This commit is contained in:
rsc 2005-02-11 19:43:43 +00:00
parent a82a959b3a
commit 83c4506aa5
18 changed files with 158 additions and 31 deletions

38
dist/checkman.awk vendored
View file

@ -38,6 +38,7 @@ BEGIN {
Omitman["lp(1)"] = 1 Omitman["lp(1)"] = 1
Omitman["lpr(1)"] = 1 Omitman["lpr(1)"] = 1
Omitman["mail(1)"] = 1 Omitman["mail(1)"] = 1
Omitman["make(1)"] = 1
Omitman["nm(1)"] = 1 Omitman["nm(1)"] = 1
Omitman["prof(1)"] = 1 Omitman["prof(1)"] = 1
Omitman["pwd(1)"] = 1 Omitman["pwd(1)"] = 1
@ -48,6 +49,7 @@ BEGIN {
Omitman["tar(1)"] = 1 Omitman["tar(1)"] = 1
Omitman["tex(1)"] = 1 Omitman["tex(1)"] = 1
Omitman["unutf(1)"] = 1 Omitman["unutf(1)"] = 1
Omitman["vnc(1)"] = 1
Omitman["xterm(1)"] = 1 Omitman["xterm(1)"] = 1
Omitman["access(2)"] = 1 Omitman["access(2)"] = 1
@ -93,9 +95,25 @@ BEGIN {
# don't need documentation for these in bin # don't need documentation for these in bin
Omitted[".cvsignore"] = 1 Omitted[".cvsignore"] = 1
Omitted["Getdir"] = 1 Omitted["Getdir"] = 1
Omitted["Irc"] = 1
Omitted["Juke"] = 1
Omitted["ajuke"] = 1
Omitted["goodmk"] = 1
Omitted["jukefmt"] = 1
Omitted["jukeget"] = 1
Omitted["jukeindex"] = 1
Omitted["jukeinfo"] = 1
Omitted["jukeplay"] = 1
Omitted["jukeput"] = 1
Omitted["jukesearch"] = 1
Omitted["jukesongfile"] = 1
Omitted["m4ainfo"] = 1
Omitted["mp3info"] = 1
Omitted["notes"] = 1
Omitted["tcolors"] = 1 Omitted["tcolors"] = 1
Omitted["tref"] = 1 Omitted["tref"] = 1
Omitted["unutf"] = 1 Omitted["unutf"] = 1
Omitted["volume"] = 1
Omitted["vtdump"] = 1 Omitted["vtdump"] = 1
# not for users # not for users
@ -104,6 +122,8 @@ BEGIN {
Omittedlib["bouncemouse"] = 1 Omittedlib["bouncemouse"] = 1
Omittedlib["main"] = 1 # in libthread Omittedlib["main"] = 1 # in libthread
Omittedlib["opasstokey"] = 1 # in libauthsrv
# functions provided for -lthread_db # functions provided for -lthread_db
Omittedlib["ps_get_thread_area"] = 1 Omittedlib["ps_get_thread_area"] = 1
Omittedlib["ps_getpid"] = 1 Omittedlib["ps_getpid"] = 1
@ -174,6 +194,16 @@ BEGIN {
Omittedlib["symelf"] = 1 Omittedlib["symelf"] = 1
Omittedlib["symmacho"] = 1 Omittedlib["symmacho"] = 1
Omittedlib["symstabs"] = 1 Omittedlib["symstabs"] = 1
Omittedlib["elfcorelinux386"] = 1
Omittedlib["linux2ureg386"] = 1
Omittedlib["ureg2linux386"] = 1
Omittedlib["coreregs"] = 1 # haven't documented mach yet
Omittedlib["regdesc"] = 1
Omittedlib["auth_attr"] = 1 # not happy about this
Omittedlib["ndbnew"] = 1 # private to library
Omittedlib["ndbsetval"] = 1
Renamelib["chanalt"] = "alt" Renamelib["chanalt"] = "alt"
Renamelib["channbrecv"] = "nbrecv" Renamelib["channbrecv"] = "nbrecv"
@ -333,6 +363,8 @@ $0 ~ /^\.[A-Z].*\([1-9]\)/ {
name = $3 name = $3
section = "9" section = "9"
} else { } else {
if ($1 == ".HR" && $3 == "\"Section")
next;
print "Possible bad cross-reference format in", FILENAME ":" FNR print "Possible bad cross-reference format in", FILENAME ":" FNR
print $0 print $0
next next
@ -391,8 +423,8 @@ END {
getnmlist("lib/lib9p.a") getnmlist("lib/lib9p.a")
getnmlist("lib/lib9pclient.a") getnmlist("lib/lib9pclient.a")
getnmlist("lib/libString.a") getnmlist("lib/libString.a")
# getnmlist("lib/libauth.a") getnmlist("lib/libauth.a")
# getnmlist("lib/libauthsrv.a") getnmlist("lib/libauthsrv.a")
getnmlist("lib/libbin.a") getnmlist("lib/libbin.a")
getnmlist("lib/libbio.a") getnmlist("lib/libbio.a")
getnmlist("lib/libcomplete.a") getnmlist("lib/libcomplete.a")
@ -410,7 +442,7 @@ END {
# getnmlist("lib/libmemlayer.a") # getnmlist("lib/libmemlayer.a")
getnmlist("lib/libmp.a") getnmlist("lib/libmp.a")
getnmlist("lib/libmux.a") getnmlist("lib/libmux.a")
# getnmlist("lib/libndb.a") getnmlist("lib/libndb.a")
getnmlist("lib/libplumb.a") getnmlist("lib/libplumb.a")
getnmlist("lib/libregexp9.a") getnmlist("lib/libregexp9.a")
getnmlist("lib/libsec.a") getnmlist("lib/libsec.a")

