HP-UX Reference Section 1: User Commands (N-Z) HP-UX 11i Version 1, September 2005 Update Volume 2 of 10 Manufacturing Part Number : B2355-90903 Printed In USA E0905 Printed in USA © Copyright 1983-2005 Hewlett-Packard Development Company LP.
Legal Notices The information in this document is subject to change without notice. Warranty The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. U.S. Government License Confidential computer software.
Copyright 1996 Morning Star Technologies, Inc. Copyright 1996 Progressive Systems, Inc. Trademark Notices Intel and Itanium are registered trademarks of Intel Corporation in the US and other countries and are used under license. Java is a US trademark of Sun Microsystems, Inc. Microsoft and MS-DOS are U.S. registered trademarks of Microsoft Corporation. OSF/Motif is a trademark of The Open Group in the US and other countries. UNIX is a registered trademark of The Open Group.
Revision History This document’s printing date and part number indicate its edition. The printing date changes when a new edition is printed. (Minor corrections and updates which are incorporated at reprint do not cause the date to change.) New editions of this manual incorporate all material updated since the previous edition. Part Number Release; Date; Format; Distribution B2355-60127 HP-UX 11i Version 1; September 2005 Update; one volume HTML; http://docs.hp.com and Instant Information.
Typographical Conventions audit (5) An HP-UX manpage. audit is the name and 5 is the section in the HP-UX Reference. On the web and on the Instant Information CD, it may be a hot link to the manpage itself. From the HP-UX command line, you can enter “man audit” or “man 5 audit” to view the manpage. See man (1). Book Title The title of a book. On the web and on the Instant Information CD, it may be a hot link to the book itself. KeyCap The name of a keyboard key.
vi
Preface HP-UX is the Hewlett-Packard Company’s implementation of a UNIX operating system that is compatible with various industry standards. It is based on the System V Release 4 operating system and includes important features from the Fourth Berkeley Software Distribution. The ten volumes of this manual contain the system reference documentation, made up of individual entries called manpages, named for the man command (see man (1)) that displays them on the system.
viii
Volume Two Table of Contents Section 1
Volume Two Table of Contents Section 1
Table of Contents Volumes One and Two Section 1: User Commands Entry Name(Section): name Description intro(1): intro ..................................................... introduction to command utilities and application programs adb(1): adb ........................................................................................................................... absolute debugger adjust(1): adjust ...........................................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description cksum(1): cksum .................................................................................................. print file checksum and sizes clear(1): clear ................................................................................................................ clear terminal screen cmp(1): cmp ...........................................................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description echo: echo (print) arguments .............................................................................................................. see ksh(1) echo: echo (print) arguments ................................................................................................... see sh-bourne(1) echo: echo (print) arguments ......................................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description getconf(1): getconf ........................................................................................ get POSIX configuration values getopt(1): getopt ........................................................................................................ parse command options getopts(1): getopts ........................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description lastcomm(1): lastcomm ........................................................... show last commands executed in reverse order lc: list contents of directories ................................................................................................................. see ls(1) ld(1): ld ............................................................................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description mv(1): mv .................................................................................................. move or rename files and directories neqn(1): neqn ............................................................................................. format mathematical text for nroff netstat(1): netstat .........................................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description pdcreate(1): pdcreate ..................................................................................................... creates print objects pddelete(1): pddelete ..................................................................................................... deletes print objects pddisable(1): pddisable ..........................................
Table of Contents Volumes One and Two Entry Name(Section): name Description return: exit function with return value ................................................................................... see sh-bourne(1) return: shell function return to invoking script .................................................................................. see ksh(1) return: shell function return to invoking script ..........................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description strip(1): strip .................................................... strip symbol and line number information from an object file stty(1): stty ................................................................................................ set the options for a terminal port sum(1): sum ........................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description uncompact: compact and uncompact, and cat, files using Huffman code ................................... see compact(1) uncompress: expand compressed data ...................................................................................... see compress(1) uncompressdir: expand compressed files in a directory ........................................................... see compress(1) unexpand: convert spaces to tabs ................
Table of Contents Volumes One and Two Entry Name(Section): name Description xstr(1): xstr ...................................................... extract strings from C programs to implement shared strings yes(1): yes ................................................................................................................ be repetitively affirmative ypcat(1): ypcat .....................................................................
Notes xx Hewlett-Packard Company HP-UX 11i Version 1: September 2005
Section 1 Part 2 User Commands N-Z
Section 1 Part 2 User Commands N-Z
nadb(1) nadb(1) NAME nadb - absolute debugger SYNOPSIS nadb nadb nadb nadb nadb nadb [-h] [-n-o ] [-w ] [-I path] kernelfile memfile [-n-o ] [-w ] [-I path] kernelfile crashdir [-n-o ] [-w ] [-I path] crashdir [-n-o ] [-w ] [-I path] [objfile] [corefile] [-n-o ] [-w ] [-I path] -P pid [execfile] DESCRIPTION The nadb command executes a general-purpose debugging program that is sensitive to the underlying architecture of the processor and operating system on which it runs.
nadb(1) nadb(1) -P pid Adopt process with process ID pid as a ‘‘traced’’ process; see ttrace(2). This option is helpful for debugging processes that were not originally run under the control of nadb . -w This option must be specified to enable the file write commands of nadb . Objfile is opened for reading and writing. It also enables writes to memfile if it is a kernel memory file.
nadb(1) nadb(1) d t e s m The data segment size. The text segment size. The entry point. The stack segment size. The ‘‘magic’’ number as defined in On entry, b, d, and t are set from the headers in the current memory file. If the current memory file does not appear to be valid these values are set from the current object file. e is set from the current object file. Note: These are set only from core files and object files. The following primaries are supported only in the normal mode: $.
nadb(1) nadb(1) In backward compatibility mode: • Variable commands File commands These commands operate on the current object file or the current memory file and are used to read, write, etc. file_selector [ modifier] [ ,size | index] [arglist] The file_selector can be one of these: ? / = The selected file is the current object file. The selected file is the current memory file. This special symbol is only used for printing the value of dot .
nadb(1) nadb(1) Keyword Commands Run the Keyword Command Form using the traditional command form by prefixing the command with $. Please refer to Keyword Form Commands for the complete list of keyword commands. Process Commands These commands deal with managing subprocesses. nadb can run an object file as a subprocess Also, it can adopt a subprocess given its pid. nadb can debug multi-threaded and/or forked subprocesses. It can also debug mutiple subprocesses at the same time.
nadb(1) nadb(1) z signum [ +s | -s | +r | -r | +d | -d ] Changes signal handling for a specified signum for all the threads of the current subprocess. Disposition can be specified as: +s -s +r -r +d -d Stop subprocess when signum is received. Do not stop subprocess when signum is received. Report when signum is received. Do not report when signum is received. Deliver signum to the target subprocess. Do not deliver signal to the target subprocess.
nadb(1) nadb(1) In backward compatibility mode, variable 9 is saved when the command executes and is restored when it completes. This behavior is deprecated. > filename It sends output to filename, which is created if it does not already exist. >> filename Similar to > except that the output is appended to filename. rp r ra f fd b Print the process ID and register values.
nadb(1) nadb(1) nodenumber argument, change to that node. p traditional_cmd This keyword command takes a traditional command as argument and interprets it. a var value Assign value to nadb variable var. The following commands can run only in backward compatibility mode. newline Print the process ID and register values. M Toggle the address mapping of memfile between the initial map set up or a valid memory file and the default mapping pair which the user can modify with the file action modifier >.
nadb(1) nadb(1) w h l n The size of the object is the size of a machine word of the target processor. m The size of the object is the size of an instruction of the target processor. This will be supported only on processors where this is constant. The size of the object is half the size of a machine word of the target processor. The size of the object is double the size of a machine word of the target processor. The size of the object is the size of a pointer on the target processor.
nadb(1) nadb(1) 2 The object is printed as an unsigned octal number. 4 The object is printed as an unsigned octal number. 2 The object is printed as a signed octal number. 4 The object is printed as a signed octal number. 2 The object is printed as a signed decimal number. 4 The object is printed as a signed decimal number. 2 The object is printed as a unsigned hexadecimal number. 4 The object is printed as a unsigned hexadecimal number.
nadb(1) nadb(1) count Same as that of count of conversion specifier. tabstop Same as that of count of conversion specifier. However it is used only with the t spacing specifier. If no value is mentioned, it is assumed to be 1. spacing specifier character A spacing specifier character can be one of these: t Move to the next tab stop appropriate for tabstop. For example, 8t moves to the next 8space tab stop. r n Print a space. For example: Print a newline character.
nadb(1) nadb(1) SEE ALSO ttrace(2), crt0(3), ctime(3C), end(3C), a.out(4), core(4), signal(5).
neqn(1) neqn(1) NAME neqn - format mathematical text for nroff SYNOPSIS neqn [-d xy ] [-s n ] [-f n ] [-p n ] [ file ... ] Note The output of neqn is very device-dependent. See the "WARNINGS" section. DESCRIPTION neqn is a preprocessor for nroff (see nroff(1)) for typesetting mathematical text on typewriter-like terminals.
neqn(1) neqn(1) Upper and Lower Limits The keywords from and to specify lower and upper limits: Source Text Result lim from {n -> inf } sum from 0 to n x sub i lim n Σx n→∞ 0 i Brackets and Braces Left and right brackets, braces, and such, of proper height are made with left and right : Source Text Result H left [ {x sup 2 + y sup 2} over alpha right ] ˜=˜ 1 A I x 2 +y 2 J ______ A =1 α K Legal characters after left and right are braces, brackets, bars, c and f for ceiling and floor, and "" f
neqn(1) neqn(1) define thing % replacement % defines a new token called thing that is replaced by replacement whenever it appears thereafter. The % can be any character that does not occur in replacement. Other Keywords Keywords such as sum ( ), int (∫), inf (∞), and shorthands such as >= (≥), != (≠), and -> (→) are recognized. Greek letters are spelled out in uppercase or lowercase as desired, as in alpha (α) or GAMMA (Γ). Mathematical words such as sin , cos , and log are made Roman automatically.
netstat(1) netstat(1) NAME netstat - show network status SYNOPSIS netstat [-an ] [-f address-family ] [ system [ core ]] netstat [-Mnrsv ] [-f address-family ] [-p protocol ] [ system [ core ]] netstat [-f address-family ] [-gin ] [-I interface ] [ interval ] [ system [ core ]] DESCRIPTION netstat displays statistics for network interfaces and protocols, as well as the contents of various network-related data structures. The output format varies according to the options selected.
netstat(1) netstat(1) -s Show statistics for all protocols. When this option is used with the -M option, netstat displays multicast routing statistics instead. This option is ignored if the -g, -i, -I , -p or interval option is specified and is invalid if the -r option is specified. -v Show additional routing information. When -v is used with the -r option, netstat also displays the network masks in the route entries. This option only applies to the -r option.
netstat(1) netstat(1) AUTHOR netstat was developed by HP and the University of California, Berkeley. SEE ALSO ifconfig(1M), lanscan(1M), lanadmin(1M), route(1M), inet(3N), inet6(3N), gethostent(3N), getnetent(3N), getaddrinfo(3N). hosts(4), networks(4), protocols(4), services(4), routing(7).
newalias(1) newalias(1) NAME newalias - install new elm aliases for user or system SYNOPSIS newalias [-g] Remarks newalias replaces the former functionality of the elmalias command. DESCRIPTION The newalias command creates new alias database files from an alias text file for use by elm and other programs. For user aliases, this functionality can also be performed from the Alias Menu of the elm program (see elm(1)). Options newalias recognizes the following option: -g Global.
newalias(1) newalias(1) firstname The first name of the person (or group). It is combined with lastname to form the fullname. This field can contain any characters except an unquoted equal sign (=) or an unquoted comma (,). See the Quoting Characters subsection. The only first name under the Personal or Group Aliases subheading below is: John in Smith; John . lastname The last name of the person (or group). It is combined with firstname to form the fullname.
newalias(1) newalias(1) AUTHOR newalias was developed by HP. SEE ALSO elm(1), elmalias(1), mail(1), mailx(1).
newform(1) newform(1) NAME newform - change or reformat a text file SYNOPSIS newform [-i tabspec ] [-o tabspec ] [-l n ] [-b n ] [-e n ] [-c char ] [-p n ] [-a n ] [-f] [-s] [ files ] DESCRIPTION newform reads lines from the named files, or the standard input if no input file is named, and reproduces the lines on the standard output. Lines are reformatted in accordance with command line options in effect.
newform(1) newform(1) processed line. For example, to convert a file with leading digits, one or more tabs, and text on each line, to a file beginning with the text, all tabs after the first expanded to spaces, padded with spaces out to column 72 (or truncated to column 72), and the leading digits placed starting at column 73, the command would be: newform -s -i -l -a -e file-name RETURN VALUE newform returns one of the following values upon completion: 0 No errors encountered. 1 An error occurred.
newgrp(1) newgrp(1) NAME newgrp - switch to a new group SYNOPSIS newgrp [-] [group] DESCRIPTION The newgrp command changes your group ID without changing your user ID and replaces your current shell with a new one. If you specify group, the change is successful if group exists and either your user ID is a member of the new group, or group has a password and you can supply it from the terminal. If you omit group, newgroup changes to the group specified in your entry in the password file, /etc/passwd .
newgrp(1) newgrp(1) SEE ALSO csh(1), ksh(1), login(1), sh-bourne(1), sh-posix(1), group(4), passwd(4), environ(5).
newmail(1) newmail(1) NAME newmail - notify users of new mail in mailboxes SYNOPSIS newmail [-i interval] [-w] [file-spec]... DESCRIPTION The newmail utility monitors your incoming mailbox or specified mail folders. The basic operation is that the program checks the folders each interval seconds (default 60) and lists any new mail that has arrived in any of the mailboxes, indicating the sender’s name, and the subject of the message.
news(1) news(1) NAME news - print news items SYNOPSIS news [-a] [-n] [-s] [ items ] DESCRIPTION news is used to keep the user informed of current events. By convention, these events are described by files in the directory /var/news . When invoked without arguments, news prints the contents of all current files in /var/news , most recent first, with each preceded by an appropriate header. news stores the ‘‘currency’’ time as the modification date of a file named .
nice(1) nice(1) NAME nice - run a command at nondefault priority SYNOPSIS nice [-priority_change] command [command_args] nice [-n priority_change] command [command_args] DESCRIPTION The nice command executes command at a nondefault CPU scheduling priority. (The name is derived from being "nice" to other system users by running large programs at lower priority.
nice(1) nice(1) from a login shell whose current nice value is 20 spawns a subshell with a system nice value of 30. Attempting to use nice --2 ksh from the new shell to spawn another subshell whose system nice value would be 28, is rejected (unless the user has appropriate privileges), even though the resulting system nice value would be less than the priority of the original login shell process.
nis+(1) nis+(1) NAME NIS+, nis - a new version of the network information name service DESCRIPTION NIS+ is a new version of the network information name service. This version differs in several significant ways from version 2, which is referred to as NIS or YP in earlier releases. Specific areas of enhancement include the ability to scale to larger networks, security, and the administration of the service. The man pages for NIS+ are broken up into three basic categories.
nis+(1) nis+(1) Simple Names Simple names consist of a series of labels that are separated by the ‘.’(dot) character. Each label is composed of printable characters from the ISO Latin 1 set. Each label can be of any nonzero length, provided that the fully qualified name is fewer than NIS_MAXNAMELEN octets including the separating dots. (See for the actual value of NIS_MAXNAMELEN in the current release.) Labels that contain special characters (see Grammar) must be quoted.
nis+(1) nis+(1) Name Expansion The NIS+ service only accepts fully qualified names. However, since such names may be unwieldy, the NIS+ commands in section 1 employ a set of standard expansion rules that will attempt to fully qualify a partially qualified name. This expansion is actually done by the NIS+ library function nis_getnames(3N) which generates a list of names using the default NIS+ directory search path or the NIS_PATH environment variable.
nis+(1) nis+(1) tion path set in site-specific tables. Refer to nis_list(3N) for more details. Namespaces The NIS+ service defines two additional disjoint namespaces for its own use. These namespaces are the NIS+ Principal namespace, and the NIS+ Group namespace. The names associated with the group and principal namespaces are syntactically identical to simple names. However, the information they represent cannot be obtained by directly presenting these names to the NIS+ interfaces.
nis+(1) nis+(1) specified for them. This owner field always contains an NIS+ principal name. Group Names Like NIS+ principal names, NIS+ group names take the form: group_name .domain All objects in the NIS+ namespace and all entries in NIS+ tables may optionally have a group owner specified for them. This group owner field, when filled in, always contains the fully qualified NIS+ group name. The NIS+ client library defines several interfaces ( nis_groups(3N)) for dealing with NIS+ groups.
nis+(1) nis+(1) Access rights are interpreted as follows: read This right grants read access to an object. For directory and table objects, having read access on the parent object conveys read access to all of the objects that are direct children of a directory, or entries within a table. modify This right grants modification access to an existing object. Read access is not required for modification. However, in many applications, one will need to read an object before modifying it.
nis+(1) nis+(1) Table Authorization As with directories, additional capabilities are provided for granting access to entries within tables. Rights granted to a client by the access rights field in a table object apply to the table object and all of the entry objects ‘‘contained’’ by that table. If an access right is not granted by the table object, it may be granted by an entry within the table. This holds for all rights except create.
nis+(1) nisinit(1M) nislog(1M) nisping(1M) nispopulate(1M) nisserver (1M) nissetup(1M) nisshowcache(1M) nisstat(1M) nisupdkeys(1M) rpc.nisd(1M) rpc.
nis+(1) nis+(1) nis_modify_entry(3N) nis_name_of(3N) nis_names(3N) nis_next_entry(3N) nis_objects(3N) nis_perror(3N) nis_ping(3N) nis_print_group_entry(3N) nis_print_object(3N) nis_remove (3N) nis_remove_entry(3N) nis_removemember(3N) nis_rmdir(3N) nis_server (3N) nis_servstate(3N) nis_sperrno(3N) nis_sperror(3N) nis_sperror_r(3N) nis_stats(3N) nis_subr(3N) nis_tables(3N) nis_verifygroup(3N) NIS+ Files and Directories nisfiles(4) NIS+ table functions NIS+ subroutines NIS+ namespace functions NIS+ table f
niscat(1) niscat(1) NAME niscat - display NIS+ tables and objects SYNOPSIS niscat [ -AhLMv ] tablename . . . niscat [ -ALMP ] -o name . . . DESCRIPTION In the first synopsis, niscat displays the contents of the NIS+ tables named by tablename. In the second synopsis, it displays the internal representation of the NIS+ objects named by name. Options -A Display the data within the table and all of the data in tables in the initial table’s concatenation path.
niscat(1) niscat(1) Display the directory object for org_dir , which includes information such as the access rights and replica information: niscat -o org_dir EXTERNAL INFLUENCES Environment Variables NIS_PATH If this variable is set and the NIS+ table name is not fully qualified, each directory specified will be searched until the table is found (see nisdefaults(1)). RETURN VALUE niscat returns 0 on success and 1 on failure.
nischgrp(1) nischgrp(1) NAME nischgrp - change the group owner of an NIS+ object SYNOPSIS nischgrp [ -AfLP ] group name . . . DESCRIPTION nischgrp changes the group owner of the NIS+ objects or entries specified by name to the specified NIS+ group. Entries are specified using indexed names (see nismatch(1)). If group is not a fully qualified NIS+ group name, it will be resolved using the directory search path (see nisdefaults(1)).
nischgrp(1) nischgrp(1) NOTES The NIS+ server will check the validity of the group name prior to effecting the modification.
nischmod(1) nischmod(1) NAME nischmod - change access rights on an NIS+ object SYNOPSIS nischmod [ -AfLP ] mode name . . . DESCRIPTION nischmod changes the access rights (mode) of the NIS+ objects or entries specified by name to mode. Entries are specified using indexed names (see nismatch(1)). Only principals with modify access to an object may change its mode. mode has the following form: rights [,rights ] . . . rights has the form: [ who ] op permission [ op permission ] . . .
nischmod(1) nischmod(1) Change the permissions of a linked object: nischmod -L w+mr linkname EXTERNAL INFLUENCES Environment Variables NIS_PATH If this variable is set and the NIS+ name is not fully qualified, each directory specified will be searched until the object is found (see nisdefaults(1)). RETURN VALUE nischmod returns 0 on success and 1 on failure. WARNINGS HP-UX 11i Version 2 is the last HP-UX release on which NIS+ is supported. LDAP is the recommended replacement for NIS+.
nischown(1) nischown(1) NAME nischown - change the owner of an NIS+ object SYNOPSIS nischown [ -AfLP ] owner name . . . DESCRIPTION nischown changes the owner of the NIS+ objects or entries specified by name to owner. Entries are specified using indexed names (see nismatch(1)). If owner is not a fully qualified NIS+ principal name (see nisaddcred(1M)), the default domain (see nisdefaults(1)) will be appended to it.
nischttl(1) nischttl(1) NAME nischttl - change the time to live value of an NIS+ object SYNOPSIS nischttl [ -AfLP ] time name . . . DESCRIPTION nischttl changes the time to live value (ttl ) of the NIS+ objects or entries specified by name to time. Entries are specified using indexed names (see nismatch(1)). The time to live value is used by object caches to expire objects within their cache.
nischttl(1) nischttl(1) SEE ALSO nis+(1), nischgrp(1), nischmod(1), nischown(1), nisdefaults(1), nis_objects(3N). NOTES Setting a high ttl value allows objects to stay persistent in caches for a longer period of time and can improve performance. However, when an object changes, in the worst case, the number of seconds in this attribute must pass before that change is visible to all clients. Setting a ttl value of 0 means that the object should not be cached at all.
nisdefaults(1) nisdefaults(1) NAME nisdefaults - display NIS+ default values SYNOPSIS nisdefaults [ -adghprstv ] DESCRIPTION nisdefaults prints the default values that are returned by calls to the NIS+ local name functions (see nis_local_names(3N)). With no options specified, all defaults will be printed in a verbose format. With options, only that option is displayed in a terse form suitable for shell scripts. See the example below. Options -a Print all defaults in a terse format.
nisdefaults(1) nisdefaults(1) owner= ownername This token specifies that the NIS+ principal ownername should own created objects. The default for this value is the principal who is executing the command. group= groupname This token specifies that the group groupname should be the group owner for created objects. The default is NULL . access= rights This token specifies the set of access rights that are to be granted for created objects.
niserror(1) niserror(1) NAME niserror - display NIS+ error messages SYNOPSIS niserror error-num DESCRIPTION niserror prints the NIS+ error associated with status value error-num on the standard output. It is used by shell scripts to translate NIS+ error numbers that are returned into text messages. EXAMPLES Print the error associated with the error number 20 : niserror 20 Not Found, no such name WARNINGS HP-UX 11i Version 2 is the last HP-UX release on which NIS+ is supported.
nisgrpadm(1) nisgrpadm(1) NAME nisgrpadm - NIS+ group administration command SYNOPSIS nisgrpadm -a | -r | -t ] [ -s ] group principal. . . nisgrpadm -c | -d | -l [ -M ] [ -s ] group DESCRIPTION nisgrpadm is used to administer NIS+ groups. This command administers both groups and the groups’ membership lists. nisgrpadm can create, destroy, or list NIS+ groups. nisgrpadm can be used to administer a group’s membership list.
nisgrpadm(1) nisgrpadm(1) Remove betty from freds_group : nisgrpadm -r freds_group betty.foo.com. EXTERNAL INFLUENCES Environment Variables NIS_PATH If this variable is set and the NIS+ group name is not fully qualified, each directory specified will be searched until the group is found (see nisdefaults(1)). DIAGNOSTICS NIS_SUCCESS On success, this command returns an exit status of 0. NIS_PERMISSION When you do not have the needed access right to change the group, the command returns this error.
nisln(1) nisln(1) NAME nisln - symbolically link NIS+ objects SYNOPSIS nisln [ -L ] [ -D defaults ] name linkname DESCRIPTION The nisln command links an NIS+ object named name to an NIS+ name linkname. If name is an indexed name (see nismatch(1)), the link points to entries within an NIS+ table. Clients wishing to look up information in the name service can use the FOLLOW_LINKS flag to force the client library to follow links to the name they point to.
nisln(1) nisln(1) SEE ALSO nisdefaults(1), nismatch(1), nisrm(1), nistbladm(1), nis_names(3N), nis_tables(3N). NOTES When creating the link, nisln verifies that the linked object exists. Once created, the linked object may be deleted or replaced and the link will not be affected. At that time the link will become invalid and attempts to follow it will return NIS_LINKNAMEERROR to the client.
