HP-UX Reference Section 1: User Commands (A-M) HP-UX 11i Version 2 Volume 1 of 9 Manufacturing Part Number : B2355-90779 Printed In USA E0803 Printed in USA © Copyright 1983-2003 Hewlett-Packard Development Company LP.
Legal Notices The information in this document is subject to change without notice. Hewlett-Packard makes no warranty of any kind with regard to this manual, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. Hewlett-Packard shall not be held liable for errors contained herein or direct, indirect, special, incidental or consequential damages in connection with the furnishing, performance, or use of this material.
Copyright 1980, 1984, 1986 Novell, Inc. Copyright 1985, 1986, 1988 Massachusetts Institute of Technology Copyright 1986-2000 Sun Microsystems, Inc. Copyright 1988 Carnegie Mellon University Copyright 1989-1991 The University of Maryland Copyright 1989-1993 The Open Software Foundation, Inc. Copyright 1990 Motorola, Inc. Copyright 1990-1992 Cornell University Copyright 1991-2003 Mentat, Inc. Copyright 1996 Morning Star Technologies, Inc. Copyright 1996 Progressive Systems, Inc.
Revision History This document’s printing date and part number indicate its edition. The printing date changes when a new edition is printed. (Minor corrections and updates which are incorporated at reprint do not cause the date to change.) New editions of this manual incorporate all material updated since the previous edition. Part Number Date, Release, Format, Distribution B2355-60103 August 2003. HP-UX release 11i version 2, one volume HTML, docs.hp.com and Instant Information.
manpage itself. From the HP-UX command line, you can enter “man audit” or “man 5 audit” to view the manpage. See man (1). Book Title The title of a book. On the web and on the Instant Information CD, it may be a hot link to the book itself. KeyCap The name of a keyboard key. Note that Return and Enter both refer to the same key. Emphasis Text that is emphasized. Emphasis Text that is strongly emphasized. ENVIRONVAR The name of an environment variable.
vi
Preface HP-UX is the Hewlett-Packard Company’s implementation of an operating system that is compatible with various industry standards. It is based on the UNIX System V Release 4 operating system and includes important features from the Fourth Berkeley Software Distribution. The nine volumes of this manual contain the system reference documentation, made up of individual entries called manpages, named for the man command that displays them on the system.
viii
Volume One Table of Contents Section 1
Volume One Table of Contents Section 1
Table of Contents Volumes One and Two Section 1: User Commands Entry Name(Section): name Description intro(1): intro ................................................... introduction to command utilities and application programs adb(1): adb ............................................................................................................................ absolute debugger adjust(1): adjust ............................................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description co(1): co ........................................................................................................................ check out RCS revisions col(1): col ........................................................................................... filter reverse line-feeds and backspaces comb(1): comb ...................................................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description elm(1): elm ........................................................... process electronic mail through a screen-oriented interface elmalias(1): elmalias .................................................................. display/verify elm user and system aliases enable(1): enable, disable ..................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description grget: get password and group information ................................................................................... see pwget(1) groups(1): groups .................................................................................................... show group memberships hashcheck : create hash codes from compressed spelling list .........................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description limit: limit usage by current process .................................................................................................. see csh(1) line(1): line ........................................................................................................ read one line from user input listusers(1): listusers ...............................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description nice: alter command priority ............................................................................................................... see csh(1) nice(1): nice ......................................................................................... run a command at nondefault priority nis+(1): nis+ .................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description prmail(1): prmail .......................................................................... print out mail in the incoming mailbox file prof(1): prof ....................................................................................................................... display profile data prs(1): prs ....................................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description set: set/define options and arguments ................................................................................................. see ksh(1) set: set/define options and arguments ......................................................................................... see sh-posix(1) setacl(1): setacl .......................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description ttytype(1): ttytype ........................................................................................ terminal identification program typeset: control leading blanks and parameter handling .................................................................. see ksh(1) typeset: control leading blanks and parameter handling ..........................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description wait: wait for child process .................................................................................................................. see ksh(1) wait: wait for child process ......................................................................................................... see sh-posix(1) wait(1): wait ..........................................................................................................
Section 1 Part 1 User Commands A-M
Section 1 Part 1 User Commands A-M
intro(1) intro(1) NAME intro - introduction to command utilities and application programs DESCRIPTION This section describes commands accessible by users, as opposed to system calls in Section (2) or library routines in Section (3), which are accessible by user programs.
intro(1) intro(1) the effect of language-related environment variables on system behavior, and other related information. NETWORKING FEATURES Information under this heading is applicable only if you are using the networking feature described there (such as NFS). A A RETURN VALUE Discusses various values returned upon completion of program calls. DIAGNOSTICS Discusses diagnostics indications that may be produced. Self-explanatory messages are not listed.
adb(1) adb(1) NAME adb - absolute debugger SYNOPSIS adb [-h] adb [-n-o] [-w] [-I path ] kernelfile memfile adb [-n-o] [-w] [-I path ] kernelfile crashdir adb [-n-o] [-w] [-I path ] crashdir A adb [-n-o] [-w] [-I path ] [objfile ] [corefile ] adb [-n-o] [-w] [-I path ] -P pid [execfile ] DESCRIPTION The adb command executes a general-purpose debugging program that is sensitive to the underlying architecture of the processor and operating system on which it is run It can be used to examine files and
adb(1) adb(1) .:/usr/lib/adb. A aA -n Specify the normal mode. This is the default on Itanium systems. This option is mutually exclusive with the -o option. The last one specified takes effect. -o Specify backward compatibility mode. This is the default on PA-RISC systems. This option is mutually exclusive with the -n option. The last one specified takes effect. -P pid Adopt process with process ID pid as a ‘‘traced’’ process; see ttrace (2).
adb(1) adb(1) Here is a list of variables supported in both modes. 9 The count on the last $< command. b The base address of the data segment. d The data segment size. t The text segment size. e The entry point. s The stack segment size. m The ‘‘magic’’ number as defined in A On entry, b, d, and t are set from the headers in the current memory file. If the current memory file does not appear to be valid these values are set from the current object file.
adb(1) • • • • adb(1) Keyword commands Process commands Thread commands Shell commands In backward compatibility mode: • A aA Variable commands File commands These commands operate on the current object file or the current memory file and are used to read, write, etc. file_selector [ modifier ] [ ,size | index ] [arglist ] The file_selector can be one of these: ? The selected file is the current object file. / The selected file is the current memory file.
adb(1) adb(1) m It has same behavior as modifier > with an implicit index of 0. *m It has same behavior as modifier > with an implicit index of 1. For these modifiers, no explicit size or index can be mentioned. These modifiers are deprecated. Keyword Commands Run the Keyword Command Form using the traditional command form by prefixing the command with $. Please refer to Keyword Form Commands for the complete list of keyword commands. Process Commands These commands deal with managing subprocesses.
adb(1) adb(1) en [ num | * ] Enables all breakpoints at address in the current subprocess, if it is specified. If * is specified, it enables all the current subprocess breakpoints. If num is specified, breakpoint with number num is enabled. di [ num | * ] Disables all breakpoints at address in the current subprocess, if it is specified. If * is specified, it disables all the current subprocess breakpoints. If num is specified, breakpoint with number num is disabled.
adb(1) adb(1) Keyword Form Commands All commands in this form consist of a keyword followed by a variable number of arguments. In backward compatibility mode, a $ must precede these keyword form commands. < filename Reads commands from filename . If this command is executed in a file, further commands in the file are not seen. In backward compatibility mode, if a count is given, it is placed in variable 9 before the first command in the file is executed. This behavior is deprecated.
adb(1) A aA adb(1) v Print the value of all variables. m Print the address map. This includes both the initial and default maps for a valid corefile with an indication of which is currently active. z Print a list of signals and how they are handled for the current subprocess. zt Print a list of signals, their associated flags, and how they are handled for the current thread. k Print all DLKM modules or shared libraries.
adb(1) adb(1) pspec This is available only for the printf-style format string. It is a sequence of flags, fieldwidth and precision as in the printf (3S) library function. size specifier character This specifies the size of object to which this is applied. Size can be specified in two ways. One is using absolute size specifier and other is relative size specifier. Absolute size specifiers are as follows. b The size of the object is 1 byte. e The size of the object is 2 bytes.
adb(1) adb(1) z Decrement dotincr by count times size. For example: =5bv, =5bv5bz Backward Compatibility Mode In backward compatibility mode, the traditional style can be a conversion specifier , dot operator , spacing specifier , or a literal string . 1. Conversion Specifier A aA A conversion specifier consists of an optional count followed by a conversion specifier character . count Specify the number of times this conversion specifier is to be repeated. If not specified, count is assumed to be 1.
adb(1) adb(1) A dot operator consists of an optional count followed by a dot operator character. count Same as that of count of conversion specifier. Dot operator character A dot operator character is one of these: ^ dotincr is decreased by count times size corresponding to the previous conversion specifier character. + dotincr is increased by count. - dotincr is decreased by count. For example: A 10=-, 10=2-, 10=5o4ˆ 3.
adb(1) adb(1) Note adb64 is a symbolic link to adb. This symbolic link is maintained for backward compatibility with some old scripts which may be using adb64. EXTERNAL INFLUENCES International Code Set Support Single- and multi-byte character code sets are supported. A aA RETURN VALUE adb comments about inaccessible files, syntax errors, abnormal termination of commands, etc. Exit status is 0 unless the last command failed or returned non-zero status. AUTHOR adb was developed by HP. FILES a.
adjust(1) adjust(1) NAME adjust - simple text formatter SYNOPSIS adjust [-b] [-c|-j|-r ] [-m column ] [-t tabsize ] [ files ... ] DESCRIPTION The adjust command is a simple text formatter for filling, centering, left and right justifying, or only right justifying text paragraphs, and is designed for interactive use. It reads the concatenation of input files (or standard input if none are given) and produces on standard output a formatted version of its input, with each paragraph formatted separately.
adjust(1) adjust(1) adjust also has a rudimentary understanding of tagged paragraphs (such as this one) when filling. If the second line of a paragraph is indented more than the first, and the first line has a word beginning at the same indentation as the second line, the input column position of the tag word or words (prior to the one matching the second line indentation) is preserved. * Tag words are passed through without change of column position, even if they extend beyond the right margin.
adjust(1) adjust(1) WARNINGS This program is designed to be simple and fast. It does not recognize backslash to escape white space or other characters. It does not recognize tagged paragraphs where the tag is on a line by itself. It knows that lines end in newline or null, and how to deal with tabs and backspaces, but it does not do anything special with other characters such as form feed (they are simply ignored). For complex operations, standard text processors are likely to be more appropriate.
admin(1) admin(1) NAME admin - create and administer SCCS files SYNOPSIS admin -i[name] [-n] [-b] [-a login ] ... [-d flag[flag-val ] ] ... [-f flag[flag-val ] ] ... [-m mrlist ] ... [-r rel ] [-t[name] ] [-y[comment ] ] file ... admin -n [-a login ] ... [-d flag[flag-val ] ] ... [-f flag[flag-val ] ] ... [-m mrlist ] ... [-t[name] ] [-y[comment ] ] file ... A aA admin [-a login ] ... [-e login ] ... [-d flag[flag-val ] ] ... [-m mrlist ] ... [-r rel ] [-t[name] ] file ... admin -h file ...
admin(1) -f flag admin(1) This option specifies a flag, and possibly a value for the flag, to be placed in the SCCS file. Several -f options can be supplied on a single admin command line. The allowable flags and their values are: b Allows use of the -b option on a get command (see get (1)) to create branch deltas. cceil The highest release (i.e., "ceiling"), a number less than or equal to 9999, which can be retrieved by a get command for editing. The default value for an unspecified c flag is 9999.
admin(1) admin(1) -d flag A aA v[pgm] Causes delta to prompt for Modification Request (MR) numbers as the reason for creating a delta. The optional value specifies the name of a (MR) number validity checking program (see delta (1)). (If this flag is set when creating an SCCS file, the m option must also be used even if its value is null). x Causes get to create files with execute permissions. Causes removal (deletion) of the specified flag from an SCCS file.
admin(1) admin(1) If LC_CTYPE or LC_MESSAGES is not specified in the environment or is set to the empty string, the value of LANG is used as a default for each unspecified or empty variable. If LANG is not specified or is set to the empty string, a default of C (see lang (5)) is used instead of LANG. If any internationalization variable contains an invalid setting, admin behaves as if all internationalization variables are set to C. See environ (5).
answer(1) answer(1) NAME answer - phone message transcription system SYNOPSIS answer [-pu] DESCRIPTION The answer interactive program helps you to transcribe telephone (and other) messages into electronic mail. A aA The program uses your personal elm alias database and the system elm alias database, allowing you to use aliases to address the messages. Options answer supports the following options: -p Prompt for phone-slip-type message fields. -u Allow addresses that are not aliases.
answer(1) answer(1) > And here is the message. > ----------------------------------------------------------------Message to: albert einstein Sorry, could not find ’albert einstein’ [a_einstein] in list! Message to: john jones address ’mrjones@companybee.com (John P. Jones)’ A Enter message for john jones ending with a blank line.
answer(1) answer(1) $HOME/.elm/aliases.pag $HOME/.elm/aliases.text /var/mail/.elm/aliases /var/mail/.elm/aliases.dir /var/mail/.elm/aliases.pag /var/mail/.elm/aliases.text /tmp/snd.pid User alias database hash table User alias source text System alias database data table System alias database directory table System alias database hash table System alias source text Outbound mail message edit buffer AUTHOR A aA answer was developed by HP. SEE ALSO elm(1), newalias(1).
ar(1) ar(1) NAME ar - create and maintain portable archives and libraries SYNOPSIS ar [-]key [-][modifier ...] [posname ] afile [name ...] DESCRIPTION The ar command maintains groups of files combined into a single archive file. Its main use is to create and update library files as used by the link editor (see ld(1)). It can be used, however, for any similar purpose. The magic string and file headers used by ar consist of printable ASCII characters.
ar(1) ar(1) x Extract the named files. If no names are given, all files in the archive are extracted. In neither case does x alter entries from the archive file. The following list describes the optional modifier characters: A aA a Position the files after the existing positioning file specified by posname . b Place the new files before the existing positioning file specified by posname . c Suppress the message normally produced when afile is created.
ar(1) ar(1) q: t: p: x: v, f, F, l, c, A, z, s v, f, F, s v, f, F, s v, f, F, s, C, T EXTERNAL INFLUENCES Environment Variables The following internationalization variables affect the execution of ar: LANG Determines the locale category for native language, local customs and coded character set in the absence of LC_ALL and other LC_* environment variables. If LANG is not specified or is set to the empty string, a default of C (see lang (5)) is used instead of LANG.
ar(1) ar(1) where the single quote marks indicate updated files. The first command says "move f2 and f3 after f1 in newlib .a", thus creating the order: f1 f3 f2 f4 Note that the relative order of f2 and f3 has not changed. The second command says "move f3 after f2 in newlib.a", creating the order: f1 f2 f3 f4 A aA The third command then replaces files f2 and f3. Since files f2 and f3 both already existed in the archive, this sequence of commands could not be simply replaced by: ar ra f1 newlib.
as(1) as(1) (Itanium(R)-based System Only) NAME as - assembler (Itanium Processor Family) SYNOPSIS as [ option ...] [ file ] DESCRIPTION as assembles the named source file file , or the standard input if file is not specified. The output of the assembler is an ELF relocatable object file that must be processed by ld before it can be executed. Assembler output is stored in file outfile . If the -o outfile option is not specified, the assembler constructs a default name.
asa(1) asa(1) NAME asa - interpret ASA carriage control characters SYNOPSIS asa [files ] A aA DESCRIPTION asa interprets the output of FORTRAN programs that utilize ASA carriage control characters. It processes either the files whose names are given as arguments, or the standard input if - is specified or if no file names are given. The first character of each line is assumed to be a control character.
at(1) at(1) NAME at, batch - execute batched commands immediately or at a later time SYNOPSIS Enter commands from standard input to run at a specified time: at [-m] [ -q queue ] -t spectime commands eof at [-m] [-q queue ] time [date ] [next timeunit +count timeunit ] commands eof A Enter commands from a file to run at a specified time: at -f job-file [-m] [-q queue ] -t spectime at -f job-file [-m] [-q queue ] time [date ] [next timeunit +count timeunit ] List scheduled jobs: at -d job-id ...
at(1) at(1) appropriate privileges is able to display information about all jobs. A -f job-file Read in the commands contained in job-file instead of using standard input. -l [job-id ...] List the jobs specified. If no job-id s are given, all jobs are listed. -m Send mail to the invoking user after the job has run, announcing its completion. Unless redirected elsewhere within the job, standard output and standard error produced by the job are automatically mailed to the user as well.
at(1) at(1) unit characters can be present. A field having a value greater than 31 is treated as the year field and the remaining two fields in the date string are treated as month and day fields. Otherwise, if a given date is ambiguous (such as 2/5 or 2/5/10), the D_T_FMT string (if defined in langinfo (5)) is used to resolve the ambiguity. Two special days, today and tomorrow, are also recognized.
at(1) at(1) LC_MESSAGES also determines the language in which the words days, hours, midnight, minutes, months, next, noon, now, today, tomorrow, weeks, years, and their singular forms can also be specified. IF LC_TIME or LC_MESSAGES is not specified in the environment or is set to the empty string, the value of LANG is used as a default for each unspecified or empty variable. If LANG is not specified or is set to the empty string, a default of "C" (see lang (5)) is used instead of LANG.
at(1) at(1) at at at at at at at at at 0815 Jan 24 8:15 Jan 24 9:30am tomorrow now + 1 day -f job 5 pm Friday 17:40 Tor. 17h46 demain 5:30 26. Feb. 1988 12:00 26-02 # # # # in in in in Danish French German Finnish WARNINGS If the date argument begins with a number and the time argument is also numeric without a suffix, the time argument should be a four-digit number that can be correctly interpreted as hours and minutes.
attributes(1) attributes(1) NAME attributes - describe an audio file SYNOPSIS /opt/audio/bin/attributes filename DESCRIPTION This command provides information about an audio file, including file format, data format, sampling rate, number of channels, data length and header length. A aA EXAMPLE The following is an example of using attributes on an audio file supplied with HP-UX. $ /opt/audio/bin/attributes /opt/audio/sounds/welcome.au File Name: /opt/audio/sounds/welcome.
awk(1) awk(1) NAME awk - pattern-directed scanning and processing language SYNOPSIS awk [-Ffs ] [-v var =value ] [ program -f progfile ... ] [ file ... ] DESCRIPTION awk scans each input file for lines that match any of a set of patterns specified literally in program or in one or more files specified as -f progfile . With each pattern there can be an associated action that is to be performed when a line in a file matches the pattern.
awk(1) awk(1) The print statement prints its arguments on the standard output (or on a file if >file or >>file is present or on a pipe if |cmd is present), separated by the current output field separator, and terminated by the output record separator. file and cmd can be literal names or parenthesized expressions. Identical string values in different statements denote the same open file. The printf statement formats its expression list according to the format (see printf (3)).
awk(1) awk(1) A pattern can consist of two patterns separated by a comma; in this case, the action is performed for all lines from an occurrence of the first pattern though an occurrence of the second. A relational expression is one of the following: expression matchop regular-expression expression relop expression expression in array-name (expr,expr,... ) in array-name where a relop is any of the six relational operators in C, and a matchop is either ˜ (matches) or !˜ (does not match).
awk(1) awk(1) The arguments in ARGV can be modified or added to; ARGC can be altered. As each input file ends, awk will treat the next non-null element of ARGV, up to the current value of ARGC-1, inclusive, as the name of the next input file. Thus, setting an element of ARGV to null means that it will not be treated as an input file. The name - indicates the standard input.
awk(1) awk(1) In addition, all environment variables will be visible via the awk variable ENVIRON. International Code Set Support Single- and multi-byte character code sets are supported except that variable names must contain only ASCII characters and regular expressions must contain only valid characters. DIAGNOSTICS awk supports up to 199 fields ($1, $2, ..., $199) per record.
banner(1) banner(1) NAME banner - make posters in large letters SYNOPSIS banner strings DESCRIPTION banner prints its arguments (each up to 10 characters long) in large letters on the standard output. Each argument is printed on a separate line. Note that multiple-word arguments must be enclosed in quotes in order to be printed on the same line.
basename(1) basename(1) NAME basename, dirname - extract portions of path names SYNOPSIS basename string [ suffix ] dirname [ string ] DESCRIPTION basename deletes any prefix ending in / and the suffix (if present in string ) from string , and prints the result on the standard output. If string consists entirely of slash characters, string is set to a single slash character. If there are any trailing slash characters in string , they are removed.
bc(1) bc(1) NAME bc - arbitrary-precision arithmetic language SYNOPSIS bc [-c] [-l] [ file ... ] DESCRIPTION bc is an interactive processor for a language that resembles C but provides unlimited-precision arithmetic. It takes input from any files given, then reads the standard input. A bA Options: bc recognizes the following command-line options: -c Compile only. bc is actually a preprocessor for dc which bc invokes automatically (see dc(1)).
bc(1) bc(1) Statements E { S ; ... ; S } if ( R ) S while ( R ) S for ( E ; R ; E ) S null statement break quit Function Definitions: define L ( L ,..., L ) { auto L, ... , L S; ... S return ( E ) } A Functions in − l Math Library: Functions in the -l math library include: s(x) c(x) e(x) l(x) a(x) j(n,x) sine cosine exponential log arctangent Bessel function All function arguments are passed by value. Trigonometric angles are in radians where 2 pi radians = 360 degrees.