View file

@ -108,6 +108,13 @@ dump9660 mk9660.1
mk9660 mk9660.1 mk9660 mk9660.1
mkdir mkdir.1 mkdir mkdir.1
namespace namespace.1 namespace namespace.1
ndb ndb.1
ndbipquery ndb.1
ndbmkdb ndb.1
ndbmkhash ndb.1
ndbmkhosts ndb.1
ndbquery ndb.1
netkey netkey.1
news news.1 news news.1
p p.1 p p.1
img page.1 img page.1
@ -147,8 +154,9 @@ samsave sam.1
samterm sam.1 samterm sam.1
scat scat.1 scat scat.1
aescbc secstore.1 aescbc secstore.1
ipso secstore.1
secstore secstore.1 secstore secstore.1
secstored secstored.1
secuser secstored.1
sed sed.1 sed sed.1
seq seq.1 seq seq.1
sleep sleep.1 sleep sleep.1
@ -164,6 +172,7 @@ md5sum sum.1
sha1sum sum.1 sha1sum sum.1
sum sum.1 sum sum.1
tail tail.1 tail tail.1
tar tar.1
tbl tbl.1 tbl tbl.1
tcs tcs.1 tcs tcs.1
tee tee.1 tee tee.1

View file

@ -26,7 +26,7 @@ The network database holds administrative information used by
(see (see
.IR authsrv (3)) .IR authsrv (3))
and and
.I secstored (1). .IR secstored (1).
.PP .PP
.I Ndbquery .I Ndbquery
searches the database for an attribute of type searches the database for an attribute of type
@ -46,7 +46,7 @@ of all the matched entries is returned.
uses uses
.I ndbipinfo .I ndbipinfo
(see (see
.IR ndb (2)) .IR ndb (3))
to search for the values of the attributes to search for the values of the attributes
.I rattr .I rattr
corresponding to the system corresponding to the system

View file

@ -97,7 +97,7 @@ Option
.B -n .B -n
says that the password should be read from NVRAM says that the password should be read from NVRAM
(see (see
.IR authsrv (2)) .IR authsrv (3))
instead of from instead of from
.BR /dev/tty . .BR /dev/tty .
.PP .PP

View file

@ -1,4 +1,4 @@
.TH SECSTORED 8 .TH SECSTORED 1
.SH NAME .SH NAME
secstored, secuser \- secstore commands secstored, secuser \- secstore commands
.SH SYNOPSIS .SH SYNOPSIS

View file

@ -152,15 +152,17 @@ can be used to copy hierarchies thus:
.SH SOURCE .SH SOURCE
.B \*9/src/cmd/tar.c .B \*9/src/cmd/tar.c
.SH SEE ALSO .SH SEE ALSO
.IR ar (1), .I 9ar
in
.IR 9c (1),
.IR bundle (1) .IR bundle (1)
.SH BUGS .SH BUGS
There is no way to ask for any but the last There is no way to ask for any but the last
occurrence of a file. occurrence of a file.
.br .PP
File path names are limited to File path names are limited to
100 characters 100 characters
(256 when using ustar format). (256 when using ustar format).
.br .PP
The tar format allows specification of links and symbolic links, The tar format allows specification of links and symbolic links,
concepts foreign to Plan 9: they are ignored. concepts foreign to Plan 9: they are ignored.