nisls(1) nisls(1) NAME nisls - list the contents of an NIS+ directory SYNOPSIS nisls [ -dglLmMR ] [ name . . . ] DESCRIPTION For each name that is an NIS+ directory, nisls lists the contents of the directory. For each name that is an NIS+ object other than a directory, nisls simply echos the name. If no name is specified, the first directory in the search path (see nisdefaults(1)) is listed. Options -d Treat NIS+ directories like other NIS+ objects, rather than listing their contents.
nismatch(1) nismatch(1) NAME nismatch, nisgrep - utilities for searching NIS+ tables SYNOPSIS nismatch nismatch nismatch nisgrep [ nisgrep [ [ -AchMoPv ] key tablename [ -AchMoPv ] colname=key. . . tablename [ -AchMoPv ] indexedname -AchMov ] keypat tablename -AchMov ] colname=keypat. . . tablename DESCRIPTION nismatch and nisgrep can be used to search NIS+ tables.
nismatch(1) nismatch(1) nisgrep ’shell=[ck]sh’ passwd.org_dir.zotz.com. EXTERNAL INFLUENCES Environment Variables NIS_PATH If this variable is set and the NIS+ table name is not fully qualified, each directory specified will be searched until the table is found (see nisdefaults(1)). DIAGNOSTICS No memory An attempt to allocate some memory for the search failed. tablename is not a table The object with the name tablename was not a table object.
nismkdir(1) nismkdir(1) NAME nismkdir - create NIS+ directories SYNOPSIS nismkdir [ -D defaults ] [ -m hostname | -s hostname ] dirname DESCRIPTION The nismkdir command creates new NIS+ subdirectories within an existing domain. It can also be used to create replicated directories. Without options, this command will create a subdirectory with the same master and the replicas as its parent directory.
nismkdir(1) nismkdir(1) Environment Variables NIS_DEFAULTS This variable contains a defaults string that will override the NIS+ standard defaults. If the -D switch is used, those values will then override both the NIS_DEFAULTS variable and the standard defaults. NIS_PATH If this variable is set and the NIS+ directory name is not fully qualified, each directory specified will be searched until the directory is found (see nisdefaults(1)).
nispasswd(1) nispasswd(1) NAME nispasswd - change NIS+ password information SYNOPSIS [ -ghs ] [ -D domainname ] [ username ] nispasswd nispasswd nispasswd nispasswd -a -D domainname ] [ -d [ username ] ] [ -l ] [ -f ] [ -n min ] [ -x max ] [ -w warn ] [ -D domainname ] username DESCRIPTION nispasswd changes a password, gecos (finger) field (-goption), home directory (-hoption), or login shell (-soption) associated with the username (invoker by default) in the NIS+ passwd table.
nispasswd(1) nispasswd(1) mm/dd/yy The date password was last changed for username. (Note that all password aging dates are determined using Greenwich Mean Time and, therefore, may differ by as much as a day in other time zones.) min The minimum number of days required between password changes for username. max The maximum number of days the password is valid for username. warn The number of days relative to max before the password expires that the username will be warned.
nispasswd(1) nispasswd(1) AUTHOR nispasswd was developed by Sun Microsystems, Inc. SEE ALSO keylogin(1), login(1), nis+(1), nistbladm(1), passwd(1), domainname(1), getpwent(3C), nsswitch.conf(4), passwd(4). NOTES The login program, file access display programs (for example, ’ls -l’) and network programs that require user passwords (for example, rlogin(1), ftp(1), etc.) use the standard getpwent(3C) interface to get password information.
nisrm(1) nisrm(1) NAME nisrm - remove NIS+ objects from the namespace SYNOPSIS nisrm [ -if ] name . . . DESCRIPTION The nisrm command removes NIS+ objects named name from the NIS+ namespace. This command will fail if the NIS+ master server is not running. Options -i Interactive mode. Like the system rm(1) command, the nisrm command will ask for confirmation prior to removing an object. If the name specified by name is a non-fully qualified name, this option is forced on.
nisrmdir(1) nisrmdir(1) NAME nisrmdir - remove NIS+ directories SYNOPSIS nisrmdir [ -if ] [ -s hostname ] dirname DESCRIPTION nisrmdir deletes existing NIS+ subdirectories. It can remove a directory outright, or simply remove replicas from serving a directory. This command modifies the object that describes the directory dirname, and then notifies each replica to remove the directory named dirname.
nistbladm(1) nistbladm(1) NAME nistbladm - NIS+ table administration command SYNOPSIS nistbladm -a | -A [ -D defaults ] colname=value . . . tablename nistbladm -a | -A [ -D defaults ] indexedname nistbladm -c [ -D defaults ] [ -p path ] [ -s sep ] type colname=[flags][,access] . . . tablename nistbladm nistbladm nistbladm nistbladm nistbladm nistbladm -d tablename -e | -E colname=value . . . indexedname -m colname=value . . . indexedname -r | -R [ colname=value . . .
nistbladm(1) nistbladm(1) the add, the uppercase ‘A’ specifies that the entry is to be added, even if it already exists. This is analogous to a modify operation on the entry. Create a table named tablename in the namespace. The table that is created must have at least one column and at least one column must be searchable. -c -d tablename Destroy the table named tablename. The table that is being destroyed must be empty. The table’s contents can be deleted with the -R option below.
nistbladm(1) nistbladm(1) names, separated by colons. The names in the path must be fully qualified. -s sep When creating or updating a table, this option specifies the table’s separator character. The separator character is used by niscat(1) when displaying tables on the standard output. Its purpose is to separate column data when the table is in ASCII form. The default value is a space. -t type When updating a table, this option specifies the table’s type string.
nistbladm(1) nistbladm(1) EXTERNAL INFLUENCES Environment Variables NIS_DEFAULTS This variable contains a defaults string that will override the NIS+ standard defaults. If the -D switch is used, those values will then override both the NIS_DEFAULTS variable and the standard defaults. NIS_PATH If this variable is set and the NIS+ table name is not fully qualified, each directory specified will be searched until the table is found (see nisdefaults(1)).
nistest(1) nistest(1) NAME nistest - return the state of the NIS+ namespace using a conditional expression SYNOPSIS nistest [ -ALMP ] [ -a rights | -t type ] object nistest [ -ALMP ] [ -a rights ] indexedname DESCRIPTION nistest provides a way for shell scripts and other programs to test for the existence, type, and access rights of objects and entries. Entries are named using indexed names (see nismatch(1)). Options -A All data.
nistest(1) nistest(1) WARNINGS HP-UX 11i Version 2 is the last HP-UX release on which NIS+ is supported. LDAP is the recommended replacement for NIS+. HP fully supports the industry standard naming services based on LDAP. AUTHOR nistest was developed by Sun Microsystems, Inc. SEE ALSO nis+(1), nischmod(1), nisdefaults(1).
nl(1) nl(1) NAME nl - line numbering filter SYNOPSIS nl [-btype ] [-htype ] [-ftype ] [-p] [-vstart# ] [-iincr ] [-ssep ] [-wwidth ] [-nformat ] [-lnum ] [-ddelim ] [ file ] DESCRIPTION nl reads lines from the named file or the standard input if no file is named and reproduces the lines on the standard output. Lines are numbered on the left in accordance with the command options in effect. nl views the text it reads in terms of logical pages. Line numbering is reset at the start of each logical page.
nl(1) nl(1) appear between the -d and the delimiter characters, however, this restriction is not there for XPG4 compliant nl . To define a backslash as the delimiter, use two backslashes. EXTERNAL INFLUENCES Environment Variables LC_COLLATE determines the collating sequence used in evaluating regular expressions. LC_CTYPE determines the characters matched by character class expressions in regular expressions.
nljust(1) nljust(1) NAME nljust - justify lines, left or right, for printing SYNOPSIS nljust [-acilnt ] [-d digits ] [-e seq ] [-j just ] [-m mode ] [-o order ] [-r margin ] [-w width ] [-x ck ] [ file ... ] DESCRIPTION nljust formats for printing data written in languages with a right-to-left orientation. It is designed to be used with the pr and the lp commands (see pr(1) and lp(1)).
nljust(1) nljust(1) setting. If this option is specified, at least one of the parameters c or k must be given. -r margin Designate a number as the print margin. The print margin is the column where truncation or folding takes place. The print margin determines how many characters appear on a single line and can never exceed the print width. The print margin is relative to the justification.
nm(1) nm(1) NAME nm - print name list of common object file SYNOPSIS /usr/ccs/bin/nm [-ACefghlnNqrsTuUvV] [-d-o-x] [-p-P] [-t format] file ... DESCRIPTION The nm command displays the symbol table of each object file, file. There are three general output formats: the default (neither -p nor -P specified), -p specified, and -P specified. The output formats are described after the "Options" subsection. By default, nm prints the entire name of the symbols listed.
nm(1) nm(1) -r Prefix each output line with the name of the object file or archive, file. Equivalent to -A. -q -s -t format (SOM only) Silence some warning messages. Print the section index instead of the section name (ELF only). Display each numeric value in the specified format. format can be one of: d Display the value and size of a symbol in decimal. This is the default for the default format or the -p format. Equivalent to -d . o x Display the value and size of a symbol in octal.
nm(1) nm(1) name The name of the symbol. value Its value expressed as an offset or an address depending on its storage class. scope The scope of the symbol (external , sdef , static , or undefined ). The sdef scope indicates an external symbol that is flagged as a secondary definition. type The type of the symbol (absolute , arg_ext , code , data , entry , milli_ext , millicode , module , null , oct_dis , plabel , pri_prog , sec_prog , storage , stub , sym_ext , tstor ).
nm(1) nm(1) "%s[%s]:\n", file, object-file EXTERNAL INFLUENCES Environment Variables The following internationalization variables affect the execution of nm : LANG determines the locale category for native language, local customs and coded character set in the absence of LC_ALL or other LC_ * environment variables. If LANG is not specified or is null, it defaults to C (see lang(5)).
nohup(1) nohup(1) NAME nohup - run a command immune to hangups SYNOPSIS nohup command [ arguments ] DESCRIPTION nohup executes command with hangups and quits ignored. If output is not redirected by the user, both standard output and standard error are sent to nohup.out . If nohup.out is not writable in the current directory, output is redirected to $HOME/nohup.out; otherwise, nohup fails. If a file is created, the file’s permission bits will be set to S_IRUSR | S_IWUSR .
nohup(1) 127 nohup(1) An error occurred in the nohup utility or the specified command could not be found Otherwise, the exit status of nohup will be that of the command specified. SEE ALSO chmod(1), nice(1), sh(1), signal(5). STANDARDS CONFORMANCE nohup : SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
nroff(1) nroff(1) NAME nroff - format text SYNOPSIS nroff [ options ] file ... DESCRIPTION nroff is a text formatting program that interprets source text contained in file and prepares it for printing on typewriter-like devices and line printers. If file name is - or not specified, standard input is used as source text.
nroff(1) nroff(1) X 2631 klp lj for a (generic) EBCDIC printer for the Hewlett-Packard 2631 line printer for a (generic) 16-bit character printer having ratio of 2 to 3 in 8-bit and 16-bit character width for Hewlett-Packard PCL3 and newer laser printers. -e Produce equally-spaced words in adjusted lines, using the full resolution of the particular terminal. -h Use output tabs during horizontal spacing to speed output and reduce output character count.
nslookup(1) nslookup(1) NAME nslookup - query name servers interactively SYNOPSIS nslookup [-option ...] nslookup [-option ...] host-to-find [ server ] [- [ server ] ] DESCRIPTION nslookup is a program to query Internet domain name servers. nslookup has been extended to follow the configured name resolution algorithm of the host and to query NIS, as well as, DNS and host tables. Both an interactive and non-interactive mode are available with nslookup .
nslookup(1) nslookup(1) information about domain while server uses the current default server. When server is used while the current name service being pointed to is either NIS or /etc/hosts , then the switch policy will be overridden until a reset is issued. root Changes the default server to the server for the root of the domain name space. Currently, the host ns.nic.ddn.mil is used (this command is a synonym for lserver ns.nic.ddn.mil).
nslookup(1) nslookup(1) IN CHAOS HESIOD ANY the Internet class. the Chaos class. the MIT Athena Hesiod class. wildcard (any of the above). The class specifies the protocol group of the information. (Default = IN) [no]deb [ug] Turn debugging mode on. More information is printed about the packet sent to the server and the resulting answer. (Default = nodebug ) [no]d2 Turn exhaustive debugging mode on. Essentially all fields of every packet are printed.
nslookup(1) nslookup(1) [no]rec [urse ] Tell the name server to query other servers if it does not have the information. (Default = recurse ) ret [ry]=number Set the number of retries to number. When a reply to a request is not received within a certain amount of time (changed with set timeout ), the timeout period is doubled and the request is resent. The retry value controls how many times a request is resent before giving up. (Default = 4) ro[ot]=host Change the name of the root server to host.
nslookup(1) nslookup(1) Refused The name server refused to service the request. Format error The name server found that the request packet was not in the proper format. AUTHOR nslookup was developed by the University of California, Berkeley. FILES /etc/resolv.conf $HOME/.nslookuprc Initial domain name and name server addresses User’s initial options SEE ALSO named(1M), resolver(3N), resolver(4), nsswitch.
nsquery(1) nsquery(1) NAME nsquery - query the Name Service Switch backend libraries SYNOPSIS nsquery lookup_type lookup_query [lookup_policy] DESCRIPTION nsquery is used to find the Name Service that returned the response to a gethostbyname(), gethostbyaddr(), getpwnam() , getpwuid() , getgrnam() , or getgrgid() function call. This application is Name Service Switch aware and follows the lookup policies in /etc/nsswitch.conf.
nsupdate(1) nsupdate(1) NAME nsupdate - Dynamic DNS update utility SYNOPSIS nsupdate [-d] [-v] [filename] DESCRIPTION nsupdate is used to submit Dynamic DNS Update requests as defined in RFC2136 to a name server. This allows resource records to be added or removed from a zone without manually editing the zone file. A single update request can contain requests to add or remove more than one resource record. Zones that are under dynamic control via nsupdate or a DHCP server should not be edited by hand.
nsupdate(1) nsupdate(1) prereq yxdomain domain-name Requires that domain-name exists (has at least one resource record, of any type). prereq nxrrset domain-name class type Requires that no resource record exists of the specified type, class, and domain-name. If class is omitted, IN (Internet) is assumed. prereq yxrrset domain-name class type This requires that a resource record of the specified type, class, and domain-name must exist. If class is omitted, IN (Internet) is assumed.
nsupdate(1) nsupdate(1) SEE ALSO named(1M), RFC2136, RFC1034.
od(1) od(1) NAME od, xd - octal and hexadecimal dump SYNOPSIS od [-v] [-A address_base ] [-j skip ] [-N count ] [-t type_string ] ... [ file ... ] xd [-v] [-A address_base ] [-j skip ] [-N count ] [-t type_string ] ... [ file ... ] Supported Pre-POSIX Usage od [-bcdosx ] [ file ] [ [+] [0x]offset[.] [b] ] xd [-bcdosx ] [ file ] [ [+] [0x]offset[.] [b] ] DESCRIPTION od and xd concatenate one or more input files and write their contents to standard output in a userspecified format.
od(1) od(1) order in which the type specification characters appear. -v Write all input data. Without the -v option, any number of groups of output lines, that would be identical to the immediately preceding group of output lines (except for the byte offsets), are replaced with a line containing only an asterisk (*). file Pathname of one or more input files to be processed. If file is not specified, the standard input is used. Input files can be any file type.
od(1) od(1) • When the number of input bytes used for transformation is set to 1 with the type specifier characters d, o, u, or x, only the least-significant seven bits of each byte are used. • When one or more of the -A, -j , -N , or -t options is specified, an operand starting with the first character as a plus-sign (+) or the first character as numeric is interpreted as a file name. (XPG4 only. Multiple types can be specified by using multiple -bcdox options.
odump(1) odump(1) NAME odump - dump information contained in SOM object files SYNOPSIS odump [-option...] file... DESCRIPTION odump takes one or more 32-bit native code files (object files, shared and archive libraries, executables) and dumps information about them. Note : odump skips non-SOM input files and issues a warning. $ odump -all /usr/lib/pa20_64/libc.sl File is not a SOM, skipping: /usr/lib/pa20_64/libc.sl.
odump(1) V - - - -lststringtable -nclist -octoutput -recover -silent V - - -sldatalinktbl -sldlexporthash V V - - -sldlheader -sldlheaderext V - - -sldlimporthash V - - -sldlplabelhash V - - -sldynamrel V V V - T - -slexportext -slexportlist -slfastbind -slfbdynamrel -slfbhdr -slfbimpexp -slfblibver -slfbmodbound -slhashtbl -slimportlist -slliblist - - - -sllibloadlist V V T - - -sllibsearch -slmodule -slmoduledyn V - - -slmoduleimp - - - -slproclinktbl V V V V
odump(1) odump(1) V - T - - -symver -toolbssmap -toolcompmap -toolsubspmap -unwind -usage -verbose # - - - -verify - - - -verifyall - - - -version Print Versioned symbols Print the linker bss subspace map Print the linker compilation unit map Print the linker subspace map Print the stack unwind table Print the help screen Set verbosity level for tables that follow, 0=default Verify correctness of tables before they are printed Verify correctness of tables that have verify support Print dat
odump(1) 0 1 2 odump(1) LD... LDP.. .DP.. 8 16 80 1 0 2 0 8 17 8 9 5 -1 -1 -1 0 0 0 0 1 -1 1 1 0 $TEXT$ $PRIVATE$ $DEBUG$ AUTHOR odump was developed by HP. SEE ALSO System Tools ld(1) Invoke the link editor Miscellaneous a.
on(1) on(1) NAME on - execute command on remote host with environment similar to local SYNOPSIS on [-i -n] [-d] host [ command [ argument ] ... ] DESCRIPTION on executes a command on a remote host, using an environment similar to that of the invoking user where: host specifies the name of the host on which to execute the command. command specifies the command to execute on host If command is not specified, on starts a shell on host. argument ... is a list of arguments for command.
on(1) on(1) on: standard input (stdin) is not a tty The standard input (stdin) of the on command with the -i option is not a tty device. on server : rexd: message Errors that occur on the server server are propagated back to the client. These messages are documented in the DIAGNOSTICS section of rexd(1M). AUTHOR on was developed by Sun Microsystems, Inc. SEE ALSO exports(4), rexd(1M).
pack(1) pack(1) NAME pack, pcat, unpack - compress and expand files SYNOPSIS pack [-] [-f] name ... pcat name ... unpack name ... DESCRIPTION pack attempts to store the specified files in a compressed form. Wherever possible, each input file name is replaced by a packed file name .z with the same ownership, modes, and access and modification times. The -f option forces packing of name. This is useful for causing an entire directory to be packed even if some of the files do not benefit.
pack(1) pack(1) unpack expands files created by pack . For each file name specified in the command, a search is made for a file called name .z (or just name if name ends in .z ). If this file appears to be a packed file, it is replaced by its expanded version. The new file has the .z suffix stripped from its name, and has the same access modes, access and modification dates, and owner as those of the packed file. unpack returns a value that is the number of files it was unable to unpack.
parstatus(1) parstatus(1) NAME parstatus - display information about a hardware partitionable complex SYNOPSIS parstatus [ -u username -h IPaddress|hostname | -g -h IPaddress|hostname ] parstatus -s [ -u username -h IPaddress|hostname | -g -h IPaddress|hostname ] parstatus -w [ -u username -h IPaddress|hostname] parstatus -X [ -u username -h IPaddress|hostname | -g -h IPaddress|hostname ] parstatus -C|-I [-A] [-M] [ -u username -h IPaddress|hostname | -g -h IPaddress|hostname ] parstatus -B|-P [-M] [ -u
parstatus(1) parstatus(1) username specifies a configured user name on the target partition. If -u username is specified, the command will prompt for the password associated with the username. Note: This command is a Web-Based Enterprise Management (WBEM) Client Application. The -u option accesses the target partition using a Secure Sockets Layer (SSL) connection. If errors are reported, check that the conditions described in the DEPENDENCIES section are satisfied.
parstatus(1) parstatus(1) * * * * * Primary, alternate and secondary boot path settings PDC, IODC version numbers Memory interleaving / local memory settings Cells summary info I/O chassis summary info For Cell: * Details of each cpu on the cell * Details of memory on the cell * Memory interleaving / local memory settings -M Produce a machine readable/parseable output, or restrict the output of the -w option to a partition number.
parstatus(1) parstatus(1) cab0,bay0,chassis1 cab0,bay0,chassis2 cab0,bay0,chassis3 cab0,bay1,chassis0 cab0,bay1,chassis1 cab0,bay1,chassis2 cab0,bay1,chassis3 Active Absent Active Absent Active Absent Inactive yes yes yes yes cab0,cell0 cab0,cell4 cab0,cell6 cab0,cell2 0 2 1 1 Example 2 The following example displays information for all major components that are physically present in the local complex. No action is specified for the command; the default behaviour is to display all.
parstatus(1) parstatus(1) cab0,bay0,chassis0 cab0,bay0,chassis1 cab0,bay0,chassis2 cab0,bay0,chassis3 cab0,bay1,chassis0 cab0,bay1,chassis1 cab0,bay1,chassis2 cab0,bay1,chassis3 [Partition] Par Num Status === ============ 0 Active 1 Active 2 Active Absent Active Absent Active Absent Active Absent Inactive # of Cells ===== 2 3 2 # of I/O Chassis ======== 1 2 1 yes yes yes yes cab0,cell0 cab0,cell4 cab0,cell6 cab0,cell2 Core cell ========== cab0,cell0 cab0,cell6 cab0,cell4 0 2 1 1 Partition Name (f
partition(1) partition(1) NAME partition - display information about the Superdome Command Line Interface SYNOPSIS partition DESCRIPTION This manpage gives a listing and brief description of the commands which are used to manage a Superdome complex. Command parcreate Create a new partition. Description parmodify Modify an existing partition. parstatus Display partition and available resources information for a Superdome complex. parremove Remove an existing partition.
passwd(1) passwd(1) NAME passwd - change login password and associated attributes SYNOPSIS passwd passwd passwd passwd passwd passwd passwd passwd passwd passwd passwd passwd [name] -r -r -r -r -r -r -r -r -r -r -r files [-F file] [name] files [-e [shell] ] [-gh] [name] files -s [-a] files -s [name] files [-d-l] [-f] [-n min] [-w warn] [-x max] name nis [-e [shell] ] [-gh] [name] nisplus [-e [shell] ] [-gh] [-D domain] [name] nisplus -s [-a] nisplus -s [-D domain] [name] nisplus [-l] [-f] [-n min] [-
passwd(1) passwd(1) available using the files repository, and it is not intended for trusted mode. -g Change the gecos information in the password file, which is used by the finger command. The user is prompted for each subfield: name, location, work phone, and home phone. -r repository Specify the repository to which the operation is to be applied. Supported repositories include files , nis , nisplus , and dce . If repository is not specified, the default is files .
passwd(1) passwd(1) A password is no longer usable after a time period known as the password lifetime. After the lifetime passes, the account is locked until it is re-enabled by a system administrator. Once unlocked, the user is forced to change the password before using the account. The -n min and -x max arguments are each represented in units of days. These arguments are rounded up to the nearest week on a standard system.
passwd(1) passwd(1) Therefore, the new dialog resembles: Enter PIN: New password: Re-enter new password: A Smart Card account can be shared among users. If one user modifies the password, other users must use the scsync command to write the new password onto their cards. The scpin command is used to change the Smart Card PIN. SECURITY FEATURES This section applies only to trusted systems. It describes additional capabilities and restrictions.
passwd(1) passwd(1) passwd -r files -f -x 70 -n 7 user2 DEPENDENCIES Pluggable Authentication Modules (PAM) PAM is an Open Group standard for user authentication, password modification, and account validation. In particular, pam_chauthtok() is invoked to perform all functions related to passwd . This includes establishing and changing a password, using passwd options, and displaying error messages.
paste(1) paste(1) NAME paste - merge same lines of several files or subsequent lines of one file SYNOPSIS paste file1 file2 ... paste -d list file1 file2 ... paste -s [-d list ] file1 file2 ... DESCRIPTION In the first two forms, paste concatenates corresponding lines of the given input files file1, file2, etc. It treats each file as a column or columns in a table and pastes them together horizontally (parallel merging).
paste(1) paste(1) ls | paste -d" " List directory in four columns ls | paste - - - Combine pairs of lines into lines paste -s -d"\t\n" file Notes pr -t -m... works similarly, but creates extra blanks, tabs and new-lines for a nice page layout. DIAGNOSTICS too many files Except for the -s option, no more than OPEN_MAX − 3 input files can be specified (see limits(5)). AUTHOR paste was developed by OSF and HP. SEE ALSO cut(1), grep(1), pr(1).