bc(1) bc(1) for(i=1; i<=10; i++) e(i) WARNINGS There are currently no && (AND) or || (OR) comparisons. The for statement must have all three expressions. quit is interpreted when read, not when executed. bc’s parser is not robust in the face of input errors. Some simple expression such as 2+2 helps get it back into phase. A bA The assignment operators: =+ =- =* =/ =% and =ˆ are obsolete.
bdiff(1) bdiff(1) NAME bdiff - diff for large files SYNOPSIS bdiff file1 file2 [ n ] [-s] DESCRIPTION bdiff compares two files and produces output identical to what would be produced by diff (see diff(1)), specifying changes that must be made to make the files identical. bdiff is designed for handling files that are too large for diff, but it can be used on files of any length. bdiff processes files as follows: A • Ignore lines common to the beginning of both files.
bdiff(1) bdiff(1) FILES /tmp/bd?????? SEE ALSO diff(1).
bs(1) bs(1) NAME bs - a compiler/interpreter for modest-sized programs SYNOPSIS bs [ file [ args ] ] DESCRIPTION bs is a remote descendant of BASIC and SNOBOL4 with some C language added. bs is designed for programming tasks where program development time is as important as the resulting speed of execution. Formalities of data declaration and file/process manipulation are minimized. Line-at-a-time debugging, the trace and dump statements, and useful run-time error messages all simplify program testing.
bs(1) bs(1) does not cause stored statements to execute (see run below). for name = expression expression statement for name = expression expression ... next for expression , expression , expression statement for expression , expression , expression ... The for statement repetitively executes a statement (first form) or a group of statements (second form) under control of a named variable.
bs(1) bs(1) stop Execution of internal statements is stopped. bs reverts to immediate mode. trace [expression] The trace statement controls function tracing. If the expression is null (or evaluates to zero), tracing is turned off. Otherwise, a record of user-function calls/returns is printed. Each return decrements the trace expression value. while expression statement while expression ... next while is similar to continuation is given.
bs(1) A bA bs(1) ++ name Increments the value of the variable (or array reference). The result is the new value. - - name Decrements the value of the variable. The result is the new value. !expression The logical negation of the expression. Watch out for the shell escape command. expression operator expression Common functions of two arguments are abbreviated by the two arguments separated by an operator denoting the function.
bs(1) bs(1) always possible to know whether a is a number or a string when the format call is coded, coercing a to the type required by f by either adding zero (for e or f format) or concatenating (_) the null string (for s format) should be considered. index(x , y ) returns the number of the first position in x that any of the characters from y matches. No match yields zero. trans(s , f, t ) Translates characters of the source s from matching characters in f to a character in the same position in t .
bs(1) bs(1) not defined, the interrogation operator should be used to detect end-of-table; for example: table("t", 100) ... # If word contains "party", the following expression adds one # to the count of that word: ++t[word] ... # To print out the the key/value pairs: for i = 0, ?(s = item(t, i)), ++i if key() put = key()_":"_s A If the interrogation operator is not used, the result of item is null if there are no further elements in the table. Null is, however, a legal ‘‘subscript’’.
bs(1) bs(1) plot(12, 1.0, 1.0, 0.0, 0.0). Some requests do not apply to all plotters. All requests except zero and twelve are implemented by piping characters to tplot . Each statement executed from the keyboard re-invokes tplot, making the results unpredictable if a complete picture is not done in a single operation. Plotting should thus be done either in a function or a complete program, so all the output can be directed to tplot in a single stream.
bs(1) bs(1) ... while ?(write = read) ... # close "read" and "write": close("read") close("write") A bA # Pipe between commands. open("ls", "!ls *", "r") open("pr", "!pr -2 -h ’List’", "w") while ?(pr = ls) ... ... # be sure to close (wait for) these: close("ls") close("pr") WARNINGS The graphics mode (plot ...) is not particularly useful unless the tplot command is available on your system. bs is not tolerant of some errors.
cal(1) cal(1) NAME cal - print calendar SYNOPSIS cal [ [ month ] year ] DESCRIPTION cal prints a calendar for the specified year. If a month is also specified, a calendar just for that month is printed. If neither is specified, a calendar for the present month is printed. year can be between 1 and 9999. month is a decimal number between 1 and 12. The calendar produced is a Gregorian calendar.
calendar(1) calendar(1) NAME calendar - reminder service SYNOPSIS calendar [-] DESCRIPTION calendar consults the file calendar in the current directory and prints out lines containing today’s or tomorrow’s date anywhere in the line. On weekends, ‘‘tomorrow’’ extends through Monday. A cA When a - command-line argument is present, calendar searches for the file calendar in each user’s home directory, and sends any positive results to the user by mail (see mail (1)).
calendar(1) calendar(1) LANG=en_GB.roman8 On 20 Jan. code review Jim’s birthday is on the 3. February 30/3/87 - quarter end review 26-4 Management council meeting at 1:00 pm It is first of the month ( 1/* ); status report due. WARNINGS To get reminder service, either your calendar must be public information or you must run calendar from your personal crontab file, independent of any calendar - run systemwide. Note that if you run calendar yourself, the calendar file need not reside in your home directory.
cat(1) cat(1) NAME cat - concatenate, copy, and print files SYNOPSIS cat [-benrstuv] file ... DESCRIPTION cat reads each file in sequence and writes it on the standard output. Thus: cat file prints file on the default standard output device; cat file1 file2 > file3 A cA concatenates file1 and file2 , and places the result in file3 . If - is appears as a file argument, cat uses standard input. To combine standard input and other files, use a combination of - and file arguments.
cat(1) cat(1) International Code Set Support Single- and multi-byte character code sets are supported. RETURN VALUE Exit values are: 0 >0 Successful completion. Error condition occurred.
cc_bundled(1) cc_bundled(1) (Bundled C Compiler - Limited Functionality) NAME cc - bundled C compiler SYNOPSIS cc [options ] files DESCRIPTION This manual page describes the Bundled C compiler. source code is compiled directly to object code. cc invokes the HP-UX bundled C compiler. C The command uses the ctcom (Itanium(R)-based systems) or ccom (PA-RISC, Precision Architecture) compiler for preprocessing, syntax and type checking, as well as for code generation.
cc_bundled(1) cc_bundled(1) (Bundled C Compiler - Limited Functionality) The following options are recognized by cc: -b Cause the linker, ld, to create a shared library rather than a normal executable file. For details see ld(1), HP-UX Linker and Libraries Online User’s Guide and the Programming on HP-UX manual. -c Suppress the link edit phase of the compilation, and force an object (.o) file to be produced for each .c or .i file even if only one program is compiled.
cc_bundled(1) cc_bundled(1) (Bundled C Compiler - Limited Functionality) Suppress warning messages. -w -Wx ,arg1[,arg2...] Pass the comma-separated argument(s) to subprocess x, where x can assume one of the values listed under the -t option as well as d (driver program) but not x (all subprocesses). The -W option specification allows additional, implementation-specific options to be recognized by the compiler driver. Itanium-based Systems Only Options -z Do not bind anything to address zero.
cc_bundled(1) cc_bundled(1) (Bundled C Compiler - Limited Functionality) Options (other) Any other options that are not defined will generate a warning to standard error. Other arguments are taken to be HP C compatible object files, typically produced by an earlier cc run, or perhaps libraries of HP cc compatible routines. These files, together with the results of any compilations specified, are linked (in the order given) to produce an executable program with the name a.out.
cc_bundled(1) cc_bundled(1) (Bundled C Compiler - Limited Functionality) /usr/ccs/bin/cc C driver /usr/ccs/bin/cc_bundled C driver /usr/ccs/lbin/ctcom C Compiler (Itanium-based systems) /usr/ccs/lbin/ccom C Compiler (PA-RISC) /usr/ccs/lbin/cpp preprocessor, to assemble .s files /usr/lib/nls/msg/$LANG/aCC.cat C compiler message catalog (Itanium-based systems) /usr/lib/nls/msg/$LANG/cc.
cc_bundled(1) cc_bundled(1) (Bundled C Compiler - Limited Functionality) System Tools as (1) cpp (1) cc(1) ld(1) translate assembly code to machine code invoke the C language preprocessor C compiler invoke the link editor Miscellaneous strip (1) crt0 (3) end(3C) exit (2) strip symbol and line number information from an object file execution startup routine symbol of the last locations in program termination of a process Tutorials and Standards Documents American National Standard for Information Syste
cd(1) cd(1) NAME cd - change working directory SYNOPSIS cd [ directory ] DESCRIPTION If directory is not specified, the value of shell parameter HOME is used as the new working directory. If directory specifies a complete path starting with /, ., or .., directory becomes the new working directory. If neither case applies, cd tries to find the designated directory relative to one of the paths specified by the CDPATH shell variable.
cd(1) >0 cd(1) An error occurred. The working directory remains unchanged. SEE ALSO csh(1), pwd(1), ksh(1), sh-posix(1), sh(1), chdir(2). STANDARDS CONFORMANCE cd: SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
cdc(1) cdc(1) NAME cdc - change the delta commentary of an SCCS delta SYNOPSIS cdc -r SID [-m[ mrlist ] ] [-y[ comment ] ] files DESCRIPTION The cdc command changes the delta commentary, for the SID specified by the -r option, of each named SCCS file. Delta commentary is defined to be the Modification Request (MR) and comment information normally specified via the delta (1) command (-m and -y options).
cdc(1) cdc(1) International Code Set Support Single- and multi-byte character code sets are supported. DIAGNOSTICS Use sccshelp (1) for explanations. EXAMPLES Add bl78-12345 and bl79-00001 to the MR list, remove bl77-54321 from the MR list, and add the comment trouble to delta 1.6 of s.file: cdc -r1.6 -m"bl78-12345 !bl77-54321 bl79-00001" -ytrouble s.file The following does the same thing: cdc -r1.6 s.
chacl(1) chacl(1) NAME chacl - add, modify, delete, copy, or summarize access control lists (ACLs) of files SYNOPSIS /usr/bin/chacl acl file ... chacl -r acl file ... chacl -d aclpatt file ... chacl -f fromfile tofile ... chacl - [ z Z F ] file ... A cA DESCRIPTION chacl extends the capabilities of chmod(1), by enabling the user to grant or restrict file access to additional specific users and/or groups.
chacl(1) chacl(1) error, continues, and eventually returns non-zero. -f fromfile tofile Copy the ACL from fromfile to the specified tofile , transferring ownership, if necessary (see acl (5), chown(2), or chownacl (3C)). fromfile can be - to represent standard input. This option implies the -r option. If the owner and group of fromfile are identical to those of tofile , chacl -f is identical to: chacl -r ‘lsacl fromfile‘ tofile ...
chacl(1) chacl(1) chacl -r ’(@.%,rw-)’ - test Delete from file myfile the specific access rights, if any, for user 165 in group 13. Note that this is different from adding an ACL entry that restricts access for that user and group. The user’s resulting access rights depend on the entries remaining in the ACL. The command also deletes all entries for user jpc that have a read bit turned on (the asterisk can be used as a wildcard in the ACL pattern for user, group, or access mode): chacl -d ’165.13, jpc.
chatr(1) chatr(1) NAME chatr - change program’s internal attributes SYNOPSIS Format 1: for files with a single text segment and a single data segment chatr [-s] [-z] [-Z] [-l library ] [-B mode ] [+as mode ] [+b flag ] [+cd flag ] [+ci flag ] [+dbg flag ] [+es flag ] [+gst flag ] [+gstsize size ] [+id flag ] [+k flag ] [+l library ] [+md flag ] [+mergeseg flag ] [+mi flag ] [+o flag ] [+pd size ] [+pi size ] [+s flag ] [+z flag ] [+I flag ] file ...
chatr(1) A cA chatr(1) +c flag (Format 2 only.) Enable or disable the code bit for a specified segment. If this is enabled, it is denoted by the c flag for the segment listing in the chatr output. +cd flag Enable or disable the code bit for the file’s data segment(s). If this is enabled, it is denoted by the c flag for the segment listing in the chatr output. +ci flag Enable or disable the code bit for the file’s text segments(s).
chatr(1) chatr(1) +p size (Format 2 only.) Set the page size for a specified segment. +pd size Request a particular virtual memory page size that should be used for data. Sizes of 4K, 16K, 64K, 256K, 1M, 4M, 16M, 64M, 256M, 1G, 4G, D, and L are supported. A size of D results in using the default page size. A size of L results in using the largest page size available. The actual page size may vary if the requested size cannot be fulfilled.
chatr(1) chatr(1) An alternate method is setting the kernel tunable parameter, executable_stack, to set a systemwide default for whether stacks are executable. Setting the executable_stack parameter to 1 (one) with sam (see sam(1M)) tells the HP-UX kernel to allow programs to execute on the program stack(s). Use this setting if compatibility with older releases is more important than security.
chatr(1) chatr(1) If you specify a file name (regardless of whether or not the file exists), chatr returns the number of files specified. The following example returns 3: chatr file1 file2 file3 Invalid files If the command cannot act on any of the files given, it returns the total number of files specified (if some option is specified). Otherwise it returns the number of files upon which it could not act.
chatr(1) A cA chatr(1) shared library binding: deferred global hash table enabled global hash table size 100 shared library mapped private disabled shared vtable support disabled segments: index type address flags size 5 text 04000000 ----c D (default) 6 data 40000000 ---mL (largest possible) executable from stack: D (default) kernel assisted branch prediction enabled lazy swap allocation for dynamic segments disabled For Format 2, for a text segment, use the following: chatr +si 5 +m enable a.
checknr(1) checknr(1) NAME checknr - check nroff/troff files SYNOPSIS checknr [-s] [-f] [-a.x1 .y1.x2 .y2 ... .xn .yn ] [-c.x1 .x2 .x3 ...c .xn ] [ file ... ] DESCRIPTION checknr searches a list of nroff or troff input files for certain kinds of errors involving mismatched opening and closing delimiters and unknown commands. If no files are specified, checknr searches the standard input. checknr looks for the following: • Font changes using \fx ... \fP. • Size changes using \sx ... \s0.
chfn(1) chfn(1) NAME chfn - change user information; used by finger SYNOPSIS chfn [login-name ] chfn -r files [login-name ] chfn -r nis [login-name ] chfn -r nisplus [login-name ] chfn -r dce [login-name ] A cA DESCRIPTION The chfn command changes the user information that is stored in the repository for the current logged-in user or for the user specified by login-name (see passwd (1)).
chfn(1) chfn(1) WARNINGS The encoding of office and extension information is installation-dependent. For historical reasons, the user’s name, etc., are stored in the /etc/passwd file. This is an inappropriate place to store the information. Because two users may try to write the passwd file at once, a synchronization method was developed. On rare occasions, chfn prints a message that the password file is busy. When this occurs, chfn sleeps for a short time, then tries to write to the passwd file again.
chkey(1) chkey(1) NAME chkey - change user’s secure RPC key pair SYNOPSIS chkey [ -p ] [ -s nisplus | nis | files ] DESCRIPTION chkey is used to change a user’s secure RPC public key and secret key pair. chkey prompts for the old secure-rpc password and verifies that it is correct by decrypting the secret key. If the user has not already keylogged in, chkey registers the secret key with the local keyserv (1M) daemon.
chmod(1) chmod(1) NAME chmod - change file mode access permissions SYNOPSIS /usr/bin/chmod [-A] [-R] symbolic_mode_list file ... Obsolescent form: /usr/bin/chmod [-A] [-R] numeric_mode file ... DESCRIPTION The chmod command changes the permissions of one or more file s according to the value of symbolic_mode_list or numeric_mode . You can display the current permissions for a file with the ls -l command (see ls (1)).
chmod(1) chmod(1) Numeric Mode (Obsolescent) Absolute permissions can be set by specifying a numeric_mode , an octal number constructed from the logical OR (sum) of the following mode bits: Miscellaneous mode bits: 4000 2000 1000 (= u=s) (= g=s) (= u=t) Set user ID on file execution (file only) Set group ID on file execution (file only) Set sticky bit; see below and chmod(2) Permission mode bits: A cA 0400 0200 0100 0040 0020 0010 0004 0002 0001 (= (= (= (= (= (= (= (= (= u=r) u=w) u=x) g=r) g=w)
chmod(1) chmod(1) Make a file executable by everybody: chmod a+x file Assign read and execute permission to everybody, and set the set-user-ID bit: chmod a=rx,u+s file Assign read and write permission to the file owner, and read permission to everybody else: chmod u=rw,go=r file or the obsolescent form: chmod 644 file Traverse a directory subtree making all regular files readable by user and group only, and all executables and directories executable (searchable) by everyone: chmod -R ug+r,o-r,a+X pat
chown(1) chown(1) NAME chown, chgrp - change file owner or group SYNOPSIS chown [-h] [-R] owner[:group ] file ... chgrp [-h] [-R] group file ... DESCRIPTION The chown command changes the owner ID of each specified file to owner and optionally the group ID of each specified file to group . The chgrp command changes the group ID of each specified file to group . A cA owner can be either a decimal user ID or a login name found in the /etc/passwd file.
chown(1) chown(1) RETURN VALUE chown and chgrp return the following values: 0 >0 Successful completion. An error condition occurred. EXAMPLES The following command changes the owner of the file jokes to sandi: chown sandi jokes The following command searches the directory design_notes and changes each file in that directory to owner mark and group users: chown -R mark:users design_notes A WARNINGS The default operation of chown and chgrp for symbolic links has changed as of HP-UX release 10.0.
chsh(1) chsh(1) NAME chsh - change default login shell SYNOPSIS chsh login-name [shell ] chsh -r files login-name [shell ] chsh -r nisplus login-name [shell ] chsh -r nis login-name [shell ] chsh -r dce login-name [shell ] A cA DESCRIPTION The chsh command changes the login-shell for a user’s login name in the repository (see passwd (1)). The DCE repository (-r dce) is only available if Integrated Login has been configured, see auth.adm (1M).
chsh(1) chsh(1) NOTES The chsh command is a hard link to passwd command. When chsh is executed actually the passwd command gets executed with appropriate arguments to change the user login shell in the repository specified in command line. If no repository is specified the login shell is changed in /etc/passwd file. FILES /etc/shells /etc/ptmp SEE ALSO chfn(1), csh(1), ksh(1), passwd(1), sh(1), sh-posix(1), getusershell(3C), pam(3), passwd(4), shells(4).
ci(1) ci(1) NAME ci - check in RCS revisions SYNOPSIS ci [ options ] file ... DESCRIPTION ci stores new revisions into RCS files. Each file name ending in ,v is treated as an RCS file; all others are assumed to be working files. ci deposits the contents of each working file into the corresponding RCS file (see rcsintro (5)). A cA If the RCS file does not exist, ci creates it and deposits the contents of the working file as the initial revision. The default number is "1.1".
ci(1) ci(1) -N"name" Same as -n, except that it overrides a previous assignment of name. -q[ rev ] Quiet mode; diagnostic output is not printed. A revision that is not different from the preceding one is not deposited unless -f is given. -r[ rev ] Assigns the revision number rev to the checked-in revision, releases the corresponding lock, and deletes the working file. This is the default. If rev is omitted, ci derives the new revision number from the caller’s last lock.
ci(1) ci(1) A file with approximately 240 revisions may cause a hash table overflow. ci cannot add another revision to the file until some of the old revisions have been removed. Use the rcs -o (obsolete) command option to remove old revisions. RCS is designed to be used with TEXT files only. Attempting to use RCS with non-text (binary) files results in data corruption. AUTHOR ci was developed by Walter F. Tichy.
ckconfig(1) ckconfig(1) NAME ckconfig - verify the path names of all the FTP configuration files. SYNOPSIS /usr/bin/ckconfig [-V] DESCRIPTION The ckconfig utility is used to verify the path names of the FTP configuration files, /etc/ftpd/ftpusers, /etc/ftpd/ftpaccess, /etc/ftpd/ftpconversions, /etc/ftpd/ftpgroups, /etc/ftpd/ftphosts, /var/adm/syslog/xferlog, and /etc/ftpd/pids/*. This utility checks to see that all the FTP configuration files are in the path specified.
cksum(1) cksum(1) NAME cksum - print file checksum and sizes SYNOPSIS cksum [file ...] DESCRIPTION The cksum command calculates and prints to standard output a checksum for each named file, the number of octets in the file and the filename. cksum uses a portable algorithm based on a 32-bit Cyclic Redundancy Check. This algorithm finds a broader spectrum of errors than the 16-bit algorithms used by sum (see sum(1)). The CRC is the sum of the following expressions, where x is each byte of the file.
clear(1) clear(1) NAME clear - clear terminal screen SYNOPSIS clear DESCRIPTION clear clears the terminal screen if it is possible to do so. It reads the TERM environment variable for the terminal type, then reads the appropriate terminfo database to determine how to clear the screen. FILES /usr/share/lib/terminfo/?/* terminal database files A AUTHOR clear was developed by the University of California, Berkeley. SEE ALSO terminfo(4).
cmp(1) cmp(1) NAME cmp - compare two files SYNOPSIS cmp [-l] [-s] file1 file2 [skip1 [skip2 ]] A cA DESCRIPTION cmp compares two files (if file1 or file2 is -, the standard input is used). Under default options, cmp makes no comment if the files are the same; if they differ, it announces the byte and line number at which the difference occurred. If one file is an initial subsequence of the other, that fact is noted.
co(1) co(1) NAME co - check out RCS revisions SYNOPSIS co [ options ] file ... DESCRIPTION co retrieves revisions from RCS files. Each file name ending in ,v is taken to be an RCS file. All other files are assumed to be working files. co retrieves a revision from each RCS file and stores it in the corresponding working file (see also rcsintro (5)). Revisions of an RCS file can be checked out locked or unlocked. Locking a revision prevents overlapping updates.
