HP-UX Reference Section 1: User Commands (A-M) HP-UX 11i Version 1, September 2005 Update Volume 1 of 10 Manufacturing Part Number : B2355-90902 Printed In USA E0905 Printed in USA © Copyright 1983-2005 Hewlett-Packard Development Company LP.
Legal Notices The information in this document is subject to change without notice. Warranty The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. U.S. Government License Confidential computer software.
Copyright 1996 Morning Star Technologies, Inc. Copyright 1996 Progressive Systems, Inc. Trademark Notices Intel and Itanium are registered trademarks of Intel Corporation in the US and other countries and are used under license. Java is a US trademark of Sun Microsystems, Inc. Microsoft and MS-DOS are U.S. registered trademarks of Microsoft Corporation. OSF/Motif is a trademark of The Open Group in the US and other countries. UNIX is a registered trademark of The Open Group.
Revision History This document’s printing date and part number indicate its edition. The printing date changes when a new edition is printed. (Minor corrections and updates which are incorporated at reprint do not cause the date to change.) New editions of this manual incorporate all material updated since the previous edition. Part Number Release; Date; Format; Distribution B2355-60127 HP-UX 11i Version 1; September 2005 Update; one volume HTML; http://docs.hp.com and Instant Information.
Typographical Conventions audit (5) An HP-UX manpage. audit is the name and 5 is the section in the HP-UX Reference. On the web and on the Instant Information CD, it may be a hot link to the manpage itself. From the HP-UX command line, you can enter “man audit” or “man 5 audit” to view the manpage. See man (1). Book Title The title of a book. On the web and on the Instant Information CD, it may be a hot link to the book itself. KeyCap The name of a keyboard key.
vi
Preface HP-UX is the Hewlett-Packard Company’s implementation of a UNIX operating system that is compatible with various industry standards. It is based on the System V Release 4 operating system and includes important features from the Fourth Berkeley Software Distribution. The ten volumes of this manual contain the system reference documentation, made up of individual entries called manpages, named for the man command (see man (1)) that displays them on the system.
viii
Volume One Table of Contents Section 1
Volume One Table of Contents Section 1
Table of Contents Volumes One and Two Section 1: User Commands Entry Name(Section): name Description intro(1): intro ..................................................... introduction to command utilities and application programs adb(1): adb ........................................................................................................................... absolute debugger adjust(1): adjust ...........................................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description cksum(1): cksum .................................................................................................. print file checksum and sizes clear(1): clear ................................................................................................................ clear terminal screen cmp(1): cmp ...........................................................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description echo: echo (print) arguments .............................................................................................................. see ksh(1) echo: echo (print) arguments ................................................................................................... see sh-bourne(1) echo: echo (print) arguments ......................................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description getconf(1): getconf ........................................................................................ get POSIX configuration values getopt(1): getopt ........................................................................................................ parse command options getopts(1): getopts ........................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description lastcomm(1): lastcomm ........................................................... show last commands executed in reverse order lc: list contents of directories ................................................................................................................. see ls(1) ld(1): ld ............................................................................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description mv(1): mv .................................................................................................. move or rename files and directories neqn(1): neqn ............................................................................................. format mathematical text for nroff netstat(1): netstat .........................................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description pdcreate(1): pdcreate ..................................................................................................... creates print objects pddelete(1): pddelete ..................................................................................................... deletes print objects pddisable(1): pddisable ..........................................
Table of Contents Volumes One and Two Entry Name(Section): name Description return: exit function with return value ................................................................................... see sh-bourne(1) return: shell function return to invoking script .................................................................................. see ksh(1) return: shell function return to invoking script ..........................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description strip(1): strip .................................................... strip symbol and line number information from an object file stty(1): stty ................................................................................................ set the options for a terminal port sum(1): sum ........................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description uncompact: compact and uncompact, and cat, files using Huffman code ................................... see compact(1) uncompress: expand compressed data ...................................................................................... see compress(1) uncompressdir: expand compressed files in a directory ........................................................... see compress(1) unexpand: convert spaces to tabs ................
Table of Contents Volumes One and Two Entry Name(Section): name Description xstr(1): xstr ...................................................... extract strings from C programs to implement shared strings yes(1): yes ................................................................................................................ be repetitively affirmative ypcat(1): ypcat .....................................................................
Notes xx Hewlett-Packard Company HP-UX 11i Version 1: September 2005
Section 1 Part 1 User Commands A-M
Section 1 Part 1 User Commands A-M
intro(1) intro(1) NAME intro - introduction to command utilities and application programs DESCRIPTION This section describes commands accessible by users, as opposed to system calls in Section (2) or library routines in Section (3), which are accessible by user programs.
intro(1) intro(1) NETWORKING FEATURES Information under this heading is applicable only if you are using the networking feature described there (such as NFS). RETURN VALUE DIAGNOSTICS Discusses various values returned upon completion of program calls. ERRORS EXAMPLES WARNINGS DEPENDENCIES Lists error conditions and their corresponding error message or return value. Discusses diagnostics indications that may be produced. Self-explanatory messages are not listed.
adb(1) adb(1) NAME adb, adb64 - absolute debugger SYNOPSIS adb [-w] [-Idir] [-k] [-m] [-Ppid] objfil [corfil] a adb64 [-w] [-Idir] [-k] [-m] [-Ppid] objfil [corfil] DESCRIPTION The adb command executes a general-purpose debugging program that is sensitive to the underlying architecture of the processor and operating system on which it runs. It can be used to examine files and provide a controlled environment for executing HP-UX programs. adb calls adb64 to process 64 bit files.
adb(1) adb(1) Expressions Expressions are interpreted as follows: a . + ^ The value of dot. " The last address typed. integer A number. The prefix 0 (zero) forces interpretation in octal radix; the prefixes 0d and 0D force interpretation in decimal radix; the prefixes 0x and 0X force interpretation in hexadecimal radix. Thus 020 = 0d16 = 0x10 = sixteen. If no prefix appears, the default radix is used; see the $d command.
adb(1) adb(1) objfil. /f Locations starting at address in corfil are printed according to the format f and dot is increased like ?. If a subprocess has been initiated, address refers to a location in the address space of the subprocess instead of corfil. =f The value of address is printed in the styles indicated by the format f. (For i format ? is printed for the parts of the instruction that refer to subsequent words.) A format consists of one or more characters that specify a style of printing.
adb(1) adb(1) dot is decreased by 1. Nothing is printed. - a new-line Repeat the previous command with a count of 1. The value of dot continues from the end of the previous format, unlike a [?/ ] command with no address, which repeats the previous address value. New-line can also be used to repeat a :s or :c command; however, any arguments to the previous command are lost. [?/]l value mask Words starting at dot are masked with mask and compared with value until a match is found.
adb(1) adb(1) $r Print the general registers and the instruction addressed by the process counter. dot is set to the process counter contents. $s $v $w $x $z Set the limit for symbol matches to address. The default is system dependent. Print all non-zero variables in the current radix. a Set the page width for output to address (default 80). The default for all integers input is hexadecimal. Print a list of signals and how they are handled. See :z for information on changing signal handling.
adb(1) adb(1) On entry, the following named variables are set from the coreheaders in the corfil. If corfil does not appear to be a core file, these values are set from objfil. The base address of the data segment. b d s t a The data segment size. The stack segment size. The text segment size. The following variables are set from objfil. The entry point. e m The "magic" number as defined in .
adb(1) adb(1) • $R prints all registers available to adb users. The :x and :S commands are not currently supported. • adb can be used to inspect relocatable object files; it reads the symbol table and sets up the appropriate • mappings for text and data. Note that relocatable object files do not necessarily contain an exact image of the initialized data; however, if this is the case, the data mapping is not set. AUTHOR adb was developed by AT&T and HP. FILES a.
adjust(1) adjust(1) NAME adjust - simple text formatter SYNOPSIS a adjust [-b] [-c|-j|-r ] [-m column ] [-t tabsize ] [ files ... ] DESCRIPTION The adjust command is a simple text formatter for filling, centering, left and right justifying, or only right justifying text paragraphs, and is designed for interactive use. It reads the concatenation of input files (or standard input if none are given) and produces on standard output a formatted version of its input, with each paragraph formatted separately.
adjust(1) adjust(1) adjust also has a rudimentary understanding of tagged paragraphs (such as this one) when * filling. If the second line of a paragraph is indented more than the first, and the first line has a word beginning at the same indentation as the second line, the input column position of the tag word or words (prior to the one matching the second line indentation) is preserved. Tag words are passed through without change of column position, even if they extend beyond the right margin.
adjust(1) a adjust(1) WARNINGS This program is designed to be simple and fast. It does not recognize backslash to escape white space or other characters. It does not recognize tagged paragraphs where the tag is on a line by itself. It knows that lines end in newline or null, and how to deal with tabs and backspaces, but it does not do anything special with other characters such as form feed (they are simply ignored). For complex operations, standard text processors are likely to be more appropriate.
admin(1) admin(1) NAME admin - create and administer SCCS files SYNOPSIS admin -i[name] [-n] [-b] [-a login] ... [-d flag[flag-val] ] ... [-f flag[flag-val] ] ... [-m mrlist] ... [-r rel] [-t[name] ] [-y [comment ] ] file ... admin -n [-a login] ... [-d flag[flag-val] ] ... [-f flag[flag-val] ] ... [-m mrlist] ... [-t[name] ] [-y [comment ] ] file ... admin [-a login] ... [-e login] ... [-d flag[flag-val] ] ... [-m mrlist] ... [-r rel] [-t[name] ] file ... admin -h file ... admin -z file ...
admin(1) admin(1) -f flag a This option specifies a flag, and possibly a value for the flag, to be placed in the SCCS file. Several -f options can be supplied on a single admin command line. The allowable flags and their values are: b Allows use of the -b option on a get command (see get(1)) to create branch deltas. cceil The highest release (i.e., "ceiling"), a number less than or equal to 9999, which can be retrieved by a get command for editing.
admin(1) -d flag admin(1) v[pgm] Causes delta to prompt for Modification Request (MR) numbers as the reason for creating a delta. The optional value specifies the name of a (MR) number validity checking program (see delta(1)). (If this flag is set when creating an SCCS file, the m option must also be used even if its value is null). x Causes get to create files with execute permissions. Causes removal (deletion) of the specified flag from an SCCS file.
admin(1) admin(1) environ(5). International Code Set Support Single-byte and multi-byte character code sets are supported. a DIAGNOSTICS Use sccshelp(1) for explanations. WARNINGS Number of lines in a SCCS file cannot exceed 99,999 lines. Each line can be of BUFSIZ -3 characters in non-XPG4 environment and LINE_MAX -3 in XPG4 environment, including the newline. FILES The last component of all SCCS file names must be of the form s. filename. New SCCS files are given mode 444 (see chmod(1)).
answer(1) answer(1) NAME answer - phone message transcription system SYNOPSIS answer [-pu] DESCRIPTION The answer interactive program helps you to transcribe telephone (and other) messages into electronic mail. The program uses your personal elm alias database and the system elm alias database, allowing you to use aliases to address the messages. Options answer supports the following options: -p Prompt for phone-slip-type message fields. -u Allow addresses that are not aliases.
answer(1) answer(1) > And here is the message. > ----------------------------------------------------------------- a Message to: albert einstein Sorry, could not find ’albert einstein’ [a_einstein] in list! Message to: john jones address ’mrjones@companybee.com (John P. Jones)’ Enter message for john jones ending with a blank line.
answer(1) $HOME/.elm/aliases.pag $HOME/.elm/aliases.text /var/mail/.elm/aliases /var/mail/.elm/aliases.dir /var/mail/.elm/aliases.pag /var/mail/.elm/aliases.text /tmp/snd. pid answer(1) User alias database hash table User alias source text System alias database data table System alias database directory table System alias database hash table System alias source text Outbound mail message edit buffer a AUTHOR answer was developed by HP. SEE ALSO elm(1), newalias(1).
ar(1) ar(1) NAME ar - create and maintain portable archives and libraries a SYNOPSIS ar [-]key [-][modifier ...] [posname] afile [name ...] DESCRIPTION The ar command maintains groups of files combined into a single archive file. Its main use is to create and update library files as used by the link editor (see ld(1)). It can be used, however, for any similar purpose. The magic string and file headers used by ar consist of printable ASCII characters.
ar(1) ar(1) The following list describes the optional modifier characters: a b c Position the files after the existing positioning file specified by posname . Place the new files before the existing positioning file specified by posname . Suppress the message normally produced when afile is created. For r and q operations, ar normally creates afile if it does not already exist. f Truncate the named file names to 14 bytes before performing operations on an archive.
ar(1) ar(1) p: x: a v, f, F, s v, f, F, s, C, T EXTERNAL INFLUENCES Environment Variables The following internationalization variables affect the execution of ar : LANG Determines the locale category for native language, local customs and coded character set in the absence of LC_ALL and other LC_* environment variables. If LANG is not specified or is set to the empty string, a default of C (see lang(5)) is used instead of LANG .
ar(1) ar(1) f1 f3 f2 f4 Note that the relative order of f2 and f3 has not changed. The second command says "move f3 after f2 in newlib.a", creating the order: f1 f2 f3 f4 The third command then replaces files f2 and f3 . Since files f2 and f3 both already existed in the archive, this sequence of commands could not be simply replaced by: ar ra f1 newlib.
as(1) as(1) NAME as - assembler (Precision Architecture) a SYNOPSIS as [ [option]... [file] ... ]... DESCRIPTION The as command assembles source text from files or standard input and produces a relocatable object file suitable for the link editor, ld (see ld(1). Source text is read from standard input only if no file argument is given. Standard input cannot be a device file, such as a terminal. The option and file arguments can be intermingled on the command line.
as(1) as(1) The assembler uses the following precedence to determine the target architecture. 1. Use the .LEVEL directive within the assembly source file. 2. Use the +DA command-line specification. 3. Use the default architecture of PA_RISC_1.0 . +z,+Z Both of these options are used in the building of shared libraries. For a more complete discussion regarding these options, see the manual HP-UX Linker and Libraries User’s Guide.
asa(1) asa(1) NAME asa - interpret ASA carriage control characters a SYNOPSIS asa [files] DESCRIPTION asa interprets the output of FORTRAN programs that utilize ASA carriage control characters. It processes either the files whose names are given as arguments, or the standard input if - is specified or if no file names are given. The first character of each line is assumed to be a control character.
at(1) at(1) NAME at, batch - execute batched commands immediately or at a later time SYNOPSIS Enter commands from standard input to run at a specified time: at [-m] [ -q queue] -t spectime commands eof a at [-m] [-q queue] time [date] [next timeunit +count timeunit] commands eof Enter commands from a file to run at a specified time: at -f job-file [-m] [-q queue] -t spectime at -f job-file [-m] [-q queue] time [date] [next timeunit +count timeunit] List scheduled jobs: at -d job-id ...
at(1) at(1) privileges is able to display information about all jobs. a -f job-file -l [job-id ...] -m Read in the commands contained in job-file instead of using standard input. List the jobs specified. If no job-ids are given, all jobs are listed. Send mail to the invoking user after the job has run, announcing its completion. Unless redirected elsewhere within the job, standard output and standard error produced by the job are automatically mailed to the user as well.
at(1) at(1) be present. A field having a value greater than 31 is treated as the year field and the remaining two fields in the date string are treated as month and day fields. Otherwise, if a given date is ambiguous (such as 2/5 or 2/5/10 ), the D_T_FMT string (if defined in langinfo(5)) is used to resolve the ambiguity. Two special days, today and tomorrow , are also recognized. If no date is given, today is assumed if the given time is greater than the current time; tomorrow is assumed if it is less.
at(1) at(1) LC_MESSAGES also determines the language in which the words days , hours , midnight , minutes , months , next , noon , now , today , tomorrow , weeks , years , and their singular forms can also be specified. a IF LC_TIME or LC_MESSAGES is not specified in the environment or is set to the empty string, the value of LANG is used as a default for each unspecified or empty variable. If LANG is not specified or is set to the empty string, a default of "C" (see lang(5)) is used instead of LANG .
at(1) at(1) !! Run a job contained in jobfile in the home directory at 5:00 a.m. next Tuesday: at -f $HOME/jobfile 5am tuesday next week Run the same job at 5:00 a.m. one week from next Tuesday (i.e., 2 Tuesdays in advance): at -f $HOME/jobfile 5am tuesday + 2 weeks Add a command to the file named weekly-run in directory jobs in the home directory so that it automatically reschedules itself every time it runs. This example reschedules itself every Thursday at 1900 (7:00 p.m.
at(1) a at(1) /usr/lib/cron/at.allow /usr/lib/cron/at.deny /var/adm/cron/queuedefs /var/spool/cron/atjobs /etc/default/cron List of allowed users List of denied users Scheduling information Spool area Configuration file SEE ALSO crontab(1), kill(1), mail(1), nice(1), ps(1), sh(1), stty(1), cron(1M), proto(4), queuedefs(4). HP Process Resource Manager: prmconfig(1), prmconf(4) in HP Process Resource Manager User’s Guide.
attributes(1) attributes(1) NAME attributes - describe an audio file SYNOPSIS /opt/audio/bin/attributes filename DESCRIPTION This command provides information about an audio file, including file format, data format, sampling rate, number of channels, data length and header length. EXAMPLE The following is an example of using attributes on an audio file supplied with HP-UX. $ /opt/audio/bin/attributes /opt/audio/sounds/welcome.au File Name: /opt/audio/sounds/welcome.
awk(1) awk(1) NAME awk - pattern-directed scanning and processing language a SYNOPSIS awk [-Ffs ] [-v var =value ] [ program -f progfile ... ] [ file ... ] DESCRIPTION awk scans each input file for lines that match any of a set of patterns specified literally in program or in one or more files specified as -f progfile. With each pattern there can be an associated action that is to be performed when a line in a file matches the pattern.
awk(1) awk(1) The print statement prints its arguments on the standard output (or on a file if >file or >> file is present or on a pipe if |cmd is present), separated by the current output field separator, and terminated by the output record separator. file and cmd can be literal names or parenthesized expressions. Identical string values in different statements denote the same open file. The printf statement formats its expression list according to the format (see printf(3)).
awk(1) awk(1) A pattern can consist of two patterns separated by a comma; in this case, the action is performed for all lines from an occurrence of the first pattern though an occurrence of the second. A relational expression is one of the following: expression matchop regular-expression expression relop expression expression in array-name (expr,expr,... ) in array-name a where a relop is any of the six relational operators in C, and a matchop is either ˜ (matches) or !˜ (does not match).
awk(1) awk(1) The arguments in ARGV can be modified or added to; ARGC can be altered. As each input file ends, awk will treat the next non-null element of ARGV , up to the current value of ARGC -1, inclusive, as the name of the next input file. Thus, setting an element of ARGV to null means that it will not be treated as an input file. The name - indicates the standard input.
awk(1) awk(1) In addition, all environment variables will be visible via the awk variable ENVIRON . a International Code Set Support Single- and multi-byte character code sets are supported except that variable names must contain only ASCII characters and regular expressions must contain only valid characters. DIAGNOSTICS awk supports up to 199 fields ($1, $2, ..., $199 ) per record.
banner(1) banner(1) NAME banner - make posters in large letters SYNOPSIS banner strings DESCRIPTION banner prints its arguments (each up to 10 characters long) in large letters on the standard output. Each argument is printed on a separate line. Note that multiple-word arguments must be enclosed in quotes in order to be printed on the same line.
basename(1) basename(1) NAME basename, dirname - extract portions of path names SYNOPSIS basename string [ suffix ] dirname [ string ] b DESCRIPTION basename deletes any prefix ending in / and the suffix (if present in string) from string, and prints the result on the standard output. If string consists entirely of slash characters, string is set to a single slash character. If there are any trailing slash characters in string, they are removed.
bc(1) bc(1) NAME bc - arbitrary-precision arithmetic language SYNOPSIS bc [-c] [-l] [ file ... ] DESCRIPTION bc is an interactive processor for a language that resembles C but provides unlimited-precision arithmetic. It takes input from any files given, then reads the standard input. Options: bc recognizes the following command-line options: -c Compile only. bc is actually a preprocessor for dc which bc invokes automatically (see dc(1)).
bc(1) b bc(1) Statements E { S ; ... ; S } if ( R ) S while ( R ) S for ( E ; R ; E ) S null statement break quit Function Definitions: define L ( L ,..., L ) { auto L, ... , L S; ... S return ( E ) } Functions in − l Math Library: Functions in the -l math library include: s(x) c(x) e(x) l(x) a(x) j(n,x) sine cosine exponential log arctangent Bessel function All function arguments are passed by value. Trigonometric angles are in radians where 2 pi radians = 360 degrees.
bc(1) bc(1) WARNINGS There are currently no && (AND) or || (OR) comparisons. The for statement must have all three expressions. quit is interpreted when read, not when executed. bc’s parser is not robust in the face of input errors. Some simple expression such as 2+2 helps get it back into phase. The assignment operators: =+ =- =* =/ =% and =ˆ are obsolete. Any occurences of these operators cause a syntax error with the exception of =- which is interpreted as = followed by a unary minus.
bdiff(1) bdiff(1) NAME bdiff - diff for large files SYNOPSIS bdiff file1 file2 [ n ] [-s] b DESCRIPTION bdiff compares two files and produces output identical to what would be produced by diff (see diff(1)), specifying changes that must be made to make the files identical. bdiff is designed for handling files that are too large for diff , but it can be used on files of any length. bdiff processes files as follows: • Ignore lines common to the beginning of both files.
bdiff(1) bdiff(1) FILES /tmp/bd?????? SEE ALSO diff(1).
bfs(1) bfs(1) NAME bfs - big file scanner SYNOPSIS bfs [-] name b DESCRIPTION bfs is similar to ed except that it is read-only (see ed(1)) bfs can handle files with up to 32K − 1 lines; each line can contain up to 512 characters, including the new-line character. bfs is usually more efficient than ed for scanning a file, since the file is not copied to a buffer.
bfs(1) bfs(1) xv[digit] [spaces] [value] The variable name is the specified digit following the xv . xv5100 or xv5 100 both assign the value 100 to the variable 5. Xv61,100p assigns the value 1,100p to the variable 6. To reference a variable, put a % in front of the variable name. For example, using the above assignments for variables 5 and 6: 1,%5p 1,%5 %6 b all print the first 100 lines. g/%5/p globally searches for the characters 100 and prints each line containing a match.
bfs(1) bfs(1) Environment Variables LC_COLLATE determines the collating sequence used in evaluating regular expressions. LC_CTYPE determines the classification of characters as letters, and the characters matched by character class expressions in regular expressions. b If LC_COLLATE or LC_CTYPE is not specified in the environment or is set to the empty string, the value of LANG is used as a default for each unspecified or empty variable.
bs(1) bs(1) NAME bs - a compiler/interpreter for modest-sized programs SYNOPSIS bs [ file [ args ] ] DESCRIPTION bs is a remote descendant of BASIC and SNOBOL4 with some C language added. bs is designed for programming tasks where program development time is as important as the resulting speed of execution. Formalities of data declaration and file/process manipulation are minimized. Line-at-a-time debugging, the trace and dump statements, and useful run-time error messages all simplify program testing.
bs(1) bs(1) does not cause stored statements to execute (see run below). for name = expression expression statement for name = expression expression ... b next for expression , expression , expression statement for expression , expression , expression ... The for statement repetitively executes a statement (first form) or a group of statements (second form) under control of a named variable.
bs(1) bs(1) stop Execution of internal statements is stopped. bs reverts to immediate mode. trace [expression] The trace statement controls function tracing. If the expression is null (or evaluates to zero), tracing is turned off. Otherwise, a record of user-function calls/returns is printed. Each return decrements the trace expression value. while expression statement while expression b ... next while is similar to for except that only the conditional expression for loop-continuation is given.
bs(1) bs(1) ++ name - - name !expression Increments the value of the variable (or array reference). The result is the new value. expression operator expression Common functions of two arguments are abbreviated by the two arguments separated by an operator denoting the function. Except for the assignment, concatenation, and relational operators, both operands are converted to numeric form before the function is applied. Decrements the value of the variable. The result is the new value.
bs(1) bs(1) possible to know whether a is a number or a string when the format call is coded, coercing a to the type required by f by either adding zero (for e or f format) or concatenating (_) the null string (for s format) should be considered. index( x , y ) returns the number of the first position in x that any of the characters from y matches. No match yields zero. trans( s , f, t ) Translates characters of the source s from matching characters in f to a character in the same position in t.
bs(1) bs(1) interrogate operator, returns null) if there was no valid subscript for the previous item call. The name argument should not be quoted. Since exact table sizes are not defined, the interrogation operator should be used to detect end-of-table; for example: table("t", 100) ... # If word contains "party", the following expression adds one # to the count of that word: ++t[word] b ...
bs(1) bs(1) plot(12, x1, y1, x2, y2 ) causes subsequent x (y) coordinates to be multiplied by x1 (y1) and then added to x2 (y2) before they are plotted. The initial scaling is plot(12, 1.0, 1.0, 0.0, 0.0) . Some requests do not apply to all plotters. All requests except zero and twelve are implemented by piping characters to tplot. Each statement executed from the keyboard re-invokes tplot , making the results unpredictable if a complete picture is not done in a single operation.
bs(1) bs(1) Input/Output examples: b # Copy file oldfile to file newfile. open("read", "oldfile", "r") open("write", "newfile", "w") ... while ?(write = read) ... # close "read" and "write": close("read") close("write") # Pipe between commands. open("ls", "!ls *", "r") open("pr", "!pr -2 -h ’List’", "w") while ?(pr = ls) ... ... # be sure to close (wait for) these: close("ls") close("pr") WARNINGS The graphics mode (plot ...
cal(1) cal(1) NAME cal - print calendar SYNOPSIS cal [ [ month ] year ] DESCRIPTION cal prints a calendar for the specified year. If a month is also specified, a calendar just for that month is printed. If neither is specified, a calendar for the present month is printed. year can be between 1 and 9999. month is a decimal number between 1 and 12. The calendar produced is a Gregorian calendar.
calendar(1) calendar(1) NAME calendar - reminder service SYNOPSIS calendar [-] DESCRIPTION c calendar consults the file calendar in the current directory and prints out lines containing today’s or tomorrow’s date anywhere in the line. On weekends, ‘‘tomorrow’’ extends through Monday. When a - command-line argument is present, calendar searches for the file calendar in each user’s home directory, and sends any positive results to the user by mail (see mail(1)).
calendar(1) calendar(1) Jim’s birthday is on the 3. February 30/3/87 - quarter end review 26-4 Management council meeting at 1:00 pm It is first of the month ( 1/* ); status report due. WARNINGS To get reminder service, either your calendar must be public information or you must run calendar from your personal crontab file, independent of any calendar - run systemwide. Note that if you run calendar yourself, the calendar file need not reside in your home directory.
cat(1) cat(1) NAME cat - concatenate, copy, and print files SYNOPSIS cat [-benrstuv ] file ... DESCRIPTION cat reads each file in sequence and writes it on the standard output. Thus: c cat file prints file on the default standard output device; cat file1 file2 > file3 concatenates file1 and file2, and places the result in file3. If - is appears as a file argument, cat uses standard input. To combine standard input and other files, use a combination of - and file arguments.
cat(1) cat(1) International Code Set Support Single- and multi-byte character code sets are supported. RETURN VALUE Exit values are: 0 >0 Successful completion. Error condition occurred.
cc_bundled(1) cc_bundled(1) (Bundled C Compiler - Limited Functionality) NAME cc_bundled: cc - bundled C compiler SYNOPSIS cc [options] files c DESCRIPTION This manpage describes the Bundled C compiler. See cc(1), available online only, for the ANSI-compliant HP-UX manpage. The bundled C cc accepts several types of arguments as files: .c Suffix Arguments whose names end with .c are understood to be C source files.
cc_bundled(1) cc_bundled(1) (Bundled C Compiler - Limited Functionality) -Dname=def -Dname -E Define name to the preprocessor, as if by ’#define’. See cpp(1) for details. Run only cpp on the named C or assembly files, and send the result to the standard output. -Idir Change the algorithm used by the preprocessor for finding include files to also search in directory dir. See cpp(1) for details. -lx -L dir Refer to the DESCRIPTION section.
cc_bundled(1) cc_bundled(1) (Bundled C Compiler - Limited Functionality) name a.out . EXTERNAL INFLUENCES Environment Variables LANG determines the language in which messages are displayed. c If LC_CTYPE is not specified in the environment or is set to the empty string, the value of LANG is used as a default for each unspecified or empty variable. If LANG is not specified or is set to the empty string, a default of C (see lang(5)) is used.
