Source-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[src/trunk]: src/crypto/dist Remove formatted man pages. Ok'd by joda.
details: https://anonhg.NetBSD.org/src/rev/889d60901d97
branches: trunk
changeset: 515420:889d60901d97
user: wiz <wiz%NetBSD.org@localhost>
date: Mon Sep 24 12:37:41 2001 +0000
description:
Remove formatted man pages. Ok'd by joda.
diffstat:
crypto/dist/heimdal/appl/popper/popper.cat8 | 54 -
crypto/dist/heimdal/appl/rsh/rsh.cat1 | 121 --
crypto/dist/heimdal/appl/rsh/rshd.cat8 | 78 -
crypto/dist/heimdal/lib/des/des.cat1 | 132 --
crypto/dist/heimdal/lib/des/des_crypt.cat3 | 264 ----
crypto/dist/heimdal/lib/krb5/kerberos.cat8 | 55 -
crypto/dist/heimdal/lib/krb5/krb5.conf.cat5 | 404 ------
crypto/dist/heimdal/lib/krb5/krb5_425_conv_principal.cat3 | 137 --
crypto/dist/heimdal/lib/krb5/krb5_appdefault.cat3 | 54 -
crypto/dist/heimdal/lib/krb5/krb5_auth_context.cat3 | 166 --
crypto/dist/heimdal/lib/krb5/krb5_build_principal.cat3 | 57 -
crypto/dist/heimdal/lib/krb5/krb5_config.cat3 | 56 -
crypto/dist/heimdal/lib/krb5/krb5_context.cat3 | 19 -
crypto/dist/heimdal/lib/krb5/krb5_create_checksum.cat3 | 51 -
crypto/dist/heimdal/lib/krb5/krb5_crypto_init.cat3 | 31 -
crypto/dist/heimdal/lib/krb5/krb5_encrypt.cat3 | 43 -
crypto/dist/heimdal/lib/krb5/krb5_free_principal.cat3 | 22 -
crypto/dist/heimdal/lib/krb5/krb5_get_all_client_addrs.cat3 | 36 -
crypto/dist/heimdal/lib/krb5/krb5_get_krbhst.cat3 | 57 -
crypto/dist/heimdal/lib/krb5/krb5_init_context.cat3 | 33 -
crypto/dist/heimdal/lib/krb5/krb5_keytab.cat3 | 202 ---
crypto/dist/heimdal/lib/krb5/krb5_krbhst_init.cat3 | 104 -
crypto/dist/heimdal/lib/krb5/krb5_openlog.cat3 | 156 --
crypto/dist/heimdal/lib/krb5/krb5_parse_name.cat3 | 29 -
crypto/dist/heimdal/lib/krb5/krb5_principal_get_realm.cat3 | 41 -
crypto/dist/heimdal/lib/krb5/krb5_sname_to_principal.cat3 | 35 -
crypto/dist/heimdal/lib/krb5/krb5_timeofday.cat3 | 24 -
crypto/dist/heimdal/lib/krb5/krb5_unparse_name.cat3 | 23 -
crypto/dist/heimdal/lib/krb5/krb5_verify_user.cat3 | 69 -
crypto/dist/heimdal/lib/krb5/krb5_warn.cat3 | 59 -
crypto/dist/heimdal/lib/krb5/verify_krb5_conf.cat8 | 58 -
crypto/dist/heimdal/lib/roken/getarg.cat3 | 233 ---
crypto/dist/krb4/admin/ext_srvtab.cat8 | 66 -
crypto/dist/krb4/admin/kdb_destroy.cat8 | 66 -
crypto/dist/krb4/admin/kdb_edit.cat8 | 66 -
crypto/dist/krb4/admin/kdb_init.cat8 | 66 -
crypto/dist/krb4/admin/kdb_util.cat8 | 66 -
crypto/dist/krb4/admin/kstash.cat8 | 66 -
crypto/dist/krb4/appl/afsutil/afslog.cat1 | 39 -
crypto/dist/krb4/appl/afsutil/pagsh.cat1 | 17 -
crypto/dist/krb4/appl/bsd/login.access.cat5 | 44 -
crypto/dist/krb4/appl/bsd/login.cat1 | 73 -
crypto/dist/krb4/appl/bsd/rcp.cat1 | 66 -
crypto/dist/krb4/appl/bsd/rlogin.cat1 | 92 -