patch(1) patch(1) NAME patch - a program for applying a diff file to an original SYNOPSIS Non-XPG4 version patch [options] orig patchfile [+[ options] orig] patch
patch(1) patch(1) not, patch will ask for confirmation before proceeding. The upshot of all this is that you should be able to say, while in a news interface, the following: | patch -d /usr/src/local/blurfl and patch a file in the blurfl directory directly from the article containing the patch. If the patch file contains more than one patch, patch will try to apply each of them as if they came from separate patch files.
patch(1) patch(1) setting -p or -p0 gives the entire pathname unmodified, -p1 gives u/howard/src/blurfl/blurfl.c without the leading slash, -p4 gives blurfl/blurfl.c and not specifying -p at all just gives you "blurfl.c". Whatever you end up with is looked for either in the current directory, or the directory specified by the -d switch. -r causes the next argument to be interpreted as the reject file name. -R tells patch that this patch was created with the old and new files swapped.
patch(1) patch(1) same problem. Until a suitable interactive interface is added, you should probably do a context diff in these cases to see if the changes made sense. Of course, compiling without errors is a pretty good indication that the patch worked, but not always. patch usually produces the correct results, even when it has to do a lot of guessing.
pathalias(1) pathalias(1) NAME pathalias - electronic address router SYNOPSIS pathalias [-ivcDf ] [-l host ] [-d link ] [-t link ] [ files ] DESCRIPTION pathalias computes the shortest paths and corresponding routes from one host (computer system) to all other known, reachable hosts. pathalias reads host-to-host connectivity information on standard input or in the named files, and writes a list of host-route pairs on the standard output.
pathalias(1) pathalias(1) Some examples: down princeton topaz princeton!(DEDICATED), tilt, %thrash(LOCAL) topaz!(DEMAND+LOW) @rutgers(LOCAL+1) If a link is encountered more than once, the least-cost occurrence dictates the cost and network character. Links are treated as bidirectional but asymmetric: for each link declared in the input, a DEAD reverse link is assumed.
pathalias(1) pathalias(1) Input from compressed (and uncompressed) files can be piped into pathalias with the following script. for i in $*; do case $i in *.Z) echo "file {‘expr $i : ’).
pathalias(1) pathalias(1) -g file Dump graph edges into file in the form host >host for simple connections and host@host for network connections (from hosts to networks only). -s file Dump shortest path tree into file in the form host[@]host[!](cost ), including both connections from hosts to networks and from networks to hosts. This data may be useful for generating lists of one-way connections. BUGS The -i option should be the default. The order of arguments is significant.
pathchk(1) pathchk(1) NAME pathchk - check path names SYNOPSIS pathchk [-p] pathname... DESCRIPTION The pathchk command checks that one or more path names are valid and portable. By default, the pathchk command checks each component of each path name specified by the pathname parameter based on the underlying file system. An error message is written for each path name operand that: • is longer than that allowed by the system. • contains any component longer than that allowed by the system.
pathchk(1) pathchk(1) STANDARDS CONFORMANCE pathchk : XPG4, POSIX.
pax(1) pax(1) NAME pax - extract, write, and list archive files and copy files and directory hierarchies SYNOPSIS Listing Member Files of Archived Files pax [-cdnv ] [-f archive ] [-s replstr ] ... [ pattern ... ] Extracting Archive Files pax -r [-cdiknuvy ] [-f archive ] [-p string ] ... [-s replstr ] ... [ pattern ... ] Writing Archive Files pax -w [-adituvXy ] [-b blocking ] [-f archive ] [-s replstr ] ... [-x format ] [ file ... ] Copying Files pax -r -w [-diklntuvXy ] [-p string ] ...
pax(1) pax(1) -k -l Prevents the pax command from writing over existing files. -n Selects the first archive member that matches each pattern argument. No more than one archive member is matched for each pattern (although members of type directory will still match the file hierarchy rooted at that file). -p string Specifies one or more file characteristics to be retained or discarded on extraction. The string argument consists of the characters a, e, m, o, and p.
pax(1) pax(1) -v Writes information about the process. If neither the -r or -w flags are specified, the -v flag produces a verbose table of contents that resembles the output of ls -l; otherwise, archive-member pathnames are written to standard error. -w -x format Writes files to the standard output in the specified archive format. Specifies the output archive format. The pax command recognizes the following formats: cpio Extended cpio interchange format.
pax(1) pax(1) specified. If an extracted file is a directory, the file hierarchy contained in the directory is also extracted. The extracted files are created relative to the current file hierarchy. The -r flag can be specified with the -c, -d, -f, -n, -s, and -v flags, and a pattern argument. The access and modification times of the extracted files are the same as the archived files. The access permissions of the extracted files remain as archived unless affected by the user’s default file creation mode.
pax(1) pax(1) cpio -icdum < archive pax -r < archive (cd /fromdir;find . -print) | cpio -pdlum /todir pax -rwl /fromdir /todir tar cf archive * pax -w -f archive * tar xfv - < archive pax -rv < archive (cd /fromdir; tar cf - . ) | (cd /todir; tar xf -) pax -rw /fromdir /todir Notes When you use the -i flag (interactively renames files) on files to which there are hard links, pax does not create hard links to the renamed files.
pdclean(1) pdclean(1) (TO BE OBSOLETED) NAME pdclean - removes all jobs from the specified object SYNOPSIS pdclean -h pdclean [-c ObjectClass] [ -m "MessageText" ] [ -x "AttributeValuePairs" ] [-X AttributesFileName] { ServerName ... | [ServerName :]PrinterName ... | [ServerName :]QueueName ... } DESCRIPTION Use this administrative command, pdclean , to remove all jobs from the specified servers, logical printers, queues, or physical printers.
pdclean(1) pdclean(1) (TO BE OBSOLETED) message=" MessageText" Specify the message you want associated with the printer , queue , or server . You can use this message to indicate the reason why the printer , queue , or server is being cleaned or to provide other comments. You can list this message by specifying requested-attributes=message with the pdls command. Arguments Use the argument to specify the printer, queue, or server to clean.
pdcreate(1) pdcreate(1) (TO BE OBSOLETED) NAME pdcreate - creates print objects SYNOPSIS pdcreate -h pdcreate [-c ObjectClass] [-g] [ -m "MessageText" ] [-r RequestedAttributes] [-s StyleName] [ -x "AttributeValuePairs" ] [-X AttributesFileName] { ServerName :InitialValueDocumentName ... | ServerName :InitialValueJobName ... | ServerName :PrinterName ... | ServerName :QueueName ...
pdcreate(1) pdcreate(1) (TO BE OBSOLETED) -m "MessageText" Specify the message that is to be associated with the ObjectClass that is being created. You may indicate the reason for creating the ObjectClass or provide other comments. You can list this message by specifying requested -attributes= message with the pdls command. This option is equivalent to specifying the command-attribute message . -r RequestedAttributes Specify the attribute values you want displayed for the specified objects.
pdcreate(1) pdcreate(1) (TO BE OBSOLETED) style= StyleName Specify the presentation format that you want for the displayed output. StyleName can be: column (default) line Object Attributes You can specify these attributes in a -x "AttributeValuePairs" string or in an attributes file designated with the -X AttributesFileName option. You can specify any settable or specifiable attribute with the pdcreate command. You can specify an attribute only when creating the object.
pdcreate(1) pdcreate(1) (TO BE OBSOLETED) delivery-address=dave@cowboy locale=C}" SPOOL1:QUEUE1 SEE ALSO pdclean(1), pddelete(1), pddisable(1), pdenable(1), pdls(1), pdmod(1), pdpause(1), pdpr(1), pdpromote(1), pdq(1), pdresubmit(1), pdresume(1), pdrm(1), pdset(1), pdshutdown(1), pd_att(5). To view information about all supported attributes, see manpage pd_att(5). It contains a list of files by object from which you can select the attribute listing that you want.
pddelete(1) pddelete(1) (TO BE OBSOLETED) NAME pddelete - deletes print objects SYNOPSIS pddelete -h pddelete [ -c ObjectClass ] [ -m "MessageText" ] [ -x "AttributeValuePairs" ] [ -X AttributesFileName ] { ServerName ... | ServerName :InitialValueDocumentName ... | ServerName :InitialValueJobName ... | [ ServerName : ]PrinterName ... | [ ServerName : ]QueueName ... } pddelete -c job [ -m "MessageText" ] [ -r JobRetentionPeriod ] [ -x "AttributeValuePairs" ] [ -X AttributesFileName ] LocalJobId ...
pddelete(1) pddelete(1) (TO BE OBSOLETED) -X AttributesFileName The name of a file containing attribute-value pairs you want inserted at the current point in the command line. This option is equivalent to specifying the command-attribute attributes . Command Attributes You may specify these attributes in a -x "AttributeValuePairs" string or in an attributes file designated with the -X AttributesFileName option. attributes= AttributesFileName Cause the designated attributes file to be read.
pddelete(1) pddelete(1) (TO BE OBSOLETED) EXAMPLES Delete a job using a Local ID To delete job 5, enter the command: pddelete -c job 5 Delete Logical Printers To delete logical printers lp11 and lp15, enter the command: pddelete lp11 lp15 Delete an IVO To delete the initial-value-job object, IVJ_2 , from the spooler, DivSPOOL2 , enter the command: pddelete -c initial-value-job DivSPOOL2:IVJ_2 Delete a Server To delete the server SPOOL1, enter the command: pddelete -c server SPOOL1 SEE ALSO pdclea
pddisable(1) pddisable(1) (TO BE OBSOLETED) NAME pddisable - stops printers from accepting jobs and logs from logging SYNOPSIS pddisable -h pddisable [-c ObjectClass] [ -m "MessageText" ] [ -x "AttributeValuePairs" ] [-X AttributesFileName] { ServerName ... | ServerName :LogName ... | [ServerName :]PrinterName ... | [ServerName :]QueueName ... } DESCRIPTION Use this administrative command, pddisable , to stop physical printers or logical printers from accepting jobs, or to stop logs from logging data.
pddisable(1) pddisable(1) (TO BE OBSOLETED) -X AttributesFileName The name of a file containing attribute-value pairs. This option is equivalent to specifying the command-attribute attributes . Command Attributes You may specify these attributes in a -x "AttributeValuePairs" string or in an attributes file designated with the -X AttributesFileName option. attributes= AttributesFileName Cause the designated attributes file to be read.
pddisable(1) pddisable(1) (TO BE OBSOLETED) The server name is not required. To disable the physical printers contained in the supervisor SuprG1 and assign a message to the printers, enter the command: pddisable -c server -m "Unavailable due to testing" SuprG1 To disable the logical printers associated with the queue production-q1 on server spoolera, enter one of the following commands: pddisable -c queue production-q1 pddisable -c queue spoolera:production-q1 Again, the server name is not required.
pdenable(1) pdenable(1) (TO BE OBSOLETED) NAME pdenable - enables printers to accept jobs and logs to log SYNOPSIS pdenable -h pdenable [-c ObjectClass] [-X AttributesFileName] [ -m "MessageText" ] [ -x "AttributeValuePairs" ] { ServerName ... | [ServerName :]LogName ... | [ServerName :]PrinterName ... | [ServerName :]QueueName ... } DESCRIPTION Use this administrative command, pdenable , to enable the logging function of logs or to enable logical printers or physical printers to accept jobs.
pdenable(1) pdenable(1) (TO BE OBSOLETED) Command Attributes You can specify these attributes in a -x "AttributeValuePairs" string or in an attributes file designated with the -X AttributesFileName option. attributes= AttributesFileName Specifies the designated attributes file that HPDPS is to read and insert at the current point in the command line. This file contains attribute and value pairs that HPDPS uses to expand on the command being entered.
pdenable(1) pdenable(1) (TO BE OBSOLETED) Enable Printers To enable logical printers lj4si and lj5si on spooler SPOOL1, enter one of these commands: pdenable pdenable lj4si lj5si SPOOL1:lj4si SPOOL1:lj5si The server name is not required.
pdls(1) pdls(1) (TO BE OBSOLETED) NAME pdls - lists selected attribute values SYNOPSIS pdls [-c ObjectClass] [ -f "FilterCriteria" ] [-F] [-g] [-j] [ -r "RequestedAttributes" ] [-s StyleName] [-U] [ -x "AttributeValuePairs" ] [-X AttributesFileName] [ServerName ... | ServerName :InitialValueDocumentName... | ServerName :InitialValueJobName... | ServerName :LogName... | [ServerName :]PrinterName... | [ServerName :]QueueName... | LocalJobId [.DocNumber ]... | GlobalJobId [.DocNumber ]...
pdls(1) pdls(1) (TO BE OBSOLETED) filter for filter expression details. Using this option is equivalent to specifying the commandattribute filter . -F Turns off all filtering (both specified and default). See the -U option for suppressing only the default. -g Turns off headings. Using this option is equivalent to specifying the command-attribute headings=false. -h Displays a command-specific help message containing information about command syntax and options.
pdls(1) pdls(1) (TO BE OBSOLETED) initial-value-document server filter=" FilterCriteria" Specifies the selection criteria you want used to select a subset from the candidate objects (if you request attribute values for multiple objects). A filter is a logical expression consisting of relations of attributes to attribute values. Among the objects you specify, only objects whose attribute values match the filter expression are returned.
pdls(1) pdls(1) (TO BE OBSOLETED) 4. To evaluate a filter item as false, use the NOT operator before the filter item and enclose the filter item in parentheses. ! NOT operator, as in: ! (filter-item ) If filter-item evaluates to true, the expression is considered false, and vice versa. 5. When you use multiple logical operators in a filter, they are evaluated in an order of precedence. You can override the order of precedence by using parentheses (() ). See Table 2 for order of precedence.
pdls(1) pdls(1) (TO BE OBSOLETED) B copy-count B sides B document-format Initial-Value-Job Attributes B initial-value-job-identifier B associated-server B logical-printers-ready B printer-locations-requested B printer-models-requested job-retention-period Job Attributes B job-client-id (local ID) B job-identifier (global ID) B job-name B current-job-state job-state-reasons B intervening-job (Only returned on the pdls and pdq commands.
pdls(1) pdls(1) (TO BE OBSOLETED) requested -attributes=all requested -attributes=" AttributesList" requested -attributes=archive The following is an example of column style with headings for brief set of attributes for a physical printer object within a specified supervisor.
pdls(1) pdls(1) (TO BE OBSOLETED) • To find the minimum about the second document in a job; if the local ID is 13, enter the command: pdls -c document 13.2 This will provide information only about the second document.
pdls(1) pdls(1) (TO BE OBSOLETED) All of these will return jobs owned by "Jones".
pdls(1) pdls(1) (TO BE OBSOLETED) List Status of All Pending Jobs To list job status of all jobs that have been submitted to the logical printer DepartPrt and that are pending, enter the command: pdls -f "printer-name-requested==DepartPrt && current-job-state==pending" SPOOL1: The following is displayed: Current Job ID Name State ---- ---------- ------------ ---------5 SplX:1114 Trip-report pending Printer Requested --------DepartPrt Printer Assigned --------- List the Brief Attributes of a Logical P
pdls(1) pdls(1) (TO BE OBSOLETED) STANDARDS CONFORMANCE pdls :POSIX 1387.
pdmod(1) pdmod(1) (TO BE OBSOLETED) NAME pdmod - modifies attributes of submitted print jobs SYNOPSIS pdmod -h pdmod [-g] [ -m "MessageText" ] [-n CopyCount] [ -r "RequestedAttributes" ] [-s StyleName] [-t JobName] [ -x "AttributeValuePairs" ] [-X AttributesFileName] LocalJobId ... | GlobalJobId ... DESCRIPTION Use the pdmod command to modify the values of job and document attributes of previously submitted print jobs. You can only modify preprocessing, pending, held, paused, or retained jobs.
pdmod(1) pdmod(1) (TO BE OBSOLETED) You can list this message by specifying requested-attributes=job-message-fromadministrator with the pdls command. This option is equivalent to specifying the commandattribute message . -n CopyCount Specify the number of document copies. A copy count of zero (0) is an error. This option is equivalent to the object-attribute copy-count . -r RequestedAttributes Specify the attribute values that you want to display for the specified objects.
pdmod(1) pdmod(1) (TO BE OBSOLETED) job-hold= Boolean Specify whether you want to put the job in a hold state. Boolean can be true or false (default). job-name= name Specify the new name that you want for the job. Also, you may specify any other settable attributes for the job or document. Note: You can set the value for a settable attribute with either the pdset or pdmod command. Arguments Use the arguments to identify the specific objects that you want to modify.
pdmod(1) pdmod(1) (TO BE OBSOLETED) job-hold=yes 17 SEE ALSO pdclean(1), pdcreate(1), pddelete(1), pddisable(1), pdenable(1), pdls(1), pdpause(1), pdpr(1), pdpromote(1), pdq(1), pdresubmit(1), pdresume(1), pdrm(1), pdset(1), pdshutdown(1) For information about: • Headings, see the pdls command-attribute style . • Requested attributes, the pdls command-attribute, requested-attributes. • Style, see the pdls command-attribute, style . • Job defaulting-hierarchy, see the pdpr command.
pdmsg(1) pdmsg(1) (TO BE OBSOLETED) NAME pdmsg - displays the text and description of an HPDPS message at the command line SYNOPSIS pdmsg [-d] [-t] message-number... DESCRIPTION The pdmsg utility displays the text and description of an HPDPS message at the command line. The pdmsg utility extracts the text and description from the appropriate message catalogs. If you do not specify the -d or -t option, pdmsg displays both the text and the message description.
pdpause(1) pdpause(1) (TO BE OBSOLETED) NAME pdpause - pauses jobs, physical printers, servers, or queues SYNOPSIS pdpause -h [-c ObjectClass] pdpause [-X AttributesFileName] [ -m "MessageText" ] [ -x "AttributeValuePairs" ] { LocalJobId ... | GlobalJobId ... | ServerName ... | [ServerName :]PrinterName ... | [ServerName :]QueueName ... } pdpause -j [ -m "MessageText" ] [ -x "AttributeValuePairs" ] [-X AttributesFileName] [ServerName :]PrinterName ...
pdpause(1) pdpause(1) (TO BE OBSOLETED) If the command operates on a printer or a queue , you can list this message by specifying requested-attributes=message with the pdls command. When the command operates on a job, the specified text becomes the value of the job-messagefrom-administrator attribute. You can list this message by specifying requestedattributes=job-message-from-administrator with the pdls command.
pdpause(1) pdpause(1) (TO BE OBSOLETED) A currently printing job is paused: • The job stops at a "pause" point. Note: A pause point may be the next page, sheet, document, or job boundary depending on the type of printer on which the job is being printed • The job-state changes to paused. • The printer remains available to accept work. • Other jobs can be assigned to the printer. A pending job is paused: The job is prevented from being scheduled but does not affect any printer.
pdpause(1) pdpause(1) (TO BE OBSOLETED) Pause a Currently Printing Job To pause the currently-printing job on printer 3828C, enter the following command: pdpause -j 3828C Pause a Queue To pause the queue Div1Q2, enter the following command: pdpause -c queue Div1Q2 To pause all of the queues in spooler DivSpool1, enter the following command: pdpause -c server DivSpool1 SEE ALSO pdclean(1), pdcreate(1), pddelete(1), pddisable(1), pdenable(1), pdls(1), pdmod(1), pdpr(1), pdpromote(1), pdq(1), pdresubm
pdpr(1) pdpr(1) (TO BE OBSOLETED) NAME pdpr - submits print jobs SYNOPSIS pdpr -h pdpr [-f FileName] [-g] [-l] [-n NumberOfCopies] [-N NotificationMethod] [-p LogicalPrinterName] [-r RequestedAttributes] [-s StyleName] [-t JobName] [ -x "AttributeValuePairs" ] [-X AttributesFileName] [FileName ...] DESCRIPTION Use the pdpr command to submit print jobs to logical printers. Each print job can contain multiple printable documents and any number of print resources.
pdpr(1) pdpr(1) (TO BE OBSOLETED) -n NumberOfCopies Specify the number of document copies you want printed. NumberOfCopies can be either 1 (default) or more copies. If you do not specify the -n option, the copy count defaults to one (1). A copy count of zero (0) is an error. This option is equivalent to specifying the per-document-attribute copy-count . -N NotificationMethod Specify the delivery method that you want used in notification of job events.
pdpr(1) pdpr(1) (TO BE OBSOLETED) Object Attributes There are two types of object attributes for the pdpr command (per-job and per-document) that have some special conditions. However, you can specify any settable or specifiable job or document attribute with the pdpr command. You can only specify settable attributes with the pdset and pdmod commands. Per-Job Attributes Per-job attributes apply to the job as a whole and may occur anywhere in the pdpr command.
pdpr(1) pdpr(1) (TO BE OBSOLETED) Number of Copies To submit the file File1 to the default logical printer and to specify three copies of the print job, enter one of the following commands: pdpr -n 3 File1 pdpr -x copy-count=3 File3 To submit the job to the default logical printer and specify two copies of each file with the -n option, enter one of the following commands: pdpr -n 2 Title Contents Body1 Body2 Append pdpr -x copy-count=2 Title Contents Body1 Body2 Append HPDPS prints two copies of Title,
pdpr(1) pdpr(1) (TO BE OBSOLETED) Job 8 ID sp15:075410002 Name File1 Current State pending Printer Requested LogPrt1 Printers Assigned To submit the file File1 to the default logical printer and receive brief status information without headings, enter one of the following commands: pdpr -g -r brief File1 pdpr -x "headings=no requested-attributes=brief" File1 HPDPS displays information similar to the following about your job: 8 sp15:075410002 File1 pending LogPrt1 Delay Printing of File To sub
pdpr(1) pdpr(1) (TO BE OBSOLETED) Specifying Attributes Files for a Job To submit the file File1 to the default logical printer and specify the attributes file myjob.att , enter the command: pdpr -X myjobs.att File1 To submit the file File5 to the default logical printer and specify the two attributes files (default.att and special.att ), enter the command: pdpr -X default.att -X special.
pdpromote(1) pdpromote(1) (TO BE OBSOLETED) NAME pdpromote - advances a job to the top of a queue SYNOPSIS pdpromote -h pdpromote [ -m "MessageText" ] [ -x "AttributeValuePairs" ] [-X AttributesFileName] LocalJobId ... | GlobalJobId ... DESCRIPTION Use the pdpromote command to move a pending job before any currently-queued jobs. The job becomes the first job in the queue. If another job is then promoted, it becomes the first job in the queue (ahead of the job previously promoted).
pdpromote(1) pdpromote(1) (TO BE OBSOLETED) Arguments Use the arguments to identify the specific objects that you want to promote. You can use the following argument values with the pdpromote command: LocalJobId or GlobalJobId Specify the local or global job identifier of the job that you want to promote. You as an administrator would generally use the global job identifier but you can promote your own jobs using the local job identifier.
pdq(1) pdq(1) (TO BE OBSOLETED) NAME pdq - queries and lists the status of one or more print jobs SYNOPSIS pdq -h pdq [ -f "FilterCriteria" ] [-F] [-g] [-j] [-p LogicalPrinterName] [-r RequestedAttributes] [-s StyleName] [-U] [ -x "AttributeValuePairs" ] [-X AttributesFileName] [LocalJobId[. DocNumber] ... | [GlobalJobId[. DocNumber] ... ] DESCRIPTION Use the pdq command to list the status of some or all of the print jobs that have been submitted to a logical printer.
pdq(1) pdq(1) (TO BE OBSOLETED) line. This options is equivalent to specifying the command attributes attribute . Command Attributes You can specify these attributes in a -x "AttributeValuePairs" string or in an attributes file designated with the -X AttributesFileName option. attributes= AttributesFileName Cause the designated attributes file to be read. filter=" FilterCriteria" Specify the filter selection criteria that you want used if you request attribute values for multiple jobs.
pdq(1) pdq(1) (TO BE OBSOLETED) which will display information similar to the following: Job 13 14 15 8 ID spl4:1104221000 spl4:1105226030 spl4:1133000058 sp15:075410002 Name File1 JobA MyJob File1 State processing pending pending pending Intervening Jobs 0 7 8 LogPrt1 Printer Requested LogPrt4 LogPrt4 LogPrt4 Printers Assigned PhysPrt1 Note: Status information is displayed for all of your jobs in the queue associated with your default logical printer, not just those that were submitted to your def
pdresubmit(1) pdresubmit(1) (TO BE OBSOLETED) NAME pdresubmit - resubmits previously submitted print jobs SYNOPSIS pdresubmit -h pdresubmit [-c ObjectClass] [-g] [-r RequestedAttributes] [-s StyleName] [ -x "AttributeValuePairs" ] [-X AttributesFileName] { LocalJobId ... | GlobalJobId ... | [ServerName :]TargetLogicalPrinterName ... | [ServerName :]PrinterName ... | [ServerName :]QueueName ...