cc_bundled(1) cc_bundled(1) (Bundled C Compiler - Limited Functionality) Miscellaneous strip(1) crt0(3) end(3C) exit(2) Strip symbol and line number information from an object file. Execution startup routine. Symbol of the last locations in program. Termination of a process. Tutorials and Standards Documents The C Programming Language, B. W. Kernighan and D. M. Ritchie, Prentice-Hall, 1978.
cd(1) cd(1) NAME cd - change working directory SYNOPSIS cd [ directory ] c DESCRIPTION If directory is not specified, the value of shell parameter HOME is used as the new working directory. If directory specifies a complete path starting with /, ., or .. , directory becomes the new working directory. If neither case applies, cd tries to find the designated directory relative to one of the paths specified by the CDPATH shell variable.
cd(1) 0 >0 cd(1) The directory was successfully changed. An error occurred. The working directory remains unchanged. SEE ALSO csh(1), pwd(1), ksh(1), sh-posix(1), sh(1), chdir(2). STANDARDS CONFORMANCE cd: SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
cdc(1) cdc(1) NAME cdc - change the delta commentary of an SCCS delta SYNOPSIS cdc -r c SID [-m [ mrlist ] ] [-y [ comment ] ] files DESCRIPTION The cdc command changes the delta commentary, for the SID specified by the -r option, of each named SCCS file. Delta commentary is defined to be the Modification Request (MR) and comment information normally specified via the delta(1) command (-m and -y options).
cdc(1) cdc(1) International Code Set Support Single- and multi-byte character code sets are supported. DIAGNOSTICS Use sccshelp(1) for explanations. EXAMPLES Add bl78-12345 and bl79-00001 to the MR list, remove bl77-54321 from the MR list, and add the comment trouble to delta 1.6 of s.file : cdc -r1.6 -m"bl78-12345 !bl77-54321 bl79-00001" -ytrouble s.file The following does the same thing: cdc -r1.6 s.
chacl(1) chacl(1) NAME chacl - add, modify, delete, copy, or summarize access control lists (ACLs) of files SYNOPSIS c /usr/bin/chacl acl file ... chacl -r acl file ... chacl -d aclpatt file ... chacl -f fromfile tofile ... chacl - [ z Z F ] file... DESCRIPTION chacl extends the capabilities of chmod(1), by enabling the user to grant or restrict file access to additional specific users and/or groups.
chacl(1) chacl(1) continues, and eventually returns non-zero. -f fromfile tofile Copy the ACL from fromfile to the specified tofile, transferring ownership, if necessary (see acl(5), chown(2), or chownacl(3C)). fromfile can be - to represent standard input. This option implies the -r option. If the owner and group of fromfile are identical to those of tofile, chacl -f is identical to: chacl -r ‘lsacl fromfile‘ tofile ...
chacl(1) chacl(1) chacl -r ’(@.%,rw-)’ - test Delete from file myfile the specific access rights, if any, for user 165 in group 13. Note that this is different from adding an ACL entry that restricts access for that user and group. The user’s resulting access rights depend on the entries remaining in the ACL. The command also deletes all entries for user jpc that have a read bit turned on (the asterisk can be used as a wildcard in the ACL pattern for user, group, or access mode): c chacl -d ’165.
chatr(1) chatr(1) NAME chatr - change program’s internal attributes SYNOPSIS PA-RISC 32-bit SOM chatr chatr [-nqsMN [z|Z] ] [-l library] [-B mode] [+b flag] [+dbg flag] [+es flag] [+mergeseg flag] [+gst flag] [+gstbuckets size] [+gstsize size] [+k flag] [+l library] [+pd size] [+pi size] [+plabel_cache flag] [+q3p flag] [+q4p flag] [+r flag] [+s flag] [+z flag] file ... PA-RISC 64-bit ELF chatr There are two possible syntactic forms that can be used to invoke PA-RISC 64-bit chatr .
chatr(1) chatr(1) libraries. +dbg flag c Controls the mapping of shared library text segments privately. The flag values, enable and disable , toggle the request on and off. When enabled, this allows for mapping the text segments of shared libraries in a private, writeable region. Also, you can use this feature on individual shared libraries, which makes the text segment mapped private. If _HP_DLDOPTS contains the string "-text_private", all shared libraries are mapped private.
chatr(1) chatr(1) Options For PA-RISC 32-bit SOM chatr Only -M Change file from EXEC_MAGIC to SHMEM_MAGIC . (This option is an interim solution until 64-bit addressability is available with a true 64-bit kernel. See "chatr and Magic Numbers" and "Using SHMEM_MAGIC" below.) -N Change file from SHMEM_MAGIC to EXEC_MAGIC . (This option is an interim solution until 64-bit addressability is available with a true 64-bit kernel. See "chatr and Magic Numbers" below.
chatr(1) chatr(1) OPTIONS FOR PA-RISC 64-bit ELF chatr (FORMAT 2) With common options: -s, -B mode, +k flag, +r flag, +s flag, +z flag. +c Set the code bit for a specified segment. +dz Enable or disable lazy swap allocation for dynamically allocated segments (such as the stack or heap). c +m +p +sa +sall +si Set the modification bit for a specified segment. Set the page size for a specified segment. Specify a segment using an address for a set of attribute modifications.
chatr(1) chatr(1) make the program functional again. If the program is not legitimately executing code from its stack, you should suspect malicious activity and take appropriate action. HP-UX provides two options to permit legitimate execution from a program’s stack(s). Combinations of these two options help make site-specific tradeoffs between security and compatibility. The first method is the use of the +es option of chatr and affects individual programs.
chatr(1) chatr(1) chatr +b enable +xyz enable returns 5 (because of illegal option +xyz ). chatr +b enable +xyz enable +mno file1 file2 returns 8. For PA-RISC 64-bit chatr, if you use an illegal option, chatr returns the number of non-option words present after the first illegal option. chatr +b enable +xyz enable +mno enable +pqr enable file returns 4.
chatr(1) chatr(1) chatr +l /usr/lib/libc.sl libfoo.sl Given segment index number 5 from a previous run of chatr , change the page size to 4 kilobytes: chatr +si 5 +p 4K average64 AUTHOR chatr was developed by HP. SEE ALSO System Tools ld(1) Miscellaneous a.
checknr(1) checknr(1) NAME checknr - check nroff/troff files SYNOPSIS checknr [-s] [-f] [-a. x1 .y1.x2 .y2 ... c .xn .yn ] [-c. x1 .x2 .x3 ...c .xn ] [ file ... ] DESCRIPTION checknr searches a list of nroff or troff input files for certain kinds of errors involving mismatched opening and closing delimiters and unknown commands. If no files are specified, checknr searches the standard input. checknr looks for the following: • Font changes using \fx ... \fP . • Size changes using \sx ... \s0 .
chfn(1) chfn(1) NAME chfn - change user information; used by finger SYNOPSIS chfn chfn chfn chfn chfn [login-name] -r -r -r -r files [login-name] nis [login-name] nisplus [login-name] dce [login-name] c DESCRIPTION The chfn command changes the user information that is stored in the repository for the current logged-in user or for the user specified by login-name (see passwd(1)). The information is organized as four comma-separated subfields within the reserved (5th) field of the password file entry.
chfn(1) chfn(1) WARNINGS The encoding of office and extension information is installation-dependent. For historical reasons, the user’s name, etc., are stored in the /etc/passwd file. This is an inappropriate place to store the information. Because two users may try to write the passwd file at once, a synchronization method was developed. On rare occasions, chfn prints a message that the password file is busy. When this occurs, chfn sleeps for a short time, then tries to write to the passwd file again.
chkey(1) chkey(1) NAME chkey - change user’s secure RPC key pair SYNOPSIS chkey [ -p ] [ -s nisplus | nis | files ] DESCRIPTION chkey is used to change a user’s secure RPC public key and secret key pair. chkey prompts for the old secure-rpc password and verifies that it is correct by decrypting the secret key. If the user has not already keylogged in, chkey registers the secret key with the local keyserv(1M) daemon.
chmod(1) chmod(1) NAME chmod - change file mode access permissions SYNOPSIS /usr/bin/chmod [-A] [-R] symbolic_mode_list file ... Obsolescent form: /usr/bin/chmod [-A] [-R] numeric_mode file ... c DESCRIPTION The chmod command changes the permissions of one or more files according to the value of symbolic_mode_list or numeric_mode. You can display the current permissions for a file with the ls -l command (see ls(1)).
chmod(1) chmod(1) Numeric Mode (Obsolescent) Absolute permissions can be set by specifying a numeric_mode, an octal number constructed from the logical OR (sum) of the following mode bits: Miscellaneous mode bits: 4000 2000 1000 (= u=s ) (= g=s ) (= u=t ) Set user ID on file execution (file only) Set group ID on file execution (file only) Set sticky bit; see below and chmod(2) Permission mode bits: 0400 0200 0100 0040 0020 0010 0004 0002 0001 (= (= (= (= (= (= (= (= (= u=r ) u=w ) u=x ) g=r ) g=w )
chmod(1) chmod(1) chmod a+x file Assign read and execute permission to everybody, and set the set-user-ID bit: chmod a=rx,u+s file Assign read and write permission to the file owner, and read permission to everybody else: chmod u=rw,go=r file or the obsolescent form: c chmod 644 file Traverse a directory subtree making all regular files readable by user and group only, and all executables and directories executable (searchable) by everyone: chmod -R ug+r,o-r,a+X pathname If the current value of umask
chown(1) chown(1) NAME chown, chgrp - change file owner or group SYNOPSIS chown [-h] [-R] owner[:group] file ... chgrp [-h] [-R] group file ... DESCRIPTION The chown command changes the owner ID of each specified file to owner and optionally the group ID of each specified file to group. The chgrp command changes the group ID of each specified file to group. owner can be either a decimal user ID or a login name found in the /etc/passwd file.
chown(1) chown(1) RETURN VALUE chown and chgrp return the following values: 0 Successful completion. >0 An error condition occurred. EXAMPLES The following command changes the owner of the file jokes to sandi : c chown sandi jokes The following command searches the directory design_notes and changes each file in that directory to owner mark and group users : chown -R mark:users design_notes WARNINGS The default operation of chown and chgrp for symbolic links has changed as of HP-UX release 10.0.
chsh(1) chsh(1) NAME chsh - change default login shell SYNOPSIS chsh chsh chsh chsh chsh login-name [shell] -r -r -r -r files login-name [shell] nisplus login-name [shell] nis login-name [shell] dce login-name [shell] c DESCRIPTION The chsh command changes the login-shell for a user’s login name in the repository (see passwd(1)). The DCE repository (-r dce ) is only available if Integrated Login has been configured, see auth.adm(1M).
chsh(1) chsh(1) NOTES The chsh command is a hard link to passwd command. When chsh is executed actually the passwd command gets executed with appropriate arguments to change the user login shell in the repository specified in command line. If no repository is specified the login shell is changed in /etc/passwd file. FILES /etc/shells /etc/ptmp c SEE ALSO chfn(1), csh(1), ksh(1), passwd(1), sh(1), sh-bourne(1), sh-posix(1), getusershell(3C), pam(3), passwd(4), shells(4).
ci(1) ci(1) NAME ci - check in RCS revisions SYNOPSIS ci [options] file... DESCRIPTION ci stores new revisions into RCS files. Each file name ending in ,v is treated as an RCS file; all others are assumed to be working files. ci deposits the contents of each working file into the corresponding RCS file (see rcsintro(5)). If the RCS file does not exist, ci creates it and deposits the contents of the working file as the initial revision. The default number is "1.1". The access list is initialized to empty.
ci(1) ci(1) -q[rev] Quiet mode; diagnostic output is not printed. A revision that is not different from the preceding one is not deposited unless -f is given. -r[rev] Assigns the revision number rev to the checked-in revision, releases the corresponding lock, and deletes the working file. This is the default. If rev is omitted, ci derives the new revision number from the caller’s last lock.
ci(1) ci(1) to remove old revisions. RCS is designed to be used with TEXT files only. Attempting to use RCS with non-text (binary) files results in data corruption. AUTHOR ci was developed by Walter F. Tichy. SEE ALSO co(1), ident(1), rcs(1), rcsdiff(1), rcsmerge(1), rlog(1), rcsfile(4), acl(5), rcsintro(5).
ckconfig(1) ckconfig(1) NAME ckconfig - verify the path names of all the FTP configuration files. SYNOPSIS /usr/bin/ckconfig DESCRIPTION The ckconfig c utility is used /etc/ftpd/ftpusers, /etc/ftpd/ftpgroups, /etc/ftpd/pids/*. to verify the path names of the FTP configuration files, /etc/ftpd/ftpaccess, /etc/ftpd/ftpconversions, /etc/ftpd/ftphosts, /var/adm/syslog/xferlog, and This utility checks to see that all the FTP configuration files are in the path specified.
cksum(1) cksum(1) NAME cksum - print file checksum and sizes SYNOPSIS cksum [file ...] DESCRIPTION The cksum command calculates and prints to standard output a checksum for each named file, the number of octets in the file and the filename. cksum uses a portable algorithm based on a 32-bit Cyclic Redundancy Check. This algorithm finds a broader spectrum of errors than the 16-bit algorithms used by sum (see sum(1)). The CRC is the sum of the following expressions, where x is each byte of the file.
clear(1) clear(1) NAME clear - clear terminal screen SYNOPSIS clear c DESCRIPTION clear clears the terminal screen if it is possible to do so. It reads the TERM environment variable for the terminal type, then reads the appropriate terminfo database to determine how to clear the screen. FILES /usr/share/lib/terminfo/?/* terminal database files AUTHOR clear was developed by the University of California, Berkeley. SEE ALSO terminfo(4).
cmp(1) cmp(1) NAME cmp - compare two files SYNOPSIS cmp [-l] [-s] file1 file2 [skip1 [skip2]] DESCRIPTION cmp compares two files (if file1 or file2 is -, the standard input is used). Under default options, cmp makes no comment if the files are the same; if they differ, it announces the byte and line number at which the difference occurred. If one file is an initial subsequence of the other, that fact is noted.
co(1) co(1) NAME co - check out RCS revisions SYNOPSIS co [ options ] file ... c DESCRIPTION co retrieves revisions from RCS files. Each file name ending in ,v is taken to be an RCS file. All other files are assumed to be working files. co retrieves a revision from each RCS file and stores it in the corresponding working file (see also rcsintro(5)). Revisions of an RCS file can be checked out locked or unlocked. Locking a revision prevents overlapping updates.
co(1) co(1) For 2-digit year input (yy) without the presence of the century field, the following interpretation is taken: [70 -99 , 00 -69 (1970-1999, 2000-2069)]. -r[ rev ] Retrieves the latest revision whose number is less than or equal to rev. If rev indicates a branch rather than a revision, the latest revision on that branch is retrieved. rev is composed of one or more numeric or symbolic fields separated by . .
co(1) co(1) Access Control Lists (ACLs) Optional ACL entries should not be added to RCS files because they might be deleted. DIAGNOSTICS The RCS file name, the working file name, and the revision number retrieved are written to the diagnostic output. The exit status always refers to the last file checked out, and is 0 if the operation was successful, 1 if unsuccessful. c EXAMPLES Assume the current directory contains a subdirectory named RCS with an RCS file named io.c,v .
col(1) col(1) NAME col - filter reverse line-feeds and backspaces SYNOPSIS col [-blfxp ] DESCRIPTION col reads from the standard input and writes onto the standard output. It performs the line overlays implied by reverse line feeds (ASCII code ESC-7), and by forward and reverse half-line feeds (ESC-9 and ESC-8). col is particularly useful for filtering multi-column output made with the nroff .rt command, and output resulting from use of the tbl preprocessor (see nroff(1) and tbl(1)).
col(1) col(1) tbl filename | nroff -man | col | more -s (very similar to the usual man(1) command). This command allows vertical bars and outer boxes to be printed for tables. The file is run through the tbl preprocessor, and the output is then piped through nroff , formatting the output using the -man macros. The formatted output is then piped through col , which sets up the vertical bars and aligns the columns in the file.
comb(1) comb(1) NAME comb - combine SCCS deltas SYNOPSIS comb [-p SID ] [-clist ] [-o] [-s] file ... DESCRIPTION The comb command generates a shell procedure (see sh(1)) which, when run, reconstructs the given SCCS files. The reconstructed files are usually smaller than the original files. Arguments can be specified in any order, but all options apply to all named SCCS files.
comb(1) comb(1) FILES s.COMB????? comb????? Temporary file Temporary file SEE ALSO admin(1), delta(1), get(1), sccshelp(1), prs(1), sh(1), sccsfile(4).
comm(1) comm(1) NAME comm - select or reject lines common to two sorted files SYNOPSIS comm [-[123 ] ] file1 file2 DESCRIPTION comm reads file1 and file2, which should be ordered in increasing collating sequence (see sort(1) and Environment Variables below), and produces a three-column output: Column 1: Column 2: Column 3: Lines that appear only in file1, Lines that appear only in file2, Lines that appear in both files. If - is used for file1 or file2, the standard input is used.
command(1) command(1) NAME command - execute a simple command SYNOPSIS command command_name [ argument ... ] c DESCRIPTION command enables the shell to treat the arguments as a simple command, suppressing the shell function lookup. If command_name is not the name of the function, the effect of command is the same as omitting command. OPERANDS command recognizes the following operands: command_name The name of a HP-UX command or a shell built-in command.
command(1) command(1) STANDARDS CONFORMANCE command : XPG4, POSIX.
compact(1) compact(1) NAME compact, uncompact, ccat - compact and uncompact, and cat, files using Huffman code SYNOPSIS compact [name]... uncompact [name]... ccat [file]... c DESCRIPTION compact compresses the named files using an adaptive Huffman code. If no file names are given, standard input is compacted and sent to the standard output. compact operates as an on-line algorithm. Each time a byte is read, it is encoded immediately according to the current prefix code.
compress(1) compress(1) NAME compress, uncompress, zcat, compressdir, uncompressdir - compress and expand data SYNOPSIS Compress Files compress [-d] [-f|-z ] [-z] [-v] [-c] [-V] [-b maxbits ] [ file ... ] uncompress [-f] [-v] [-c] [-V] [ file ... ] zcat [-V] [ file ... ] c Compress Entire Directory Subtrees compressdir [ options ] [ directory ... ] uncompressdir [ options ] [ directory ...
compress(1) compress(1) uncompress -c. -V -b maxbits Print the current version and compile options onto the standard error. Specify the maximum number of bits the compress algorithm will use. The default is 16 and the range can be any integer between 9 and 16. compress uses the modified Lempel-Ziv algorithm popularized in A Technique for High Performance Data c Compression , Terry A. Welch, IEEE Computer, vol. 17, no. 6 (June 1984), pages 8-19.
compress(1) compress(1) uncompress: corrupt input A SIGSEGV violation was detected which usually means that the input file has been corrupted. Compression: xx .xx % Percentage of the input saved by compression. (Relevant only for -v .) -- not a regular file: unchanged When the input file is not a regular file (a directory for example), it is left unaltered. -- has xx other links: unchanged The input file has links which are not symbolic links and has been left unchanged. See ln(1) for more information.
convert(1) convert(1) NAME convert - convert an audio file SYNOPSIS /opt/audio/bin/convert [source_file] [target_file] [-sfmt format] [-dfmt format] [-ddata data_type] [-srate rate] [-drate rate] [-schannels number] [-dchannels number] c DESCRIPTION This command converts audio files from one supported file format, data format, sampling rate, and number of channels to another. The unconverted file is retained as a source file.
convert(1) cd /opt/audio/bin convert beep.l16 convert(1) beep.au Convert a raw data file to a headered file when the source has no extension, was sampled at 11,025 per second, and has stereo data. cd /opt/audio/bin convert beep beep.au -sfmt l16 -srate 11025 -schannels 2 To save disk space, convert an audio file with CD quality sound to voice quality sound. c cd /opt/audio/bin convert idea.au idea2.au -ddata u -drate 8k -dchannels 1 AUTHOR convert was developed by HP.
cp(1) cp(1) NAME cp - copy files and directory subtrees SYNOPSIS cp [-f-i] [-p] [-S] [-e extarg ] file1 new_file cp [-f-i] [-p] [-S] [-e extarg ] file1 [file2 ... ] dest_directory cp [-f-i] [-p] [-S] [-R-r] [-e extarg ] directory1 [ directory2 ... ] dest_directory c DESCRIPTION cp copies: • • • • • file1 to new or existing new_file, file1 to existing dest_directory, file1, file2, ... to existing dest_directory, directory subtree directory1, to new or existing dest_directory.
cp(1) cp(1) Under UNIX95 flag set, cp will exit with error if multiple sources are being copied to a nonexisting directory. -R (recursive subtree copy) The -R option is identical to the -r option. With the -R and -r options, in addition to regular files and directories, cp also copies FIFOs, character and block device files and symbolic links. Only superusers can copy device files. All other users get an error. Symbolic links are copied so the target points to the same location that the source did.
cp(1) cp(1) This example is equivalent to: mv sourcedir targetdir To copy all files and directory subtrees in the current directory to an existing targetdir, use: cp -r * targetdir To copy all files and directory subtrees in sourcedir to targetdir, use: cp -r sourcedir /* targetdir c Note that directory pathnames can precede both sourcedir and targetdir.
cpio(1) cpio(1) NAME cpio - copy file archives in and out; duplicate directory trees SYNOPSIS cpio -o [-e extarg ] [achvxABC ] cpio -i[bcdfmrstuvxBPRSU6] [pattern...] cpio -p [-e extarg ] [adlmruvxU ] directory DESCRIPTION The cpio command saves and restores archives of files on magnetic tape, other devices, or a regular file, and copies files from one directory to another while replicating the directory tree structure. When cpio completes processing the files, it reports the number of blocks written.
cpio(1) cpio(1) warn. c f h Copy in all files except those selected by pattern.... l Whenever possible, link files rather than copying them. This option does not destroy existing files. Use only with -p. m Retain previous file modification time. This option does not affect directories that are being copied. r s Rename files interactively. If the user types a null line, the file is skipped. t u Print only a table of contents of the input. No files are created, read, or copied.
cpio(1) cpio(1) Note that cpio archives created using a raw device file must be read using a raw device file. When the end of the tape is reached, cpio prompts the user for a new special file and continues. If you want to pass one or more metacharacters to cpio without the shell expanding them, be sure to precede each of them with a backslash (\). Device files written with the -ox option (such as /dev/tty03 ) do not transport to other implementations of HP-UX.
cpio(1) cpio(1) find . -depth -print | cpio -oB >/dev/rmt/c0t0d0BEST can be handled more efficiently by: find . -cpio /dev/rmt/c0t0d0BEST WARNINGS Because of industry standards and interoperability goals, cpio does not support the archival of files larger than 2GB or files that have user/group IDs greater than 60K. Files with user/group IDs greater than 60K are archived and restored under the user/group ID of the current process.
cpp(1) cpp(1) NAME cpp - the C language preprocessor SYNOPSIS /usr/ccs/lbin/cpp [option ...] [ifile [ofile] ] DESCRIPTION cpp is the C language preprocessor which is invoked as the first pass of any C compilation using the cc command (see cc(1)). Its purpose is to process #include and conditional compilation instructions and macros. Thus the output of cpp is designed to be in a form acceptable as input to the next pass of the C compiler.
cpp(1) cpp(1) UNIX systems variant: lint(1): _PA_RISC1_0 hpux PWB lint _PA_RISC1_1 _ _hpux _PWB _ _lint _SIO _WSIO _HPUX_SOURCE In addition, all symbols that begin with an underscore and either an upper-case letter or another underscore are reserved. Other symbols may be defined by the CCOPTS variable or other command-line options to the C compiler at compile time (see cc(1)). All HP-UX systems have the symbols PWB , hpux , unix , _PWB, _ _hpux, and _ _unix defined.
cpp(1) cpp(1) The lines following appear in the output if and only if name has been the subject of a previous #define without being the subject of an intervening #undef . #ifndef name The lines following do not appear in the output if and only if name has been the subject of a previous #define without being the subject of an intervening #undef . #include "filename" #include Include at this point the contents of filename (which are then run through cpp ).
cpp(1) cpp(1) SEE ALSO m4(1). NOTES The macro substitution scheme has been changed. Previous versions of cpp saved macros in a macro definition table whose table size is 128 000 bytes by default. The current version of cpp replaces this macro definition table with several small buffers. The default size of the small buffers is 8 188 bytes.
crontab(1) crontab(1) NAME crontab - user job file scheduler SYNOPSIS [file] crontab crontab crontab crontab -e [username] -l [username] -r [username] c DESCRIPTION The crontab command manages a crontab file for the user. You can use a crontab file to schedule jobs that are executed automatically by cron (see cron(1M)) on a regular basis.
crontab(1) crontab(1) Blank lines and those whose first non-blank character is # will be ignored. c cron invokes the command from the user’s HOME directory with the POSIX shell, (/usr/bin/sh ). It runs in the c queue (see queuedefs(4)). cron supplies a default environment for every shell, defining: HOME= user’s-home-directory LOGNAME= user’s-login-id PATH=/usr/bin:/usr/sbin:. SHELL=/usr/bin/sh Users who desire to have their .
crypt(1) crypt(1) NAME crypt - encode/decode files SYNOPSIS crypt [ password ] DESCRIPTION crypt reads from the standard input and writes on the standard output. password is a key that selects a particular transformation. If no password is given, crypt demands a key from the terminal and turns off printing while the key is being typed in. crypt encrypts and decrypts with the same key: crypt key cypher crypt key
crypt(1) crypt(1) SEE ALSO ed(1), makekey(1), stty(1).
csh(1) csh(1) NAME csh - a shell (command interpreter) with C-like syntax SYNOPSIS csh [-cefinstvxTVX] [ command_file ] [ argument_list ]... DESCRIPTION csh is a command language interpreter that incorporates a command history buffer, C-like syntax, and job control facilities. Command Options Command options are interpreted as follows: -c Read commands from the (single) following argument which must be present. Any remaining arguments are placed in argv .
csh(1) csh(1) [1] 1234 indicating that the job which was started asynchronously was job number 1 and had one (top-level) process, whose process id was 1234. c If you are running a job and want to do something else, you can type the currently defined suspend character (see termio(7)) which sends a stop signal to the current job. csh then normally indicates that the job has been ‘Stopped’, and prints another prompt.
csh(1) csh(1) breaksw Causes a break from a switch , resuming after the endsw . case label : A label in a switch statement as discussed below. cd cd directory_name chdir chdir directory_name Change the shell’s current working directory to directory_name. If not specified, directory_name defaults to your home directory. If directory_name is not found as a subdirectory of the current working directory (and does not begin with /, ./, or ..
csh(1) csh(1) the output. Useful in programs that use the shell to perform file name expansion on a list of words. goto word The specified word is file name and command expanded to yield a string of the form label . The shell rewinds its input as much as possible and searches for a line of the form label: possibly preceded by blanks or tabs. Execution continues after the specified line.
csh(1) csh(1) coredumpsize cputime datasize Size of the largest core dump that is created descriptors filesize memoryuse stacksize Maximum number of open files for each process Maximum number of CPU seconds to be used by each process Maximum growth of the data region allowed beyond the end of the program text Largest single file that can be created Maximum size to which a process’s resident set size can grow Maximum size of the automatically extended stack region The maximum_use argument can be speci
csh(1) csh(1) the top. A synonym for popd , called rd , is provided for historical reasons. Its use is not recommended because it is not part of the standard BSD csh and may not be supported in future releases. pushd [ name ] [ +n ] With no arguments, pushd exchanges the top two elements of the directory stack. Given a name argument, pushd changes to the new directory (using cd) and pushes the old current working directory (as in csw) onto the directory stack.
csh(1) csh(1) ... breaksw ... default: ... breaksw endsw Each case label (str1) is successively matched against the specified string which is first command and file name expanded. The form of the case labels is the Pattern Matching Notation with the exception that non-matching lists in bracket expressions are not supported (see regexp(5)). If none of the labels match before a default label is found, the execution begins after the default label.
csh(1) csh(1) The operators *= , += , etc., are available as in C. White space can optionally separate the name from the assignment operator. However, spaces are mandatory in separating components of expression which would otherwise be single words. Special postfix ++ and - - operators increment and decrement name, respectively (e.g., @ i++). c Non-Built-In Command Execution When a command to be executed is not a built-in command, csh attempts to execute the command via exec(2).
