From mark@grondar.za  Sun Jan 29 13:51:42 1995
Received: from grunt.grondar.za (grunt.grondar.za [196.7.18.129]) by freefall.cdrom.com (8.6.9/8.6.6) with ESMTP id NAA01985 for <FreeBSD-gnats-submit@freebsd.org>; Sun, 29 Jan 1995 13:50:55 -0800
Received: (from mark@localhost) by grunt.grondar.za (8.6.9/8.6.9) id TAA09538; Sun, 29 Jan 1995 19:10:14 +0200
Message-Id: <199501291710.TAA09538@grunt.grondar.za>
Date: Sun, 29 Jan 1995 19:10:14 +0200
From: Mark Murray <mark@grondar.za>
Reply-To: mark@grondar.za
To: FreeBSD-gnats-submit@freebsd.org
Subject: The eBones docs lie about file locations...
X-Send-Pr-Version: 3.2

>Number:         194
>Category:       docs
>Synopsis:       The eBones docs lie about file locations...
>Confidential:   no
>Severity:       serious
>Priority:       low
>Responsible:    freebsd-bugs (FreeBSD bugs mailing list)
>State:          closed
>Quarter:
>Keywords:
>Date-Required:
>Class:          doc-bug
>Submitter-Id:   current-users
>Arrival-Date:   Sun Jan 29 14:00:03 1995
>Closed-Date:    Thu Feb 9 16:35:18 PST 1995
>Last-Modified:
>Originator:     Mark Murray
>Release:        FreeBSD 2.1.0-Development i386
>Organization:
GTA
>Environment:

This applies to anyone using eBones. (US or foreign, the man pages are the
same)

>Description:

It seems that the new locations of the eBones/Kerberos configuration files
have not been put into the man pages. Also the relevant header files have
moved a bit. Also(2) two man pages seem erroneous.

>How-To-Repeat:

RTFM  ;-)

>Fix:

In the eBones/man directory

1) Delete this...
   Only in ../man.old: kerberos.3
	near duplicate of krb.3. A link to krb.3 is created at install
        time anyway.

   ...and this...
   Only in ../man.old: kpasswd.1
	We have a modified passwd and no kpasswd. The Kerberos bits of
	passwd are well documented in passwd.1.

3) Apply the following patch:

