This commit is contained in:
rsc 2005-02-11 19:43:43 +00:00
parent a82a959b3a
commit 83c4506aa5
18 changed files with 158 additions and 31 deletions

38
dist/checkman.awk vendored
View file

@ -38,6 +38,7 @@ BEGIN {
Omitman["lp(1)"] = 1
Omitman["lpr(1)"] = 1
Omitman["mail(1)"] = 1
Omitman["make(1)"] = 1
Omitman["nm(1)"] = 1
Omitman["prof(1)"] = 1
Omitman["pwd(1)"] = 1
@ -48,6 +49,7 @@ BEGIN {
Omitman["tar(1)"] = 1
Omitman["tex(1)"] = 1
Omitman["unutf(1)"] = 1
Omitman["vnc(1)"] = 1
Omitman["xterm(1)"] = 1
Omitman["access(2)"] = 1
@ -93,9 +95,25 @@ BEGIN {
# don't need documentation for these in bin
Omitted[".cvsignore"] = 1
Omitted["Getdir"] = 1
Omitted["Irc"] = 1
Omitted["Juke"] = 1
Omitted["ajuke"] = 1
Omitted["goodmk"] = 1
Omitted["jukefmt"] = 1
Omitted["jukeget"] = 1
Omitted["jukeindex"] = 1
Omitted["jukeinfo"] = 1
Omitted["jukeplay"] = 1
Omitted["jukeput"] = 1
Omitted["jukesearch"] = 1
Omitted["jukesongfile"] = 1
Omitted["m4ainfo"] = 1
Omitted["mp3info"] = 1
Omitted["notes"] = 1
Omitted["tcolors"] = 1
Omitted["tref"] = 1
Omitted["unutf"] = 1
Omitted["volume"] = 1
Omitted["vtdump"] = 1
# not for users
@ -103,6 +121,8 @@ BEGIN {
Omittedlib["pixelbits"] = 1
Omittedlib["bouncemouse"] = 1
Omittedlib["main"] = 1 # in libthread
Omittedlib["opasstokey"] = 1 # in libauthsrv
# functions provided for -lthread_db
Omittedlib["ps_get_thread_area"] = 1
@ -174,6 +194,16 @@ BEGIN {
Omittedlib["symelf"] = 1
Omittedlib["symmacho"] = 1
Omittedlib["symstabs"] = 1
Omittedlib["elfcorelinux386"] = 1
Omittedlib["linux2ureg386"] = 1
Omittedlib["ureg2linux386"] = 1
Omittedlib["coreregs"] = 1 # haven't documented mach yet
Omittedlib["regdesc"] = 1
Omittedlib["auth_attr"] = 1 # not happy about this
Omittedlib["ndbnew"] = 1 # private to library
Omittedlib["ndbsetval"] = 1
Renamelib["chanalt"] = "alt"
Renamelib["channbrecv"] = "nbrecv"
@ -333,6 +363,8 @@ $0 ~ /^\.[A-Z].*\([1-9]\)/ {
name = $3
section = "9"
} else {
if ($1 == ".HR" && $3 == "\"Section")
next;
print "Possible bad cross-reference format in", FILENAME ":" FNR
print $0
next
@ -391,8 +423,8 @@ END {
getnmlist("lib/lib9p.a")
getnmlist("lib/lib9pclient.a")
getnmlist("lib/libString.a")
# getnmlist("lib/libauth.a")
# getnmlist("lib/libauthsrv.a")
getnmlist("lib/libauth.a")
getnmlist("lib/libauthsrv.a")
getnmlist("lib/libbin.a")
getnmlist("lib/libbio.a")
getnmlist("lib/libcomplete.a")
@ -410,7 +442,7 @@ END {
# getnmlist("lib/libmemlayer.a")
getnmlist("lib/libmp.a")
getnmlist("lib/libmux.a")
# getnmlist("lib/libndb.a")
getnmlist("lib/libndb.a")
getnmlist("lib/libplumb.a")
getnmlist("lib/libregexp9.a")
getnmlist("lib/libsec.a")