csh(1) csh(1) These forms, without further modification, simply reintroduce the words of the specified events, each separated by a single blank. As a special case, !! is a re-do; it refers to the previous command. To select words from a command, use a colon (:) and a designator for the desired words after the event specification. The words of an input line are numbered from zero. The basic word designators are: 0 First word (i.e., the command name itself). n nth word. ^ First argument.
csh(1) csh(1) ls -ld ˜paul one could execute !{l}a to do ls -ld ˜paula while !la would look for a command starting with la . c Quoting with Single and Double Quotes The quotation of strings by single quotes (’) and double quotes ( " ) can be used to prevent all or some of the remaining substitutions. Strings enclosed in single quotes are protected from any further interpretation. Strings enclosed in double quotes are still variable- and command-expanded as described below.
csh(1) csh(1) r w x e o z f d read access write access execute access existence ownership zero size plain file directory The specified filename is command- and file-name expanded then tested to see if it has the specified relationship to the real user. If the file does not exist or is inaccessible, all inquiries return false (0). Command executions succeed, returning true, if the command exits with status 0; otherwise they fail, returning false.
csh(1) csh(1) unset commands. Some of the variables are Boolean, that is, the shell does not care what their value is, only whether they are set or not. Some operations treat variables numerically. The at sign (@) command permits numeric calculations to be performed and the result assigned to a variable. The null string is considered to be zero, and any subsequent words of multi-word values are ignored.
csh(1) csh(1) $< Substitutes a line from the standard input, with no further interpretation thereafter. It can be used to read from the keyboard in a shell script. Pre-Defined and Environment Variables The following variables have special meaning to the shell. Of these autologout , argv , cwd , home , path , prompt , shell , and status are always set by the shell. Except for cwd and status , this setting occurs only at initialization (initial execution of csh ).
csh(1) csh(1) primitive pattern to be malformed. For example, ’echo [’ still gives an error. notify If set, csh notifies you immediately (through your standard output device) of background job completions. The default is unset (indicate job completions just before printing a prompt). path Each word of the path variable specifies a directory in which commands are to be sought for execution. A null word specifies your current working directory.
csh(1) csh(1) • Non-matching lists in bracket expressions are not supported. • In a list of words specifying file name substitution it is an error for no pattern to match an existing file name, but it is not required for each pattern to match. • The metanotation a{b,c,d}e is a shorthand for "abe ace ade". Left to right order is preserved, with results of matches being sorted separately at a low level to preserve this order. This construct may be nested. Thus: ~source/s1/{oldls,ls}.
csh(1) csh(1) Diagnostic output can be directed through a pipe with the standard output. Simply use the form |& rather than | by itself. c CSH UTILITIES File Name Completion In typing file names as arguments to commands, it is no longer necessary to type a complete name, only a unique abbreviation is necessary. When you want the system to try to match your abbreviation, press the ESC key. The system then completes the file name for you, echoing the full name on your terminal.
csh(1) csh(1) Sanity C shell restores your terminal to a sane mode if it appears to return from some command in raw, cbreak, or noecho mode. Saving Your History Buffer csh has the ability to save your history list between login sessions. If the shell variable savehist is set to a number, that number of command events from your history list is saved. For example, placing the line set history=10 savehist=10 in your .
csh(1) csh(1) placed anywhere, to be combined with |, and to be used with & and ; metasyntax. It should be possible to use the : modifiers on the output of command substitutions. All and more than one : modifier should be allowed on $ substitutions. Terminal type is examined only the first time you attempt recognition. To list all commands on the system along PATH , enter [Space]-[Ctrl]-[D]. The csh metasequence !˜ does not work.
csplit(1) csplit(1) NAME csplit - context split SYNOPSIS csplit [-s] [-k] [-f prefix ] [-n number] file arg1 [ ... argn ] DESCRIPTION csplit reads file, separates it into n+1 sections as defined by the arguments arg1 ... argn, and places the results in separate files. The maximum number of arguments (arg1 through argn) allowed is 99 unless the -n number option is used to allow for more output file names.
csplit(1) csplit(1) original file; it is the user’s responsibility to remove it when appropriate. EXTERNAL INFLUENCES Environment Variables LC_COLLATE determines the collating sequence used in evaluating regular expressions. c LC_CTYPE determines the characters matched by character class expressions in regular expressions. LC_MESSAGES determines the language in which messages are displayed.
ct(1) ct(1) NAME ct - spawn getty to a remote terminal (call terminal) SYNOPSIS ct [-w n] [-x n] [-h] [-v] [-s speed] telno... DESCRIPTION ct dials telno, the telephone number of a modem that is attached to a terminal, and spawns a getty(1M) process to that terminal. ct tries each line listed in file /etc/uucp/Devices until it finds an available line with appropriate attributes or runs out of entries.
ctags(1) ctags(1) NAME ctags - create a tags file SYNOPSIS ctags [-xvFBatwu ] files ... c DESCRIPTION ctags makes a tags file for ex(1) (or vi(1)) from the specified C, Pascal and FORTRAN sources. A tags file gives the locations of specified objects (for C, functions, macros with argments, and typedefs; Pascal, procedures, programs and functions; FORTRAN, subroutines, programs and functions) in a group of files.
ctags(1) ctags(1) DIAGNOSTICS Too many entries to sort. An attempt to get additional heap space failed; the sort could not be performed. Unexpected end of function in file file , line line . The tags file may be incorrect. A } character was found unexpectedly in the first column. This can lead to incorrect entries in the tags file. Duplicate entry in file file , line line : name. Second entry ignored. The same name was detected twice in the same file.
ctags(1) ctags(1) SEE ALSO ex(1), vi(1).
cu(1) cu(1) NAME cu - call another (UNIX) system, terminal emulator SYNOPSIS cu [-s speed] [-l line] [-h] [-q] [-t] [-d level] [-e-o] [-m] [-n] [telnosystemnamedir ] XPG4 Syntax cu [-s speed] [-l line] [-h] [-q] [-t] [-d] [-e-o] [-m] [-n] [telnosystemnamedir ] DESCRIPTION cu calls up another system, which is usually a UNIX operating system, but can be a terminal or a nonUNIX operating system. cu manages all interaction between systems, including possible transfers of ASCII files.
cu(1) cu(1) Normally, an automatic DC3/DC1 protocol is used to control input from the remote to ensure that the buffer is not overrun. "Prompt handshaking" can be used to control transfer of ASCII files to systems that have no type-ahead capability but require data to be sent only after a prompt is given. This is described in detail below. Lines beginning with ˜ have special meanings. Transmit Process Commands The transmit process interprets the following commands: ~., ˜.. Terminate the conversation.
cu(1) cu(1) form where a circumflex (ASCII 94) precedes the character, as in ˆX . A null character can be specified with ˆ@. (A null first character in the prompt implies a "null" prompt, which always appears to be satisfied.) A circumflex is specified by ˆ ˆ. ~%> [>]file ~susp Divert output from the remote system to the specified file until another ˜%> command is given. When an output diversion is active, typing ˜%> terminates it, whereas ˜%> anotherfile terminates it and begins a new one.
cu(1) cu(1) EXAMPLES To dial a system whose number is 9 201 555 1212 using 1200 baud: cu -s1200 9=2015551212 If the speed is not specified, 300 is the default value.
cue(1) cue(1) (Series 800 Only) NAME cue - HP Character-Terminal User Environment (CUE) SYNOPSIS /usr/bin/cue DESCRIPTION CUE provides an easy-to-use, attractive, customizable environment that allows users on Series 800 HP-UX systems to easily identify themselves to the system and begin a work session. See DEPENDENCIES for supported terminal types.
cue(1) cue(1) (Series 800 Only) Starting Cue There are several methods that can be used to start cue . c • An entry for cuegetty can be placed in the /etc/inittab file. See cuegetty(1M)). This is the preferred method as the user does not need to do anything further to start cue . • Start cue from the command line by typing: cue . • Start cue by making it the last entry in the user’s .login configuration file.
cue(1) cue(1) (Series 800 Only) VT320 Terminal Support Because the VT320 terminal has predefined local functions for keys labeled as F1, F2, F3 and F4, users should use following mapping when they desire to use function keys: HP or Wyse60 VT320 or HP 700/60 in VT320 mode F1 PF2 ! F2 PF1 ! F3 space bar F4 PF3 ! F5 F10, [ EXIT ], F5 * F6 none F7 F18, first unlabeled key to right of Pause/Break* F8 * ! c F19, second unlabeled key to right of Pause/Break* When using PC-AT keyboard with HP 7
cue(1) cue(1) (Series 800 Only) It may be possible for a user with the "HP 700/60 terminal in DEC mode, or DEC terminal with PC-AT type keyboard" configuration to be told to press function key F1 through F4 to achieve some desired result. For HP 700/60 terminal in DEC mode or DEC terminals, these functions keys may be mapped onto PF1-PF4 keys. (see "Keyboard Mappings"). However, the PC-AT type keyboard does not provide PF1, PF2, PF3, or PF4 keys, as does the DEC/ANSI keyboard.
cue(1) cue(1) (Series 800 Only) FILES /var/adm/btmp history of bad login attempts /etc/logingroup group file - defines group access lists /etc/motd message-of-the-day /etc/passwd password file - defines users, passwords, and primary groups /etc/profile system profile (initialization for all users) /etc/securetty list of valid ttys for root login /etc/utmp users currently logged in /var/adm/wtmp history of logins, logouts, and date changes /var/mail/ your-name mailbox for user your-name /usr/bin/cue cue e
cut(1) cut(1) NAME cut - cut out (extract) selected fields of each line of a file SYNOPSIS cut -c list [ file]... cut -b list [-n] [ file]... cut -f list [-d char ] [-s] [ file]... c DESCRIPTION cut cuts out (extracts) columns from a table or fields from each line in a file; in data base parlance, it implements the projection of a relation.
cut(1) cut(1) setting, cut behaves as if all internationalization variables are set to "C". See environ(5). International Code Set Support cut supports both single- and multi-byte character code sets. International code set characters may be specified in the char given to the -d option. cut recognizes the international code set characters according to the locale specified in the LC_CTYPE environment variable.
date(1) date(1) NAME date - display or set the date and time SYNOPSIS date date date date d [-u] [-u] +format [-u] [mmddhhmm[[cc]yy]] [-a [-]sss[.fff]] DESCRIPTION The date command displays or sets the current HP-UX system clock date and time. Since the HP-UX system operates in Coordinated Universal Time (UTC), date automatically converts to and from local standard or daylight/summer time, based on your TZ environment variable. See Environment Variables in EXTERNAL INFLUENCES below.
date(1) date(1) do you really want to run time backwards?[yes/no] Type yes or the equivalent for your locale to set the clock backwards; anything else to cancel the command. When date is used to set the date, a pair of date change records is written to the file /var/adm/wtmp . (XPG4 only.) No warning is generated if date is set backwards. Formatting Directives The following formatting directives, shown without the optional field width and precision specification, are replaced by the indicated characters.
date(1) d date(1) %w Weekday as a one-digit decimal number [0-6 (Sunday-Saturday)]. For example, 3. %W Week number of the year (Monday as the first day of the week) as a two-digit decimal number [00 -53 ]. All days that precede the first Monday in the year are considered to be in week 00 . For example, 02. %x Current date representation. For example, 01/12/94 . %X Current time representation. For example, 19:45:58 . %y Year without century as a two-digit decimal number [00-99]. For example, 93.
date(1) date(1) %Oy Year (offset from %C) in alternate representation. Field Width and Precision An optional field width and precision specification can immediately follow the initial % of a formatting directive in the following order: [-0]width The decimal digit string width specifies a minimum field width in which the result of the conversion is right- or left-justified. The default is right-justified with space padding on the left.
date(1) date(1) The character c is not a valid format directive, field width specifier, or precision specifier. do you really want to run time backwards?[yes/no] The date/time you specified is earlier than the current clock value. Type yes (or the equivalent for your locale) to set the clock backwards; anything else to cancel the command. no permission You need the superuser privilege to change the date. d EXAMPLES Date in Different Languages Display the date.
date(1) date(1) SEE ALSO locale(1), stime(2), ctime(3C), strftime(3C), tztab(4), environ(5), lang(5), langinfo(5). STANDARDS CONFORMANCE date : SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
dc(1) dc(1) NAME dc - desk calculator SYNOPSIS dc [ file ] d DESCRIPTION dc is an arbitrary precision arithmetic package. Ordinarily it operates on decimal integers, but one may specify an input base, output base, and a number of fractional digits to be maintained. (See bc(1), a preprocessor for dc that provides infix notation and a C-like syntax that implements functions. bc also provides reasonable control structures for programs.) The overall structure of dc is a stacking (reverse Polish) calculator.
dc(1) dc(1) o The top value on the stack is popped and used as the number radix for further output. See below for notes on output base. O k pushes the output base on the top of the stack. K z Z ? ; and : Y pushes the scale factor on the top of the stack. the top of the stack is popped, and that value is used as a non-negative scale factor: the appropriate number of places are printed on output, and maintained during multiplication, division, and exponentiation.
dd(1) dd(1) NAME dd - convert, reblock, translate, and copy a (tape) file SYNOPSIS dd [option=value] ... DESCRIPTION dd copies the specified input file to the specified output file with possible conversions. The standard input and output are used by default. Input and output block size can be specified to take advantage of raw physical I/O. Upon completion, dd reports the number of whole and partial input and output records.
dd(1) dd(1) Swap every pair of input bytes. swab noerror Do not stop processing on an input error. If the sync conversion symbol is also specified, missing input is replaced with null bytes and processed normally; otherwise, the input block is omitted from the output. notrunc Do not truncate existing output file. Blocks in the output file not overwritten by this invocation of dd are preserved. sync Pad every input block to size ibs .
dd(1) dd(1) Note the use of the raw magnetic tape device file. dd is especially suited to I/O on raw physical devices because it allows reading and writing in arbitrary block sizes. WARNINGS Some devices, such as 1/2-inch magnetic tapes, are incapable of seeking. Such devices may be positioned prior to running dd by using mt(1) or some other appropriate command. The skip , seek , iseek and oseek options do work for such devices.
delta(1) delta(1) NAME delta - make a delta (change) to an SCCS file SYNOPSIS delta [-r SID ] [-s ] [-n ] [-g list ] [-m mrlist ] [-y comment ] [-p ] files DESCRIPTION The delta command is used to permanently introduce into the named SCCS file changes that were made to the file retrieved by get (called the g-file, or generated file). See get(1). delta makes a delta to each named SCCS file.
delta(1) delta(1) LC_MESSAGES determines the language in which messages are displayed. If LC_CTYPE or LC_MESSAGES is not specified in the environment or is set to the empty string, the value of LANG is used as a default for each unspecified or empty variable. If LANG is not specified or is set to the empty string, a default of "C" (see lang(5)) is used instead of LANG . If any internationalization variable contains an invalid setting, delta behaves as if all internationalization variables are set to "C".
deroff(1) deroff(1) NAME deroff - remove nroff, tbl, and neqn constructs SYNOPSIS deroff [-mx ] [-w] [-i] [ file ... ] DESCRIPTION deroff reads each file in sequence and removes all nroff requests, macro calls, backslash constructs, neqn constructs (between .EQ and .EN lines, and between delimiters — see neqn(1)), and tbl descriptions (see tbl(1)), replacing them with white space (blanks and blank lines), and writes the remainder of the file on the standard output.
diff(1) diff(1) NAME diff - differential file and directory comparator SYNOPSIS diff [-C n ] [-S name ] [-lrs ] [-bcefhintw ] dir1 dir2 diff [-C n ] [-S name ] [-bcefhintw ] file1 file2 diff [-D string ] [-biw ] file1 file2 d DESCRIPTION Comparing Directories If both arguments are directories, diff sorts the contents of the directories by name, then runs the regular file diff algorithm (described below) on text files that have the same name in each directory but are different.
diff(1) diff(1) -C n -h Output format similar to -c but with n lines of context. Do a fast, half-hearted job. This option works only when changed stretches are short and well separated, but can be used on files of unlimited length.
diff(1) diff(1) WARNINGS Editing scripts produced by the -e or -f option are naive about creating lines consisting of a single dot (.). When comparing directories with the -b , -w , or -i options specified, diff first compares the files in the same manner as cmp , then runs the diff algorithm if they are not equal. This may cause a small amount of spurious output if the files are identical except for insignificant blank strings or uppercase/lowercase differences.
diff3(1) diff3(1) NAME diff3 - 3-way differential file comparison SYNOPSIS diff3 [-exEX3 ] file1 file2 file3 DESCRIPTION diff3 compares three versions of a file, and prints disagreeing ranges of text flagged with these codes: ==== ====1 ====2 ====3 all three files differ file1 is different file2 is different file3 is different d The type of change required to convert a given range of a given file to some other is indicated in one of these ways: f :n1 a Text is to be appended after line number n1 in
diffmk(1) diffmk(1) NAME diffmk - mark changes between two different versions of a file SYNOPSIS diffmk prevfile currfile markfile d DESCRIPTION diffmk compares the previous version of a file with the current version and creates a file that includes nroff /troff ‘‘change mark’’ commands. prevfile is the name of the previous version of the file and currfile is the name of the current version of the file.
dircmp(1) dircmp(1) NAME dircmp - directory comparison SYNOPSIS dircmp [-d] [-s] [-wn ] dir1 dir2 DESCRIPTION dircmp examines dir1 and dir2 and generates various tabulated information about the contents of the directories. Sorted listings of files that are unique to each directory are generated for all the options. If no option is entered, a sorted list is output indicating whether the filenames common to both directories have the same contents.
dmpxlt(1) dmpxlt(1) NAME dmpxlt - dump iconv translation tables to a readable format SYNOPSIS /usr/bin/dmpxlt [-f output_filename] [input_filename] DESCRIPTION dmpxlt dumps the compiled version of the iconv codeset conversion tables into an ASCII-readable format that can be modified and used as input to genxlt(1) to regenerate the table for iconv(1). d Options dmpxlt recognizes the following options: -f output_filename If this option is not selected, the data will be sent to standard output.
dnssec-keygen(1) dnssec-keygen(1) NAME dnssec-keygen - key generation tool for DNSSEC SYNOPSIS dnssec-keygen [-a algorithm] [-b keysize] [-e] [-g generator] [-h] [-n nametype] [-p protocol-value] [-r randomdev] [-s strength-value] [-t type] [-v level] name DESCRIPTION dnssec-keygen generates keys for Secure DNS (DNSSEC) as defined in RFC2535. It also generates keys for use in Transaction Signatures (TSIG) which is defined in RFC2845.
dnssec-keygen(1) d dnssec-keygen(1) -t type This option indicates if the key is used for authentication or confidentiality. type can be either AUTHCONF , NOAUTHCONF , NOAUTH or NOCONF . The default is AUTHCONF . If type is AUTHCONF , the key can be used for authentication and confidentiality. Setting type to NOAUTHCONF indicates that the key cannot be used for authentication or confidentiality. A value of NOAUTH means the key can be used for confidentiality but not for authentication.
dnssec-makekeyset(1) dnssec-makekeyset(1) NAME dnssec-makekeyset - used to produce a set of DNSSEC keys SYNOPSIS dnssec-makekeyset [-h help] [-s start-time ] [-e end-time] [-t TTL] [-r randomdev] [-p] [-v level] keyfile ... DESCRIPTION dnssec-makekeyset generates a key set from one or more keys created by dnssec-keygen. It creates a file containing KEY and SIG records for some zone which can then be signed by the zone’s parent if the parent zone is DNSSEC-aware.
dnssec-makekeyset(1) dnssec-makekeyset(1) produced when dnssec-keygen created the domain’s public and private keys. The .keyset file can then be transferred to the DNS administrator of the parent zone for them to sign the contents with dnssec-signkey. EXAMPLE The following command generates a key set for the DSA key for example.com that was shown in the dnssec-keygen man page. (Note the backslash is simply a line continuation character and not part of the dnssec-makekeyset command syntax.
dnssec-signkey(1) dnssec-signkey(1) NAME dnssec-signkey - DNSSEC keyset signing tool SYNOPSIS dnssec-signkey [-h] [-p] [-r randomdev] [-v level] keyset keyfile ... DESCRIPTION dnssec-signkey is used to sign a key set for a child zone. Typically this would be provided by a .keyset file generated by the dnssec-makekeyset utility. This provides a mechanism for a DNSSEC-aware zone to sign the keys of any DNSSEC-aware child zones. The child zone’s key set gets signed with the zone keys for its parent zone.
dnssec-signzone(1) dnssec-signzone(1) NAME dnssec-signzone - DNSSEC zone signing tool SYNOPSIS dnssec-signzone [-a] [-c cycle-time ] [-e end-time] [-f output-file] [-o origin] [-p] [-r randondev] [-s start-time ] [-v level] zonefile keyfile .... DESCRIPTION dnssec-signzone is used to sign a zone. Any .signedkey files for the zone to be signed should be present in the current directory, along with the keys that will be used to sign the zone.
dnssec-signzone(1) dnssec-signzone(1) An absolute start time is indicated by a number in YYYYMMDDHHMMSS notation; such as, 20000530144500 denotes 14:45:00 UTC on May 30th, 2000. A relative start time is supplied when start-time is given as +N specifying N seconds from the current time. If no -s option is supplied, the current date and time is used for the start time of the SIG records. -v level This option is used to make dnssec-signzone more verbose.
domainname(1) domainname(1) NAME domainname - set or display name of Network Information Service domain SYNOPSIS domainname [ name_of_domain ] d DESCRIPTION Network Information Service (NIS) uses domain names to refer collectively to a group of hosts. Without an argument, domainname displays the name of the NIS domain. Only superuser can set the domain name by providing name_of_domain. The domain name is usually set in the configuration file /etc/rc.config.
dos2ux(1) dos2ux(1) NAME dos2ux, ux2dos - convert ASCII file format SYNOPSIS dos2ux file... ux2dos file... DESCRIPTION dos2ux and ux2dos read each specified file in sequence and write it to standard output, converting to HP-UX format or to DOS format, respectively. Each file can be either DOS format or HP-UX format for either command. A DOS file name is recognized by the presence of an embedded colon (:) delimiter; see dosif(4) for DOS file naming conventions.
doschmod(1) doschmod(1) (TO BE OBSOLETED) NAME doschmod - change attributes of a DOS file SYNOPSIS doschmod [-mu ] mode device : file ... DESCRIPTION The doschmod command is targeted for removal from HP-UX; see the WARNINGS below. doschmod is the DOS counterpart of chmod (see chmod(1)). d Options doschmod recognizes one option: -m If an ordinary file with the same name as volume label exists, operation will be performed on the file instead of volume label. -u Disable argument case conversion.
doscp(1) doscp(1) (TO BE OBSOLETED) NAME doscp - copy to or from DOS files SYNOPSIS doscp [-fmvu ] file1 file2 doscp [-fmvu ] file1 [ file2 ... ] directory DESCRIPTION The doscp command is targeted for removal from HP-UX; see the WARNINGS below. doscp is the DOS counterpart of cp (see cp(1)). doscp copies a DOS file to a DOS or HP-UX file, an HPUX file to an HP-UX or DOS file, or HP-UX or DOS files to an HP-UX or DOS directory. The last name in the argument list is the destination file or directory.
doscp(1) doscp(1) (TO BE OBSOLETED) SEE ALSO cp(1), dos2ux(1), doschmod(1), dosdf(1), dosls(1), dosmkdir(1), dosrm(1), ioscan(1M) dosif(4).
dosdf(1) dosdf(1) NAME dosdf - report number of free disk clusters SYNOPSIS dosdf device[:] DESCRIPTION dosdf is the DOS counterpart of the df command (see df(1)). It prints the cluster size in bytes and the number of free clusters on the specified DOS volume. SEE ALSO df(1), dos2ux(1), doschmod(1), doscp(1), dosls(1), dosmkdir(1), dosrm(1), dosif(4).
dosls(1) dosls(1) (TO BE OBSOLETED) NAME dosls, dosll - list contents of DOS directories SYNOPSIS dosls [-aAmudl ] device :[ file ] ... dosll [-aAmudl ] device :[ file ] ... DESCRIPTION The dosls and dosll commands are targeted for removal from HP-UX; see the WARNINGS below. d dosls is the DOS counterpart of ls (see ls(1)). For each directory named, dosls lists the contents of that directory. For each file named, dosls repeats its name and any other information requested.
dosmkdir(1) dosmkdir(1) (TO BE OBSOLETED) NAME dosmkdir - make a DOS directory SYNOPSIS dosmkdir [-mu ] device :directory ... DESCRIPTION The dosmkdir command is targeted for removal from HP-UX; see the WARNINGS below. dosmkdir is the DOS counterpart of the mkdir command (see mkdir(1)). It creates specified directories. The standard entries, . for the directory itself and .. for its parent, are made automatically.
dosrm(1) dosrm(1) (TO BE OBSOLETED) NAME dosrm, dosrmdir - remove DOS files or directories SYNOPSIS dosrm [-fmriu ] device :file ... dosrmdir [-mu ] device :file ... DESCRIPTION The dosrm and dosrmdir commands are targeted for removal from HP-UX; see the WARNINGS below. d dosrm and dosrmdir are DOS counterparts of rm and rmdir (see rm(1) and rmdir(1), respectively). dosrm removes the entries for one or more files from a directory.
du(1) du(1) NAME du - summarize disk usage SYNOPSIS du [-a-s] [-bkrx ] [-t type ] [ name ... ] DESCRIPTION The du command gives the number of 512-byte blocks allocated for all files and (recursively) directories within each directory and file specified by the name operands. The block count includes the indirect blocks of the file. A file with two or more links is counted only once. If name is missing, the current working directory is used.
echo(1) echo(1) NAME echo - echo (print) arguments SYNOPSIS echo [ arg ] ... DESCRIPTION echo writes its arguments separated by blanks and terminated by a new-line on the standard output.
ed(1) ed(1) NAME ed, red - line-oriented text editor SYNOPSIS ed [-p string] [-s-] [-x] [file] red [-p string] [-s-] [-x] [file] DESCRIPTION The ed command executes a line-oriented text editor. It is most commonly used in scripts and noninteractive editing applications because, even though it can be used interactively, other editors such as vi and ex are typically easier to use in an interactive environment.
ed(1) ed(1) s/s1/s2 s/s1/s2/p g/s1 g/s1/p ?s1 ?s1? Line Addresses To understand line addressing, remember that ed maintains a pointer to the current line. Generally speaking, the current line is the last line affected by a command. The exact effect of a given command on the current line is discussed under the description of each command. Addresses are interpreted according to the following rules: e 1. The character . refers to the current line. 2.
ed(1) (.,. )c text . (.,. )d e file ed(1) The c (change) command deletes the addressed lines then accepts input text to replace the deleted lines. Upon completion, the new current line is the last line in text or, if no text was provided, at the first line after the deleted line or lines. The d (delete) command deletes the addressed lines from the buffer.
ed(1) ed(1) Long lines are folded with the point of folding indicated by writing a backslash character followed by a newline. The end of each line is marked with a $. An l (ell) command can be appended to any command other than e, E, f, q, Q, r, w, or !. The current line number is set to the address of the last line written.
ed(1) ed(1) When the character % is the only character in replacement, the replacement used in the most recent substitute command is used as the replacement in the current substitute command. The % loses its special meaning when it is in a replacement string containing more than one character or when preceded by a \. A line can be split by substituting a newline character into it. The newline in replacement must be escaped by preceding it by \.
ed(1) ed(1) If an interrupt signal (ASCII DEL or BREAK) is sent, ed prints a ? and returns to its command level. The following size limitations apply: 256 characters per global command list, 64 characters per file name, and 32 MB characters in the buffer. The limit on the number of lines depends on the amount of user memory: each line takes 1 word. EXTERNAL INFLUENCES Environment Variables SHELL determines the preferred command-line interpreter for use in all !-style commands.
ed(1) ed(1) If the editor input is coming from a command file (e.g., ed file < ed-cmd-file) , the editor exits at the first failure of a command in the command file. When reading a file, ed discards ASCII NUL characters and all characters after the last newline. This can cause unexpected behavior when using regular expressions to search for character sequences containing NUL characters or text near end-of-file. AUTHOR ed was developed by HP and OSF. FILES /tmp/e p ed.
