xref: /freebsd/lib/libc/gen/getcap.3 (revision 5203edcdc553fda6caa1da8826a89b1a02dad1bf)
1.\" Copyright (c) 1992, 1993
2.\"	The Regents of the University of California.  All rights reserved.
3.\"
4.\" This code is derived from software contributed to Berkeley by
5.\" Casey Leedom of Lawrence Livermore National Laboratory.
6.\"
7.\" Redistribution and use in source and binary forms, with or without
8.\" modification, are permitted provided that the following conditions
9.\" are met:
10.\" 1. Redistributions of source code must retain the above copyright
11.\"    notice, this list of conditions and the following disclaimer.
12.\" 2. Redistributions in binary form must reproduce the above copyright
13.\"    notice, this list of conditions and the following disclaimer in the
14.\"    documentation and/or other materials provided with the distribution.
15.\" 3. All advertising materials mentioning features or use of this software
16.\"    must display the following acknowledgement:
17.\"	This product includes software developed by the University of
18.\"	California, Berkeley and its contributors.
19.\" 4. Neither the name of the University nor the names of its contributors
20.\"    may be used to endorse or promote products derived from this software
21.\"    without specific prior written permission.
22.\"
23.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
24.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26.\" ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33.\" SUCH DAMAGE.
34.\"
35.\"	@(#)getcap.3	8.4 (Berkeley) 5/13/94
36.\" $FreeBSD$
37.\"
38.Dd May 13, 1994
39.Dt GETCAP 3
40.Os
41.Sh NAME
42.Nm cgetent ,
43.Nm cgetset ,
44.Nm cgetmatch ,
45.Nm cgetcap ,
46.Nm cgetnum ,
47.Nm cgetstr ,
48.Nm cgetustr ,
49.Nm cgetfirst ,
50.Nm cgetnext ,
51.Nm cgetclose
52.Nd capability database access routines
53.Sh LIBRARY
54.Lb libc
55.Sh SYNOPSIS
56.In stdlib.h
57.Ft int
58.Fn cgetent "char **buf" "char **db_array" "char *name"
59.Ft int
60.Fn cgetset "char *ent"
61.Ft int
62.Fn cgetmatch "char *buf" "char *name"
63.Ft char *
64.Fn cgetcap "char *buf" "char *cap" "int type"
65.Ft int
66.Fn cgetnum "char *buf" "char *cap" "long *num"
67.Ft int
68.Fn cgetstr "char *buf" "char *cap" "char **str"
69.Ft int
70.Fn cgetustr "char *buf" "char *cap" "char **str"
71.Ft int
72.Fn cgetfirst "char **buf" "char **db_array"
73.Ft int
74.Fn cgetnext "char **buf" "char **db_array"
75.Ft int
76.Fn cgetclose "void"
77.Sh DESCRIPTION
78The
79.Fn cgetent
80function extracts the capability
81.Fa name
82from the database specified by the
83.Dv NULL
84terminated file array
85.Fa db_array
86and returns a pointer to a
87.Xr malloc 3 Ns \&'d
88copy of it in
89.Fa buf .
90The
91.Fn cgetent
92function will first look for files ending in
93.Pa .db
94(see
95.Xr cap_mkdb 1 )
96before accessing the ASCII file.
97The
98.Fa buf
99argument
100must be retained through all subsequent calls to
101.Fn cgetmatch ,
102.Fn cgetcap ,
103.Fn cgetnum ,
104.Fn cgetstr ,
105and
106.Fn cgetustr ,
107but may then be
108.Xr free 3 Ns \&'d .
109On success 0 is returned, 1 if the returned
110record contains an unresolved
111.Ic tc
112expansion,
113\-1 if the requested record couldn't be found,
114\-2 if a system error was encountered (couldn't open/read a file, etc.) also
115setting
116.Va errno ,
117and \-3 if a potential reference loop is detected (see
118.Ic tc=
119comments below).
120.Pp
121The
122.Fn cgetset
123function enables the addition of a character buffer containing a single capability
124record entry
125to the capability database.
126Conceptually, the entry is added as the first ``file'' in the database, and
127is therefore searched first on the call to
128.Fn cgetent .
129The entry is passed in
130.Fa ent .
131If
132.Fa ent
133is
134.Dv NULL ,
135the current entry is removed from the database.