View file

@ -108,6 +108,13 @@ dump9660 mk9660.1
mk9660 mk9660.1
mkdir mkdir.1
namespace namespace.1
ndb ndb.1
ndbipquery ndb.1
ndbmkdb ndb.1
ndbmkhash ndb.1
ndbmkhosts ndb.1
ndbquery ndb.1
netkey netkey.1
news news.1
p p.1
img page.1
@ -147,8 +154,9 @@ samsave sam.1
samterm sam.1
scat scat.1
aescbc secstore.1
ipso secstore.1
secstore secstore.1
secstored secstored.1
secuser secstored.1
sed sed.1
seq seq.1
sleep sleep.1
@ -164,6 +172,7 @@ md5sum sum.1
sha1sum sum.1
sum sum.1
tail tail.1
tar tar.1
tbl tbl.1
tcs tcs.1
tee tee.1

View file

@ -26,7 +26,7 @@ The network database holds administrative information used by
(see
.IR authsrv (3))
and
.I secstored (1).
.IR secstored (1).
.PP
.I Ndbquery
searches the database for an attribute of type
@ -46,7 +46,7 @@ of all the matched entries is returned.
uses
.I ndbipinfo
(see
.IR ndb (2))
.IR ndb (3))
to search for the values of the attributes
.I rattr
corresponding to the system

View file

@ -97,7 +97,7 @@ Option
.B -n
says that the password should be read from NVRAM
(see
.IR authsrv (2))
.IR authsrv (3))
instead of from
.BR /dev/tty .
.PP

View file

@ -1,4 +1,4 @@
.TH SECSTORED 8
.TH SECSTORED 1
.SH NAME
secstored, secuser \- secstore commands
.SH SYNOPSIS

View file

@ -152,15 +152,17 @@ can be used to copy hierarchies thus:
.SH SOURCE
.B \*9/src/cmd/tar.c
.SH SEE ALSO
.IR ar (1),
.I 9ar
in
.IR 9c (1),
.IR bundle (1)
.SH BUGS
There is no way to ask for any but the last
occurrence of a file.
.br
.PP
File path names are limited to
100 characters
(256 when using ustar format).
.br
.PP
The tar format allows specification of links and symbolic links,
concepts foreign to Plan 9: they are ignored.

View file

@ -1,6 +1,6 @@
.TH 9PCLIENT 3
.SH NAME
CFid, CFsys, fsinit, fsmount, fsroot, fssetroot, fsunmount, nsmount, fsversion, fsauth, fsattach, fsclose, fscreate, fsdirread, fsdirreadall, fsdirstat, fsdirfstat, fsdirwstat, fsdirfwstat, fsopen, fsopenfd, fspread, fspwrite, fsread, fsreadn, fsseek, fswrite \- 9P client library
CFid, CFsys, fsinit, fsmount, fsroot, fssetroot, fsunmount, nsinit, nsmount, fsversion, fsauth, fsattach, fsclose, fscreate, fsdirread, fsdirreadall, fsdirstat, fsdirfstat, fsdirwstat, fsdirfwstat, fsopen, nsopen, fsopenfd, fspread, fspwrite, fsread, fsreadn, fsseek, fswrite \- 9P client library
.SH SYNOPSIS
.B #include <u.h>
.PP