elfdump(1) elfdump(1) (ELF Applications Only) NAME elfdump - dump information contained in object files. SYNOPSIS elfdump [-acCdfghHjkLopqrsStuUvV] [-dc ] [-dl ] [-tx ] [-tv ] [-D num ] [+D num2 ] [+interp ] [+linkmap ] [+linkmap_bss ] [+linkmap_file] [-n name ] [+objdebug ] [+s section ] [-T num ] [+T num2 ] files... DESCRIPTION elfdump takes one or more object files or libraries and dumps information about them.
elfdump(1) elfdump(1) (ELF Applications Only) -n name (Modifier) Dumps information about the specified section or symbol name. This option is valid with -h, -r , -s, and -t . If used with -t , name pertains to a symbol name and elfdump will only dump the symbol entry whose name matches name. If used with the other options, name pertains to a section name and elfdump will only dump the section whose name matches it. -o -p -q -r -s +objdebug +s name -S -t -tx Dumps the optional headers (program headers).
elfdump(1) elfdump(1) (ELF Applications Only) Texts and Tutorials HP-UX Linker and Libraries Online User Guide (See the +help option) HP-UX Linker and Libraries User’s Guide (See manuals(5) for ordering information) HP-UX Software Transition Toolkit (STK) -- ELF Object Formats http://www.software.hp.
elm(1) elm(1) NAME elm - process electronic mail through a screen-oriented interface SYNOPSIS elm [-aKkmtVz ] [-f folder] elm elm elm elm [-s subject] address-list -c [alias-list] -h -v DESCRIPTION The elm program is a screen-oriented electronic mail processing system. It supports the industry-wide MIME standard for nontext mail, a special forms message and forms reply mechanism, and an easy-to-use alias system for individuals and groups.
elm(1) elm(1) CONFIGURATION section). -s subject -t e Subject. Specify the subject for a File Mode or Message Mode message. Set usetite=OFF . Do not use the termcap ti /te and terminfo cup cursorpositioning entries. This overrides the setting of the usetite boolean variable (see the ELM CONFIGURATION section). -V Verbose transmission. Pass outbound messages to the sendmail mail transport agent using the -v option (see sendmail(1M)). -v Version. Print out the elm version information.
elm(1) elm(1) header entry An entry in the header portion of a message, sometimes called a header field. incoming mailbox The mailbox where you receive your mail, usually /var/mail/ loginname. mail directory The directory, defined by the maildir string variable, where a user normally stores mail messages in folders. mail transport agent (MTA) The program that sends and receives mail messages to and from other systems. On HP-UX systems, the MTA is sendmail (see sendmail(1M)).
elm(1) elm(1) no subject (file transmission) The expressed or default value of subject is placed in the Subject: header entry. See the EXAMPLES section. MESSAGE MODE If standard input is connected to your terminal, and an address-list is specified, elm operates in Message Mode. The address-list is expanded, based on your elm alias database and the system elm alias database, and placed in the To: header entry.
elm(1) elm(1) This also enables conformance with SMTP (RFC 821), which allows only 7-bit characters in the message, by using MIME-encoding (base64 and quoted-printable) to convert 8-bit data to 7-bit. elm also provides a facility to view multipart MIME messages.
elm(1) e elm(1) ?key ... Help on key. Display a one-line description of what each key does. ? displays a summary listing for each command available. A period (.) returns you to the Message Menu. @ | Display a summary of the messages indexed on the current screen. n New current message. Change the current message pointer to the one indexed as n. If the message is not on the current page of headers, the appropriate page displayed. Return Read current message.
elm(1) elm(1) g Group reply. The reply is automatically sent To: the sender of the message, with Cc: to all the original To: and Cc: recipients. Otherwise, the action is the same as for the r command. h j J k K l (ell) Same as Return, except that the message is displayed with all headers. Move down. Move the current message pointer down to the next message. Move down. Move the current message pointer down to the next undeleted message. Move up.
elm(1) elm(1) Move read messages to "received" folder? (y/n) This question is asked if you are reading your incoming mailbox and if you have messages that have been read. The default answer is provided by the alwaysstore boolean variable (ON means y (yes) and OFF means n (no)). If you answer y, undeleted messages that have been read will be moved to the folder defined by the receivedmail string variable and the next question will also be asked.
elm(1) elm(1) u Undelete. Remove the deletion mark from the current message. See also d, Ctrl-D, and Ctrl-U. Ctrl-U Undelete. Remove any deletion mark from all messages that contain a specified pattern in the From: and Subject: header entries. See also d, Ctrl-D, and u. v x View attachments. Invoke the Attachment View Menu for the current message. Exit. Exit without changing the mailbox. If changes are pending, such as deletions, you are asked if they can be abandoned.
elm(1) e elm(1) C Confidential. The Sensitivity: 3 header entry is present. The message is considered company confidential, as specified by the ISO X.400 standard. You can set this value for outbound mail with the user-defined option of the Header Menu. U P Urgent. The message contains a Priority: header entry. A F Action. The message contains an Action: header entry. M MIME. The message or its attachments is in a MIME format that can be displayed using metamail . ? MIME.
elm(1) elm(1) ~r filename ~s ~t ~v Include (read in) the contents of the specified file. Prompt for changes to the Subject: line. Prompt for changes to the To: list. Invoke the editor defined for the visualeditor string variable on the message, if possible. Alias Menu The Alias Menu is invoked with the Message Menu a command. The source text for your alias file is stored in the file $HOME/.elm/aliases.text. You can edit this file directly or with the following commands.
elm(1) elm(1) i, I j J k K l (ell) e See the Alias Menu q and Q commands. Move down. Move the current alias pointer down to the next alias. Move down. Move the current alias pointer down to the next undeleted alias. Move up. Move the current alias pointer up to the previous alias. Move up. Move the current alias pointer up to the previous undeleted alias. Limit the displayed aliases to certain types or those that contain certain string values. You are prompted with Enter criteria: .
elm(1) elm(1) View. Display the address-list for the current alias. v x Exit from the alias menu without processing any deletions. Aliases marked for deletion are unmarked and newalias is not run, even if alias additions have been made. Alias Index The aliases in the current database are indexed on the Alias Menu, one per line. The database values are defined in newalias(1). ssnum fullname[, comment ] type [(S) ] alias defined as: ss A two-character status field.
elm(1) elm(1) f File name. The name of the file to be attached. elm examines the file and sets the values of Content-Transfer-Encoding, Content-Disposition, and Content-Type accordingly. p Content-Disposition. The value is placed in a Content-Disposition: body-part header entry. The default is attachment; filename= filename. t Content-Type. The type of the file and supporting parameters, in the form: type/subtype [; parameter]...
elm(1) elm(1) Attachment View Menu The Attachment View Menu is invoked with the Send Menu v command. This menu displays a list of the attachments in a folder message, one per line, as described in the Attachment Index subsection. The commands are: Return Display the current attachment. j k Move the current attachment pointer down to the next attachment. Ctrl-L Redraw the screen. p q s Print the attachment. See the Message Menu p (print) command. v View the subattachment list, if any.
elm(1) elm(1) name is associated with a priority, and the Priority: header is null, the priority value is inserted in the Priority: header. If precedences is null or not set, you can enter any value. If the precedence name matches one defined in the sendmail configuration file /etc/mail/sendmail.cf, the transmission priority is modified accordingly. If there is no match, the priority is not changed. p r e s t Priority: header. Enter a string.
elm(1) elm(1) i,I Return to the Message Menu. q,Q Return to the Message Menu. x,X Exit immediately from elm without changing the mailbox. All pending changes are abandoned. Send Menu The Send Menu is invoked when your outbound message has been prepared to be mailed after a Message Menu f, g, m, or r command or the Alias Menu m command. The commands are: !command a c e Shell. Execute a shell command. See the Message Menu ! (shell) command. f Forget. Do not send the message.
elm(1) elm(1) To reply, use the Message Menu r (reply) command (you cannot use the Message Menu g (group reply) command). elm prompts you for each field, with any text present between the fields displayed as appropriate. The example above is presented line-by-line; user input is in italic type: On-Line Phone and Address Database Please fill out and return as soon as possible.
elm(1) elm(1) Other commonly used headers: Action: Content-Disposition: Expires: Newsgroups: Priority: Status: Apparently-To: Content-Length: Mailer: Precedence: Sensitivity: X-Mailer: ELM CONFIGURATION elm supports user configuration by means of the $HOME/.elm/elmrc configuration file. You can create the configuration file with the Options Menu > command. It can contain any combination of the string, numeric, and boolean variables described below.
elm(1) elm(1) ISO-8859-4 ISO-8859-5 ISO-8859-7 ISO-8859-8 ISO-8859-9 KOI8-R Shift_JIS configoptions A string of options that can be configured on the Options Menu. Specify the options as a single letter each, in the order they should be displayed. The default is "ˆ_cdefsopyv_am_un". The defaults are marked below with an *. The option characters include: e ^ _ a b c d e f h j k l m n o p r s t u v w y z The menu title. A blank line. The arrow string variable. * The prefix string variable.
elm(1) elm(1) permission, if no value or an invalid value is set by the elm user. elm mandates read-write permissions for the owner. Hence, if the value of folderperms in elmrc file does not grant read-write permissions to the owner, the default value is taken for setting the permissions. fullname The name the mailer will use when sending mail from you. The default is the full name portion (everything up to the first comma) of the pw_gecos field from your entry in the /etc/passwd file.
elm(1) elm(1) priority is an arbitrary string that is placed in a Priority: header entry. prefix The prefix for an included line in an outbound message. When you reply to a message or forward a message to another person, you can optionally include the original message. This prefix marks the included line. The default is >_ (the _ is interpreted as a space character). print The command to run when the p (print) command is executed from various menus.
elm(1) elm(1) visualeditor Name of the editor to use for the ˜v command of the built-in editor. The default is the value of the VISUAL environment variable, if set and nonnull, or /usr/bin/vi otherwise. weedout A list of header-entry initial strings that you don’t want to see when you are reading mail. This list is made effective by setting the weed boolean variable to ON . The list can continue for as many lines as desired, as long as the continued lines all have leading blanks.
elm(1) elm(1) If you set the value to 0, the message will always be sent through the external pager. The default is -3. noencoding This enables you to send raw 8-bit or binary data when the mail transfer agent doesn’t support the 8BITMIME and the -B8BITMIME options. The default is 0. The possible values are: e 0 Always convert 8-bit and binary messages to 7-bit before sending them. 1 Convert 8-bit messages to 7-bit, but depend on sendmail to handle binary messages.
elm(1) elm(1) ask If ON, you are asked the questions askcc Delete messages? (y/n) Move read messages to "received" folder? (y/n) Keep unread messages in incoming mailbox? (y/n) (as appropriate) each time you leave the program with the Message Menu q (quit) command. See that command for details of the process. If OFF , or if you use the Message Menu Q command, elm uses the values defined by the alwaysdelete , alwaysstore , and alwayskeep boolean variables, respectively, without prompting.
elm(1) elm(1) OFF and OFF Do not confirm before appending to a file in your mail directory. Do not confirm before appending to a file in another directory. If ON, save silent copies of all outbound mail on the outbound step. If OFF , do not save copies. The default is OFF . copy e If ON, and the savename boolean variable is ON , elm first tries to save it to a file named as defined by savename . If the file exists, the message is saved.
elm(1) elm(1) pointnew If ON, automatically point to the first new message in your message index at start-up. If OFF , point to the first message. In either case, if the startup folder is not your incoming mailbox, or if there are no new messages, point to the first message. The default is ON . promptafter If ON, prompt for a command after the external pager exits. If OFF , return to the calling menu. The default is ON .
elm(1) elm(1) This is similar to multipart/mixed, except that the default Content-Type is message/rfc822. multipart/report ; boundary=boundary-string message/rfc822 The message consists of another message in standard message format. metamail is a system program that is invoked by elm to manage the display of messages and attachments that are not displayable in ordinary ASCII text. e metamail provides external support for other Content-Types, as defined in one or more mailcap files.
elm(1) elm(1) International Code Set Support Single- and multibyte character code sets are supported. EXAMPLES Message Mode Example To send a message without loading the main elm mail-processing program, use the simple command form consisting of the name of the program followed by the recipient’s login name and optional address.
elm(1) elm(1) /var/mail/.elm /var/mail/.elm/aliases /var/mail/.elm/aliases.dir /var/mail/.elm/aliases.pag /var/mail/.elm/aliases.text /var/mail/ loginname /var/mail/ loginname .
elmalias(1) elmalias(1) NAME elmalias - display and verify elm user and system aliases SYNOPSIS elmalias [-dersu ] [-a-f format-n-v-V] [alias-name-list] Remarks The former functionality of the elmalias command has been taken over by the newalias command (see newalias(1)). DESCRIPTION The elmalias command displays and verifies user and system elm aliases. The system database must have been created by the newalias command (see newalias(1)).
elmalias(1) elmalias(1) %a %c %l %n %t %v e The alias name. The comment field. The lastname field. The fullname value. The alias type: person , group , or unknown . The address-list field. -n -r Change the display to address-list followed by fullname, if any, in parentheses. -s -u -v Use the system alias database only, unless -u is also specified. -V Use a very verbose, multiline output format with the following titles, corresponding to the format codes of the -f option.
elmalias(1) elmalias(1) mom dad father pop parents siblings brother1 my_mother@a.computer (My Mommy) host!otherhost!dad (Dear Father) host!otherhost!dad (Dear Father) host!otherhost!dad (Dear Father) mom,dad,parent@host (The Folks) brother1,brother2,sister (The Kids) bro1@kid.
enable(1) enable(1) NAME enable, disable - enable/disable LP printers SYNOPSIS enable printers disable [-c] [-r[reason] ] printers DESCRIPTION The enable command activates the named printers, enabling them to print requests taken by lp . Use lpstat to find the status of printers (see lp(1) and lpstat(1)). disable deactivates the named printers, disabling them from printing requests taken by lp.
env(1) env(1) NAME env - set environment for command execution SYNOPSIS env [-] [-i] [ name = value ] ... [ command [ arguments ... ] ] DESCRIPTION env obtains the current environment, modifies it according to its arguments, then executes the command with the modified environment. Arguments of the form name =value are merged into the inherited environment before the command is executed.
eucset(1) eucset(1) NAME eucset - set and get code widths for ldterm SYNOPSIS eucset [-p] eucset [ [-c HP15-codeset] or [-c UTF8] or [-c GB18030] or [cswidth] ] e DESCRIPTION The eucset command sets or gets (reports) the encoding and display widths of the Extended UNIX Code (EUC), and UCS Transformation Format (UTF8), and GB18030 characters processed by the current input terminal. EUC is an encoding method for codesets composed of single or multiple bytes.
eucset(1) eucset(1) 1:1,0:0,0:0 This default string designates that the environment uses a single byte EUC codeset that has characters in the EUC codeset 1 format. If the environment uses a multibyte EUC codeset in the codeset 1 format, single byte or multibyte EUC codesets in the codeset 2 or 3 format, or both, the default setting cannot be used. EXTERNAL INFLUENCES Environment Variables LANG Provide a default value for the internationalization variables that are unset or null.
ex(1) ex(1) NAME ex, edit - extended line-oriented text editor SYNOPSIS ex [-] [-l] [-r] [-R] [-t tag] [-v] [-wsize] [-x] [-C] [+command] [file ...] XPG4 Synopsis ex [-rR ] [-s -v] [-c command] [-t tag] [-w size] [file ...] Obsolescent Options ex [-rR ] [- -v] [+command] [-t tag] [-w size] [file ...] edit [-] [-l] [-r] [-R] [-t tag] [-v] [-wsize] [-x] [-C] [+command] [file ...] e Remarks The program names ex, edit , vi, view , and vedit are separate personalities of the same program.
ex(1) ex(1) -x Set encryption mode. You are prompted for a key to initiate the creation or editing of an encrypted file (see the crypt command in Command Descriptions below). -C Encryption option. Same as the -x option, except that all text read in is assumed to have been encrypted. -c command +command (XPG4 only.) (Obsolescent) Begin editing by executing the specified ex search or positioning command. file Specify the file or files to be edited.
ex(1) e ex(1) +n, +[+]... -n, -[-]... /re / ?re ? An offset relative to the current line or the preceding line specification. + means forward; - means backward. For example, the forms .+3 , +3 , and +++ are equivalent. ’x Lines can be marked using single lowercase letters (see the mark command in Command Descriptions below). ’x refers to the line marked with x. In addition, the previous current line is marked before each nonrelative motion.
ex(1) ex(1) The sequence \u (\l ) causes the immediately following character in the replacement to be converted to uppercase (lowercase), if the character is a letter. The sequence \U (\L ) turns case conversion on, until the sequence \E or \e is encountered, or the end of the replacement string is reached. Command Names and Abbreviations The following table summarizes the line-mode commands. The commands whose names are enclosed in parentheses are available only in their abbreviated forms. Command Abbr.
ex(1) ex(1) There are also numbered buffers, 1 through 9, which shall be accessible only from visual mode. These buffers are special in that, in the visual mode, when deleted text is placed in the unnamed buffer, it also shall be placed in buffer 1, the previous contents buffer 1 shall be placed in buffer 2 and so on. Any text in the buffer 9 shall be lost. Text that is yanked into the unnamed buffer shall not modify the numbered buffers.
ex(1) ex(1) A copy of the specified lines (range) is placed after the specified destination line; line 0 specifies that the lines are to be placed at the beginning of the work area. (The letter t is an alternative abbreviation for the copy command.) crypt cr[ypt ] X The user is prompted for a key with which to enter encryption mode. This command can also be used to change the key entered from a previous crypt command or the -x command line option.
ex(1) ex(1) terminated by the visual-mode Q command in order to proceed to the next marked line.) The global command itself and the undo command are not allowed in command. The editor options autoprint , autoindent , and report are inhibited. Appending a ! to the global command (that is, g! ...) or using the alternate name v causes command to be run on the lines within range that do not match the pattern. insert line i[nsert ][!] Enter input mode; the input text is placed before the specified line.
ex(1) ex(1) (The # character is an alternative abbreviation for the number command.) Print the lines, each preceded by its line number (the only useful flag is l). The last line printed becomes the current line. open line o[pen ] /re / flags Enter open mode, which is similar to visual mode with a one-line window. All the visual-mode commands are available. If a match is found in line for the optional regular expression, the cursor is placed at the start of the matching pattern.
ex(1) ex(1) current indicator line shall be affected by the editor options, autowrite and writeany . se[t] [all ] se[t] [no]boolean-option? se[t] value-option[?] se[t] boolean-option se[t] noboolean-option se[t] value-option =value set Set and display the values of the editor options (see Editor Options below). With no arguments, the command prints those editor options whose values have been changed from the default settings. If all is specified, it prints all current option values.
ex(1) ex(1) The form s\& repl is equivalent to s/ subs-re /repl /, where subs-re is the previous substitution string. suspend stop su[spend ][!] st[op][!] susp Suspend the editor job and return to the calling shell. stop and susp are equivalent to suspend . susp is the user process control suspend character, which is typically the character ˆZ (ASCII SUB) (see stty(1)). This command is disabled if the calling shell does not support job control or has disabled it.
ex(1) ex(1) If an alternate file is specified and the file exists, the write fails, but can be forced by appending ! to the command. To append to an existing file, append >> to the command. If the file does not exist, an error is reported. If the file is specified as !string, string is interpreted as a system command, the command interpreter is invoked, and the specified lines are passed as standard input to the command. The command wq is equivalent to a w followed by a q.
ex(1) ex(1) If type is specified, it must be one of the following characters: + . ^ = Display a window of lines following the addressed line. Place the addressed line at the bottom of the window of displayed lines. Place the addressed line at the center of the window. Display a window of lines that is two windows prior to the addressed line. Display the addressed line at the center of the window with a line of dashes above and below the addressed line.
ex(1) ex(1) message. doubleescape When set, two consecutive ESC (escape) characters are required to leave input mode. In input mode, a single ESC character followed by a different character causes vi to issue an audible or visual warning (see the flash editor option) and insert both characters into the work area. Reversed by nodoubleescape. The default is nodoubleescape.
ex(1) ex(1) magic Affect the interpretation of characters in regular expressions and substitution replacement strings (see Regular Expressions and Replacement Strings above). Reversed by nomagic . The ex, vi, and view default is magic . The edit and vedit default is nomagic . mesg Allows other users to use the write command (see write(1)) to send messages to your terminal, possibly disrupting the screen display.
ex(1) ex(1) sections= pair-string The value of this option is a string, in that successive pairs of characters specify the names of text-processing macros that begin sections. See the paragraphs editor option above. The default is sections=NHSHH\ HUuhsh+c. shell= filename (sh) Set the file name of the shell to be used for the ! shell escape and the shell command. It defaults to the value of your SHELL environment variable, if set, and otherwise to /usr/bin/sh .
ex(1) timeoutlen= n ex(1) Set, in milliseconds (ms), the length of the macro timeout period (see the timeout editor option). This option has no effect unless timeout is set. The value of n must be at least 1. The default is timeoutlen=500 (half a second). ttytype= termtype (tty ) Define the type of terminal being used with the editor. See the term editor option for details. There is no difference between the term and ttytype editor options. Setting either one results in both being changed.
ex(1) ex(1) LC_COLLATE determines the collating sequence used in evaluating regular expressions and in processing the tags file. If it is not specified or is null, it defaults to the value of LANG . LC_CTYPE determines the interpretation of text as single and/or multibyte characters, the classification of characters as uppercase or lowercase letters, the shifting of the case of letters, and the characters matched by character class expressions in regular expressions.
ex(1) ex(1) processed, any commands specified by the -c option shall be processed. By default, ex shall start in the command mode, which shall be indicated by the ":" prompt. The input mode can be entered by append , insert , or change commands. There is one other mode, visual mode, in which full screen editing is available. This is described more fully under the visual command. The command line can consist of multiple ex commands separated by vertical-line characters(|).
expand(1) expand(1) NAME expand, unexpand - expand tabs to spaces, and vice versa SYNOPSIS expand [-t tablist ] [ file ... ] unexpand [-a] [-t tablist ] [ file ... ] Obsolescent: expand [-tabstop ] [-tab1,tab2,... , tabn ] [ file ... ] e DESCRIPTION expand processes the named files or the standard input and writes to the standard output with tabs changed into spaces. Backspace characters are preserved in the output, and the column count is decreased by one column for tab calculations.
expand(1) expand(1) STANDARDS CONFORMANCE expand : XPG4, POSIX.2 unexpand : XPG4, POSIX.
expand_alias(1) expand_alias(1) NAME expand_alias - recursively expands the sendmail aliases SYNOPSIS expand_alias [-rmax_recursion] [-t] [-tt ] alias DESCRIPTION e Expand_alias is a shell script that recursively expands the sendmail aliases. Through use of telnet host 25 and the expn command, each alias is recursively expanded into its destination(s). Indentation is used to show each level of recursion. Because of the recursive use of telnet , expand_alias is slow.
expr(1) expr(1) NAME expr - evaluate arguments as an expression SYNOPSIS expr arguments DESCRIPTION expr takes arguments as an expression, evaluates, then writes the result on the standard output. Terms in the expression must be separated by blanks. Characters special to the shell must be escaped. Note that 0, rather than the null string, is returned to indicate a zero value. Strings containing blanks or other special characters should be quoted.
expr(1) expr(1) International Code Set Support Single- and multi-byte character code sets are supported. RETURN VALUE As a side effect of expression evaluation, expr returns the following exit values: 0 1 2 >2 e Expression is neither null nor zero. Expression is null or zero. Invalid expression. An error occurred while evaluating the expression.
factor(1) factor(1) NAME factor, primes - factor a number, generate large primes SYNOPSIS factor [ number ] primes [ start [ stop ] ] DESCRIPTION If no arguments are provided on the command line, factor waits for a number to be typed in. If a positive number is typed, it factors the number and print its prime factors; each one is printed the proper number of times. It then waits for another number. factor exits if it encounters a zero or any nonnumeric character.
fastbind(1) fastbind(1) NAME fastbind - Prepare an incomplete executable for faster program start-up SYNOPSIS fastbind [-nu] incomplete-executable... DESCRIPTION fastbind is a tool that can improve the start-up time of programs that use shared libraries (incomplete executables) by storing information about needed shared library symbols in the executable file.
fastbind(1) fastbind(1) LC_CTYPE Determines the locale category for character handling functions. NLSPATH Determines the location of message catalogs for the processing of LC_MESSAGES . If any internationalization variable contains an invalid setting, fastbind behaves as if all internationalization variables are set to C. See environ(5). In addition, the following environment variable affects fastbind : TMPDIR Specifies a directory for temporary files (see tmpnam(3S)).
fastmail(1) fastmail(1) NAME fastmail - quick batch mail interface SYNOPSIS fastmail [-b bcc-list] [-c cc-list] [-C comments ] [-f from-name] [-F from-addr] [-i in-reply-to] [-r reply-to] [-R references] [-s subject] filename address-list DESCRIPTION The fastmail command is a simple interface to the mail system that allows you to send a message without the overhead of an interactive mailer. It is particularly efficient in batch-processing mail to very large groups of people.
fastmail(1) fastmail(1) -d \ -F me@anotherhost.com \ -f My Name \ -i "Your recent message" \ -R REF:13579 \ -r oscar \ -s "Testing fastmail" \ message-file \ addr1 addr2 addr3 addr4 The online execution displays the following debug messages: Mailing to addr1,addr2,addr3,addr4 cc1,cc2,cc3,cc4 bcc1,bcc2,bcc 3,bcc4 [via sendmail] cat /tmp/fastmail.
fastmail(1) fastmail(1) FILES /etc/mail/aliases /usr/sbin/sendmail /tmp/fastmail.pid sendmail aliases file. Mail transport agent. Temporary file. AUTHOR fastmail was developed by HP. SEE ALSO elm(1), sendmail(1M).
file(1) file(1) NAME file - determine file type SYNOPSIS file [-m mfile ] [-c ] [-f ffile ] [-h ] file ... DESCRIPTION file performs a series of tests on each file in an attempt to classify it. If file appears to be an ASCII file, file examines the first 512 bytes and tries to guess its language. If file is an executable a.out file, file prints the version stamp, provided it is greater than 0 (see the description of the -V option in ld(1)).
find(1) find(1) NAME find - find files SYNOPSIS find pathname_list [expression] DESCRIPTION The find command recursively descends the directory hierarchy for each path name in pathname_list (that is, one or more path names) seeking files that match a Boolean expression written in the primaries given below. By default, find does not follow symbolic links. The Boolean expression is evaluated using short-circuit evaluation.
find(1) find(1) If the leading minus is omitted, this primary is true when the file permission bits exactly match the value of mode. Bits associated with the symbolic attributes s (set-user-ID, set-group-ID) and t (sticky bit) are ignored when the minus is omitted. If mode is preceded by a minus, this primary is true if all of the bits that are set in mode are also set in the file permission bits. In this case, the bits associated with the symbolic attributes s and t are significant.
find(1) find(1) a c m The time the file was last accessed The time the inode of the file was last modified The time the file was last modified If the tv2 character is omitted, it defaults to m. Note that the -newer option is equivalent to -newermm . Syntax examples; -newera file -newermc file f -inum n True if the file serial number (inode number) is n. Note that file serial numbers are unique only within a given file system.
find(1) find(1) If expression is omitted, or if none of -print , -ok , -exec , -cpio , or -ncpio is specified, -print is assumed. The -user , -group , and -newer primaries each evaluate their respective arguments once. HFS Access Control Lists The -acl primary enables the user to search for HFS access control list entries. It is true if the file’s access control list matches an access control list pattern or contains optional access control list entries (see acl(5)).
find(1) find(1) Environment Variables If an internationalization variable is not specified or is null, it defaults to the value of LANG . If LANG is not specified or is null, it defaults to C (see lang(5)). If LC_ALL is set to a nonempty string value, it overrides the values of all the other internationalization variables. If any internationalization variable contains an invalid setting, all internationalization variables default to C (see environ(5)).
find(1) find(1) Note that output from find was piped to xargs(1) instead of using the -exec primary. This is because when a large number of files or directories is to be processed by a single command, the exec primary spawns a separate process for each file or directory, whereas xargs collects file names or directory names into multiple arguments to a single chmod command, resulting in fewer processes and greater system efficiency.
