1 .\" Copyright (c) 1992, 1993
2 .\" The Regents of the University of California. All rights reserved.
4 .\" This code is derived from software contributed to Berkeley by
5 .\" Casey Leedom of Lawrence Livermore National Laboratory.
7 .\" Redistribution and use in source and binary forms, with or without
8 .\" modification, are permitted provided that the following conditions
10 .\" 1. Redistributions of source code must retain the above copyright
11 .\" notice, this list of conditions and the following disclaimer.
12 .\" 2. Redistributions in binary form must reproduce the above copyright
13 .\" notice, this list of conditions and the following disclaimer in the
14 .\" documentation and/or other materials provided with the distribution.
15 .\" 3. All advertising materials mentioning features or use of this software
16 .\" must display the following acknowledgement:
17 .\" This product includes software developed by the University of
18 .\" California, Berkeley and its contributors.
19 .\" 4. Neither the name of the University nor the names of its contributors
20 .\" may be used to endorse or promote products derived from this software
21 .\" without specific prior written permission.
23 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
24 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
35 .\" @(#)getcap.3 8.4 (Berkeley) 5/13/94
36 .\" $FreeBSD: src/lib/libc/gen/getcap.3,v 1.25 2004/07/03 22:30:08 ru Exp $
52 .Nd capability database access routines
58 .Fn cgetent "char **buf" "char **db_array" "char *name"
60 .Fn cgetset "char *ent"
62 .Fn cgetmatch "char *buf" "char *name"
64 .Fn cgetcap "char *buf" "char *cap" "int type"
66 .Fn cgetnum "char *buf" "char *cap" "long *num"
68 .Fn cgetstr "char *buf" "char *cap" "char **str"
70 .Fn cgetustr "char *buf" "char *cap" "char **str"
72 .Fn cgetfirst "char **buf" "char **db_array"
74 .Fn cgetnext "char **buf" "char **db_array"
80 function extracts the capability
82 from the database specified by the
86 and returns a pointer to a
92 function will first look for files ending in
96 before accessing the ASCII file.
100 must be retained through all subsequent calls to
109 On success 0 is returned, 1 if the returned
110 record contains an unresolved
113 \-1 if the requested record couldn't be found,
114 \-2 if a system error was encountered (couldn't open/read a file, etc.) also
117 and \-3 if a potential reference loop is detected (see
123 function enables the addition of a character buffer containing a single capability
125 to the capability database.
126 Conceptually, the entry is added as the first ``file'' in the database, and
127 is therefore searched first on the call to
129 The entry is passed in
135 the current entry is removed from the database.
138 must precede the database traversal.
139 It must be called before the
142 If a sequential access is being performed (see below), it must be called
143 before the first sequential access call
147 or be directly preceded by a
150 On success 0 is returned and \-1 on failure.
154 function will return 0 if
156 is one of the names of the capability record
163 function searches the capability record
171 is specified using any single character.
172 If a colon (`:') is used, an
173 untyped capability will be searched for (see below for explanation of
175 A pointer to the value of
179 is returned on success,
181 if the requested capability couldn't be
183 The end of the capability value is signaled by a `:' or
186 (see below for capability database syntax).
190 function retrieves the value of the numeric capability
192 from the capability record pointed to by
194 The numeric value is returned in the
198 0 is returned on success, \-1 if the requested numeric capability couldn't
203 function retrieves the value of the string capability
205 from the capability record pointed to by
207 A pointer to a decoded,
211 copy of the string is returned in the
215 The number of characters in the decoded string not including the trailing
217 is returned on success, \-1 if the requested string capability couldn't
218 be found, \-2 if a system error was encountered (storage allocation
223 function is identical to
225 except that it does not expand special characters, but rather returns each
226 character of the capability string literally.
232 functions comprise a function group that provides for sequential
235 pointer terminated array of file names,
239 function returns the first record in the database and resets the access
243 function returns the next record in the database with respect to the
244 record returned by the previous
249 If there is no such previous call, the first record in the database is
251 Each record is returned in a
256 expansion is done (see
259 Upon completion of the database 0 is returned, 1 is returned upon successful
260 return of record with possibly more remaining (we haven't reached the end of
261 the database yet), 2 is returned if the record contains an unresolved
263 expansion, \-1 is returned if a system error occurred, and \-2
264 is returned if a potential reference loop is detected (see
267 Upon completion of database (0 return) the database is closed.
271 function closes the sequential access and frees any memory and file descriptors
273 Note that it does not erase the buffer pushed by a call to
275 .Sh CAPABILITY DATABASE SYNTAX
276 Capability databases are normally
278 and may be edited with standard
280 Blank lines and lines beginning with a `#' are comments
282 Lines ending with a `\|\e' indicate that the next line
283 is a continuation of the current line; the `\|\e' and following newline
285 Long lines are usually continued onto several physical
286 lines by ending each line except the last with a `\|\e'.
288 Capability databases consist of a series of records, one per logical
290 Each record contains a variable number of `:'-separated fields
292 Empty fields consisting entirely of white space
293 characters (spaces and tabs) are ignored.
295 The first capability of each record specifies its names, separated by `|'
297 These names are used to reference records in the database.
298 By convention, the last name is usually a comment and is not intended as
306 .Dl "d0\||\|vt100\||\|vt100-am\||\|vt100am\||\|dec vt100:"
308 giving four names that can be used to access the record.
