HP-UX Reference (11i v1 05/09) - 7 Device (Special) Files, 9 General Information, Index (vol 10)

Index
All Volumes
Description Entry Name(Section)
secure RPC key, change user’s ............................................................................................................... chkey(1)
secure virtual partition environment; modify security related attributes in a ............................. vparadmin(1M)
secure_rpc() - library routines for secure remote procedure calls ........................................... secure_rpc(3N)
securenets - NIS map security file ............................................................................................. securenets(4)
securetty file ........................................................................................................................................ login(1)
security context between the application and a context acceptor; establish a ............ gss_accept_sec_context(3)
security context between the context initiator and a context acceptor; establish a
......................................................................................................................... gss_init_sec_context(3)
security context to another process on a single machine; transfer a ......................... gss_export_sec_context(3)
security context to another process on a single machine; transfer a ......................... gss_import_sec_context(3)
security context; delete a .......................................................................................... gss_delete_sec_context(3)
security context; obtain information about a .................................................................. gss_inquire_context(3)
security databases .............................................................................................................................. authcap(4)
security defaults configuration file ..................................................................................................... security(4)
security file for ftpd(1M) .................................................................................................................... ftpusers(4)
security file, inetd optional ............................................................................................................. inetd.sec(4)
security file; NIS map ................................................................................................................... securenets(4)
security files authorizing access by remote hosts and users on local host ...................................... hosts.equiv(4)
security mechanisms are available; allow an application to determine which underlying
.......................................................................................................................... gss_indicate_mechs(3)
security purposes, destroy mass storage data for (use -r option) ...................................................... mediainit(1)
security related attributes in a secure virtual partition environment; modify ............................. vparadmin(1M)
security - security defaults configuration file .................................................................................. security(4)
Security Service, GSSAPI shared library ............................................................................................... libgss(3)
security service; process a context to the ........................................................... gss_process_context_token(3)
security, audio ........................................................................................................................................ audio(5)
sed - stream text editor ............................................................................................................................. sed(1)
see - access bytes in the HP SCSI disk array controller EEPROM .......................................................... see(1M)
seek; move read/write file pointer; .......................................................................................................... lseek(2)
seekdir() - set position of next readdir() operation on named directory stream ...................... directory(3C)
seetreuid() - set real and effective user IDs .................................................................................. setreuid(2)
segment identifiers in the system, number of System V shared memory ............................................ shmmni(5)
segment, get shared memory ............................................................................................................... shmget(2)
segment, maximum size (in bytes) for a System V shared memory .................................................... shmmax(5)
select code ......................................................................................................................................... glossary(9)
select() - STREAMS enhancements to standard system calls ........................................................... stream(2)
select() - synchronous I/O multiplexing ............................................................................................. select(2)
select users to audit ......................................................................................................................... audusr(1M)
select/reject lines common to two sorted files ......................................................................................... comm(1)
selected characters, alter, delete, modify, substitute, translate ..................................................................... tr(1)
selected fields of each line in a file, cut out (extract) ................................................................................... cut(1)
selected keys in Network Information Service map, print the values of ............................................ ypmatch(1)
selectively recover files from backup media .................................................................................... frecover(1M)
self-auditing process, write audit record for ..................................................................................... audwrite(2)
sem_close() close a named semaphore ...................................................................................... sem_close(2)
sem_destroy() destroy an unnamed semaphore ................................................................... sem_destroy(2)
sem_getvalue() read a POSIX semaphore .......................................................................... sem_getvalue(2)
sem_init() initialize an unnamed semaphore .............................................................................. sem_init(2)
sem_open() open/create a named semaphore .............................................................................. sem_open(2)
sem_post() unlock a POSIX semaphore ...................................................................................... sem_post(2)
sem_trywait() lock a POSIX semaphore without blocking ......................................................... sem_wait(2)
sem_unlink() unlink a named semaphore .............................................................................. sem_unlink(2)
sem_wait() lock a POSIX semaphore .......................................................................................... sem_wait(2)
semantics, localedef-command input script format and ................................................................ localedef(4)
semaphore control operations ............................................................................................................... semctl(2)
semaphore identifier (semid) ............................................................................................................. glossary(9)
semaphore in mapped file or anonymous memory region, initialize ................................................ msem_init(2)
semaphore in mapped file or anonymous region, remove ......................................................... msem_remove(2)
semaphore operation permissions ...................................................................................................... glossary(9)
semaphore operations ........................................................................................................................... semop(2)
semaphore set identifier, remove ........................................................................................................... ipcrm(1)
HP-UX 11i Version 1: September 2005 Hewlett-Packard Company Index149