findmsg(1) findmsg(1) NAME findmsg, dumpmsg - create message catalog file for modification SYNOPSIS findmsg [-aiv ] [ [-D sym ] [-U sym ]] file ... dumpmsg file ... DESCRIPTION The findmsg command extracts messages from a C program source file and writes them to the standard output in a format suitable for input to gencat (see gencat(1)). The input file will be preprocessed using cpp (see cpp(1)) in order to select print specifiers and handle ifdef , ifndef ... conditional cpp primitives.
findmsg(1) findmsg(1) WARNINGS The findmsg and dumpmsg commands are HP proprietary, not portable to other vendors’ systems, and will not be provided in future HP-UX releases. AUTHOR findmsg and dumpmsg were developed by HP. SEE ALSO findstr(1), gencat(1), insertmsg(1), catgets(3C).
findstr(1) findstr(1) NAME findstr - find strings for inclusion in message catalogs SYNOPSIS findstr file ... DESCRIPTION findstr examines files of C source code for uncommented string constants which it places, along with the surrounding quotes, on the standard output, preceding each by the file name, start position, and length. This information is used by insertmsg (see insertmsg(1)). findstr does not output strings that are parameters of the catgets() routine (see catgets(3C)).
finger(1) finger(1) NAME finger - user information lookup program SYNOPSIS finger [ options ] user_name ... DESCRIPTION By default, finger lists for each user_name on the system: • • • • • • • • • • Login name, Full given name, Terminal write status (if write permission is denied), Idle time, Login time, User’s home directory and login shell, Any plan the user has placed in file .plan in their home directory, Project on which they are working from the file .
finger(1) finger(1) SEE ALSO chfn(1), who(1).
fmt(1) fmt(1) NAME fmt - format text SYNOPSIS fmt [-cs] [-w width] [file...] DESCRIPTION The fmt command is a simple text formatter that fills and joins lines to produce output lines of (up to) the number of characters specified in the -w width option. The default width is 72. fmt concatenates the file arguments. If none are given, fmt formats text from the standard input. Blank lines are preserved in the output, as is the spacing between words. fmt does not fill lines beginning with a period (.
fold(1) fold(1) NAME fold - fold long lines for finite width output device SYNOPSIS fold [-b] [-s] [-w width ] [ file ... ] Obsolete form: fold [-s] [-width ] [ file ... ] f DESCRIPTION The fold command is a filter that folds the contents of the specified files, breaking the lines to have a maximum of width column positions (or bytes, if the -b option is specified).
fold(1) fold(1) SEE ALSO expand(1). STANDARDS CONFORMANCE fold : XPG4, POSIX.
forder(1) forder(1) NAME forder - convert file data order SYNOPSIS forder [-a] [-l] [-n] [ file ... ] DESCRIPTION The text orientation (mode) of a file can be right-to-left (non-Latin) or left-to-right (Latin). This text orientation can affect the way data is arranged in the file. The data arrangements that result are called screen order and keyboard order. forder converts the order of characters in the file from screen order to keyboard order or vice versa.
forder(1) forder(1) SEE ALSO environ(5), strord(3C), nljust(1).
from(1) from(1) NAME from - who is my mail from SYNOPSIS from [-s sender] [user] DESCRIPTION from prints the mail header lines in your mailbox file to show who sent you mail. If user is specified, user’s mailbox is examined instead of your own. If the -s option is given, only headers of mail from sender are printed. EXAMPLES List header lines for all current mail in your mailbox that was sent by ken .
fruled(1) fruled(1) NAME fruled - flash/turn off attention LEDs (cell, cabinet and I/O chassis attention LEDs) SYNOPSIS fruled -c cell [-c...] [-f|-o] [-B] [ -u username -h IPaddress|hostname | -g -h IPaddress|hostname ] fruled -i I/Ochassis [-i...] [-f|-o] [-B] [ -u username -h IPaddress|hostname | -g -h IPaddress|hostname ] fruled -b cabinet [-b...] [-f|-o] [ -u username -h IPaddress|hostname | -g -h IPaddress|hostname ] fruled -C|-I [-l cabinet] [-l...
fruled(1) fruled(1) 1. Save the user password in a variable and pass it to the command as, echo $passwd | parstatus -X -u username -h hostname/IP 2. Save the user password in a file and pass the file as input to the command like, parstatus -X -u username -h hostname/IP < passwd_file Note, for security reason, protect the file that has the user password by removing read permissions for non-privileged users.
fruled(1) fruled(1) parstatus(1) command will display the above cell as "cab1,cell4". RETURN VALUE The fruled command exits with one of the following values: Successful completion. 0 1 2 Error condition occurred. No LED associated with specified object. EXAMPLES Flash the attention LED of the cell located in cabinet 0 slot 4 and also flash the attention LED of the cabinet in which it is contained.
ftio(1) ftio(1) NAME ftio - faster tape I/O SYNOPSIS ftio -o-O [achpvxAELM ] [-B blksize] [-D type] [-e extarg] [-K comment ] [-L filelist] [-N datefile] [-S script] [-T tty] [-Z nobufs] tapedev [pathnames] [-F ignorenames] ftio -i-I [cdfmptuvxAEMPR] [-B blksize] [-S script] [-T tty] [-Z nobufs] tapedev [patterns] ftio -g [v] tapedev [patterns] f DESCRIPTION ftio is a tool designed specifically for copying files to tape drives.
ftio(1) ftio(1) the files are those of the previous -o operation. -I Extract (copy into the file system) files in the same way as for ftio -icdmv , when no modifiers are used with the -I . However, if the .ftiorc file exists in the user’s home directory, ftio opens this file, and scans for lines preceded by I= . Options defined on matching lines are passed to ftio as if they had been specified on the command line. See EXAMPLES section. -g Read the file list in tapedev.
ftio(1) ftio(1) -Z nobufs Specify the number of blksize chunks of memory to use as buffer space between the two processes, where blksize is the size of blocks written to the tape. More chunks is usually better, but a point is reached where no improvement is gained, and performance might deteriorate as buffer space is swapped out of main memory. A default value of 16 is set for nobufs, but using 32 or 64 might improve performance if your system is not heavily loaded.
ftio(1) ftio(1) cpio Compatibility ftio uses the same archive format as cpio . However, by default ftio creates tape headers and uses a tape block size of 16KB. cpio by default uses 512-byte blocks. When used with the -B option, cpio uses 5120 byte blocks. To achieve full compatibility with cpio in either input or output mode, the user should specify the M modifier. ftio -oM creates a single- or multi-tape archive that has no tape headers, and, by default, the same block size as cpio -[oi]B.
ftio(1) ftio(1) ftio operates using System V shared memory and semaphores. The resources committed to these functions are not freed automatically by the system when the process terminates. ftio does this only when it terminates normally, or when it terminates after receiving one the following signals: SIGHUP , SIGINT , SIGTERM . Any other signal is handled in the default manner described by signal(2). Note that the behavior for SIGKILL is to terminate the process without delay.
ftp(1) ftp(1) NAME ftp - file transfer program SYNOPSIS ftp [-g] [-i] [-n] [-c] [-P] [-v] [-B size] [ server-host ] DESCRIPTION ftp is a user interface to the File Transfer Protocol. ftp copies files over a network connection between the local ‘‘client’’ host and a remote ‘‘server’’ host. ftp runs on the client host. Options The ftp command supports the following options: -g Disable file name ‘‘globbing’’; see the glob command, below. By default, when this option is not specified, globbing is enabled.
ftp(1) ftp(1) $ macro-name [ args ] Execute the macro macro-name that was defined with the macdef command. Arguments are passed to the macro unglobbed. account [ passwd ] Supply a supplemental password required by a remote system for access to resources once a login has been successfully completed. If no argument is included, the user is prompted for an account password in a non-echoing input mode. append local-file [ remote-file ] Copy local-file to the end of remote-file.
ftp(1) ftp(1) remote file and directory names. Globbing metacharacters are always expanded for the ls and dir commands. If globbing is enabled, metacharacters are also expanded for the multiple-file commands mdelete , mdir , mget , mls , and mput . hash Toggle printing of a hash-sign (#) for each 1024 bytes transferred. Note that the use of this feature may cause performance degradation. help [ command ] Print an informative message about the ftp command called ftp-command.
ftp(1) ftp(1) system. If the file does not exist on the current system, the remote file is considered newer. Otherwise, this command is identical to get . nlist [ remote-directory ] [ local-file ] Write an abbreviated listing of remote-directory to local-file. If remote-directory is left unspecified, the current working directory is used. If interactive prompting is on, ftp prompts the user to verify that the last argument is indeed the target local file for nlist output.
ftp(1) ftp(1) host on the primary control connection. Third party file transfers depend upon support of the FTP protocol PASV command by the server on the secondary control connection. put local-file [ remote-file ] Copy local-file to remote-file. If remote-file is unspecified, ftp assigns the local-file name, processed according to any ntrans or nmap settings, to the remote-file name. pwd Write the name of the remote working directory to stdout. quit A synonym for bye .
ftp(1) ftp(1) status Show the current status of ftp . struct [ struct-name ] Set the FTP file transfer struct to struct-name. The only supported struct is file . sunique Toggle storing of files on remote machine under unique file names. The remote server reports the unique name. By default, sunique is off . system Show the type of operating system running on the remote machine. tenex Set the FTP file transfer type to tenex . type [ type-name ] Set the FTP file transfer type to type-name.
ftp(1) ftp(1) Some useful examples of this mechanism are: ls . "| more" The above command lists the files in the current directory page by page. put "| tail -20 loc_file" rem_file This command copies the last twenty lines of the local file "loc_file" to the remote system as "rem_file". • Otherwise, if globbing is enabled, ftp expands local file names according to the rules used by the C shell (see csh(1)); see the glob command, below. If the ftp command expects a single local file (e.g.
ftp(1) ftp(1) Kerberos NAME ftp - file transfer program SYNOPSIS ftp [-g] [-i] [-n] [-c] [-P] [-v] [-B size] [ server-host ] DESCRIPTION ftp is a user interface to the File Transfer Protocol. ftp copies files over a network connection between the local ‘‘client’’ host and a remote ‘‘server’’ host. ftp runs on the client host. Options The ftp command supports the following options: -g Disable file name ‘‘globbing’’; see the glob command, below.
ftp(1) ftp(1) Kerberos $ macro-name [ args ] Execute the macro macro-name that was defined with the macdef command. Arguments are passed to the macro unglobbed. account [ passwd ] Supply a supplemental password required by a remote system for access to resources once a login has been successfully completed. If no argument is included, the user is prompted for an account password in a non-echoing input mode. append local-file [ remote-file ] Copy local-file to the end of remote-file.
ftp(1) ftp(1) Kerberos remote file and directory names. Globbing metacharacters are always expanded for the ls and dir commands. If globbing is enabled, metacharacters are also expanded for the multiple-file commands mdelete , mdir , mget , mls , and mput. hash Toggle printing of a hash-sign (#) for each 1024 bytes transferred. Note that the use of this feature may cause performance degradation. help [ command ] Print an informative message about the ftp command called ftp-command.
ftp(1) ftp(1) Kerberos system. If the file does not exist on the current system, the remote file is considered newer. Otherwise, this command is identical to get . nlist [ remote-directory ] [ local-file ] Write an abbreviated listing of remote-directory to local-file. If remote-directory is left unspecified, the current working directory is used. If interactive prompting is on, ftp prompts the user to verify that the last argument is indeed the target local file for nlist output.
ftp(1) ftp(1) Kerberos presumed to be a partially transferred copy of remote-file and the transfer is continued from the apparent point of failure. This command is useful when transferring very large files over networks that tend to drop connections. rhelp [ command-name ] Request help from the server host. If command-name is specified, supply it to the server. See ftpd(1M). rstatus [ file-name ] With no arguments, show status of remote machine.
ftp(1) ftp(1) Kerberos umask [ newmask ] Set the default umask on the remote server to newmask. If newmask is omitted, the current umask is printed. user user-name [ password ] [ account ] Log into the server host on the current connection, which must already be open. A .netrc file in the user’s local home directory can provide the user-name, password, and optionally the account; see netrc(4). Otherwise ftp prompts the user for this information.
ftp(1) ftp(1) Kerberos WARNINGS Correct execution of many commands depends upon proper behavior by the remote server. DIAGNOSTICS Error! could not retrieve authentication type. Please notify sys admin. There are two authentication mechanisms used by ftp . One authentication mechanism is based on Kerberos and the other is not. The type of authentication mechanism is obtained from a system file which is updated by inetsvcs_sec(1M).
ftpcount(1) ftpcount(1) NAME ftpcount - show current number of users for each class SYNOPSIS /usr/bin/ftpcount DESCRIPTION The ftpcount command shows the current number of users (and the limit) for each class defined in the ftpaccess file. If the ftpaccess file does not exist, the ftpcount command will not display anything. However, if the ftpaccess file exists and it is of zero bytes, ftpcount will display an error message: ftpcount:no service classes defined, no usage count kept.
ftprestart(1) ftprestart(1) NAME ftprestart - remove the shutdown message file created by ftpshut utility. SYNOPSIS /usr/bin/ftprestart DESCRIPTION The ftprestart command removes all the shutdown message files from the real, anonymous, and virtual user accounts. The message files are created by the ftpshut utility in the path as specified by the ‘shutdown’ directive in the /etc/ftpd/ftpaccess file (see ftpshut(1) for more details). This command is always used after the ftpshut command is executed.
ftpshut(1) ftpshut(1) NAME ftpshut - create shutdown message file to shut down the ftp servers at a given time SYNOPSIS /usr/bin/ftpshut [ -l min ] [ -d min ] time [ warning-message ... ] DESCRIPTION The ftpshut command provides an automated shutdown procedure that a superuser can use to notify ftp users when the ftp server is shutting down.
ftpshut(1) ftpshut(1) AUTHOR ftpshut was developed by the Washington University, St. Louis, Missouri.
ftpwho(1) ftpwho(1) NAME ftpwho - show current process information for each ftp user. SYNOPSIS /usr/bin/ftpwho DESCRIPTION The ftpwho command shows the current process information for each user logged into the ftp server. If the ftpaccess file does not exist, this command will not display anything. However, if the ftpaccess file exists and it is of zero bytes then this command will display an error message: ftpwho: no service classes defined, no usage count kept.
gcore(1) gcore(1) NAME gcore - get core images of running processes SYNOPSIS gcore [-o filename] process-id... DESCRIPTION gcore command creates a core image of each specified process. By default, the name of the core image file for process-id will be core. process-id. The process information in the core file can be obtained by using debuggers. When the gcore command creates a core image of each specified process, the process is temporarily stopped.
gencat(1) gencat(1) NAME gencat - generate a formatted message catalog file SYNOPSIS gencat [-l] catfile msgfile ... DESCRIPTION Message catalogs allow a program to process input and produce output according to local customs and languages. For details, see Native Language Support Users Guide. The gencat command merges each message source msgfile into a formatted message catalog catfile that can be accessed by catgets() (see catgets(3C)). If catfile does not exist, it is created.
gencat(1) gencat(1) $ comment A $ followed by a space or tab is treated as a comment and can appear anywhere in a file. A line consisting of zero or more spaces or tabs is treated as a comment line. NL_TEXTMAX , NL_SETMAX , and NL_MSGMAX are defined in . NL_SETD is defined in . MAX_BUFLEN is defined in . EXTERNAL INFLUENCES Environment Variables LANG provides a default value for the internationalization variables that are unset or null.
genxlt(1) genxlt(1) NAME genxlt - generate iconv translation tables SYNOPSIS genxlt [ -f output_filename ] [ input_filename ] DESCRIPTION genxlt generates a compiled, non-readable binary version of the iconv table that is suitable for use by iconv(1) and iconv(3C). If input_filename or output_filename is not supplied, standard input and/or standard output will be used.
genxlt(1) genxlt(1) This is an example of the input_file: #What: CodesetA to CodesetB: version 1.0 #Galley: 0xffff # the conversion data is as follows: 0x01 0x01 0x02 0x42 ... 0xff87 0x4567 ... etc. WARNINGS Because genxlt will write over the existing table, it is wise to save the existing table into another file before using genxlt . Warnings are not given for incorrect data in the input_file. g You must have super-user privileges to install files in /usr/lib/nls/iconv/tables.
get(1) get(1) NAME get - get a version of an SCCS file SYNOPSIS get [-r SID] [-c cutoff] [-e] [-b] [-i list] [-x list] [-k] [-l[p] ] [-p] [-s] [-m] [-n] [-g] [-t] [-w string] [-a seq-number] file ... DESCRIPTION The get command generates an ASCII text file from each named SCCS file according to the specifications given by its option arguments, which begin with -. The arguments can be specified in any order, but all option arguments apply to all named SCCS files.
get(1) get(1) SID, the SCCS Identification of a delta, can be in any form shown in the "SID Specified" column of Table 1. Partial SIDs are interpreted as shown in the "SID Retrieved" column of Table 1. See WARNINGS. g -xlist A list of deltas to be excluded (forced not to be applied) in the creation of the generated file. See the -i option for the list format. -k Suppresses replacement of identification keywords (see below) in the retrieved text by their value.
get(1) get(1) Table 1. Determination of SCCS Identification String SID* − b Option Specified Used % Other Conditions SID Retrieved SID of Delta to be Created none %% none %% no yes R defaults to mR R defaults to mR mR.mL mR.mL mR.(mL+1) mR.mL.(mB+1).1 R R R R R no no yes yes - mR.mL mR.mL mR.mL mR.mL hR.mL** R.1*** mR.(mL+1) mR.mL.(mB+1).1 mR.mL.(mB+1).1 hR.mL.(mB+1).1 R - R > mR R = mR R > mR R = mR R < mR and R does not exist Trunk succ.# in release > R and R exists R.mL R.mL.(mB+1).
get(1) g get(1) %R% %L% %B% %S% %D% %H% %T% %E% %G% %U% %Y% %F% %P% %Q% %C% Release. %Z% %W% The 4-character string @(#) recognizable by what (see what(1)). %A% Another shorthand notation for constructing what(1) strings for non-HP-UX system program files. Level. Branch. Sequence. Current date (YY/MM/DD). Current date (MM/DD/YY). Current time (HH:MM:SS). Date newest applied delta was created (YY/MM/DD). Date newest applied delta was created (MM/DD/YY).
get(1) get(1) files are named by replacing the leading s with the tag. The g-file is an exception to this scheme: the g-file is named by removing the s. prefix. For example, s.xyz.c , the auxiliary file names would be xyz.c , l.xyz.c , p.xyz.c , and z.xyz.c , respectively. The g-file, which contains the generated text, is created in the current directory (unless the -p option is used). A g-file is created in all cases, whether or not any lines of text were generated by the get .
getaccess(1) getaccess(1) NAME getaccess - list access rights to file(s) SYNOPSIS getaccess [-u user ] [-g user ] group [, group ] ... ] [-n] file ... getaccess -r [-n] file ... DESCRIPTION getaccess lists for the specified files the effective access rights of the caller (that is, for their effective user ID, effective group ID, and supplementary groups list).
getaccess(1) 2 getaccess(1) A file is nonexistent or unreachable (by the caller). getaccess prints an appropriate message to standard error, continues, then returns a value of 2 upon completion. EXAMPLES The following command prints the caller’s access rights to file1 using the file’s group ID instead of the caller’s effective group ID and groups list.
getacl(1) getacl(1) NAME getacl - list access control lists (ACLs) for files (JFS File Systems only) SYNOPSIS /usr/bin/getacl [-ad ] file... DESCRIPTION For each argument that is a regular file, special file, or named pipe, getacl displays the owner, group, and the Access Control List (ACL). For each directory argument, getacl displays the owner, group, and the ACL and/or the default ACL. Only directories contain default ACLs.
getacl(1) getacl(1) permissions actually granted.
getacl(1) getacl(1) NOTICES The output from getacl will be in the correct format for input to the setacl command. If the output from getacl is redirected to a file, the file may be used as input to setacl . In this way, a user may easily assign one file’s ACL to another file.
getconf(1) getconf(1) NAME getconf - get system configuration values SYNOPSIS getconf [-v specification ] system_var getconf [-v specification ] system_var pathname DESCRIPTION The getconf command provides an interface to the confstr(3C), pathconf(2), and sysconf(2) library routines and system calls. The system_var argument specifies the configuration value desired in confstr() , pathconf() , or sysconf() .
getconf(1) getconf(1) ARG_MAX _BC_BASE_MAX BC_DIM_MAX BS_SCALE_MAX BC_STRING_MAX CHARCLASS_NAME_MAX CHAR_BIT CHAR_MAX CHAR_MIN CHILD_MAX CLK_TCK COLL_WEIGHTS_MAX CPU_CHIP_TYPE CS_MACHINE_IDENT CS_PARTITION_IDENT CS_PATH CS_MACHINE_SERIAL EXPR_NEST_MAX HW_CPU_SUPP_BITS HW_32_64_CAPABLE INT_MAX INT_MIN KERNEL_BITS LINE_MAX LONG_BIT LONG_MAX LONG_MIN MACHINE_IDENT MACHINE_MODEL MACHINE_SERIAL MB_LEN_MAX NGROUPS_MAX NL_ARGMAX NL_LANGMAX NL_MSGMAX NL_NMAX NL_SETMAX NL_TEXTMAX NZERO OPEN_MAX PARTITION_IDENT PAT
getopt(1) getopt(1) NAME getopt - parse command options SYNOPSIS getopt optstring args DESCRIPTION getopt is used to break up options in command lines for easy parsing by shell procedures and to check for legal options. optstring is a string of recognized option letters (see getopt(3C)). If a letter is followed by a colon, the option is expected to have an argument which may or may not be separated from it by white space. The positional parameters ($1 $2 ...
getopt(1) getopt(1) done This code accepts any of the following as equivalent: cmd cmd cmd cmd -aoarg file file -a -o arg file file -oarg -a file file -a -oarg -- file file WARNINGS getopt option arguments must not be null strings nor contain embedded blanks. SEE ALSO sh(1), getopt(3C).
getopts(1) getopts(1) NAME getopts - parse utility (command) options SYNOPSIS getopts optstring name [ arg ... ] DESCRIPTION getopts is used to retrieve options and option-arguments from a list of parameters. Each time it is invoked, getopts places the value of the next option in the shell variable specified by the name operand and the index of the next argument to be processed in the shell variable OPTIND . Whenever the shell is invoked, OPTIND is initialized to 1.
getopts(1) getopts(1) getopts by default parses positional parameters passed to the invoking shell procedures. If args are given, they are parsed instead of the positional parameters. EXTERNAL INFLUENCES Environment Variable The following environment variable affects the execution of the getopts utility: OPTIND Used by getopts as the index of the next argument to be processed.
getopts(1) getopts(1) SEE ALSO getopt(1), ksh(1), sh-posix(1), sh(1), getopt(3C). STANDARDS CONFORMANCE getopts : XPG4, POSIX.
getprivgrp(1) getprivgrp(1) NAME getprivgrp - get special attributes for group SYNOPSIS getprivgrp [-g group_name ] DESCRIPTION getprivgrp lists the access privileges of privileged groups set by setprivgrp (see setprivgrp (1M)). If group_name is supplied, access privileges are listed for that group only. If the caller is not a member of group_name, no information is displayed. If -g is used, getprivgrp lists access privileges that have been granted to all groups.
gprof(1) gprof(1) NAME gprof - display call graph profile data SYNOPSIS gprof [ options ] [ a.out [ gmon.out ]... ] DESCRIPTION The gprof command produces an execution profile of C++, C and FORTRAN programs. The effect of called routines is incorporated into the profile of each caller. Profile data is taken from the call graph profile file (gmon.out default) that is created by programs compiled with the -G option of aCC , cc , and f90 .
gprof(1) gprof(1) or mcrt0.o . This turns on profiling of a.out , which is not compatible with profiling of shared libraries. You can either profile your executable or a shared library, but not both. Set LD_PROFILE to the exact string with which you call shl_load . If the library is implicitly loaded, LD_PROFILE must match the path encoded in the a.out . You can find this value by running the ldd command on the executable.
gprof(1) gprof(1) EXAMPLES To profile a.out and libtest.so on Itanium-based systems: $ cat > test.c void a() { printf("I in a\n"); } $ cc -c +Z -G test.c $ ld -b -o libtest.so.1 test.o $ ln -s ./libtest.so.1 libtest.so $ cat > main.c extern void a(); main() { printf("Hello world\n"); a(); } g $ cc -G main.c -L. -ltest $ export LD_PROFILE=a.out:libtest.so $ export LD_PROFILEBUCKET_SIZE=16 $ ./a.out hello world I in a $ unset LD_PROFILE $ unset LD_PROFILEBUCKET_SIZE $ ls gmon.out gmon.
gprof(1) gprof(1) Parents that are not profiled have the time of their profiled children propagated to them, but they appear to be spontaneously invoked in the call graph listing, and do not have their time propagated further. Similarly, signal catchers, even though profiled, appear to be spontaneous (although for more obscure reasons).
grep(1) grep(1) NAME grep, egrep, fgrep - search a file for a pattern SYNOPSIS Plain call with pattern grep [-E -F] [-c-l-q] [-bhinsvwx ] pattern [ file ... ] Call with (multiple) − e pattern grep [-E -F] [-c-l-q] [-bhinsvwx ] -e pattern ... [-e pattern ] ... [ file ... ] Call with − f file grep [-E -F] [-c-l-q] [-bhinsvwx ] [-f pattern_ file ] [ file ... ] Obsolescent: egrep [-cefilnsv ] [ expression ] [ file ... ] fgrep [-cefilnsvx ] [ strings ] [ file ...
grep(1) g grep(1) -q (Quiet) Do not write anything to the standard output, regardless of matching lines. Exit with zero status upon finding the first matching line. Overrides any options that would produce output. -s -v -w Error messages produced for nonexistent or unreadable files are suppressed. -x (eXact) Matches are recognized only when the entire input line matches the fixed string or regular expression. All lines but those matching are printed.
grep(1) Ken Judy Ann grep(1) 112 Warring St. Apt. A 387 Bowditch Apt. 12 429 Sixth St. the command: grep Judy address prints: Judy 387 Bowditch Apt.
groups(1) groups(1) NAME groups - show group memberships SYNOPSIS groups [-p] [-g] [-l] [ user ] DESCRIPTION groups shows the groups to which the caller or the optionally specified user belong. If invoked with no arguments, groups prints the current access list returned by getgroups() (see getgroups(2)). Each user belongs to a group specified in the password file /etc/passwd and possibly to other groups as specified in the files /etc/group and /etc/logingroup.
head(1) head(1) NAME head - give first few lines SYNOPSIS head [-c-l] [-n count ] [ file ... ] Obsolescent: head [-count ] [ file ... ] DESCRIPTION head prints on standard output the first count lines of each of the specified files, or of the standard input. If count is omitted it defaults to 10. If multiple files are specified, head outputs before each file a line of this form: ==> file <== Options -c -count The quantity of output is measured in bytes.
host(1) host(1) NAME host - DNS lookup utility SYNOPSIS host [-aCdlnrTwv ] [-c class] [-N ndots] [-R number] [-t type] [-W wait] name server DESCRIPTION host is a simple utility for performing DNS lookups. It is normally used to convert names to IP addresses and vice versa. When no arguments or options are given, host prints a short summary of its command line arguments and options. Arguments name This is the domain name that is to be looked up.
host(1) host(1) automatically selects an appropriate query type. By default it looks for A records, but if the C option was given, queries will be made for SOA records; and if name is a dotted-decimal IPv4 address or colon-delimited IPv6 address, host will query for PTR records. W wait The time to wait for a reply can be controlled through the W option. This option makes host wait for wait seconds. If wait is less than 1, the wait interval is set to one second.
hostname(1) hostname(1) NAME hostname - set or display name of current host system SYNOPSIS hostname [name_of_host ] DESCRIPTION The hostname command displays the name of the current host, as given in the gethostname() system call (see gethostname(2)). Users who have appropriate privileges can set the hostname by giving the argument name_of_host ; this is usually done in the startup script /sbin/init.d/hostname.
hp(1) hp(1) NAME hp - handle special functions of HP 2640 and HP 2621-series terminals SYNOPSIS hp [-e] [-m] DESCRIPTION hp supports special functions of the Hewlett-Packard HP 2640 and HP 2621 series of terminals, with the primary purpose of producing accurate representations of most nroff output. A typical use is: nroff -h files ... | hp Regardless of the hardware options on a given terminal, hp tries to do sensible things with underlining and reverse line-feeds.