136A call to
137.Fn cgetset
138must precede the database traversal.
139It must be called before the
140.Fn cgetent
141call.
142If a sequential access is being performed (see below), it must be called
143before the first sequential access call
144.Fn ( cgetfirst
145or
146.Fn cgetnext ) ,
147or be directly preceded by a
148.Fn cgetclose
149call.
150On success 0 is returned and \-1 on failure.
151.Pp
152The
153.Fn cgetmatch
154function will return 0 if
155.Fa name
156is one of the names of the capability record
157.Fa buf ,
158\-1 if
159not.
160.Pp
161The
162.Fn cgetcap
163function searches the capability record
164.Fa buf
165for the capability
166.Fa cap
167with type
168.Fa type .
169A
170.Fa type
171is specified using any single character.
172If a colon (`:') is used, an
173untyped capability will be searched for (see below for explanation of
174types).
175A pointer to the value of
176.Fa cap
177in
178.Fa buf
179is returned on success,
180.Dv NULL
181if the requested capability couldn't be
182found.
183The end of the capability value is signaled by a `:' or
184.Tn ASCII
185.Dv NUL
186(see below for capability database syntax).
187.Pp
188The
189.Fn cgetnum
190function retrieves the value of the numeric capability
191.Fa cap
192from the capability record pointed to by
193.Fa buf .
194The numeric value is returned in the
195.Ft long
196pointed to by
197.Fa num .
1980 is returned on success, \-1 if the requested numeric capability couldn't
199be found.
200.Pp
201The
202.Fn cgetstr
203function retrieves the value of the string capability
204.Fa cap
205from the capability record pointed to by
206.Fa buf .
207A pointer to a decoded,
208.Dv NUL
209terminated,
210.Xr malloc 3 Ns \&'d
211copy of the string is returned in the
212.Ft char *
213pointed to by
214.Fa str .
215The number of characters in the decoded string not including the trailing
216.Dv NUL
217is returned on success, \-1 if the requested string capability couldn't
218be found, \-2 if a system error was encountered (storage allocation
219failure).
220.Pp
221The
222.Fn cgetustr
223function is identical to
224.Fn cgetstr
225except that it does not expand special characters, but rather returns each
226character of the capability string literally.
227.Pp
228The
229.Fn cgetfirst
230and
231.Fn cgetnext
232functions comprise a function group that provides for sequential
233access of the
234.Dv NULL
235pointer terminated array of file names,
236.Fa db_array .
237The
238.Fn cgetfirst
239function returns the first record in the database and resets the access
240to the first record.
241The
242.Fn cgetnext
243function returns the next record in the database with respect to the
244record returned by the previous
245.Fn cgetfirst
246or
247.Fn cgetnext
248call.
249If there is no such previous call, the first record in the database is
250returned.
251Each record is returned in a
252.Xr malloc 3 Ns \&'d
253copy pointed to by
254.Fa buf .
255.Ic Tc
256expansion is done (see
257.Ic tc=
258comments below).
259Upon completion of the database 0 is returned,  1 is returned upon successful
260return of record with possibly more remaining (we haven't reached the end of
261the database yet), 2 is returned if the record contains an unresolved
262.Ic tc
263expansion, \-1 is returned if a system error occurred, and \-2
264is returned if a potential reference loop is detected (see
265.Ic tc=
266comments below).
267Upon completion of database (0 return) the database is closed.
268.Pp
269The
270.Fn cgetclose
271function closes the sequential access and frees any memory and file descriptors
272being used.
273Note that it does not erase the buffer pushed by a call to
274.Fn cgetset .
275.Sh CAPABILITY DATABASE SYNTAX
276Capability databases are normally
277.Tn ASCII
278and may be edited with standard
279text editors.
280Blank lines and lines beginning with a `#' are comments
281and are ignored.
282Lines ending with a `\|\e' indicate that the next line
283is a continuation of the current line; the `\|\e' and following newline
284are ignored.
285Long lines are usually continued onto several physical
286lines by ending each line except the last with a `\|\e'.
287.Pp
288Capability databases consist of a series of records, one per logical
289line.
290Each record contains a variable number of `:'-separated fields
291(capabilities).
292Empty fields consisting entirely of white space
293characters (spaces and tabs) are ignored.
294.Pp
295The first capability of each record specifies its names, separated by `|'
296characters.