diff -cdPr ../man.old/Makefile ./Makefile
*** ../man.old/Makefile	Sun Jan 29 11:13:04 1995
--- ./Makefile	Sun Jan 29 17:01:24 1995
***************
*** 4,10 ****
  MAN1=	kdestroy.1 kerberos.1 kinit.1 klist.1 ksrvtgt.1 \
  	kpasswd.1 
  MAN3=	acl_check.3 des_crypt.3 krb.3 krb_realmofhost.3 krb_sendauth.3 \
! 	krb_set_tkt_string.3 kuserok.3 tf_util.3 kerberos.3
  MAN5=	krb.conf.5 krb.realms.5
  MAN8=	ext_srvtab.8 kdb_destroy.8 kdb_edit.8 kdb_init.8 kdb_util.8 kstash.8 \
  	kadmin.8 kadmind.8
--- 4,10 ----
  MAN1=	kdestroy.1 kerberos.1 kinit.1 klist.1 ksrvtgt.1 \
  	kpasswd.1 
  MAN3=	acl_check.3 des_crypt.3 krb.3 krb_realmofhost.3 krb_sendauth.3 \
! 	krb_set_tkt_string.3 kuserok.3 tf_util.3
  MAN5=	krb.conf.5 krb.realms.5
  MAN8=	ext_srvtab.8 kdb_destroy.8 kdb_edit.8 kdb_init.8 kdb_util.8 kstash.8 \
  	kadmin.8 kadmind.8
diff -cdPr ../man.old/acl_check.3 ./acl_check.3
*** ../man.old/acl_check.3	Sun Jan 29 11:13:04 1995
--- ./acl_check.3	Sun Jan 29 18:12:38 1995
***************
*** 16,22 ****
  cc <files> \-lacl \-lkrb
  .PP
  .ft B
! #include <krb.h>
  .PP
  .ft B
  acl_canonicalize_principal(principal, buf)
--- 16,22 ----
  cc <files> \-lacl \-lkrb
  .PP
  .ft B
! #include <kerberosIV/krb.h>
  .PP
  .ft B
  acl_canonicalize_principal(principal, buf)
***************
*** 98,104 ****
  space to store a principal, given the limits on the sizes of name,
  instance, and realm specified as ANAME_SZ, INST_SZ, and REALM_SZ,
  respectively, in
! .IR /usr/include/krb.h .
  .PP
  .I acl_check
  returns nonzero if
--- 98,104 ----
  space to store a principal, given the limits on the sizes of name,
  instance, and realm specified as ANAME_SZ, INST_SZ, and REALM_SZ,
  respectively, in
! .IR /usr/include/kerberosIV/krb.h .
  .PP
  .I acl_check
  returns nonzero if
diff -cdPr ../man.old/des_crypt.3 ./des_crypt.3
*** ../man.old/des_crypt.3	Sun Jan 29 11:13:04 1995
--- ./des_crypt.3	Sun Jan 29 18:12:07 1995
***************
*** 14,20 ****
  .nf
  .nj
  .ft B
! #include <des.h>
  .PP
  .ft B
  .B int des_read_password(key,prompt,verify)
--- 14,20 ----
  .nf
  .nj
  .ft B
! #include <kerberosIV/des.h>
  .PP
  .ft B
  .B int des_read_password(key,prompt,verify)
***************
*** 361,367 ****
  .PP
  .PP
  .SH FILES
! /usr/include/des.h
  .br
  /usr/lib/libdes.a
  .SH "SEE ALSO"
--- 361,367 ----
  .PP
  .PP
  .SH FILES
! /usr/include/kerberosIV/des.h
  .br
  /usr/lib/libdes.a
  .SH "SEE ALSO"
diff -cdPr ../man.old/ext_srvtab.8 ./ext_srvtab.8
*** ../man.old/ext_srvtab.8	Sun Jan 29 11:13:04 1995
--- ./ext_srvtab.8	Sun Jan 29 13:00:14 1995
***************
*** 50,63 ****
  The master key string entered was incorrect.
  .SH FILES
  .TP 20n
! .IR hostname -new-srvtab
! Service key file generated for
! .I hostname
  .TP
! /kerberos/principal.pag, /kerberos/principal.dir
! DBM files containing database
  .TP
! /.k
  Master key cache file.
  .SH SEE ALSO
  read_service_key(3), krb_get_phost(3)
--- 50,62 ----
  The master key string entered was incorrect.
  .SH FILES
  .TP 20n
! /etc/kerberosIV/principal.db
! DBM file containing database
  .TP
! /etc/kerberosIV/principal.ok
! Semaphore indicating that the DBM database is not being modified.
  .TP
! /etc/kerberosIV/master_key
  Master key cache file.
  .SH SEE ALSO
  read_service_key(3), krb_get_phost(3)
diff -cdPr ../man.old/kadmind.8 ./kadmind.8
*** ../man.old/kadmind.8	Sun Jan 29 11:13:04 1995
--- ./kadmind.8	Sun Jan 29 16:36:43 1995