co(1) co(1) For 2-digit year input (yy) without the presence of the century field, the following interpretation is taken: [70-99, 00-69 (1970-1999, 2000-2069)]. A cA -r[ rev ] Retrieves the latest revision whose number is less than or equal to rev . If rev indicates a branch rather than a revision, the latest revision on that branch is retrieved. rev is composed of one or more numeric or symbolic fields separated by . .
co(1) co(1) Access Control Lists (ACLs) Optional ACL entries should not be added to RCS files because they might be deleted. DIAGNOSTICS The RCS file name, the working file name, and the revision number retrieved are written to the diagnostic output. The exit status always refers to the last file checked out, and is 0 if the operation was successful, 1 if unsuccessful. EXAMPLES Assume the current directory contains a subdirectory named RCS with an RCS file named io.c,v.
col(1) col(1) NAME col - filter reverse line-feeds and backspaces SYNOPSIS col [-blfxp] DESCRIPTION col reads from the standard input and writes onto the standard output. It performs the line overlays implied by reverse line feeds (ASCII code ESC-7 ), and by forward and reverse half-line feeds (ESC-9 and ESC-8 ). col is particularly useful for filtering multi-column output made with the nroff .rt command, and output resulting from use of the tbl preprocessor (see nroff(1) and tbl (1)).
col(1) col(1) EXAMPLES col is used most often with nroff and tbl. A common usage is: tbl filename | nroff -man | col | more -s (very similar to the usual man(1) command). This command allows vertical bars and outer boxes to be printed for tables. The file is run through the tbl preprocessor, and the output is then piped through nroff, formatting the output using the -man macros. The formatted output is then piped through col, which sets up the vertical bars and aligns the columns in the file.
comb(1) comb(1) NAME comb - combine SCCS deltas SYNOPSIS comb [-p SID ] [-clist ] [-o] [-s] file ... A cA DESCRIPTION The comb command generates a shell procedure (see sh(1)) which, when run, reconstructs the given SCCS files. The reconstructed files are usually smaller than the original files. Arguments can be specified in any order, but all options apply to all named SCCS files.
comb(1) comb(1) FILES s.COMB????? Temporary file comb????? Temporary file SEE ALSO admin(1), delta(1), get(1), sccshelp(1), prs(1), sh(1), sccsfile(4).
comm(1) comm(1) NAME comm - select or reject lines common to two sorted files SYNOPSIS comm [-[123] ] file1 file2 DESCRIPTION comm reads file1 and file2 , which should be ordered in increasing collating sequence (see sort (1) and Environment Variables below), and produces a three-column output: Column 1: Column 2: Column 3: A cA Lines that appear only in file1 , Lines that appear only in file2 , Lines that appear in both files. If - is used for file1 or file2 , the standard input is used.
command(1) command(1) NAME command - execute a simple command SYNOPSIS command command_name [ argument ... ] DESCRIPTION command enables the shell to treat the arguments as a simple command, suppressing the shell function lookup. If command_name is not the name of the function, the effect of command is the same as omitting command. OPERANDS A command recognizes the following operands: command_name The name of a HP-UX command or a shell built-in command.
command(1) command(1) STANDARDS CONFORMANCE command: XPG4, POSIX.
compact(1) compact(1) NAME compact, uncompact, ccat - compact and uncompact files, and cat them SYNOPSIS compact [ name ...] uncompact [ name ...] ccat [ file ...] DESCRIPTION compact compresses the named files using an adaptive Huffman code. If no file names are given, standard input is compacted and sent to the standard output. compact operates as an on-line algorithm. Each time a byte is read, it is encoded immediately according to the current prefix code.
compress(1) compress(1) NAME compress, uncompress, zcat, compressdir, uncompressdir - compress and expand data SYNOPSIS Compress Files compress [-d] [-f|-z] [-z] [-v] [-c] [-V] [-b maxbits ] [ file ... ] uncompress [-f] [-v] [-c] [-V] [ file ... ] zcat [-V] [ file ... ] Compress Entire Directory Subtrees compressdir [ options ] [ directory ... ] A cA uncompressdir [ options ] [ directory ...
compress(1) compress(1) -c Force compress and uncompress to write to the standard output; no files are changed. The nondestructive behavior of zcat is identical to that of uncompress -c. -V Print the current version and compile options onto the standard error. -b maxbits Specify the maximum number of bits the compress algorithm will use. The default is 16 and the range can be any integer between 9 and 16.
compress(1) compress(1) file already exists; do you wish to overwrite (y or n)? Respond y if you want the output to replace the existing file; otherwise, respond n. uncompress: corrupt input A SIGSEGV violation was detected which usually means that the input file has been corrupted. Compression: xx .xx % Percentage of the input saved by compression. (Relevant only for -v.) -- not a regular file: unchanged When the input file is not a regular file (a directory for example), it is left unaltered.
compress(1) compress(1) A HP-UX 11i Version 2: August 2003 −4− Hewlett-Packard Company Section 1−−113 cA
convert(1) convert(1) NAME convert - convert an audio file SYNOPSIS /opt/audio/bin/convert [source_file ] [target_file ] [-sfmt format ] [-dfmt format ] [-ddata data_type ] [-srate rate ] [-drate rate ] [-schannels number] [-dchannels number] DESCRIPTION This command converts audio files from one supported file format, data format, sampling rate, and number of channels to another. The unconverted file is retained as a source file.
convert(1) cd /opt/audio/bin convert beep.l16 convert(1) beep.au Convert a raw data file to a headered file when the source has no extension, was sampled at 11,025 per second, and has stereo data. cd /opt/audio/bin convert beep beep.au -sfmt l16 -srate 11025 -schannels 2 To save disk space, convert an audio file with CD quality sound to voice quality sound. cd /opt/audio/bin convert idea.au idea2.au -ddata u -drate 8k -dchannels 1 AUTHOR A convert was developed by HP.
cp(1) cp(1) NAME cp - copy files and directory subtrees SYNOPSIS cp [-f-i] [-p] [-e extarg ] file1 new_file cp [-f-i] [-p] [-e extarg ] file1 [file2 ... ] dest_directory cp [-f-i] [-p] [-R-r] [-e extarg ] directory1 [ directory2 ... ] dest_directory DESCRIPTION cp copies: A • • • • • cA file1 to new or existing new_file , file1 to existing dest_directory, file1 , file2 , ... to existing dest_directory, directory subtree directory1 , to new or existing dest_directory.
cp(1) -R cp(1) (recursive subtree copy) The -R option is identical to the -r option with the exception that directories copied by the -R option are created with read, write, and search permission for the owner. User and group permissions remain unchanged. With the -R and -r options, in addition to regular files and directories, cp also copies FIFOs, character and block device files and symbolic links. Only superusers can copy device files. All other users get an error.
cp(1) cp(1) To copy all files and directory subtrees in sourcedir to targetdir , use: cp -r sourcedir /* targetdir Note that directory pathnames can precede both sourcedir and targetdir . To create a zero-length file, use any of the following: cat /dev/null >file cp /dev/null file touch file A cA DEPENDENCIES NFS Access control lists of networked files are summarized (as returned in st_mode by stat()), but not copied to the new file.
cpio(1) cpio(1) NAME cpio - copy file archives in and out; duplicate directory trees SYNOPSIS cpio -o [-e extarg ] [achvxABC] cpio -i[bcdfmrstuvxBPRSU6] [pattern ...] cpio -p [-e extarg ] [adlmruvxU] directory DESCRIPTION The cpio command saves and restores archives of files on magnetic tape, other devices, or a regular file, and copies files from one directory to another while replicating the directory tree structure. When cpio completes processing the files, it reports the number of blocks written.
cpio(1) cpio(1) file system that does not support extent attributes. If -e is not specified, the default value for extarg is warn. A cA f Copy in all files except those selected by pattern .... h Follow symbolic links as though they were normal files or directories. Normally, cpio archives the link. l Whenever possible, link files rather than copying them. This option does not destroy existing files. Use only with -p. m Retain previous file modification time.
cpio(1) cpio(1) U Use the process’s file-mode creation mask (see umask(2)) to modify the mode of files created, in the same manner as creat (2). 6 Process a UNIX Sixth-Edition-format file. Use only with -i. Note that cpio archives created using a raw device file must be read using a raw device file. When the end of the tape is reached, cpio prompts the user for a new special file and continues.
cpio(1) cpio(1) cd olddir find . -depth -print | cpio -pd newdir The trivial case find . -depth -print | cpio -oB >/dev/rmt/c0t0d0BEST can be handled more efficiently by: find . -cpio /dev/rmt/c0t0d0BEST WARNINGS Because of industry standards and interoperability goals, cpio does not support the archival of files larger than 2 GB or files that have user/group IDs greater than 60 K. Files with user/group IDs greater than 60 K are archived and restored under the user/group ID of the current process.
cpp(1) cpp(1) NAME cpp - the C language preprocessor SYNOPSIS /usr/ccs/lbin/cpp [option ...] [ifile [ofile ] ] DESCRIPTION cpp is the C language preprocessor which is invoked as the first pass of any C compilation using the cc command (see cc(1)). Its purpose is to process #include and conditional compilation instructions and macros. Thus the output of cpp is designed to be in a form acceptable as input to the next pass of the C compiler.
cpp(1) -Uname cpp(1) Remove any initial definition of name, where name is a reserved symbol that is predefined by the particular preprocessor.
cpp(1) cpp(1) #ifdef name The lines following appear in the output if and only if name has been the subject of a previous #define without being the subject of an intervening #undef. #ifndef name The lines following do not appear in the output if and only if name has been the subject of a previous #define without being the subject of an intervening #undef. #include "filename" #include Include at this point the contents of filename (which are then run through cpp).
cpp(1) cpp(1) FILES /usr/include Standard directory for #include files SEE ALSO m4(1).
crontab(1) crontab(1) NAME crontab - user job file scheduler SYNOPSIS crontab [file ] crontab -e [username] crontab -l [username] crontab -r [username] DESCRIPTION The crontab command manages a crontab file for the user. You can use a crontab file to schedule jobs that are executed automatically by cron (see cron (1M)) on a regular basis.
crontab(1) crontab(1) Blank lines and those whose first non-blank character is # will be ignored. cron invokes the command from the user’s HOME directory with the POSIX shell, (/usr/bin/sh). It runs in the c queue (see queuedefs (4)). cron supplies a default environment for every shell, defining: HOME=user’s-home-directory LOGNAME=user’s-login-id PATH=/usr/bin:/usr/sbin:. SHELL=/usr/bin/sh Users who desire to have their .
crypt(1) crypt(1) NAME crypt - encode/decode files SYNOPSIS crypt [ password ] DESCRIPTION crypt reads from the standard input and writes on the standard output. password is a key that selects a particular transformation. If no password is given, crypt demands a key from the terminal and turns off printing while the key is being typed in. crypt encrypts and decrypts with the same key: crypt key cypher crypt key
csh(1) csh(1) NAME csh - a shell (command interpreter) with C-like syntax SYNOPSIS csh [-cefinstvxTVX] [ command_file ] [ argument_list ... ] DESCRIPTION csh is a command language interpreter that incorporates a command history buffer, C-like syntax, and job control facilities. Command Options Command options are interpreted as follows: A cA -c Read commands from the (single) following argument which must be present. Any remaining arguments are placed in argv.
csh(1) csh(1) [1] 1234 indicating that the job which was started asynchronously was job number 1 and had one (top-level) process, whose process id was 1234. If you are running a job and want to do something else, you can type the currently defined suspend character (see termio (7)) which sends a stop signal to the current job. csh then normally indicates that the job has been ‘Stopped’, and prints another prompt.
csh(1) csh(1) breaksw Causes a break from a switch, resuming after the endsw. case label : A label in a switch statement as discussed below. cd cd directory_name chdir chdir directory_name A Change the shell’s current working directory to directory_name. If not specified, directory_name defaults to your home directory. If directory_name is not found as a subdirectory of the current working directory (and does not begin with /, ./, or ..
csh(1) csh(1) glob wordlist Like echo but no \ escapes are recognized and words are delimited by null characters in the output. Useful in programs that use the shell to perform file name expansion on a list of words. goto word The specified word is file name and command expanded to yield a string of the form label. The shell rewinds its input as much as possible and searches for a line of the form label: possibly preceded by blanks or tabs. Execution continues after the specified line.
csh(1) A csh(1) cA addresspace Maximum address space in bytes for a process coredumpsize Size of the largest core dump that is created cputime Maximum number of CPU seconds to be used by each process datasize Maximum growth of the data region allowed beyond the end of the program text descriptors Maximum number of open files for each process filesize Largest single file that can be created memoryuse Maximum size to which a process’s resident set size can grow stacksize Maximum size of the
csh(1) csh(1) the n th entry in the stack. The elements of the directory stack are numbered from 0 starting at the top. A synonym for popd, called rd, is provided for historical reasons. Its use is not recommended because it is not part of the standard BSD csh and may not be supported in future releases. pushd [ name ] [ +n ] With no arguments, pushd exchanges the top two elements of the directory stack.
csh(1) csh(1) switch (string ) case str1 : ... breaksw ... default: ... breaksw endsw Each case label (str1 ) is successively matched against the specified string which is first command and file name expanded. The form of the case labels is the Pattern Matching A Notation with the exception that non-matching lists in bracket expressions are not supported (see regexp (5)). If none of the labels match before a default label is found, the execution begins after the default label.
csh(1) csh(1) of the expression must be placed within parentheses. The third form assigns the value of expression to the index th argument of name. Both name and its index th component must already exist. The operators *=, +=, etc., are available as in C. White space can optionally separate the name from the assignment operator. However, spaces are mandatory in separating components of expression which would otherwise be single words.
csh(1) csh(1) You can refer to previous events by event number (such as !10 for event 10), relative event location (such as !-2 for the second previous event), full or partial command name (such as !d for the last event using a command with initial character d), and string expression (such as !?mic? referring to an event containing the characters mic). These forms, without further modification, simply reintroduce the words of the specified events, each separated by a single blank.
csh(1) csh(1) text of the previous line. Thus ˆlbˆlib fixes the spelling of lib in the previous command. Finally, a history substitution can be enclosed within curly braces { } if necessary to insulate it from the characters which follow. Thus, after ls -ld ˜paul one could execute !{l}a to do ls -ld ˜paula while !la would look for a command starting with la.
csh(1) csh(1) Also available in expressions as primitive operands are command executions enclosed in curly braces ( { } ) and file enquiries of the form -l filename, where l is one of: r w x e o z f d A cA read access write access execute access existence ownership zero size plain file directory The specified filename is command- and file-name expanded then tested to see if it has the specified relationship to the real user.
csh(1) csh(1) CSH VARIABLES csh maintains a set of variables. Each variable has a value equal to zero or more strings (words). Variables have names consisting of up to 80 letters and digits starting with a letter. The underscore character is considered a letter. The value of a variable may be displayed and changed by using the set and unset commands. Some of the variables are Boolean, that is, the shell does not care what their value is, only whether they are set or not.
csh(1) csh(1) ${?variable_name } Substitutes the string 1 if variable_name is set, 0 if it is not. A cA $?0 Substitutes 1 if the current input file name is known, 0 if it is not. $$ Substitutes the (decimal) process number of the (parent) shell. $< Substitutes a line from the standard input, with no further interpretation thereafter. It can be used to read from the keyboard in a shell script. Pre-Defined and Environment Variables The following variables have special meaning to the shell.
csh(1) csh(1) noglob If set, file name expansion is inhibited. This is most useful in shell scripts that are not dealing with file names, or after a list of file names has been obtained and further expansions are not desirable. nonomatch If set, it is no longer an error for a file name expansion to not match any existing files. If there is no match, the primitive pattern is returned. It is still an error for the primitive pattern to be malformed. For example, ’echo [’ still gives an error.
csh(1) csh(1) In any case, the single final newline does not force a new word. Note that it is thus possible for a command substitution to yield only part of a word, even if the command outputs a complete line. File name Substitution Each command word is processed as a pattern for file name substitution, also known as globbing, and replaced with a sorted list of file names which match the pattern.
csh(1) csh(1) A command receives the environment in which the shell was invoked as modified by the input-output parameters and the presence of the command in a pipeline. Thus, unlike some previous shells, commands executed from a shell script have no access to the text of the commands by default; rather they receive the original standard input of the shell. The << mechanism should be used to present inline data.
csh(1) csh(1) Command Line Control A ˆR re-prints the current command line; ˆW erases the last word entered on the current command line. Sanity C shell restores your terminal to a sane mode if it appears to return from some command in raw, cbreak, or noecho mode. Saving Your History Buffer csh has the ability to save your history list between login sessions. If the shell variable savehist is set to a number, that number of command events from your history list is saved.
csh(1) csh(1) Alias substitution is most often used to clumsily simulate shell procedures; shell procedures should be provided rather than aliases. Commands within loops, prompted for by ?, are not placed in the history list. Control structure should be parsed rather than being recognized as built-in commands. This would allow control commands to be placed anywhere, to be combined with |, and to be used with & and ; metasyntax.
csh(1) csh(1) SEE ALSO cd(1), echo(1), kill(1), nice(1), sh(1), umask(1), access(2), exec(2), fork(2), pipe(2), umask(2), wait(2), tty(7), a.out(4), environ(5), lang(5), regexp(5). C Shell tutorial in Shells Users Guide .
csplit(1) csplit(1) NAME csplit - context split SYNOPSIS csplit [-s] [-k] [-f prefix ] [-n number] file arg1 [ ... argn ] DESCRIPTION csplit reads file , separates it into n+1 sections as defined by the arguments arg1 ... argn , and places the results in separate files. The maximum number of arguments (arg1 through argn ) allowed is 99 unless the -n number option is used to allow for more output file names.
csplit(1) csplit(1) the original file; it is the user’s responsibility to remove it when appropriate. EXTERNAL INFLUENCES Environment Variables LC_COLLATE determines the collating sequence used in evaluating regular expressions. LC_CTYPE determines the characters matched by character class expressions in regular expressions. LC_MESSAGES determines the language in which messages are displayed.
ct(1) ct(1) NAME ct - spawn getty to a remote terminal (call terminal) SYNOPSIS ct [-w n] [-x n] [-h] [-v] [-s speed ] telno ... DESCRIPTION ct dials telno , the telephone number of a modem that is attached to a terminal, and spawns a getty (1M) process to that terminal. ct tries each line listed in file /etc/uucp/Devices until it finds an available line with appropriate attributes or runs out of entries.
ctags(1) ctags(1) NAME ctags - create a tags file SYNOPSIS ctags [-xvFBatwu] files ... A cA DESCRIPTION ctags makes a tags file for ex(1) (or vi (1)) from the specified C, Pascal and FORTRAN sources. A tags file gives the locations of specified objects (for C, functions, macros with argments, and typedefs; Pascal, procedures, programs and functions; FORTRAN, subroutines, programs and functions) in a group of files.
ctags(1) ctags(1) DIAGNOSTICS Too many entries to sort. An attempt to get additional heap space failed; the sort could not be performed. Unexpected end of function in file file , line line . The tags file may be incorrect. A } character was found unexpectedly in the first column. This can lead to incorrect entries in the tags file. Duplicate entry in file file , line line : name. Second entry ignored. The same name was detected twice in the same file.
ctags(1) ctags(1) STANDARDS CONFORMANCE ctags: XPG4 A cA Section 1−−154 Hewlett-Packard Company −3− HP-UX 11i Version 2: August 2003
cu(1) cu(1) NAME cu - call another (UNIX) system; terminal emulator SYNOPSIS cu [-s speed ] [-l line ] [-h] [-q] [-t] [-d level ] [-e-o] [-m] [-n] [ telno systemname dir ] XPG4 Syntax: cu [-s speed ] [-l line ] [-h] [-q] [-t] [-d] [-e-o] [-m] [-n] [ telno systemname dir ] DESCRIPTION cu calls up another system, which is usually a UNIX operating system, but can be a terminal or a nonUNIX operating system. cu manages all interaction between systems, including possible transfers of ASCII files.
cu(1) cu(1) Normally, an automatic DC3/DC1 protocol is used to control input from the remote to ensure that the buffer is not overrun. "Prompt handshaking" can be used to control transfer of ASCII files to systems that have no type-ahead capability but require data to be sent only after a prompt is given. This is described in detail below. Lines beginning with ˜ have special meanings. Transmit Process Commands The transmit process interprets the following commands: A cA ~., ˜..
cu(1) cu(1) Ctrl-X form where a circumflex (ASCII 94) precedes the character, as in ˆX. A null character can be specified with ˆ@. (A null first character in the prompt implies a "null" prompt, which always appears to be satisfied.) A circumflex is specified by ^ ˆ. ~%>[>]file Divert output from the remote system to the specified file until another ˜%> command is given. When an output diversion is active, typing ˜%> terminates it, whereas ˜%> anotherfile terminates it and begins a new one.
cu(1) cu(1) EXAMPLES To dial a system whose number is 9 201 555 1212 using 1200 baud: cu -s1200 9=2015551212 If the speed is not specified, 300 is the default value.
cut(1) cut(1) NAME cut - cut out (extract) selected fields of each line of a file SYNOPSIS cut -c list [ file ... ] cut -b list [-n] [ file ... ] cut -f list [-d char ] [-s] [ file ... ] DESCRIPTION cut cuts out (extracts) columns from a table or fields from each line in a file; in data base parlance, it implements the projection of a relation.
cut(1) cut(1) a default of "C" (see lang (5)) is used instead of LANG. If any internationalization variable contains an invalid setting, cut behaves as if all internationalization variables are set to "C". See environ (5). International Code Set Support cut supports both single- and multi-byte character code sets. International code set characters may be specified in the char given to the -d option.