297These names are used to reference records in the database.
298By convention, the last name is usually a comment and is not intended as
299a lookup tag.
300For example, the
301.Em vt100
302record from the
303.Xr termcap 5
304database begins:
305.Pp
306.Dl "d0\||\|vt100\||\|vt100-am\||\|vt100am\||\|dec vt100:"
307.Pp
308giving four names that can be used to access the record.
309.Pp
310The remaining non-empty capabilities describe a set of (name, value)
311bindings, consisting of a names optionally followed by a typed value:
312.Bl -column "nameTvalue"
313.It name Ta "typeless [boolean] capability"
314.Em name No "is present [true]"
315.It name Ns Em \&T Ns value Ta capability
316.Pq Em name , \&T
317has value
318.Em value
319.It name@ Ta "no capability" Em name No exists
320.It name Ns Em T Ns \&@ Ta capability
321.Pq Em name , T
322does not exist
323.El
324.Pp
325Names consist of one or more characters.
326Names may contain any character
327except `:', but it's usually best to restrict them to the printable
328characters and avoid use of graphics like `#', `=', `%', `@', etc.\&  Types
329are single characters used to separate capability names from their
330associated typed values.
331Types may be any character except a `:'.
332Typically, graphics like `#', `=', `%', etc.\& are used.
333Values may be any
334number of characters and may contain any character except `:'.
335.Sh CAPABILITY DATABASE SEMANTICS
336Capability records describe a set of (name, value) bindings.
337Names may
338have multiple values bound to them.
339Different values for a name are
340distinguished by their
341.Fa types .
342The
343.Fn cgetcap
344function will return a pointer to a value of a name given the capability
345name and the type of the value.
346.Pp
347The types `#' and `=' are conventionally used to denote numeric and
348string typed values, but no restriction on those types is enforced.
349The
350functions
351.Fn cgetnum
352and
353.Fn cgetstr
354can be used to implement the traditional syntax and semantics of `#'
355and `='.
356Typeless capabilities are typically used to denote boolean objects with
357presence or absence indicating truth and false values respectively.
358This interpretation is conveniently represented by:
359.Pp
360.Dl "(getcap(buf, name, ':') != NULL)"
361.Pp
362A special capability,
363.Ic tc= name ,
364is used to indicate that the record specified by
365.Fa name
366should be substituted for the
367.Ic tc
368capability.
369.Ic Tc
370capabilities may interpolate records which also contain
371.Ic tc
372capabilities and more than one
373.Ic tc
374capability may be used in a record.
375A
376.Ic tc
377expansion scope (i.e., where the argument is searched for) contains the
378file in which the
379.Ic tc
380is declared and all subsequent files in the file array.
381.Pp
382When a database is searched for a capability record, the first matching
383record in the search is returned.
384When a record is scanned for a
385capability, the first matching capability is returned; the capability
386.Ic :nameT@:
387will hide any following definition of a value of type
388.Em T
389for
390.Fa name ;
391and the capability
392.Ic :name@:
393will prevent any following values of
394.Fa name
395from being seen.
396.Pp
397These features combined with
398.Ic tc
399capabilities can be used to generate variations of other databases and
400records by either adding new capabilities, overriding definitions with new
401definitions, or hiding following definitions via `@' capabilities.
402.Sh EXAMPLES
403.Bd -unfilled -offset indent
404example\||\|an example of binding multiple values to names:\e
405	:foo%bar:foo^blah:foo@:\e
406	:abc%xyz:abc^frap:abc$@:\e
407	:tc=more:
408.Ed
409.Pp
410The capability foo has two values bound to it (bar of type `%' and blah of
411type `^') and any other value bindings are hidden.
412The capability abc
413also has two values bound but only a value of type `$' is prevented from
414being defined in the capability record more.
415.Pp
416.Bd -unfilled -offset indent
417file1:
418 	new\||\|new_record\||\|a modification of "old":\e
419		:fript=bar:who-cares@:tc=old:blah:tc=extensions:
420file2:
421	old\||\|old_record\||\|an old database record:\e
422		:fript=foo:who-cares:glork#200:
423.Ed
424.Pp
425The records are extracted by calling
426.Fn cgetent
427with file1 preceding file2.