***************
*** 95,113 ****
  A principal is always granted authorization to change its own password.
  .SH FILES
  .TP 20n
! /kerberos/admin_server.syslog
  Default log file.
  .TP 
! /kerberos
! Default access control list directory.
  .TP
! admin_acl.{add,get,mod}
! Access control list files (within the directory)
  .TP
! /kerberos/principal.pag, /kerberos/principal.dir
! Default DBM files containing database
  .TP
! /.k
  Master key cache file.
  .SH "SEE ALSO"
  kerberos(1), kpasswd(1), kadmin(8), acl_check(3)
--- 95,113 ----
  A principal is always granted authorization to change its own password.
  .SH FILES
  .TP 20n
! /var/log/kadmind.syslog
  Default log file.
  .TP 
! /etc/kerberosIV/admin_acl.{add,get,mod}
! Access control list files
  .TP
! /etc/kerberosIV/principal.db
! DBM file containing database
  .TP
! /etc/kerberosIV/principal.ok
! Semaphore indicating that the DBM database is not being modified.
  .TP
! /etc/kerberosIV/master_key
  Master key cache file.
  .SH "SEE ALSO"
  kerberos(1), kpasswd(1), kadmin(8), acl_check(3)
diff -cdPr ../man.old/kdb_destroy.8 ./kdb_destroy.8
*** ../man.old/kdb_destroy.8	Sun Jan 29 11:13:04 1995
--- ./kdb_destroy.8	Sun Jan 29 15:45:40 1995
***************
*** 27,33 ****
  The user aborted the deletion.
  .SH FILES
  .TP 20n
! /kerberos/principal.pag, /kerberos/principal.dir
! DBM files containing database
  .SH SEE ALSO
  kdb_init(8)
--- 27,36 ----
  The user aborted the deletion.
  .SH FILES
  .TP 20n
! /etc/kerberosIV/principal.db
! DBM file containing database
! .TP
! /etc/kerberosIV/principal.ok
! Semaphore indicating that the DBM database is not being modified.
  .SH SEE ALSO
  kdb_init(8)
diff -cdPr ../man.old/kdb_edit.8 ./kdb_edit.8
*** ../man.old/kdb_edit.8	Sun Jan 29 11:13:04 1995
--- ./kdb_edit.8	Sun Jan 29 15:53:38 1995
***************
*** 48,55 ****
  The master key string entered was incorrect.
  .SH FILES
  .TP 20n
! /kerberos/principal.pag, /kerberos/principal.dir
! DBM files containing database
  .TP
! /.k
  Master key cache file.
--- 48,58 ----
  The master key string entered was incorrect.
  .SH FILES
  .TP 20n
! /etc/kerberosIV/principal.db
! DBM file containing database
  .TP
! /etc/kerberosIV/principal.ok
! Semaphore indicating that the DBM database is not being modified.
! .TP
! /etc/kerberosIV/master_key
  Master key cache file.
diff -cdPr ../man.old/kdb_init.8 ./kdb_init.8
*** ../man.old/kdb_init.8	Sun Jan 29 11:13:04 1995
--- ./kdb_init.8	Sun Jan 29 18:13:02 1995
***************
*** 21,41 ****
  .I realm
  argument is not present,
  .I kdb_init
! prompts for a realm name (defaulting to the definition in /usr/include/krb.h).
  After determining the realm to be created, it prompts for
  a master key password.  The master key password is used to encrypt
  every encryption key stored in the database.
  .SH DIAGNOSTICS
  .TP 20n
! "/kerberos/principal: File exists"
  An attempt was made to create a database on a machine which already had
  an existing database.
  .SH FILES
  .TP 20n
! /kerberos/principal.pag, /kerberos/principal.dir
! DBM files containing database
  .TP
! /usr/include/krb.h
  Include file defining default realm
  .SH SEE ALSO
  kdb_destroy(8)
--- 21,45 ----
  .I realm
  argument is not present,
  .I kdb_init
! prompts for a realm name (defaulting to the definition in
! /usr/include/kerberosIV/krb.h).
