From: Zhanna Tsitkov Date: Mon, 25 Mar 2013 19:18:53 +0000 (-0400) Subject: Replace "First introduced" with concise "New" X-Git-Tag: krb5-1.12-alpha1~253 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=18d52ef70d7f518d78263f475b9ffad87f2c91e7;p=thirdparty%2Fkrb5.git Replace "First introduced" with concise "New" --- diff --git a/doc/admin/admin_commands/kadmin_local.rst b/doc/admin/admin_commands/kadmin_local.rst index e9acb539cb..3072eec715 100644 --- a/doc/admin/admin_commands/kadmin_local.rst +++ b/doc/admin/admin_commands/kadmin_local.rst @@ -161,8 +161,7 @@ OPTIONS **-x debug=**\ *level* sets the OpenLDAP client library debug level. *level* is an integer to be interpreted by the library. Debugging messages - are printed to standard error. First introduced in release - 1.12. + are printed to standard error. New in release 1.12. .. _kadmin_options_end: diff --git a/doc/admin/admin_commands/kadmind.rst b/doc/admin/admin_commands/kadmind.rst index 28268faa63..09efd22e56 100644 --- a/doc/admin/admin_commands/kadmind.rst +++ b/doc/admin/admin_commands/kadmind.rst @@ -128,7 +128,7 @@ OPTIONS an integer to be interpreted by the library. Debugging messages are printed to standard error, so this option must be used with the **-nofork** option to be useful. - First introduced in release 1.12. + New in release 1.12. SEE ALSO -------- diff --git a/doc/admin/admin_commands/krb5kdc.rst b/doc/admin/admin_commands/krb5kdc.rst index 6e47c69789..21a18ae0b7 100644 --- a/doc/admin/admin_commands/krb5kdc.rst +++ b/doc/admin/admin_commands/krb5kdc.rst @@ -106,8 +106,7 @@ Options supported for the LDAP database module are: sets the OpenLDAP client library debug level. *level* is an integer to be interpreted by the library. Debugging messages are printed to standard error, so this option must be used - with the **-n** option to be useful. First introduced in - release 1.12. + with the **-n** option to be useful. New in release 1.12. The **-T** *offset* option specifies a time offset, in seconds, which the KDC will operate under. It is intended only for testing purposes. diff --git a/doc/admin/conf_files/kdc_conf.rst b/doc/admin/conf_files/kdc_conf.rst index c10e81e7e1..79599eebb6 100644 --- a/doc/admin/conf_files/kdc_conf.rst +++ b/doc/admin/conf_files/kdc_conf.rst @@ -210,7 +210,7 @@ For each realm, the following tags may be specified: (Delta time string.) Specifies the amount of time to wait for a full propagation to complete. This is optional in configuration files, and is used by slave KDCs only. The default value is 5 - minutes (``5m``). First introduced in release 1.11. + minutes (``5m``). New in release 1.11. **iprop_logfile** (File name.) Specifies where the update log file for the realm @@ -282,8 +282,7 @@ For each realm, the following tags may be specified: principals support des-cbc-crc for session key enctype negotiation purposes. If **allow_weak_crypto** in :ref:`libdefaults` is false, or if des-cbc-crc is not a permitted enctype, then this - variable has no effect. Defaults to true. - First introduced in release 1.11. + variable has no effect. Defaults to true. New in release 1.11. **reject_bad_transit** (Boolean value.) If set to true, the KDC will check the list of @@ -312,7 +311,7 @@ For each realm, the following tags may be specified: than the realm's ticket-granting service. This option allows anonymous PKINIT to be enabled for use as FAST armor tickets without allowing anonymous authentication to services. The - default value is false. First introduced in release 1.9. + default value is false. New in release 1.9. **supported_enctypes** (List of *key*:*salt* strings.) Specifies the default key/salt diff --git a/doc/admin/conf_files/krb5_conf.rst b/doc/admin/conf_files/krb5_conf.rst index e326cf350a..f2f22afa4e 100644 --- a/doc/admin/conf_files/krb5_conf.rst +++ b/doc/admin/conf_files/krb5_conf.rst @@ -137,13 +137,13 @@ The libdefaults section may contain any of the following relations: **default_ccache_name** This relation specifies the name of the default credential cache. The default is |ccache|. This relation is subject to parameter - expansion (see below). First introduced in release 1.11. + expansion (see below). New in release 1.11. **default_client_keytab_name** This relation specifies the name of the default keytab for obtaining client credentials. The default is |ckeytab|. This relation is subject to