View file

@ -79,11 +79,14 @@ fspwrite 9pclient.3
fsread 9pclient.3
fsreadn 9pclient.3
fsroot 9pclient.3
fsseek 9pclient.3
fssetroot 9pclient.3
fsunmount 9pclient.3
fsversion 9pclient.3
fswrite 9pclient.3
nsinit 9pclient.3
nsmount 9pclient.3
nsopen 9pclient.3
Dx addpt.3
Dy addpt.3
Pt addpt.3
@ -165,6 +168,42 @@ strtol atof.3
strtoll atof.3
strtoul atof.3
strtoull atof.3
amount_getkey auth.3
auth auth.3
auth_allocrpc auth.3
auth_challenge auth.3
auth_chuid auth.3
auth_freeAI auth.3
auth_freechal auth.3
auth_freerpc auth.3
auth_getinfo auth.3
auth_getkey auth.3
auth_getuserpasswd auth.3
auth_proxy auth.3
auth_respond auth.3
auth_response auth.3
auth_rpc auth.3
auth_userpasswd auth.3
fauth_proxy auth.3
fsamount auth.3
fsauth_proxy auth.3
fsfauth_proxy auth.3
nsamount auth.3
_asgetticket authsrv.3
_asrdresp authsrv.3
authdial authsrv.3
authsrv authsrv.3
convA2M authsrv.3
convM2A authsrv.3
convM2PR authsrv.3
convM2T authsrv.3
convM2TR authsrv.3
convPR2M authsrv.3
convT2M authsrv.3
convTR2M authsrv.3
nvcsum authsrv.3
passtokey authsrv.3
readnvram authsrv.3
bin bin.3
binalloc bin.3
binfree bin.3
@ -334,6 +373,9 @@ enc32 encode.3
enc64 encode.3
encode encode.3
encodefmt encode.3
decrypt encrypt.3
encrypt encrypt.3
netcrypt encrypt.3
errstr errstr.3
rerrstr errstr.3
werrstr errstr.3
@ -813,6 +855,28 @@ NaN nan.3
isInf nan.3
isNaN nan.3
nan nan.3
ipattr ndb.3
ndb ndb.3
ndbcat ndb.3
ndbchanged ndb.3
ndbclose ndb.3
ndbconcatenate ndb.3
ndbdiscard ndb.3
ndbfindattr ndb.3
ndbfree ndb.3
ndbgetipaddr ndb.3
ndbgetval ndb.3
ndbgetvalue ndb.3
ndbhash ndb.3
ndbipinfo ndb.3
ndblookval ndb.3
ndbopen ndb.3
ndbparse ndb.3
ndbreopen ndb.3
ndbreorder ndb.3
ndbsearch ndb.3
ndbsnext ndb.3
ndbsubstitute ndb.3
needstack needstack.3
atnotify notify.3
noted notify.3
@ -928,6 +992,7 @@ write read.3
RGB readcolmap.3
readcolmap readcolmap.3
writecolmap readcolmap.3
readcons readcons.3
regcomp regexp.3
regcomplit regexp.3
regcompnl regexp.3
@ -1076,6 +1141,7 @@ subfontname subfont.3
uninstallsubfont subfont.3
writesubfont subfont.3
sysfatal sysfatal.3
syslog sysfatal.3
alt thread.3
chancreate thread.3
chanfree thread.3

View file

@ -1,6 +1,6 @@
.TH AUTH 3
.SH NAME
auth_proxy, fauth_proxy, auth_allocrpc, auth_freerpc, auth_rpc, auth_getkey, amount_getkey, auth_freeAI, auth_chuid, auth_challenge, auth_response, auth_freechal, auth_respond, auth_userpasswd, auth_getuserpasswd, auth_getinfo\- routines for authenticating users
auth_proxy, fauth_proxy, auth_allocrpc, auth_freerpc, auth_rpc, auth_getkey, amount_getkey, auth_freeAI, auth_chuid, auth_challenge, auth_response, auth_freechal, auth_respond, auth_userpasswd, auth_getuserpasswd, auth_getinfo, fsauth_proxy, fsfauth_proxy, fsamount, nsamount\- routines for authenticating users
.SH SYNOPSIS
.nf
.PP
@ -80,6 +80,14 @@ AuthInfo* auth_getinfo(AuthRpc *rpc);
#include <9pclient.h>
.PP
.B
AuthInfo* fsauth_proxy(CFid *fid, AuthGetkey *getkey, char *fmt, ...);
.PP
.B
AuthInfo* fsfauth_proxy(CFid *fid, AuthRpc *rpc, AuthGetkey *getkey,
.br
.B char *params);
.PP
.B
CFsys* fsamount(int fd, char *aname);
.PP
.B
@ -204,7 +212,7 @@ file, as opened by
An
.B sprint
(see
.IR print (2))
.IR print (3))
of
.I fmt
and the variable arg list yields a key template (see
@ -400,6 +408,19 @@ Similary
.I auth_freechal
frees a challenge/response state.
.PP
.I Fsauth_proxy
and
.I fsfauth_proxy
are like
.I auth_proxy
and
.I fauth_proxy
but execute the protocol on a
.B CFid*
(see
.IR 9pclient (3))
instead of a file descriptor.
.PP
.I Fsamount
and
.I nsamount