  After determining the realm to be created, it prompts for
  a master key password.  The master key password is used to encrypt
  every encryption key stored in the database.
  .SH DIAGNOSTICS
  .TP 20n
! "/etc/kerberosIV/principal: File exists"
  An attempt was made to create a database on a machine which already had
  an existing database.
  .SH FILES
  .TP 20n
! /etc/kerberosIV/principal.db
! DBM file containing database
  .TP
! /etc/kerberosIV/principal.ok
! Semaphore indicating that the DBM database is not being modified.
! .TP
! /usr/include/kerberosIV/krb.h
  Include file defining default realm
  .SH SEE ALSO
  kdb_destroy(8)
diff -cdPr ../man.old/kdb_util.8 ./kdb_util.8
*** ../man.old/kdb_util.8	Sun Jan 29 11:13:04 1995
--- ./kdb_util.8	Sun Jan 29 16:09:31 1995
***************
*** 56,64 ****
  The master key string entered was incorrect.
  .SH FILES
  .TP 20n
! /kerberos/principal.pag, /kerberos/principal.dir
! DBM files containing database
  .TP
! .IR filename .ok
  semaphore file created by
  .IR slave_dump.
--- 56,64 ----
  The master key string entered was incorrect.
  .SH FILES
  .TP 20n
! /etc/kerberosIV/principal.db
! DBM file containing database
  .TP
! .IR filename .dump_ok
  semaphore file created by
  .IR slave_dump.
diff -cdPr ../man.old/klist.1 ./klist.1
*** ../man.old/klist.1	Sun Jan 29 11:13:04 1995
--- ./klist.1	Sun Jan 29 16:16:06 1995
***************
*** 65,80 ****
  specified with a
  .B \-file
  option, the default is
! .IR /etc/srvtab .
  .SH FILES
  .TP 2i
! /etc/krb.conf
  to get the name of the local realm
  .TP
  /tmp/tkt[uid]
  as the default ticket file ([uid] is the decimal UID of the user).
  .TP
! /etc/srvtab
  as the default service key file
  .SH SEE ALSO
  .PP
--- 65,80 ----
  specified with a
  .B \-file
  option, the default is
! .IR /etc/kerberosIV/srvtab .
  .SH FILES
  .TP 2i
! /etc/kerberosIV/krb.conf
  to get the name of the local realm
  .TP
  /tmp/tkt[uid]
  as the default ticket file ([uid] is the decimal UID of the user).
  .TP
! /etc/kerberosIV/srvtab
  as the default service key file
  .SH SEE ALSO
  .PP
diff -cdPr ../man.old/krb.3 ./krb.3
*** ../man.old/krb.3	Sun Jan 29 11:13:04 1995
--- ./krb.3	Sun Jan 29 16:54:43 1995
***************
*** 1,10 ****
! .\" $Source: /a/ncvs/src/eBones/man/krb.3,v $
! .\" $Author: rgrimes $
! .\" $Header: /a/ncvs/src/eBones/man/krb.3,v 1.1.1.1 1994/05/27 05:12:09 rgrimes Exp $
  .\" Copyright 1989 by the Massachusetts Institute of Technology.
  .\"
  .\" For copying and distribution information,
! .\" please see the file <mit-copyright.h>.
  .\"
  .TH KERBEROS 3 "Kerberos Version 4.0" "MIT Project Athena"
  .SH NAME
--- 1,9 ----
! .\" from: kerberos.3,v 4.9 89/01/23 16:28:19 steiner Exp $
! .\" $Id: kerberos.3,v 1.1.1.1 1994/09/30 14:50:06 csgr Exp $
  .\" Copyright 1989 by the Massachusetts Institute of Technology.
  .\"
  .\" For copying and distribution information,
! .\" please see the file <Copyright.MIT>.
  .\"
  .TH KERBEROS 3 "Kerberos Version 4.0" "MIT Project Athena"
  .SH NAME
***************
*** 133,139 ****
  It is up to the application to get the authenticator to the service
  where it will be read by
  .I krb_rd_req.
! Unless an attacker possesses the session key contained in the ticket, it
  will be unable to modify the authenticator.  Thus, the checksum can be
  used to verify the authenticity of the other data that will pass through