pdresubmit(1) pdresubmit(1) (TO BE OBSOLETED) -X AttributesFileName The name of a file containing attribute-value pairs to be inserted at the current point in the command line. This option is equivalent to specifying the command-attribute attributes . Command Attributes You can specify these attributes in a -x "AttributeValuePairs" string or in an attributes file designated with the -X AttributesFileName option. attributes= AttributesFileName Cause the designated attributes file to be read.
pdresume(1) pdresume(1) (TO BE OBSOLETED) NAME pdresume - enables paused objects to resume operation SYNOPSIS pdresume -h pdresume [-c ObjectClass] [ -m "MessageText" ] | GlobalJobId ... [-X AttributesFileName] { LocalJobId ... | ServerName ... | [ServerName :]PrinterName ... | [ServerName :]QueueName ... } [ -x "AttributeValuePairs" ] DESCRIPTION Use the pdresume command to start up (resume) paused jobs, physical printers, queues, or servers.
pdresume(1) pdresume(1) (TO BE OBSOLETED) command are: printer (default), queue , job , or server . Within the valid classes, printer is a physical printer and server is either a spooler or a supervisor. message=" MessageText" Specify the message that you want associated with the printer , queue , job , or server . You may use this message to indicate the reason for resuming or to provide other comments.
pdresume(1) pdresume(1) (TO BE OBSOLETED) EXAMPLES Resume a Physical Printer To resume physical printer HPLJ6P and issue a message, enter: pdresume -m "Toner refilled" HPLJ6P Resume a Queue To resume the queue Div1Q2, enter: pdresume -c queue Div1Q2 To resume all of the queues in the spooler Mrk-spooler3, enter: pdresume -c server Mrk-spooler3 SEE ALSO pdclean(1), pdcreate(1), pddelete(1), pddisable(1), pdenable(1), pdls(1), pdmod(1), pdpause(1), pdpr(1), pdpromote(1), pdq(1), pdresubmit(1), pdrm(1),
pdrm(1) pdrm(1) (TO BE OBSOLETED) NAME pdrm - removes print jobs SYNOPSIS pdrm -h pdrm [ -m "MessageText" ] [-r JobRetentionPeriod] [-X AttributesFileName] {LocalJobId ... | GlobalJobId ...} [ -x "AttributeValuePairs" ] DESCRIPTION Use the pdrm command to remove (delete) previously submitted print jobs. 1. If the job you specify is currently printing, it can only be removed at a pausable point in the job.
pdrm(1) pdrm(1) (TO BE OBSOLETED) message=" MessageText" Specify the message that you want stored in the job-message-from-administrator attribute. You can use this message to indicate the reason for removing the job or to provide other comments. If the message attribute is not specified, the message already stored with the job remains unchanged. You can list this message by specifying requested-attributes=job-message-fromadministrator with the pdls command.
pdset(1) pdset(1) (TO BE OBSOLETED) NAME pdset - define the attribute values of the specified print object SYNOPSIS pdset -h pdset [-c ObjectClass] [-g] [ -m "MessageText" ] [ -r "RequestedAttributes" ] [-s StyleName] [ -x "AttributeValuePairs" ] [-X AttributesFileName] { ServerName ... | ServerName :InitialValueDocumentName ... | ServerName :InitialValueJobName ... | ServerName :LogName ... | [ServerName :]PrinterName ... | [ServerName :]QueueName ... | LocalJobId ... | GlobalJobId ...
pdset(1) pdset(1) (TO BE OBSOLETED) queue document initial-value-job initial-value-document log Within the valid classes, printer is for a logical printer or a physical printer and server is for a spooler or a supervisor. This option is equivalent to specifying the command-attribute class . -g Turn off headings. headings=false.
pdset(1) pdset(1) (TO BE OBSOLETED) You can use the message to give the reason for the modification or to provide other comments. If you do not specify the message attribute, the message already stored with the object remains unchanged. If the command is for a job , you can list this message by specifying requestedattributes=job-message-from-administrator with the pdls command.
pdset(1) pdset(1) (TO BE OBSOLETED) To set a Message To set the message for server SUPER2, enter: pdset -c server -m "printing system now ok" SUPER2 SEE ALSO pdclean(1), pdcreate(1), pddelete(1), pddisable(1), pdenable(1), pdls(1), pdmod(1), pdpause(1), pdpr(1), pdpromote(1), pdq(1), pdresubmit(1), pdresume(1), pdrm(1), pdset(1), pdshutdown(1) For information about: • Headings, see the pdls command-attribute style . • Style, see the pdls command-attribute, style .
pdshutdown(1) pdshutdown(1) (TO BE OBSOLETED) NAME pdshutdown - stops servers SYNOPSIS pdshutdown -h pdshutdown [-c Server] [ -m "MessageText" ] [ -X AttributesFileName ] ServerName [-w WhenTime ] [ -x "AttributeValuePairs" ] DESCRIPTION Use the pdshutdown command to terminate a server process. A server can be shut down either immediately or after it has finished processing some or all of its current jobs. While a server is shutting down and after it has shut down, the server cannot accept new jobs.
pdshutdown(1) pdshutdown(1) (TO BE OBSOLETED) command line. This option is equivalent to specifying the command-attribute attributes . Command Attributes You may specify these attributes in a -x "AttributeValuePairs" string or in an attributes file designated with the I -X AttributesFileName option. attributes= AttributesFileName Cause the designated attributes file to be read. class= server The only supported class for this command is server .
pg(1) pg(1) NAME pg - file perusal filter for soft-copy terminals SYNOPSIS pg [-number ] [-pstring ] [-cefnrs ] [+linenumber ] [+/ pattern ] [ file ... ] Remarks pg and more are both used in similar situations (see more(1)). Text highlighting features supported by more are not available from pg. However, pg has some useful features not provided by more . DESCRIPTION pg is a text file filter that allows the examination of files one screenful at a time on a soft-copy terminal.
pg(1) pg(1) or line; an unsigned address specifies an address relative to the beginning of the file. Each command has a default address that is used if none is provided. Perusal commands and their defaults are as follows: (+1) or Displays one page. The address is specified in pages. With a relative address, pg simulates scrolling the screen, forward or backward, the number of lines specified. With an absolute address pg prints a screenful beginning at the specified line.
pg(1) pg(1) EXTERNAL INFLUENCES Environment Variables LC_COLLATE determines the collating sequence used in evaluating regular expressions. LC_CTYPE determines the interpretation of text as single and/or multi-byte characters, and the characters matched by character class expressions in regular expressions. LANG determines the language in which messages are displayed.
pipcrm(1) pipcrm(1) NAME pipcrm - remove a POSIX message queue or a POSIX named semaphore SYNOPSIS pipcrm [option]... DESCRIPTION The pipcrm command removes one or more specified POSIX message queue or POSIX named semaphore. Options The identifiers are specified by the following options: -q msqname Unlinks the queue name from the message queue specified by the argument, msqname. If there are no processes with existing open descriptors for the message queue, the queue is destroyed.
pipcs(1) pipcs(1) NAME pipcs - report status of POSIX interprocess communication facilities SYNOPSIS pipcs [-qs ] [-abo ] DESCRIPTION pipcs displays certain information about active POSIX interprocess communication facilities. With no options, pipcs displays information in short format for the POSIX message queues, and POSIX named semaphores that are currently active in the system. Options The following options restrict the display to the corresponding facilities. (none) This is equivalent to -qs .
pipcs(1) pipcs(1) QBYTES The maximum number of bytes allowed in messages outstanding on the associated POSIX message queue. VAL IVAL The current value on the associated POSIX named semaphore. The initial value hold on the associated POSIX named semaphore. WARNINGS pipcs produces only an approximate indication of actual system status because system processes are continually changing while pipcs is acquiring the requested information.
pppd(1) pppd(1) NAME pppd - PPP daemon SYNOPSIS pppd [options... ] DESCRIPTION pppd is a daemon process used in UNIX systems to manage connections to other hosts using PPP (Point to Point Protocol) or SLIP (Serial Line Internet Protocol). It uses the UNIX host’s native serial ports. It communicates with the UNIX kernel’s own TCP/IP implementation via the HP IP tunnel driver (see tun(4)). The functionality supplied by this daemon supersedes that provided by ppl(1) in HP-UX prior to Release 10.30.
pppd(1) pppd(1) 11 Internal timers exec exec-cmd Run ‘exec-cmd up addr args’ when the link comes up, and ‘exec-cmd down addr args’ when it goes down. Addr is the IP address of the peer, and args is the list of arguments given to pppd . nonice Run at a normal user process priority, rather than using the nice() library routine to elevate pppd scheduling priority to -10.
pppd(1) pppd(1) mru mru-size Set LCP Maximum Receive Unit value to mru-size for negotiation. The default is 1500 for PPP and 1006 for SLIP. nomru active passive timeout restart-time Disable LCP Maximum Receive Unit negotiation, and use 1500 for our interface. lqrinterval time Send Link-Quality-Reports or Echo-Requests every time seconds (default 10 seconds).
pppd(1) pppd(1) (class A, B, or C), assuming no subnetting. need-ip-address noipaddress vjcomp Ask the peer to assign us an IP address. novjcomp Disable RFC 1144 ‘VJ’ Van Jacobson TCP header compression (this is the default with SLIP framing, until the peer sends a header-compressed TCP packet). vjslots vj-slots novjcid rfc1172-vj Set the number of VJ compression slots (min 3, max 256, default 16). rfc1172-typo-vj Disable IPCP IP-Address negotiation.
pppd(1) pppd(1) the process ID number of the daemon writing the message. The quantity and verbosity of messages are controlled with the debug option and with the log filter (see ppp.Filter(4)). Each packet that brings up the link (at debug level 1 or more), each packet that matches the log filter (at any debug level), or any packet when the debug level is 7 or more writes a one-line description of the packet to the log file.
pppd(1) pppd(1) fi Then make /etc/ppp/Autostart look like this: #!/bin/sh PATH=/usr/etc:/bin:/usr/bin if [ -f /var/adm/pppd.log ]; then mv /var/adm/pppd.log /var/adm/OLDpppd.log fi echo -n "Starting PPP daemons:" >/dev/console pppd oursystem:backbonesystem auto up (echo -n ’ backbonesystem’) >/dev/console pppd oursystem:theirsystem auto idle 120 (echo -n ’ theirsystem’) >/dev/console echo ’.
pr(1) pr(1) NAME pr - print files SYNOPSIS pr [options] [files] DESCRIPTION The pr command prints the named files on the standard output. If file is -, or if no files are specified, the standard input is assumed. By default, the listing is separated into pages, each headed by the page number, a date and time, and the name of the file. By default, columns are of equal width, separated by at least one space; lines that do not fit are truncated.
pr(1) pr(1) -f -r -t Same as -F. Provided for backwards compatibility. -sc Separate columns by the single character c instead of by the appropriate number of spaces (default for c is a tab). Print no diagnostic reports on failure to open files. Print neither the five-line identifying header nor the five-line trailer normally supplied for each page. Quit printing after the last line of each file without spacing to the end of the page.
praliases(1) praliases(1) NAME praliases - print system-wide sendmail aliases SYNOPSIS praliases [ -f file ] [ key ... ] DESCRIPTION praliases prints out the contents of the alias data base used by sendmail to resolve system-wide mail aliases. The alias data base is built with the command newaliases or /usr/sbin/sendmail -bi . See sendmail(1M).
prealloc(1) prealloc(1) NAME prealloc - preallocate disk storage SYNOPSIS prealloc name size DESCRIPTION prealloc preallocates at least size bytes of disk space for an ordinary file name, creating the file if name does not already exist. The space is allocated in an implementation-dependent fashion for fast sequential reads and writes of the file.
printenv(1) printenv(1) NAME printenv - print out the environment SYNOPSIS printenv [ name ] DESCRIPTION printenv prints out the values of the variables in the environment. If a name is specified, only its value is printed. RETURN VALUE If a name is specified and it is not defined in the environment, printenv returns 1; otherwise it returns zero. SEE ALSO sh(1), environ(5), csh(1).
printf(1) printf(1) NAME printf - format and print arguments SYNOPSIS printf format [ arg ... ] DESCRIPTION printf writes formatted arguments to the standard output. The arg arguments are formatted under control of the format operand. format is a character string patterned after the formatting conventions of printf(3S), and contains the following types of objects: characters Characters that are not escape sequences or conversion specifications (as described below) are copied to standard output.
printf(1) printf(1) digit string. A null digit string is treated as a zero. conversion characters A conversion character indicates the type of conversion to be applied: d, i, o, u, x, X The integer argument is printed a signed decimal (d or i), unsigned octal (o), unsigned decimal (u), or unsigned hexadecimal notation (x and X). The x conversion uses the numbers and letters 0123456789abcdef, and the X conversion uses the numbers and letters 0123456789ABCDEF.
printf(1) printf(1) International Code Set Support Single- and multi-byte character code sets are supported. RETURN VALUE printf exits with one of the following values: 0 >0 Successful completion; Errors occurred. The exit value is increased by one for each error that occurred up to a maximum of 255.
prmail(1) prmail(1) NAME prmail - print out mail in the incoming mailbox file SYNOPSIS prmail [user ... ] DESCRIPTION prmail prints the mail which waits for you or the specified user in the incoming mailbox file. The mailbox file is not disturbed.
prof(1) prof(1) NAME prof - display profile data SYNOPSIS prof [-tcan ] [-ox ] [-g] [-z] [-h] [-s] [-m mdata ] [ prog ] DESCRIPTION prof interprets a profile file produced by monitor() (see monitor(3C)). The symbol table in the object file prog (a.out by default) is read and correlated with a profile file (mon.out by default).
prof(1) prof(1) Call counts are always recorded precisely, however. Only programs that call exit() (see exit(2)) or return from main cause a profile file to be produced, unless a final call to monitor() is explicitly coded. The use of the cc -p option to invoke profiling imposes a limit of 600 functions that can have call counters established during program execution. For more counters, call monitor() directly. If this limit is exceeded, other data is overwritten and the mon.out file is corrupted.
prs(1) prs(1) NAME prs - print and summarize an SCCS file SYNOPSIS prs [-d dataspec ] [-r[ SID ] ] [-e] [-l] [-c cutoff ] [-a] file ... DESCRIPTION The prs command prints, on the standard output, parts or all of an SCCS file (see sccsfile(4)) in a usersupplied format. If a directory is named, prs behaves as though each file in the directory were specified as a named file, except that non-SCCS files (last component of the path name does not begin with s. ), and unreadable files are silently ignored.
prs(1) prs(1) backslash backspace carriage-return colon \\ \b \r \: form feed new-line single quote tab \f \n \´ \t The default dataspec is: ":Dt:\t:DL:\nMRs:\n:MR:COMMENTS:\n:C:" SCCS File Data Keywords Keyword :Dt: :DL: :Li: :Ld: :Lu: :DT: :I: :R: :L: :B: :S: :D: :Dy: :Dm: :Dd: :T: :Th: :Tm: :Ts: :P: :DS: :DP: :DI: :Dn: :Dx: :Dg: :MR: :C: :UN: :FL: :Y: :MF: :MP: :KF: :KV: :BF: :J: :LK: :Q: :M: :FB: :CB: :Ds: :ND: :FD: :BD: :GB: Data Item Delta information Delta line statistics Lines inserted by D
prs(1) prs(1) :W: :A: :Z: :F: :PN: A form of what(1) string A form of what(1) string what(1) string delimiter SCCS file name SCCS file path name N/A N/A N/A N/A N/A :Z::M:\t:I: :Z::Y: :M: :I::Z: @(#) text text S S S S S * :Dt: = :DT: :I: :D: :T: :P: :DS: :DP: If no option letters (or only -a) are given, prs prints the file name, using the default dataspec, and the -e option; thus, information on all deltas is produced.
prs(1) prs(1) SEE ALSO admin(1), delta(1), get(1), sccshelp(1), sccsfile(4).
ps(1) ps(1) NAME ps - report process status SYNOPSIS ps [-adeflPzx] [-g grplist] [-p proclist] [-R prmgrplist] [-t termlist] [-u uidlist] [-Z pset_list] XPG4 Synopsis ps [-aAcdefHjlPzx ] [-C cmdlist] [-g grplist] [-G gidlist] [-n namelist] [-o format] [-p proclist] [-R prmgrplist] [-s sidlist] [-t termlist] [-u uidlist] [-U uidlist] [-Z pset_list] DESCRIPTION ps prints information about selected processes. Use options to specify which processes to select and what information to print about them.
ps(1) ps(1) The lists used as arguments to the -C, -g, -G, -p, -R, -t, -u, -Z, and -U options can be specified in one of two forms: • A list of identifiers separated from one another by a comma. • A list of identifiers enclosed in quotation marks (") and separated from one another by a comma and/or one or more spaces. Output Format Options Use the following options to control which columns of data are included in the output listing. The options are cumulative.
ps(1) ps(1) Elapsed time of the process. The default heading for this column is ELAPSED . etime flags Flags (octal and additive) associated with the process: 0 1 2 4 10 20 Swapped In core System process Locked in core (e.g., for physical I/O) Being traced by another process Another tracing flag The default heading for this column is F. p intpri The priority of the process as it is stored internally by the kernel. This column is provided for backward compatibility and its use is not encouraged.
ps(1) ps(1) uid user vsz The user ID number of the effective process owner. wchan The event for which the process is waiting or sleeping; if there is none, a hyphen (-) is displayed. The login name of the effective process owner. The size in kilobytes (1024 byte units) of the core image of the process. See column sz, above. Notes ps prints the command name and arguments given at the time of the process was created.
ps(1) ps(1) DEPENDENCIES HP Process Resource Manager The -P and -R options require the optional HP Process Resource Manager (PRM) software to be installed and configured. See prmconfig(1) for a description of how to configure HP PRM, and prmconf(4) for the definition of "process resource group." If HP PRM is not installed and configured and -P or -R is specified, a warning message is displayed and (for -P) hyphens (-) are displayed in the prmid and prmgrp columns.
ptx(1) ptx(1) NAME ptx - permuted index SYNOPSIS ptx [ options ] [ input [ output ] ] DESCRIPTION ptx generates the file output that can be processed with a text formatter to produce a permuted index of file input (standard input and output default). It has three phases: the first does the permutation, generating one line for each keyword in an input line. The keyword is rotated to the front. The permuted file is then sorted (see sort(1) and Environment Variables below).
ptx(1) ptx(1) FILES /usr/lib/eign /usr/bin/sort /usr/share/lib/tmac/tmac.ptx NOTES The mptx macro package is not provided as part of the HP-UX operating system. It is part of the Documenters Work Bench (DWB) software package originally developed by AT&T which has been ported to HP 9000 systems by various third-party software suppliers including Elan Computer Group, Inc. of Mountain View California and others.
pwd(1) pwd(1) NAME pwd - working directory name SYNOPSIS pwd DESCRIPTION pwd prints the path name of the working (current) directory. EXTERNAL INFLUENCES Environment Variables LC_MESSAGES determines the language in which messages are displayed. If LC_MESSAGES is not specified in the environment or is set to the empty string, the value of LANG is used as a default for each unspecified or empty variable.
pwget(1) pwget(1) NAME pwget, grget - get password and group information SYNOPSIS pwget [-n name -u uid ] grget [-n name -g gid ] DESCRIPTION pwget and grget locate and display information from /etc/passwd and /etc/group . The standard output of pwget contains lines of colon-separated password information whose format is the same as that used in the /etc/passwd file (see passwd(4)).
quota(1) quota(1) NAME quota - display disk usage and limits SYNOPSIS quota [-v] [user ... ] DESCRIPTION The quota command displays the disk usage and limits for one or more users. Without the -v option, it displays information only when the usage exceeds the limits. user is a user name or a numeric UID. The default is the login user name. Only users with appropriate privileges can view the limits of other users.
ranlib(1) ranlib(1) NAME ranlib - regenerate archive symbol table SYNOPSIS ranlib archive ... DESCRIPTION ranlib regenerates the symbol tables of the specified archives. It is equivalent to executing ar qs archive on each of the archives. After using the z modifier of ar, the symbol table of an archive must be regenerated before it can be used.
rcp(1) rcp(1) NAME rcp - remote file copy SYNOPSIS Copy Single File rcp [-p] [-S size ] [-R size ] source_file1 dest_file Copy Multiple Files rcp [-p] [-S size ] [-R size ] source_file1 [source_file2]... dest_dir Copy One or More Directory Subtrees rcp [-p] [-S size ] [-R size ] -r source_dir1 [source_dir2]... dest_dir Copy Files and Directory Subtrees rcp [-p] [-S size ] [-R size ] -r file_or_dir1 [file_or_dir2]...
rcp(1) rcp(1) Component parts of file and directory names are described below. If multiple existing files and/or directory subtrees (source_file1, source_file2, ..., etc.) are specified, then the destination must be a directory. Shell file name expansion is allowed on both local and remote systems. Multiple files and directory subtrees can be copied from one or more systems to a single destination directory by using a single command. dest_file This option specifies the name of the destination file.
rcp(1) rcp(1) Constructing File and Directory Names As indicated above, file and directory names contain one, two, or four component parts: user_name Login name to be used for accessing directories and files on remote system. hostname Hostname of remote system where directories and files are located. pathname Absolute directory path name or directory path name relative to the login directory of user user_name. filename Actual name of source or destination file.
rcp(1) rcp(1) rhost2, each expect a different form for the remote target, the command: rcp rhost1:path1 rhost2:path2 rhost3.ruser3:path3 will certainly fail on one of the source systems. Perform such a transfer using two separate commands. DIAGNOSTICS Diagnostics can occur from both the local and remote hosts. Those diagnostics that occur on the local host before the connection is completely established are written to standard error.
rcp(1) rcp(1) Kerberos NAME rcp - remote file copy SYNOPSIS Copy Single File rcp [-k realm ] [-P] [-p] [-S size ] [-R size ] source_file1 dest_file Copy Multiple Files rcp [-k realm ] [-P] [-p] [-S size ] [-R size ] source_file1 [source_file2]... dest_dir Copy One or More Directory Subtrees rcp [-k realm ] [-P] [-p] [-S size ] [-R size ] -r source_dir1 [source_dir2]... dest_dir Copy Files and Directory Subtrees rcp [-k realm ] [-P] [-p] [-S size ] [-R size ] -r file_or_dir1 [file_or_dir2]...
rcp(1) rcp(1) Kerberos file_or_dir name are copied. -k realm Obtain tickets from the remote host in the specified realm instead of the remote host’s default realm as specified in the configuration file krb.realms. -P Disable Kerberos authentication. Only applicable in a secure environment based on Kerberos V5.
rcp(1) rcp(1) Kerberos remsh rhost1 -l ruser1 rcp path1 ruser2@rhost2:path2 Therefore, for a such a transfer to succeed, ruser2 on rhost2 must allow access by ruser1 from rhost1 (see hosts.equiv(4)). WARNINGS The rcp routine is confused by any output generated by commands in a .cshrc file on the remote host (see csh(1)). Copying a file onto itself, for example: rcp path ‘hostname‘:path may produce inconsistent results. The current HP-UX version of rcp simply copies the file over itself.
rcs(1) rcs(1) NAME rcs - change RCS file attributes SYNOPSIS rcs [ options ] file ... DESCRIPTION rcs creates new RCS files or changes attributes of existing ones. An RCS file contains multiple revisions of text, an access list, a change log, descriptive text, and some control attributes. For rcs to work, the user’s login name must be on the access list, except if the access list is empty, if the user is the owner of the file or the superuser, or if the -i option is present.
rcs(1) rcs(1) directory. If the RCS file already exists, an error message is printed. -l[ rev ] Locks the revision with number rev. If a branch is given, the latest revision on that branch is locked. If rev is omitted, the latest revision on the trunk is locked. Locking prevents overlapping changes. A lock is removed with ci or rcs -u (see below). -L Sets locking to strict . Strict locking means that the owner of an RCS file is not exempt from locking for check in.
rcs(1) rcs(1) Set the comment leader to tab * for file vision : rcs -c’tab*’ vision Associate the symbolic name sso/6_0 with revision 38.1 of file vision : rcs -Nsso/6_0:38.1 vision Lock revision 38.1 of file vision,v so that only the locker is permitted to check in (see ci(1)) the next revision of the file. This command prevents two or more people from simultaneously revising the same file and inadvertently overwriting each other’s work. rcs -l38.
rcsdiff(1) rcsdiff(1) NAME rcsdiff - compareRCS revisions SYNOPSIS rcsdiff [-bcefhn ] [-rrev1 ] [-rrev2 ] file ... DESCRIPTION rcsdiff compares two revisions of each given RCS file and creates output very similar to diff (see diff(1)). A file name ending in ,v is an RCS file name, otherwise it is a working file name. rcsdiff derives the working file name from the RCS file name and vice versa, as explained in rcsintro(5). Pairs consisting of both an RCS and a working file name can also be specified.