parameter expansion (see below). - First introduced in release 1.11. + New in release 1.11. **default_keytab_name** This relation specifies the default keytab name to be used by @@ -220,7 +220,7 @@ The libdefaults section may contain any of the following relations: (if given). This option can improve the administrative flexibility of server applications on multihomed hosts, but could compromise the security of virtual hosting environments. The - default value is false. First introduced in release 1.10. + default value is false. New in release 1.10. **k5login_authoritative** If this flag is true, principals must be listed in a local user's @@ -636,7 +636,7 @@ modules and to turn modules on and off. Not every krb5 pluggable interface uses the [plugins] section; the ones that do are documented here. -First introduced in release 1.9. +New in release 1.9. Each pluggable interface corresponds to a subsection of [plugins]. All subsections support the same tags: diff --git a/src/include/krb5/krb5.hin b/src/include/krb5/krb5.hin index e95d02989a..e0c6f12396 100644 --- a/src/include/krb5/krb5.hin +++ b/src/include/krb5/krb5.hin @@ -2275,7 +2275,7 @@ krb5_cc_get_name(krb5_context context, krb5_ccache cache); * * Use krb5_free_string() to free @a fullname_out when it is no longer needed. * - * @version First introduced in 1.10 + * @version New in 1.10 */ krb5_error_code KRB5_CALLCONV krb5_cc_get_full_name(krb5_context context, krb5_ccache cache, @@ -2646,7 +2646,7 @@ krb5_cccol_cursor_free(krb5_context context, krb5_cccol_cursor *cursor); * * @param [in] context Library context * - * @version First introduced in 1.11 + * @version New in 1.11 * * @retval 0 Credentials are available in the collection * @retval KRB5_CC_NOTFOUND The collection contains no credentials @@ -2901,7 +2901,7 @@ krb5_kt_end_seq_get(krb5_context context, krb5_keytab keytab, * @param [in] context Library context * @param [in] keytab Key table handle * - * @version First introduced in 1.11 + * @version New in 1.11 * * @retval 0 Keytab exists and contains entries * @retval KRB5_KT_NOTFOUND Keytab does not contain entries @@ -3896,7 +3896,7 @@ krb5_copy_authdata(krb5_context context, * found in either list. Use krb5_free_authdata() to free @a results when it * is no longer needed. * - * @version First introduced in 1.10 + * @version New in 1.10 */ krb5_error_code KRB5_CALLCONV krb5_find_authdata(krb5_context context, krb5_authdata *const *ticket_authdata, @@ -4233,7 +4233,7 @@ krb5_kt_default(krb5_context context, krb5_keytab *id); * * Fill @a keytab_out with a handle to the default client key table. * - * @version First introduced in 1.11 + * @version New in 1.11 * * @retval * 0 Success @@ -4499,7 +4499,7 @@ krb5_cc_switch(krb5_context context, krb5_ccache cache); * @param [in] context Library context * @param [in] type Credential cache type * - * @version First introduced in 1.10 + * @version New in 1.10 * * @retval TRUE if @a type supports switching * @retval FALSE if it does not or is not a valid credential cache type. @@ -4522,7 +4522,7 @@ krb5_cc_support_switch(krb5_context context, const char *type); * * @sa krb5_cccol_cursor_new * - * @version First introduced in 1.10 + * @version New in 1.10 */ krb5_error_code KRB5_CALLCONV krb5_cc_cache_match(krb5_context context, krb5_principal client, @@ -4560,7 +4560,7 @@ krb5_cc_cache_match(krb5_context context, krb5_principal client, * Any other error code indicates a fatal error in the processing of a cache * selection mechanism. * - * @version First introduced in 1.10 + * @version New in 1.10 */ krb5_error_code KRB5_CALLCONV krb5_cc_select(krb5_context context, krb5_principal server, @@ -4753,7 +4753,7 @@ krb5_free_unparsed_name(krb5_context context, char *val); * @param [in] context Library context * @param [in] val String to be freed * - * @version First introduced in 1.10 + * @version New in 1.10 */ void KRB5_CALLCONV krb5_free_string(krb5_context context, char *val); @@ -4764,7 +4764,7 @@ krb5_free_string(krb5_context context, char *val); * @param [in] context Library context * @param [in] val Array of enctypes to be freed * - * @version First introduced in 1.12 + * @version New in 1.12 */ void KRB5_CALLCONV krb5_free_enctypes(krb5_context context, krb5_enctype *val); @@ -4826,7 +4826,7 @@ krb5_timeofday(krb5_context context, register krb5_timestamp *timeret); * This function checks if @a date is close