crypto/dist/krb4/appl/bsd/rlogind.cat8 | 103 -
crypto/dist/krb4/appl/bsd/rsh.cat1 | 75 -
crypto/dist/krb4/appl/ftp/ftp/ftp.cat1 | 652 ----------
crypto/dist/krb4/appl/ftp/ftpd/ftpd.cat8 | 304 -----
crypto/dist/krb4/appl/ftp/ftpd/ftpusers.cat5 | 27 -
crypto/dist/krb4/appl/kauth/kauth.cat1 | 47 -
crypto/dist/krb4/appl/kauth/kauthd.cat8 | 22 -
crypto/dist/krb4/appl/kauth/ksrvtgt.cat1 | 66 -
crypto/dist/krb4/appl/kx/kx.cat1 | 39 -
crypto/dist/krb4/appl/kx/kxd.cat8 | 37 -
crypto/dist/krb4/appl/kx/rxtelnet.cat1 | 49 -
crypto/dist/krb4/appl/kx/rxterm.cat1 | 47 -
crypto/dist/krb4/appl/kx/tenletxr.cat1 | 37 -
crypto/dist/krb4/appl/movemail/movemail.cat8 | 27 -
crypto/dist/krb4/appl/otp/otp.cat1 | 43 -
crypto/dist/krb4/appl/otp/otpprint.cat1 | 36 -
crypto/dist/krb4/appl/popper/popper.cat8 | 54 -
crypto/dist/krb4/appl/push/pfrom.cat1 | 17 -
crypto/dist/krb4/appl/telnet/telnet/telnet.cat1 | 718 ------------
crypto/dist/krb4/appl/telnet/telnetd/telnetd.cat8 | 299 ----
crypto/dist/krb4/appl/xnlock/xnlock.cat1 | 132 --
crypto/dist/krb4/kuser/kdestroy.cat1 | 66 -
crypto/dist/krb4/kuser/kinit.cat1 | 132 --
crypto/dist/krb4/kuser/klist.cat1 | 66 -
crypto/dist/krb4/lib/acl/acl_check.cat3 | 132 --
crypto/dist/krb4/lib/des/des.cat1 | 132 --
crypto/dist/krb4/lib/des/des_crypt.cat3 | 264 ----
crypto/dist/krb4/lib/kafs/kafs.cat3 | 95 -
crypto/dist/krb4/lib/krb/kerberos.cat1 | 132 --
crypto/dist/krb4/lib/krb/kerberos.cat3 | 330 -----
crypto/dist/krb4/lib/krb/krb_realmofhost.cat3 | 132 --
crypto/dist/krb4/lib/krb/krb_sendauth.cat3 | 198 ---
crypto/dist/krb4/lib/roken/getarg.cat3 | 233 ---
crypto/dist/krb4/server/kerberos.cat8 | 144 --
crypto/dist/krb4/slave/kprop.cat8 | 42 -
crypto/dist/krb4/slave/kpropd.cat8 | 41 -
crypto/dist/krb4/tools/krb4-config.cat1 | 47 -
81 files changed, 0 insertions(+), 8647 deletions(-)
diffs (truncated from 8971 to 300 lines):
diff -r fe63f1e6f619 -r 889d60901d97 crypto/dist/heimdal/appl/popper/popper.cat8
--- a/crypto/dist/heimdal/appl/popper/popper.cat8 Mon Sep 24 12:15:11 2001 +0000
+++ /dev/null Thu Jan 01 00:00:00 1970 +0000
@@ -1,54 +0,0 @@
-
-POPPER(8) UNIX System Manager's Manual POPPER(8)
-
-NNAAMMEE
- ppooppppeerr - POP3 server
-
-SSYYNNOOPPSSIISS
- ppooppppeerr [--kk] [--aa _n_o_n_e|otp] [--tt _f_i_l_e] [--TT _s_e_c_o_n_d_s] [--dd] [--ii] [--pp _p_o_r_t]
- [----aaddddrreessss--lloogg==_f_i_l_e]
-
-DDEESSCCRRIIPPTTIIOONN
- ppooppppeerr serves mail via the Post Office Protocol. Supported options in-
- clude:
-
- --aa _n_o_n_e|otp, ----aauutthh--mmooddee==_n_o_n_e|otp
- tells ppooppppeerr what authentication modes are acceptable, passing
- _o_t_p disables clear text passwords. This has only effect when not
- using Kerberos authentication.