hyphen(1) hyphen(1) NAME hyphen - find hyphenated words SYNOPSIS hyphen [ files ] DESCRIPTION hyphen finds all the hyphenated words ending lines in files and prints them on the standard output. If no arguments are given, the standard input is used; thus, hyphen can be used as a filter. EXAMPLES Prepare an nroff hyphenation proofreading file for textfile. mm textfile | hyphen WARNINGS hyphen cannot cope with hyphenated italics (i.e., underlined) words; it often misses them completely or mangles them.
iconv(1) iconv(1) NAME iconv - code set conversion SYNOPSIS iconv -f fromcode -t tocode [ file ... ] DESCRIPTION iconv converts the encoding of characters in the input files from the fromcode code set to the tocode code set, and writes the results on standard output. If no input files are given, iconv reads from standard input. If - appears as an input file name, iconv reads standard input at that point. - - can be used to delimit the end of options (see getopt(3C)).
iconv(1) iconv(1) SEE ALSO getopt(3C), iconv(3C).
id(1) id(1) NAME id - print user and group IDs and names SYNOPSIS id [-u-g-G] [-nr ] [-P] [user] DESCRIPTION The id command writes a message to standard output, giving the user and group IDs and names for the process. If the effective and real IDs are different, both are printed. If the process has supplementary group affiliations (see groups(1)), the supplementary group affiliations are also written. If the user operand is specified, the user and group IDs of the selected user are written.
id(1) id(1) DEPENDENCIES HP Process Resource Manager The -P option requires that the optional HP Process Resource Manager (PRM) software be installed and configured. See prmconfig(1) for a description of how to configure HP PRM, and prmconf(4) for the definition of the process resource group. SEE ALSO groups(1), logname(1), getuid(2). HP Process Resource Manager: prmconfig(1), prmconf(4) in HP Process Resource Manager User’s Guide. STANDARDS CONFORMANCE id: SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
ident(1) ident(1) NAME ident - identify files in RCS SYNOPSIS ident file ... DESCRIPTION ident searches the named files for all occurrences of the pattern $keyword :...$, where keyword is one of the following: Author Date Header Locker Log Revision Source State These patterns are normally inserted automatically by the RCS co command, but can also be inserted manually (see co(1)). ident works on text files as well as object files. For example, if the C program in file f.
idlookup(1) idlookup(1) NAME idlookup - identify the user of a particular TCP connection SYNOPSIS idlookup host-or-ip-number local-port foreign-port DESCRIPTION idlookup can be used to identify the user at the remote end of a TCP connection, assuming the host at the other end is running an Identification Server. host-or-ip-number is the name of the host at the other end of the connection, or its IP address.
ied(1) ied(1) NAME ied - input editor and command history for interactive programs SYNOPSIS ied [-dirt ] [-h file ] [-s size ] [-p prompt ] [-k charmap ] utility [ arguments ... ] DESCRIPTION ied is a utility command that is intended to act as an interface between the user and an interactive program such as bc, bs, or Bourne shell, providing most of the line editing and history functionality found in the Korn shell.
ied(1) ied(1) \t \b tab backspace \v vertical tab Three- and four-character sequences must be \nn or \nnn, giving the octal value for the character. If charmap is less than 256 lines long, the remaining characters are mapped to themselves. i -p prompt Many commands do not prompt when ready for input. ied approximates a prompting mechanism for such commands. This is not always perfectly successful, but for many commands it helps.
ied(1) ied(1) ,*,= (Filename expansion). Not supported. @ Macro expansion. Not supported. Note however that ksh has a rarely-used function _ that substitutes words from the previous line (this is not the macro $_ , but rather an editor command). If a preceding count is given, it uses the countth word of the last line. This is much more useful with ied . In emacs/gmacs mode: M-* , M-= , M- (filename expansion) Not supported. Note that the command M-.
insertmsg(1) insertmsg(1) NAME insertmsg - use findstr(1) output to insert calls to catgets(3C) SYNOPSIS insertmsg [-h] [-nnumber ] [-iamount ] [-snumber ] stringlist DESCRIPTION insertmsg examines the file stringlist, which is assumed to be the output of findstr after subsequent editing to remove any strings that do not need to be localized (see findstr(1)).
insertmsg(1) insertmsg(1) AUTHOR insertmsg was developed by HP. SEE ALSO findstr(1), gencat(1), catgets(3C), catopen(3C).
iostat(1) iostat(1) NAME iostat - report I/O statistics SYNOPSIS iostat [-t] [ interval [ count ] ] DESCRIPTION iostat iteratively reports I/O statistics for each active disk on the system. Disk data is arranged in a four-column format: Column Heading Interpretation device Device name bps Kilobytes transferred per second sps Number of seeks per second msps Milliseconds per average seek If two or more disks are present, data is presented on successive lines for each disk.
iostat(1) iostat(1) AUTHOR iostat was developed by the University of California, Berkeley, and HP. FILES /usr/include/sys/param.h SEE ALSO vmstat(1).
ipcrm(1) ipcrm(1) NAME ipcrm - remove a message queue, semaphore set, or shared memory identifier SYNOPSIS ipcrm [option]... DESCRIPTION The ipcrm command removes one or more specified message queue, semaphore set, or shared memory identifiers. Options The identifiers are specified by the following options: -m shmid Remove the shared memory identifier shmid from the system. The shared memory segment and data structure associated with it are destroyed after the last detach.
ipcs(1) ipcs(1) NAME ipcs - report status of interprocess communication facilities SYNOPSIS ipcs [-mqs ] [-abcopt ] [-C core] [-N namelist] DESCRIPTION ipcs displays certain information about active interprocess communication facilities. With no options, ipcs displays information in short format for the message queues, shared memory segments, and semaphores that are currently active in the system. Options The following options restrict the display to the corresponding facilities.
ipcs(1) ipcs(1) R S D C - A process is waiting on a msgrcv() . A process is waiting on a msgsnd() . The associated shared memory segment has been removed. It will disappear when the last process attached to the segment detaches it. The associated shared memory segment is to be cleared when the first attach is executed. The corresponding special flag is not set. The next 9 characters are interpreted as three sets of three characters each.
ipcs(1) ipcs(1) FILES /dev/kmem /etc/group /etc/passwd /stand/vmunix Kernel virtual memory Group names User names System namelist SEE ALSO msgop(2), semop(2), shmop(2).
join(1) join(1) NAME join - relational database operator SYNOPSIS join [ options ] file1 file2 DESCRIPTION join forms, on the standard output, a join of the two relations specified by the lines of file1 and file2. If file1 or file2 is -, the standard input is used. file1 and file2 must be sorted in increasing collating sequence (see Environment Variables below) on the fields on which they are to be joined; normally the first in each line.
join(1) join(1) EXAMPLES The following command line joins the password file and the group file, matching on the numeric group ID, and outputting the login name, the group name, and the login directory. It is assumed that the files have been sorted in the collating sequence defined by the LC_COLLATE or LANG environment variable on the group ID fields. join -1 4 -2 3 -o 1.1 2.1 1.
kdestroy(1) kdestroy(1) NAME kdestroy - destroy Kerberos tickets SYNOPSIS kdestroy [-q] [-c cache_filename] DESCRIPTION The kdestroy utility destroys the user’s active Kerberos authorization tickets by writing zeros to the specified credentials cache that contains them. If the credentials cache is not specified, the default credentials cache is destroyed. Options Run quietly. Normally kdestroy beeps if it fails to destroy the user’s tickets. The -q flag suppresses this behavior.
kermit(1) kermit(1) (HP-UX C-Kermit) NAME kermit - C-Kermit 7.0 communications software for serial and network connections: modem dialing, file transfer and management, terminal connection, character-set translation, numeric and alpha paging, and script programming. SYNOPSIS kermit [ command-file ] [ options ...
kermit(1) kermit(1) (HP-UX C-Kermit) portable to many and diverse platforms. STARTING C-KERMIT You can start C-Kermit by typing /usr/bin/kermit, or just kermit if your PATH includes /usr/bin , possibly followed by command-line options. If there are no "action options" on the command line (explained below), C-Kermit starts in interactive command mode; you will see a greeting message and then the "C-Kermit>" prompt.
kermit(1) kermit(1) (HP-UX C-Kermit) error-correcting modems with hardware flow control). If you experience file transfer failures, use the CAUTIOUS or ROBUST commands to choose more conservative (and therefore slower) protocol settings. For fine tuning of performance, you can choose specific packet lengths, window sizes, and control-character prefixing strategies as explained in Chapter 12 of the manual, Using C-Kermit.
kermit(1) kermit(1) (HP-UX C-Kermit) \ b (or B) l (or L) n (or N) a decimal digit {} anything else: the backslash character itself the BREAK signal (OUTPUT command only) a Long BREAK signal (OUTPUT only) a NUL (0) character (OUTPUT only) a 1-, 2-, or 3-digit decimal number, such as \27 used for grouping, e.g. \{27}123 following character taken literally. Note that numbers turn into the character with that binary code (0-255), so you can use \7 for a bell, \13 for carriage return, \10 for linefeed.
kermit(1) kermit(1) (HP-UX C-Kermit) REDIAL LOG CONNECTIONS REDIRECT PIPE SET CARRIER * SET DIAL * SET FLOW * SET HOST * SET LINE SET PORT * SET MODEM TYPE * SET NETWORK SET TCP SET TELNET SET X.
kermit(1) kermit(1) (HP-UX C-Kermit) k *R *S GET MGET REGET G FAST CAUTIOUS ROBUST SET ATTRIB * SET BLOCK SET BUFFERS SET PREFIX SET DELAY SET DESTINATION * SET FILE * SET RECEIVE SET REPEAT SET RETRY SET SEND SET HANDSHAKE SET LANGUAGE PATTERNS SET SESSION-LOG SET TRANSFER SET TRANSMIT SET UNKNOWN * SET WINDOW SHOW ATTRIB SHOW CONTROL * SHOW FILE SHOW PROTOCOL SHOW LANGUAGE SHOW TRANSMIT * STATISTICS TRANSMIT XMIT SEND Command switches: /AS-NAME: /AFTER: /BEFORE: /BINARY /COMMAND /DELETE /EXCEPT: /FILTE
kermit(1) kermit(1) (HP-UX C-Kermit) /SMALLER-THAN: /STARTING-AT: /SUBJECT: /TEXT Send files smaller than given size. Send file starting at given byte number. Subject for SEND /MAIL. Send in text mode. GET and RECEIVE Command switches: /AS-NAME: Store incoming file under given name. /BINARY Receive in binary mode if transfer mode not specified. /COMMAND: Send incoming file data to given command. /EXCEPT: Don’t accept incoming files whose names match. /FILENAMES: How to treat incoming file names.
kermit(1) kermit(1) (HP-UX C-Kermit) REMOTE HELP REMOTE HOST REMOTE KERMIT REMOTE LOGIN REMOTE LOGOUT REMOTE MKDIR REMOTE PRINT REMOTE PWD REMOTE QUERY REMOTE RENAME REMOTE RMDIR REMOTE SET REMOTE SPACE REMOTE TYPE REMOTE WHO SERVER SET SERVER SHOW SERVER k Script programming: ASK ASKQ ASSERT ASSIGN CLEAR CLOSE DECLARE DECREMENT DEFINE DO ECHO ELSE END EVALUATE FAIL FOPEN FREAD FWRITE FSEEK FCLOSE FOR FORWARD GETC GETOK GOTO IF INCREMENT INPUT LOCAL MINPUT MSLEEP OPEN OUTPUT O PAUSE READ REINPUT RETURN
kermit(1) kermit(1) (HP-UX C-Kermit) SET CASE SET COMMAND SET COUNT SET INPUT SET MACRO SET TAKE SHIFT SHOW ARGUMENTS SHOW ARRAYS SHOW COUNT SHOW FUNCTIONS SHOW GLOBALS SHOW MACROS SHOW SCRIPTS SHOW VARIABLES SLEEP SORT STATUS STOP SUCCEED SWITCH TAKE UNDEFINE WAIT WHILE WRITE WRITE-LINE WRITELN XECHO XIF Treatment of alphabetic case in string comparisons. QUOTING turns on/off interpretation of backslash notation. For counted loops. Control behavior of INPUT command. Control aspects of macro execution.
kermit(1) kermit(1) (HP-UX C-Kermit) k \v(dialcount) \v(dialnumber) \v(dialresult) \v(dialstatus) \v(dialsuffix) \v(dialtype) \v(directory) \v(download) \v(editor) \v(editfile) \v(editopts) \v(errno) \v(errstring) \v(escape) \v(evaluate) \v(exitstatus) \v(filename) \v(filenumber) \v(filespec) \v(fsize) \v(ftype) \v(herald) \v(home) \v(host) \v(hwparity) \v(input) \v(inchar) \v(incount) \v(inidir) \v(inmatch) \v(instatus) \v(intime) \v(inwait) \v(ipaddress) \v(kbchar) \v(line) \v(local) \v(lockdir) \v(loc
kermit(1) kermit(1) (HP-UX C-Kermit) \v(pexitstat) \v(pid) \v(platform) \v(program) \v(protocol) \v(p_8bit) \v(p_ctl) \v(p_rpt) \v(query) \v(return) \v(rows) \v(sendlist) \v(serial) \v(speed) \v(startup) \v(status) \v(sysid) \v(system) \v(terminal) \v(test) \v(textdir) \v(tfsize) \v(time) \v(tmpdir) \v(trigger) \v(ttyfd) \v(ty_xx) \v(userid) \v(version) \v(window) \v(xferstatus) \v(xfermsg) \v(xfer_xxx) \v(xprogram) \v(xversion) Exit status of most recently forked process C-Kermit’s process ID Specific m
kermit(1) kermit(1) (HP-UX C-Kermit) -g files -G files -a name -c -n k Settings: -l line -l n -j host -J host -l n -X -Z -o n -u -q -I -8 -0 -i -T -P -b bps -m name -p x -t -e n -v n -L -Q -w -D n -V Other: -y name -Y -R -d -S -C "cmds" -z -B -h = -- get remote files from server (quote wildcards) like -g but sends file to standard output alternate file name, used with -s, -r, -g connect (before file transfer), used with -l or -j connect (after file transfer), used with -l or -j communication line devic
kermit(1) kermit(1) (HP-UX C-Kermit) For dialing out, you must specify a modem type, and you might have to use a different device name: kermit -m hayes -l /dev/cul0p0 -b 2400 -c -r -n FILES Your personal C-Kermit customization file. Your personal dialing directory. Your personal services directory.
kermit(1) kermit(1) (HP-UX C-Kermit) various operations failed. BUGS See the comp.protocols.kermit.* newsgroups on Usenet for discussion, or the files, ckcker.bwr and ckuker.bwr, for a list of bugs, hints, tips. etc. Report bugs via e-mail to kermitsupport@columbia.edu. Visit http://www.columbia.edu/kermit/support.html for details about tech support. CONTACTS For more information about Kermit software and documentation, visit the Kermit Web site: http://www.columbia.
keylogin(1) keylogin(1) NAME keylogin - decrypt and store secret key with keyserv SYNOPSIS /usr/bin/keylogin [ -r ] DESCRIPTION The keylogin command prompts for a password, and uses it to decrypt the user’s secret key. The key may be found in the /etc/publickey file (see publickey(4)) or the NIS map ‘‘publickey.byname’’ or the NIS+ table ‘‘cred.org_dir’’ in the user’s home domain. The sources and their lookup order are specified in the /etc/nsswitch.conf file (see nsswitch.conf(4)).
keylogout(1) keylogout(1) NAME keylogout - delete stored secret key with keyserv SYNOPSIS /usr/bin/keylogout [ -f ] DESCRIPTION keylogout deletes the key stored by the key server process keyserv(1M). Further access to the key is revoked; however, current session keys may remain valid until they expire or are refreshed. Deleting the keys stored by keyserv will cause any background jobs or scheduled at(1) jobs that need secure RPC services to fail.
keysh(1) keysh(1) NAME keysh - context-sensitive softkey shell SYNOPSIS keysh DESCRIPTION keysh is an extension of the standard Korn-shell (for a description of the basic Korn-shell functionality, see ksh(1)). keysh uses hierarchical softkey menus and context-sensitive help to aid users in building command-lines, combining the power of the Korn-shell with the ease-of-use of a menu system. And keysh is entirely data-driven, allowing its menus and help to be easily extended as needed.
keysh(1) keysh(1) Translate any softkey commands in the current command-line and then edit the result. Delete the character under the cursor. Toggle between insert and overwrite modes. Recall the previous/next command from the history buffer. Move the cursor left/right. Move the cursor to the beginning/end of the command-line.
keysh(1) keysh(1) USING KEYSH WITH TERMINAL SESSION MANAGER When operating under the Terminal Session Manager (see tsm(1)), keysh displays the tsm softkeys instead of the backup softkeys. If desired, this interaction can be overridden by setting the $KEYTSM environment variable (see ENVIRONMENT VARIABLES below). When operating under tsm , keysh also automatically displays the tsm window number in the statusline.
keysh(1) keysh(1) selectors Enable or disable the use of keyboard selectors. When enabled, keysh displays an upper-case selector character in each softkey label. Typing the unquoted (upper-case) character selects the softkey just as if its corresponding function key had been pressed. Quoting the selector character in any way restores its traditional meaning. Selector keys are intended to be used on terminals that do not support a sufficient number of softkeys.
keysh(1) keysh(1) EXAMPLES To add the od (see od(1)) softkey to the end of the top-level softkey menu and label it Octal_dump , kc softkey add od with_label Octal_dump To add the paste(1) softkey to the beginning of the top-level softkey menu and label it Paste , kc softkey add paste and_place as_first_softkey To add the custom emacs softkey from the file ˜rpt/.
keysh(1) keysh(1) KEYKSH If set, specifies that keysh should mimic the behavior of the Korn-shell as closely as possible. No softkeys or status-line are displayed. This mode is particularly useful over slow modem lines. KEYLOC If set, specifies that keysh should leave the terminal keypad in local mode while commands are being entered. This mimics the behavior of the Korn-shell. KEYPS1 If set, specifies that keysh should not reset the initial values of $PS1 , $PS2 , and $PS3 .
keysh(1) keysh(1) keysh assumes that HP-UX commands are not heavily aliased; otherwise unexpected command translations may occur. keysh neglects the effects of the Korn-shell expansion mechanisms when counting command-line parameters, causing it to occasionally underestimate the true number of parameters specified. The * emacs-mode or vi-mode editing command can often be used to pre-expand these parameters.
kill(1) kill(1) NAME kill - send a signal to a process; terminate a process SYNOPSIS kill [-s signame] pid ... kill [-s signum] pid ... kill -l Obsolescent Versions: kill -signame pid ... kill -signum pid ... DESCRIPTION The kill command sends a signal to each process specified by a pid process identifier. The default signal is SIGTERM , which normally terminates processes that do not trap or ignore the signal.
kill(1) kill(1) 24 25 26 SIGSTOP SIGTSTP SIGCONT Stop Terminal stop Continue Pause the process; cannot be trapped Pause the process; can be trapped Run a stopped process SIGNULL (0), the null signal, invokes error checking but no signal is actually sent. This can be used to test the validity or existence of pid. SIGTERM (15), the (default) terminate signal, can be trapped by the receiving process, allowing the receiver to execute an orderly shutdown or to ignore the signal entirely.
kinit(1) kinit(1) NAME kinit - obtain and cache the Kerberos ticket-granting ticket SYNOPSIS kinit [-l life_time] [-s start_time ] [-v] [-p] [-f] [-k [-t keytab_filename] ] [-r renewable_life] [-R] [-c cache_filename] [-S service-name ] [principal] DESCRIPTION kinit obtains and caches an initial ticket-granting ticket for the principal. Options -l life_time Requests a ticket with the lifetime value defined in life_time.
kinit(1) kinit(1) FILES /tmp/krb5cc_ {uid} /etc/krb5.keytab Default credentials cache. {uid} is the decimal UID of the user. Default location for the local host’s keytab file. AUTHOR kinit was developed by the Massachusetts Institute of Technology.
klist(1) klist(1) NAME klist - list cached Kerberos tickets SYNOPSIS klist [-e] [ [-c] [-f] [-s] [cache_filename] ] [-k [-t] [-K] [keytab_filename] ] DESCRIPTION klist lists the Kerberos principal and Kerberos tickets held in a credentials cache, or the keys held in a keytab file. Options k -e Displays the encryption types of the session key and the ticket for each credential in the credential cache, or each key in the keytab file. -c -f List tickets held in a credentials cache.
kpasswd(1) kpasswd(1) NAME kpasswd - change a user’s Kerberos password SYNOPSIS kpasswd [principal] DESCRIPTION The kpasswd command is used to change a Kerberos principal’s password. kpasswd prompts for the current Kerberos password, which is used to obtain a changepw ticket from the KDC (Key Distribution Center) for the user’s Kerberos realm. If kpasswd successfully obtains the changepw ticket, the user is prompted twice for the new password, and the password is changed.
ksh(1) ksh(1) NAME ksh, rksh - shell, the standard/restricted command programming language SYNOPSIS ksh [-aefhikmnoprstuvx] [+aefhikmnoprstuvx] [- o option ] ... string ] [ arg ... ] rksh [-aefhikmnoprstuvx] [+aefhikmnoprstuvx] [- o option ] ... [+ o option ] ... [- c [+ o option ] ... [- c string ] [ arg ... ] DESCRIPTION ksh is a command programming language that executes commands read from a terminal or a file.
ksh(1) ksh(1) for identifier [ in word ... ] do list done Each time for is executed, identifier is set to the next word taken from the in word list. If in word ... is omitted, for executes the do list once for each positional parameter set (see Parameter Substitution below). Execution ends when there are no more words in the list. select identifier [ in word... ] do list done A select command prints on standard error (file descriptor 2), the set of words, each preceded by a number. If in word ...
ksh(1) ksh(1) command in the replaced text, other than any that are in the process of being replaced, is tested for additional aliases. If the last character of the alias value is a blank, the word following the alias is also checked for alias substitution. Aliases can be used to redefine special built-in commands, but cannot be used to redefine the keywords listed above. Aliases can be created, listed, and exported with the alias command and can be removed with the unalias command.
ksh(1) ksh(1) of all subscripts must be in the range of 0 through 1023 . Arrays need not be declared. Any reference to a named parameter with a valid subscript is legal and an array is created if necessary. Referencing an array without a subscript is equivalent to referencing the first element. The value of a named parameter can also be assigned by writing: name =value [ name=value ] ... If the -i integer attribute is set for name, the value is subject to arithmetic evaluation as described below.
ksh(1) ksh(1) The following parameters are set automatically by the shell: # ? $ _ ! COLUMNS ERRNO LINENO LINES k OLDPWD OPTARG OPTIND PPID PWD RANDOM REPLY SECONDS The number of positional parameters in decimal. Options supplied to the shell on invocation or by the set command. The decimal value returned by the last executed command. The process number of this shell. Initially, the value of _ is an absolute pathname of the shell or script being executed as passed in the environment.
ksh(1) ksh(1) MAIL MAILCHECK MAILPATH PATH PS1 PS2 PS3 PS4 SHELL TMOUT VISUAL If this parameter is set to the name of a mail file and the MAILPATH parameter is not set, the shell informs the user of arrival of mail in the specified file. This variable specifies how often (in seconds) the shell checks for changes in the modification time of any of the files specified by the MAILPATH or MAIL parameters. The default value is 600 seconds.
ksh(1) ksh(1) (" "), parameter and command substitution occurs and \ quotes the characters \, `, ", and $. $* and $@ have identical meanings when not quoted or when used as a parameter assignment value or as a file name. However, when used as a command argument, "$*" is equivalent to "$1d $2d ...", where d is the first character of the IFS parameter, whereas "$@" is equivalent to "$1" "$2" ... . Inside back single quote (accent grave) marks (` `) \ quotes the characters \, `, and $.
ksh(1) ksh(1) file1 -nt file2 file1 -ot file2 file1 -ef file2 string = pattern string != pattern string1 < string2 string1 > string2 exp1 -eq exp2 exp1 -ne exp2 exp1 -lt exp2 exp1 -gt exp2 exp1 -le exp2 exp1 -ge exp2 True True True True True True True True True True True True True if file1 exists and is newer than file2. if file1 exists and is older than file2. if file1 and file2 exist and refer to the same file. if string matches pattern. if string does not match pattern.
ksh(1) ksh(1) Redirection order is significant because the shell evaluates redirections referencing file descriptors in terms of the currently open file associated with the specified file descriptor at the time of evaluation. For example: ... 1>fname 2>&1 first assigns file descriptor 1 (standard output) to file fname , then assigns file descriptor 2 (standard error) to the file assigned to file descriptor 1; i.e., fname. On the other hand, if the order of redirection is reversed as follows: ...
ksh(1) ksh(1) used within a function defines local variables whose scope includes the current function and all functions it calls. The special command return is used to return from function calls. Errors within functions return control to the caller. Function identifiers can be listed with the +f option of the typeset special command. Function identifiers and the associated text of the functions can be listed with the -f option. Functions can be undefined with the -f option of the unset special command.
ksh(1) ksh(1) execute the command using exec (see exec(2)). The shell parameter PATH defines the search path for the directory containing the command. Alternative directory names are separated by a colon (:). The default path is /usr/bin: (specifying /usr/bin and the current directory in that order). Note that the current directory is specified by a null path name which can appear immediately after the equals sign, between colon delimiters, or at the end of the path list.
ksh(1) ksh(1) %% alias [ -tx ] [ name[=value ] ... ] alias with no arguments prints the list of aliases in the form name =value on standard output. An alias is defined for each name whose value is given. A trailing space in value causes the next word to be checked for alias substitution. The -t option is used to set and list tracked aliases. The value of a tracked alias is the full path name corresponding to the given name.
ksh(1) ksh(1) number or string. A given string is used to locate the most recent command. A negative number is used to offset the current command number. The -l option causes the commands to be listed on standard output. Otherwise, the editor program ename is invoked on a file containing these keyboard commands. If ename is not supplied, the value of the parameter FCEDIT (default /usr/bin/ed ) is used as the editor. Once editing has ended, the commands (if any) are executed.
ksh(1) ksh(1) read [ -prsu [ n ] ] [ name ] [?prompt ] [ name ... ] The shell input mechanism. One line is read and broken up into words using the characters in IFS as separators. In -r raw mode, \ at the end of a line does not signify line continuation. The first word is assigned to the first name, the second word to the second name, etc., with remaining words assigned to the last name. The -p option causes the input line to be taken from the input pipe of a process spawned by the shell using |& .
ksh(1) ksh(1) noexec noglob nolog nounset privileged verbose trackall vi viraw xtrace -p -s -t -u -v -x -- k Same as -n . Same as -f . Do not save function definitions in history file. Same as -u . Same as -p . Same as -v . Same as -h . Activates the insert mode of a vi- style in-line editor until you press the ESC key which puts you in move mode. A return sends the line. Each character is processed as it is typed in vi mode. Same as -x . Disables processing of the $HOME/.
ksh(1) ksh(1) inside a function, a new instance of the parameter name is created. The parameter value and type are restored when the function completes. The following list of attributes can be specified: -L Left justify and remove leading blanks from value. If n is non-zero, it defines the width of the field. Otherwise, it is determined by the width of the value of first assignment. When the name is assigned, the value is filled on the right with blanks or truncated, if necessary, to fit into the field.
ksh(1) ksh(1) umask value is the complement of the result of applying mask to the complement of the previous umask value. If mask is omitted, the current value of the mask is printed. See also umask(1). unalias name ... The parameters given by the list of names are removed from the alias list. unset [ -f ] name ... The parameters given by the list of names are unassigned; that is, their values and attributes are erased. Read-only variables cannot be unset.
ksh(1) ksh(1) These rules effectively give the writer of the .profile file complete control over user actions, by performing guaranteed set-up actions and leaving the user in an appropriate directory (probably not the login directory). The system administrator often sets up a directory of commands (usually /usr/rbin ) that can be safely invoked by rksh . HP-UX systems provide a restricted editor red (see ed(1)), suitable for restricted users.
ksh(1) ˆC M- c M- l ˆK ˆW M- p kill ˆY ˆL ˆ@ M-space ˆJ ˆM ˆP ˆN M- < M- > ˆRstring k ˆO M-digits M-letter M- . M- _ M- * M- ESC M- = ˆU \ ˆV M- # ksh(1) Capitalize current character. Capitalize current word. Change the current word to lowercase. Delete from the cursor to the end of the line. If preceded by a numerical parameter whose value is less that the current cursor position, delete from the given position up to the cursor.