View file

@ -133,8 +133,8 @@ first to succeed:
\- the partition named by the
.B $nvram
environment variable
(commonly set via
.IR plan9.ini (8))
.\" (commonly set via
.\" .IR plan9.ini (8))
.br
\- the partition
.B #S/sdC0/nvram

View file

@ -1,4 +1,4 @@
.TH ENCRYPT 2
.TH ENCRYPT 3
.SH NAME
encrypt, decrypt, netcrypt \- DES encryption
.SH SYNOPSIS
@ -59,7 +59,7 @@ hexadecimal numbers,
and the string is copied into
.IR data .
.SH SOURCE
.B /sys/src/libc/port
.B \*9/src/lib9
.SH DIAGNOSTICS
These routines return 1 if the data was encrypted,
and 0 if the encryption fails.

View file

@ -407,3 +407,5 @@ This man page needs to describe
.B Regs
and
.B Regdesc
and
.I coreregs.

View file

@ -88,13 +88,13 @@ Ndbtuple* ndbsubstitute(Ndbtuple *t, Ndbtuple *from, Ndbtuple *to);
These routines are used by network administrative programs to search
the network database.
They operate on the database files described in
.IR ndb (6).
.IR ndb (7).
.PP
.I Ndbopen
opens the database
.I file
and calls
.IR malloc (2)
.IR malloc (3)
to allocate a buffer for it.
If
.I file
@ -128,7 +128,7 @@ is used to find each successive match.
On a successful search both return a linked list of
.I Ndbtuple
structures acquired by
.IR malloc (2)
.IR malloc (3)
that represent the attribute/value pairs in the
entry.
On failure they return zero.

View file

@ -44,7 +44,7 @@ The message is a line with several fields:
the name of the machine writing the message;
the date and time;
the message specified by the
.IR print (2)
.IR print (3)
format
.I fmt
and any following arguments;

View file

@ -2,6 +2,7 @@
intro 0intro.4
9pserve 9pserve.4
acme acme.4
factotum factotum.4
import import.4
plumber plumber.4
ramfs ramfs.4

View file

@ -323,7 +323,7 @@ for WEP encryption with the given password.
.PP
All keys can have additional attibutes that act either as comments
or as selectors to distinguish them in the
.IR auth (2)
.IR auth (3)
library calls.
.PP
The factotum owner can use any key stored by factotum.

View file

@ -8,6 +8,7 @@ image image.7
man man.7
map map.7
ms ms.7
ndb ndb.7
plot plot.7
plumb plumb.7
regexp regexp.7

View file

@ -59,7 +59,7 @@ Within tuples, pairs on the same line bind tighter than
pairs on different lines.
.PP
Programs search the database directly using the routines in
.IR ndb (2).
.IR ndb (3).
.\" or indirectly using
.\" .B ndb/cs
.\" and
@ -214,13 +214,6 @@ less that 1024
.TP
.B proto
a protocol supported by a host.
The pair
.B proto=il
is needed by
.I cs
(see
.IR ndb (8))
in tuples for hosts that support the IL protocol
.TP
.B dnsdomain
a domain name that