-
- ----aaddddrreessss--lloogg==_f_i_l_e
- logs the addresses of all clients to the specified file
-
- --dd, ----ddeebbuugg
- enables more verbose log messages
-
- --ii, ----iinntteerraaccttiivvee
- when not started by inetd, this flag tells ppooppppeerr that it has to
- create a socket by itself
-
- --kk, ----kkeerrbbeerrooss
- tells ppooppppeerr to use the Kerberos for authentication.
-
- --pp _p_o_r_t, ----ppoorrtt==_p_o_r_t
- port to listen to, in combination with --ii
-
- --tt _f_i_l_e, ----ttrraaccee--ffiillee==_f_i_l_e
- trace all command to file
-
- --TT _s_e_c_o_n_d_s, ----ttiimmeeoouutt==_s_e_c_o_n_d_s
- set timeout to something other than the default of 120 seconds
-
-SSEEEE AALLSSOO
- push(8), movemail(8)
-
-SSTTAANNDDAARRDDSS
- RFC1939 (Post Office Protocol - Version 3)
-
-AAUUTTHHOORRSS
- The server was initially developed at the University of California,
- Berkeley.
-
- Many changes has been made as part of the KTH Kerberos distributions.
-
- HEIMDAL August 13, 2001 1
diff -r fe63f1e6f619 -r 889d60901d97 crypto/dist/heimdal/appl/rsh/rsh.cat1
--- a/crypto/dist/heimdal/appl/rsh/rsh.cat1 Mon Sep 24 12:15:11 2001 +0000
+++ /dev/null Thu Jan 01 00:00:00 1970 +0000
@@ -1,121 +0,0 @@
-
-RSH(1) UNIX Reference Manual RSH(1)
-
-NNAAMMEE
- rrsshh - remote shell
-
-SSYYNNOOPPSSIISS
- rrsshh [--4455FFGGKKddeeffnnuuxxzz] [--UU _s_t_r_i_n_g] [--pp _p_o_r_t] [--ll _u_s_e_r_n_a_m_e] _h_o_s_t _[_c_o_m_m_a_n_d_]
-
-DDEESSCCRRIIPPTTIIOONN
- rrsshh authenticates to the rshd(8) daemon on the remote _h_o_s_t, and then exe-
- cutes the specified _c_o_m_m_a_n_d.
-
- rrsshh copies its standard input to the remote command, and the standard
- output and error of the remote command to its own.
-
- Valid options are:
-
- --44, ----kkrrbb44
- The --44 option requests Kerberos 4 authentication. Normally all
- supported authentication mechanisms will be tried, but in some
- cases more explicit control is desired.
-
- --55, ----kkrrbb55
- The --55 option requests Kerberos 5 authentication. This is analo-
- gous to the --44 option.
-
- --KK, ----bbrrookkeenn
- The --KK option turns off all Kerberos authentication. The long
- name implies that this is more or less totally unsecure. The se-
- curity in this mode relies on reserved ports, which is not very
- secure.
-
- --nn, ----nnoo--iinnppuutt
- The --nn option directs the input from the _/_d_e_v_/_n_u_l_l device (see
- the _B_U_G_S section of this manual page).
-
- --ee, ----nnoo--ssttddeerrrr
- Don't use a separate socket for the stderr stream. This can be
- necessary if rsh-ing through a NAT bridge.
-
- --xx, ----eennccrryypptt
- The --xx option enables encryption for all data exchange. This is
- only valid for Kerberos authenticated connections (see the _B_U_G_S
- section for limitations).
-
- --zz The opposite of --xx. This is the default, but encryption can be
- enabled when using Kerberos 5, by setting the libdefaults/encrypt
- option in krb5.conf(5).
-
- --ff, ----ffoorrwwaarrdd
- Forward Kerberos 5 credentials to the remote host. Also con-
- trolled by libdefaults/forward in krb5.conf(5).