date(1) date(1) NAME date - display or set the date and time SYNOPSIS date [-u] date [-u] +format date [-u] [mmddhhmm[[cc]yy]] date [-a [-]sss[.fff]] DESCRIPTION The date command displays or sets the current HP-UX system clock date and time. Since the HP-UX system operates in Coordinated Universal Time (UTC), date automatically converts to and from local standard or daylight/summer time, based on your TZ environment variable. See Environment Variables in EXTERNAL INFLUENCES below.
date(1) date(1) do you really want to run time backwards?[yes/no] Type yes or the equivalent for your locale to set the clock backwards; anything else to cancel the command. When date is used to set the date, a pair of date change records is written to the file /var/adm/wtmps. (XPG4 only.) No warning is generated if date is set backwards. Formatting Directives The following formatting directives, shown without the optional field width and precision specification, are replaced by the indicated characters.
date(1) date(1) %w Weekday as a one-digit decimal number [0-6 (Sunday-Saturday)]. For example, 3. %W Week number of the year (Monday as the first day of the week) as a two-digit decimal number [00-53]. All days that precede the first Monday in the year are considered to be in week 00. For example, 02. %x Current date representation. For example, 01/12/94. %X Current time representation. For example, 19:45:58. %y Year without century as a two-digit decimal number [00-99]. For example, 93.
date(1) date(1) %Oy Year (offset from %C) in alternate representation. Field Width and Precision An optional field width and precision specification can immediately follow the initial % of a formatting directive in the following order: [-0]width The decimal digit string width specifies a minimum field width in which the result of the conversion is right- or left-justified. The default is right-justified with space padding on the left.
date(1) date(1) for your locale) to set the clock backwards; anything else to cancel the command. no permission You need the superuser privilege to change the date. EXAMPLES Date in Different Languages Display the date. In this example, the TZ environment variable contains PST8PDT, and the language environment variables are set as noted. date → Fri Aug 20 15:03:37 PDT 1993 date -u → Fri Aug 20 22:03:37 UTC 1993 date → Fri, Aug 20, 1993 03:03:37 PM date → Fri.
dc(1) dc(1) NAME dc - desk calculator SYNOPSIS dc [ file ] DESCRIPTION dc is an arbitrary precision arithmetic package. Ordinarily it operates on decimal integers, but one may specify an input base, output base, and a number of fractional digits to be maintained. (See bc(1), a preprocessor for dc that provides infix notation and a C-like syntax that implements functions. bc also provides reasonable control structures for programs.) The overall structure of dc is a stacking (reverse Polish) calculator.
dc(1) dc(1) I pushes the input base on the top of the stack. o The top value on the stack is popped and used as the number radix for further output. See below for notes on output base. O pushes the output base on the top of the stack. k the top of the stack is popped, and that value is used as a non-negative scale factor: the appropriate number of places are printed on output, and maintained during multiplication, division, and exponentiation.
dd(1) dd(1) NAME dd - convert, reblock, translate, and copy a (tape) file SYNOPSIS dd [option =value ] ... DESCRIPTION dd copies the specified input file to the specified output file with possible conversions. The standard input and output are used by default. Input and output block size can be specified to take advantage of raw physical I/O. Upon completion, dd reports the number of whole and partial input and output records.
dd(1) dd(1) ucase Map lower-case input characters to the corresponding uppercase characters. swab Swap every pair of input bytes. noerror Do not stop processing on an input error. If the sync conversion symbol is also specified, missing input is replaced with null bytes and processed normally; otherwise, the input block is omitted from the output. notrunc Do not truncate existing output file. Blocks in the output file not overwritten by this invocation of dd are preserved.
dd(1) dd(1) dd if=/dev/rmt/c0t0d0BEST of=x ibs=800 cbs=80 conv=ascii,lcase Note the use of the raw magnetic tape device file. dd is especially suited to I/O on raw physical devices because it allows reading and writing in arbitrary block sizes. WARNINGS Some devices, such as 1/2-inch magnetic tapes, are incapable of seeking. Such devices may be positioned prior to running dd by using mt(1) or some other appropriate command. The skip, seek, iseek and oseek options do work for such devices.
delta(1) delta(1) NAME delta - make a delta (change) to an SCCS file SYNOPSIS delta [-r SID ] [-s] [-n] [-g list ] [-m mrlist ] [-y comment ] [-p] files DESCRIPTION The delta command is used to permanently introduce into the named SCCS file changes that were made to the file retrieved by get (called the g-file , or generated file). See get (1). delta makes a delta to each named SCCS file.
delta(1) delta(1) LC_MESSAGES determines the language in which messages are displayed. If LC_CTYPE or LC_MESSAGES is not specified in the environment or is set to the empty string, the value of LANG is used as a default for each unspecified or empty variable. If LANG is not specified or is set to the empty string, a default of "C" (see lang (5)) is used instead of LANG. If any internationalization variable contains an invalid setting, delta behaves as if all internationalization variables are set to "C".
deroff(1) deroff(1) NAME deroff - remove nroff, tbl, and neqn constructs SYNOPSIS deroff [-mx ] [-w] [-i] [ file ... ] DESCRIPTION deroff reads each file in sequence and removes all nroff requests, macro calls, backslash constructs, neqn constructs (between .EQ and .EN lines, and between delimiters — see neqn(1)), and tbl descriptions (see tbl (1)), replacing them with white space (blanks and blank lines), and writes the remainder of the file on the standard output.
dhcpv6client_ui(1) dhcpv6client_ui(1) NAME dhcpv6client_ui - DHCPv6 client interface for requesting configuration parameters from the DHCPv6 server.
dhcpv6client_ui(1) dhcpv6client_ui(1) This option cannot be used with the -n option. RETURN VALUES dhcpv6client_ui returns 0 on success and 1 on failure. EXAMPLES dhcpv6client_ui obtains two IP addresses for the lan0 interface: dhcpv6client_ui -m lan0 -n 2 dhcpv6client_ui obtains two IP addresses for the lan0 interface and additional configuration parameters: dhcpv6client_ui -m lan0 -n 2 -o dns_sa dns_sx FILES /etc/dhcpv6client.data All the data obtained from the server daemon is saved to this file.
diff(1) diff(1) NAME diff - differential file and directory comparator SYNOPSIS diff [-C n ] [-S name ] [-lrs] [-bcefhintw] dir1 dir2 diff [-C n ] [-S name ] [-bcefhintw] file1 file2 diff [-D string ] [-biw] file1 file2 A dA DESCRIPTION Comparing Directories If both arguments are directories, diff sorts the contents of the directories by name, then runs the regular file diff algorithm (described below) on text files that have the same name in each directory but are different.
diff(1) diff(1) within 3 lines of each other in the file are grouped together on output. -C n Output format similar to -c but with n lines of context. -h Do a fast, half-hearted job. This option works only when changed stretches are short and well separated, but can be used on files of unlimited length.
diff(1) diff(1) diff -wi x1 x2 WARNINGS Editing scripts produced by the -e or -f option are naive about creating lines consisting of a single dot (.). When comparing directories with the -b, -w, or -i options specified, diff first compares the files in the same manner as cmp, then runs the diff algorithm if they are not equal. This may cause a small amount of spurious output if the files are identical except for insignificant blank strings or uppercase/lowercase differences.
diff3(1) diff3(1) NAME diff3 - 3-way differential file comparison SYNOPSIS diff3 [-exEX3] file1 file2 file3 DESCRIPTION diff3 compares three versions of a file, and prints disagreeing ranges of text flagged with these codes: ==== ====1 ====2 ====3 all three files differ file1 is different file2 is different file3 is different The type of change required to convert a given range of a given file to some other is indicated in one of these ways: f :n1 a Text is to be appended after line number n1 in file
diffmk(1) diffmk(1) NAME diffmk - mark changes between two different versions of a file SYNOPSIS diffmk prevfile currfile markfile DESCRIPTION diffmk compares the previous version of a file with the current version and creates a file that includes nroff/troff ‘‘change mark’’ commands. prevfile is the name of the previous version of the file and currfile is the name of the current version of the file.
dircmp(1) dircmp(1) NAME dircmp - directory comparison SYNOPSIS dircmp [-d] [-s] [-wn ] dir1 dir2 DESCRIPTION dircmp examines dir1 and dir2 and generates various tabulated information about the contents of the directories. Sorted listings of files that are unique to each directory are generated for all the options. If no option is entered, a sorted list is output indicating whether the filenames common to both directories have the same contents.
dmpxlt(1) dmpxlt(1) NAME dmpxlt - dump iconv translation tables to a readable format SYNOPSIS /usr/bin/dmpxlt [-f output_filename ] [input_filename ] DESCRIPTION dmpxlt dumps the compiled version of the iconv codeset conversion tables into an ASCII-readable format that can be modified and used as input to genxlt (1) to regenerate the table for iconv (1). Options dmpxlt recognizes the following options: -f output_filename A dA If this option is not selected, the data will be sent to standard output.
dnssec-keygen(1) dnssec-keygen(1) NAME dnssec-keygen - key generation tool for DNSSEC SYNOPSIS dnssec-keygen [-a algorithm ] [-b keysize ] [-e] [-g generator ] [-h] [-n nametype ] [-p protocol-value] [-r randomdev ] [-s strength-value] [-t type ] [-v level ] name DESCRIPTION dnssec-keygen generates keys for Secure DNS (DNSSEC) as defined in RFC2535. It also generates keys for use in Transaction Signatures (TSIG) which is defined in RFC2845.
dnssec-keygen(1) A dA dnssec-keygen(1) -t type This option indicates if the key is used for authentication or confidentiality. type can be either AUTHCONF, NOAUTHCONF, NOAUTH or NOCONF. The default is AUTHCONF. If type is AUTHCONF, the key can be used for authentication and confidentiality. Setting type to NOAUTHCONF indicates that the key cannot be used for authentication or confidentiality. A value of NOAUTH means the key can be used for confidentiality but not for authentication.
dnssec-makekeyset(1) dnssec-makekeyset(1) NAME dnssec-makekeyset - used to produce a set of DNSSEC keys SYNOPSIS dnssec-makekeyset [-a] [-h help ] [-s start-time ] [-e end-time ] [-t TTL] [-r randomdev ] [-p] [-v level ] keyfile ... DESCRIPTION dnssec-makekeyset generates a key set from one or more keys created by dnssec-keygen. It creates a file containing KEY and SIG records for some zone which can then be signed by the zone’s parent if the parent zone is DNSSEC-aware.
dnssec-makekeyset(1) dnssec-makekeyset(1) If dnssec-makekeyset is successful, it creates a file name of the form nnnn .keyset. This file contains the KEY and SIG records for domain nnnn, the domain name part from the key file identifier produced when dnssec-keygen created the domain’s public and private keys. The .keyset file can then be transferred to the DNS administrator of the parent zone for them to sign the contents with dnssec-signkey.
dnssec-signkey(1) dnssec-signkey(1) NAME dnssec-signkey - DNSSEC keyset signing tool SYNOPSIS dnssec-signkey [-a] [-c class ] [-e end-time ] [-h] [-p] [-r randomdev ] [-s start-time ] [-v level ] keyset keyfile ... DESCRIPTION dnssec-signkey is used to sign a key set for a child zone. Typically this would be provided by a .keyset file generated by the dnssec-makekeyset utility. This provides a mechanism for a DNSSEC-aware zone to sign the keys of any DNSSEC-aware child zones.
dnssec-signkey(1) dnssec-signkey(1) when it next gets signed with dnssec-signzone. A copy of the generated signedkey file should be kept by the parent zone’s DNS administrator, since it will be needed when signing the parent zone. EXAMPLE The DNS administrator for a DNSSEC-aware .com zone would use the following command to make dnssec-signkey sign the .keyset file for example.com created in the example shown in the man page for dnssec-makekeyset: dnssec-signkey example.com.keyset Kcom.
dnssec-signzone(1) dnssec-signzone(1) NAME dnssec-signzone - DNSSEC zone signing tool SYNOPSIS dnssec-signzone [-a] [-c cycle-time ] [-d directory ] [-e end-time ] [-f output-file ] [-h] [-i interval ] [-n ncpus ] [-o origin ] [-p] [-r randomdev ] [-s start-time ] [-t] [-v level ] zonefile keyfile .... DESCRIPTION dnssec-signzone is used to sign a zone. Any .signedkey files for the zone to be signed should be present in the current directory, along with the keys that will be used to sign the zone.
dnssec-signzone(1) dnssec-signzone(1) -o origin This option specifies the zone origin. If not specified, the name of the zone file is assumed to be the origin . This option instructs dnssec-signkey to use pseudo-random data when signing the keys. This is faster, but less secure, than using genuinely random data for signing. This option may be useful when there are many child zone key sets to sign or if the entropy source is limited.
domainname(1) domainname(1) NAME domainname - set or display name of Network Information Service domain SYNOPSIS domainname [ name_of_domain ] DESCRIPTION Network Information Service (NIS) uses domain names to refer collectively to a group of hosts. Without an argument, domainname displays the name of the NIS domain. Only superuser can set the domain name by providing name_of_domain. The domain name is usually set in the configuration file /etc/rc.config.d/namesvrs, by setting the NIS_DOMAIN variable.
dos2ux(1) dos2ux(1) NAME dos2ux, ux2dos - convert ASCII file format SYNOPSIS dos2ux file ... ux2dos file ... DESCRIPTION dos2ux and ux2dos read each specified file in sequence and write it to standard output, converting to HP-UX format or to DOS format, respectively. Each file can be either DOS format or HP-UX format for either command. A DOS file name is recognized by the presence of an embedded colon (:) delimiter; see dosif (4) for DOS file naming conventions.
doschmod(1) doschmod(1) (TO BE OBSOLETED) NAME doschmod - change attributes of a DOS file SYNOPSIS doschmod [-mu] mode device : file ... DESCRIPTION The doschmod command is targeted for removal from HP-UX; see the WARNINGS below. doschmod is the DOS counterpart of chmod (see chmod(1)). Options doschmod recognizes one option: -m If an ordinary file with the same name as volume label exists, operation will be performed on the file instead of volume label. -u Disable argument case conversion.
doscp(1) doscp(1) (TO BE OBSOLETED) NAME doscp - copy to or from DOS files SYNOPSIS doscp [-fmvu] file1 file2 doscp [-fmvu] file1 [ file2 ... ] directory DESCRIPTION The doscp command is targeted for removal from HP-UX; see the WARNINGS below. doscp is the DOS counterpart of cp (see cp (1)). doscp copies a DOS file to a DOS or HP-UX file, an HP-UX file to an HP-UX or DOS file, or HP-UX or DOS files to an HP-UX or DOS directory. The last name in the argument list is the destination file or directory.
doscp(1) doscp(1) (TO BE OBSOLETED) SEE ALSO cp(1), dos2ux(1), doschmod(1), dosdf(1), dosls(1), dosmkdir(1), dosrm(1), ioscan(1M) dosif(4).
dosdf(1) dosdf(1) (TO BE OBSOLETED) NAME dosdf - report number of free disk clusters SYNOPSIS dosdf device[:] DESCRIPTION The dosdf command is targeted for removal from HP-UX; see the WARNINGS below. dosdf is the DOS counterpart of the df command (see df(1)). It prints the cluster size in bytes and the number of free clusters on the specified DOS volume. WARNINGS Use of dosdf is discouraged because it is targeted for removal from HP-UX.
dosls(1) dosls(1) (TO BE OBSOLETED) NAME dosls, dosll - list contents of DOS directories SYNOPSIS dosls [-aAmudl] device :[ file ] ... dosll [-aAmudl] device :[ file ] ... DESCRIPTION The dosls and dosll commands are targeted for removal from HP-UX; see the WARNINGS below. dosls is the DOS counterpart of ls (see ls (1)). For each directory named, dosls lists the contents of that directory. For each file named, dosls repeats its name and any other information requested.
dosmkdir(1) dosmkdir(1) (TO BE OBSOLETED) NAME dosmkdir - make a DOS directory SYNOPSIS dosmkdir [-mu] device :directory ... DESCRIPTION The dosmkdir command is targeted for removal from HP-UX; see the WARNINGS below. dosmkdir is the DOS counterpart of the mkdir command (see mkdir (1)). It creates specified directories. The standard entries, . for the directory itself and .. for its parent, are made automatically.
dosrm(1) dosrm(1) (TO BE OBSOLETED) NAME dosrm, dosrmdir - remove DOS files or directories SYNOPSIS dosrm [-fmriu] device :file ... dosrmdir [-mu] device :file ... DESCRIPTION The dosrm and dosrmdir commands are targeted for removal from HP-UX; see the WARNINGS below. dosrm and dosrmdir are DOS counterparts of rm and rmdir (see rm(1) and rmdir (1), respectively). dosrm removes the entries for one or more files from a directory.
du(1) du(1) NAME du - summarize disk usage SYNOPSIS du [-a-s] [-bkrx] [-t type ] [ name ... ] DESCRIPTION The du command gives the number of 512-byte blocks allocated for all files and (recursively) directories within each directory and file specified by the name operands. The block count includes the indirect blocks of the file. A file with two or more links is counted only once. If name is missing, the current working directory is used.
echo(1) echo(1) NAME echo - echo (print) arguments SYNOPSIS echo [ arg ] ... DESCRIPTION echo writes its arguments separated by blanks and terminated by a new-line on the standard output.
ed(1) ed(1) NAME ed, red - line-oriented text editor SYNOPSIS ed [-p string ] [-s-] [-x] [file ] red [-p string ] [-s-] [-x] [file ] DESCRIPTION The ed command executes a line-oriented text editor. It is most commonly used in scripts and noninteractive editing applications because, even though it can be used interactively, other editors such as vi and ex are typically easier to use in an interactive environment.
ed(1) ed(1) s/s1/s2 s/s1/s2/p g/s1 g/s1/p ?s1 ?s1? Line Addresses To understand line addressing, remember that ed maintains a pointer to the current line . Generally speaking, the current line is the last line affected by a command. The exact effect of a given command on the current line is discussed under the description of each command. Addresses are interpreted according to the following rules: 1. The character . refers to the current line. 2.
ed(1) (.,.)c text . ed(1) The c (change) command deletes the addressed lines then accepts input text to replace the deleted lines. Upon completion, the new current line is the last line in text or, if no text was provided, at the first line after the deleted line or lines. (.,.)d The d (delete) command deletes the addressed lines from the buffer.
ed(1) ed(1) Long lines are folded with the point of folding indicated by writing a backslash character followed by a newline. The end of each line is marked with a $. An l (ell) command can be appended to any command other than e, E, f, q, Q, r, w, or !. The current line number is set to the address of the last line written.
ed(1) ed(1) When the character % is the only character in replacement , the replacement used in the most recent substitute command is used as the replacement in the current substitute command. The % loses its special meaning when it is in a replacement string containing more than one character or when preceded by a \. A line can be split by substituting a newline character into it. The newline in replacement must be escaped by preceding it by \.
ed(1) ed(1) If an interrupt signal (ASCII DEL or BREAK) is sent, ed prints a ? and returns to its command level. The following size limitations apply: 256 characters per global command list, 64 characters per file name, and 32 MB characters in the buffer. The limit on the number of lines depends on the amount of user memory: each line takes 1 word. EXTERNAL INFLUENCES Environment Variables SHELL determines the preferred command-line interpreter for use in all !-style commands.
ed(1) ed(1) If the editor input is coming from a command file (e.g., ed file < ed-cmd-file), the editor exits at the first failure of a command in the command file. When reading a file, ed discards ASCII NUL characters and all characters after the last newline. This can cause unexpected behavior when using regular expressions to search for character sequences containing NUL characters or text near end-of-file. AUTHOR ed was developed by HP and OSF. FILES /tmp/ep ed.
elfdump(1) elfdump(1) NAME elfdump - dump information contained in object files. SYNOPSIS elfdump [-acCdfghHjkLopqrsStuUvV] [-dc] [-dl] [-tx] [-tv] [-D num ] [+D num2 ] [+interp] [+linkmap] [+linkmap_bss] [+linkmap_file] [-n name ] [+objdebug] [+s section ] [-T num ] [+T num2 ] files ... DESCRIPTION elfdump takes one or more object files or libraries and dumps information about them. The following options are supported: -a Dumps archive headers from an archive library. -c Dumps the string table(s).
elfdump(1) elfdump(1) elfdump will only dump the symbol entry whose name matches name. If used with the other options, name pertains to a section name and elfdump will only dump the section whose name matches it. A eA -o Dumps the optional headers (program headers). -p (Modifier) Do not print titles, with all options. -q (Modifier) Suppresses printing CTTI section headers. Valid with -k option. -r Dumps the relocations. -s Dumps the section contents.
elfdump(1) elfdump(1) HP-UX Linker and Libraries User’s Guide (See manuals (5) for ordering information) HP-UX Software Transition Toolkit (STK) -- ELF Object Formats http://www.software.hp.
elm(1) elm(1) NAME elm - process electronic mail through a screen-oriented interface SYNOPSIS elm [-aKkmtVz] [-f folder ] elm [-s subject ] address-list elm -c [alias-list ] elm -h elm -v A eA DESCRIPTION The elm program is a screen-oriented electronic mail processing system. It supports the industry-wide MIME standard for nontext mail, a special forms message and forms reply mechanism, and an easy-touse alias system for individuals and groups.
elm(1) elm(1) -m Set menu=OFF. Do not display the command menus on several Interactive Mode screens. This overrides the setting of the menu boolean variable (see the ELM CONFIGURATION section). -s subject Subject. Specify the subject for a File Mode or Message Mode message. -t Set usetite=OFF. Do not use the termcap ti/te and terminfo cup cursorpositioning entries. This overrides the setting of the usetite boolean variable (see the ELM CONFIGURATION section). -V Verbose transmission.