View file

@ -1,6 +1,6 @@
.TH 9PCLIENT 3 .TH 9PCLIENT 3
.SH NAME .SH NAME
CFid, CFsys, fsinit, fsmount, fsroot, fssetroot, fsunmount, nsmount, fsversion, fsauth, fsattach, fsclose, fscreate, fsdirread, fsdirreadall, fsdirstat, fsdirfstat, fsdirwstat, fsdirfwstat, fsopen, fsopenfd, fspread, fspwrite, fsread, fsreadn, fsseek, fswrite \- 9P client library CFid, CFsys, fsinit, fsmount, fsroot, fssetroot, fsunmount, nsinit, nsmount, fsversion, fsauth, fsattach, fsclose, fscreate, fsdirread, fsdirreadall, fsdirstat, fsdirfstat, fsdirwstat, fsdirfwstat, fsopen, nsopen, fsopenfd, fspread, fspwrite, fsread, fsreadn, fsseek, fswrite \- 9P client library
.SH SYNOPSIS .SH SYNOPSIS
.B #include <u.h> .B #include <u.h>
.PP .PP

View file

@ -79,11 +79,14 @@ fspwrite 9pclient.3
fsread 9pclient.3 fsread 9pclient.3
fsreadn 9pclient.3 fsreadn 9pclient.3
fsroot 9pclient.3 fsroot 9pclient.3
fsseek 9pclient.3
fssetroot 9pclient.3 fssetroot 9pclient.3
fsunmount 9pclient.3 fsunmount 9pclient.3
fsversion 9pclient.3 fsversion 9pclient.3
fswrite 9pclient.3 fswrite 9pclient.3
nsinit 9pclient.3
nsmount 9pclient.3 nsmount 9pclient.3
nsopen 9pclient.3
Dx addpt.3 Dx addpt.3
Dy addpt.3 Dy addpt.3
Pt addpt.3 Pt addpt.3
@ -165,6 +168,42 @@ strtol atof.3
strtoll atof.3 strtoll atof.3
strtoul atof.3 strtoul atof.3
strtoull atof.3 strtoull atof.3
amount_getkey auth.3
auth auth.3
auth_allocrpc auth.3
auth_challenge auth.3
auth_chuid auth.3
auth_freeAI auth.3
auth_freechal auth.3
auth_freerpc auth.3
auth_getinfo auth.3
auth_getkey auth.3
auth_getuserpasswd auth.3
auth_proxy auth.3
auth_respond auth.3
auth_response auth.3
auth_rpc auth.3
auth_userpasswd auth.3
fauth_proxy auth.3
fsamount auth.3
fsauth_proxy auth.3
fsfauth_proxy auth.3
nsamount auth.3
_asgetticket authsrv.3
_asrdresp authsrv.3
authdial authsrv.3
authsrv authsrv.3
convA2M authsrv.3
convM2A authsrv.3
convM2PR authsrv.3
convM2T authsrv.3
convM2TR authsrv.3
convPR2M authsrv.3
convT2M authsrv.3
convTR2M authsrv.3
nvcsum authsrv.3
passtokey authsrv.3
readnvram authsrv.3
bin bin.3 bin bin.3
binalloc bin.3 binalloc bin.3
binfree bin.3 binfree bin.3
@ -334,6 +373,9 @@ enc32 encode.3
enc64 encode.3 enc64 encode.3
encode encode.3 encode encode.3
encodefmt encode.3 encodefmt encode.3
decrypt encrypt.3
encrypt encrypt.3
netcrypt encrypt.3
errstr errstr.3 errstr errstr.3
rerrstr errstr.3 rerrstr errstr.3
werrstr errstr.3 werrstr errstr.3
@ -813,6 +855,28 @@ NaN nan.3
isInf nan.3 isInf nan.3
isNaN nan.3 isNaN nan.3
nan nan.3 nan nan.3
ipattr ndb.3
ndb ndb.3
ndbcat ndb.3
ndbchanged ndb.3
ndbclose ndb.3
ndbconcatenate ndb.3
ndbdiscard ndb.3
ndbfindattr ndb.3
ndbfree ndb.3
ndbgetipaddr ndb.3
ndbgetval ndb.3
ndbgetvalue ndb.3
ndbhash ndb.3
ndbipinfo ndb.3
ndblookval ndb.3
ndbopen ndb.3
ndbparse ndb.3
ndbreopen ndb.3
ndbreorder ndb.3
ndbsearch ndb.3
ndbsnext ndb.3
ndbsubstitute ndb.3
needstack needstack.3 needstack needstack.3
atnotify notify.3 atnotify notify.3
noted notify.3 noted notify.3
@ -928,6 +992,7 @@ write read.3
RGB readcolmap.3 RGB readcolmap.3
readcolmap readcolmap.3 readcolmap readcolmap.3
writecolmap readcolmap.3 writecolmap readcolmap.3
readcons readcons.3
regcomp regexp.3 regcomp regexp.3
regcomplit regexp.3 regcomplit regexp.3
regcompnl regexp.3 regcompnl regexp.3
@ -1076,6 +1141,7 @@ subfontname subfont.3
uninstallsubfont subfont.3 uninstallsubfont subfont.3
writesubfont subfont.3 writesubfont subfont.3
sysfatal sysfatal.3 sysfatal sysfatal.3
syslog sysfatal.3
alt thread.3 alt thread.3
chancreate thread.3 chancreate thread.3
chanfree thread.3 chanfree thread.3