rcsmerge(1) rcsmerge(1) NAME rcsmerge - merge RCS revisions SYNOPSIS rcsmerge -rrev1 [-r rev2 ] [-p] file DESCRIPTION rcsmerge incorporates the changes between rev1 and rev2 of an RCS file into the corresponding working file. If -p is given, the result is printed on the standard output; otherwise the result overwrites the working file. A file name ending in ,v is an RCS file name; otherwise it is a working file name.
rdist(1) rdist(1) NAME rdist - remote file distribution program SYNOPSIS rdist [ -bhinqvwyMR ] [ -f distfile ] [ -d var =value ] [ -m host ] [ label... ] rdist [ -bhinqvwyMR ] -c name... [ login@]host[:dest ] DESCRIPTION rdist facilitates the maintaining of identical copies of files over multiple hosts. It preserves the owner, group, mode, and modification time of files if possible and can update programs that are executing. -f distfile Specify a distfile for rdist to execute.
rdist(1) rdist(1) -b Binary comparison. Perform a binary comparison and update files if they differ rather than comparing dates and sizes. -M Check that mode, ownership, and group are the same in addition to any other form of comparison that is in effect. This option will cause files to be replaced but will only correct the problem with a directory and print a warning message.
rdist(1) rdist(1) The except_pat command is like the except command except that pattern_list is a list of regular expressions (see ed(1) for details). If one of the patterns matches some string within a file name, that file will be ignored. Note that since the backslash (\) is a quote character, it must be doubled to become part of the regular expression. Variables are expanded in pattern_list but not shell file pattern matching characters. To include a $, it must be escaped with the backslash.
rdist(1) rdist(1) /usr/local/${IMAGEN} -> arpa install /usr/local/lib ; notify ralph ; ${FILES} :: stamp.cory notify root@cory ; AUTHOR rdist was developed by the University of California, Berkeley. FILES distfile /tmp/rdist* Input command file. Temporary file for update lists. SEE ALSO sh(1), csh(1), stat(2) HISTORY rdist appeared in the 4.3 Berkeley Software Distribution. BUGS Source files must reside on the local host where rdist is executed.
read(1) read(1) NAME read - read a line from standard input SYNOPSIS read [-r] var ... DESCRIPTION read reads a single line from standard input. The line is split into fields as when processed by the shell (refer to shells in SEE ALSO); the first field is assigned to the first variable var, the second field to the second variable var, and so forth. If there are more fields than there are specified var operands, the remaining fields and their intervening separators are assigned to the last var.
readmail(1) readmail(1) NAME readmail - read mail from a mail folder or incoming mailbox SYNOPSIS readmail [-ahnp ] [-f folder] [number-listpattern] DESCRIPTION The readmail program displays messages from your incoming mailbox or a specified mail folder. Within the elm mail system (see elm(1) with no operands and optionally the -h or -n option, readmail displays the appropriate headers and the body of the current message.
readmail(1) readmail(1) FILES /var/mail/ loginname $HOME/.elm/readmail Incoming mailbox Temporary file for elm SEE ALSO elm(1), newmail(1), vi(1).
remsh(1) remsh(1) NAME remsh, rexec - execute from a remote shell SYNOPSIS remsh host [-l username ] [-n] command host [-l username ] [-n] command rexec host [-l username ] [-n] command In Kerberos V5 Network Authentication Environments: remsh host [-l username ] [-f|-F] [-k realm ] [-P] [-n] command host [-l username ] [-f|-F ] [-k realm ] [-P ] [-n ] command DESCRIPTION remsh connects to a specified host and executes a specified command.
remsh(1) remsh(1) -k realm Obtain tickets from the remote host in the specified realm instead of the remote host’s default realm as specified in the configuration file krb.realms . -P Disable Kerberos authentication. NOTE: The Kerberos authentication and authorization mechanism and the above Kerberos specific options are not supported in IPv6 enabled systems . If command is not specified, instead of executing a single command, you will be logged in on the remote host using rlogin (see rlogin(1)).
remsh(1) remsh(1) (See remshd(1M) and sh(1)). If your login shell on the remote system is csh, use the following form instead: remsh otherhost -n "sh -c \"command 1>&- 2>&- &\"" RETURN VALUE If remsh fails to set up the secondary socket connection, it returns 2. If it fails in some other way, it returns 1. If it fully succeeds in setting up a connection with remshd , it returns 0 once the remote command has completed.
remsh(1) remsh(1) Kerberos NAME remsh, rexec - execute from a remote shell SYNOPSIS remsh host [-l username ] [-f/F ] [-k realm ] [-P] [-n] command host [-l username ] [-f/F ] [-k realm ] [-P ] [-n ] command rexec host [-l username ] [-n] command DESCRIPTION remsh connects to the specified host and executes the specified command. The host name can be either the official name or an alias as understood by gethostbyname() (see gethostent(3N) and hosts(4)).
remsh(1) remsh(1) Kerberos If a command and the option -n are specified, then standard input is redirected to remsh by /dev/null . If -n is not specified (the default case), remsh reads its standard input and sends the input to the remote command. This is because remsh has no way to determine whether the remote command requires input. This option is useful when running a shell script containing a remsh command, since otherwise remsh may use input not intended for it.
remsh(1) remsh(1) Kerberos DIAGNOSTICS Besides the errors listed below, errors can also be generated by the library functions rcmd() and rresvport() which are used by remsh (see rcmd(3N)). Those errors are preceded by the name of the library function that generated them. remsh can produce the following diagnostic messages: Error! could not retrieve authentication type. Please notify sys admin. There are two authentication mechanisms used by remsh .
rev(1) rev(1) NAME rev - reverse lines of a file SYNOPSIS rev [ file ] ... DESCRIPTION rev copies the named files to the standard output, reversing the order of characters in every line. If no file is specified, the standard input is copied. EXTERNAL INFLUENCES Environment Variables LC_CTYPE determines the interpretation of text as single- and/or multi-byte characters.
remsh(1) remsh(1) NAME remsh, rexec - execute from a remote shell SYNOPSIS remsh host [-l username ] [-n] command host [-l username ] [-n] command rexec host [-l username ] [-n] command DESCRIPTION remsh connects to the specified host and executes the specified command. The host name can be either the official name or an alias as understood by gethostbyname() (see gethostent(3N) and hosts(4)).
remsh(1) remsh(1) EXAMPLES Shell metacharacters that are not quoted are interpreted on the local host; quoted metacharacters are interpreted on the remote host. Thus the command line: remsh otherhost cat remotefile >> localfile appends the remote file remotefile to the local file localfile , while the command line remsh otherhost cat remotefile ">>" otherremotefile appends remotefile to the remote file otherremotefile.
remsh(1) remsh(1) mistake. WARNINGS For security reasons, the /etc/hosts.equiv and .rhosts files should exist, even if empty, and should be readable and writable only by the owner. Note also that all information, including any passwords asked for, is passed unencrypted between the two hosts. If remsh is run with an interactive command it hangs. DEPENDENCIES remsh is the same service as rsh on BSD systems. The name was changed due to a conflict with the existing System V command rsh (restricted shell).
rlog(1) rlog(1) NAME rlog - print log messages and other information on RCS files SYNOPSIS rlog [ options ] file ... DESCRIPTION rlog prints information about RCS files. Files ending in ,v are RCS files; all others are working files. If a working file is given, rlog tries to find the corresponding RCS file first in directory ./RCS , then in the current directory, as explained in rcsintro(5). rlog prints the following information for each RCS file: RCS file name, working file name, head (i.e.
rlog(1) rlog(1) Print the headers plus the log messages of the locked revisions: rlog -L -l RCS/*,v Print complete log information: rlog RCS/*,v Print the header and log messages of all revisions checked in after 1:00am on December 25th, 1991: rlog -d">12/25/92, 1:00" RCS/*,v Print the header and log messages of those revisions that were created between 10:00am and 2:00pm on July 4th, 1992: rlog -d"07/04/92, 10:00 > 92/07/04, 14:00" RCS/*,v DIAGNOSTICS The exit status always refers to the last RCS fil
rlogin(1) rlogin(1) NAME rlogin - remote login SYNOPSIS rlogin rhost [-7] [-8] [-ee] [-l username] rhost [-7] [-8] [-ee] [-l username] In Kerberos V5 Network Authentication Environments rlogin rhost [-7] [-8] [-ee] [-f|-F] [-k realm] [-l username] [-P] rhost [-7] [-8] [-ee] [-f|-F] [-k realm] [-l username] [-P] DESCRIPTION The rlogin command connects your terminal on the local host to the remote host (rhost). rlogin acts as a virtual terminal to the remote system.
rlogin(1) rlogin(1) -ee Set the escape character to e. There is no space separating the option letter and the argument character. To start a line with the escape character, two of the escape characters must be entered. The default escape character is tilde (˜). Some characters may conflict with your terminal configuration, such as ˆS , ˆQ , or backspace. Using one of these as the escape character may not be possible or may cause problems communicating with the remote host (see stty(1) and tty(7)).
rlogin(1) rlogin(1) e ˆY Suspend the rlogin session and return the user to the shell that invoked rlogin . The rlogin job can be resumed with the fg command (see csh(1), ksh(1), and sh-posix(1)). e ˆY suspends only the input process; output from the remote login continues to be displayed.
rlogin(1) rlogin(1) remhost -e! -7 -l guest WARNINGS For security purposes, the /etc/hosts.equiv and .rhosts files should exist, even if they are empty. These files should be readable and writable only by the owner. See hosts.equiv(4) for more information. Note that all the information, including any passwords asked for, is passed unencrypted between the two hosts. In a Kerberos V5 Network Authentication environment, a password is not transmitted across the network, so it will be protected.
rlogin(1) rlogin(1) (Kerberos) NAME rlogin - remote login (Kerberos) SYNOPSIS rlogin rhost [-7] [-8] [-ee] [-f/F ] [-k realm] [-l username] [-P] rhost [-7] [-8] [-ee] [-f/F ] [-k realm] [-l username] [-P] DESCRIPTION The rlogin command connects your terminal on the local host to the remote host (rhost). rlogin acts as a virtual terminal to the remote system. The host name rhost can be either the official name or an alias as listed in the file /etc/hosts (see hosts(4)).
rlogin(1) rlogin(1) (Kerberos) Disable Kerberos authentication. Only applicable in a secure environment based on Kerberos V5. When this option is specified, a password is required and the password is sent across the network in cleartext. To bypass the normal login/password sequence, you can login to a remote host using an equivalent account in a manner similar to remsh . See hosts.equiv(4) for details.
rlogin(1) rlogin(1) (Kerberos) login/tcp: Unknown service rlogin was unable to find the login service listed in the /etc/services database file. There is no entry for you (user ID username ) in /etc/passwd rlogin was unable to find your user ID in the password file. Next Step: Contact your system administrator. system call :... An error occurred when rlogin attempted the indicated system call. See the appropriate manual entry for information about the error. rcmd: connect : Connection refused.
rm(1) rm(1) NAME rm - remove files or directories SYNOPSIS rm [-f-i] [-Rr ] file ... DESCRIPTION The rm command removes the entries for one or more files from a directory. If an entry was the last link to the file, the file is destroyed. Removal of a file requires write and search (execute) permission in its directory, but no permissions on the file itself.
rm(1) rm(1) LC_ALL If set to a non-empty string value, overrides the values of all the other internationalization variables. LC_CTYPE determines the interpretation of file names as single and/or multi-byte characters, the classification of characters as printable, and the characters matched by character class expressions in regular expressions.
rm(1) rm(1) DEPENDENCIES NFS rm does not display a plus sign (+) to indicate the existence of optional access control list entries when asking for confirmation before removing a networked file. SEE ALSO rmdir(1), unlink(2), acl(5). STANDARDS CONFORMANCE rm: SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
rmdel(1) rmdel(1) NAME rmdel - remove a delta from an SCCS file SYNOPSIS rmdel -r SID file ... DESCRIPTION The rmdel command removes the delta specified by the SID from each named SCCS file. The delta to be removed must be the newest (most recent) delta in its branch in the delta chain of each named SCCS file. In addition, the SID specified must not be that of a version being edited for the purpose of making a delta (i.e.
rmdir(1) rmdir(1) NAME rmdir - remove directories SYNOPSIS rmdir [-f|-i] [-p] dir ... DESCRIPTION rmdir removes the directory entry for each dir operand that refers to an empty directory. Directories are removed in the order specified. Consequently, if a directory and a subdirectory of that directory are both specified as arguments, the subdirectory must be specified before the parent directory so that the parent directory will be empty when rmdir tries to remove it.
rmdir(1) rmdir(1) EXAMPLES To remove directories with a prompt for verification: rmdir -i directories To remove as much as possible of a path, type: rmdir -p component1 /component2 /dir SEE ALSO rm(1), rmdir(2), stat(2).
rmnl(1) rmnl(1) NAME rmnl - remove extra new-line characters from file SYNOPSIS rmnl DESCRIPTION rmnl removes all blank lines from a file (except at beginning of file as explained below), and is useful for removing excess white space from files for display on a CRT terminal.
rpcgen(1) rpcgen(1) NAME rpcgen - an RPC protocol compiler SYNOPSIS rpcgen infile rpcgen [ -a ] [ -b ] [ -C ] [ -D name [ = value ] ] [ -i size ] [ -I [ -K seconds ] ] [ -L ] [ -M ] [ -N ] [ -T ] [ -u ] [ -Y pathname ] infile rpcgen [ -c | -h | -l | -m | -t | -Sc | -Ss | -Sm ] [ -o outfile ] [ infile ] rpcgen [ -s nettype ] [ -u ] [ -o outfile ] [ infile ] rpcgen [ -n netid ] [ -u ] [ -o outfile ] [ infile ] DESCRIPTION rpcgen is a tool that generates C code to implement an RPC protocol.
rpcgen(1) rpcgen(1) provided. Providing an undefined data type allows customization of XDR routines. Options -a -b -c -C Generate all files, including sample files. Backward compatibility mode. Generate transport specific RPC code for older versions of the operating system. Compile into XDR routines. Generate header and stub files which can be used with ANSI C compilers. Headers generated with this flag can also be used with C++ programs. -Dname[=value] Define a symbol name.
rpcgen(1) -o outfile rpcgen(1) Specify the name of the output file. If none is specified, standard output is used (-c, -h, -l, -m, -n, -s, -Sc, -Sm, -Ss, and -t modes only). -s nettype Compile into server-side stubs for all the transports belonging to the class nettype. The supported classes are netpath , visible , circuit_n , circuit_v , datagram_n , datagram_v , tcp , and udp (see rpc(3N) for the meanings associated with these classes). This option may be specified more than once.
rtprio(1) rtprio(1) NAME rtprio - execute process with real-time priority SYNOPSIS rtprio rtprio rtprio rtprio priority command [ arguments ] priority -pid -t command [ arguments ] -t -pid DESCRIPTION rtprio executes command with a real-time priority, or changes the real-time priority of currently executing process pid. Real-time priorities range from zero (highest) to 127 (lowest).
rtsched(1) rtsched(1) NAME rtsched - execute process with real-time priority SYNOPSIS rtsched -s scheduler -p priority command [ arguments ] rtsched [ -s scheduler ] -p priority -P pid DESCRIPTION Rtsched executes command with POSIX or HP-UX real-time priority, or changes the real-time priority of currently executing process pid. All POSIX real-time priority processes are of greater scheduling importance than processes with HP-UX real-time or HP-UX timeshare priority.
rtsched(1) rtsched(1) 0 if command is successfully scheduled or if pid’s real-time priority is successfully changed; 1 if command is not executable, pid does not exist, or priority is not within the priority range for the corresponding scheduler; 2 if command (pid) lacks real-time capability, or the invoker’s effective user ID is not a user who has appropriate privileges, or the real or effective user or the real or effective user ID does not match the real or saved user ID of the process being chang
rup(1) rup(1) NAME rup - show host status of local machines (RPC version) SYNOPSIS rup [-h] [-l] [-t] [host ...] DESCRIPTION rup gives a status similar to uptime for remote machines. It broadcasts on the local network and displays the responses it receives. Though the listing is normally in the order responses are received, the order can be changed by using command-line options. The broadcast process takes about two minutes.
ruptime(1) ruptime(1) NAME ruptime - show status of local machines SYNOPSIS ruptime [-a] [-r] [-l] [-t] [-u] DESCRIPTION ruptime outputs a status line for each machine on the local network that is running the rwho daemon. ruptime ’s status lines are formed from packets broadcast once every 3 minutes between rwho daemons (see rwhod(1M)) on each host on the network.
rusers(1) rusers(1) NAME rusers - determine who is logged in on machines on local network SYNOPSIS rusers [-a] [-h] [-i] [-l] [-u] [host ...] DESCRIPTION rusers produces output similar to the "quick" option of who(1), but for remote machines. It broadcasts on the local network and prints the responses it receives. Though the listing is normally in the order that responses are received, the order can be changed by specifying a command-line option. The broadcast process takes about two minutes.
rwho(1) rwho(1) NAME rwho - show who is logged in on local machines SYNOPSIS rwho [-a] DESCRIPTION rwho produces output similar to the output of the HP-UX who command for all machines on the local network that are running the rwho daemon (see who(1) and rwhod(1M)). If rwhod has not received a report from a machine for 11 minutes, rwho assumes the machine is down and rwho does not report users last known to be logged into that machine.
sact(1) sact(1) NAME sact - print current SCCS file editing activity SYNOPSIS sact file ... DESCRIPTION The sact command informs the user of any impending deltas to a named SCCS file. This situation occurs when get -e has been previously executed without a subsequent execution of delta (see delta(1) and get(1)).
samlog_viewer(1) samlog_viewer(1) NAME samlog_viewer - a tool for viewing and saving the SAM logfile SYNOPSIS /usr/sam/bin/samlog_viewer [-s mmddhhmm[ccyy] ] [-e mmddhhmm[ccyy] ] [-l SDVC ] [-u user] [-o ofile] [-t] [-n ] [file] DESCRIPTION The samlog_viewer command enables the viewing of part or all of the SAM logfile (or another file containing data in the same format) at varying levels of detail. This tool is run by SAM whenever the View SAM Log option is chosen.
samlog_viewer(1) samlog_viewer(1) mm Month specified as a two digit number (e.g., 08 ). dd Day specified as a two digit number. hh Hour specified as a two digit number (24-hour clock form). mm Minute specified as a two digit number. cc Century minus one. Must be specified if year is used. yy The last two digits of the desired year. If this is not specified, the current year is used. If no start time is given, the beginning of the log is used as the start time.
samlog_viewer(1) samlog_viewer(1) cat datafile | samlog_viewer -t -o stdin.out Do the same as above, but instead have the data appear on stdout: cat datafile | samlog_viewer -t -o - or cat datafile | samlog_viewer -tn FILES /var/sam/log/samlog /var/sam/log/samlog.old /tmp/LFV_ /tmp/LFV_RUN SAM logfile. Archived version of samlog , created when the logfile is automatically trimmed by SAM when its size becomes too large. Its contents are included in the log entries read by samlog_viewer.
sccs(1) sccs(1) NAME sccs - front-end utility program for SCCS commands SYNOPSIS sccs [-r] [-d rootpath ] [-p dirpath ] command [ options ] [file]... DESCRIPTION The sccs command is a straightforward front end to the various programs comprising the Source Code Control System. It includes the capability of running set-user-id to another user to allow shared access to the SCCS files. sccs reduces the need to explicitly reference the SCCS filenames.
sccs(1) sccs(1) Options The options supplied to the SCCS commands are documented in the corresponding SCCS man pages. The options supplied to the pseudo commands are documented in the above section. All other options preceding command are documented as follows: -r -d rootpath Runs sccs as the real user rather than the effective user sccs is set-user-id to. -p dirpath Specifies the pathname for the SCCS files. The default is the SCCS directory.
sccs(1) sccs(1) RETURN VALUE A successful completion returns 0. On error, sccs exists with a value from or the exit value from the command that was invoked. The only exception is the check pseudo command which returns a non-zero exit status if a file is being edited. SEE ALSO admin(1), cdc(1), comb(1), delta(1), get(1), prs(1), rmdel(1), sact(1), sccsdiff(1), sccshelp(1), unget(1), val(1), vc(1), what(1), sccsfile(4).
sccsdiff(1) sccsdiff(1) NAME sccsdiff - compare two versions of an SCCS file SYNOPSIS sccsdiff -rSID1 -rSID2 [-p] [-sn ] file ... DESCRIPTION The sccsdiff command compares two versions of an SCCS file, and generates the differences between the two versions. Any number of SCCS files may be specified, but arguments apply to all files. -rSID? SID1 and SID2 specify the deltas of an SCCS file that are to be compared. Versions are passed to bdiff in the order given (see bdiff(1)).
sccshelp(1) sccshelp(1) NAME sccshelp - ask for help on SCCS commands SYNOPSIS sccshelp [arg] ... DESCRIPTION The sccshelp command finds information to explain a message from an SCCS command or to explain the use of a SCCS command. Zero or more arguments can be supplied.
sccshelp(1) sccshelp(1) cm3: "missing file arg" You left off the name of the file to be processed. WARNINGS Only SCCS commands currently use sccshelp .
script(1) script(1) NAME script - make typescript of terminal session SYNOPSIS script [-a] [ file ] DESCRIPTION script makes a typescript of everything printed on your terminal. It starts a shell named by the SHELL environment variable, or by default /usr/bin/sh , and silently records a copy of output to your terminal from that shell or its descendents, using a pseudo-terminal device (see pty(7)). All output is written to file, or appended to file if the -a option is given.
sdiff(1) sdiff(1) NAME sdiff - side-by-side difference program SYNOPSIS sdiff [ options ... ] file1 file2 DESCRIPTION sdiff uses the output of diff(1) to produce a side-by-side listing of two files, indicating those lines that are different. Each line of the two files is printed with a blank gutter between them if the lines are identical, a < in the gutter if the line only exists in file1, a > in the gutter if the line only exists in file2, and a | for lines that are different.
sed(1) sed(1) NAME sed - stream text editor SYNOPSIS sed [-n] script [file]... sed [-n] [-e script]... [-f script_file]... [file]... DESCRIPTION sed copies the named text files (standard input default) to the standard output, edited according to a script containing up to 100 commands. Only complete input lines are processed. Any input text at the end of a file that is not terminated by a new-line character is ignored.
sed(1) sed(1) be used to protect initial blanks and tabs against the stripping that is done on every script line. rfile Must terminate the command line, and must be preceded by exactly one blank. wfile Must terminate the command line, and must be preceded by exactly one blank. Each wfile is created before processing begins. There can be at most 10 distinct wfile arguments. sed recognizes the following functions: (1) a\ text Append. Place text on the output before reading next input line.
sed(1) sed(1) (2) w wfile Write. Append the pattern space to wfile. (2) x Exchange the contents of the pattern and hold spaces. (2) y/ string1/string2/ Transform. Replace all occurrences of characters in string1 with the corresponding character in string2. The lengths of string1 and string2 must be equal. (2) ! function Don’t. Apply the function (or group, if function is { ) only to lines not selected by the address or addresses.
sed(1) sed(1) sed -e ’s/abc/xyz/’ -e ’s/lmn/rst/’ file1 >file1.out or sed -e ’s/abc/xyz/’ \ -e ’s/lmn/rst/’ \ file1 >file1.out WARNINGS sed limits command scripts to a total of not more than 100 commands. The hold space is limited to 8192 characters. sed processes only text files. See the glossary for a definition of text files and their limitations. AUTHOR sed was developed by OSF and HP.
send_sound(1) send_sound(1) NAME send_sound - play an audio file SYNOPSIS /opt/audio/bin/send_sound [ -format_switch ] [ -server system ] [ -loop number ] [ -pri priority ] [ -srate rate ] [ -prate rate ] [ -stereo ] DESCRIPTION This command plays an audio file. send_sound is the command used when you double-click an audio file from the HP VUE File Manager. The file begins playing, according to the settings of the Audio Control Panel.
serialize(1) serialize(1) NAME serialize - force target process to run serially with other processes SYNOPSIS serialize command [command_args] serialize [-t] [-p pid] DESCRIPTION The serialize command is used to force the target process to run serially with other processes also marked by this command. The target process can be referred to by pid value, or it can be invoked directly on the command.
serialize(1) serialize(1) AUTHOR serialize was developed by HP.
setacl(1) setacl(1) NAME setacl - modify access control lists (ACLs) for files (JFS File Systems only) SYNOPSIS setacl [-n] -s acl_entries file... setacl [-n] -m|-d acl_entries [-m|-d acl_entries]... setacl [-n] -f acl_file file... file... DESCRIPTION For each file specified, setacl will either replace its entire ACL, including the default ACL on a directory, or it will add, modify, or delete one or more ACL entries, including default entries on directories.
