/*
* Copyright (c) 1998, 2011, Oracle and/or its affiliates. All rights reserved.
*/
#include <locale.h>
const char *
k5g_error_table(long errorno) {
switch (errorno) {
case 0:
return (dgettext(TEXT_DOMAIN,
"Principal in credential cache does not match"
" desired name"));
case 1:
return (dgettext(TEXT_DOMAIN,
"No principal in keytab matches desired name"));
case 2:
return (dgettext(TEXT_DOMAIN,
"Credential cache has no TGT"));
case 3:
return (dgettext(TEXT_DOMAIN,
"Authenticator has no subkey"));
case 4:
return (dgettext(TEXT_DOMAIN,
"Context is already fully established"));
case 5:
return (dgettext(TEXT_DOMAIN,
"Unknown signature type in token"));
case 6:
return (dgettext(TEXT_DOMAIN,
"Invalid field length in token"));
case 7:
return (dgettext(TEXT_DOMAIN,
"Attempt to use incomplete security context"));
case 8:
return (dgettext(TEXT_DOMAIN,
"Bad magic number for krb5_gss_ctx_id_t"));
case 9:
return (dgettext(TEXT_DOMAIN,
"Bad magic number for krb5_gss_cred_id_t"));
case 10:
return (dgettext(TEXT_DOMAIN,
"Bad magic number for krb5_gss_enc_desc"));
case 11:
return (dgettext(TEXT_DOMAIN,
"Sequence number in token is corrupt"));
case 12:
return (dgettext(TEXT_DOMAIN,
"Credential cache is empty"));
case 13:
return (dgettext(TEXT_DOMAIN,
"Acceptor and Initiator share no checksum types"));
case 14:
return (dgettext(TEXT_DOMAIN,
"Requested lucid context version not supported"));
case 15:
return (dgettext(TEXT_DOMAIN,
"PRF input too long"));
default:
return ("unknown error");
}
}