elm(1) elm(1) mail transport agent (MTA) The program that sends and receives mail messages to and from other systems. On HP-UX systems, the MTA is sendmail (see sendmail (1M)). mailcap A file that contains information on how to compose and display mail messages that are not just seven- and eight-bit ASCII characters. metamail A system program that processes nontext mail messages. message In a folder, a sequence of text lines comprised of a message delimiter, a header, and a body.
elm(1) elm(1) When you leave your editor, you enter the Send Menu, as described for Interactive Mode. If you choose the Send Menu s (send) command, the message is sent and the program terminates. If you select the Send Menu f (forget) command, the message is stored in $HOME/Canceled.mail and the program terminates. If you select other commands, the appropriate action occurs. See the EXAMPLES section.
elm(1) elm(1) INTERACTIVE MODE MENUS AND COMMANDS This section begins with the Message Menu, which is the main screen for Interactive Mode. The rest of the menus are presented alphabetically. Message Menu The Message Index is displayed on the Message Menu. You can use the following commands to manipulate and send messages. Some commands use a series of prompts to complete their action. You can use Ctrl-D to cancel their operations. The commands are: A !command Shell Escape.
elm(1) elm(1) c C d Ctrl-D Change folder. This command is used to change the file whose messages are displayed on the Message Menu. You are asked for a file name. The file must be in message format; otherwise, elm aborts. You can use the customary wildcards for your shell, as well as the following special names: ! Your incoming mail folder. > Your received folder, defined by the receivedmail string variable. < Your sent folder, defined by the sentmail string variable. .
elm(1) elm(1) all Clear all the criteria and restore the normal display. from string Restrict to entries that contain string in the From: header. subject string Restrict to entries that contain string in the Subject: header. to string Restrict to entries that contain string in the To: header. You can add limiting criteria by repeating the l command. Ctrl-L Redraw the screen. m Mail. Send mail to one or more addresses.
elm(1) elm(1) provided by the alwayskeep boolean variable (ON means y (yes) and OFF means n (no)). If you answer y, all undeleted unread (new and old) messages are returned to your incoming mailbox. If you answer n, all undeleted unread messages will be moved to the folder defined by the receivedmail string variable.
elm(1) elm(1) Message Index The messages in the current folder are indexed on the Message Menu, one per line, in the format: sssnum mmm d from (lines ) subject defined as: A eA sss A three-character status field, described in the Message Status subsection. num The ordinal message index number. mmm The month from the last Date: header entry, or from the From message header. d The day from the last Date: header entry, or from the From message header.
elm(1) elm(1) ? MIME. The message or its attachments is in a MIME format whose version is not supported. Blank. Normal status. Column Three: Tagged Status + Tagged. Tagged messages are handled as a group by some commands. See t and other commands in the Message Menu subsection. Blank. The message is not tagged. Built-In Editor When you are composing an outbound message with the builtin built-in editor, it prompts you for text lines with an empty line. Enter a period (.
elm(1) elm(1) The commands are: A $ Resynchronize your alias text file and your alias database by rebuilding the database from the text file by running newalias. Aliases marked for deletion are removed, tagged aliases are untagged, and new and changed aliases are recognized. The alias screen is updated to reflect these changes. + Display the next alias index page, when applicable. - Display the previous alias index page, when applicable. /pattern Pattern match.
elm(1) elm(1) group Restrict to group aliases (can include system and user aliases). person Restrict to person aliases (can include system and user aliases). system Restrict to system aliases (can include group and person aliases). user Restrict to system aliases (can include group and person aliases). You can add limiting criteria by repeating the l command. Ctrl-L Redraw the screen. m Mail to the current alias or to the set of tagged aliases.
elm(1) elm(1) ss A two-character status field. The first character can be: D Delete. The alias is marked for deletion. N New. The alias is new or changed in the alias text file but is not included in the current database. Resynchronization is needed. Blank. The alias is in the current database. The second character can be: + Tag. The alias is tagged. Blank. The alias is not tagged. num The index number of the alias.
elm(1) elm(1) elm provides it as necessary and handles messages that contain it. The value is placed in a Content-Type: body-part header entry. The default is: text/plain; charset=US-ASCII Some common entries are described below. See the METAMAIL CONFIGURATION section for additional information. text/subtype [; charset=charset] This is relatively readable text that may be formatted with embedded text characters, as for possible subtypes richtext or html.
elm(1) elm(1) q Quit. Return to the previous attachment level or the Message Menu. s Save the attachment. The attachment is saved in the form it was received, as with the Message Menu s (save) command. v View the subattachment list, if any. Attachment Index Attachments are listed on the Attachment Send Menu and the Attachment View Menu in the following format: num filename (size ) format [encoding ] defined as: A eA num The index number of the attachment.
elm(1) elm(1) If you are not prompted by the mailer to enter the encryption key, you do not have [encode] entered as the first 8 characters of the line. Similarly, [clear] should also be entered as the first 7 characters of the line to indicate the end of encryption.
elm(1) elm(1) To: header. Enter a list of aliases and actual addresses. Aliases are expanded and t shown as addresses and user names. User-defined header. Define your own header entry in the form: u header-name : header-string header-name : must not contain blanks. You can use this command to create a Sensitivity: header entry, as described in the Message Status subsection, or a different header, but only one. See the HEADER FILE section for another way to include user-defined header entries.
elm(1) elm(1) c Copy. Copy to a file. See the Message Menu C (copy) command. e Edit. Invoke your editor, as defined by the alteditor string variable, to revise the message. f Forget. Do not send the message. At user levels 1 and 2, the message may be returned to the send buffer when you execute a subsequent Message Menu f, g, m, or r command or the Alias Menu m command. h Edit the header entries. Invoke the Header Menu. m Make form. Convert the message to the forms message format.
elm(1) elm(1) The received message would look like this: On-Line Phone and Address Database Please fill out and return as soon as possible. Name: my name Manager: my manager Department: my department Division: my division Your home address: home address Home phone number: phone number Thank you for your cooperation. HEADER FILE The $HOME/.elm/elmheaders file provides you with a way to specify special information headers such as X-Organization:, X-Phone:, and so forth.
elm(1) elm(1) String Variables String variables have the form string-name = string-value The following string variables are defined. aliassortby The sort order for the alias index in the Alias Menu. The recognized values are: alias name text Sort by alias name. Sort by the full name of the alias, last name first. Sort by the order of the aliases in the alias text file. Prefix the value with reverse- to reverse the sort order. The default is name.
elm(1) elm(1) The option characters include: A ^ _ a b c d e f h j k l m n o p r s t u v w y z eA The menu title. A blank line. The arrow string variable. * The prefix string variable. The calendar string variable. * The pager string variable. * The editor string variable. * The maildir string variable. * The copy boolean variable. The alteditor string variable. The promptafter boolean variable. The aliassortby string variable. The menu boolean variable. * The names boolean variable.
elm(1) elm(1) data about the sender. See also the remotesignature string variable. The default is none. All the addresses in the To: header must be apparently for the local host. Local addresses are those that, after any elm alias conversion, do not contain a domain name. That is, they have only a user name (for example, santaclaus) or a user name and the local host name (for example, santaclaus@northpole). santaclaus@northpole.arcticsea.
elm(1) elm(1) does not contain %s, the temporary file name is appended to it, and the command is executed. The default is cat %s | lp receivedmail The file where the received messages will be saved. The default is =received, the file received in the directory defined by maildir. remotesignature A signature file that is automatically appended to all outbound mail to remote hosts before the editor is invoked. This usually contains personal data about the sender.
elm(1) elm(1) >From Apparently-To: Content-Length Content-Transfer-Encoding Content-Type: From In-Reply-To: MIME-Version Mailer: Message-Id: Newsgroups: Received: References: Status: X-Mailer: There are two special values: A *clear-weed-list* Clear the default list. The default headers are removed from the weedout list, allowing you to completely define your own list. *end-of-user-headers* Mark the end of the weedout list, in case any following lines could be mistaken for headers in the list.
elm(1) A elm(1) 1 Convert 8-bit messages to 7-bit, but depend on sendmail to handle binary messages. 2 Depend on sendmail to handle both 8-bit and binary messages. readmsginc The value by which the Reading in folder , message: counter is incremented while reading a new folder. If you set this value to a number larger than one, it will speed up the time it takes to read a large folder when you are using a slow terminal. The default is 1.
elm(1) elm(1) askcc If ON, elm prompts you for "carbon copies" with the prompt Copies To: each time you send, forward, or reply to a message. If OFF, the prompt is omitted. In either case, you can still explicitly include Cc: addresses with the ˜c command in the built-in editor, or with the Header Menu commands. The default is ON. autocopy If ON, elm automatically copies the text of the message you are replying to into the edit buffer. If OFF, elm prompts you with Copy message?. The default is OFF.
elm(1) elm(1) is ON, the file is created and the message is saved. If forcename=OFF, the message is saved to the file defined by the sentmail string variable. If savename=OFF, the message is saved to the file defined by the sentmail string variable. forcename If ON, create the folder when saving outbound messages by the login name of the recipient, even if the folder doesn’t already exist. If OFF, do not create the folder. The default is OFF. See the copy boolean variable for further details.
elm(1) elm(1) resolve If ON, move the pointer to the next message in the index, after deleting, undeleting, saving, or forwarding a message. If OFF, keep the pointer at the current message. The default is ON. savename If ON, and you are saving a message, elm constructs a suggested file name in your maildir directory from the user name of the person who sent the message, in the form =username. If OFF, no file name is suggested.
elm(1) elm(1) The message consists of another message in standard message format. metamail is a system program that is invoked by elm to manage the display of messages and attachments that are not displayable in ordinary ASCII text. metamail provides external support for other Content-Types, as defined in one or more mailcap files. The system mailcap file is /etc/mail/mailcap. You can define your own default mailcap file in $HOME/.mailcap.
elm(1) elm(1) in italic type): $ elm j_doe To: doe (John Doe) Subject: this is a test Copies To: ... ...invokes editor, you compose message, then... Your options now are: a)ttachments e)dit message edit h)eader s)end it f)orget it. What is your choice? s mail sent! If you "forget" the message, it is saved in $HOME/Canceled.mail. File Mode with Redirection To send a file by use of command-line redirection, use a command like: A $ elm j_doe < help.c which reads file help.
elm(1) elm(1) /var/mail/loginname .lock Lock for mail directory SEE ALSO answer(1), chfn(1), elmalias(1), fastmail(1), finger(1), mailfrom(1), newalias(1), newmail(1), readmail(1), vi(1), sendmail(1M), passwd(4), terminfo(4), environ(5).
elmalias(1) elmalias(1) NAME elmalias - display and verify elm user and system aliases SYNOPSIS elmalias [-dersu] [-a-f format-n-v-V] [alias-name-list] Remarks The former functionality of the elmalias command has been taken over by the newalias command (see newalias (1)). DESCRIPTION The elmalias command displays and verifies user and system elm aliases. The system database must have been created by the newalias command (see newalias (1)).
elmalias(1) elmalias(1) -f format A Display the format string for each alias name in the file or in the alias-name-list. The following character pairs are replaced in the format by the corresponding value for each alias. %a The alias name. %c The comment field. %l The lastname field. %n The fullname value. %t The alias type: person, group, or unknown. %v The address-list field. -n Change the display to address-list followed by fullname , if any, in parentheses.
elmalias(1) elmalias(1) bro1@kid.computer elmalias -v produces the alias names, address, and full name, as follows: mom dad father pop parents siblings brother1 my_mother@a.computer (My host!otherhost!dad (Dear host!otherhost!dad (Dear host!otherhost!dad (Dear mom,dad,parent@host (The brother1,brother2,sister bro1@kid.
enable(1) enable(1) NAME enable, disable - enable/disable LP printers SYNOPSIS enable printers disable [-c] [-r[reason ] ] printers DESCRIPTION The enable command activates the named printers , enabling them to print requests taken by lp. Use lpstat to find the status of printers (see lp (1) and lpstat (1)). disable deactivates the named printers , disabling them from printing requests taken by lp.
env(1) env(1) NAME env - set environment for command execution SYNOPSIS env [-] [-i] [ name = value ] ... [ command [ arguments ... ] ] DESCRIPTION env obtains the current environment , modifies it according to its arguments, then executes the command with the modified environment. Arguments of the form name =value are merged into the inherited environment before the command is executed.
eucset(1) eucset(1) NAME eucset - sets and gets code widths for ldterm SYNOPSIS eucset [-p] eucset [ [-c HP15-codeset ] or [-c UTF8 ] or [-c GB18030] or [cswidth ] ] DESCRIPTION The eucset command sets or gets (reports) the encoding and display widths of the Extended UNIX Code (EUC), and UCS Transformation Format (UTF8), and GB18030 characters processed by the current input terminal. EUC is an encoding method for codesets composed of single or multiple bytes.
eucset(1) eucset(1) 1:1,0:0,0:0 This default string designates that the environment uses a single byte EUC codeset that has characters in the EUC codeset 1 format. If the environment uses a multibyte EUC codeset in the codeset 1 format, single byte or multibyte EUC codesets in the codeset 2 or 3 format, or both, the default setting cannot be used. EXTERNAL INFLUENCES Environment Variables LANG Provide a default value for the internationalization variables that are unset or null.
ex(1) ex(1) NAME ex, edit - extended line-oriented text editor SYNOPSIS ex [-] [-l] [-r] [-R] [-t tag ] [-v] [-wsize ] [-x] [-C] [+command] [file ...] XPG4 Synopsis ex [-rR] [-s -v] [-c command] [-t tag ] [-w size ] [file ...] Obsolescent Options ex [-rR] [- -v] [+command] [-t tag ] [-w size ] [file ...] edit [-] [-l] [-r] [-R] [-t tag ] [-v] [-wsize ] [-x] [-C] [+command] [file ...] A eA Remarks The program names ex, edit, vi, view, and vedit are separate personalities of the same program.
ex(1) ex(1) -x Set encryption mode. You are prompted for a key to initiate the creation or editing of an encrypted file (see the crypt command in Command Descriptions below). -C Encryption option. Same as the -x option, except that all text read in is assumed to have been encrypted. -c command +command (XPG4 only.) (Obsolescent) Begin editing by executing the specified ex search or positioning command. file Specify the file or files to be edited.
ex(1) ex(1) +n, +[+]... -n, -[-]... An offset relative to the current line or the preceding line specification. + means forward; - means backward. For example, the forms .+3, +3, and +++ are equivalent. /re / ?re ? The line containing the pattern re, scanning forward (/) or backward (?). The trailing / or ? can be omitted if the line is only being displayed. If re is omitted, ex uses the more recently set of either the scanning string or the substitution string (see Regular Expressions below).
ex(1) ex(1) The sequence \n, where n is an integer, is replaced by the text matched by the subpattern enclosed in the nth set of parentheses \( and \). The sequence \u (\l) causes the immediately following character in the replacement to be converted to uppercase (lowercase), if the character is a letter. The sequence \U (\L) turns case conversion on, until the sequence \E or \e is encountered, or the end of the replacement string is reached.
ex(1) ex(1) be also one unnamed buffer, which is the repository for all text deleteed or yanked when no buffer is specified. There are also numbered buffers, 1 through 9, which shall be accessible only from visual mode. These buffers are special in that, in the visual mode, when deleted text is placed in the unnamed buffer, it also shall be placed in buffer 1, the previous contents buffer 1 shall be placed in buffer 2 and so on. Any text in the buffer 9 shall be lost.
ex(1) ex(1) this case, append the character ! to the command. copy range co[py] line flags range t line flags A copy of the specified lines (range ) is placed after the specified destination line ; line 0 specifies that the lines are to be placed at the beginning of the work area. (The letter t is an alternative abbreviation for the copy command.) crypt cr[ypt] X The user is prompted for a key with which to enter encryption mode.
ex(1) ex(1) are allowed; the terminating dot can be omitted if it ends command or commands. The visual command is also permitted (unless the global command itself has been issued from visual mode), and takes input from the terminal. (If command contains a visual-mode command (that is, open or visual), the visual-mode command must be terminated by the visual-mode Q command in order to proceed to the next marked line.) The global command itself and the undo command are not allowed in command.
ex(1) ex(1) argument list can be replaced by specifying a new one on this command line. number range nu[mber] count flags range # count flags (The # character is an alternative abbreviation for the number command.) Print the lines, each preceded by its line number (the only useful flag is l). The last line printed becomes the current line. open line o[pen] /re / flags Enter open mode, which is similar to visual mode with a one-line window. All the visual-mode commands are available.
ex(1) ex(1) rew[ind][!] rewind The argument list is rewound, and the first file in the list is edited. This shall be equivalent to a next command with the current argument list as its operands. If the current buffer has been modified since the last write, a warning shall be written and the command shall be aborted. Any warnings can be overridden by appending a !. The current indicator line shall be affected by the editor options, autowrite and writeany.
ex(1) ex(1) If the sr or ˜ forms of the command are used, the substitution pattern defaults to the more recently set of either the substitution string or the scanning string and the replacement string defaults to the previous replacement string used. The form s\?repl is equivalent to s/scan-re /repl /, where scan-re is the previous scanning string. The form s\&repl is equivalent to s/subs-re /repl /, where subs-re is the previous substitution string.
ex(1) ex(1) Use the Q command to exit visual mode. For more information, see vi (1). [range ] w[rite][!][>>] file [range ] wq[!][>>] file write Write the specified lines (or the entire work area, if no range is given) out to file , printing the number of lines and characters written. If file is not specified, the default is the current file (the command fails with an error message if there is no current file and no file is specified).
ex(1) ex(1) Shift the specified lines to the right by inserting whitespace The number of spaces inserted is determined by the editor option shiftwidth. The last line changed becomes the current line. line z type count flags (window) The number of lines specified by count are displayed. The default for count is the value of the editor option window. If type is omitted, count lines following the specified line are printed.
ex(1) ex(1) directory=dirname (dir) Specify the directory in which the editor work area should be placed. This option only takes effect when a new work area is created. It should be set in EXINIT or .exrc to affect the location of the work area file for the edit file specified on the command line. The default is /var/tmp. If the specified directory is set from EXINIT or a .exrc file and is not writable by the user, the editor quits; if set interactively by the user, the editor issues an error message.
ex(1) ex(1) deleted). Use the map! command to list the currently enabled input-mode mappings. Reversed by nokeyboardedit!. The default is nokeyboardedit! for terminals whose keyboard editing keys send HP-style escape sequences (an ESC followed by a single letter). The default is keyboardedit! for all other terminals. lisp Modify autoindent mode and the (, ), [[, ]], {, and } commands in visual mode for lisp source code. Reversed by nolisp. The default is nolisp.
ex(1) ex(1) remap If set, macro translation allows for macros defined in terms of other macros; translation continues until the final product is obtained. If unset, a one-step translation only is done. Reversed by noremap. The default is remap. report=n The value of n gives the number of lines that must be changed by a command before a report is displayed on the number of lines affected. If n is 5, then changes are reported for 6 or more lines. The ex, vi, and view default is report=5.
ex(1) ex(1) term=termtype Define the type of terminal being used with the editor. The default value is obtained from the TERM environment variable. If TERM is unset or null, term is set to unknown. There is no difference between the term and ttytype editor options. Setting either one results in both being changed. terse Use shorter error messages. Reversed by noterse. The default is noterse.
ex(1) ex(1) two arguments -c and string. If no SHELL environment variable is set, or it is set to a null string, the sh utility shall be used. TERM is a variable that shall be interpreted as the name of the terminal type. If this variable is unset or null, an unspecified default terminal type shall be used. EXINIT is a variable that shall be interpreted to contain a list of ex commands that are executed on editor startup, before reading the first file.
ex(1) ex(1) When an error occurs, ex shall alert ther terminal and write a message. If the system crashes, ex shall attempt to preserve the buffer if any unwritten changes were made. The command-line option -r can be used to retrieve the saved changes. During initialization (before the first file is read or any user commands from the terminal are processed), if the environment variable EXINIT is set, the editor shall execute ex commands contained in that variable.
ex(1) ex(1) SEE ALSO ctags(1), ed(1), stty(1), vi(1), write(1), terminfo(4), environ(5), lang(5), regexp(5). The Ultimate Guide to the vi and ex Text Editors , Benjamin/Cummings Publishing Company, Inc., ISBN 0-8053-4460-8, HP part number 97005-90015.
expand(1) expand(1) NAME expand, unexpand - expand tabs to spaces, and vice versa SYNOPSIS expand [-t tablist ] [ file ... ] unexpand [-a] [-t tablist ] [ file ... ] Obsolescent: expand [-tabstop ] [-tab1 ,tab2 ,... , tabn ] [ file ... ] DESCRIPTION expand processes the named files or the standard input and writes to the standard output with tabs changed into spaces. Backspace characters are preserved in the output, and the column count is decreased by one column for tab calculations.
expand(1) expand(1) STANDARDS CONFORMANCE expand: XPG4, POSIX.2 unexpand: XPG4, POSIX.
expand_alias(1) expand_alias(1) NAME expand_alias - recursively expands the sendmail aliases SYNOPSIS expand_alias [-rmax_recursion] [-t] [-tt] alias DESCRIPTION Expand_alias is a shell script that recursively expands the sendmail aliases. Through use of telnet host 25 and the expn command, each alias is recursively expanded into its destination(s). Indentation is used to show each level of recursion. Because of the recursive use of telnet, expand_alias is slow.
expr(1) expr(1) NAME expr - evaluate arguments as an expression SYNOPSIS expr arguments DESCRIPTION expr takes arguments as an expression, evaluates, then writes the result on the standard output. Terms in the expression must be separated by blanks. Characters special to the shell must be escaped. Note that 0, rather than the null string, is returned to indicate a zero value. Strings containing blanks or other special characters should be quoted.
