This commit is contained in:
rsc 2005-02-13 23:44:12 +00:00
parent 3170c7d40b
commit 30f6ae144c
14 changed files with 158 additions and 90 deletions

View file

@ -44,6 +44,10 @@
] ]
.B stat .B stat
.I path .I path
.PP
.B 9p
.B rdwr
.I path
.SH DESCRIPTION .SH DESCRIPTION
.I 9p .I 9p
is a trivial 9P client that can access a single file on a 9P server. is a trivial 9P client that can access a single file on a 9P server.
@ -85,6 +89,18 @@ execute
on on
.I path .I path
and print the result and print the result
.TP
.B rdwr
Open
.I path
for reading and writing.
Then repeat until end-of-file on standard input:
copy a line from the file to standard output,
copy a line from standard input to the file.
Print errors, but don't give up.
.B Rdwr
is useful for interacting with servers like
.IR factotum (4).
.PD .PD
.PP .PP
.I 9p .I 9p

View file

@ -114,12 +114,16 @@ ndbmkdb ndb.1
ndbmkhash ndb.1 ndbmkhash ndb.1
ndbmkhosts ndb.1 ndbmkhosts ndb.1
ndbquery ndb.1 ndbquery ndb.1
netkey netkey.1
news news.1 news news.1
p p.1 p p.1
img page.1 img page.1
page page.1 page page.1
psv page.1 psv page.1
netkey passwd.1
passwd passwd.1
pem pem.1
pemdecode pem.1
pemencode pem.1
pic pic.1 pic pic.1
tpic pic.1 tpic pic.1
plot plot.1 plot plot.1
@ -144,8 +148,21 @@ shift rc.1
wait rc.1 wait rc.1
whatis rc.1 whatis rc.1
~ rc.1 ~ rc.1
readcons readcons.1
rio rio.1 rio rio.1
rm rm.1 rm rm.1
asn12dsa rsa.1
asn12rsa rsa.1
dsa2pub rsa.1
dsa2ssh rsa.1
dsagen rsa.1
rsa rsa.1
rsa2csr rsa.1
rsa2pub rsa.1
rsa2ssh rsa.1
rsa2x509 rsa.1
rsafill rsa.1
rsagen rsa.1
B sam.1 B sam.1
E sam.1 E sam.1
sam sam.1 sam sam.1
@ -154,6 +171,7 @@ samsave sam.1
samterm sam.1 samterm sam.1
scat scat.1 scat scat.1
aescbc secstore.1 aescbc secstore.1
ipso secstore.1
secstore secstore.1 secstore secstore.1
secstored secstored.1 secstored secstored.1
secuser secstored.1 secuser secstored.1
@ -165,6 +183,7 @@ spell spell.1
sprog spell.1 sprog spell.1
split split.1 split split.1
src src.1 src src.1
ssh-agent ssh-agent.1
auxstats stats.1 auxstats stats.1
stats stats.1 stats stats.1
strings strings.1 strings strings.1

View file

@ -1,20 +0,0 @@
.TH NETKEY 1
.SH NAME
netkey \- challenge-response authentication
.SH SYNOPSIS
.PP
.B netkey
.SH DESCRIPTION
.PP
.I Netkey
prompts for a password to encrypt network challenges.
It is a substitute for a SecureNet box.
.SH SOURCE
.B \*9/src/cmd/netkey.c
.SH "SEE ALSO"
.IR encrypt (3)
.PP
Robert Morris and Ken Thompson,
``UNIX Password Security,''
.I AT&T Bell Laboratories Technical Journal
Vol 63 (1984), pp. 1649-1672

View file

@ -1,4 +1,4 @@
.TH PEM 8 .TH PEM 1
.SH NAME .SH NAME
pemdecode, pemencode \- encode files in Privacy Enhanced Mail (PEM) format pemdecode, pemencode \- encode files in Privacy Enhanced Mail (PEM) format
.SH SYNOPSIS .SH SYNOPSIS
@ -20,7 +20,7 @@ Privacy Enhanced Mail program but now commonly used for
other applications, notably TLS. other applications, notably TLS.
PEM encodes data in base 64 PEM encodes data in base 64
(see (see
.IR encode (2)) .IR encode (3))
between lines of the form: between lines of the form:
.IP .IP
.EX .EX
@ -33,7 +33,7 @@ where
may be any string describing the encoded data. may be any string describing the encoded data.
The most common use of PEM format on Plan 9 is for encoding The most common use of PEM format on Plan 9 is for encoding
X.509 certificates; see X.509 certificates; see
.IR rsa (8). .IR rsa (1).
.PP .PP
.I Pemdecode .I Pemdecode
extracts the named extracts the named