setacl(1) setacl(1) entry is used. -s Set a file’s ACL. All old ACL entries are removed, and replaced with the newly specified ACL. There must be exactly one user entry specified for the owner of the file, exactly one group entry specified for the owning group of the file, and exactly one other entry specified. If the -n option is not specified there must also be exactly one class entry specified.
setacl(1) setacl(1) EXAMPLES To add one ACL entry to file filea , giving user archer read permission only, type: setacl -m user:archer:r-- filea If an entry for user archer already exists, this command will set the permissions in that entry to r-- .
sh(1) sh(1) NAME sh - overview of various system shells SYNOPSIS POSIX Shell: sh [±aefhikmnoprstuvx] [±o option] ... [-c string] [arg ... ] rsh [±aefhikmnoprstuvx] [±o option] ... [-c string] [arg ... ] Bourne Shell: sh [- -acefhiknrstuvx ... ] [ arg ... ] rsh [- -acefhiknrstuvx ... ] [ arg ... ] Korn Shell: ksh [±aefhikmnoprstuvx] [ ± o option ] ... [-c string ] [ arg ... ] rksh [±aefhikmnoprstuvx] [±o option ] ... [-c string ] [ arg ...
sh(1) sh(1) keysh An extension of the standard Korn Shell that uses hierarchical softkey menus and contextsensitive help. To obtain: POSIX Shell Korn Shell C Shell Key Shell Bourne Shell Use the command: /usr/bin/sh ... /usr/bin/ksh ... /usr/bin/csh ... /usr/bin/keysh /usr/old/bin/sh ... These shells can also be the default invocation, depending on the entry in the /etc/passwd file. See also chsh(1).
sh-bourne(1) sh-bourne(1) NAME sh, rsh - Bourne shell, the standard/restricted command programming language SYNOPSIS sh [- -acefhiknrstuvx ... ] [ arg ... ] rsh [- -acefhiknrstuvx ... ] [ arg ... ] DESCRIPTION sh is a command programming language that executes commands read from a terminal or a file. rsh is a restricted version of the standard command interpreter sh ; it is used to set up login names and execution environments whose capabilities are more controlled than those of the standard shell.
sh-bourne(1) ( list ) { list ;} sh-bourne(1) Execute list in a sub-shell. The purpose of using braces is to allow the aggregate output from list to be redirected elsewhere. If redirection is used as in: { list ; } > file a subshell is created to execute list. This implies that any shell variables set, created, or modified within the { } do not retain their values outside the { }. If no redirection is used, a subshell is not created, and shell modifications made within the { } are preserved.
sh-bourne(1) sh-bourne(1) The decimal value returned by the last synchronously executed command. ? $ The process id of the last separately-invoked shell (i.e., a shell arising from direct invocation or #! ). This parameter is not updated for subshells arising from ( ), command substitution, etc. ! LINES COLUMNS The process number of the last background command invoked. The number of lines and columns in the current display area. These parameters are set only under specific circumstances. See Signals.
sh-bourne(1) sh-bourne(1) ... . Prompting When used interactively, the shell prompts with the value of PS1 before reading a command. If at any time a new-line is typed and further input is needed to complete a command, the secondary prompt (i.e., the value of PS2) is issued. Input/Output Before a command is executed, its input and output can be redirected using a special notation interpreted by the shell.
sh-bourne(1) sh-bourne(1) commands. The environment for any simple-command can be augmented by prefixing it with one or more assignments to parameters. Thus: TERM=450 cmd and (export TERM; TERM=450; cmd ) are equivalent (as far as the execution of cmd is concerned). If the -k option is set, all keyword arguments are placed in the environment, even if they occur after the command name.
sh-bourne(1) sh-bourne(1) for file. break [ n ] continue [ n ] Exit from the enclosing for or while loop, if any. If n is specified, break n levels. Resume the next iteration of the enclosing for or while loop. If n is specified, resume at the n-th enclosing loop. cd [ arg ] Change the current directory to arg. The shell parameter HOME is the default arg. The shell parameter CDPATH defines the search path for the directory containing arg. Alternative directory names are separated by a colon (:).
sh-bourne(1) sh-bourne(1) Recognized options are: -a -e -f -h Mark variables which are modified or created for export. Exit immediately if a command exits with a non-zero exit status. Disable file name generation Locate and remember function commands as functions are defined (function commands are normally located when the function is executed). -k All keyword arguments are placed in the environment for a command, not just those that precede the command name.
sh-bourne(1) sh-bourne(1) The options below are interpreted by the shell at invocation (thus they cannot be used with the set command). Unless the -c or -s option is specified, the first non-option argument is assumed to be the name of a file containing commands, and the remaining arguments are passed as positional parameters to that command file. -c string If the -c option is present then commands are read from string.
sh-bourne(1) 0 1 2 3 sh-bourne(1) Success. Built-in command failure (see Special Commands). Syntax error. Signal received that is not trapped. If the shell is non-interactive, it terminates and passes one of the above as its exit status. If it is interactive, it does not terminate, but $? is set to one of the above values. Whenever a child process of the shell dies due to a signal, the shell returns an exit status of 80 hexadecimal plus the number of the signal.
sh-bourne(1) sh-bourne(1) /tmp/sh* SEE ALSO cd(1), echo(1), env(1), login(1), newgrp(1), pwd(1), read(1), test(1), umask(1), acctcms(1M), acctcom(1M), dup(2), exec(2), fork(2), pipe(2), ulimit(2), umask(2), wait(2), a.out(4), profile(4), environ(5), lang(5), regexp(5), signal(5). Bourne Shell tutorial in Shells Users Guide. STANDARDS CONFORMANCE .
sh-posix(1) sh-posix(1) NAME sh, rsh - standard and restricted POSIX.2-conformant command shells SYNOPSIS sh [{-+}aefhikmnprstuvx] [{-+}o option]... [-c string] arg]... rsh [{-+}aefhikmnprstuvx] [{-+}o option]... [-c string] [arg]... Remarks This shell is intended to conform to the shell specification of the POSIX.2 Shell and Utility standards. Check any standards conformance documents shipped with your system for information on the conformance of this shell to any other standards.
sh-posix(1) • • • sh-posix(1) Setting the value of SHELL , ENV , or PATH Specifying path or command names containing / Redirecting output (>, >|, <> , and >> ) The restrictions above are enforced after the .profile and ENV files are interpreted. When a command to be executed is found to be a shell procedure, rsh invokes sh to execute it. Thus, the end-user is provided with shell procedures accessible to the full power of the standard shell, while being restricted to a limited menu of commands.
sh-posix(1) sh-posix(1) is the exit status of the last command in the pipeline. Otherwise, the exit status of the pipeline is the logical negation of the exit status of the last command in the pipeline. A list is a sequence of one or more pipelines separated by ;, &, && , or || , and optionally terminated by ;, &, or |&. ; Causes sequential execution of the preceding pipeline. An arbitrary number of newlines can appear in a list, instead of semicolons, to delimit commands.
sh-posix(1) sh-posix(1) time pipeline Execute the pipeline and print the elapsed time, the user time, and the system time on standard error. Note that the time keyword can appear anywhere in the pipeline to time the entire pipeline. To time a particular command in a pipeline, see time(1). until list ; do list ; done Execute the until list. If the exit status of the last command in the list is nonzero, execute the do list and execute the until list again.
sh-posix(1) sh-posix(1) name =pathname on standard output. With -x, set exported aliases. An exported alias is defined across subshell environments. With name =value omitted, print the list of exported aliases in the form name =value on standard output. Alias returns true unless a name is given for which no alias has been defined. bg [job]... Put the specified jobs into the background. The current job is put in the background if job is unspecified.
sh-posix(1) sh-posix(1) % exit [n] Exit from the shell with the exit status specified by n. If n is omitted, the exit status is that of the last command executed. An end-of-file also causes the shell to exit, except when a shell has the ignoreeof option set. (See the set special command.) %& export [name[=value] ]... %& export -p Mark the given variable names for automatic export to the environment of subsequently executed commands. Optionally, assign values to the variables.
sh-posix(1) sh-posix(1) jobs [-lnp ] [job]... List information about each given job, or all active jobs if job is not specified. With -l, list process IDs in addition to the normal information. With -n, display only jobs that have stopped or exited since last notified. With -p, list only the process group. See the "Jobs" subsection for a description of the format of job. kill [-s signal] process ... kill -l kill [-signal] process ...
sh-posix(1) sh-posix(1) If the given file descriptor is open for writing and is a terminal device, the prompt is placed on that unit. Otherwise, the prompt is issued on file descriptor 2 (standard error). %& readonly [name[=value] ]... %& readonly -p Mark the given names read only. These names cannot be changed by subsequent assignment.
sh-posix(1) sh-posix(1) Same as -a. Run all background jobs at a lower priority. Same as -e. Use a emacs -style inline editor for command entry. Use a gmacs -style inline editor for command entry. Do not exit from the shell on end-of-file (eof as defined by stty ; default is ˆD ). The exit special command must be used. keyword Same as -k. markdirs Append a trailing / to all directory names resulting from file name generation. monitor Same as -m. noclobber Same as -C. noexec Same as -n. noglob Same as -f.
sh-posix(1) sh-posix(1) Trap commands are executed in signal number order. Any attempt to set a trap on a signal that was ignored upon entering the current shell is ineffective. Traps remain in effect for a given shell until explicitly changed with another trap command; that is, a trap set within a function will remain in effect even after the function returns. If arg is - (or if arg is omitted and the first sig is numeric), reset all traps for each sig to their original values.
sh-posix(1) sh-posix(1) typeset + displays the parameter names alone. Specify one or more of the option letters to restrict the list. Some options are incompatible with others. ulimit [-HSacdfnst ] [limit] Set or display a resource limit. The limit for a specified resource is set when limit is specified. The value of limit can be a number in the unit specified with each resource, or the keyword unlimited . The -H and -S flags specify whether the hard limit or the soft limit is set for the given resource.
sh-posix(1) sh-posix(1) additional aliases. If the last character of the alias value is a blank, the word following the alias is also checked for alias substitution. Aliases can be used to redefine special commands, but cannot be used to redefine the keywords listed in the "Compound Commands" subsection. Aliases can be created, listed, and exported with the alias command and can be removed with the unalias command.
sh-posix(1) sh-posix(1) If the -i integer attribute is set for name, the value is subject to arithmetic evaluation. Positional parameters, parameters denoted by a number, can be assigned values with the set special command. Parameter 0 is set from argument zero when the shell is invoked. Use the prefix character $ to specify the value of a parameter for substitution. $parameter ${parameter } ${parameter [subscript ]} Substitute the value of the parameter, if any.
sh-posix(1) sh-posix(1) 1, 2, ... *, @ The positional parameters. # ? $ _ The number of set positional parameters in decimal. ! ERRNO The process number of the last background command invoked. All the set positional parameters, separated by a field separator character. See the "Quoting" subsection. Flags supplied to the shell on invocation or by the set command. The decimal exit status returned by the last executed command. The process number of this shell.
sh-posix(1) sh-posix(1) HISTSIZE If this parameter is set when the shell is invoked, the number of previously entered commands accessible to this shell will be greater than or equal to this number. The default is 128. HOME IFS The default argument (home directory) for the cd command. LANG Internal field separators, normally space, tab, and newline, that are used to separate command words resulting from command or parameter substitution and for separating words with the special command read .
sh-posix(1) sh-posix(1) SHELL The path name of the shell is kept in the environment. When invoked, the shell is restricted if the value of this variable contains an r in the base name. TMOUT If set to a value greater than zero, the shell will terminate if a command is not entered within the prescribed number of seconds after issuing the PS1 prompt. (Note that the shell can be compiled with a maximum bound for this value which cannot be exceeded.
sh-posix(1) sh-posix(1) A variable can be typed as an integer with the -i option of the typeset special command, as in typeset -i[base] name. Arithmetic evaluation is performed on the value of each assignment to a variable with the -i attribute. If you do not specify an arithmetic base, the first assignment to the variable determines the arithmetic base. This base is used when parameter substitution occurs.
sh-posix(1) sh-posix(1) A compound expression can be constructed from these primitives by using any of the following, listed in decreasing order of precedence. (exp ) !exp exp1 && exp2 exp1 || exp2 True, True, True, True, if exp is true. Used to group expressions. if exp is false. if exp1 and exp2 are both true. if either exp1 or exp2 is true. Input/Output Before a command is executed, its input and output can be redirected using a special notation interpreted by the shell.
sh-posix(1) sh-posix(1) coprocess is moved to a numbered file descriptor, another coprocess may be started. If a command is followed by & and job control is inactive, the default standard input for the command is the empty file /dev/null . Otherwise, the environment for the execution of a command contains the file descriptors of the invoking shell as modified by input/output specifications.
sh-posix(1) sh-posix(1) [1] 1234 indicating that job number 1 was started asynchronously and had one (top-level) process whose process ID was 1234. If you are running a job and wish to do something else, you can type the suspend character (the susp character defined with stty ; see stty(1)) to send a SIGSTOP signal to the current job. The shell then indicates that the job has been Stopped , and prints another prompt.
sh-posix(1) sh-posix(1) execute the shell with the shell command file passed down as an open file. A parenthesized command is also executed in a subshell without removing nonexported quantities. Command Reentry The text of the last HISTSIZE (default 128) commands entered from a terminal device is saved in a history file. The file $HOME/.sh_history is used if the HISTFILE variable is not set or writable. A shell can access the commands of all interactive shells that use the same named HISTFILE .
sh-posix(1) ^F M-f ^B M-b ^A ^E ^]char M-ˆ] char ^XˆX erase ^D eof M-d M-ˆH M-h M-ˆ? ^T ^C M-c M-l ^K ^W M-p kill ^Y ^L ^@ M^J ^M ^P ^N M-< M-> ^Rstring ^O M-digits M-letter M-. sh-posix(1) Move cursor forward (right) one character. Move cursor forward one word. (The editor’s idea of a word is a string of characters consisting of only letters, digits and underscores.) Move cursor backward (left) one character. Move cursor backward one word. Move cursor to start of line. Move cursor to end of line.
sh-posix(1) sh-posix(1) rather than the last word. Same as M-. . Attempt file name generation on the current word. File name completion. (meta-escape.) Replaces the current word with the longest common prefix of all file names matching the current word with an asterisk appended. If the match is unique, a / is appended if the file is a directory and a space is appended if the file is not a directory. List files matching current word pattern as if an asterisk were appended.
sh-posix(1) 0 ^ $ sh-posix(1) Cursor to start of line. Cursor to first nonblank character in line. Cursor to end of line. History Search Commands These commands access your command history file. [count]k [count][count]j [count]+ [count]G /string ?string n N Fetch previous command. Each time k is entered, the next earlier command in the history list is accessed. Equivalent to k. Fetch next command. Each time j is entered, the next later command in the history list is accessed. Equivalent to j.
sh-posix(1) sh-posix(1) space if the file is not a directory. Other Edit Commands [count]ymotion y[count]motion Y u U [count]v ^L ^J ^M # = @letter Yank current character through character that motion would move the cursor to and put them into the delete buffer. The text and cursor are unchanged. Yank from current position to end of line. Equivalent to y$ . Undo the last text-modifying command. Undo all the text-modifying commands performed on the line.
sh-posix(1) sh-posix(1) Some very old shell scripts use a caret (ˆ) as a synonym for the pipe character (|). sh does not recognize the caret as a pipe character. If a command is piped into a shell command, all variables set in the shell command are lost when the command completes. Using the fc built-in command within a compound command will cause the entire command to disappear from the history file. The dot (.) special command, as in . file, reads the entire file before any commands are executed.
sh-posix(1) sh-posix(1) umask(2), wait(2), rand(3C), a.out(4), profile(4), environ(5), lang(5), regexp(5), signal(5). STANDARDS CONFORMANCE sh: SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.2 .: SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.2 :: SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.2 break : SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.2 case : SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.2 continue : SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.2 eval : SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.2 exec : SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
shar(1) shar(1) NAME shar - make a shell archive package SYNOPSIS shar [options] [filedir] ... > package DESCRIPTION The shar command bundles the named files and directories into a single distribution package suitable for mailing or moving. The files can contain any data, including executables. The resulting package, written to standard output, is a shell script file that can be edited (to add messages at the beginning, etc.).
shar(1) shar(1) -o -r Preserve user and group ownership on files and directories. -s Perform error checking using sum (see sum(1)). Both -c and -s can be specified for better error checking. Also see WARNINGS below. -t Write diagnostics and messages directly to your terminal instead of to the standard error. This is useful when invoking shar from programs (such as vi that normally combine standard error with standard output. Specifying -t also invokes the -v (verbose) option.
shar(1) shar(1) accessible. /tmp/unpack* For unpacking non-ASCII files if TMPDIR environment variable is not set or the directory specified in it is not accessible and /var/tmp directory is not accessible. $TMPDIR/compress* For uncompressing files, which are packed using -Z option, if TMPDIR environment variable is set and the directory specified in it is accessible.
shl(1) shl(1) NAME shl - shell layer manager SYNOPSIS shl DESCRIPTION shl provides a means for interacting with more than one shell from a single terminal by using shell layers. A layer is a shell that is bound to a virtual device. The virtual device can be manipulated like an actual terminal by using stty and ioctl() (see stty(1) and ioctl(2)). Each layer has its own process group ID. The user controls these layers by using the commands described below.
shl(1) shl(1) toggle Change the status of the previous current layer to that of current layer. unblock name [ name ... ] For each name, do not block the output of the corresponding layer when it is not the current layer. This is equivalent to setting the stty -loblk option within the layer. quit Exit shl . All layers are sent the SIGHUP signal. name Change the status of the layer referred to by name to that of current layer. Any unique prefix is accepted.
size(1) size(1) NAME size - print section sizes of object files SYNOPSIS size [-d] [-o] [-x] [-V] [-v] [-f] [-F] [-n] [-U] files DESCRIPTION size produces section size information for each section in the object files. The size of the text, data and bss (uninitialized data) sections are printed along with the total size of the object file. If an archive file is input to the size command, the information for all archive members is displayed.
size(1) size(1) EXAMPLES Compare the sizes of the text, data, and bss sections for two versions of a program: size ./version1 ./version2 SEE ALSO System Tools: as(1) cc(1) ld(1) Miscellaneous: a.
sleep(1) sleep(1) NAME sleep - suspend execution for an interval SYNOPSIS sleep time DESCRIPTION sleep suspends execution for time seconds. It is used to execute a command after a certain amount of time, as in: (sleep 105; command)& or to execute a command periodically, as in: while true do command sleep 37 done RETURN VALUE sleep exits with one of the following values: 0 The execution was successfully suspended for time seconds, or a SIGALRM signal was received.
slp(1) slp(1) NAME slp - set printing options for a non-serial printer SYNOPSIS slp [-a] [-b] [-c cols ] [-d] [-i indent ] [-k] [-l lines ] [-n] [-o] [-r] [-C pages ] [-O pages ] DESCRIPTION slp sets printer formatting options such as the number of lines per page, number of characters per line, and indentation. These characteristics are controlled by the printer driver as described in lp(7). slp acts on the current standard output.
sna(1) sna(1) (Requires Optional SNA Networking Software) NAME sna - SNAplus2: SNA and APPN communications for HP-UX DESCRIPTION The following descriptions are provided as a very brief overview of selected SNA (Systems Network Architecture) utilities that are available as optional software for use with the HP-UX operating system. For more information refer to system documentation provided with the software. For purchasing information, contact your nearest HP Sales and Support Office.
sna(1) sna(1) (Requires Optional SNA Networking Software) running on other computers to access a 3270 host computer over a SNAplus2 host connection. Both the SNAplus2 TN3270 program (provided as a separate package from the main SNAplus2 product) and other vendors’ TN3270 programs are supported.
soelim(1) soelim(1) NAME soelim - eliminate .so’s from nroff input SYNOPSIS soelim [ file ... ] DESCRIPTION soelim reads the specified files or the standard input and performs the textual inclusion implied by nroff directives of the form .so some_file when they appear at the beginning of input lines. This is useful when using programs such as tbl(1) that do not normally do this, allowing placement of individual tables or other text objects in separate files to be run as a part of a large document.
sort(1) sort(1) NAME sort - sort or merge files SYNOPSIS sort [-m] [-o output ] [-bdfinruM ] [-t char ] [-k keydef ] [-y [kmem ] ] [-z recsz ] [-T dir ] [ file ... ] sort [-c] [-AbdfinruM ] [-t char ] [-k keydef ] [-y [ kmem ] ] [-z recsz ] [-T dir ] [file ... ] DESCRIPTION sort performs one of the following functions: 1. Sorts lines of all the named files together and writes the result to the specified output. 2.
sort(1) sort(1) The following options override the default ordering rules: Quasi-dictionary order: only alphanumeric characters and blanks (spaces and tabs), as defined by LC_CTYPE are significant in comparisons (see environ(5)). -d (XPG4 only.) The behavior is undefined for a sort key to which -i or -n also applies. -f Fold letters. Prior to being compared, all lowercase letters are effectively converted into their uppercase equivalents, as defined by LC_CTYPE .
sort(1) sort(1) A field_start position specified by m .n is interpreted to mean the nth character in the mth field. A missing n means .1 , indicating the first character of the mth field. If the -b option is in effect, n is counted from the first non-blank character in the mth field. A field_end position specified by m .n is interpreted to mean the nth character in the mth field. If n is missing, the mth field ends at the last character of the field.
sort(1) sort(1) International Code Set Support Single- and multi-byte character code sets are supported. EXAMPLES Sort the contents of infile with the second field as the sort key: sort -k 2,2 infile Sort, in reverse order, the contents of infile1 and infile2 , placing the output in outfile and using the first two characters of the second field as the sort key: sort -r -o outfile -k 2.1,2.
sort(1) sort(1) STANDARDS CONFORMANCE sort : SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
spell(1) spell(1) NAME spell, hashmake, spellin, hashcheck - find spelling errors SYNOPSIS spell [-v] [-b] [-x] [-l] [-i] [+local_file ] [ files ] /usr/lbin/spell/hashmake /usr/lbin/spell/spellin n /usr/lbin/spell/hashcheck spelling_list DESCRIPTION The spell command collects words from the named files and looks them up in a spelling list.
spell(1) spell(1) To create a personal spelling list that incorporates the words already present in the default American spelling list file /usr/share/dict/hlista: cat /usr/share/dict/hlista | /usr/lbin/spell/hashcheck >tmp1 /usr/lbin/spell/hashmake >tmp1 sort -u -o tmp1 tmp1 /usr/lbin/spell/spellin ‘wc -l hlista To modify the default British spelling list file /usr/share/dict/hlistb, replace all occurrences of hlista with hlistb in the above example.
split(1) split(1) NAME split - split a file into pieces SYNOPSIS split [-l line_count ] [-a suffix_length ] [ file [ name ]] split [-b n[km] ] [-a suffix_length ] [ file [ name ]] Obsolescent split [-n ] [ file [ name ] ] DESCRIPTION split reads file and writes it in pieces (default 1000 lines) onto a set of output files. The name of the first output file is name with aa appended, and so on lexicographically, up to zz (only ASCII letters are used, a maximum of 676 files).
ssp(1) ssp(1) NAME ssp - remove multiple line-feeds from output SYNOPSIS ssp DESCRIPTION ssp (single-space) removes redundant blank lines from the standard input and sends the result to the standard output. All blank lines at the beginning of a file are removed, and all multiple blank lines elsewhere in the file (including end-of-file) are reduced to a single blank line. ssp is typically used in pipelines such as nroff -ms file1 | ssp ssp is equivalent to the 4.2BSD cat -s command.
strings(1) strings(1) NAME strings - find the printable strings in an object or other binary file SYNOPSIS strings [-a] [-t format ] [-n number ] [ file ] ... Obsolescent strings [-a] [-o] [-number ] [ file ] ... DESCRIPTION strings looks for ASCII strings in a file. If no file is specified, standard input is used. A string is any sequence of four or more printing characters ending with a newline or null character. strings is useful for identifying random object files and many other things.
strip(1) strip(1) NAME strip - strip symbol and line number information from an object file SYNOPSIS strip [-l] [-x] [-r] [-V] [-U] filename ... DESCRIPTION strip removes the symbol table and line number information from object files, including archives. Thereafter, no symbolic debugging access is available for that file; thus, this command is normally run only on production modules that have been debugged and tested. The effect is nearly identical to using the -s option of ld.
strip(1) strip(1) If any internationalization variable contains an invalid setting, strip behaves as if all internationalization variables are set to C. See environ(5). In addition, the following environment variable affects strip : TMPDIR Specifies a directory for temporary files (see tmpnam(3S)). International Code Set Support Single- and multi-byte character code sets are supported. DIAGNOSTICS strip: name : cannot open name cannot be read.