428In the capability record new in file1, fript=bar overrides the definition
429of fript=foo interpolated from the capability record old in file2,
430who-cares@ prevents the definition of any who-cares definitions in old
431from being seen, glork#200 is inherited from old, and blah and anything
432defined by the record extensions is added to those definitions in old.
433Note that the position of the fript=bar and who-cares@ definitions before
434tc=old is important here.
435If they were after, the definitions in old
436would take precedence.
437.Sh CGETNUM AND CGETSTR SYNTAX AND SEMANTICS
438Two types are predefined by
439.Fn cgetnum
440and
441.Fn cgetstr :
442.Bl -column "nameXnumber"
443.Sm off
444.It Em name No \&# Em number Ta numeric
445.Sm on
446capability
447.Em name
448has value
449.Em number
450.Sm off
451.It Em name No = Em string Ta "string capability"
452.Sm on
453.Em name
454has value
455.Em string
456.Sm off
457.It Em name No \&#@ Ta "the numeric capability"
458.Sm on
459.Em name
460does not exist
461.Sm off
462.It Em name No \&=@ Ta "the string capability"
463.Sm on
464.Em name
465does not exist
466.El
467.Pp
468Numeric capability values may be given in one of three numeric bases.
469If the number starts with either
470.Ql 0x
471or
472.Ql 0X
473it is interpreted as a hexadecimal number (both upper and lower case a-f
474may be used to denote the extended hexadecimal digits).
475Otherwise, if the number starts with a
476.Ql 0
477it is interpreted as an octal number.
478Otherwise the number is interpreted as a decimal number.
479.Pp
480String capability values may contain any character.
481Non-printable
482.Dv ASCII
483codes, new lines, and colons may be conveniently represented by the use
484of escape sequences:
485.Bl -column "\e\|X,X\e\|X" "(ASCII octal nnn)"
486^X	('X' & 037)	control-X
487\e\|b, \e\|B	(ASCII 010)	backspace
488\e\|t, \e\|T	(ASCII 011)	tab
489\e\|n, \e\|N	(ASCII 012)	line feed (newline)
490\e\|f, \e\|F	(ASCII 014)	form feed
491\e\|r, \e\|R	(ASCII 015)	carriage return
492\e\|e, \e\|E	(ASCII 027)	escape
493\e\|c, \e\|C	(:)	colon
494\e\|\e	(\e\|)	back slash
495\e\|^	(^)	caret
496\e\|nnn	(ASCII octal nnn)
497.El
498.Pp
499A `\|\e' may be followed by up to three octal digits directly specifies
500the numeric code for a character.
501The use of
502.Tn ASCII
503.Dv NUL Ns s ,
504while easily
505encoded, causes all sorts of problems and must be used with care since
506.Dv NUL Ns s
507are typically used to denote the end of strings; many applications
508use `\e\|200' to represent a
509.Dv NUL .
510.Sh DIAGNOSTICS
511The
512.Fn cgetent ,
513.Fn cgetset ,
514.Fn cgetmatch ,
515.Fn cgetnum ,
516.Fn cgetstr ,
517.Fn cgetustr ,
518.Fn cgetfirst ,
519and
520.Fn cgetnext
521functions
522return a value greater than or equal to 0 on success and a value less
523than 0 on failure.
524The
525.Fn cgetcap
526function returns a character pointer on success and a
527.Dv NULL
528on failure.
529.Pp
530The
531.Fn cgetent ,
532and
533.Fn cgetseq
534functions may fail and set
535.Va errno
536for any of the errors specified for the library functions:
537.Xr fopen 3 ,
538.Xr fclose 3 ,
539.Xr open 2 ,
540and
541.Xr close 2 .
542.Pp
543The
544.Fn cgetent ,
545.Fn cgetset ,
546.Fn cgetstr ,
547and
548.Fn cgetustr
549functions
550may fail and set
551.Va errno
552as follows:
553.Bl -tag -width Er
554.It Bq Er ENOMEM
555No memory to allocate.
556.El
557.Sh SEE ALSO
558.Xr cap_mkdb 1 ,
559.Xr malloc 3
560.Sh BUGS
561Colons (`:') can't be used in names, types, or values.
562.Pp
563There are no checks for
564.Ic tc Ns = Ns Ic name
565loops in
566.Fn cgetent .
567.Pp
568The buffer added to the database by a call to
569.Fn cgetset
570is not unique to the database but is rather prepended to any database used.
571