enough to the current time * according to the configured allowable clock skew. * - * @version First introduced in 1.10 + * @version New in 1.10 * * @retval 0 Success * @retval KRB5KRB_AP_ERR_SKEW @a date is not within allowable clock skew @@ -5067,7 +5067,7 @@ krb5_set_password_using_ccache(krb5_context context, krb5_ccache ccache, * @return * Kerberos error codes * - * @version First introduced in 1.11 + * @version New in 1.11 */ krb5_error_code KRB5_CALLCONV krb5_chpw_message(krb5_context context, const krb5_data *server_string, @@ -5805,7 +5805,7 @@ krb5_auth_con_setsendsubkey(krb5_context ctx, krb5_auth_context ac, * This function sets the send subkey in @a ac to @a key, incrementing its * reference count. * - * @version First introduced in 1.9 + * @version New in 1.9 * * @retval 0 Success; otherwise - Kerberos error codes */ @@ -5837,7 +5837,7 @@ krb5_auth_con_setrecvsubkey(krb5_context ctx, krb5_auth_context ac, * This function sets the receiving subkey in @a ac to @a key, incrementing its * reference count. * - * @version First introduced in 1.9 + * @version New in 1.9 * * @retval 0 Success; otherwise - Kerberos error codes */ @@ -6248,7 +6248,7 @@ krb5_enctype_to_string(krb5_enctype enctype, char *buffer, size_t buflen); * (like "aes128-cts-hmac-sha1-96"). If @a shortest is TRUE, it return the * enctype's shortest alias (like "aes128-cts"). * - * @version First introduced in 1.9 + * @version New in 1.9 * * @retval 0 Success; otherwise - Kerberos error codes */ @@ -6383,7 +6383,7 @@ krb5_prompter_posix(krb5_context context, void *data, const char *name, * This question is asked when the long-term password is needed. It has no * challenge and the response is simply the password string. * - * @version First introduced in 1.11 + * @version New in 1.11 */ #define KRB5_RESPONDER_QUESTION_PASSWORD "password" @@ -6420,7 +6420,7 @@ krb5_prompter_posix(krb5_context context, void *data, const char *name, * * For more detail, please see RFC 6560. * - * @version First introduced in 1.11 + * @version New in 1.11 */ #define KRB5_RESPONDER_QUESTION_OTP "otp" @@ -6468,7 +6468,7 @@ krb5_prompter_posix(krb5_context context, void *data, const char *name, * krb5_responder_set_answer(). The form of a question's challenge and * answer depend on the question name. * - * @version First introduced in 1.11 + * @version New in 1.11 */ typedef struct krb5_responder_context_st *krb5_responder_context; @@ -6484,7 +6484,7 @@ typedef struct krb5_responder_context_st *krb5_responder_context; * question's challenge can be retrieved using krb5_responder_get_challenge() * and answered using krb5_responder_set_answer(). * - * @version First introduced in 1.11 + * @version New in 1.11 */ const char * const * KRB5_CALLCONV krb5_responder_list_questions(krb5_context ctx, krb5_responder_context rctx); @@ -6503,7 +6503,7 @@ krb5_responder_list_questions(krb5_context ctx, krb5_responder_context rctx); * as the lifetime of @a rctx, and should not be modified or freed by the * caller. * - * @version First introduced in 1.11 + * @version New in 1.11 */ const char * KRB5_CALLCONV krb5_responder_get_challenge(krb5_context ctx, krb5_responder_context rctx, @@ -6522,7 +6522,7 @@ krb5_responder_get_challenge(krb5_context ctx, krb5_responder_context rctx, * * @retval EINVAL @a question is not present within @a rctx * - * @version First introduced in 1.11 + * @version New in 1.11 */ krb5_error_code KRB5_CALLCONV krb5_responder_set_answer(krb5_context ctx, krb5_responder_context rctx, @@ -6582,7 +6582,7 @@ typedef struct _krb5_responder_otp_challenge { * @param [in] rctx Responder context * @param [out] chl Challenge structure * - * @version First introduced in 1.11 + * @version New in 1.11 */ krb5_error_code KRB5_CALLCONV krb5_responder_otp_get_challenge(krb5_context ctx, @@ -6598,7 +6598,7 @@ krb5_responder_otp_get_challenge(krb5_context ctx, * @param [in] value The value to set, or NULL for none * @param [in] pin The pin to set, or NULL for none * - * @version First introduced in 1.11 + * @version New in 1.11 */ krb5_error_code KRB5_CALLCONV krb5_responder_otp_set_answer(krb5_context ctx, krb5_responder_context rctx, @@ -6611,7 +6611,7 @@ krb5_responder_otp_set_answer(krb5_context ctx, krb5_responder_context rctx, * @param [in] rctx Responder context * @param [in] chl The challenge to free * - * @version First introduced in 1.11 + * @version New in 1.11 */ void KRB5_CALLCONV krb5_responder_otp_challenge_free(krb5_context ctx, @@ -6864,7 +6864,7 @@ krb5_get_init_creds_opt_set_fast_ccache_name(krb5_context context, * This function is similar to krb5_get_init_creds_opt_set_fast_ccache_name(), * but uses a credential cache handle instead of a name. * - * @version First introduced in 1.9 + * @version New in 1.9 */ krb5_error_code KRB5_CALLCONV krb5_get_init_creds_opt_set_fast_ccache(krb5_context context, @@ -6885,7 +6885,7 @@ krb5_get_init_creds_opt_set_fast_ccache(krb5_context context, * sensitive choices) as the previous authentication attempt, which stored * information in the passed-in ccache. * - * @version First introduced in 1.11 + * @version New in 1.11 */ krb5_error_code KRB5_CALLCONV krb5_get_init_creds_opt_set_in_ccache(krb5_context context, @@ -6989,7 +6989,7 @@ typedef void * krb5_get_init_creds_password() not to send password expiry warnings to the * prompter, as it ordinarily may. * - * @version First introduced in 1.9 + * @version New in 1.9 */ krb5_error_code KRB5_CALLCONV krb5_get_init_creds_opt_set_expire_callback(krb5_context context, @@ -7005,7 +7005,7 @@ krb5_get_init_creds_opt_set_expire_callback(krb5_context context, * @param [in] responder Responder function * @param [in] data Responder data argument * - * @version First introduced in 1.11 + * @version New in 1.11 */ krb5_error_code KRB5_CALLCONV krb5_get_init_creds_opt_set_responder(krb5_context context, @@ -7266,7 +7266,7 @@ typedef struct _krb5_tkt_creds_context *krb5_tkt_creds_context; * * Use krb5_tkt_creds_free() to free @a ctx when it is no longer needed. * - * @version First introduced in 1.9 + * @version New in 1.9 * * @retval 0 Success; otherwise - Kerberos error codes */ @@ -7285,7 +7285,7 @@ krb5_tkt_creds_init(krb5_context context, krb5_ccache ccache, * krb5_tkt_creds_init(). On successful return, the credentials can be * retrieved with krb5_tkt_creds_get_creds(). * - * @version First introduced in 1.9 + * @version New in 1.9 * * @retval 0 Success; otherwise - Kerberos error codes */ @@ -7304,7 +7304,7 @@ krb5_tkt_creds_get(krb5_context context, krb5_tkt_creds_context ctx); * krb5_tkt_creds_step(). Use krb5_free_cred_contents() to free @a creds when * it is no longer needed. * - * @version First introduced in 1.9 + * @version New in 1.9 * * @retval 0 Success; otherwise - Kerberos error codes */ @@ -7318,7 +7318,7 @@ krb5_tkt_creds_get_creds(krb5_context context, krb5_tkt_creds_context ctx, * @param[in] context Library context * @param[in] ctx TGS request context * - * @version First introduced in 1.9 + * @version New in 1.9 */ void KRB5_CALLCONV krb5_tkt_creds_free(krb5_context context, krb5_tkt_creds_context ctx); @@ -7349,7 +7349,7 @@ krb5_tkt_creds_free(krb5_context context, krb5_tkt_creds_context ctx); * transmit the next request using TCP rather than UDP. If this function * returns any other error, the TGS exchange has failed. * - * @version First introduced in 1.9 + * @version New in 1.9 * * @retval 0 Success; otherwise - Kerberos error codes */ @@ -7368,7 +7368,7 @@ krb5_tkt_creds_step(krb5_context context, krb5_tkt_creds_context ctx, * The TGS request context must have completed obtaining credentials via either * krb5_tkt_creds_get() or krb5_tkt_creds_step(). * - * @version First introduced in 1.9 + * @version New in 1.9 * * @retval 0 Success; otherwise - Kerberos error codes */ @@ -7947,7 +7947,7 @@ krb5_pac_verify(krb5_context context, const krb5_pac pac, * the server and KDC checksum buffers. Use krb5_free_data_contents() to free * @a data when it is no longer needed. * - * @version First introduced in 1.10 + * @version New in 1.10 */ krb5_error_code KRB5_CALLCONV krb5_pac_sign(krb5_context context, krb5_pac pac, krb5_timestamp authtime, @@ -8002,7 +8002,7 @@ typedef void * @note This function overrides the information passed through the * @a KRB5_TRACE environment variable. * - * @version First introduced in 1.9 + * @version New in 1.9 * * @return Returns KRB5_TRACE_NOSUPP if tracing is not supported in the library * (unless @a fn is NULL). @@ -8023,7 +8023,7 @@ krb5_set_trace_callback(krb5_context context, krb5_trace_callback fn, * @note This function overrides the information passed through the * @a KRB5_TRACE environment variable. * - * @version First introduced in 1.9 + * @version New in 1.9 * * @retval KRB5_TRACE_NOSUPP Tracing is not supported in the library. */