310 The remaining non-empty capabilities describe a set of (name, value)
311 bindings, consisting of a names optionally followed by a typed value:
312 .Bl -column "nameTvalue"
313 .It name Ta "typeless [boolean] capability"
314 .Em name No "is present [true]"
315 .It name Ns Em \&T Ns value Ta capability
319 .It name@ Ta "no capability" Em name No exists
320 .It name Ns Em T Ns \&@ Ta capability
325 Names consist of one or more characters.
326 Names may contain any character
327 except `:', but it's usually best to restrict them to the printable
328 characters and avoid use of graphics like `#', `=', `%', `@', etc.
330 are single characters used to separate capability names from their
331 associated typed values.
332 Types may be any character except a `:'.
333 Typically, graphics like `#', `=', `%', etc.\& are used.
335 number of characters and may contain any character except `:'.
336 .Sh CAPABILITY DATABASE SEMANTICS
337 Capability records describe a set of (name, value) bindings.
339 have multiple values bound to them.
340 Different values for a name are
341 distinguished by their
345 function will return a pointer to a value of a name given the capability
346 name and the type of the value.
348 The types `#' and `=' are conventionally used to denote numeric and
349 string typed values, but no restriction on those types is enforced.
355 can be used to implement the traditional syntax and semantics of `#'
357 Typeless capabilities are typically used to denote boolean objects with
358 presence or absence indicating truth and false values respectively.
359 This interpretation is conveniently represented by:
361 .Dl "(getcap(buf, name, ':') != NULL)"
363 A special capability,
365 is used to indicate that the record specified by
367 should be substituted for the
371 capabilities may interpolate records which also contain
373 capabilities and more than one
375 capability may be used in a record.
378 expansion scope (i.e., where the argument is searched for) contains the
381 is declared and all subsequent files in the file array.
383 When a database is searched for a capability record, the first matching
384 record in the search is returned.
385 When a record is scanned for a
386 capability, the first matching capability is returned; the capability
388 will hide any following definition of a value of type
394 will prevent any following values of
398 These features combined with
400 capabilities can be used to generate variations of other databases and
401 records by either adding new capabilities, overriding definitions with new
402 definitions, or hiding following definitions via `@' capabilities.
404 .Bd -unfilled -offset indent
405 example\||\|an example of binding multiple values to names:\e
406 :foo%bar:foo^blah:foo@:\e
407 :abc%xyz:abc^frap:abc$@:\e
411 The capability foo has two values bound to it (bar of type `%' and blah of
412 type `^') and any other value bindings are hidden.
414 also has two values bound but only a value of type `$' is prevented from
415 being defined in the capability record more.
417 .Bd -unfilled -offset indent
419 new\||\|new_record\||\|a modification of "old":\e
420 :fript=bar:who-cares@:tc=old:blah:tc=extensions:
422 old\||\|old_record\||\|an old database record:\e
423 :fript=foo:who-cares:glork#200:
426 The records are extracted by calling
428 with file1 preceding file2.
429 In the capability record new in file1, fript=bar overrides the definition
430 of fript=foo interpolated from the capability record old in file2,
431 who-cares@ prevents the definition of any who-cares definitions in old
432 from being seen, glork#200 is inherited from old, and blah and anything
433 defined by the record extensions is added to those definitions in old.
434 Note that the position of the fript=bar and who-cares@ definitions before
435 tc=old is important here.
436 If they were after, the definitions in old
437 would take precedence.
438 .Sh CGETNUM AND CGETSTR SYNTAX AND SEMANTICS
439 Two types are predefined by
443 .Bl -column "nameXnumber"
445 .It Em name No \&# Em number Ta numeric
452 .It Em name No = Em string Ta "string capability"
458 .It Em name No \&#@ Ta "the numeric capability"
463 .It Em name No \&=@ Ta "the string capability"
469 Numeric capability values may be given in one of three numeric bases.
470 If the number starts with either
474 it is interpreted as a hexadecimal number (both upper and lower case a-f
475 may be used to denote the extended hexadecimal digits).
476 Otherwise, if the number starts with a
478 it is interpreted as an octal number.
479 Otherwise the number is interpreted as a decimal number.
481 String capability values may contain any character.
484 codes, new lines, and colons may be conveniently represented by the use
486 .Bl -column "\e\|X,X\e\|X" "(ASCII octal nnn)"
487 ^X ('X' & 037) control-X
488 \e\|b, \e\|B (ASCII 010) backspace
489 \e\|t, \e\|T (ASCII 011) tab
490 \e\|n, \e\|N (ASCII 012) line feed (newline)
491 \e\|f, \e\|F (ASCII 014) form feed
492 \e\|r, \e\|R (ASCII 015) carriage return
493 \e\|e, \e\|E (ASCII 027) escape
494 \e\|c, \e\|C (:) colon
495 \e\|\e (\e\|) back slash
497 \e\|nnn (ASCII octal nnn)
500 A `\|\e' may be followed by up to three octal digits directly specifies
501 the numeric code for a character.
506 encoded, causes all sorts of problems and must be used with care since
508 are typically used to denote the end of strings; many applications
509 use `\e\|200' to represent a
523 return a value greater than or equal to 0 on success and a value less
527 function returns a character pointer on success and a
535 functions may fail and set
537 for any of the errors specified for the library functions:
556 No memory to allocate.
562 Colons (`:') can't be used in names, types, or values.
564 There are no checks for
565 .Ic tc Ns = Ns Ic name
569 The buffer added to the database by a call to
571 is not unique to the database but is rather prepended to any database used.