  a connection.
--- 132,138 ----
  It is up to the application to get the authenticator to the service
  where it will be read by
  .I krb_rd_req.
! Unless an attacker posesses the session key contained in the ticket, it
  will be unable to modify the authenticator.  Thus, the checksum can be
  used to verify the authenticity of the other data that will pass through
  a connection.
***************
*** 171,185 ****
  for the list of error codes.
  .PP
  If the last argument is the null string (""), krb_rd_req will use the
! file /etc/srvtab to find its keys.  If the last argument is NULL, it
! will assume that the key has been set by
  .I krb_set_key
  and will not bother looking further.
  .PP
  .I krb_kntoln
  converts a Kerberos name to a local name.  It takes a structure
  of type AUTH_DAT and uses the name and instance to look in the database
! /etc/aname to find the corresponding local name.  The local name is
  returned and can be used by an application to change uids, directories,
  or other parameters.  It is not an integral part of Kerberos, but is
  instead provided to support the use of Kerberos in existing utilities.
--- 170,184 ----
  for the list of error codes.
  .PP
  If the last argument is the null string (""), krb_rd_req will use the
! file /etc/kerberosIV/srvtab to find its keys.  If the last argument is
! NULL, it will assume that the key has been set by
  .I krb_set_key
  and will not bother looking further.
  .PP
  .I krb_kntoln
  converts a Kerberos name to a local name.  It takes a structure
  of type AUTH_DAT and uses the name and instance to look in the database
! /etc/kerberosIV/aname to find the corresponding local name.  The local name is
  returned and can be used by an application to change uids, directories,
  or other parameters.  It is not an integral part of Kerberos, but is
  instead provided to support the use of Kerberos in existing utilities.
diff -cdPr ../man.old/krb.conf.5 ./krb.conf.5
*** ../man.old/krb.conf.5	Sun Jan 29 11:13:04 1995
--- ./krb.conf.5	Sun Jan 29 11:15:47 1995
***************
*** 7,13 ****
  .\"
  .TH KRB.CONF 5 "Kerberos Version 4.0" "MIT Project Athena"
  .SH NAME
! /etc/krb.conf \- Kerberos configuration file
  .SH DESCRIPTION
  .I krb.conf
  contains configuration information describing the Kerberos realm and the
--- 7,13 ----
  .\"
  .TH KRB.CONF 5 "Kerberos Version 4.0" "MIT Project Athena"
  .SH NAME
! /etc/kerberosIV/krb.conf \- Kerberos configuration file
  .SH DESCRIPTION
  .I krb.conf
  contains configuration information describing the Kerberos realm and the
diff -cdPr ../man.old/krb.realms.5 ./krb.realms.5
*** ../man.old/krb.realms.5	Sun Jan 29 11:13:04 1995
--- ./krb.realms.5	Sun Jan 29 11:17:37 1995
***************
*** 7,13 ****
  .\"
  .TH KRB.REALMS 5 "Kerberos Version 4.0" "MIT Project Athena"
  .SH NAME
! /etc/krb.realms \- host to Kerberos realm translation file
  .SH DESCRIPTION
  .I krb.realms
  provides a translation from a hostname to the Kerberos realm name for
--- 7,13 ----
  .\"
  .TH KRB.REALMS 5 "Kerberos Version 4.0" "MIT Project Athena"
  .SH NAME
! /etc/kerberosIV/krb.realms \- host to Kerberos realm translation file
  .SH DESCRIPTION
  .I krb.realms
  provides a translation from a hostname to the Kerberos realm name for
diff -cdPr ../man.old/krb_realmofhost.3 ./krb_realmofhost.3