-
- --GG The opposite of --ff.
-
- --FF, ----ffoorrwwaarrddaabbllee
- Make the forwarded credentials re-forwardable. Also controlled by
- libdefaults/forwardable in krb5.conf(5).
-
- --uu, ----uunniiqquuee
- Make sure the remote credentials cache is unique, that is, don't
- reuse any existing cache. Mutually exclusive to --UU.
-
- --UU _s_t_r_i_n_g, ----ttkkffiillee==_s_t_r_i_n_g
-
- Name of the remote credentials cache. Mutually exclusive to --uu.
-
- --pp _n_u_m_b_e_r_-_o_r_-_s_e_r_v_i_c_e, ----ppoorrtt==_n_u_m_b_e_r_-_o_r_-_s_e_r_v_i_c_e
- Connect to this port instead of the default (which is 514 when
- using old port based authentication, 544 for Kerberos 5 and non-
- encrypted Kerberos 4, and 545 for encrytpted Kerberos 4; subject
- of course to the contents of _/_e_t_c_/_s_e_r_v_i_c_e_s).
-
- --ll _s_t_r_i_n_g, ----uusseerr==_s_t_r_i_n_g
- By default the remote username is the same as the local. The --ll
- option or the _u_s_e_r_n_a_m_e_@_h_o_s_t format allow the remote name to be
- specified.
-
-EEXXAAMMPPLLEESS
- Care should be taken when issuing commands containing shell meta charac-
- ters. Without quoting these will be expanded on the local machine.
-
- The following command:
-
- rsh otherhost cat remotefile > localfile
-
- will write the contents of the remote _r_e_m_o_t_e_f_i_l_e to the local _l_o_c_a_l_f_i_l_e,
- but:
-
- rsh otherhost 'cat remotefile > remotefile2'
-
- will write it to the remote _r_e_m_o_t_e_f_i_l_e_2.
-
-FFIILLEESS
- /etc/hosts
-
-SSEEEE AALLSSOO
- rlogin(1), krb_realmofhost(3), krb_sendauth(3), hosts.equiv(5),
- krb5.conf(5), rhosts(5), kerberos(8) rshd(8)
-
-HHIISSTTOORRYY
- The rrsshh command appeared in 4.2BSD.
-
-AAUUTTHHOORRSS
- This implementation of rrsshh was written as part of the Heimdal Kerberos 5
- implementation.
-
-BBUUGGSS
- Some shells (notably csh(1)) will cause rrsshh to block if run in the back-
- ground, unless the standard input is directed away from the terminal.
- This is what the --nn option is for.
-
- The --xx options enables encryption for the session, but for both Kerberos
- 4 and 5 the actual command is sent unencrypted, so you should not send
- any secret information in the command line (which is probably a bad idea
- anyway, since the command line can usually be read with tools like
- ps(1)). Forthermore in Kerberos 4 the command is not even integrity pro-
- tected, so anyone with the right tools can modify the command.
-
- HEIMDAL July 31, 2001 2
diff -r fe63f1e6f619 -r 889d60901d97 crypto/dist/heimdal/appl/rsh/rshd.cat8
--- a/crypto/dist/heimdal/appl/rsh/rshd.cat8 Mon Sep 24 12:15:11 2001 +0000
+++ /dev/null Thu Jan 01 00:00:00 1970 +0000
@@ -1,78 +0,0 @@
-
-RSHD(8) UNIX System Manager's Manual RSHD(8)
-
-NNAAMMEE
- rrsshhdd - remote shell server
-
-SSYYNNOOPPSSIISS
- rrsshhdd [--aaiikkllnnvvxxPPLL] [--pp _p_o_r_t]
-
-DDEESSCCRRIIPPTTIIOONN
- rrsshhdd is the server for the rsh(1) program. It provides an authenticated
- remote command execution service. Supported options are:
-
- --nn, ----nnoo--kkeeeeppaalliivvee
- Disables keep-alive messages. Keep-alives are packets sent a cer-
- tain interval to make sure that the client is still there, even
- when it doesn't send any data.