ksh(1) ksh(1) advantages of canonical processing with the type-ahead echoing of raw mode. Setting the viraw option always disables canonical processing on the terminal. This mode is implicit for systems that do not support two alternate end-of-line delimiters, and can be helpful for certain terminals. Input Edit Commands By default the editor is in input mode. erase Delete previous character. (erase is a user-defined erase character, as defined by the stty(1) command, usually ˆH or #.
ksh(1) ksh(1) Delete the current character through the end of line and enter input mode. Equivalent to c$ . Equivalent to cc . Delete the current character through end of line. Equivalent to d$ . C S D [count]dmotion d[count]motion i I [count]P [count]p R [count]rc [count]x [count]X [count]. [count]˜ [count]_ * k Move cursor to the character position specified by motion, deleting all characters between the original cursor position and new position. If motion is d, the entire line is deleted.
ksh(1) ksh(1) KSH_QUOTEMC switches the processing of quoted metacharacters in "[[ string = pattern ]]" constructs. If KSH_QUOTEMC=true is defined in the environment, then any part of pattern can be quoted to cause it to be matched as a string. This usage follows the conventions of dtksh(1). If KSH_QUOTEMC is not defined in the environment, then processing follows the traditional Korn shell conventions. International Code Set Support Single-byte character code sets are supported.
ksh(1) ksh(1) Be aware that the value of the IFS variable in the user’s environment affects the behavior of scripts. ksh implements command substitution by creating a pipe between itself and the command. If the root file system is full, the substituted command cannot write to the pipe. As a result, the shell receives no input from the command, and the result of the substitution is null.
ktutil(1) ktutil(1) NAME ktutil - Kerberos keytab file maintenance utility SYNOPSIS ktutil DESCRIPTION The ktutil command invokes a subshell from which an administrator can read, write, or edit entries in a Kerberos V5 keytab or V4 srvtab file. ktutil Commands list read_kt keytab_filename Display the current key list. Alias: l read_st srvtab_filename Read the Kerberos V4 srvtab file, srvtab_filename, into the current key list.
kvno(1) kvno(1) NAME kvno - print key version numbers of Kerberos principals SYNOPSIS kvno [-e etype] service1, [service2, ...] DESCRIPTION kvno acquires a service ticket for the specified Kerberos principals and prints out the key version numbers of each principal. Options -e etype Specifies the encryption type which will be requested for the session key of all the services named on the command line. This is useful in certain backward compatibility situations.
last(1) last(1) NAME last, lastb - indicate last logins of users and ttys SYNOPSIS /usr/bin/last [ -R ] [ -number ] [ -f file ] [ name ... ] [ tty ... ] /usr/bin/lastb [ -R ] [ -number ] [ -f file ] [ name ... ] [ tty ... ] DESCRIPTION The last command searches backwards through the file /var/adm/wtmp (which contains a record of all logins and logouts) for information about a user, a tty, or any group of users and ttys. Arguments specify names of users or ttys of interest.
lastcomm(1) lastcomm(1) NAME lastcomm - show last commands executed in reverse order SYNOPSIS lastcomm [commandname] ... [username] ... [terminalname] ... DESCRIPTION lastcomm gives information on previously executed commands. If no arguments are specified, lastcomm prints information about all the commands recorded in the accounting file, /var/adm/pacct during the current accounting file’s lifetime.
ld(1) ld(1) NAME ld - link editor SYNOPSIS Common Options ld [-bdmnqrstvxzEGIOPQVZ] [-a search] [-c filename] [-dynamic ] [-e epsym] [-h symbol]... [-lx file]... [-l: library] [-noshared ] [-o outfile] [-u symbol]... [-y symbol]... [-B bind] [-D offset] [-Fl lib] [-L dir]... [-R offset] [-Pd ] [-PD file] [-PF file] [+afs func_sym_x=func_sym_y]...
ld(1) ld(1) The text segment of a shared library is shared among all processes that use the library; each process using the library receives its own copy of the data segment. If pxdb -s on has been run on the executable that loads the library, the text segment of a shared library is mapped privately for each process running the executable. ld recursively examines the dependencies of shared libraries used by a program that was created by ld.
ld(1) ld(1) -lx Search a library lib x .a or lib x .sl, where x is one or more characters. The current state of the -a option determines whether the archive (.a ) or shared (.sl ) version of a library is searched. Because a library is searched when its name is encountered, the placement of a -l is significant. By default, 32-bit libraries are located in /usr/lib and /usr/ccs/lib . 64-bit libraries are located in /usr/lib/pa20_64.
ld(1) ld(1) direct Create a direct link between symbol references and shared libraries by recording the name of the resolved shared libray during symbol resolution. This information is used during runtime to quickly resolve symbols without searching through all currently loaded libraries. -B direct implicitly turns on symbolic binding (see -B symbolic ) and disables dependent shared library processing.
ld(1) ld(1) verbose Display verbose messages when binding symbols. This is the default except when -B nonfatal is specified. In that case, -B verbose must be explicitly specified to get verbose messages. See the +help option or the HP-UX Linker and Libraries User’s Guide manual for more information on the uses of binding modes. -D offset Set the origin (in hexadecimal) for the data segment.
ld(1) ld(1) Reorder debuggable functions. Ordinarily -P does not reorder functions from .o files with debugging information, because reordering renders them non-debuggable. This option overrides this and reorders the functions. Reordering is based on link order file produced from flow.data by default. If you specify the -PF option, the linker uses the specified link order file, instead of flow.data , for reordering. This option is incompatible with +ild .
ld(1) ld(1) However, it has the additional side effect of identifying the symbol as necessary, so that it will not be removed when using dead code elimination (+Oprocelim ). Of course, +ee still retains its export behavior if an option such as +hideallsymbols is also given. +fb Instructs the linker to run the fastbind tool on the executable it has produced. The executable should be linked with shared libraries.
ld(1) ld(1) Starts the help window utility HP-UX Linker and Libraries Online User Guide which comes with some HP compilers. (You must be running the X window system and your DISPLAY environment variable must be set to the name of your workstation or X terminal.) For more information, refer to the HP-UX Linker and Libraries User’s Guide manual. See manuals(5) for ordering information.
ld(1) ld(1) When used with -g , +objdebug leaves debug information in the object files instead of copying it to the executable file at link time, resulting in shorter link times and smaller executables. The compile-time default, +noobjdebug , copies the debug information to the executable file. When you specify -g when compiling, the compiler places symbolic debugging information into the object files.
ld(1) ld(1) +pgm name Used together with the -P option, this option specifies that name should be used as the look-up name in the profile database file. The default is the basename of the output file (specified by the -o option.) This option is incompatible with the +ild option. +pi size Request a particular virtual memory page size that should be used for instructions. See the +pd option for additional information. +profilebucketsize size Controls the size of profiling counters.
ld(1) ld(1) option or the HP-UX Linker and Libraries User’s Guide manual. +O[no]fastaccess Enable [disable] fast access to global data. The linker rearranges the data to further reduce the number of ADDIL instructions in the executable. This optimization may reveal some subtle programming errors related to assumptions about data layout. This optimization can occur at optimization levels 2, 3 and 4. The default is +Onofastaccess at optimization levels 2 and 3, and +Ofastaccess at optimization level 4.
ld(1) ld(1) -N Generate an executable output file with file type EXEC_MAGIC . This option is incompatible with -n and -q. This option causes the data to be placed immediately following the text, and makes the text writable. Files of this type cannot be shared. -S Generate an Initial Program Loader (IPL) auxiliary header for the output file, instead of the default HP-UX auxiliary header. -T Save the load data and relocation information in temporary files instead of in memory during linking.
ld(1) ld(1) message when a dynamic relocation is required in read-only sections. See Kernel Virtual Environment Support for more information. +[no]allowunsats +allowunsats Does not flag errors if the resulting output file has unsatisfied symbols. This is the default for relocatable links and shared library builds. +noallowunsats Flags an error if the resulting output file has unsatisfied symbols. This is the default for program files. +[no]defaultrpath +defaultrpath is the default.
ld(1) ld(1) +ildnowarn Suppress incremental-linking related warnings. By default, the linker issues all incremental-linking related warnings. This option is ignored if used without +ild or +ildrelink . +ildpad percentage Control the amount of padding percentage the incremental linker allocates, relative to sizes of object file structures being padded. By default the linker allocates 25% of padding space. This option is ignored if used without +ild or +ildrelink .
ld(1) ld(1) +nosymb symbol When building a shared library with -Bsymbolic , causes the linker to exclude the specified symbol from -Bsymbolic symbol resolution. You can specify more than one symbol on the command line with multiple optionsymbol pairs, that is, each symbol you specify must be preceded by the +nosymb option. symbol can also be a regular expression that matches multiple symbol names. Regular expressions are described in regexp(5).
ld(1) ld(1) The linker performs the following different modes of linking: • normal link: the default operation mode in which the linker links all modules. • initial incremental link: the mode entered when you request an incremental link, but the output module created by the incremental linker does not exist, or it exists but the incremental linker is unable to perform an incremental update.
ld(1) ld(1) symbol tables at all and does not report shared library unsats. The dynamic loader detects them at run time. If any of the shared libraries on the command line was modified, the linker reverts to an initial incremental link. Performance Performance of the incremental linker may suffer greatly if you change a high percentage of object files.
ld(1) ld(1) That is, if the uid or gid does not match its effective counterpart, dld does not check the directories specified in SHLIB_PATH and LD_LIBRARY_PATH, which causes the runtime error "library not found ". EXTERNAL INFLUENCES Environment Variables The following environment variables affect the execution of ld : BROWSER Specifies the path name of the HTML browser to display the HP-UX Linker and Libraries Online User’s Guide when you use the +help option.
ld(1) ld(1) LC_CTYPE Determines the locale category for character handling functions. NLSPATH Determines the location of message catalogs for the processing of LC_MESSAGES . If any internationalization variable contains an invalid setting, ld behaves as if all internationalization variables are set to C. See environ(5). RETURN VALUES ld returns the following values: 0 Successful completion. The link is successful. n!=0 Failure. An error has occurred.
ld(1) ld(1) ld -B immediate -B nonfatal -B verbose \ program.o -L . -lfunc -a archive -lc On 32-bit, link a Pascal program: ld /usr/ccs/lib/crt0.o main.o -lcl -lm -lc that in the above examples, /usr/ccs/lib/crt0.o /opt/langtools/lib/crt0.o. Note can be replaced by WARNINGS ld recognizes several names as having special meanings. The symbol _end is reserved by the linker to refer to the first address beyond the end of the program’s address space.
ld(1) ld(1) AUTHOR ld was developed by AT&T, the University of California, Berkeley, and HP. FILES /usr/lib/lib* 32-bit system archive and shared libraries /usr/lib/pa20_64/lib* 64-bit system archive and shared libraries /usr/ccs/lib* 32-bit development archive and shared libraries /opt/langtools/lib/pa20_64 64-bit development object files, archive and shared libraries a.out output file /usr/lib/dld.sl 32-bit dynamic loader /usr/lib/pa20_64/dld.sl 64-bit dynamic loader /opt/langtools/lib/end.
ld(1) ld(1) fastbind(1) nm(1) pc(1) strip(1) invoke the fastbind tool print name list of object file invoke the HP-UX Pascal compiler strip symbol and line number information from an object file Miscellaneous setflexsec(1M) crt0(3) end(3C) a.out(4) ar(4) dld.
ldd(1) ldd(1) NAME ldd - list dynamic dependencies of executable files or shared libraries SYNOPSIS ldd [-b] [-d] [-r] [-s] [-v] filename... DESCRIPTION ldd is a command that can list the dynamic dependencies of incomplete executable files or shared libraries. ldd lists verbose information about dynamic dependencies and symbol references. If the object file is an executable file, ldd lists all shared libraries that would be loaded as a result of executing the file.
ldd(1) ldd(1) NLSPATH Determines the location of message catalogs for the processing of LC_MESSAGES . If any internationalization variable contains an invalid setting, ldd behaves as if all internationalization variables are set to C. See environ(5). RETURN VALUES ldd returns the following values: 0 Successful completion. !=0 Failure. A non-zero error code indicates an error has occurred. DIAGNOSTICS ldd prints the record of shared library path names to stdout .
ldd(1) ldd(1) search path=/var/tmp:/var/adm (LD_LIBRARY_PATH) trying path=/var/tmp/libdl.1 trying path=/var/adm/libdl.1 search path=/tmp (SHLIB_PATH ) trying path=/tmp/libdl.1 search path=/usr/lib/pa20_64 (RPATH) trying path=/usr/lib/pa20_64/libdl.1 libdl.1 => /usr/lib/pa20_64/libdl.1 WARNINGS ldd does not list shared libraries explicitly loaded using dlopen(3C) or shl_load(3X). FILES a.out /usr/lib/dld.sl /usr/lib/pa20_64/dld.sl /usr/ccs/lib/lddstub /usr/ccs/lib/pa20_64/lddstub /usr/lib/nls/$LANG/ldd.
leave(1) leave(1) NAME leave - remind you when you have to leave SYNOPSIS leave [ hhmm ] DESCRIPTION The leave command waits until the specified time, then reminds you to leave. You are reminded 5 minutes and 1 minute before the actual time, at the time, and every minute thereafter. When you log off, leave exits. The time of day is in the form hhmm, where hh is a time in hours (which can range from 0 through 11 or 0 through 24 hours), and mm is the number of minutes after the specified hour.
lifcp(1) lifcp(1) NAME lifcp - copy to or from LIF files SYNOPSIS lifcp [ -Txxx ] [ -Lxxx ] [ -vxxx ] [ -a ] [ -b ] [ -i xxx ] [ -r ] [ -t ] file1 file2 lifcp [ -Txxx ] [ -Lxxx ] [ -vxxx ] [ -a ] [ -b ] [ -ixxx ] [ -r ] [ -t ] [ file1 file2 ... ] directory DESCRIPTION lifcp copies a LIF file to an HP-UX file, an HP-UX file to a LIF file, or a LIF file to another LIF file. It also copies a list of (HP-UX/LIF) files to a (LIF/HP-UX) directory.
lifcp(1) lifcp(1) The default copying modes when copying from LIF to HP-UX are summarized in the following table: File Type Default Copying Mode ASCII BINARY BIN ASCII BINARY RAW RAW other When copying from HP-UX to LIF, the default copying mode is ASCII and an ASCII file is created. When copying from LIF to LIF, if no options are specified, then all the LIF directory fields and file contents are duplicated from source to destination.
lifcp(1) lifcp(1) lifcp lifvol:ABC . Copy standard input to LIF file A_FILE on LIF volume /dev/dsk/c0t6d0. lifcp - /dev/dsk/c0t6d0:A_FILE Copy LIF file ABC in lifvol to LIF file CDE on /dev/dsk/c0t6d0 . lifcp lifvol:ABC /dev/dsk/c0t6d0:CDE Copy the output of pr to the LIF file ABC. pr abc | lifcp - lifvol:ABC Copy the output of pr to the LIF volume lifvol. LIF file STDIN is created since no files names are specified. pr abc | lifcp - lifvol: Copy LIF file ABC in lifvol to standard output.
lifinit(1) lifinit(1) NAME lifinit - write LIF volume header on file SYNOPSIS lifinit [-vnnn ] [-dnnn ] [-n string ] [-snnn ] [-lnnn ] [-ennn ] file DESCRIPTION lifinit writes a LIF volume header on a volume or file. Options lifinit recognizes the following options and command-line arguments which can appear in any order: -vnnn Sets volume size to nnn bytes. If nnn is not a multiple of 256, it is rounded down to the next such multiple. -dnnn Sets directory size to nnn file entries.
lifinit(1) lifinit(1) lifinit /dev/rdsk/c0t6d0 WARNINGS To prevent media corruption, do not terminate lifinit once it has started executing. AUTHOR lifinit was developed by HP. SEE ALSO lifcp(1), lifls(1), lifrename(1), lifrm(1), lif(4).
lifls(1) lifls(1) NAME lifls - list contents of a LIF directory SYNOPSIS lifls [ option ] name DESCRIPTION lifls lists the contents of a LIF directory on standard output. The default output format lists file names in multiple columns (similar to ls(1), except unsorted) if standard output is a character special file. If standard output is not a tty device, the output format is one file name per line. name is a path name to an HPUX file containing a LIF volume and optional file name.
lifrename(1) lifrename(1) NAME lifrename - rename LIF files SYNOPSIS lifrename oldfile newfile DESCRIPTION oldfile is a full LIF file specifier (see lif(4) for details) for the file to be renamed (e.g. liffile:A_FILE). newfile is new name to be given to the file (only the file name portion). This operation does not include copy or delete. Old file names must match the name of the file to be renamed, even if that file name is not a legal LIF name. Do not mount the special file while using lifrename .
lifrm(1) lifrm(1) NAME lifrm - remove a LIF file SYNOPSIS lifrm file1 ... filen DESCRIPTION lifrm removes one or more entries from a LIF volume. File name specifiers are as described in lif(4). Do not mount the special file while using lifrm . DIAGNOSTICS lifrm returns zero if the file is removed successfully. Otherwise it prints a diagnostic and returns nonzero. EXAMPLES lifrm liffile:MAN lifrm /dev/rdsk/c0t6d0:F AUTHOR lifrm was developed by HP.
line(1) line(1) NAME line - read one line from user input SYNOPSIS line [-t timeout ] DESCRIPTION line copies one line (up to a new-line) from the standard input and writes it on the standard output. It returns an exit code of 1 on EOF and always prints at least a new-line. It is often used within shell files to read from the user’s terminal.
listusers(1) listusers(1) NAME listusers - display user login data SYNOPSIS listusers [-g groups] [-l logins] DESCRIPTION The listusers command displays data concerning user logins. The output shows the user login and the /etc/passwd comment field value (e.g., user name, etc.). The default displays data about all user logins. Options The listusers command supports the following options: -g groups Display all users belonging to groups, sorted by login. A comma separated list specifies multiple groups.
ln(1) ln(1) NAME ln - link files and directories SYNOPSIS ln [-f] [-i] [-s] file1 new_file ln [-f] [-i] [-s] file1 [file2 ...] dest_directory ln [-f] [-i] [-s] directory1 [directory2 ...] dest_directory DESCRIPTION The ln command links: • file1 to a new or existing new_file, • file1 to a new or existing file named file1 in existing dest_directory, • file1, file2, ... to new or existing files of the same name in existing dest_directory, • directory1, directory2, ...
ln(1) ln(1) to file; an lstat() must be performed to obtain information about the link (see stat(2)). A readlink() call can be used to read the contents of the symbolic link (see readlink(2)). Symbolic links may span file systems and refer to directories. Access Control Lists (ACLs) If optional ACL entries are associated with new_file, ln displays a plus sign (+) after the access mode when asking permission to overwrite the file.
locale(1) locale(1) NAME locale - get locale-specific (NLS) information SYNOPSIS locale [ -a [ 32 | 64 ] -A -m ] locale [ -ck ] name ... DESCRIPTION The locale command displays information about the current locale or about available locales.
locale(1) locale(1) -c Display names of locale categories that have been selected either explicitly or by giving a keyword contained therein. This option may be used with the -k option. -k Display names of keywords that have been selected either explicitly or by providing their containing category as an argument. Keyword names and values are displayed as: = Without the -k option, only the values are displayed. This option can be used with the -c option.
locale(1) locale(1) locale LC_NUMERIC produces: "." "" "" which correspond to the keywords decimal_point, thousands_sep, grouping, and alt_digit. SEE ALSO localedef(1M), localeconv(3C), nl_langinfo(3C), setlocale(3C), charmap(4), localedef(4), environ(5), lang(5). STANDARDS CONFORMANCE locale : XPG4, POSIX.
lock(1) lock(1) NAME lock - reserve a terminal SYNOPSIS lock DESCRIPTION lock requests a password from the user, then prints LOCKED on the terminal and refuses to relinquish the terminal until the password is repeated. If the user forgets the password, the only recourse is to log in elsewhere and kill the lock process.
logger(1) logger(1) NAME logger - make entries in the system log SYNOPSIS logger [-t tag] [-p pri] [-i] [-f file] [message ... ] DESCRIPTION The logger command provides a program interface to the syslog() system log module (see syslog(3C)). A message can be given on the command line, which is logged immediately, or a file is read and each line is logged. If no file or message is specified, the contents of the standard input are logged.
logger(1) logger(1) AUTHOR logger was developed by the University of California, Berkeley. SEE ALSO syslogd(1M), getlogin(3C), syslog(3C). STANDARDS CONFORMANCE logger : XPG4, POSIX.
login(1) login(1) NAME login - sign on, start terminal session SYNOPSIS login [name [env-var]...] DESCRIPTION The login command is used at the beginning of each terminal session to properly identify a prospective user. login can be invoked as a user command or by the system as an incoming connection is established. login can also be invoked by the system when a previous user shell terminates but the terminal does not disconnect.
login(1) login(1) login_directory, login_name, and login_shell are taken from the corresponding fields of the passwd file entry (see passwd(4)). For superuser, PATH is set to: PATH=:/usr/sbin:/usr/bin:/sbin In the case of a remote login, the environment variable TERM is also set to the remote user’s terminal type. The environment can be expanded or modified by supplying additional arguments to login , either at execution time or when login requests the user’s login name.
login(1) login(1) • The administrative lock on the account has been set. • The maximum number of unsuccessful login attempts for the account has been exceeded. • The maximum number of unsuccessful login attempts for the terminal has been exceeded. • The administrative lock on the terminal has been set. • The terminal has an authorized user list and the user is not on it. • The terminal has time of day restrictions and the current time is not within the allowable period.
login(1) login(1) Attempted to log in to a subdirectory root that does not exist. That is, the passwd file entry had shell path *, but the system cannot chroot() to the given home directory. No shell The user shell (/usr/bin/sh if shell name is null in /etc/passwd ) could not be started with the exec command. Consult system administrator. No utmp entry.
login(1) login(1) SEE ALSO csh(1), groups(1), ksh(1), last(1), mail(1), newgrp(1), passwd(1), sh(1), sh-bourne(1), sh-posix(1), su(1), getty(1M), initgroups(3C), dialups(4), group(4), passwd(4), profile(4), security(4), utmp(4), environ(5) HP Process Resource Manager prmconfig(1), prmconf(4) in HP Process Resource Manager Users Guide.
logname(1) logname(1) NAME logname - get login name SYNOPSIS logname DESCRIPTION logname writes the user’s login name to standard output. The login name is equivalent to that returned by getlogin() (see getlogin(3C)). EXTERNAL INFLUENCES Environment Variables LANG determines the language in which diagnostic messages are displayed. FILES /etc/profile SEE ALSO env(1), login(1), getlogin(3C), logname(3C), environ(5). STANDARDS CONFORMANCE logname : SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
lorder(1) lorder(1) NAME lorder - find ordering relation for an object library SYNOPSIS lorder [files] DESCRIPTION The input consists of one or more object or archive library files (see ar(1)) placed on the command line or read from standard input. The standard output is a list of pairs of object file names, meaning that the first file of the pair refers to external identifiers defined in the second.
lorder(1) lorder(1) FILES /var/tmp/*symref /var/tmp/*symdef SEE ALSO System Tools: ar(1) ld(1) temporary files create archived libraries invoke the link editor Miscellaneous: tsort(1) produce an ordered list of items (topological sort) STANDARDS CONFORMANCE lorder : SVID2, SVID3, XPG2, XPG4 l Section 1−−488 Hewlett-Packard Company −2− HP-UX 11i Version 1: September 2005
lp(1) lp(1) NAME lp, lpalt, cancel - print/alter/cancel requests on an LP printer or plotter SYNOPSIS lp [-c] [-ddest] [-m] [-nnumber] [-ooption] [-ppriority] [-s] [-ttitle] [-w] [file ...] lpalt id [-ddest] [-i] [-m] [-nnumber] [-ooption] [-ppriority] [-s] [-ttitle] [-w] cancel [id ...] [printer ...] [-a] [-e] [-i] [-uuser] DESCRIPTION The lp command queues files for printing. The lpalt command changes information in a queued request. The cancel command deletes a queued request.
lp(1) lp(1) on your system, see the interface script for the printer name in the /etc/lp/interface directory. -ppriority Set the priority of the print request. priority must be in the range 0 (lowest priority) to 7 (highest priority). The priority is used to select the next spooled file for the targeted printer or class of printers.
lp(1) lp(1) -a Remove all requests the user owns on each printer. The owner is determined by the user’s login name and the host name of the machine where the lp command was invoked. -e Empty the spool queue of all requests for each printer. Only users with appropriate privileges can use this option. -i -uuser Cancel only local requests. Remove any requests belonging to user. You can repeat the -u option to specify more users. Only users with appropriate privileges can use this option.
lp(1) lp(1) pr .profile | lp -n3 WARNINGS A remote print request can be altered or canceled only by the user who requested it, and only from the system from which the the original lp command was issued. If the restrict cancel feature (see lpadmin(1M)) is enabled for the specified printer, a user can only alter or cancel requests owned by the user. For a remote system, lpalt cannot change dest and priority.
lpfilter(1) lpfilter(1) NAME lpfilter, divpage, fontdl, lprpp, plotdvr, printstat, reverse - filters invoked by lp interface scripts SYNOPSIS /usr/lbin/divpage [-p -l] [-h -q] [-nFontID ] filename /usr/lbin/fontdl [-nFontID ] [-l] [-p] filename /usr/lbin/lprpp [-i] [-o] [-e] [-lnn ] [-n] [-p] /usr/lbin/plotdvr -l request_id -u username [-e] [-f] [-i] filename /usr/sbin/printstat -l request_id -u username filename /usr/sbin/reverse [-l page_length ] Remarks The structure of these filters is currently
lpfilter(1) lpfilter(1) -o -e -l nn Prints only the odd numbered pages. Used with -e for double-sided printing. -n Specifies nroff mode for printing output of the nroff command. Prints 66 lines per page with the first line appearing on logical line 4 of the printer. -p Specifies pr mode for printing output from the pr command. Prints 66 lines per page with the first line appearing on logical line 3 of the printer. Print only the even numbered pages. Used with -o for double sided printing.
lpfilter(1) lpfilter(1) DIAGNOSTICS Error and diagnostic messages appear on the printed output, on the user’s terminal, or are mailed to the user, depending on circumstances. WARNINGS There is little consistency in the interface to these filters. SEE ALSO lp(1), lpadmin(1M). Managing Systems and Workgroups.
lpstat(1) lpstat(1) NAME lpstat - report line printer status information SYNOPSIS lpstat [-drst ] [-a[list] ] [-c[list] ] [-o[list] ] [-p[list] ] [-u[list] ] [-v[list] ] [ID]... DESCRIPTION The lpstat utility writes to standard output information about the current status of the line printer system. If no arguments are given, lpstat writes the status of all requests made to lp by the user that are still in the output queue. OPTIONS The lpstat utility supports the XBD specification, Section 10.
lpstat(1) lpstat(1) if none of the variables had been defined. LC_ALL If set to a non-empty string value, override the values of all the other internationalisation variables. LC_CTYPE Determine the locale for the interpretation of sequences of bytes of text data as characters (for example, single- as opposed to multi-byte characters in arguments).
lpstat(1) lpstat(1) SEE ALSO cancel(1), lp(1). CHANGE HISTORY First released in Issue 2. Issue 3 The operation of this utility in an 8-bit transparent manner has been noted. The operation of this utility in an internationalised environment has been described. Issue 4 Format reorganised. Exceptions to Utility Syntax Guidelines conformance noted. Internationalised environment variable support mandated.
lpstat(1) lpstat(1) HP-UX EXTENSIONS DESCRIPTION Any arguments that are not options are assumed to be request ids (as returned by lp ). lpstat prints the status of such requests. options can appear in any order and can be repeated and intermixed with other arguments. -i -o[ list ] -t Inhibit the reporting of remote status. Also see the -i option. Print all status information. Same as specifying -r , -s , -a , -p , -o . See the -i option.
ls(1) ls(1) NAME ls, lc, l, ll, lsf, lsr, lsx - list contents of directories SYNOPSIS ls [-abcdefgilmnopqrstuxACFLR1] [names] lc [-abcdefgilmnopqrstuxACFLR1] [names] l [ls_options] [names] ll [ls_options] [names] lsf [ls_options] [names] lsr [ls_options] [names] lsx [ls_options] [names] DESCRIPTION For each directory argument, the ls command lists the contents of the directory. For each file argument, ls repeats its name and any other information requested.
