+ buf[i++] = 'i';
if (cred->ticket_flags & TKT_FLG_RENEWABLE)
- buf[i++] = 'R';
+ buf[i++] = 'R';
if (cred->ticket_flags & TKT_FLG_INITIAL)
- buf[i++] = 'I';
+ buf[i++] = 'I';
if (cred->ticket_flags & TKT_FLG_HW_AUTH)
- buf[i++] = 'H';
+ buf[i++] = 'H';
if (cred->ticket_flags & TKT_FLG_PRE_AUTH)
- buf[i++] = 'A';
+ buf[i++] = 'A';
if (cred->ticket_flags & TKT_FLG_TRANSIT_POLICY_CHECKED)
- buf[i++] = 'T';
+ buf[i++] = 'T';
if (cred->ticket_flags & TKT_FLG_OK_AS_DELEGATE)
- buf[i++] = 'O'; /* D/d are taken. Use short strings? */
+ buf[i++] = 'O'; /* D/d are taken. Use short strings? */
if (cred->ticket_flags & TKT_FLG_ANONYMOUS)
- buf[i++] = 'a';
+ buf[i++] = 'a';
buf[i] = '\0';
return(buf);
}
-void
+void
printtime(tv)
time_t tv;
{
@@ -481,10 +482,10 @@ printtime(tv)
fill = ' ';
if (!krb5_timestamp_to_sfstring((krb5_timestamp) tv,
- timestring,
- timestamp_width+1,
- &fill)) {
- printf(timestring);
+ timestring,
+ timestamp_width+1,
+ &fill)) {
+ printf(timestring);
}
}
@@ -495,21 +496,21 @@ show_credential(cred)
krb5_error_code retval;
krb5_ticket *tkt;
char *name, *sname, *flags;
- int extra_field = 0;
+ int extra_field = 0;
retval = krb5_unparse_name(kcontext, cred->client, &name);
if (retval) {
- com_err(progname, retval, "while unparsing client name");
- return;
+ com_err(progname, retval, "while unparsing client name");
+ return;
}
retval = krb5_unparse_name(kcontext, cred->server, &sname);
if (retval) {
- com_err(progname, retval, "while unparsing server name");
- krb5_free_unparsed_name(kcontext, name);
- return;
+ com_err(progname, retval, "while unparsing server name");
+ krb5_free_unparsed_name(kcontext, name);
+ return;
}
if (!cred->times.starttime)
- cred->times.starttime = cred->times.authtime;
+ cred->times.starttime = cred->times.authtime;
printtime(cred->times.starttime);
putchar(' '); putchar(' ');
@@ -519,101 +520,101 @@ show_credential(cred)
printf("%s\n", sname);
if (strcmp(name, defname)) {
- printf("\tfor client %s", name);
- extra_field++;
+ printf("\tfor client %s", name);
+ extra_field++;
}
-
+
if (cred->times.renew_till) {
- if (!extra_field)
- fputs("\t",stdout);
- else
- fputs(", ",stdout);
- fputs("renew until ", stdout);
- printtime(cred->times.renew_till);
- extra_field += 2;
+ if (!extra_field)
+ fputs("\t",stdout);
+ else
+ fputs(", ",stdout);
+ fputs("renew until ", stdout);
+ printtime(cred->times.renew_till);
+ extra_field += 2;
}
if (extra_field > 3) {
- fputs("\n", stdout);
- extra_field = 0;
+ fputs("\n", stdout);
+ extra_field = 0;
}
if (show_flags) {
- flags = flags_string(cred);
- if (flags && *flags) {
- if (!extra_field)
- fputs("\t",stdout);
- else
- fputs(", ",stdout);
- printf("Flags: %s", flags);
- extra_field++;
- }
+ flags = flags_string(cred);
+ if (flags && *flags) {
+ if (!extra_field)
+ fputs("\t",stdout);
+ else
+ fputs(", ",stdout);
+ printf("Flags: %s", flags);
+ extra_field++;
+ }
}
if (extra_field > 2) {
- fputs("\n", stdout);
- extra_field = 0;
+ fputs("\n", stdout);
+ extra_field = 0;
}
if (show_etype) {
- retval = krb5_decode_ticket(&cred->ticket, &tkt);
- if (retval)
- goto err_tkt;
-
- if (!extra_field)
- fputs("\t",stdout);
- else
- fputs(", ",stdout);
- printf("Etype (skey, tkt): %s, ",
- etype_string(cred->keyblock.enctype));
- printf("%s ",
- etype_string(tkt->enc_part.enctype));
- extra_field++;
+ retval = krb5_decode_ticket(&cred->ticket, &tkt);
+ if (retval)
+ goto err_tkt;
+
+ if (!extra_field)
+ fputs("\t",stdout);
+ else
+ fputs(", ",stdout);
+ printf("Etype (skey, tkt): %s, ",
+ etype_string(cred->keyblock.enctype));
+ printf("%s ",
+ etype_string(tkt->enc_part.enctype));
+ extra_field++;
err_tkt:
- if (tkt != NULL)
- krb5_free_ticket(kcontext, tkt);
+ if (tkt != NULL)
+ krb5_free_ticket(kcontext, tkt);
}
if (show_adtype) {
- int i;
-
- if (cred->authdata != NULL) {
- if (!extra_field)
- fputs("\t",stdout);
- else
- fputs(", ",stdout);
- printf("AD types: ");
- for (i = 0; cred->authdata[i] != NULL; i++) {
- if (i)
- printf(", ");
- printf("%d", cred->authdata[i]->ad_type);
- }
- extra_field++;
- }
+ int i;
+
+ if (cred->authdata != NULL) {
+ if (!extra_field)
+ fputs("\t",stdout);
+ else
+ fputs(", ",stdout);
+ printf("AD types: ");
+ for (i = 0; cred->authdata[i] != NULL; i++) {
+ if (i)
+ printf(", ");
+ printf("%d", cred->authdata[i]->ad_type);
+ }
+ extra_field++;
+ }
}
/* if any additional info was printed, extra_field is non-zero */
if (extra_field)
- putchar('\n');
+ putchar('\n');
if (show_addresses) {
- if (!cred->addresses || !cred->addresses[0]) {
- printf("\tAddresses: (none)\n");
- } else {
- int i;
+ if (!cred->addresses || !cred->addresses[0]) {
+ printf("\tAddresses: (none)\n");
+ } else {
+ int i;
- printf("\tAddresses: ");
- one_addr(cred->addresses[0]);
+ printf("\tAddresses: ");
+ one_addr(cred->addresses[0]);
- for (i=1; cred->addresses[i]; i++) {
- printf(", ");
- one_addr(cred->addresses[i]);
- }
+ for (i=1; cred->addresses[i]; i++) {
+ printf(", ");
+ one_addr(cred->addresses[i]);
+ }
- printf("\n");
- }
+ printf("\n");
+ }
}
krb5_free_unparsed_name(kcontext, name);
@@ -635,60 +636,60 @@ void one_addr(a)
switch (a->addrtype) {
case ADDRTYPE_INET:
- if (a->length != 4) {
- broken:
- printf ("broken address (type %d length %d)",
- a->addrtype, a->length);
- return;
- }
- {
- struct sockaddr_in *sinp = ss2sin (&ss);
- sinp->sin_family = AF_INET;
+ if (a->length != 4) {
+ broken:
+ printf ("broken address (type %d length %d)",
+ a->addrtype, a->length);
+ return;
+ }
+ {
+ struct sockaddr_in *sinp = ss2sin (&ss);
+ sinp->sin_family = AF_INET;
#ifdef HAVE_SA_LEN
- sinp->sin_len = sizeof (struct sockaddr_in);
+ sinp->sin_len = sizeof (struct sockaddr_in);
#endif
- memcpy (&sinp->sin_addr, a->contents, 4);
- }
- break;
+ memcpy (&sinp->sin_addr, a->contents, 4);
+ }
+ break;
#ifdef KRB5_USE_INET6
case ADDRTYPE_INET6:
- if (a->length != 16)
- goto broken;
- {
- struct sockaddr_in6 *sin6p = ss2sin6 (&ss);
- sin6p->sin6_family = AF_INET6;
+ if (a->length != 16)
+ goto broken;
+ {
+ struct sockaddr_in6 *sin6p = ss2sin6 (&ss);
+ sin6p->sin6_family = AF_INET6;
#ifdef HAVE_SA_LEN
- sin6p->sin6_len = sizeof (struct sockaddr_in6);
+ sin6p->sin6_len = sizeof (struct sockaddr_in6);
#endif
- memcpy (&sin6p->sin6_addr, a->contents, 16);
- }
- break;
+ memcpy (&sin6p->sin6_addr, a->contents, 16);
+ }
+ break;
#endif
default:
- printf ("unknown addrtype %d", a->addrtype);
- return;
+ printf ("unknown addrtype %d", a->addrtype);
+ return;
}
namebuf[0] = 0;
err = getnameinfo (ss2sa (&ss), socklen (ss2sa (&ss)),
- namebuf, sizeof (namebuf), 0, 0,
- no_resolve ? NI_NUMERICHOST : 0U);
+ namebuf, sizeof (namebuf), 0, 0,
+ no_resolve ? NI_NUMERICHOST : 0U);
if (err) {
- printf ("unprintable address (type %d, error %d %s)", a->addrtype, err,
- gai_strerror (err));
- return;
+ printf ("unprintable address (type %d, error %d %s)", a->addrtype, err,
+ gai_strerror (err));
+ return;
}
printf ("%s", namebuf);
}
void
fillit(f, num, c)
- FILE *f;
- unsigned int num;
- int c;
+ FILE *f;
+ unsigned int num;
+ int c;
{
int i;
for (i=0; i<num; i++)
- fputc(c, f);
+ fputc(c, f);
}