View file

@ -1,6 +1,6 @@
.TH AUTH 3 .TH AUTH 3
.SH NAME .SH NAME
auth_proxy, fauth_proxy, auth_allocrpc, auth_freerpc, auth_rpc, auth_getkey, amount_getkey, auth_freeAI, auth_chuid, auth_challenge, auth_response, auth_freechal, auth_respond, auth_userpasswd, auth_getuserpasswd, auth_getinfo\- routines for authenticating users auth_proxy, fauth_proxy, auth_allocrpc, auth_freerpc, auth_rpc, auth_getkey, amount_getkey, auth_freeAI, auth_chuid, auth_challenge, auth_response, auth_freechal, auth_respond, auth_userpasswd, auth_getuserpasswd, auth_getinfo, fsauth_proxy, fsfauth_proxy, fsamount, nsamount\- routines for authenticating users
.SH SYNOPSIS .SH SYNOPSIS
.nf .nf
.PP .PP
@ -80,6 +80,14 @@ AuthInfo* auth_getinfo(AuthRpc *rpc);
#include <9pclient.h> #include <9pclient.h>
.PP .PP
.B .B
AuthInfo* fsauth_proxy(CFid *fid, AuthGetkey *getkey, char *fmt, ...);
.PP
.B
AuthInfo* fsfauth_proxy(CFid *fid, AuthRpc *rpc, AuthGetkey *getkey,
.br
.B char *params);
.PP
.B
CFsys* fsamount(int fd, char *aname); CFsys* fsamount(int fd, char *aname);
.PP .PP
.B .B
@ -204,7 +212,7 @@ file, as opened by
An An
.B sprint .B sprint
(see (see
.IR print (2)) .IR print (3))
of of
.I fmt .I fmt
and the variable arg list yields a key template (see and the variable arg list yields a key template (see
@ -400,6 +408,19 @@ Similary
.I auth_freechal .I auth_freechal
frees a challenge/response state. frees a challenge/response state.
.PP .PP
.I Fsauth_proxy
and
.I fsfauth_proxy
are like
.I auth_proxy
and
.I fauth_proxy
but execute the protocol on a
.B CFid*
(see
.IR 9pclient (3))
instead of a file descriptor.
.PP
.I Fsamount .I Fsamount
and and
.I nsamount .I nsamount