stty(1) stty(1) NAME stty - set the options for a terminal port SYNOPSIS stty [-a-goptions ] DESCRIPTION stty sets or reports current settings of certain terminal I/O options for the device that is the current standard input. The command takes four forms: stty stty -a stty -g Report the settings of a system-defined set of options; stty options Set terminal I/O options as defined by options.
stty(1) stty(1) ienqak (-ienqak ) brkint (-brkint ) ignpar (-ignpar ) parmrk (-parmrk ) inpck (-inpck ) istrip (-istrip ) inlcr (-inlcr ) igncr (-igncr ) icrnl (-icrnl ) iuclc (-iuclc ) ixon (-ixon ) Enable (disable) ENQ-ACK Handshaking. ixany (-ixany ) ixoff (-ixoff ) Allow any character (only DC1) to restart output. Signal (do not signal) INTR on break. Ignore (do not ignore) parity errors. Mark (do not mark) parity errors (see termio(7)). Enable (disable) input parity checking.
stty(1) stty(1) erase escaped characters, tabs, and backspaces. echok (-echok ) lfkc (-lfkc ) echonl (-echonl ) noflsh (-noflsh ) echoctl (-echoctl ) echoprt (-echoprt ) echoke (-echoke ) flusho (-flusho ) pendin (-pendin ) tostop (-tostop ) Echo (do not echo) a newline character after a KILL character. (obsolete) Same as echok (-echok ). Echo (do not echo) newline character. Disable (enable) flush after INTR or QUIT.
stty(1) stty(1) Print the status of the Guardian Service Processor (GSP) of the console. This function can be used only by the superuser. This feature is available only on specific hardware. +queryGSP Control Character Default Assignments The control characters are assigned default values when the terminal port is opened, see termio(7).
stty(1) stty(1) STANDARDS CONFORMANCE stty : SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
su(1) su(1) NAME su - switch user SYNOPSIS su [-] [username [arguments] ] DESCRIPTION The su (set user or superuser) command allows one user to become another user without logging out. username is the name of a user defined in the /etc/passwd file (see passwd(4)). The default name is root (that is, superuser). To use su, the appropriate password must be supplied unless the current user is superuser.
su(1) su(1) In order to su using a Smart Card account, the Smart Card from the destination user account must be inserted into the Smart Card reader. The user is prompted for a PIN instead of a password during authentication. Enter PIN: The password is retrieved automatically from the Smart Card when a valid PIN is entered. Therefore, it is not necessary to know the password, only the PIN. The card is locked if an incorrect PIN is entered three consecutive times.
su(1) su(1) su -d DCEPrincipalName The -d flag cannot be used with -c flag. DEPENDENCIES Pluggable Authentication Modules (PAM) PAM is an Open Group standard for user authentication, password modification, and account validation. In particular, pam_authenticate() is invoked to perform all functions related to su . This includes password retrieval, account validation, and error message displays. FILES $HOME/.
sum(1) sum(1) OBSOLETE NAME sum - print checksum and block or byte count of file(s) SYNOPSIS sum [-r] [-p] [file]... Remarks sum is obsolescent and should not be used in new applications that are intended to be portable between systems. Use cksum instead (see cksum(1)). DESCRIPTION sum calculates and prints to standard output a checksum for each named file, and also prints the size of the file in 512 byte blocks, rounded up. The default algorithm is a 16-bit sum of the bytes in which overflow is ignored.
tabs(1) tabs(1) NAME tabs - set tabs on a terminal SYNOPSIS tabs [ tabspec ] [+m n ] [-T type ] DESCRIPTION tabs sets the tab stops on the user’s terminal according to the tab specification tabspec, after clearing any previous settings. The user’s terminal must have remotely-settable hardware tabs. If you are using a non-HP terminal, you should keep in mind that behavior will vary for some tab settings. Four types of tab specification are accepted for tabspec: ‘‘canned’’, repetitive, arbitrary, and file.
tabs(1) tabs(1) tabs -- file; pr file Any of the following can be used also; if a given option occurs more than once, the last value given takes effect: -Ttype tabs usually needs to know the type of terminal in order to set tabs and always needs to know the type to set margins. type is a name listed in term(5). If no -T option is supplied, tabs searches for the $TERM value in the environment (see environ(5)).
tail(1) tail(1) NAME tail - deliver the last part of a file SYNOPSIS tail [-f] [-b number ] [ file ] tail [-f] [-c number ] [ file ] tail [-f] [-n number ] [ file ] Obsolescent: tail [± [ number ] ] [lbc] [-f] [ file ] DESCRIPTION tail copies the named file to the standard output beginning at a designated place. If no file is named, standard input is used. Command Forms tail can be used in three forms as indicated above: tail -b number...
tail(1) tail(1) EXTERNAL INFLUENCES Environment Variables LC_CTYPE determines the locale for the interpretation of sequences of bytes of text data as characters (e.g., single- versus multibyte characters in arguments and input files). LC_MESSAGES determines the language in which messages are displayed. If LC_CTYPE or LC_MESSAGES is not specified in the environment or is set to the empty string, the value of LANG is used as a default for each unspecified or empty variable.
talk(1) talk(1) NAME talk - talk to another user SYNOPSIS talk talk_party [ ttyname ] DESCRIPTION The talk utility is a two-way, screen-oriented communication program. The command argument talk_party can take one the following forms: user user @host host !user host :user host .user where user is a login name and host is a host name. The optional command argument, ttyname, can be used to specify the terminal to be used when contacting a user who is logged in more than once.
tar(1) tar(1) NAME tar - tape file archiver SYNOPSIS tar [-]key [arg ...] [file -C directory] ... DESCRIPTION The tar command saves and restores archives of files on a magnetic tape, a flexible disk, or a regular file. The default archive file is /dev/rmt/0m . See the -f option below. Its actions are controlled by the key argument. Arguments key is a string of characters containing exactly one function letter and zero or more function modifiers, specified in any order.
tar(1) tar(1) A Suppress warning messages that tar did not archive a file’s access control list. By default, tar writes a warning message for each file with optional ACL entries. b Use the next arg argument as the blocking factor for archive records. The default is 20; the maximum is at least 20. However, if the f - modifier is used to specify standard input, the default blocking factor is 1. The blocking factor is determined automatically when reading nine-track tapes (key letters x and t).
tar(1) tar(1) v Normally, tar does its work silently. The v (verbose) function modifier causes tar to type the name of each file it treats, preceded by the function letter. With the t function, v gives more information about the archive entries than just the name. V Same as the v function modifier except that, when using the t option, tar also prints out a letter indicating the type of the archived file.
tar(1) tar(1) Link names are still limited to 100 characters when using the N function modifier. There is no way to ask for the n-th occurrence of a file. Tape errors are handled ungracefully. The u function key can be slow. If the archive is a file on disk, flexible disk, or cartridge tape, and if the blocking factor specified on output is not the default, the same blocking factor must be specified on input, because the blocking factor is not explicitly stored in the archive.
tbl(1) tbl(1) NAME tbl - format tables for nroff SYNOPSIS tbl [-TX ] [ file ... ] DESCRIPTION tbl is a preprocessor that formats tables for nroff(1). The input files are copied to the standard output, except for lines between .TS and .TE command lines, which are assumed to describe tables and are reformatted by tbl . (The .TS and .TE command lines are not altered by tbl ). .TS is followed by global options.
tbl(1) tbl(1) is not specified or is set to the empty string, a default of "C" (see lang(5)) is used instead of LANG . If any internationalization variable contains an invalid setting, tbl behaves as if all internationalization variables are set to "C". See environ(5). International Code Set Support Single- and multi-byte character code sets are supported. EXAMPLES If we redefine the tab character to a semicolon, then the input: .TS center box tab(;) ; cB s s cI | cI s ^ | c c l | n n.
tee(1) tee(1) NAME tee - pipe fitting SYNOPSIS tee [-i] [-a] [ file ] ... DESCRIPTION The tee command transcribes the standard input to the standard output and makes copies in the files. OPTIONS -i -a This option ignores interrupts. This option appends the output to the files rather than overwriting the files. EXTERNAL INFLUENCES Environment Variables LC_MESSAGES determines the language in which messages are displayed.
telnet(1) telnet(1) NAME telnet - user interface to the TELNET protocol SYNOPSIS telnet [ [options] host [port] ] DESCRIPTION telnet is used to communicate with another host using the TELNET protocol. If telnet is invoked without arguments, it enters command mode, indicated by its prompt (telnet> ). In this mode, it accepts and executes the commands listed below. If telnet is invoked with arguments, it performs an open command (see below) with those arguments.
telnet(1) telnet(1) The fallback option can be set in the krb5.conf file within [appdefaults] section. If fallback is set to true and the kerberos authentication fails, telnet will use the non-secure mode of authentication. Note: Command line options override configuration file options. Kerberos-specific options are not supported in the IPV6 environment. -a This option is applicable only in a secure environment based on Kerberos V5.
telnet(1) telnet(1) telnet is not connected to a remote host, it reports No connection . Once telnet has been connected, it reports the local flow control toggle value. display [ argument ... ] Displays all or some of the set and toggle values (see below). ? [ command ] Get help. With no arguments, telnet prints a help summary. If a command is specified, telnet prints the help information available about that command only. Help information is limited to a one-line description of the command.
telnet(1) telnet(1) quit If telnet is in localchars mode (see toggle localchars below) and the quit character is typed, a TELNET BRK sequence (see send brk above) is sent to the remote host. The initial value for the quit character is taken to be the terminal’s quit character. flushoutput If telnet is in localchars mode (see toggle localchars below) and the flushoutput character is typed, a TELNET AO sequence (see send ao above) is sent to the remote host. The initial value for the flush character is ˆO.
telnet(1) telnet(1) from the TELNET server. crlf If TRUE, end-of-line sequences are sent as an ASCII carriage-return and linefeed pair. If FALSE, end-of-line sequences are sent as an ASCII carriage-return and NUL character pair. The initial value for this toggle is FALSE. crmod Toggle carriage return mode. When this mode is enabled, any carriage return characters received from the remote host are mapped into a carriage return and a line feed.
telnet(1) telnet(1) SEE ALSO csh(1), ksh(1), login(1), rlogin(1), stty(1), telnetd(1M), inetsvcs_sec(1M), hosts(4), krb5.
telnet(1) Kerberos telnet(1) NAME telnet - user interface to the TELNET protocol SYNOPSIS telnet [ [ options ] host [ port ] ] DESCRIPTION telnet is used to communicate with another host using the TELNET protocol. If telnet is invoked without arguments, it enters command mode, indicated by its prompt (telnet> ). In this mode, it accepts and executes the commands listed below. If telnet is invoked with arguments, it performs an open command (see below) with those arguments.
telnet(1) telnet(1) Kerberos option. Omitting the -l option executes the default setting. Only one -l option is allowed. -P Disable use of Kerberos authentication and authorization. When this option is specified, a password is required which is sent across the network in a readable form. (See sis(5).) -f -F Allows local credentials to be forwarded to the remote system. Only one of -f or -F is allowed.
telnet(1) telnet(1) Kerberos synch Sends the TELNET SYNCH sequence. This sequence causes the remote system to discard all previously typed (but not yet read) input. This sequence is sent as TCP urgent data (and may not work to some systems -if it doesn’t work, a lower case ‘‘r’’ may be echoed on the terminal). brk Sends the TELNET BRK (Break) sequence, which may have significance to the remote system.
telnet(1) telnet(1) Kerberos a TELNET EL sequence (see send el above) is sent to the remote system. The initial value for the kill character is taken to be the terminal’s kill character. eof If telnet is operating in line-by-line mode, entering this character as the first character on a line causes this character to be sent to the remote system. The initial value of the eof character is taken to be the terminal’s eof character. toggle arguments ...
telnet(1) telnet(1) Kerberos all TELNET option negotiations are displayed. Options sent by telnet are displayed as ‘‘SENT’’ , while options received from the TELNET server are displayed as ‘‘RCVD’’ . The initial value for this toggle is FALSE. netdata Toggles the display of all network data (in hexadecimal format). The initial value for this toggle is FALSE. ? Displays the legal toggle commands.
test(1) test(1) NAME test - condition evaluation command SYNOPSIS test expr [ expr ] DESCRIPTION The test command evaluates the expression expr and, if its value is True, returns a zero (true) exit status; otherwise, a nonzero (false) exit status is returned. test also returns a nonzero exit status if there are no arguments. The following primitives are used to construct expr: -r -w -x -f -d -c -b -p -u -g -k -s -h -t file True if file exists and is readable.
test(1) test(1) EXAMPLES Exit if there are not two or three arguments: if [ $# -l2 2 -o $# -gt 3 ]; then exit 1; fi Create a new file containing the text string default if the file does not already exist: [ ! -f thisfile ] && echo default > thisfile Wait for myfile to become non-readable: while test -r myfile do sleep 30 done echo ’"myfile" is no longer readable’ WARNINGS When the [ form of this command is used, the matching ] must be the final argument, and both must be separate arguments from the arg
tftp(1) tftp(1) NAME tftp - trivial file transfer program SYNOPSIS tftp [ host ] DESCRIPTION tftp is the user interface to the Internet TFTP (Trivial File Transfer Protocol), that allows users to transfer files to and from a remote machine. The remote host can be specified on the command line, in which case tftp uses host as the default host for future transfers (see the connect command below).
tftp(1) tftp(1) AUTHOR tftp was developed by the University of California, Berkeley. SEE ALSO tftpd(1M).
time(1) time(1) NAME time - time a command SYNOPSIS time command XPG4 only time [-p] utility [argument ...] DESCRIPTION command is executed. Upon completion, time prints the elapsed time during the command, the time spent in the system, and the time spent executing the command. Times are reported in seconds. Execution time can depend on the performance of the memory in which the program is running. The times are printed on standard error.
timex(1) timex(1) NAME timex - time a command; report process data and system activity SYNOPSIS timex [-o] [-p[fhkmrt ] ] [-s] command DESCRIPTION timex reports in seconds the elapsed time, user time, and system time spent in execution of the given command. Optionally, process accounting data for command and all its children can be listed or summarized, and total system activity during the execution interval can be reported. The output of timex is written on the standard error.
top(1) top(1) NAME top - display and update information about the top processes on the system SYNOPSIS top [-s time ] [-d count ] [-q] [-u] [-w] [-h] [-P] [-n number ] [-f filename ] [-p pset_id ] DESCRIPTION top displays the top processes on the system and periodically updates the information. Raw CPU percentage is used to rank the processes. Options top recognizes the following command-line options: -s time Set the delay between screen updates to time seconds.
top(1) top(1) Display Description Three general classes of information are displayed by top : System Data The first few lines at the top of the display show general information about the state of the system, including: • System name and current time. • Load averages in the last one, five, and fifteen minutes of all the active processors in the system. • Number of existing processes and the number of processes in each state (sleeping, waiting, running, starting, zombie, and stopped).
top(1) top(1) top -P -s2 -d5 To display information about pset 2, use: top -p 2 top -P -p 2 To display individual CPU information in place of individual process information, use: top -w and press the w key. AUTHOR top was developed by HP and William LeFebvre of Rice University.
touch(1) touch(1) NAME touch - update access, modification, and/or change times of file SYNOPSIS touch [-amc ] [-r ref_file -t time ] file_name ... Obsolescent: touch time_str file_name ... DESCRIPTION touch updates the access, modification, and last-change times of each argument. The file name is created if it does not exist. If no time is specified (see date(1)) the current time is used. The -r and -t options are mutually exclusive.
touch(1) touch(1) This is for backward compatibility. The -t form given above is recommended for future portability. The - - option delimiter can be used before the first file_name if there is a possibility that file_name consists of all digits, in order to ensure that the first syntax is used.
touch(1) touch(1) STANDARDS CONFORMANCE touch : SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
tput(1) tput(1) NAME tput - query terminfo database SYNOPSIS tput [-T type] capname . . . tput [-T type] capname [parms . . . ] tput -S DESCRIPTION The tput command uses the terminfo database to make terminal-dependent capabilities and information available to the shell (see terminfo(4)). The tput command outputs a string if the attribute (capname) is of type string, or an integer if the attribute is of type integer.
tput(1) tput(1) Clear the screen, move the cursor to line 10, column 20 and turn on bold. tput -S <4 The capability name is of type integer and does not exist. Usage error. Unknown terminal type.
tr(1) tr(1) NAME tr - translate characters SYNOPSIS tr [-Acs ] string1 string2 tr -s [-Ac ] string1 tr -d [-Ac ] string1 tr -ds [-Ac ] string1 string1 DESCRIPTION tr copies the standard input to the standard output with substitution or deletion of selected characters. Input characters from string1 are replaced with the corresponding characters in string2. If necessary, string1 and string2 can be quoted to avoid pattern matching by the shell.
tr(1) tr(1) specification is interpreted as a request for case conversion. When [:lower:] appears in string1 and [:upper:] appears in string2, the arrays contain the characters from the toupper mapping in the LC_CTYPE category of the current locale. When [:upper:] appears in string1 and [:lower:] appears in string2, the arrays contain the characters from the tolower mapping in the LC_CTYPE category of the current locale.
tr(1) tr(1) Translate each digit in file1 to a # (number sign), and write the result to file2. tr "0-9" "[#*]" file2 The * (asterisk) tells tr to repeat the # (number sign) enough times to make the second string as long as the first one. AUTHOR tr was developed by OSF and HP. SEE ALSO ed(1), sh(1), ascii(5), environ(5), lang(5), regexp(5). STANDARDS CONFORMANCE tr: SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
true(1) true(1) NAME true, false - return exit status zero or one respectively SYNOPSIS true false DESCRIPTION The command true does nothing, and returns exit code zero. The command false does nothing, and returns exit code one. They are typically used to construct command procedures. RETURN VALUE Exit values are: 0 1 always from true. always from false. EXAMPLES This command loop repeats without end: while true do command done WARNINGS true is typically used in shell scripts.
tset(1) tset(1) NAME tset, reset - terminal-dependent initialization SYNOPSIS tset [ options ] [-m [ ident ] [ test baudrate ] :type ] ... [ type ] reset DESCRIPTION tset sets up the terminal when logging in on an HP-UX system. It does terminal-dependent processing, such as setting erase and kill characters, setting or resetting delays, and sending any sequences needed to properly initialize the terminal.
tset(1) tset(1) On terminals that can backspace but not overstrike (such as a CRT), and when the erase character is the default erase character (# on standard systems), the erase character is changed to Back space (ˆH ). Options tset recognizes the following options: -ec Set the erase character to be the named character c; c defaults to ˆH (BACKSPACE). The character c can either be typed directly, or entered using circumflex notation used here (e.g.
tset(1) tset(1) Assume you have an HP 2623 at home which you dial up on, but your office terminal is hardwired and known in /etc/ttytype . export TERM; TERM=‘tset - -m dialup:2623‘ Suppose you are accessing the system through a switching network that can connect any system to any incoming modem line in an arbitrary combination, making it nearly impossible to key on what port you are coming in on.
tsm(1) tsm(1) NAME tsm - Terminal Session Manager SYNOPSIS tsm DESCRIPTION tsm allows a user to interact with more than one shell or application (session) from a single terminal. Each session is bound to a virtual device emulating the physical terminal. The emulation includes maintaining display state, softkeys, and terminal modes for each session. The virtual device can be manipulated like the actual terminal by using stty and ioctl (see stty(1) and ioctl(2)).
tsm(1) tsm(1) is ignored. k Load the softkeys of the current session from a file. To load tsm defaults, specify ‘‘file’’ +. To load terminal defaults, specify ‘‘file’’ -. g x Same as k above but softkeys are loaded ‘‘globally’’ into all sessions. q Quit tsm : Access extended tsm commands as described in the tsm reference manual or on the tsm help screen. SIGHUP is sent to all processes started under tsm , and tsm exits.
tsm.command(1) tsm.command(1) NAME tsm.command - send commands to the Terminal Session Manager (TSM) SYNOPSIS /usr/tsm/bin/tsm.command command DESCRIPTION tsm.command is used to send a command string programmaticly to the Terminal Session Manager (TSM), as if the string were typed on the TSM command line. tsm.command fails unless it is run from inside a TSM session. Actions caused by tsm.command affect only the instance of TSM that tsm.command is run under.
tsm.info(1) tsm.info(1) NAME tsm.info - get Terminal Session Manager state information SYNOPSIS /usr/tsm/bin/tsm.info request DESCRIPTION tsm.info is used to obtain information about TSM. When run from inside a TSM session it returns valid information; otherwise it fails with a nonzero error code. Information returned is written to standard output. request can have any of the following values: is_a_window Successful (returns zero) if executed from a TSM session, nonzero error code otherwise.
tsort(1) tsort(1) NAME tsort - topological sort SYNOPSIS tsort [ file ] DESCRIPTION tsort produces on the standard output a totally ordered list of items consistent with a partial ordering of items mentioned in the input text file. If no file is specified, the standard input is understood. tsort is generally used in conjunction with the lorder command to sort the objects to be installed in a library by ar (see lorder(1) and ar(1)).
tty(1) tty(1) NAME tty, pty - get the name of the terminal SYNOPSIS tty [-s] pty [-s] DESCRIPTION tty and pty print the path name of the user’s terminal. The -s option inhibits printing of the terminal path name and any diagnostics, providing a means to test only the exit code. RETURN VALUE Exit status codes for tty are: 2 1 0 Invalid options were specified, The standard input is not a terminal or pseudo-terminal, The standard input is a terminal or pseudo-terminal.
ttytype(1) ttytype(1) NAME ttytype - terminal identification program SYNOPSIS ttytype [-apsv ] [-t type ] DESCRIPTION ttytype automatically identifies the current terminal type by sending an identification request sequence to the terminal. This method works for local, modem, and remote terminal connections, as well as for the hpterm and xterm terminal emulators. Once the terminal has been identified, ttytype prints the terminal’s type to the standard output (see terminfo(4)).
ttytype(1) ttytype(1) # To have ttytype(1) prompt for the terminal type before trying # to automatically identify the terminal, add the "-p" option # to the "ttytype -s" command below. # if [ -z "$TERM" -o "$TERM" = network ]; then unset TERM eval ‘tset -s -Q‘ if [ -z "$TERM" -o "$TERM" = unknown ]; then eval ‘ttytype -s‘ tset -Q -e ${ERASE:-\ˆh} $TERM fi fi NOTES Use of the -s option is highly recommended because many terminals support variable-size displays.
ul(1) ul(1) NAME ul - do underlining SYNOPSIS ul [-t terminal ] [-i] [ name ... ] DESCRIPTION ul reads the named files (or standard input if none are given) and translates occurrences of underscores to the sequence which indicates underlining for the terminal in use, as specified by the environment variable TERM . The -t option overrides the terminal type specified in the environment. The terminfo(4) file corresponding to TERM is read to determine the appropriate sequences for underlining.
umask(1) umask(1) NAME umask - set or display the file mode creation mask SYNOPSIS Set Mask umask mask Display Mask umask [ -S ] DESCRIPTION The umask command sets the value of the file mode creation mask or displays the current one. The mask affects the initial value of the file mode (permission) bits for subsequently created files. Setting the File Mode Creation Mask The umask mask command sets a new file mode creation mask for the current shell execution environment.
umask(1) umask(1) Numeric Mask Value (Obsolescent) A numeric mask replaces the current file mode creation mask.
umask(1) umask(1) RETURN VALUE umask exits with one of the following values: 0 The file mode creation mask was successfully changed or no mask operand was supplied. >0 An error occurred. EXAMPLES In these examples, each line show an alternate way of accomplishing the same task.
umodem(1) umodem(1) NAME umodem - XMODEM-protocol file transfer program SYNOPSIS umodem [options] files ... umodem -c DESCRIPTION umodem is a file transfer program that incorporates the well-known XMODEM protocol used on CP/M systems and on the HP 110 portable computer. Options umodem recognizes the following options and command-line arguments: -1 (one) Employ TERM II FTP 1. -3 Enable TERM FTP 3 (CP/M UG). -7 Enable 7-bit transfer mask. -a Turn on ARPA Net flag. -c Enter command mode.
uname(1) uname(1) NAME uname - display information about computer system; set node name (system name) SYNOPSIS uname [-ailmnrsv ] uname [-S nodename] DESCRIPTION In the first form above, the uname command displays selected information about the current computer system, derived from the utsname structure (see uname(2)). In the second form, uname sets the node name (system name) that is used in the utsname structure. Options uname recognizes the options listed below.
uname(1) uname(1) Many types of networking services are supported on HP-UX, each of which uses a separately assigned system name and naming convention. To ensure predictable system behavior, it is essential that system names (also called host names or node names) be assigned in such a manner that they do not create conflicts when the various networking facilities interact with each other.