ls(1) ls(1) substituted for the hour and minute of the modification time. If the file is a special file, the size field contains the major and minor device numbers rather than a size. If the file is a symbolic link, the filename is printed, followed by -> and the pathname of the referenced file. -m Stream output format. -n The same as -l, (ell) except that the owner’s UID and group’s GID numbers are printed, rather than the associated character strings.
ls(1) ls(1) l n p s - Symbolic link Network special file Fifo (also called a "named pipe") special file Socket Ordinary file The next 9 characters are interpreted as three sets of three characters each which identify access and execution permissions for the owner, group, and others categories, as described in chmod(1). The - indicates the permission is not granted.
ls(1) ls(1) LC_CTYPE determines which characters are classified as nonprinting for the -b and -q options, and the interpretation of single- and/or multibyte characters within file names. LC_TIME determines the date and time strings output by the -g, -l (ell), -n, and -o options. LC_MESSAGES determines the language in which messages (other than the date and time strings) are displayed. If any internationalization variable contains an invalid setting, they all default to C (see environ(5)).
lsacl(1) lsacl(1) NAME lsacl - list access control lists (ACLs) of files SYNOPSIS /usr/bin/lsacl [-l] file... DESCRIPTION lsacl lists access control lists (ACLs) of one or more files in symbolic, ‘‘short’’ form, one file’s ACL per line of output, followed by the file name; see acl(5) for ACL syntax. Options lsacl recognizes the following option: -l Print ACLs in long form. Each file’s ACL can be more than one line long, and is always preceded by file name, colon, and newline.
m4(1) m4(1) NAME m4 - macro processor SYNOPSIS m4 [options] [file ...] DESCRIPTION m4 is a macro processor intended as a front end for Ratfor, C, and other languages. Each of the argument files is processed in order; if there are no files, or if a file name is -, standard input is read. The processed text is written to standard output. Options m4 recognizes the following options: -e Operate interactively. Interrupts are ignored and the output is unbuffered. Using this mode may be very difficult.
m4(1) decr define m4(1) Returns the value of its argument decremented by 1. The second argument is installed as the value of the macro whose name is the first argument. Each occurrence of $n in the replacement text, where n is a digit, is replaced by the nth argument.
m4(1) m4(1) syscmd Executes the HP-UX system command given in the first argument. No value is returned. sysval traceoff Is the return code from the last call to syscmd . traceon With no arguments, turns on tracing for all macros (including built-ins). Otherwise, turns on tracing for named macros. translit Transliterates the characters in its first argument from the set given by the second argument to the set given by the third. No abbreviations are permitted.
machid(1) machid(1) NAME hp9000s200, hp9000s300, hp9000s500, hp9000s800, pdp11, u3b, u3b2, u3b5, u3b10, u370, vax - provide truth value about processor type SYNOPSIS hp9000s200 hp9000s300 hp9000s400 hp9000s500 hp9000s700 hp9000s800 hp-mc680x0 hp-pa pdp11 u3b u3b2 u3b5 u3b10 u370 vax DESCRIPTION The following commands return a true value (exit code 0) if the a processor type matches the command name. Otherwise a false value (exit code non-zero) is returned.
machid(1) machid(1) SEE ALSO getconf(1), make(1), sh(1), test(1), true(1).
mail(1) mail(1) NAME mail, rmail - send mail to users or read mail SYNOPSIS mail [+] [-epqr ] [-f file ] mail [-dt ] person ... rmail [-dt ] person ... Remarks: See mailx(1) and elm(1) for an enhanced user mail interface. DESCRIPTION The mail command, when used without arguments, prints the user’s mail, message-by-message, in lastin, first-out order. For each message, mail prints a ? prompt and reads a line from the standard input to determine the disposition of the message.
mail(1) mail(1) -r -f file -t -d Same as +. Causes mail to use file (for example, mbox ) instead of the default mailfile. Causes the outbound message to be preceded by each person the mail is sent to. A person is usually a user name recognized by login (see login(1)). If a person being sent mail is not recognized, or if mail is interrupted during input, the file dead.letter will be saved to allow editing and resending. Note that dead.
mail(1) mail(1) mail treats a line consisting solely of a dot ( . ) as the end of the message, except when the rmail -d command is used. The maximum allowable line length in mail messages is BUFSIZ bytes as defined in /usr/include/stdio.h. If line length exceeds this limit, mail truncates the line starting at beginning-of-line, and uses only the trailing BUFSIZ characters.
mailfrom(1) mailfrom(1) NAME mailfrom - summarize mail folders by subject and sender SYNOPSIS mailfrom [-hnQqStv ] [-s status] [folderusername]... DESCRIPTION The mailfrom command reads one or more mail folders and outputs one line per message in the form: from [subject] where from is the name of the person the message is from, and subject is the subject of the message, if present.
mailfrom(1) 0 1 2 3 mailfrom(1) Messages matching status are present. No messages matching status are present, but there are some messages. There are no messages at all. An error occurred. If multiple mailboxes or folders are specified, the exit status only applies to the last one examined. This can be used in scripts to determine what kind of mail a user has. EXAMPLES Display header information from all the messages in your mailbox.
mailq(1) mailq(1) NAME mailq - prints the mail queue SYNOPSIS mailq [-v] DESCRIPTION mailq prints a summary of the mail messages queued for future delivery. The first line printed for each message shows the internal identifier used on this host for the message, the size of the message in bytes, the date and time the message was accepted into the queue, and the envelope sender of the message.
mailstats(1) mailstats(1) NAME mailstats - print mail traffic statistics SYNOPSIS mailstats [-o] [-C cffile ] [-f stfile ] DESCRIPTION mailstats reads and interprets the sendmail statistics file, /etc/mail/sendmail.st, then prints out the mail traffic statistics. If /etc/mail/sendmail.st exists, sendmail collects statistics about your mail traffic and stores them in the statistics file. This file does not grow.
mailstats(1) mailstats(1) EXAMPLES Here is a typical example of mailstats output: Statistics from Thu Jul 11 14:12:40 1996 M msgsfr bytes_from msgsto bytes_to 0 0 0K 3 4K 3 3 4K 0 0K 5 2 1K 11 11K msgsrej msgsdis 0 0 0 0 4 0 Mailer prog local esmtp ============================================================= T 13 13K 14 15K 4 0 This example shows that mailers 0, 3 and 5 have handled the given amounts of mail traffic since Thursday, Jul 11th.
mailx(1) mailx(1) NAME mailx - interactive message processing system SYNOPSIS Send mode: mailx [-FUm ] [-s subject ] [-r address ] [-h number ] address ... Receive mode: mailx -e mailx [-UHLiNn ] [-u user ] mailx -f [-UHLiNn ] [ filename ] Obsolescent: mailx [-f filename ] [-UHLiNn ] DESCRIPTION mailx provides a comfortable, flexible environment for sending and receiving messages electronically. When reading mail, mailx provides commands to facilitate saving, deleting, and responding to messages.
mailx(1) mailx(1) -N -r address -s subject -u user Do not print initial header summary. -U Convert UUCP-style addresses to Internet standards. Overrides the conv environment variable. -d Turn on debugging output. Neither particularly interesting nor recommended. Pass address to network delivery software. All tilde commands are disabled. Set the Subject header field to subject. Read user’s mailbox. Can be used only if read access to user’s mailbox is not read protected.
mailx(1) mailx(1) Other arguments are usually arbitrary strings whose usage depends on the command involved. File names, where expected, are expanded using normal shell conventions (see sh(1)). Special characters are recognized by certain commands, and are documented with the commands below. At start-up time, mailx reads commands from a system-wide file (/usr/share/lib/mailx.rc) to initialize certain parameters, then from a private start-up file ($HOME/.mailrc) for personalized variables.
mailx(1) xit mailx(1) Exit from mailx , without changing the mailbox. No messages are saved in the mbox (see also quit). file [ filename ] fold er [ filename ] Quit from the current file of messages and read in the specified file. Several special characters are recognized when used as file names, and substitutions are made as follows: % % user # & the the the the current mailbox. mailbox for user. previous file. current mbox. Default file is the current mailbox.
mailx(1) mailx(1) in the absence of a real command. See the discussion of msglists above for a description of possible message specifications. pipe [ msglist ] [ command ] | [ msglist ] [ command ] Pipe messages in msglist through the specified command. Each message is treated as if it were read. If msglist is not specified, the current message is used. If command is not specified, the command specified by the current value of the cmd variable is used.
mailx(1) Print [ msglist ] type [ msglist ] print [ msglist ] mailx(1) Print the specified messages on the screen, including all header fields. Overrides suppression of fields by the ig nore command. Print the specified messages. If crt is set, messages longer than the number of lines specified by the crt variable are paged through the command specified by the PAGER variable. The default command is pg(1) but many users prefer more(1) (see ENVIRONMENT VARIABLES).
mailx(1) mailx(1) ˜p ˜q Print the message being entered. ˜R name ... ˜r filename ˜< filename ˜
mailx(1) mailx(1) EDITOR= command The command to run when the edit or ˜e command is used. Default is ed (see ed(1)). encoding= encoding Set the default encoding to be used when 8-bit characters are present. Allowable values are quoted-printable, base64 and 8bit. The short-hand q-p is also acceptable for quoted-printable. The default value will be determined based upon the value of charset . A value of 8bit means not to encode. escape= c Substitute c for the ˜ escape character.
mailx(1) mailx(1) quiet Refrain from printing the opening message and version when entering mailx . Default is noquiet . record= filename Record all outgoing mail in filename. Disabled by default. See also outfolder above. Enable saving of messages in dead.letter on interrupt or delivery error. See DEAD for a description of this file. Enabled by default. save screen= number Set the number of lines in a screen-full of headers for the headers command.
mailx(1) mailx(1) WARNINGS Where command is shown as valid, arguments are not always allowed. Experimentation is recommended. Internal variables imported from the execution environment cannot be uns et. The full internet addressing is not fully supported by mailx . The new internationalization standards need some time to settle down. mail(1), the standard mail delivery program, treats a line consisting solely of a dot ( . ) as the end of the message.
make(1) make(1) NAME make - maintain, update, and regenerate groups of programs SYNOPSIS make [-f makefile ] [-bBdeiknpPqrsStuw] [ macro_name =value ] [ names ] DESCRIPTION Makefile Structure A makefile can contain four different kinds of lines: target lines, shell command lines, macro definitions, and include lines.
make(1) make(1) INCLUDE LINES If the string include appears as the first seven letters of a line in a makefile, and is followed by one or more space or tab characters, the rest of the line is assumed to be a file name and is read and processed by the current invocation of make as another makefile after any macros in the filename have been expanded. The default behaviour of make is to use .DEFAULT built-in target, if target does not have explicit commands associated with it and .DEFAULT target is defined.
make(1) make(1) A command line is normally printed before it is executed, but if the line has a @ at the beginning, printing is suppressed. The -s option or the presence of the special target .SILENT: in the makefile suppresses printing of all command lines. The @ can be used to selectively turn off printing. Everything printed by make (except the initial tab) is passed directly to the shell without alteration. Thus, echo a\ b produces ab just as the shell would.
make(1) make(1) given is used. This enables overriding the presence of the k flag in the MAKEFLAGS environment variable. -t Touch the target files (causing them to be up-to-date) rather than issue the usual commands. -u -w Unconditionally make the target, ignoring all timestamps. Suppress warning messages. Fatal messages will not be affected. [macro_name =value] Zero or more command line macro definitions can be specified. See the Macros section.
make(1) make(1) SHELL=/usr/bin/sh or a suitable equivalent should be put in the macro definition section of the makefile. Suffixes Target and/or dependent names often have suffixes. Knowledge about certain suffixes is built into make and used to identify appropriate inference rules to be applied to update a target (see the section on Inference Rules). The current default list of suffixes is: .o .c .c˜ .C .C˜ .cxx .cxx˜ .cpp .cpp˜ .cc .cc˜ .y .y˜ .l .l˜ .L .L˜ .Y .Y˜ .s .s˜ .sh .sh˜ .h .h˜ .H .H˜ .p .p˜ .
make(1) make(1) A tilde in the above rules refers to an SCCS file (see sccsfile(4)). Thus, the rule .c˜.o would transform an SCCS C source file into an object file (.o ). Since the s. of the SCCS files is a prefix, it is incompatible with make ’s suffix point-of-view. Hence, the tilde is a way of changing any file reference into an SCCS file reference. A rule to create a file with suffix .o from a file with suffix .c is specified as an entry with .c.o as the target and no dependents.
make(1) make(1) The most common use of the archive interface follows. Here, we assume the source files are all C type source: lib: lib(file1.o) lib(file2.o) lib(file3.o) @echo lib is now up-to-date .c.a: $(CC) -c $(CFLAGS) $< ar rv $@ $*.o rm -f $*.o (See the section on Built-in Macros for an explanation of the <, @, and * symbols.) In fact, the .c.a rule listed above is built into make and is unnecessary in this example. This rule is applied to each dependent of lib in turn.
make(1) make(1) the following series of targets to be made is generated: --- pgm with two dependents and an explicit rule to follow --- a.o (recursively) with an implicit dependent of a.c which matches the implicit rule .c.o --- a.c (recursively) with no implicit dependents and no implicit rules. This stops the recursion and simply returns the last modification time of the file a.c. --- b.o (recursively) with an implicit dependent of b.c which matches the implicit rule .c.o --- b.
make(1) make(1) be used in target rules in the makefile. They can also be redefined in the makefile. $$@ The $$@ macro has meaning only on dependency lines. Macros of this form are called dynamic dependencies because they are evaluated at the time the dependency is actually processed. $$@ evaluates to exactly the same thing as $@ does on a command line; i.e., the current target name. This macro is useful for building large numbers of executable files, each of which has only one source file.
make(1) make(1) International Code Set Support Single and multi-byte character code sets are supported. RETURN VALUE make returns a 0 upon successful completion or a value greater than 0 if an error occurred. If the -q option is specified, make returns 0 if the target was up-to-date and a value greater than 0 if the target was not up-to-date. EXAMPLES The following example creates an executable file from a C source code file without a makefile, if program.
make(1) make(1) SEE ALSO cc_bundled(1), cd(1), lex(1), mkmf(1), sh(1), environ(5), lang(5), regexp(5). A Nutshell Handbook, Managing Projects With Make by Steve Talbot, Second Edition, O’Reilly & Associates, Inc., 1986. STANDARDS CONFORMANCE make : SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
makekey(1) makekey(1) NAME makekey - generate encryption key SYNOPSIS /usr/lbin/makekey DESCRIPTION makekey improves the usefulness of encryption schemes depending on a key by increasing the amount of time required to search the key space. It reads 10 bytes from its standard input and writes 13 bytes on its standard output. The output depends on the input in a way intended to be difficult to compute (i.e., to require a substantial fraction of a second).
man(1) man(1) NAME man - find manual information by keywords; print out a manual entry SYNOPSIS man [-M path] -k keyword... man [-M path] -f file... man [-] [-M path] [-T macro-package] [ section [ subsection ] ] entry_name... DESCRIPTION man accesses information from the HP-UX manual pages. It can be used to: • List all manual entries whose one-line description contains any of a specified set of keywords. • Display or print one-line descriptions of entries specified by name.
man(1) man(1) for one or more of the entries indicated. section corresponds to the section number where the entry appears in the HP-UX Reference. It can be followed by an optional uppercase/lowercase subsection identifier such as 3C which would indicate a library routine in Section 3. 3, 3c , and 3C are interpreted as equivalent, since all Section 3 manual entries are stored in the same or in related directories (such as /usr/share/man/man3.Z and /usr/share/man/man3.
man(1) man(1) man∗.Z The entry is uncompressed, formatted, and displayed. If the cat∗.Z directory exists, the formatted entry is compressed and installed in cat∗.Z . If the cat∗ directory exists, the formatted entry is installed in cat∗ . cat∗.Z man∗ The entry is uncompressed and displayed. cat∗ The entry is displayed. The entry is formatted, and displayed. If the cat∗.Z directory exists, it is compressed, and installed in cat∗.Z .
man(1) man(1) Display the manual entry for id(1), with the output piped through pg -c : PAGER="pg -c" export PAGER man id List all printed manuals available for the current system (see manuals(5): man manuals Display intro(4) and intro(3): man 4 intro man 3 intro WARNINGS Manual entries are structured such that they can be printed on a phototypesetter, conventional line printer, and screen display devices.
mediainit(1) mediainit(1) NAME mediainit - initialize disk or partition DDS tape SYNOPSIS mediainit [-vr ] [-f fmt_optn ] [-i interleave ] [-p size ] pathname DESCRIPTION mediainit initializes mass storage media by formatting the media, writing and reading test patterns to verify media integrity, then sparing any defective blocks found. This process prepares the disk or tape for error-free operation. Initialization destroys all existing user data in the area being initialized.
mediainit(1) pathname mediainit(1) pathname is the path name to the character (raw) device special file associated with the device unit or volume that is to be initialized. mediainit aborts if you lack either read or write permission to the device special file, or if the device is currently open for any other process. This prevents accidental initialization of the root device or any mounted volume. mediainit locks the unit or volume being initialized so that no other processes can access it.
mediainit(1) mediainit(1) Some applications may require that a file system be placed on the media before use. mediainit does not create a file system; it only prepares media for writing and reading. If such a file system is required, other utilities such as newfs , lifinit , or mkfs must be invoked after running mediainit (see newfs(1M), lifinit(1), and mkfs(1M)). RETURN VALUE mediainit returns one of the following values: 0 1 2 Successful completion. A device-related error occurred.
merge(1) merge(1) NAME merge - three-way file merge SYNOPSIS merge [-p] file1 file2 file3 DESCRIPTION merge combines two files that are revisions of a single original file. The original file is file2, and the revised files are file1 and file3. merge identifies all changes that lead from file2 to file3 and from file2 to file1, then deposits the merged text into file1. If the -p option is used, the result goes to standard output instead of file1.
mesg(1) mesg(1) NAME mesg - permit or deny messages to terminal SYNOPSIS mesg [[-] g ] [[-] y ] [[-] n ] mesg DESCRIPTION The command form mesg [-] n forbids messages via write by revoking write permission to users without appropriate privilege on the user’s terminal (see write(1)). The command form mesg [-] g reinstates permission so that only legitimate commands (such as write(1)) can be used by other users to send messages.
mkdir(1) mkdir(1) NAME mkdir - make a directory SYNOPSIS mkdir [-p] [-m mode ] dirname ... DESCRIPTION mkdir creates specified directories in mode 0777 (possibly altered by umask unless specified otherwise by a -m mode option (see umask(1)). Standard entries, . (for the directory itself) and .. (for its parent) are created automatically. If dirname already exists, mkdir exits with a diagnostic message, and the directory is not changed.
mkdir(1) mkdir(1) mkdir returns exit code 0 if the -p option was specified, and all the specified directories now exist. If any of the intermediate directories do not have search or write permission (with the -p option), mkdir prints a diagnostic and returns non-zero.
mkfifo(1) mkfifo(1) NAME mkfifo - make FIFO (named pipe) special files SYNOPSIS mkfifo [-p] [-m mode ] filename ... DESCRIPTION mkfifo creates the FIFO special files named by its operand list. The operands are taken sequentially in the order specified and, if the user has write permission in the appropriate directory, the FIFO is created with permissions 0666 modified by the user’s file mode creation mask (see umask(2)).
mkmf(1) mkmf(1) NAME mkmf - make a makefile SYNOPSIS mkmf [-acdeil ] [-f makefile ] [-F template ] [-M language ] [ macroname=value ... ] DESCRIPTION The mkmf command creates a makefile that informs the make command how to construct and maintain programs and libraries (see make(1)).
mkmf(1) CFLAGS mkmf(1) C compiler flags. After searching for included files in the directory currently being processed, mkmf searches in directories named in -I compiler options and then in the /usr/include directory. COMPILESYSTYPE Location of /usr/include . If the COMPILESYSTYPE macro or environment mkmf searches for included files in variable is defined, /$COMPILESYSTYPE/usr/include instead of /usr/include . CXXFLAGS C++ compiler flags.
mkmf(1) mkmf(1) Ratfor syntax, P = Pascal syntax). The following list shows the default configuration for mkmf: C C++ Fortran Include files Pascal include files Lex or Lisp Object files Pascal Ratfor Assembler Yacc .c:sC .C:sC++ .f:sF .h:h .i:h .l:sC .o:o .p:sP .r:sF .s:s .y:sC For example, to change the object file suffix to .obj , undefine the Pascal include file suffix, and prevent Fortran files from being scanned for included files, the SUFFIX macro definition could be: SUFFIX = .obj:o .i: .
mkmf(1) mkmf(1) -F template Specify an alternative makefile template path name. The path name can be relative or absolute. -M language Specify an alternative language-specific makefile template. The default language is C and the corresponding program and library makefile templates are C.p and C.l , respectively. mkmf looks for these templates in /usr/ccs/lib/mf or $PROJECT/lib/mf. DIAGNOSTICS Exit status 0 is normal. Exit status 1 indicates an error.
mkmsgs(1) mkmsgs(1) NAME mkmsgs - create message files for use by gettxt() SYNOPSIS mkmsgs [-o] [-i locale] textfile msgfile DESCRIPTION The mkmsgs command takes as input a file of localized text strings and generates a message file that can be accessed by the gettxt (3C) routine. textfile is the name of the file that contains the text strings. msgfile is the name of the output message file. mkmsgs appends the suffix .cat to the message file name.
mkstr(1) mkstr(1) NAME mkstr - extract error messages from C source into a file SYNOPSIS mkstr [-] messagefile prefix file ... DESCRIPTION mkstr examines a C program and creates a file containing error message strings used by the program. Programs with many error diagnostics can be made much smaller by referring to places in the file, and reduce system overhead in running the program.
mkstr(1) mkstr(1) EXTERNAL INFLUENCES Environment Variables LC_CTYPE determines the interpretation of comments and string literals as single- and/or multi-byte characters. If LC_CTYPE is not specified in the environment or is set to the empty string, the value of LANG is used as a default for each unspecified or empty variable. If LANG is not specified or is set to the empty string, a default of "C" (see lang(5)) is used instead of LANG .
mktemp(1) mktemp(1) NAME mktemp - make a name for a temporary file SYNOPSIS mktemp [-c] [-d directory_name ] [-p prefix ] DESCRIPTION mktemp makes a name that is suitable for use as the pathname of a temporary file, and writes that name to the standard output. The name is chosen such that it does not duplicate the name of an existing file. If the -c option is specified, a zero-length file is created with the generated name.
mm(1) mm(1) NAME mm, osdd - print documents formatted with the mm macros SYNOPSIS mm [ options ] [ files ] osdd [ options ] [ files ] DESCRIPTION mm can be used to format and print documents using nroff and the mm text-formatting macro package (see nroff(1)). It has options to specify preprocessing by tbl and/or neqn , (see tbl(1) and neqn(1)), and postprocessing by various terminal-oriented output filters.
mm(1) • mm(1) If you specify an incorrect output terminal type, mm produces (often subtle) unpredictable results. However, if you are redirecting output into a file, use the -T37 option, then use the appropriate terminal filter when actually printing the formatted file. SEE ALSO col(1), env(1), nroff(1), tbl(1), profile(4), term(4), mm(5).
model(1) model(1) NAME model - print hardware model information SYNOPSIS model DESCRIPTION model prints the machine hardware model. Two or more fields may be displayed: computer, model number, and sometimes the clock or an additional model number. Its output is similar to that of uname -m. However, it is recommended that the model command or the getconf command be used to obtain the model name since future model names may not be compatible with uname .
more(1) more(1) NAME more, page - file perusal filter for crt viewing SYNOPSIS more [-n] [-cdefisuvz ] [-n number ] [-p command ] [-t tagstring ] [-x tabs ] [-W option ] [+linenumber ] [+/pattern ] [ name ... ] page [-n] [-cdefisuvz ] [-n number ] [-p command ] [-t tagstring ] [-x tabs ] [-W option ] [+linenumber ] [+/pattern ] [ name ... ] REMARKS: pg is preferred in some standards and has some added functionality, but does not support character highlighting (see pg(1)).
more(1) more(1) -v Do not display nonprinting characters graphically; by default, all non-ASCII and control characters (except , , and ) are displayed visibly in the form ˆX for , or M-x for non-ASCII character x. -z Same as not specifying -v , with the exception of displaying as ˆH , as ˆM, and as ˆI. -p command Execute the more command initially in the command argument for each file examined.
more(1) more(1) If the standard output is not a terminal device, more always exits when it reaches end-of-file on the last file in its argument list. Otherwise, for all files but the last, more prompts, with an indication that it has reached the end of file, along with the name of the next file. For the last file specified, or for the standard input if no file is specified, more prompts, indicating end-fo-file, and accept additional commands.
more(1) more(1) if i ib i q Q :q :Q ZZ = :f Move forward i lines, with a default of one screenful. At end-of-file, more will continue with the next file in the list, or exit if the current file is the last file in the list. Move backward i lines, with a default of one screenful. If i is more than the screen size, only the final screenful will be written. Exit from more .
more(1) more(1) :e [file ] E [file ] Examine a new file. If the file argument is not specified, the "current" file (see the :n and :p commands) from the list of files in the command line is re-examined. The filename is subjected to the process of shell word expansions. If file is a # (number sign) character, the previously examined file is re-examined. i :n Examine the next file. If i is specified, examines the i-th next file specified in the command line. i :p Examine the previous file.
more(1) TERM more(1) Determines the name of the terminal type. International Code Set Support Single- and multi-byte character code sets are supported. APPLICATION USAGE When the standard output is not a terminal, none of the filter-modification options is effective. This is based on historical practice. For example, a typical implementation of man pipes its output through more -s to squeeze excess white space for terminal users.
mpsched(1) mpsched(1) NAME mpsched - control the processor or locality domain on which a specific process executes SYNOPSIS mpsched mpsched mpsched mpsched mpsched -h -s -g command [-P policy] [-f] [-T policy] [-l locality-domain-id] [-c spu] command [-q] [-u] [-P policy] [-f] [-l locality-domain-id] [-c spu] {-p pid}... DESCRIPTION mpsched controls the processor (spu), or locality domain (locality-domain-id) on which a process executes.
mpsched(1) mpsched(1) one of the following values. -T policy RR Round robin launch policy. Under this policy, successive child processes are launched in a round robin fashion across the other locality domains in the system relative to creating thread. LL Least loaded launch policy. Under this policy, child processes are launched on the least loaded node in the system at the time of creation. FILL Fill first launch policy.
mt(1) mt(1) NAME mt - magnetic tape manipulating program SYNOPSIS mt [-f tapename ] command [ count ] Obsolescent mt [-t tapename ] command [ count ] DESCRIPTION mt is used to give commands to the tape drive. If tapename is not specified, the environment variable TAPE is used; if TAPE is not defined, the default drive is used. mt winds the tape in the requested direction (forward or backward), stopping after the specified count EOF marks or records are passed. If count is not specified, one is assumed.
mt(1) mt(1) /dev/rmt/0mnb Default tape interface AUTHOR mt was developed by the University of California, Berkeley. SEE ALSO dd(1), mt(7), st(1M).
mv(1) mv(1) NAME mv - move or rename files and directories SYNOPSIS mv [-f-i] [-e extarg] file1 new-file mv [-f-i] [-e extarg] file1 [file2 ...] dest-directory mv [-f-i] [-e extarg] directory1 [ directory2 ... ] dest-directory DESCRIPTION The mv command moves: • One file (file1) to a new or existing file (new-file). • One or more files (file1, [file2, ...]) to an existing directory (dest-directory). • One or more directory subtrees (directory1, [directory2, ...
mv(1) mv(1) If new-file is a new file, it inherits the access control list of file1, altered to reflect any difference in ownership between the two files (see acl(5) and aclv(5)). In JFS file systems, new files created by mv do not inherit their parent directory’s default ACL entries (if any), but instead retain their original ACLs. When moving files from a JFS file system to an HFS file system or vice versa, optional ACL entries are lost.
mv(1) mv(1) AUTHOR mv was developed by AT&T, the University of California, Berkeley and HP. SEE ALSO cp(1), cpio(1), ln(1), rm(1), link(1M), lstat(2), readlink(2), stat(2), symlink(2), symlink(4), acl(5), aclv(5). STANDARDS CONFORMANCE mv: SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
(Notes) (Notes) m Section 1−−576 Hewlett-Packard Company −1− HP-UX 11i Version 1: September 2005