30
man/man1/readcons.1 Normal file
View file

@ -0,0 +1,30 @@
.TH READCONS 1
.SH NAME
readcons \- prompt console for input
.SH SYNOPSIS
.B readcons
[
.B -d
.I default
]
[
.B -s
]
.I prompt
.SH DESCRIPTION
.I Readcons
prompts at the console for input, copying the typed string
to standard output.
If the
.B -s
flag is given, the input is not displayed (secret).
If the user types an empty string (just a newline) and
the
.B -d
option is given, then
.I default
is printed instead of an empty string.
.SH SOURCE
.B \*9/src/cmd/readcons.c
.SH SEE ALSO
.IR readcons (3)

View file

@ -1,4 +1,4 @@
.TH RSA 8 .TH RSA 1
.SH NAME .SH NAME
dsagen, rsagen, rsafill, asn12dsa, asn12rsa, dsa2pub, rsa2csr, rsa2pub, dsa2ssh, rsa2ssh, rsa2x509 \- generate and format dsa and rsa keys dsagen, rsagen, rsafill, asn12dsa, asn12rsa, dsa2pub, rsa2csr, rsa2pub, dsa2ssh, rsa2ssh, rsa2x509 \- generate and format dsa and rsa keys
.SH SYNOPSIS .SH SYNOPSIS
@ -305,9 +305,9 @@ load them into factotum,
and configure a remote Unix system to allow those keys for logins: and configure a remote Unix system to allow those keys for logins:
.IP .IP
.EX .EX
rsagen -t 'service=ssh' >rsa1 rsagen -t 'service=ssh role=decrypt' >rsa1
rsagen -t 'service=ssh-rsa' >rsa2 rsagen -t 'service=ssh-rsa role=sign' >rsa2
dsagen -t 'service=ssh-dss' >dsa2 dsagen -t 'service=ssh-dss role=sign' >dsa2
.EE .EE
.PP .PP
Convert existing Unix SSH version 2 keys instead of generating new ones: Convert existing Unix SSH version 2 keys instead of generating new ones:

View file

@ -188,7 +188,9 @@ newly created files are ignored.
encrypts and decrypts using AES (Rijndael) in cipher encrypts and decrypts using AES (Rijndael) in cipher
block chaining (CBC) mode. block chaining (CBC) mode.
.SH SOURCE .SH SOURCE
.B \*9/src/cmd/secstore .B \*9/bin/ipso
.br
.B \*9/src/cmd/auth/secstore
.SH SEE ALSO .SH SEE ALSO
.IR factotum (4), .IR factotum (4),
.IR secstored (1) .IR secstored (1)

View file

@ -59,6 +59,6 @@ users' files
.B \*9/ndb/auth .B \*9/ndb/auth
for mapping local userid to RADIUS userid for mapping local userid to RADIUS userid
.SH SOURCE .SH SOURCE
.B \*9/src/cmd/secstore .B \*9/src/cmd/auth/secstore
.SH SEE ALSO .SH SEE ALSO
.IR secstore (1) .IR secstore (1)

View file

@ -282,6 +282,8 @@ accept dial.3
announce dial.3 announce dial.3
dial dial.3 dial dial.3
dialparse dial.3 dialparse dial.3
freenetconninfo dial.3
getnetconninfo dial.3
listen dial.3 listen dial.3
netmkaddr dial.3 netmkaddr dial.3
reject dial.3 reject dial.3
@ -340,6 +342,7 @@ stringnbg draw.3
stringnbgop draw.3 stringnbgop draw.3
stringnop draw.3 stringnop draw.3
stringop draw.3 stringop draw.3
asn1toDSApriv dsa.3
dsa dsa.3 dsa dsa.3
dsagen dsa.3 dsagen dsa.3
dsaprivalloc dsa.3 dsaprivalloc dsa.3

View file

@ -212,7 +212,7 @@ to recieve an answer.
.SH SOURCE .SH SOURCE
.B \*9/src/libauthsrv .B \*9/src/libauthsrv
.SH SEE ALSO .SH SEE ALSO
.IR netkey (1), .IR passwd (1),
.IR dial (3), .IR dial (3),
Plan 9's Plan 9's
\fIauthsrv\fR(6). \fIauthsrv\fR(6).