unget(1) unget(1) NAME unget - undo a previous get of an SCCS file SYNOPSIS unget [-r SID] [-s ] [-n ] file ... DESCRIPTION The unget command undoes the effect of a get -e done prior to creating the intended new delta. If file is a directory name, unget treats each file in the directory as a file to be processed, except that non-SCCS files and unreadable files are silently ignored.
unifdef(1) unifdef(1) NAME unifdef - remove preprocessor lines SYNOPSIS unifdef [-clt ] [ [-D sym ] [-U sym ] [-iD sym ] [-iU sym ] ] ... [ file ] DESCRIPTION unifdef simulates some of the actions of cpp in interpreting C language preprocessor command lines (see cpp(1)). For unifdef , a valid preprocessor command line contains as its first character a # and one of the following keywords: ifdef , ifndef , if , else , or endif .
unifdef(1) unifdef(1) 100 CONTINUE #endif END The command sequence: unifdef -DANSI77 -UDEBUG -DTEST foo.f > /tmp/foo.f produces the following result in file /tmp/foo.f : PROGRAM TEST1 INTEGER I, J DO I=1,10 J=J+1 PRINT *,J ENDDO END WARNINGS Any symbol name defined in the file must be specified in the unifdef command line; otherwise, unifdef will ignore the line. AUTHOR unifdef was developed in the public domain. SEE ALSO cpp(1).
uniq(1) uniq(1) NAME uniq - report repeated lines in a file SYNOPSIS uniq [-udc [-f fields ] [-s chars ] [ input_file [ output_file ] ] DESCRIPTION uniq reads the input text file input_file, comparing adjacent lines, and copies the result to output_file. If input_file is not specified, the standard input and standard output are used. If input_file is specified, but output_file is not, results are printed to standard output. input_file and output_file must not be the same file.
uniq(1) uniq(1) SEE ALSO comm(1), sort(1). STANDARDS CONFORMANCE uniq : SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
units(1) units(1) NAME units - conversion program SYNOPSIS units [- file] DESCRIPTION units converts quantities expressed in various standard scales to their equivalents in other scales. It works interactively as follows: System Prompt User Response You have: You want: inch cm The system responds with two factors; one used if multiplying (preceded by *), the other if dividing (preceded by /): * 2.540000e+00 / 3.
uptime(1) uptime(1) NAME uptime, w - show how long system has been up, and/or who is logged in and what they are doing SYNOPSIS uptime [-hlsuw ] [user] uptime [-p[pset_list]] w [-hlsuw ] [user] w [-p[pset_list]] DESCRIPTION uptime prints the current time, the length of time the system has been up, the number of users logged on to the system, and the average number of jobs in the run queue over the last 1, 5, and 15 minutes for the active processors.
uptime(1) uptime(1) load average for pset 97 : 1.00, 1.00, 1.01 The command: uptime -p94,95 or uptime -p"94 95" gives the output which looks like the following, if 94 and 95 are valid pset ids: 7:59pm up 11 days, 6:25, 12 users load average for pset 94 : 0.00, 0.00, 0.00 load average for pset 95 : 0.00, 0.00, 0.00 AUTHOR uptime was developed by the University of California, Berkeley and HP.
users(1) users(1) NAME users - compact list of users who are on the system SYNOPSIS users DESCRIPTION users lists the login names of the users currently on the system in a compact, one-line format. The login names are sorted in ascending collation order (see Environment Variables below). EXTERNAL INFLUENCES Environment Variables LC_COLLATE determines the order in which the output is sorted.
uucp(1) uucp(1) NAME uucp, uulog, uuname, uutry - UNIX system to UNIX system copy SYNOPSIS uucp [ options ] source_files destination_file uulog -f system [-x ] [-number ] uulog [-s system ] ... [-x ] [-number ] uuname [-l] uutry -r1 -s system [-x debug_level] DESCRIPTION uucp uucp copies files named by the source_files argument to the destination identified by the destination_file argument.
uucp(1) uucp(1) -ggrade grade is a single letter or number. A lower ASCII sequence value for grade causes the job to be transmitted earlier in a given conversation between systems. -j Output the ASCII job identification string on standard output. This job identification can be used by uustat to obtain the status or terminate a job (see uustat(1)). -mfile -nuser -r -sfile -xdebug_level Send mail to the requester when the copy is completed. Notify user on the remote system that a file was sent.
uucp(1) uucp(1) International Code Set Support Single- and multi-byte character code sets are supported with the exception that multi-byte-character file names are not supported. WARNINGS The domain of remotely accessible files can (and for obvious security reasons, usually should) be severely restricted. In most cases, you cannot fetch files by path name from a remote system. Ask a responsible person on the remote system to send them to you.
uuencode(1) uuencode(1) NAME uuencode, uudecode - encode/decode a binary file for transmission by mailer SYNOPSIS uuencode [ source ] remotedest uudecode [ file ] DESCRIPTION uuencode and uudecode can be used to send a binary file to another machine by means of such services as elm(1), mailx(1), or uucp(1) (see elm(1), mailx(1), and uucp(1)). uuencode takes the named source file (default standard input) and produces an encoded version on the standard output.
uupath(1) uupath(1) NAME uupath, mkuupath - access and manage the pathalias database SYNOPSIS uupath [-f pathsfile ] mailaddress mkuupath [-v] pathsfile DESCRIPTION uupath provides electronic message routing by expanding a simple UUCP address into a full UUCP path (see uucp(1)). For example, host !user could be expanded into hostA !hostB !host!user.
uustat(1) uustat(1) NAME uustat - uucp status inquiry and job control SYNOPSIS uustat uustat uustat uustat uustat uustat uustat -a -m -p -q -k jobid ] -r jobid ] [-s sys ] [-u user ] DESCRIPTION uustat displays the status of, or cancels, previously specified uucp commands, or provide general status on uucp connections to other systems (see uucp(1)). Only one of the following options can be specified with uustat per command execution: -a -m -p -q Output all jobs in queue.
uustat(1) uustat(1) When no options are given, uustat outputs the status of all uucp requests issued by the current user. The format used is the same as with the -s or -u options. EXTERNAL INFLUENCES Environment Variables LC_TIME determines the format and contents of date and time strings. LANG determines the language in which messages are displayed. If LC_TIME is not specified in the environment or is set to the empty string, the value of LANG is used as a default for each unspecified or empty variable.
uuto(1) uuto(1) NAME uuto, uupick - public UNIX system to UNIX system file copy SYNOPSIS uuto [ options ] source-files destination uupick [-s system ] DESCRIPTION uuto sends source-files to destination. uuto uses the uucp facility to send files (see uucp(1)), while allowing the local system to control the file access. A source-file name is a path name on your machine.
uuto(1) uuto(1) Grace Todino and Dale Dougherty, Using UUCP and Usenet, O’Reilly & Associates, Inc. USA.
uux(1) uux(1) NAME uux - UNIX system to UNIX system command execution SYNOPSIS uux [ options ] command-string DESCRIPTION uux gathers zero or more files from various systems, executes a command on a specified system, then sends standard output to a file on a specified system. Note that, for security reasons, many installations limit the list of commands executable on behalf of an incoming request from uux .
uux(1) uux(1) -n -r -sfile -xdebug_level Do not notify the user if the command fails. -z Send success notification to user. Do not start the file transfer, just queue the job. Report status of the transfer in file. Produce debugging output on standard output. The debug_level is a number between 0 and 9. The higher the number, the more detailed the information returned. WARNINGS Only the first command of a shell pipeline can have a system-name !.
vacation(1) vacation(1) NAME vacation - return ‘‘I am not here’’ indication SYNOPSIS vacation -i vacation [ [-a alias ] ... ] login DESCRIPTION The vacation program returns a message to the sender of a message telling them that you are currently not reading your mail. The intended use is in a .forward file in $HOME . For example, your .
vacation(1) vacation(1) DIAGNOSTICS On error, vacation exits with a value from and causes sendmail to report an error back to the sender of the original message. Errors such as the absence of .vacation.msg or calling vacation with incorrect arguments, are logged using syslogd on the system where vacation actually runs (see syslogd(1M)). The syslog file (/var/adm/syslog/mail.log by default − see /etc/syslog.
val(1) val(1) NAME val - validate SCCS file SYNOPSIS val val [-s] [-r SID] [-m name ] [-y type ] [-v] files DESCRIPTION The val command reads one or more files to determine whether each file read is an SCCS file meeting the characteristics specified by the optional argument list. Command-line options may appear in any order, and are described below. Options The val command recognizes the following options and command-line arguments. The effects of each option apply independently to each specified file.
val(1) val(1) Note that val can process two or more files on a given command line, and in turn can process multiple command lines (when reading the standard input). In these cases an aggregate code is returned; a logical OR of the codes generated for each command line and file processed. DIAGNOSTICS val generates diagnostic messages on the standard output for each command line and file processed, and also returns a single 8-bit code upon exit as described earlier under RETURN VALUE.
vc(1) vc(1) NAME vc - substitutes assigned values in place of identification keywords. SYNOPSIS vc [-a] [-t] [-c char ] [-s] [ keyword=value ... keyword=value ] DESCRIPTION The vc, or version control command copies lines from the standard input to the standard output under control of command line arguments and control statements encountered in the standard input.
vc(1) vc(1) The syntax of a condition may include the following: ::= [ "not" ] ::= | "|" ::= | "&" ::= "(" ")" | ::= "=" | "!=" | "<" | ">" ::= | The following are available operators and their meanings: = != & | > < ( ) not equal not equal and or greater than less than used for logical groupings allowed only immediately after the if, and when present, invert
vc(1) vc(1) SEE ALSO ed(1), sccshelp(1).
vi(1) vi(1) NAME vi, view, vedit - screen-oriented (visual) text editor SYNOPSIS vi [-] [-l] [-r] [-R] [-t tag] [-v] [-V] [-wsize] [-x] [-C] [+command] [file ...] XPG4 Synopsis vi [-rR ] [-c command] [-t tag] [-w size] [file ...] Obsolescent Options vi [-rR ] [+command] [-t tag] [-w size] [file ...] view [-] [-l] [-r] [-R] [-t tag] [-v] [-V] [-wsize] [-x] [-C] [+command] [file ...] vedit [-] [-r] [-R] [-l] [-t tag] [-v] [-V] [-wsize] [-x] [-C] [+command] [file ...
vi(1) vi(1) transformed version of the key typed in for the -x option (see the crypt command in ex(1)). -C Encryption option. Same as the -x option, except that all text read in is assumed to have been encrypted. -c command +command (XPG4 only.) (Obsolescent) Begin editing by executing the specified ex command-mode commands. As with the normal ex command-line entries, the command option-argument can consist of multiple ex commands separated by vertical-line commands (|).
vi(1) vi(1) ^B Scroll backward to display the previous window of text. A preceding count specifies the number of windows to go back. Two lines of overlap are kept if possible. ^D Scroll forward a half-window of text. A preceding count gives the number of (logical) lines to scroll, and is remembered for future ˆD and ˆU commands. ^D (input mode) Backs up over the indentation provided by autoindent or ˆT to the next multiple of shiftwidth spaces.
vi(1) vi(1) ^] Take the word at or after the cursor as a tag and execute the tag MbobC editor command (see ex(1)). ^ˆ Return to the previous file (equivalent to :ex #). space Move one space to the right (stops at the end of the line). A preceding count specifies the number of spaces to go forward (same as l). erase Erase, where erase is the user-designated erase character (see stty(1)). Same as ˆH . kill Kill, where kill is the user-designated kill character (see stty(1)).
vi(1) vi(1) ) Move forward to the beginning of a sentence. If a count is specified, the cursor advances the specified number of sentences (see (). { Move back to the beginning of the preceding paragraph. A paragraph is defined by the value of the paragraphs option. A completely empty line and a section boundary (see [[ above) are also interpreted as the beginning of a paragraph. If a count is specified, the cursor moves backward the specified number of paragraphs.
vi(1) vi(1) specifies how many characters in the current line are switched. A B Append at the end of line (same as $a ). C D E Change the rest of the text on the current line (same as c$ ). F Must be followed by a single character; scans backwards in the current line, searching for that character and moving the cursor to it, if found. If a count is specified, the search is repeated the specified number of times.
vi(1) v vi(1) W Move forward to the beginning of a word in the current line, where a word is a sequence of nonblank characters. If the current position is at the beginning of a word, the current position is within a bigword or the character at that position cannot be a part of a bigword, the current position shall move to the first character of the next bigword.
vi(1) vi(1) s Delete the single character under the cursor and enter input mode; the entered text replaces the deleted character. A preceding count specifies how many characters on the current line are changed. The last character being changed is marked with a $, as for c. t Must be followed by a single character; scan the remainder of the line for that character. The cursor moves to the column prior to the character if the character is found.
vi(1) vi(1) key_sf key_dc key_npage key_ppage key_sr key_eos ^E x ˆF ˆB ^Y dG ^[ˆEa ^[xa ^[ˆFa ^[ˆBa ^[ˆYa ^[dGa scrollf delchar npage ppage sr clreos scroll down delete char next page previous page scroll up clear to end of screen EXTERNAL INFLUENCES Support for international codes and environment variables are as follows: Environment Variables UNIX95 specifies using the XPG4 behaviour for this command. COLUMNS overrides the system-selected horizontal screen size.
vi(1) vi(1) If you load a file that contain lines longer than the specified limit, the lines are truncated to the stated maximum length. Saving the file will write the truncated version over the original file, thus overwriting the original lines completely. Attempting to create lines longer than the allowable maximum for the editor produces a line too long error message. Maximum File Size The maximum file length of 234,239 lines is silently enforced. Other limits • 256 characters per global command list.
vis(1) vis(1) NAME vis, inv - make unprintable and non-ASCII characters in a file visible or invisible SYNOPSIS vis [-n] [-s] [-t] [-u] [-x] file . . . inv [-n] [-s] [-t] [-u] [-x] file . . . DESCRIPTION vis reads characters from each file in sequence and writes them to the standard output, converting those that are not printable or not ASCII into a visible form.
vis(1) vis(1) AUTHOR vis was developed by HP. SEE ALSO cat(1), echo(1), od(1). WARNINGS Redirecting output to an input file destroys the original data. Therefore, command forms such as vis file1 file2 >file1 should be avoided unless the source file can be safely discarded.
vmstat(1) vmstat(1) NAME vmstat - report virtual memory statistics SYNOPSIS vmstat [-dnS ] [interval [count] ] vmstat -f -s -z DESCRIPTION The vmstat command reports certain statistics kept about process, virtual memory, trap, and CPU activity. It also can clear the accumulators in the kernel sum structure. Options vmstat recognizes the following options: -d Report disk transfer information as a separate section, in the form of transfers per second.
vmstat(1) vmstat(1) re at si so pi po fr de sr faults Address translation faults (without -S) Processes swapped in (with -S) Processes swapped out (with -S) Pages paged in Pages paged out Pages freed per second Anticipated short term memory shortfall Pages scanned by clock algorithm, per second Trap/interrupt rate averages per second over last 5 seconds.
vmstat(1) vmstat(1) CPU cpu us sy id 0 0 100 4. 0 5. b in 0 111 0 0 6. v 0 memory faults cpu w avm free sy cs us sy id 0 1158 430 18 7 0 0 100 page b in 0 111 0 108 memory faults cpu w avm free sy cs us sy id 0 1158 456 18 7 0 0 100 0 1221 436 65 18 0 1 99 si so pi po fr de sr 0 0 0 0 0 0 0 page re at pi po fr de sr 0 0 0 0 0 0 0 5 0 5 0 0 0 0 Display the default output twice in 80-column format at five-second intervals. Note that the headers are not repeated.
vmstat(1) avm 1219 CPU vmstat(1) free 425 cpu us sy id 1 8 92 re 0 r 0 at 0 procs b 0 pi 0 po 0 fr 0 de 0 sr 0 in 111 sy 54 cs 15 w 0 Disk Transfers device xfer/sec c0t6d0 0 c0t1d0 0 c0t3d0 0 c0t5d0 0 8. Display the number of forks and pages of virtual memory since boot-up. vmstat -f 24558 forks, 1471595 pages, average= 9. 59.92 Display the counts of paging-related events. vmstat -s 0 swap ins 0 swap outs 0 pages swapped in 0 pages swapped out 1344563 total address trans.
vt(1) vt(1) NAME vt - log into another system over lan SYNOPSIS /usr/bin/vt nodename [ lan_device ] /usr/bin/vt -p [ lan_device ] DESCRIPTION vt enables a user to log into another HP 9000 system (nodename) over an HP local area network. The -p option causes vt to send a poll request over the local area network to find out what systems currently have vtdaemon running (see vtdaemon(1M)). An asterisk (*) following a nodename in the response indicates that the system is a vt gateway.
vt(1) vt(1) DIAGNOSTICS The diagnostics produced by vt are intended to be self-explanatory. WARNINGS vt uses the Hewlett-Packard LLA (Link Level Access) direct interface to the HP network drivers. vt uses the multicast address 0x01AABBCCBBAA. It should not be used or deleted by other applications accessing the network. vt uses the following IEEE 802.
wait(1) wait(1) NAME wait - await process completion SYNOPSIS wait [ pid ] DESCRIPTION If no argument is specified, wait waits until all processes (started with &) of the current shell have completed, and reports on abnormal terminations. If a numeric argument pid is given and is the process ID of a background process, wait waits until that process has completed. Otherwise, if pid is not a background process, wait exits without waiting for any processes to complete.
wc(1) wc(1) NAME wc - count words, lines, and bytes or characters in a file SYNOPSIS wc [-c-m] [-lw] [file]... DESCRIPTION The wc command counts lines, words, and bytes or characters in the named files, or in the standard input if no file names are specified. It also keeps a total count for all named files. A word is a string of characters delimited by spaces, tabs, or newlines. Options wc recognizes the following options: -c Report the number of bytes in each input file.
wc(1) wc(1) WARNINGS The wc command counts the number of newlines to determine the line count. If a text file has a final line that is not terminated EXAMPLES Print the number of words and characters in file1 : wc -wm file1 The following is printed when the above command is executed: words chars file1 where words is the number of words and chars is the number of characters in file1 . STANDARDS CONFORMANCE wc: SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
what(1) what(1) NAME what - get SCCS identification information SYNOPSIS what [-s] file ... DESCRIPTION The what command searches the given files for all occurrences of the pattern that get(1) substitutes for %Z% (currently @(#) at this printing) and prints out what follows until the first ", >, new-line, \, or null character. For example, if the C program in file f.c contains char ident[] = "@(#)identification information "; and f.c is compiled to yield f.o and a.out , the command what f.c f.o a.
whereis(1) whereis(1) NAME whereis - locate source, binary, and/or manual for program SYNOPSIS whereis [-bsm ] [-u] [-BMS dir ... -f] name ... DESCRIPTION whereis locates source, binary, and manuals sections for specified files. The supplied names are first stripped of leading path name components and any (single) trailing extension of the form .ext (such as .c ). Prefixes of s. resulting from use of SCCS are also dealt with.
which(1) which(1) NAME which - locate a program file including aliases and paths SYNOPSIS which [ name ... ] DESCRIPTION For each name given, which searches for the file that would be executed if name were given as a command, and displays the absolute path of that file. Each argument is expanded if it is aliased, and searched for along the user’s path. Both aliases and path are determined by sourcing (executing) the user’s .cshrc file.
who(1) who(1) NAME who - who is on the system SYNOPSIS who [-muTlHqpdbrtasAR] [ file ] who am i who am I DESCRIPTION The who command can list the user’s name, terminal line, login time, elapsed time since input activity occurred on the line, the user’s host name, and the process-ID of the command interpreter (shell) for each current system user. It examines the /etc/utmp file to obtain its information. If file is given, that file is examined.
who(1) who(1) -d This option displays all processes that have expired and have not been respawned by init . The exit field appears for dead processes and contains the termination and exit values of the dead process (as returned by wait() — see wait(2)). This can be useful in determining why a process terminated. -b -r Indicates the time and date of the last reboot. -t Indicates the last change to the system clock (via the date command) by root . See su(1).
who(1) who(1) FILES /etc/inittab /etc/utmp /var/adm/wtmp SEE ALSO date(1), login(1), init(1M), mesg(1), su(1), gethostname(2), wait(2), gethostent(3N), inittab(4), utmp(4). STANDARDS CONFORMANCE who : SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
whoami(1) whoami(1) NAME whoami - print effective current user id SYNOPSIS whoami DESCRIPTION whoami prints your current user name, even if you have used su to change it since your initial login (see su(1)). The command who am i reports your initial login name because it uses /etc/utmp . FILES /etc/passwd name data base AUTHOR whoami was developed by the University of California, Berkeley. SEE ALSO who(1).
whois(1) whois(1) NAME whois - Internet user name directory service SYNOPSIS whois [-h hostname ] name DESCRIPTION whois looks up records in the Network Information Center database. The operands specified to whois are concatenated together (separated by white-space) and presented to the whois server.
write(1) write(1) NAME write - interactively write (talk) to another user SYNOPSIS write user [terminal] DESCRIPTION The write command copies lines from your terminal to that of another user. When first called, it sends the message: Message from yourname (yourterminal) [ date ] ... to the receiving user’s terminal. When it has successfully completed the connection, it also sends two bells to your own terminal to indicate that what you are typing is being sent.
write(1) write(1) Your correspondent sent end-of-file, or you set your terminal to mesg n and your correspondent tried to write to you. If you have a write session established, you can continue to write to your correspondent. Permission denied. The user you are trying to write to has denied write permission (with mesg n). Warning: You have your terminal set to "mesg -n". No reply possible. Your terminal is set to mesg n and the recipient cannot respond to you.
xargs(1) xargs(1) NAME xargs - construct argument list(s) and execute command SYNOPSIS xargs [ options ] [ command [ initial-arguments ] ] DESCRIPTION xargs combines the fixed initial-arguments with arguments read from standard input to execute the specified command one or more times. The number of arguments read for each command invocation and the manner in which they are combined are determined by the options specified.
xargs(1) xargs(1) -p Prompt mode: The user is asked whether to execute command prior to each invocation. Trace mode (-t ) is turned on to print the command instance to be executed, followed by a ?... prompt. An affirmative reply (by default, an affirmative reply is y optionally followed by anything) executes the command; anything else, including pressing Return, skips that particular invocation of command. -x Causes xargs to terminate if any argument list would be greater than size bytes.
xargs(1) xargs(1) Execute diff (see diff(1)) with successive pairs of arguments originally typed as shell arguments: echo $* | xargs -n2 diff SEE ALSO sh(1). STANDARDS CONFORMANCE xargs : SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
xstr(1) xstr(1) NAME xstr - extract strings from C programs to implement shared strings SYNOPSIS xstr [-c] [-] [ file ] DESCRIPTION xstr maintains a file strings into which strings in component parts of a large program are hashed. These strings are replaced with references to this common area. This serves to implement shared constant strings, which are most useful if they are also read-only.
yes(1) yes(1) NAME yes - be repetitively affirmative SYNOPSIS yes [ expletive ] DESCRIPTION yes repeatedly outputs y, or if expletive is given, the expletive is output repeatedly. Termination is by interrupt. AUTHOR yes was developed by the University of California, Berkeley.
ypcat(1) ypcat(1) NAME ypcat - print all values in Network Information Service map SYNOPSIS ypcat [-k] [-t] [-d domain ] mname ypcat -x Remarks The Network Information Service (NIS) was formerly known as Yellow Pages (YP). The functionality of the two remains the same; only the name has changed. DESCRIPTION ypcat prints all values in a Network Information Service (NIS) map specified by mname, which can be either a mapname or a map nickname.
ypmatch(1) ypmatch(1) NAME ypmatch - print values of selected keys in Network Information Service map SYNOPSIS ypmatch [-k] [-t] [-d domain] key [key ...] ypmatch -x mname Remarks The Network Information Service (NIS) was formerly known as Yellow Pages (yp). Although the name has changed, the functionality of the service remains the same. DESCRIPTION ypmatch prints the values associated with one or more keys in a Network Information Service (NIS) map specified by mname.
yppasswd(1) yppasswd(1) NAME yppasswd - change login password in Network Information System (NIS) SYNOPSIS yppasswd [name] Remarks The Network Information Service (NIS) was formerly known as Yellow Pages (YP). The functionality remains the same; only the name has changed. DESCRIPTION yppasswd changes or installs a password associated with the login name in the Network Information System (NIS). The NIS password can be different from the one on your own machine.
ypwhich(1) ypwhich(1) NAME ypwhich - list which host is Network Information System server or map master SYNOPSIS ypwhich ypwhich [-d domain ] [-V1 -V2 ] [ hostname ] ypwhich [-d domain ] [-t] [-m [ mname ] ] ypwhich -x Remarks The Network Information Service (NIS) was formerly known as Yellow Pages (yp). Although the name has changed, the functionality of the service remains the same.
(Notes) (Notes) y Section 1−−1078 Hewlett-Packard Company −1− HP-UX 11i Version 1: September 2005