View file

@ -133,8 +133,8 @@ first to succeed:
\- the partition named by the \- the partition named by the
.B $nvram .B $nvram
environment variable environment variable
(commonly set via .\" (commonly set via
.IR plan9.ini (8)) .\" .IR plan9.ini (8))
.br .br
\- the partition \- the partition
.B #S/sdC0/nvram .B #S/sdC0/nvram

View file

@ -1,4 +1,4 @@
.TH ENCRYPT 2 .TH ENCRYPT 3
.SH NAME .SH NAME
encrypt, decrypt, netcrypt \- DES encryption encrypt, decrypt, netcrypt \- DES encryption
.SH SYNOPSIS .SH SYNOPSIS
@ -59,7 +59,7 @@ hexadecimal numbers,
and the string is copied into and the string is copied into
.IR data . .IR data .
.SH SOURCE .SH SOURCE
.B /sys/src/libc/port .B \*9/src/lib9
.SH DIAGNOSTICS .SH DIAGNOSTICS
These routines return 1 if the data was encrypted, These routines return 1 if the data was encrypted,
and 0 if the encryption fails. and 0 if the encryption fails.

View file

@ -407,3 +407,5 @@ This man page needs to describe
.B Regs .B Regs
and and
.B Regdesc .B Regdesc
and
.I coreregs.

View file

@ -88,13 +88,13 @@ Ndbtuple* ndbsubstitute(Ndbtuple *t, Ndbtuple *from, Ndbtuple *to);
These routines are used by network administrative programs to search These routines are used by network administrative programs to search
the network database. the network database.
They operate on the database files described in They operate on the database files described in
.IR ndb (6). .IR ndb (7).
.PP .PP
.I Ndbopen .I Ndbopen
opens the database opens the database
.I file .I file
and calls and calls
.IR malloc (2) .IR malloc (3)
to allocate a buffer for it. to allocate a buffer for it.
If If
.I file .I file
@ -128,7 +128,7 @@ is used to find each successive match.
On a successful search both return a linked list of On a successful search both return a linked list of
.I Ndbtuple .I Ndbtuple
structures acquired by structures acquired by
.IR malloc (2) .IR malloc (3)
that represent the attribute/value pairs in the that represent the attribute/value pairs in the
entry. entry.
On failure they return zero. On failure they return zero.

View file

@ -44,7 +44,7 @@ The message is a line with several fields:
the name of the machine writing the message; the name of the machine writing the message;
the date and time; the date and time;
the message specified by the the message specified by the
.IR print (2) .IR print (3)
format format
.I fmt .I fmt
and any following arguments; and any following arguments;

View file

@ -2,6 +2,7 @@
intro 0intro.4 intro 0intro.4
9pserve 9pserve.4 9pserve 9pserve.4
acme acme.4 acme acme.4
factotum factotum.4
import import.4 import import.4
plumber plumber.4 plumber plumber.4
ramfs ramfs.4 ramfs ramfs.4

View file

@ -323,7 +323,7 @@ for WEP encryption with the given password.
.PP .PP
All keys can have additional attibutes that act either as comments All keys can have additional attibutes that act either as comments
or as selectors to distinguish them in the or as selectors to distinguish them in the
.IR auth (2) .IR auth (3)
library calls. library calls.
.PP .PP
The factotum owner can use any key stored by factotum. The factotum owner can use any key stored by factotum.

View file

@ -8,6 +8,7 @@ image image.7
man man.7 man man.7
map map.7 map map.7
ms ms.7 ms ms.7
ndb ndb.7
plot plot.7 plot plot.7
plumb plumb.7 plumb plumb.7
regexp regexp.7 regexp regexp.7

View file

@ -59,7 +59,7 @@ Within tuples, pairs on the same line bind tighter than
pairs on different lines. pairs on different lines.
.PP .PP
Programs search the database directly using the routines in Programs search the database directly using the routines in
.IR ndb (2). .IR ndb (3).
.\" or indirectly using .\" or indirectly using
.\" .B ndb/cs .\" .B ndb/cs
.\" and .\" and
@ -214,13 +214,6 @@ less that 1024
.TP .TP
.B proto .B proto
a protocol supported by a host. a protocol supported by a host.
The pair
.B proto=il
is needed by
.I cs
(see
.IR ndb (8))
in tuples for hosts that support the IL protocol
.TP .TP
.B dnsdomain .B dnsdomain
a domain name that a domain name that