View file

@ -1,6 +1,6 @@
.TH DIAL 3 .TH DIAL 3
.SH NAME .SH NAME
dial, announce, listen, accept, reject, netmkaddr, dialparse \- make and break network connections dial, announce, listen, accept, reject, netmkaddr, getnetconninfo, freenetconninfo, dialparse \- make and break network connections
.SH SYNOPSIS .SH SYNOPSIS
.B #include <u.h> .B #include <u.h>
.br .br
@ -26,12 +26,12 @@ char* netmkaddr(char *addr, char *defnet, char *defservice)
.\" .PP .\" .PP
.\" .B .\" .B
.\" void setnetmtpt(char *to, int tolen, char *from) .\" void setnetmtpt(char *to, int tolen, char *from)
.\" .PP .PP
.\" .B .B
.\" NetConnInfo* getnetconninfo(char *conndir, int fd) NetConnInfo* getnetconninfo(char *dir, int fd)
.\" .PP .PP
.\" .B .B
.\" void freenetconninfo(NetConnINfo*) void freenetconninfo(NetConnINfo*)
.PP .PP
.B .B
int dialparse(char *addr, char **net, char **unix, int dialparse(char *addr, char **net, char **unix,
@ -94,19 +94,19 @@ will try in succession all
networks in common between source and destination networks in common between source and destination
until a call succeeds. until a call succeeds.
It returns a file descriptor open for reading and writing the It returns a file descriptor open for reading and writing the
.B data call.
file in the line directory. .\" .B data
The .\" file in the line directory.
.B addr .\" The
file in the line directory contains the address called. .\" .B addr
.\" If the network allows the local address to be set, .\" file in the line directory contains the address called.
.\" as is the case with UDP and TCP port numbers, and If the network allows the local address to be set,
.\" .IR local as is the case with UDP and TCP port numbers, and
.\" is non-zero, the local address will be set to .IR local
.\" .IR local . is non-zero, the local address will be set to
.IR local .
.IR Dial 's .IR Dial 's
.IR local , .IR dir
.IR dir ,
and and
.I cfdp .I cfdp
arguments arguments
@ -166,39 +166,41 @@ It returns a pointer to static data holding the actual address to use.
parses a network address as described above parses a network address as described above
into a network name, a Unix domain socket address, into a network name, a Unix domain socket address,
an IPv4 host address, and an IPv4 port number. an IPv4 host address, and an IPv4 port number.
.\" .PP .PP
.\" .I Getnetconninfo .I Getnetconninfo
.\" returns a structure containing information about a returns a structure containing information about a
.\" network connection. The structure is: network connection. The structure is:
.\" .EX .PP
.\" typedef struct NetConnInfo NetConnInfo; .EX
.\" struct NetConnInfo typedef struct NetConnInfo NetConnInfo;
.\" { struct NetConnInfo
.\" char *dir; /* connection directory */ {
.\" char *root; /* network root */ char *dir; /* connection directory */
.\" char *spec; /* binding spec */ char *root; /* network root */
.\" char *lsys; /* local system */ char *spec; /* binding spec */
.\" char *lserv; /* local service */ char *lsys; /* local system */
.\" char *rsys; /* remote system */ char *lserv; /* local service */
.\" char *rserv; /* remote service */ char *rsys; /* remote system */
.\" }; char *rserv; /* remote service */
.\" .EE char *laddr; /* local address */
.\" .PP char *raddr; /* remote address */
.\" The information is obtained from the connection directory, };
.\" .IR conndir . .EE
.\" If .PP
.\" .I conndir The information is obtained from the
.\" is nil, the directory is obtained by performing `line directory'
.\" .IR fd2path (3) .IR dir ,
.\" on or if
.\" .IR fd . .I dir
.\" .I Getnetconninfo is nil, from the connection file descriptor
.\" returns either a completely specified structure, or .IR fd .
.\" nil if either the structure can't be allocated or the .I Getnetconninfo
.\" network directory can't be determined. returns either a completely specified structure, or
.\" The structure nil if either the structure can't be allocated or the
.\" is freed using network directory can't be determined.
.\" .IR freenetconninfo . The structure
is freed using
.IR freenetconninfo .
.\" .PP .\" .PP
.\" .I Setnetmtpt .\" .I Setnetmtpt
.\" copies the name of the network mount point into .\" copies the name of the network mount point into
@ -307,6 +309,8 @@ bekremvax(void)
.B \*9/src/lib9/announce.c .B \*9/src/lib9/announce.c
.br .br
.B \*9/src/lib9/_p9dialparse.c .B \*9/src/lib9/_p9dialparse.c
.br
.B \*9/src/lib9/getnetconn.c
.SH DIAGNOSTICS .SH DIAGNOSTICS
.IR Dial , .IR Dial ,
.IR announce , .IR announce ,

