diff options
Diffstat (limited to 'kerberos.c')
-rw-r--r-- | kerberos.c | 10 |
1 files changed, 5 insertions, 5 deletions
@@ -71,7 +71,7 @@ int do_rfc1731(int sock, char *command, char *truename) len = from64tobits(challenge1.cstr, buf1); if (len < 0) { - report(stderr, _("could not decode initial BASE64 challenge\n")); + report(stderr, GT_("could not decode initial BASE64 challenge\n")); return PS_AUTHFAIL; } @@ -136,7 +136,7 @@ int do_rfc1731(int sock, char *command, char *truename) */ if (strcmp(tktuser, user) != 0) { report(stderr, - _("principal %s in ticket does not match -u %s\n"), tktuser, + GT_("principal %s in ticket does not match -u %s\n"), tktuser, user); return PS_AUTHFAIL; } @@ -144,7 +144,7 @@ int do_rfc1731(int sock, char *command, char *truename) if (tktinst[0]) { report(stderr, - _("non-null instance (%s) might cause strange behavior\n"), + GT_("non-null instance (%s) might cause strange behavior\n"), tktinst); strcat(tktuser, "."); strcat(tktuser, tktinst); @@ -210,14 +210,14 @@ int do_rfc1731(int sock, char *command, char *truename) len = from64tobits(buf2, buf1); if (len < 0) { - report(stderr, _("could not decode BASE64 ready response\n")); + report(stderr, GT_("could not decode BASE64 ready response\n")); return PS_AUTHFAIL; } des_ecb_encrypt((des_cblock *)buf2, (des_cblock *)buf2, schedule, 0); memcpy(challenge2.cstr, buf2, 4); if (ntohl(challenge2.cint) != challenge1.cint + 1) { - report(stderr, _("challenge mismatch\n")); + report(stderr, GT_("challenge mismatch\n")); return PS_AUTHFAIL; } |