-
- --kk, ----kkeerrbbeerrooss
- Assume that clients connecting to this server will use some form
- of Kerberos authentication. See the _E_X_A_M_P_L_E_S section for a sample
- inetd.conf(5) configuration.
-
- --xx, ----eennccrryypptt
- For Kerberos 4 this means that the connections are encrypted.
- Kerberos 5 will negotiate encryption inline. This option implies
- --kk.
-
- --vv, ----vvaaccuuoouuss
- If the connecting client does not use any Kerberised authentica-
- tion, print a message that complains about this fact, and exit.
- This is helpful if you want to move away from old port-based au-
- thentication.
-
- --PP When using the AFS filesystem, users' authentication tokens are
- put in something called a PAG (Process Authentication Group).
- Multiple processes can share a PAG, but normally each login ses-
- sion has its own PAG. This option disables the sseettppaagg() call, so
- all tokens will be put in the default (uid-based) PAG, making it
- possible to share tokens between sessions. This is only useful in
- peculiar environments, such as some batch systems.
-
- --ii, ----nnoo--iinneettdd
- The --ii option will cause rrsshhdd to create a socket, instead of as-
- suming that its stdin came from inetd(8). This is mostly useful
- for debugging.
-
- --pp _p_o_r_t, ----ppoorrtt==_p_o_r_t
- Port to use with --ii.
-
- --aa This flag is for backwards compatibility only.
-
- --LL This flag enables logging of connections to syslogd(8). This op-
- tion is always on in this implementation.
-
-FFIILLEESS
- /etc/hosts.equiv
- ~/.rhosts
-
-EEXXAAMMPPLLEESS
- The following can be used to enable Kerberised rsh in inetd.cond(5),
- while disabling non-Kerberised connections:
-
- shell stream tcp nowait root /usr/libexec/rshd rshd -v
- kshell stream tcp nowait root /usr/libexec/rshd rshd -k
- ekshell stream tcp nowait root /usr/libexec/rshd rshd -kx
-
-SSEEEE AALLSSOO
- rsh(1), iruserok(3)
-
-HHIISSTTOORRYY
- The rrsshhdd command appeared in 4.2BSD.
-
-AAUUTTHHOORRSS
- This implementation of rrsshhdd was written as part of the Heimdal Kerberos 5
- implementation.
-
- HEIMDAL July 31, 2001 2
diff -r fe63f1e6f619 -r 889d60901d97 crypto/dist/heimdal/lib/des/des.cat1
--- a/crypto/dist/heimdal/lib/des/des.cat1 Mon Sep 24 12:15:11 2001 +0000
+++ /dev/null Thu Jan 01 00:00:00 1970 +0000
@@ -1,132 +0,0 @@
-
-
-
-DES(1) DES(1)
-
-
-
-NAME
- des - encrypt or decrypt data using Data Encryption Standard
-
-SYNOPSIS
- ddeess ( --ee | --EE ) | ( --dd | --DD ) | ( --[ccCC][cckknnaammee] ) | [ --bb33hhffss ] [ --kk _k_e_y ] ]
- [ --uu[_u_u_n_a_m_e] [ _i_n_p_u_t_-_f_i_l_e [ _o_u_t_p_u_t_-_f_i_l_e ] ]
-
-DESCRIPTION
- ddeess encrypts and decrypts data using the Data Encryption Standard algo-
- rithm. One of --ee,, --EE (for encrypt) or --dd,, --DD (for decrypt) must be speci-
- fied. It is also possible to use --cc or --CC in conjunction or instead of the
- a encrypt/decrypt option to generate a 16 character hexadecimal checksum,
- generated via the _d_e_s___c_b_c___c_k_s_u_m_.
-
- Two standard encryption modes are supported by the ddeess program, Cipher
- Block Chaining (the default) and Electronic Code Book (specified with --bb ).
-
- The key used for the DES algorithm is obtained by prompting the user unless
- the ``--kk _k_e_y_' option is given. If the key is an argument to the ddeess com-
- mand, it is potentially visible to users executing ppss(1) or a derivative.
- To minimise this possibility, ddeess takes care to destroy the key argument
- immediately upon entry. If your shell keeps a history file be careful to
- make sure it is not world readable.
-
Home |
Main Index |
Thread Index |
Old Index