View file

@ -1,6 +1,6 @@
.TH DSA 3 .TH DSA 3
.SH NAME .SH NAME
dsagen, dsasign, dsaverify, dsapuballoc, dsapubfree, dsaprivalloc, dsaprivfree, dsasigalloc, dsasigfree, dsaprivtopub - digital signature algorithm asn1toDSApriv, dsagen, dsasign, dsaverify, dsapuballoc, dsapubfree, dsaprivalloc, dsaprivfree, dsasigalloc, dsasigfree, dsaprivtopub - digital signature algorithm
.SH SYNOPSIS .SH SYNOPSIS
.B #include <u.h> .B #include <u.h>
.br .br
@ -39,6 +39,9 @@ void dsasigfree(DSAsig*)
.PP .PP
.B .B
DSApub* dsaprivtopub(DSApriv*) DSApub* dsaprivtopub(DSApriv*)
.PP
.B
DSApriv* asn1toDSApriv(uchar *priv, int npriv)
.SH DESCRIPTION .SH DESCRIPTION
.PP .PP
DSA is the NIST approved digital signature algorithm. The owner of a key publishes DSA is the NIST approved digital signature algorithm. The owner of a key publishes
@ -120,6 +123,13 @@ The routines
and and
.I dsasigfree .I dsasigfree
are provided to manage signature storage. are provided to manage signature storage.
.PP
.I Asn1toDSApriv
converts an ASN1 formatted DSA private key into the corresponding
.B DSApriv
structure; see
.IR rsa (3)
for other ASN1 routines.
.SH SOURCE .SH SOURCE
.B \*9/src/libsec .B \*9/src/libsec
.SH SEE ALSO .SH SEE ALSO

View file

@ -29,7 +29,9 @@ If
is non-zero, the input is not echoed to the screen. is non-zero, the input is not echoed to the screen.
.SH EXAMPLE .SH EXAMPLE
A stripped-down version of A stripped-down version of
.IR netkey (1): .I netkey
(see
.IR passwd (1)):
.IP .IP
.EX .EX
pass = readcons("password", nil, 1); pass = readcons("password", nil, 1);

View file

@ -704,10 +704,10 @@ are intended to be proxied via
.I auth_proxy .I auth_proxy
(see (see
.IR auth (3)). .IR auth (3)).
The protocols follow .\" The protocols follow
.IR p9any (7) .\" .IR p9any (7)
and .\" and
.IR p9sk1 (7). .\" .IR p9sk1 (7).
.\" XXX - write about how server keys are selected and used .\" XXX - write about how server keys are selected and used
.\" XXX - write about protocol itself .\" XXX - write about protocol itself
.\" XXX - write about server ai .\" XXX - write about server ai
@ -1017,4 +1017,6 @@ parseable with
.IR tokenize . .IR tokenize .
The response is a hexadecimal string of length 32. The response is a hexadecimal string of length 32.
.SH SOURCE .SH SOURCE
.B \*9/src/cmd/factotum .B \*9/src/cmd/auth/factotum
.SH SEE ALSO
.IR ssh-agent (1)