*** ../man.old/krb_realmofhost.3	Sun Jan 29 11:13:04 1995
--- ./krb_realmofhost.3	Sun Jan 29 17:17:35 1995
***************
*** 13,20 ****
  .nf
  .nj
  .ft B
! #include <krb.h>
! #include <des.h>
  #include <netinet/in.h>
  .PP
  .ft B
--- 13,20 ----
  .nf
  .nj
  .ft B
! #include <kerberosIV/krb.h>
! #include <kerberosIV/des.h>
  #include <netinet/in.h>
  .PP
  .ft B
***************
*** 48,54 ****
  returns the Kerberos realm of the host
  .IR host ,
  as determined by the translation table
! .IR /etc/krb.realms .
  .I host
  should be the fully-qualified domain-style primary host name of the host
  in question.  In order to prevent certain security attacks, this routine
--- 48,54 ----
  returns the Kerberos realm of the host
  .IR host ,
  as determined by the translation table
! .IR /etc/kerberosIV/krb.realms .
  .I host
  should be the fully-qualified domain-style primary host name of the host
  in question.  In order to prevent certain security attacks, this routine
***************
*** 96,102 ****
  host running a Kerberos key distribution center (KDC)
  for realm
  .IR realm ,
! as specified in the configuration file (\fI/etc/krb.conf\fR).
  The configuration file is described by 
  .IR krb.conf (5).
  If the host is successfully filled in, the routine
--- 96,102 ----
  host running a Kerberos key distribution center (KDC)
  for realm
  .IR realm ,
! as specified in the configuration file (\fI/etc/kerberosIV/krb.conf\fR).
  The configuration file is described by 
  .IR krb.conf (5).
  If the host is successfully filled in, the routine
***************
*** 119,125 ****
  host running a Kerberos KDC database administration server
  for realm
  .IR realm ,
! as specified in the configuration file (\fI/etc/krb.conf\fR).
  If the file cannot be opened or is malformed, or there are fewer than
  .I n
  hosts running a Kerberos KDC database administration server,
--- 119,125 ----
  host running a Kerberos KDC database administration server
  for realm
  .IR realm ,
! as specified in the configuration file (\fI/etc/kerberosIV/krb.conf\fR).
  If the file cannot be opened or is malformed, or there are fewer than
  .I n
  hosts running a Kerberos KDC database administration server,
***************
*** 145,154 ****
  kerberos(3), krb.conf(5), krb.realms(5)
  .SH FILES
  .TP 20n
! /etc/krb.realms
  translation file for host-to-realm mapping.
  .TP
! /etc/krb.conf
  local realm-name and realm/server configuration file.
  .SH BUGS
  The current convention for instance names is too limited; the full
--- 145,154 ----
  kerberos(3), krb.conf(5), krb.realms(5)
  .SH FILES
  .TP 20n
! /etc/kerberosIV/krb.realms
  translation file for host-to-realm mapping.
  .TP
! /etc/kerberosIV/krb.conf
  local realm-name and realm/server configuration file.
  .SH BUGS
  The current convention for instance names is too limited; the full
diff -cdPr ../man.old/krb_sendauth.3 ./krb_sendauth.3
*** ../man.old/krb_sendauth.3	Sun Jan 29 11:13:03 1995
--- ./krb_sendauth.3	Sun Jan 29 18:16:10 1995
***************
*** 13,20 ****
  .nf
  .nj
  .ft B
! #include <krb.h>
! #include <des.h>
  #include <netinet/in.h>
  .PP
  .fi
--- 13,20 ----
  .nf
  .nj
  .ft B
! #include <kerberosIV/krb.h>
! #include <kerberosIV/des.h>
  #include <netinet/in.h>
  .PP
  .fi
***************
*** 295,301 ****
  If you set this argument to "",
  .I krb_rd_req
  looks for the service key in the file
! .IR /etc/srvtab.
  
