diff options
| author | Greg Hudson <ghudson@mit.edu> | 2011-06-10 18:17:37 +0000 |
|---|---|---|
| committer | Greg Hudson <ghudson@mit.edu> | 2011-06-10 18:17:37 +0000 |
| commit | 16277050f158f062337d1d08258f9499dbc1cdc7 (patch) | |
| tree | 713b2deadd3696c359e9b0051db9fa3de1d5a518 /src/plugins/preauth/pkinit/pkinit_srv.c | |
| parent | cb8b1138d6e349a77507f3c561fc7ee2dde5cd7c (diff) | |
| download | krb5-16277050f158f062337d1d08258f9499dbc1cdc7.tar.gz krb5-16277050f158f062337d1d08258f9499dbc1cdc7.tar.xz krb5-16277050f158f062337d1d08258f9499dbc1cdc7.zip | |
Mark up strings for translation
ticket: 6918
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@24961 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/plugins/preauth/pkinit/pkinit_srv.c')
| -rw-r--r-- | src/plugins/preauth/pkinit/pkinit_srv.c | 18 |
1 files changed, 11 insertions, 7 deletions
diff --git a/src/plugins/preauth/pkinit/pkinit_srv.c b/src/plugins/preauth/pkinit/pkinit_srv.c index 5a7a5adfe5..2a33e93311 100644 --- a/src/plugins/preauth/pkinit/pkinit_srv.c +++ b/src/plugins/preauth/pkinit/pkinit_srv.c @@ -425,8 +425,9 @@ pkinit_server_verify_padata(krb5_context context, if (!krb5_principal_compare(context, request->client, krb5_anonymous_principal())) { retval = KRB5KDC_ERR_PREAUTH_FAILED; - krb5_set_error_message(context, retval, "Pkinit request not " - "signed, but client not anonymous."); + krb5_set_error_message(context, retval, + _("Pkinit request not signed, but client " + "not anonymous.")); goto cleanup; } } @@ -457,7 +458,9 @@ pkinit_server_verify_padata(krb5_context context, } else if (!is_signed) { /*Anonymous pkinit requires DH*/ retval = KRB5KDC_ERR_PREAUTH_FAILED; - krb5_set_error_message(context, retval, "Anonymous pkinit without DH public value not supported."); + krb5_set_error_message(context, retval, + _("Anonymous pkinit without DH public " + "value not supported.")); goto cleanup; } /* @@ -1087,7 +1090,7 @@ pkinit_init_kdc_profile(krb5_context context, pkinit_kdc_context plgctx) if (retval != 0 || NULL == plgctx->idopts->identity) { retval = EINVAL; krb5_set_error_message(context, retval, - "No pkinit_identity supplied for realm %s", + _("No pkinit_identity supplied for realm %s"), plgctx->realmname); goto errout; } @@ -1098,7 +1101,7 @@ pkinit_init_kdc_profile(krb5_context context, pkinit_kdc_context plgctx) if (retval != 0 || NULL == plgctx->idopts->anchors) { retval = EINVAL; krb5_set_error_message(context, retval, - "No pkinit_anchors supplied for realm %s", + _("No pkinit_anchors supplied for realm %s"), plgctx->realmname); goto errout; } @@ -1280,8 +1283,9 @@ pkinit_server_plugin_init(krb5_context context, void **blob, if (j == 0) { retval = EINVAL; - krb5_set_error_message(context, retval, "No realms configured " - "correctly for pkinit support"); + krb5_set_error_message(context, retval, + _("No realms configured correctly for pkinit " + "support")); goto errout; } |
