KADM5_TL_DATA
case KADM5_TL_DATA: {
{ "password", KADM5_TL_DATA, KRB5_TL_PASSWORD, KADM5_KEY_DATA, "Password", "Password", 0 },
{ "pkinit-acl", KADM5_TL_DATA, KRB5_TL_PKINIT_ACL, 0, "PK-INIT ACL", "PK-INIT ACL", 0 },
{ "aliases", KADM5_TL_DATA, KRB5_TL_ALIASES, 0, "Aliases", "Aliases", 0 },
mask |= KADM5_TL_DATA;
mask |= KADM5_TL_DATA;
mask |= KADM5_TL_DATA;
#define KADM5_PRINCIPAL_NORMAL_MASK (~(KADM5_KEY_DATA | KADM5_TL_DATA))
KADM5_TL_DATA);
KADM5_TL_DATA);
if(mask & KADM5_TL_DATA) {
if(mask & KADM5_TL_DATA) {
if(mask & KADM5_TL_DATA) {
if ((mask & KADM5_TL_DATA) && log_ent.entry.extensions) {
if (mask & KADM5_TL_DATA) {
if (mask & KADM5_TL_DATA) {
KADM5_TL_DATA);
*mask |= KADM5_TL_DATA;
*mask |= KADM5_TL_DATA;
dbentry->mask |= KADM5_TL_DATA;
KADM5_MAX_LIFE | KADM5_MAX_RLIFE | KADM5_TL_DATA |
master_entry->mask |= KADM5_KEY_DATA | KADM5_TL_DATA;
master_entry->mask |= KADM5_KEY_DATA | KADM5_TL_DATA;
master_entry->mask |= KADM5_TL_DATA;
ent->mask |= KADM5_KEY_DATA | KADM5_TL_DATA;
dbent->mask |= KADM5_ATTRIBUTES | KADM5_KEY_DATA | KADM5_TL_DATA;
if (! (mask & KADM5_TL_DATA)) {
if (! (mask & KADM5_TL_DATA)) {
if (! (mask & KADM5_TL_DATA)) {
KADM5_MAX_RLIFE | KADM5_TL_DATA | KADM5_KEY_DATA | KADM5_FAIL_AUTH_COUNT )
kdb->mask |= KADM5_TL_DATA;
kdb->mask = KADM5_TL_DATA;
if (mask & KADM5_TL_DATA) {
if (mask & KADM5_TL_DATA) {
if (mask & KADM5_TL_DATA) {
if (mask & KADM5_TL_DATA) {
if (mask & KADM5_TL_DATA) {
mprinc_test_fail("admin", &ent, KADM5_TL_DATA, KADM5_BAD_TL_TYPE);
KADM5_MAX_RLIFE | KADM5_TL_DATA));
KADM5_PRINCIPAL_NORMAL_MASK | KADM5_TL_DATA));
ent->mask = KADM5_TL_DATA;