  If the client and server are performing mutual authenication,
  the
--- 295,301 ----
  If you set this argument to "",
  .I krb_rd_req
  looks for the service key in the file
! .IR /etc/kerberosIV/srvtab.
  
  If the client and server are performing mutual authenication,
  the
***************
*** 345,348 ****
  .SH RESTRICTIONS
  Copyright 1988, Massachusetts Instititute of Technology.
  For copying and distribution information,
! please see the file <mit-copyright.h>.
--- 345,348 ----
  .SH RESTRICTIONS
  Copyright 1988, Massachusetts Instititute of Technology.
  For copying and distribution information,
! please see the file <Copyright.MIT>.
diff -cdPr ../man.old/krb_set_tkt_string.3 ./krb_set_tkt_string.3
*** ../man.old/krb_set_tkt_string.3	Sun Jan 29 11:13:03 1995
--- ./krb_set_tkt_string.3	Sun Jan 29 17:24:21 1995
***************
*** 12,18 ****
  .nf
  .nj
  .ft B
! #include <krb.h>
  .PP
  .ft B
  void krb_set_tkt_string(filename)
--- 12,18 ----
  .nf
  .nj
  .ft B
! #include <kerberosIV/krb.h>
  .PP
  .ft B
  void krb_set_tkt_string(filename)
diff -cdPr ../man.old/ksrvtgt.1 ./ksrvtgt.1
*** ../man.old/ksrvtgt.1	Sun Jan 29 11:13:03 1995
--- ./ksrvtgt.1	Sun Jan 29 16:23:37 1995
***************
*** 25,31 ****
  the service key found in
  .I srvtab
  (or in 
! .B /etc/srvtab
  if
  .I srvtab
  is not specified on the command line), and stores the ticket in the
--- 25,31 ----
  the service key found in
  .I srvtab
  (or in 
! .B /etc/kerberosIV/srvtab
  if
  .I srvtab
  is not specified on the command line), and stores the ticket in the
***************
*** 39,51 ****
  key file.
  .SH FILES
  .TP 2i
! /etc/krb.conf
  to get the name of the local realm.
  .TP
  /tmp/tkt[uid]
  The default ticket file.
  .TP
! /etc/srvtab
  The default service key file.
  .SH SEE ALSO
  kerberos(1), kinit(1), kdestroy(1)
--- 39,51 ----
  key file.
  .SH FILES
  .TP 2i
! /etc/kerberosIV/krb.conf
  to get the name of the local realm.
  .TP
  /tmp/tkt[uid]
  The default ticket file.
  .TP
! /etc/kerberosIV/srvtab
  The default service key file.
  .SH SEE ALSO
  kerberos(1), kinit(1), kdestroy(1)
diff -cdPr ../man.old/kstash.8 ./kstash.8
*** ../man.old/kstash.8	Sun Jan 29 11:13:03 1995
--- ./kstash.8	Sun Jan 29 12:57:18 1995
***************
*** 34,41 ****
  was attempting to write the key to the file.
  .SH FILES
  .TP 20n
! /kerberos/principal.pag, /kerberos/principal.dir
! DBM files containing database
  .TP
! /.k
  Master key cache file.
--- 34,44 ----
  was attempting to write the key to the file.
  .SH FILES
  .TP 20n
! /etc/kerberosIV/principal.db
! DBM file containing database
  .TP
! /etc/kerberosIV/principal.ok
! Semaphore indicating that the DBM database is not being modified.
! .TP
! /etc/kerberosIV/master_key
  Master key cache file.
diff -cdPr ../man.old/kuserok.3 ./kuserok.3
*** ../man.old/kuserok.3	Sun Jan 29 11:13:03 1995
--- ./kuserok.3	Sun Jan 29 17:24:59 1995
***************
*** 12,18 ****
  .nf
  .nj
  .ft B
! #include <krb.h>
  .PP
  .ft B
  kuserok(kdata, localuser)
--- 12,18 ----
  .nf
  .nj
  .ft B
! #include <kerberosIV/krb.h>
  .PP
  .ft B
  kuserok(kdata, localuser)
diff -cdPr ../man.old/tf_util.3 ./tf_util.3
*** ../man.old/tf_util.3	Sun Jan 29 11:13:04 1995
--- ./tf_util.3	Sun Jan 29 17:25:19 1995
***************
*** 13,19 ****
  .nf
  .nj
  .ft B
! #include <krb.h>
  .PP
  .ft B
  extern char *krb_err_txt[];
--- 13,19 ----
  .nf
  .nj
  .ft B
! #include <kerberosIV/krb.h>
  .PP
  .ft B
  extern char *krb_err_txt[];

>Release-Note:
>Audit-Trail:
State-Changed-From-To: open->closed 
State-Changed-By: jkh 
State-Changed-When: Thu Feb 9 16:35:18 PST 1995 
State-Changed-Why:  
Doc patches were applied - problem fixed 
>Unformatted:



