HP-UX Reference (11i v1 05/09) - 1 User Commands N-Z (vol 2)
r
rcp(1) rcp(1)
NAME
rcp - remote file copy
SYNOPSIS
Copy Single File
rcp [-p][-S size ][
-R size ] source_file1 dest_file
Copy Multiple Files
rcp [-p][-S size ][
-R size ] source_file1 [source_file2]... dest_dir
Copy One or More Directory Subtrees
rcp [-p][-S size ][
-R size ] -r source_dir1 [source_dir2]... dest_dir
Copy Files and Directory Subtrees
rcp [-p][-S size ][
-R size ] -r file_or_dir1 [file_or_dir2]... dest_dir
In Kerberos V5 Network Authentication Environments:
Copy Single File
rcp [-k realm ][-P][-p][-S size ][
-R size ] source_file1 dest_file
Copy Multiple Files
rcp [-k realm ][-P][-p][-S size ][-R
size ] source_file1 [source_file2]... dest_dir
Copy One or More Directory Subtrees
rcp [-k realm ][-P][-p][-S size ][-R
size ] -r source_dir1 [source_dir2]... dest_dir
Copy Files and Directory Subtrees
rcp [-k realm ][-P][-p][-S size ][-R
size ] -r file_or_dir1 [file_or_dir2]... dest_dir
DESCRIPTION
The
rcp command copies files, directory subtrees, or a combination of files and directory subtrees from one
or more systems to another. In many respects, it is similar to the cp command (see cp(1)).
To use
rcp, you must have read access to files being copied, and read and search (execute) permission on
all directories in the directory path. Note that there are special requirements for third-party transfers,
which are described in the Third-Party Transfers section below.
In a Kerberos V5 Network Authentication environment,
rcp uses the Kerberos V5 protocol while initiat-
ing the connection to a remote host. The authorization mechanism is dependent on the command line
options used to invoke
remshd on the remote host (i.e., -K, -R, -r,or
-k). Kerberos authentication
and authorization rules are described in the Secure Internet Services man page, sis(5).
Although Kerberos authentication and authorizations may apply, the Kerberos mechanism is not applied
when copying files. The files are still transferred in clear text over the network.
The
fallback option can be set in the krb5.conf file within the [appdefaults] section. (For more
information on the [appdefaults] section, refer to the krb5.conf(4) manpage in the Kerberos Client product).
If the
fallback option is set to true and the Kerberos authentication fails,
rcp uses the non-secure
mode of authentication.
NOTE: Command line options override the configuration file options.
NOTE: The Kerberos authentication and authorization mechanism is not supported in IPv6 enabled sys-
tems.
Options and Arguments
rcp recognizes the following options and arguments:
source_file
source_dir
This option specifies the name of an existing file or directory on a local or remote
machine that you want to be copied to a specified destination. The source file and
directory names are constructed as follows:
user_name@hostname:pathname/filename
or
user_name@hostname:pathname/dirname
HP-UX 11i Version 1: September 2005 − 1 − Hewlett-Packard Company Section 1−−803