expr(1) expr(1) International Code Set Support Single- and multi-byte character code sets are supported. RETURN VALUE As a side effect of expression evaluation, expr returns the following exit values: 0 Expression is neither null nor zero. 1 Expression is null or zero. 2 Invalid expression. >2 An error occurred while evaluating the expression.
factor(1) factor(1) NAME factor, primes - factor a number, generate large primes SYNOPSIS factor [ number ] primes [ start [ stop ] ] DESCRIPTION If no arguments are provided on the command line, factor waits for a number to be typed in. If a positive number is typed, it factors the number and print its prime factors; each one is printed the proper number of times. It then waits for another number. factor exits if it encounters a zero or any nonnumeric character.
fastbind(1) fastbind(1) NAME fastbind - Prepare an incomplete executable for faster program start-up SYNOPSIS fastbind [-nu] incomplete-executable... DESCRIPTION fastbind is a tool that can improve the start-up time of programs that use shared libraries (incomplete executables) by storing information about needed shared library symbols in the executable file.
fastbind(1) fastbind(1) NLSPATH Determines the location of message catalogs for the processing of LC_MESSAGES. If any internationalization variable contains an invalid setting, fastbind behaves as if all internationalization variables are set to C. See environ (5). In addition, the following environment variable affects fastbind: TMPDIR Specifies a directory for temporary files (see tmpnam (3S)). DIAGNOSTICS fastbind returns zero when the operation is successful.
fastmail(1) fastmail(1) NAME fastmail - quick batch mail interface SYNOPSIS fastmail [-b bcc-list ] [-c cc-list ] [-C comments ] [-f from-name ] [-F from-addr ] [-i in-replyto ] [-r reply-to ] [-R references ] [-s subject ] filename address-list DESCRIPTION The fastmail command is a simple interface to the mail system that allows you to send a message without the overhead of an interactive mailer. It is particularly efficient in batch-processing mail to very large groups of people.
fastmail(1) fastmail(1) -c "cc1,cc2,cc3,cc4" \ -d \ -F me@anotherhost.com \ -f My Name \ -i "Your recent message" \ -R REF:13579 \ -r oscar \ -s "Testing fastmail" \ message-file \ addr1 addr2 addr3 addr4 The online execution displays the following debug messages: Mailing to addr1,addr2,addr3,addr4 cc1,cc2,cc3,cc4 bcc1,bcc2,bcc 3,bcc4 [via sendmail] cat /tmp/fastmail.
fastmail(1) fastmail(1) FILES /etc/mail/aliases /usr/sbin/sendmail /tmp/fastmail.pid sendmail aliases file. Mail transport agent. Temporary file. AUTHOR fastmail was developed by HP. SEE ALSO elm(1), sendmail(1M).
file(1) file(1) NAME file - determine file type SYNOPSIS file [-m mfile ] [-c ] [-f ffile ] [-h ] file ... DESCRIPTION file performs a series of tests on each file in an attempt to classify it. If file appears to be an ASCII file, file examines the first 512 bytes and tries to guess its language. If file is an executable a.out file, file prints the version stamp, provided it is greater than 0 (see the description of the -V option in ld(1)).
find(1) find(1) NAME find - find files SYNOPSIS find pathname_list [expression ] DESCRIPTION The find command recursively descends the directory hierarchy for each path name in pathname_list (that is, one or more path names) seeking files that match a Boolean expression written in the primaries given below. By default, find does not follow symbolic links. The Boolean expression is evaluated using short-circuit evaluation.
find(1) find(1) -perm [-]mode In this primary, the argument mode is used to represent file mode bits. The argument is identical in format to the mode operand as described in chmod(1), with the exception that the first character must not be the - operator. When using the symbolic form of mode, the starting template is assumed to have all file mode bits cleared. If the leading minus is omitted, this primary is true when the file permission bits exactly match the value of mode.
find(1) find(1) -newer file True if the current file has been modified more recently than the argument file . -newer[tv1[tv2] ] file True if the indicated time value (tv1 ) of the current file is newer than the indicated time value (tv2 ) of file . The time values tv1 and tv2 are each selected from the set of characters: a c m The time the file was last accessed The time the inode of the file was last modified The time the file was last modified If the tv2 character is omitted, it defaults to m.
find(1) find(1) ! expression Logical NOT operator. True if expression is not true. expression [-a] expression Logical AND operator. True if both of the expression s are true. expression -o expression Logical OR operator. True if either or both of the expression s are true. If expression is omitted, or if none of -print, -ok, -exec, -cpio, or -ncpio is specified, -print is assumed. The -user, -group, and -newer primaries each evaluate their respective arguments once.
find(1) find(1) EXTERNAL INFLUENCES Environment Variables If an internationalization variable is not specified or is null, it defaults to the value of LANG. If LANG is not specified or is null, it defaults to C (see lang (5)). If LC_ALL is set to a nonempty string value, it overrides the values of all the other internationalization variables. If any internationalization variable contains an invalid setting, all internationalization variables default to C (see environ (5)).
find(1) find(1) processes and greater system efficiency. The + delimiter for the -exec primary can be used to achieve the same efficiency. Access Control List Examples Find all files not owned by user karl that have access control lists with at least one entry associated with karl, and one entry for no specific user in group bin with the read bit on and the write bit off: find / ! -user karl -acl ’karl.*, %.
findmsg(1) findmsg(1) NAME findmsg, dumpmsg - create message catalog file for modification SYNOPSIS findmsg [-aiv] [ [-D sym ] [-U sym ]] file ... dumpmsg file ... DESCRIPTION The findmsg command extracts messages from a C program source file and writes them to the standard output in a format suitable for input to gencat (see gencat (1)). The input file will be preprocessed using cpp (see cpp (1)) in order to select print specifiers and handle ifdef, ifndef... conditional cpp primitives.
findmsg(1) findmsg(1) WARNINGS The findmsg and dumpmsg commands are HP proprietary, not portable to other vendors’ systems, and will not be provided in future HP-UX releases. AUTHOR findmsg and dumpmsg were developed by HP. SEE ALSO findstr(1), gencat(1), insertmsg(1), catgets(3C).
findstr(1) findstr(1) NAME findstr - find strings for inclusion in message catalogs SYNOPSIS findstr file ... DESCRIPTION findstr examines files of C source code for uncommented string constants which it places, along with the surrounding quotes, on the standard output, preceding each by the file name, start position, and length. This information is used by insertmsg (see insertmsg (1)). findstr does not output strings that are parameters of the catgets() routine (see catgets (3C)).
finger(1) finger(1) NAME finger - user information lookup program SYNOPSIS finger [ options ] user_name ... DESCRIPTION By default, finger lists for each user_name on the system: A fA • • • • • • • • • • Login name, Full given name, Terminal write status (if write permission is denied), Idle time, Login time, User’s home directory and login shell, Any plan the user has placed in file .plan in their home directory, Project on which they are working from the file .
finger(1) finger(1) SEE ALSO chfn(1), who(1), utmpd(1M).
fmt(1) fmt(1) NAME fmt - format text SYNOPSIS fmt [-cs] [-w width ] [file ...] DESCRIPTION The fmt command is a simple text formatter that fills and joins lines to produce output lines of (up to) the number of characters specified in the -w width option. The default width is 72. fmt concatenates the file arguments. If none are given, fmt formats text from the standard input. Blank lines are preserved in the output, as is the spacing between words. fmt does not fill lines beginning with a period (.
fold(1) fold(1) NAME fold - fold long lines for finite width output device SYNOPSIS fold [-b] [-s] [-w width ] [ file ... ] Obsolete form: fold [-s] [-width ] [ file ... ] DESCRIPTION The fold command is a filter that folds the contents of the specified files, breaking the lines to have a maximum of width column positions (or bytes, if the -b option is specified).
fold(1) fold(1) SEE ALSO expand(1). STANDARDS CONFORMANCE fold: XPG4, POSIX.
forder(1) forder(1) NAME forder - convert file data order SYNOPSIS forder [-a] [-l] [-n] [ file ... ] DESCRIPTION The text orientation (mode) of a file can be right-to-left (non-Latin) or left-to-right (Latin). This text orientation can affect the way data is arranged in the file. The data arrangements that result are called screen order and keyboard order. forder converts the order of characters in the file from screen order to keyboard order or vice versa.
forder(1) forder(1) SEE ALSO environ(5), strord(3C), nljust(1).
from(1) from(1) NAME from - who is my mail from? SYNOPSIS from [-s sender ] [ user ] DESCRIPTION from prints the mail header lines in your mailbox file to show who sent you mail. If user is specified, user ’s mailbox is examined instead of your own. If the -s option is given, only headers of mail from sender are printed. EXAMPLES List header lines for all current mail in your mailbox that was sent by ken.
fruled(1) fruled(1) NAME fruled - flash/turn off attention LEDs (cell, cabinet and I/O chassis attention LEDs) SYNOPSIS fruled -c cell [-c...] [-f|-o] [-B] [ -u username :[passwd ] -h IPaddress|hostname | -g [passwd ] -h IPaddress|hostname ] fruled -i I/Ochassis [-i...] [-f|-o] [-B] [ -u username :[passwd ] -h IPaddress|hostname | -g [passwd ] -h IPaddress|hostname ] fruled -b cabinet [-b...
fruled(1) -g [passwd] fruled(1) Allows access to the complex specified by the -h option. The accessed complex is then considered the target complex. Access is via the service processor’s LAN port. The -h option is required if this option is used. passwd specifies the IPMI password of the service processor. If this field is omitted, the command prompts for the password.
fruled(1) • • fruled(1) Use the cimconfig(1M) command to verify (and correct if necessary) the setting of the following two variables: • enableRemotePrivilegedUserAccess=true • enableHttpsConnection=true You must have appended the target partition’s digital certificate to the local partition’s Trust Store file. For the nPartition commands, the Trust Store file is /var/opt/wbem/client.pem. Refer to the WBEM documents specified in the SEE ALSO section below for further information.
ftio(1) ftio(1) NAME ftio - faster tape I/O SYNOPSIS ftio -o-O [achpvxAELM] [-B blksize ] [-D type ] [-e extarg ] [-K comment ] [-L filelist ] [-N datefile ] [-S script ] [-T tty ] [-Z nobufs ] tapedev [pathnames ] [-F ignorenames ] ftio -i-I [cdfmptuvxAEMPR] [-B blksize ] [-S script ] [-T tty ] [-Z nobufs ] tapedev [patterns ] ftio -g [v] tapedev [patterns ] DESCRIPTION ftio is a tool designed specifically for copying files to tape drives.
ftio(1) ftio(1) permissions of the files are those of the previous -o operation. -I Extract (copy into the file system) files in the same way as for ftio -icdmv, when no modifiers are used with the -I. However, if the .ftiorc file exists in the user’s home directory, ftio opens this file, and scans for lines preceded by I=. Options defined on matching lines are passed to ftio as if they had been specified on the command line. See EXAMPLES section. -g Read the file list in tapedev .
ftio(1) ftio(1) -T tty Specify alternative to /dev/tty. Normally /dev/tty is opened by ftio when terminal interaction is required. -Z nobufs Specify the number of blksize chunks of memory to use as buffer space between the two processes, where blksize is the size of blocks written to the tape. More chunks is usually better, but a point is reached where no improvement is gained, and performance might deteriorate as buffer space is swapped out of main memory.
ftio(1) ftio(1) cpio Compatibility ftio uses the same archive format as cpio. However, by default ftio creates tape headers and uses a tape block size of 16KB. cpio by default uses 512-byte blocks. When used with the -B option, cpio uses 5120 byte blocks. To achieve full compatibility with cpio in either input or output mode, the user should specify the M modifier. ftio -oM creates a single- or multi-tape archive that has no tape headers, and, by default, the same block size as cpio -[oi]B.
ftio(1) ftio(1) ftio operates using System V shared memory and semaphores. The resources committed to these functions are not freed automatically by the system when the process terminates. ftio does this only when it terminates normally, or when it terminates after receiving one the following signals: SIGHUP, SIGINT, SIGTERM. Any other signal is handled in the default manner described by signal (2). Note that the behavior for SIGKILL is to terminate the process without delay.
ftp(1) ftp(1) NAME ftp - file transfer program SYNOPSIS ftp [-g] [-i] [-n] [-c] [-v] [-p] [-P] [-l] [-B size ] [ server-host ] DESCRIPTION ftp is a user interface to the File Transfer Protocol. between the local ‘‘client’’ host and a remote ‘‘server’’ host. ftp copies files over a network connection ftp runs on the client host. Options The ftp command supports the following options: A fA -g Disable file name ‘‘globbing’’; see the glob command, below.
ftp(1) ftp(1) COMMANDS ftp supports the following commands. Command arguments with embedded spaces must be enclosed in quotes (for example, "argument with embedded spaces"). ![ command [ args ] ] Invoke a shell on the local host. The SHELL environment variable specifies which shell program to invoke. ftp invokes /usr/bin/sh if SHELL is undefined. If command is specified, the shell executes it and returns to ftp. Otherwise, an interactive shell is invoked. When the shell terminates, it returns to ftp.
ftp(1) ftp(1) longaddr Toggle the use of the LPRT/LPSV commands for data connection in the IPv6 environment. By default, the EPRT/EPSV commands are used in the IPv6 environment. In the IPv4 environment PORT/PASV commands are used. form format Set the file transfer form to format . The only supported format is non-print get remote-file [ local-file ] Copy remote-file to local-file .
ftp(1) ftp(1) mls remote-files local-file Write an abbreviated listing of remote-files to local-file . If globbing is enabled, globbing metacharacters are expanded. If interactive prompting is on, ftp prompts the user to verify that the last argument is indeed the target local file for mls output. mode [ mode-name ] Set the FTP file transfer mode to mode-name . The only supported mode is stream. modtime remote-file Show the last modification time of remote-file .
ftp(1) ftp(1) prompt Toggle interactive prompting. By default, ftp prompts the user for a yes or no response for each output file during multiple-file commands. If interactive prompting is disabled, ftp performs the command for all specified files. proxy ftp-command Execute an ftp command on a secondary control connection. This command allows simultaneous connection to two remote FTP servers for transferring files between the two servers.
ftp(1) ftp(1) send local-file [ remote-file ] A synonym for put. sendport Toggle the use of PORT commands. By default, ftp attempts to use a PORT command when establishing a connection for each data transfer. If the PORT command fails, ftp uses the default data port. When the use of PORT commands is disabled, ftp makes no attempt to use PORT commands for each data transfer. This is useful for certain FTP implementations that ignore PORT commands but (incorrectly) indicate that they’ve been accepted.
ftp(1) ftp(1) by the remote server, including violations of the FTP protocol. If the delay results from unexpected remote server behavior, the local ftp program must be killed manually. File Naming Conventions Files specified as arguments to ftp commands are processed according to the following rules. • If the file name - is specified, ftp uses the standard input (for reading) or standard output (for writing).
ftpcount(1) ftpcount(1) NAME ftpcount - show current number of users for each class SYNOPSIS /usr/bin/ftpcount [-V] DESCRIPTION The ftpcount command shows the current number of users (and the limit) for each class defined in the ftpaccess file. If the ftpaccess file does not exist, the ftpcount command will not display anything. However, if the ftpaccess file exists and it is of zero bytes, ftpcount will display an error message: ftpcount:no service classes defined, no usage count kept.
ftprestart(1) ftprestart(1) NAME ftprestart - remove the shutdown message file created by ftpshut utility. SYNOPSIS /usr/bin/ftprestart [-V] DESCRIPTION The ftprestart command removes all the shutdown message files from the real, anonymous, and virtual user accounts. The message files are created by the ftpshut utility in the path as specified by the ‘shutdown’ directive in the /etc/ftpd/ftpaccess file (see ftpshut (1) for more details). This command is always used after the ftpshut command is executed.
ftpshut(1) ftpshut(1) NAME ftpshut - create shutdown message file to shut down the ftp servers at a given time SYNOPSIS /usr/bin/ftpshut [-V] [ -l min ] [ -d min ] time [ warning-message ... ] DESCRIPTION The ftpshut command provides an automated shutdown procedure that a superuser can use to notify ftp users when the ftp server is shutting down.
ftpshut(1) ftpshut(1) AUTHOR ftpshut was developed by the Washington University, St. Louis, Missouri.
ftpwho(1) ftpwho(1) NAME ftpwho - show current process information for each ftp user. SYNOPSIS /usr/bin/ftpwho [-V] DESCRIPTION The ftpwho command shows the current process information for each user logged into the ftp server. If the ftpaccess file does not exist, this command will not display anything. However, if the ftpaccess file exists and it is of zero bytes then this command will display an error message: ftpwho: no service classes defined, no usage count kept.
gencat(1) gencat(1) NAME gencat - generate a formatted message catalog file SYNOPSIS gencat [-l] catfile msgfile ... DESCRIPTION Message catalogs allow a program to process input and produce output according to local customs and languages. For details, see Native Language Support Users Guide . The gencat command merges each message source msgfile into a formatted message catalog catfile that can be accessed by catgets() (see catgets (3C)). If catfile does not exist, it is created.
gencat(1) $ comment gencat(1) A $ followed by a space or tab is treated as a comment and can appear anywhere in a file. A line consisting of zero or more spaces or tabs is treated as a comment line. NL_TEXTMAX, NL_SETMAX, and NL_MSGMAX are defined in . NL_SETD is defined in . MAX_BUFLEN is defined in . EXTERNAL INFLUENCES Environment Variables LANG provides a default value for the internationalization variables that are unset or null.
genxlt(1) genxlt(1) NAME genxlt - generate iconv translation tables SYNOPSIS genxlt [ -f output_filename ] [ input_filename ] DESCRIPTION genxlt generates a compiled, non-readable binary version of the iconv table that is suitable for use by iconv (1) and iconv (3C). If input_filename or output_filename is not supplied, standard input and/or standard output will be used.
genxlt(1) genxlt(1) This is an example of the input_file: #What: CodesetA to CodesetB: version 1.0 #Galley: 0xffff # the conversion data is as follows: 0x01 0x01 0x02 0x42 ... 0xff87 0x4567 ... etc. WARNINGS Because genxlt will write over the existing table, it is wise to save the existing table into another file before using genxlt. Warnings are not given for incorrect data in the input_file. You must have super-user privileges to install files in /usr/lib/nls/iconv/tables.
get(1) get(1) NAME get - get a version of an SCCS file SYNOPSIS get [-r SID] [-c cutoff] [-e] [-b] [-i list ] [-x list ] [-k] [-l[p] ] [-p] [-s] [-m] [-n] [-g] [-t] [-w string ] [-a seq-number ] file ... DESCRIPTION The get command generates an ASCII text file from each named SCCS file according to the specifications given by its option arguments, which begin with -. The arguments can be specified in any order, but all option arguments apply to all named SCCS files.
get(1) get(1) list ::= range list, range range ::= SID SID - SID SID, the SCCS Identification of a delta, can be in any form shown in the "SID Specified" column of Table 1. Partial SIDs are interpreted as shown in the "SID Retrieved" column of Table 1. See WARNINGS. -xlist A list of deltas to be excluded (forced not to be applied) in the creation of the generated file. See the -i option for the list format.
get(1) get(1) Table 1. Determination of SCCS Identification String SID* − b Option Specified Used % A gA Other Conditions SID Retrieved SID of Delta to be Created none %% none %% no yes R defaults to mR R defaults to mR mR.mL mR.mL mR.(mL+1) mR.mL.(mB+1).1 R R R R R no no yes yes - mR.mL mR.mL mR.mL mR.mL hR.mL** R.1*** mR.(mL+1) mR.mL.(mB+1).1 mR.mL.(mB+1).1 hR.mL.(mB+1).1 R - R > mR R = mR R > mR R = mR R < mR and R does not exist Trunk succ.# in release > R and R exists R.mL R.mL.
get(1) get(1) %R% Release. %L% Level. %B% Branch. %S% Sequence. %D% Current date (YY/MM/DD). %H% Current date (MM/DD/YY). %T% Current time (HH:MM:SS). %E% Date newest applied delta was created (YY/MM/DD). %G% Date newest applied delta was created (MM/DD/YY). %U% Time newest applied delta was created (HH:MM:SS). %Y% Module type: value of the t flag in the SCCS file (see admin (1)). %F% SCCS file name. %P% Fully qualified SCCS file name.
get(1) get(1) files are named by replacing the leading s with the tag. The g-file is an exception to this scheme: the gfile is named by removing the s. prefix. For example, s.xyz.c, the auxiliary file names would be xyz.c, l.xyz.c, p.xyz.c, and z.xyz.c, respectively. The g-file , which contains the generated text, is created in the current directory (unless the -p option is used). A g-file is created in all cases, whether or not any lines of text were generated by the get. It is owned by the real user.
getaccess(1) getaccess(1) NAME getaccess - list access rights to file(s) SYNOPSIS getaccess [-u user ] [-g user ] group [, group ] ... ] [-n] file ... getaccess -r [-n] file ... DESCRIPTION getaccess lists for the specified files the effective access rights of the caller (that is, for their effective user ID, effective group ID, and supplementary groups list).
getaccess(1) 2 getaccess(1) A file is nonexistent or unreachable (by the caller). getaccess prints an appropriate message to standard error, continues, then returns a value of 2 upon completion. EXAMPLES The following command prints the caller’s access rights to file1 using the file’s group ID instead of the caller’s effective group ID and groups list.
getacl(1) getacl(1) NAME getacl - list access control lists (ACLs) for files (JFS File Systems only) SYNOPSIS /usr/bin/getacl [-ad] file... DESCRIPTION For each argument that is a regular file, special file, or named pipe, getacl displays the owner, group, and the Access Control List (ACL). For each directory argument, getacl displays the owner, group, and the ACL and/or the default ACL. Only directories contain default ACLs.
getacl(1) getacl(1) permissions actually granted.
getacl(1) getacl(1) NOTICES The output from getacl will be in the correct format for input to the setacl command. If the output from getacl is redirected to a file, the file may be used as input to setacl. In this way, a user may easily assign one file’s ACL to another file. FILES /etc/passwd /etc/group for user IDs for group IDs SEE ALSO acl(2), aclsort(3C), chmod(1), ls(1), setacl(1).
getconf(1) getconf(1) NAME getconf - get system configuration values SYNOPSIS getconf [-v specification ] system_var getconf [-v specification ] system_var pathname DESCRIPTION The getconf command provides an interface to the confstr (3C), pathconf (2), and sysconf (2) library routines and system calls. The system_var argument specifies the configuration value desired in confstr(), pathconf(), or sysconf().
getconf(1) getconf(1) getconf gives the following output: 1 If the implementation supports multiple locality domains. undefined If the implementation doesn’t support multiple locality domains.
getconf(1) getconf(1) POSIX_CHOWN_RESTRICTED POSIX_NO_TRUNC POSIX_VDISABLE Note For a complete list of parameters supported by getconf, look into the manual pages of sysconf(), pathconf(), and confstr(). AUTHOR getconf was developed by HP and POSIX. SEE ALSO pathconf(2), sysconf(2), confstr(3C). STANDARDS CONFORMANCE getconf: POSIX.
getopt(1) getopt(1) NAME getopt - parse command options SYNOPSIS getopt optstring args DESCRIPTION getopt is used to break up options in command lines for easy parsing by shell procedures and to check for legal options. optstring is a string of recognized option letters (see getopt (3C)). If a letter is followed by a colon, the option is expected to have an argument which may or may not be separated from it by white space. The positional parameters ($1 $2 ...
getopt(1) getopt(1) This code accepts any of the following as equivalent: cmd cmd cmd cmd -aoarg file file -a -o arg file file -oarg -a file file -a -oarg -- file file WARNINGS getopt option arguments must not be null strings nor contain embedded blanks. SEE ALSO sh(1), getopt(3C).
getopts(1) getopts(1) NAME getopts - parse utility (command) options SYNOPSIS getopts optstring name [ arg ... ] DESCRIPTION getopts is used to retrieve options and option-arguments from a list of parameters. Each time it is invoked, getopts places the value of the next option in the shell variable specified by the name operand and the index of the next argument to be processed in the shell variable OPTIND. Whenever the shell is invoked, OPTIND is initialized to 1.
getopts(1) getopts(1) getopts by default parses positional parameters passed to the invoking shell procedures. If args are given, they are parsed instead of the positional parameters. EXTERNAL INFLUENCES Environment Variable The following environment variable affects the execution of the getopts utility: OPTIND Used by getopts as the index of the next argument to be processed.
getopts(1) getopts(1) SEE ALSO getopt(1), ksh(1), sh-posix(1), sh(1), getopt(3C). STANDARDS CONFORMANCE getopts: XPG4, POSIX.
getprivgrp(1) getprivgrp(1) NAME getprivgrp - get special attributes for group SYNOPSIS getprivgrp [-g group_name ] DESCRIPTION getprivgrp lists the access privileges of privileged groups set by setprivgrp (see setprivgrp (1M)). If group_name is supplied, access privileges are listed for that group only. If the caller is not a member of group_name , no information is displayed. If -g is used, getprivgrp lists access privileges that have been granted to all groups.
gprof(1) gprof(1) NAME gprof - display call graph profile data SYNOPSIS gprof [ options ] [ a.out [ gmon.out ... ] ] DESCRIPTION The gprof command produces an execution profile of C++, C and FORTRAN programs. The effect of called routines is incorporated into the profile of each caller. Profile data is taken from the call graph profile file (gmon.out default) that is created by programs compiled with the -G option of aCC, cc, and f90 and linked with libgprof.so or libgprof.
gprof(1) A gA gprof(1) -f name Print only the graph profile entry of the specified routine name and its descendants. More than one -f option can be given. Only one name can be given with each -f option. -F name Print only the graph profile entry of the routine name and its descendants (as -f above) and also use only the times of the printed routines in total time and percentage computations. More than one -F option can be given. Only one name can be given with each -F option.
gprof(1) gprof(1) { printf("Hello world\n"); a(); } $ cc -G main.c -L. -ltest $ export LD_PROFILE=a.out:libtest.so $ export LD_PROFILEBUCKET_SIZE=16 $ ./a.out hello world I in a $ unset LD_PROFILE $ unset LD_PROFILEBUCKET_SIZE $ ls gmon.out gmon.out $ gprof WARNINGS Beware of quantization errors. The granularity of the sampling is shown, but remains statistical at best.
grep(1) grep(1) NAME grep, egrep, fgrep - search a file for a pattern SYNOPSIS Plain call with pattern grep [-E -F] [-c-l-q] [-bhinsvwx] pattern [ file ... ] Call with (multiple) − e pattern grep [-E -F] [-c-l-q] [-bhinsvwx] -e pattern ... [-e pattern ] ... [ file ... ] Call with − f file grep [-E -F] [-c-l-q] [-bhinsvwx] [-f pattern_ file ] [ file ... ] Obsolescent: egrep [-cefilnsv] [ expression ] [ file ... ] fgrep [-cefilnsvx] [ strings ] [ file ...
grep(1) grep(1) -q (Quiet) Do not write anything to the standard output, regardless of matching lines. Exit with zero status upon finding the first matching line. Overrides any options that would produce output. -s Error messages produced for nonexistent or unreadable files are suppressed. -v All lines but those matching are printed. -w Select only those lines containing matches that form whole words.
grep(1) grep(1) Ken Judy Ann 112 Warring St. Apt. A 387 Bowditch Apt. 12 429 Sixth St. the command: grep Judy address prints: Judy 387 Bowditch Apt.
groups(1) groups(1) NAME groups - show group memberships SYNOPSIS groups [-p] [-g] [-l] [ user ] DESCRIPTION groups shows the groups to which the caller or the optionally specified user belong. If invoked with no arguments, groups prints the current access list returned by getgroups() (see getgroups (2)). Each user belongs to a group specified in the password file /etc/passwd and possibly to other groups as specified in the files /etc/group and /etc/logingroup.
head(1) head(1) NAME head - give first few lines SYNOPSIS head [-c-l] [-n count ] [ file ... ] Obsolescent: head [-count ] [ file ... ] DESCRIPTION head prints on standard output the first count lines of each of the specified files, or of the standard input. If count is omitted it defaults to 10. If multiple files are specified, head outputs before each file a line of this form: ==> file <== Options A hA -c The quantity of output is measured in bytes. -count The number of units of output.
host(1) host(1) NAME host - DNS lookup utility SYNOPSIS host [-aCdlnrTwv] [-c class ] [-N ndots ] [-R number] [-t type ] [-W wait ] name server DESCRIPTION host is a simple utility for performing DNS lookups. It is normally used to convert names to IP addresses and vice versa. When no arguments or options are given, host prints a short summary of its command line arguments and options. Arguments name server This is the domain name that is to be looked up.
host(1) host(1) the C option was given, queries will be made for SOA records; and if name is a dotteddecimal IPv4 address or colon-delimited IPv6 address, host will query for PTR records. W wait The time to wait for a reply can be controlled through the W option. This option makes host wait for wait seconds. If wait is less than 1, the wait interval is set to one second. w When this option is used, host will effectively wait forever for a reply.
hostname(1) hostname(1) NAME hostname - set or display name of current host system SYNOPSIS hostname [name_of_host ] DESCRIPTION The hostname command displays the name of the current host, as given in the gethostname() system call (see gethostname (2)). Users who have appropriate privileges can set the hostname by giving the argument name_of_host ; this is usually done in the startup script /sbin/init.d/hostname.
hp(1) hp(1) NAME hp - handle special functions of HP 2640 and HP 2621-series terminals SYNOPSIS hp [-e] [-m] DESCRIPTION hp supports special functions of the Hewlett-Packard HP 2640 and HP 2621 series of terminals, with the primary purpose of producing accurate representations of most nroff output. A typical use is: nroff -h files ... | hp Regardless of the hardware options on a given terminal, hp tries to do sensible things with underlining and reverse line-feeds.
hyphen(1) hyphen(1) NAME hyphen - find hyphenated words SYNOPSIS hyphen [ files ] DESCRIPTION hyphen finds all the hyphenated words ending lines in files and prints them on the standard output. If no arguments are given, the standard input is used; thus, hyphen can be used as a filter. EXAMPLES Prepare an nroff hyphenation proofreading file for textfile . mm textfile | hyphen WARNINGS hyphen cannot cope with hyphenated italics (i.e., underlined) words; it often misses them completely or mangles them.
iconv(1) iconv(1) NAME iconv - code set conversion SYNOPSIS iconv -f fromcode -t tocode [ file ... ] DESCRIPTION iconv converts the encoding of characters in the input files from the fromcode code set to the tocode code set, and writes the results on standard output. If no input files are given, iconv reads from standard input. If - appears as an input file name, iconv reads standard input at that point. - - can be used to delimit the end of options (see getopt (3C)).
iconv(1) iconv(1) SEE ALSO getopt(3C), iconv(3C).
id(1) id(1) NAME id - print user and group IDs and names SYNOPSIS id [-u] [-nr] [user ] id [-g] [-nr] [user ] id [-G] [-n] [user ] id [-P] DESCRIPTION The id command writes a message to standard output, giving the user and group IDs and names for the process. If the effective and real IDs are different, both are printed. If the process has supplementary group affiliations (see groups (1)), the supplementary group affiliations are also written.
id(1) id(1) produces: users To display the user and group data for another user: id ralford produces: uid=329(ralford) gid=20(users) To display the PRM group ID for the current process: id -P produces: uid=329(ralford) gid=20(users) prmid=1(OTHERS) DEPENDENCIES HP Process Resource Manager The -P option requires that the optional HP Process Resource Manager (PRM) software be installed and configured.
ident(1) ident(1) NAME ident - identify files in RCS SYNOPSIS ident file ... DESCRIPTION ident searches the named files for all occurrences of the pattern $keyword :...$, where keyword is one of the following: Author Date Header Locker Log Revision Source State These patterns are normally inserted automatically by the RCS co command, but can also be inserted manually (see co(1)). ident works on text files as well as object files. For example, if the C program in file f.
idlookup(1) idlookup(1) NAME idlookup - identify the user of a particular TCP connection SYNOPSIS idlookup host-or-ip-number local-port foreign-port DESCRIPTION idlookup can be used to identify the user at the remote end of a TCP connection, assuming the host at the other end is running an Identification Server. host-or-ip-number is the name of the host at the other end of the connection, or its IP address.
ied(1) ied(1) NAME ied - input editor and command history for interactive programs SYNOPSIS ied [-dirt] [-h file ] [-s size ] [-p prompt ] [-k charmap ] utility [ arguments ... ] DESCRIPTION ied is a utility command that is intended to act as an interface between the user and an interactive program such as bc, bs, or a shell, providing most of the line editing and history functionality found in the Korn shell.
ied(1) ied(1) \t \b tab backspace \v vertical tab Three- and four-character sequences must be \nn or \nnn, giving the octal value for the character. If charmap is less than 256 lines long, the remaining characters are mapped to themselves. -p prompt Many commands do not prompt when ready for input. ied approximates a prompting mechanism for such commands. This is not always perfectly successful, but for many commands it helps.
ied(1) ied(1) # Sends nothing to the application, but inserts the line in the history (useful for adding comments to history file). ,*,= (Filename expansion). Not supported. @ Macro expansion. Not supported. Note however that ksh has a rarely-used function _ that substitutes words from the previous line (this is not the macro $_, but rather an editor command). If a preceding count is given, it uses the count th word of the last line. This is much more useful with ied.
insertmsg(1) insertmsg(1) NAME insertmsg - use findstr(1) output to insert calls to catgets(3C) SYNOPSIS insertmsg [-h] [-nnumber ] [-iamount ] [-snumber ] stringlist DESCRIPTION insertmsg examines the file stringlist , which is assumed to be the output of findstr after subsequent editing to remove any strings that do not need to be localized (see findstr (1)).
insertmsg(1) insertmsg(1) AUTHOR insertmsg was developed by HP. SEE ALSO findstr(1), gencat(1), catgets(3C), catopen(3C).
iostat(1) iostat(1) NAME iostat - report I/O statistics SYNOPSIS iostat [-t] [ interval [ count ] ] DESCRIPTION iostat iteratively reports I/O statistics for each active disk on the system. Disk data is arranged in a four-column format: Column Heading Interpretation device Device name bps Kilobytes transferred per second sps Number of seeks per second msps Milliseconds per average seek If two or more disks are present, data is presented on successive lines for each disk.
iostat(1) iostat(1) AUTHOR iostat was developed by the University of California, Berkeley, and HP. FILES /usr/include/sys/param.h SEE ALSO vmstat(1).
ipcrm(1) ipcrm(1) NAME ipcrm - remove a message queue, semaphore set, or shared memory identifier SYNOPSIS ipcrm [option ]... DESCRIPTION The ipcrm command removes one or more specified message queue, semaphore set, or shared memory identifiers. Options The identifiers are specified by the following option s: -m shmid Remove the shared memory identifier shmid from the system. The shared memory segment and data structure associated with it are destroyed after the last detach.
ipcs(1) ipcs(1) NAME ipcs - report status of interprocess communication facilities SYNOPSIS ipcs [-mqs] [-abcopt] [-C core ] [-N namelist ] DESCRIPTION ipcs displays certain information about active interprocess communication facilities. With no options, ipcs displays information in short format for the message queues, shared memory segments, and semaphores that are currently active in the system. Options The following options restrict the display to the corresponding facilities.
ipcs(1) ipcs(1) R S D C - A process is waiting on a msgrcv(). A process is waiting on a msgsnd(). The associated shared memory segment has been removed. It will disappear when the last process attached to the segment detaches it. The associated shared memory segment is to be cleared when the first attach is executed. The corresponding special flag is not set. The next 9 characters are interpreted as three sets of three characters each.
ipcs(1) ipcs(1) FILES /dev/kmem /etc/group /etc/passwd /stand/vmunix Kernel virtual memory Group names User names System namelist SEE ALSO msgop(2), semop(2), shmop(2).
join(1) join(1) NAME join - relational database operator SYNOPSIS join [ options ] file1 file2 DESCRIPTION join forms, on the standard output, a join of the two relations specified by the lines of file1 and file2 . If file1 or file2 is -, the standard input is used. file1 and file2 must be sorted in increasing collating sequence (see Environment Variables below) on the fields on which they are to be joined; normally the first in each line.
join(1) join(1) EXAMPLES The following command line joins the password file and the group file, matching on the numeric group ID, and outputting the login name, the group name, and the login directory. It is assumed that the files have been sorted in the collating sequence defined by the LC_COLLATE or LANG environment variable on the group ID fields. join -1 4 -2 3 -o 1.1 2.1 1.
kdestroy(1) kdestroy(1) NAME kdestroy - destroy Kerberos tickets SYNOPSIS kdestroy [-q] [-c cache_filename ] DESCRIPTION The kdestroy utility destroys the user’s active Kerberos authorization tickets by writing zeros to the specified credentials cache that contains them. If the credentials cache is not specified, the default credentials cache is destroyed. Options -q Run quietly. Normally kdestroy beeps if it fails to destroy the user’s tickets. The -q flag suppresses this behavior.
kermit(1) kermit(1) (HP-UX C-Kermit) NAME kermit - C-Kermit 8.0 communications software for serial and network connections: modem dialing, file transfer and management, terminal connection, character-set translation, numeric and alpha paging, and script programming. SYNOPSIS kermit [ command-file ] [ options ...
kermit(1) kermit(1) (HP-UX C-Kermit) is portable to many and diverse platforms. STARTING C-KERMIT You can start C-Kermit by typing /usr/bin/kermit, or just kermit if your PATH includes /usr/bin, possibly followed by command-line options. If there are no "action options" on the command line (explained below), C-Kermit starts in interactive command mode; you will see a greeting message and then the "C-Kermit>" prompt.
kermit(1) kermit(1) (HP-UX C-Kermit) CAUTIOUS or ROBUST commands to choose more conservative (and therefore slower) protocol settings. For fine tuning of performance, you can choose specific packet lengths, window sizes, and controlcharacter prefixing strategies as explained in Chapter 12 of the manual, Using C-Kermit . If you are accessing a remote host where C-Kermit resides via Telnet or other connection that is guaranteed reliable from end to end, and both Kermits support it (C-Kermit 8.
kermit(1) kermit(1) (HP-UX C-Kermit) b (or B) l (or L) n (or N) a decimal digit {} anything else: the BREAK signal (OUTPUT command only) a Long BREAK signal (OUTPUT only) a NUL (0) character (OUTPUT only) a 1-, 2-, or 3-digit decimal number, such as \27 used for grouping, e.g. \{27}123 following character taken literally. Note that numbers turn into the character with that binary code (0-255), so you can use \7 for a bell, \13 for carriage return, \10 for linefeed.
kermit(1) kermit(1) (HP-UX C-Kermit) A kA * HANGUP EIGHTBIT PAD PING REDIAL LOG CONNECTIONS REDIRECT PIPE SET CARRIER * SET DIAL * SET FLOW * SET HOST * SET LINE SET PORT * SET MODEM TYPE * SET NETWORK SET TCP SET TELNET SET X.
kermit(1) kermit(1) (HP-UX C-Kermit) MAIL RESEND PSEND * RECEIVE *R *S GET MGET REGET G FAST CAUTIOUS ROBUST SET ATTRIB * SET BLOCK SET BUFFERS SET PREFIX SET DELAY SET DESTINATION * SET FILE * SET RECEIVE SET REPEAT SET RETRY SET SEND SET HANDSHAKE SET LANGUAGE PATTERNS SET SESSION-LOG SET TRANSFER SET TRANSMIT SET UNKNOWN * SET WINDOW SHOW ATTRIB SHOW CONTROL * SHOW FILE SHOW PROTOCOL SHOW LANGUAGE SHOW TRANSMIT * STATISTICS TRANSMIT XMIT SEND Command switches /AS-NAME: /AFTER: /BEFORE: /BINARY /COMMAND
kermit(1) kermit(1) (HP-UX C-Kermit) /QUIET /RECOVER /RECURSIVE /RENAME-TO: /SMALLER-THAN: /STARTING-AT: /SUBJECT: /TEXT Don’t display file-transfer progress. Recover interrupted transfer from point of failure. Send a directory tree. Rename files as specified after successfully sending. Send files smaller than given size. Send file starting at given byte number. Subject for SEND /MAIL. Send in text mode. GET and RECEIVE Command switches /AS-NAME: Store incoming file under given name.
kermit(1) kermit(1) (HP-UX C-Kermit) REMOTE ASSIGN REMOTE CD REMOTE COPY REMOTE DELETE REMOTE DIR REMOTE EXIT REMOTE HELP REMOTE HOST REMOTE KERMIT REMOTE LOGIN REMOTE LOGOUT REMOTE MKDIR REMOTE PRINT REMOTE PWD REMOTE QUERY REMOTE RENAME REMOTE RMDIR REMOTE SET REMOTE SPACE REMOTE TYPE REMOTE WHO SERVER SET SERVER SHOW SERVER Script programming ASK ASKQ ASSERT ASSIGN CLEAR CLOSE DECLARE DECREMENT DEFINE DO ECHO ELSE END EVALUATE FAIL FOPEN FREAD FWRITE FSEEK FCLOSE FOR FORWARD GETC GETOK GOTO IF INCREMEN
kermit(1) kermit(1) (HP-UX C-Kermit) A kA READ REINPUT RETURN SCREEN SCRIPT SET ALARM SET CASE SET COMMAND SET COUNT SET INPUT SET MACRO SET TAKE SHIFT SHOW ARGUMENTS SHOW ARRAYS SHOW COUNT SHOW FUNCTIONS SHOW GLOBALS SHOW MACROS SHOW SCRIPTS SHOW VARIABLES SLEEP SORT STATUS STOP SUCCEED SWITCH TAKE UNDEFINE WAIT WHILE WRITE WRITE-LINE WRITELN XECHO XIF Read a line from a local file into a variable. Reexamine text previously received from another computer. Return from a user-defined function.
kermit(1) kermit(1) (HP-UX C-Kermit) \v(d$ip) \v(d$lc) \v(d$px) \v(date) \v(day) \v(dialcount) \v(dialnumber) \v(dialresult) \v(dialstatus) \v(dialsuffix) \v(dialtype) \v(directory) \v(download) \v(editor) \v(editfile) \v(editopts) \v(errno) \v(errstring) \v(escape) \v(evaluate) \v(exitstatus) \v(filename) \v(filenumber) \v(filespec) \v(fsize) \v(ftype) \v(herald) \v(home) \v(host) \v(hwparity) \v(input) \v(inchar) \v(incount) \v(inidir) \v(inmatch) \v(instatus) \v(intime) \v(inwait) \v(ipaddress) \v(kbch
kermit(1) kermit(1) (HP-UX C-Kermit) A kA \v(osname) \v(osrelease) \v(osversion) \v(packetlen) \v(parity) \v(pexitstat) \v(pid) \v(platform) \v(program) \v(protocol) \v(p_8bit) \v(p_ctl) \v(p_rpt) \v(query) \v(return) \v(rows) \v(sendlist) \v(serial) \v(speed) \v(startup) \v(status) \v(sysid) \v(system) \v(terminal) \v(test) \v(textdir) \v(tfsize) \v(time) \v(tmpdir) \v(trigger) \v(ttyfd) \v(ty_xx) \v(userid) \v(version) \v(window) \v(xferstatus) \v(xfermsg) \v(xfer_xxx) \v(xprogram) \v(xversion) Opera
kermit(1) kermit(1) (HP-UX C-Kermit) Actions -s files -s -r -k -x -O -f -g files -G files -a name -c -n Settings -l line -l n -j host -J host -l n -X -Z -o n -u -q -I -8 -0 -i -T -P -b bps -m name -p x -t -e n -v n -L -Q -w -D n -V Other -y name -Y -R -d -S -C "cmds" -z -B -h = -- send files send files from stdin receive files receive files to stdout enter server mode like -x but exits after one transaction finish remote server get remote files from server (quote wildcards) like -g but sends file to sta
kermit(1) kermit(1) (HP-UX C-Kermit) sends file oofa.bin in binary mode (-i) using a window size of 4 (-v 4). Local-mode example (C-Kermit makes the connection): kermit -l /dev/tty0p0 -b 19200 -c -r -n makes a 19200-bps direct connection out through /dev/tty0p0, CONNECTs (-c) so you can log in and, presumably start a remote Kermit program and tell it to send a file, then it RECEIVEs the file (-r), then it CONNECTs back (-n) so you can finish up and log out.
kermit(1) kermit(1) (HP-UX C-Kermit) Kermit News , Issues 4 (1990) and 5 (1993), Columbia University, for detailed discussions of Kermit file transfer performance. DIAGNOSTICS The diagnostics produced by C-Kermit itself are intended to be self-explanatory. In addition, every command returns a SUCCESS or FAILURE status that can be tested by IF FAILURE or IF SUCCESS. In addition, the program itself returns an exit status code of 0 upon successful operation or nonzero if any of various operations failed.
keylogin(1) keylogin(1) NAME keylogin - decrypt and store secret key with keyserv SYNOPSIS /usr/bin/keylogin [ -r ] DESCRIPTION The keylogin command prompts for a password, and uses it to decrypt the user’s secret key. The key may be found in the /etc/publickey file (see publickey (4)) or the NIS map ‘‘publickey.byname’’ or the NIS+ table ‘‘cred.org_dir’’ in the user’s home domain. The sources and their lookup order are specified in the /etc/nsswitch.conf file (see nsswitch.conf(4)).
keylogout(1) keylogout(1) NAME keylogout - delete stored secret key with keyserv SYNOPSIS /usr/bin/keylogout [ -f ] DESCRIPTION keylogout deletes the key stored by the key server process keyserv (1M). Further access to the key is revoked; however, current session keys may remain valid until they expire or are refreshed. Deleting the keys stored by keyserv will cause any background jobs or scheduled at (1) jobs that need secure RPC services to fail.
keysh(1) keysh(1) NAME keysh - context-sensitive softkey shell SYNOPSIS keysh DESCRIPTION keysh is an extension of the standard Korn-shell (for a description of the basic Korn-shell functionality, see ksh(1)). keysh uses hierarchical softkey menus and context-sensitive help to aid users in building commandlines, combining the power of the Korn-shell with the ease-of-use of a menu system. And keysh is entirely data-driven, allowing its menus and help to be easily extended as needed.
keysh(1) keysh(1) Translate any softkey commands in the current command-line and then edit the result. Delete the character under the cursor. Toggle between insert and overwrite modes. Recall the previous/next command from the history buffer. Move the cursor left/right. Move the cursor to the beginning/end of the command-line.
keysh(1) keysh(1) USING KEYSH WITH TERMINAL SESSION MANAGER When operating under the Terminal Session Manager (see tsm (1)), keysh displays the tsm softkeys instead of the backup softkeys. If desired, this interaction can be overridden by setting the $KEYTSM environment variable (see ENVIRONMENT VARIABLES below). When operating under tsm, keysh also automatically displays the tsm window number in the statusline.
keysh(1) selectors keysh(1) Enable or disable the use of keyboard selectors. When enabled, keysh displays an upper-case selector character in each softkey label. Typing the unquoted (uppercase) character selects the softkey just as if its corresponding function key had been pressed. Quoting the selector character in any way restores its traditional meaning. Selector keys are intended to be used on terminals that do not support a sufficient number of softkeys.
keysh(1) keysh(1) EXAMPLES To add the od (see od(1)) softkey to the end of the top-level softkey menu and label it Octal_dump, kc softkey add od with_label Octal_dump To add the paste (1) softkey to the beginning of the top-level softkey menu and label it Paste, kc softkey add paste and_place as_first_softkey To add the custom emacs softkey from the file ˜rpt/.
keysh(1) keysh(1) KEYKSH If set, specifies that keysh should mimic the behavior of the Korn-shell as closely as possible. No softkeys or status-line are displayed. This mode is particularly useful over slow modem lines. KEYLOC If set, specifies that keysh should leave the terminal keypad in local mode while commands are being entered. This mimics the behavior of the Korn-shell. KEYPS1 If set, specifies that keysh should not reset the initial values of $PS1, $PS2, and $PS3.
keysh(1) keysh(1) keysh assumes that HP-UX commands are not heavily aliased; otherwise unexpected command translations may occur. keysh neglects the effects of the Korn-shell expansion mechanisms when counting command-line parameters, causing it to occasionally underestimate the true number of parameters specified. The * emacs-mode or vi-mode editing command can often be used to pre-expand these parameters.
kill(1) kill(1) NAME kill - send a signal to a process; terminate a process SYNOPSIS kill [-s signame ] pid ... kill [-s signum] pid ... kill -l Obsolescent Versions: kill -signame pid ... kill -signum pid ... DESCRIPTION The kill command sends a signal to each process specified by a pid process identifier. The default signal is SIGTERM, which normally terminates processes that do not trap or ignore the signal.
kill(1) kill(1) 15 24 25 26 SIGTERM SIGSTOP SIGTSTP SIGCONT Terminate Stop Terminal stop Continue Terminate; can be trapped Pause the process; cannot be trapped Pause the process; can be trapped Run a stopped process SIGNULL (0), the null signal, invokes error checking but no signal is actually sent. This can be used to test the validity or existence of pid .
kinit(1) kinit(1) NAME kinit - obtain and cache the Kerberos ticket-granting ticket SYNOPSIS kinit [-l life_time ] [-s start_time ] [-v] [-p] [-f] [-k [-t keytab_filename ]] [-r renewable_life] [-R] [-c cache_filename ] [-S service-name ] [principal ] DESCRIPTION kinit obtains and caches an initial ticket-granting ticket for the principal . Options -l life_time Requests a ticket with the lifetime value defined in life_time .
kinit(1) kinit(1) principal Uses the principal name from an existing cache if there is one. kinit supports the [appdefaults] section. The relationships specified here can be over-ridden by the command-line options. The following relationships are supported by kinit in the [appdefaults] section: forwardable This relationship specifies if an user can obtain a forwardable ticket. Valid values with which it can be set are: true, false, yes, y, no, n, on, off.
klist(1) klist(1) NAME klist - list cached Kerberos tickets SYNOPSIS klist [-e] [[-c] [-f] [-s] [cache_filename ]] [-k [-t] [-K] [keytab_filename ]] DESCRIPTION klist lists the Kerberos principal and Kerberos tickets held in a credentials cache, or the keys held in a keytab file. Options -e Displays the encryption types of the session key and the ticket for each credential in the credential cache, or each key in the keytab file. -c List tickets held in a credentials cache.
kpasswd(1) kpasswd(1) NAME kpasswd - change a user’s Kerberos password SYNOPSIS kpasswd [principal ] DESCRIPTION The kpasswd command is used to change a Kerberos principal’s password. kpasswd prompts for the current Kerberos password, which is used to obtain a changepw ticket from the KDC (Key Distribution Center) for the user’s Kerberos realm. If kpasswd successfully obtains the changepw ticket, the user is prompted twice for the new password, and the password is changed.
ksh(1) ksh(1) NAME ksh, rksh - shell, the standard/restricted command programming language SYNOPSIS ksh [-aefhikmnoprstuvx] [+aefhikmnoprstuvx] [- o option ] ... string ] [ arg ... ] [+ o option ] ... [-c rksh [-aefhikmnoprstuvx] [+aefhikmnoprstuvx] [- o option ] ... [+ o option ] ... [-c string ] [ arg ... ] DESCRIPTION ksh is a command programming language that executes commands read from a terminal or a file.
ksh(1) ksh(1) for identifier [ in word ... ] do list done Each time for is executed, identifier is set to the next word taken from the in word list. If in word ... is omitted, for executes the do list once for each positional parameter set (see Parameter Substitution below). Execution ends when there are no more words in the list. select identifier [ in word... ] do list done A select command prints on standard error (file descriptor 2), the set of words, each preceded by a number. If in word ...
ksh(1) ksh(1) each command in the replaced text, other than any that are in the process of being replaced, is tested for additional aliases. If the last character of the alias value is a blank, the word following the alias is also checked for alias substitution. Aliases can be used to redefine special built-in commands, but cannot be used to redefine the keywords listed above. Aliases can be created, listed, and exported with the alias command and can be removed with the unalias command.
ksh(1) ksh(1) of all subscripts must be in the range of 0 through 1023. Arrays need not be declared. Any reference to a named parameter with a valid subscript is legal and an array is created if necessary. Referencing an array without a subscript is equivalent to referencing the first element. The value of a named parameter can also be assigned by writing: name =value [ name=value ] ... If the -i integer attribute is set for name, the value is subject to arithmetic evaluation as described below.
ksh(1) ksh(1) The following parameters are set automatically by the shell: # ? $ _ ! COLUMNS ERRNO LINENO LINES OLDPWD OPTARG OPTIND PPID PWD RANDOM REPLY SECONDS The number of positional parameters in decimal. Options supplied to the shell on invocation or by the set command. The decimal value returned by the last executed command. The process number of this shell. Initially, the value of _ is an absolute pathname of the shell or script being executed as passed in the environment .
ksh(1) ksh(1) HOME MAIL MAILCHECK MAILPATH PATH PS1 PS2 PS3 PS4 A kA SHELL TMOUT VISUAL default is 128. The default argument (home directory) for the cd command. If this parameter is set to the name of a mail file and the MAILPATH parameter is not set, the shell informs the user of arrival of mail in the specified file. This variable specifies how often (in seconds) the shell checks for changes in the modification time of any of the files specified by the MAILPATH or MAIL parameters.
ksh(1) ksh(1) preceding it with a \. The pair \new-line is ignored. All characters enclosed between a pair of single quote marks (’ ’), are quoted. A single quote cannot appear within single quotes. Inside double quote marks (" "), parameter and command substitution occurs and \ quotes the characters \, `, ", and $. $* and $@ have identical meanings when not quoted or when used as a parameter assignment value or as a file name. However, when used as a command argument, "$*" is equivalent to "$1d $2d ...
ksh(1) ksh(1) file file file file file1 -nt file2 file1 -ot file2 file1 -ef file2 string = pattern string != pattern string1 < string2 string1 > string2 exp1 -eq exp2 exp1 -ne exp2 exp1 -lt exp2 exp1 -gt exp2 exp1 -le exp2 exp1 -ge exp2 -L -O -G -S True if True if True if True if True if True if True if True if True if True if True if True if True if True if True if True if True if file exists and is a symbolic link. file exists and is owned by the effective user ID of this process.
ksh(1) ksh(1) ... 2>&1 means file descriptor 2 is to be opened for writing as a duplicate of file descriptor 1. Redirection order is significant because the shell evaluates redirections referencing file descriptors in terms of the currently open file associated with the specified file descriptor at the time of evaluation. For example: ...
ksh(1) ksh(1) caught by the caller are reset to their default action inside the function. If a function does not catch or specifically ignore a trap condition, the function terminates and the condition is passed on to the caller. A trap on EXIT set inside a function is executed after the function completes in the environment of the caller. Ordinarily, variables are shared between the calling program and the function.
ksh(1) ksh(1) 0 is set to the function name. When the function completes or issues a return, ksh restores the positional parameter list and executes any trap set on EXIT within the function. The value of a function is the value of the last command executed. A function is executed in the current shell process. If a command name is not a special command or a user-defined function, ksh creates a process and attempts to execute the command using exec (see exec (2)).
ksh(1) ksh(1) directory containing file . If any arguments arg are given, they become the positional parameters. Otherwise the positional parameters are unchanged. The exit status is the exit status of the last command executed. It is not necessary that the execute permission bit be set for file . %% alias [ -tx ] [ name[=value ] ... ] alias with no arguments prints the list of aliases in the form name =value on standard output. An alias is defined for each name whose value is given.
ksh(1) ksh(1) fc [ -eename ] [ -nlr ] [ first [ last ] ] fc -e - [ old=new ] [ command ] In the first form, a range of commands from first to last is selected from the last HISTSIZE commands typed at the terminal. The arguments first and last can be specified as a number or string. A given string is used to locate the most recent command. A negative number is used to offset the current command number. The -l option causes the commands to be listed on standard output.
ksh(1) ksh(1) pwd [ -L-P ] With no arguments prints the current working directory (equivalent to print -r $PWD). The -L option (default) preserves the logical meaning of the current directory and -P preserves the physical meaning of the current directory if it is a symbolic link. See the special cd command, cd(1), ln(1)), and pwd(1). read [ -prsu[ n ] ] [ name ] [?prompt ] [ name ... ] The shell input mechanism. One line is read and broken up into words using the characters in IFS as separators.
ksh(1) ksh(1) keyword markdirs monitor noclobber noexec noglob nolog nounset privileged verbose trackall vi viraw xtrace -p -s -t -u -v -x -- Same as -k. All directory names resulting from file name generation have a trailing / appended. Same as -m. Prevents redirection > from truncating existing files. Requires >| to truncate a file when turned on. Same as -n. Same as -f. Do not save function definitions in history file. Same as -u. Same as -p. Same as -v. Same as -h.
ksh(1) ksh(1) statement is executed inside the body of a function, the command arg is executed after the function completes. If sig is 0 or EXIT for a trap set outside any function, the command arg is executed on exit from the shell. The trap command with no arguments prints a list of commands associated with each signal number. %% typeset [ ±LRZfilrtux[ n ] ] [ name[ = value ] ] ... A Parameter assignments remain in effect after the command completes.
ksh(1) ksh(1) -d -f -s -t List or set the number of kilobytes in the size of the data area. List or set the number of 512-byte blocks in files written by child processes (files of any size can be read). List or set the number of kilobytes in the size of the stack area. List or set the number of seconds to be used by each process. umask [ mask ] The user file-creation mask is set to mask (see umask(2)). mask can either be an octal number or a symbolic value as described in chmod(1).
ksh(1) ksh(1) The restrictions above are enforced after the .profile and ENV files are interpreted. When a command to be executed is found to be a shell procedure, rksh invokes ksh to execute it. Thus, the end-user is provided with shell procedures accessible to the full power of the standard shell, while being restricted to a limited menu of commands. This scheme assumes that the end-user does not have write and execute permissions in the same directory.
ksh(1) ˆD eof M- d M- ˆH M- h M- ˆ? ˆT ˆC M- c M- l ˆK ˆW M- p kill ˆY ˆL ˆ@ M-space ˆJ ˆM ˆP ˆN M- < M- > ˆRstring ˆO M-digits M-letter M- . M- _ M- * M- ESC M- = ˆU \ ˆV ksh(1) Delete current character. End-of-file character, normally ˆD, terminates the shell if the current line is null. Delete current word. (Meta-backspace) Delete previous word. Delete previous word. (Meta-DEL) Delete previous word (if interrupt character is ˆ? (DEL, the default) this command does not work).
ksh(1) ksh(1) M- # Insert a # at the beginning of the line and execute it. This causes a comment to be inserted in the history file. Vi Editing Mode There are two typing modes. Entering a command puts you into input mode. To edit, the user enters control mode by pressing ESC and moves the cursor to the point needing correction, then inserts or deletes characters or words. Most control commands accept an optional repeat count prior to the command.
ksh(1) ksh(1) matched line must begin with string . If string is null, the previous string is used. ?string Same as / but search in the forward direction. n Search for next match of the last pattern to / or ? commands. N Search for next match of the last pattern to / or ?, but in reverse direction. Search history for the string entered by the previous / command. Text Modification Edit Commands These commands modify the line. a Enter input mode and enter text after the current character.
ksh(1) ksh(1) @letter The user’s alias list is searched for an alias by the name _letter and if an alias of this name is defined, its value is inserted on the input queue for processing. EXTERNAL INFLUENCES Environment Variables LC_COLLATE determines the collating sequence used in evaluating pattern matching notation for file name generation. LC_CTYPE determines the classification of characters as letters, and the characters matched by character class expressions in pattern matching notation.
ksh(1) ksh(1) For example, the command, rm [a-z]* might be expected to match all file names beginning with a lowercase alphabetic character. However, if dictionary ordering is specified by LC_COLLATE, it would also match file names beginning with an uppercase character (as well as those beginning with accented letters). Conversely, it would fail to match letters collated after z in languages such as Danish or Norwegian.
ktutil(1) ktutil(1) NAME ktutil - Kerberos keytab file maintenance utility SYNOPSIS ktutil DESCRIPTION The ktutil command invokes a subshell from which an administrator can read, write, or edit entries in a Kerberos V5 keytab or V4 srvtab file. ktutil Commands list Display the current key list. Alias: l read_kt keytab_filename Read the Kerberos V5 keytab file, keytab_filename, into the current key list.
kvno(1) kvno(1) NAME kvno - print key version numbers of Kerberos principals SYNOPSIS kvno [-e etype ] service1 , [service2 , ...] DESCRIPTION kvno acquires a service ticket for the specified Kerberos principals and prints out the key version numbers of each principal. Options -e etype Specifies the encryption type which will be requested for the session key of all the services named on the command line. This is useful in certain backward compatibility situations.
last(1) last(1) NAME last, lastb - indicate last logins of users and ttys SYNOPSIS /usr/bin/last [ -R ] [ -number ] [ -x] [ -X] [ -f file ] [ name ... ] [ tty ... ] /usr/bin/lastb [ -R ] [ -number ] [ -x] [ -X] [ -f file ] [ name ... ] [ tty ... ] DESCRIPTION The last command searches backwards through the file /var/adm/wtmps (which contains a record of all logins and logouts) for information about a user, a tty, or any group of users and ttys. Arguments specify names of users or ttys of interest.
lastcomm(1) lastcomm(1) NAME lastcomm - show last commands executed in reverse order SYNOPSIS lastcomm [commandname ] ... [username ] ... [terminalname ] ... DESCRIPTION lastcomm gives information on previously executed commands. If no arguments are specified, lastcomm prints information about all the commands recorded in the accounting file, /var/adm/pacct during the current accounting file’s lifetime.
ld(1) ld(1) NAME ld - link editor A lA SYNOPSIS The link editor. ld [-bdmnqrstvxzEGINOPQSTVZ] [-a search ] [-c filename ] [-dynamic] [-e epsym ] [-h symbol ] . . . [-k filename ] [-lx file ] ... [-l: library ] [-m] [-noshared] [-noshared_dynamic] [-o outfile ] [-symbolic] [-u symbol ] . . . [-y symbol ] . . . [-A name ] [-B bind ] . . . [-C n ] [-D offset ] [-Fl] [-Fw] [-Fz] [-G] [-L dir ] . . .
ld(1) ld(1) running the executable. ld recursively examines the dependencies of shared libraries used by a program that was created by ld. If ld does not find a supporting shared library at the path recorded in the dependency list of a shared library, and if the dependency is the result of an -l argument used when the shared library was created, ld searchs all the directories that it would search for a library that was specified with -l (see -L and LPATH).
ld(1) ld(1) -lx Search a library libx .a, libx .so, or libx .sl, where x is one or more characters. The current state of the -a option determines whether the archive (.a) or shared (.sl or .so) version of a library is searched. Because a library is searched when its name is encountered, the placement of a -l is significant. By default, 32-bit libraries are located in /usr/lib/hpux32. 64-bit libraries are located in /usr/lib/hpux64.
ld(1) ld(1) -x Strip local symbols from the output file. This reduces the size of the output file without impairing the effectiveness of object file utilities. This option is incompatible with the -r option and the +ild options. (The incremental linker requires the parts of the output load module which are stripped out with the -x option.) Note: Use of the -x option might impair or prevent the use of a symbolic debugger on the resulting program. -y symbol Indicate each file in which symbol appears.
ld(1) ld(1) Since -B nonfatal suppresses messages about unresolved symbols, also specify -B verbose to display those messages. restricted Causes the search for a symbol definition to be restricted to those symbols that were visible when the library was loaded. symbolic Used only when building a shared library. This option causes all references in a shared library to be resolved internally if possible. Such internally-resolved symbols are still externally visible.
ld(1) ld(1) or +instrumenter caliper, no additional linker options are needed. -L dir Search for libx .a, libx .sl, or libx .so, in dir before looking in default locations. You can specify more than one directory, but each must be preceded by the -L option. The -L option is effective only if it precedes the -l option on the command line. -N In 32-bit mode only, cause the data to be placed immediately following the text, and make the text writable. Files of this type cannot be shared.
ld(1) ld(1) +b path_list Specify a colon-separated list of directories to be searched at program run-time to locate shared libraries needed by the executable output file that were specified with either the -l or -l: options. This list of directories becomes the embedded path. If either +b is not used or if you specify a single colon (:) as the argument, ld builds an embedded path using all the directories specified by the -L option(s) and the LPATH environment variable (see the +s option).
ld(1) ld(1) symbols are exported by default, so +ee is not necessary to make a symbol visible. However, it has the additional side effect of identifying the symbol as necessary, so that it will not be removed when using dead code elimination (+Oprocelim). The +ee option still retains its export behavior if an option such as +hideallsymbols is also given.
ld(1) ld(1) +hideallsymbols Prevent all the symbols from being exported unless explicitly exported with the +e. This option marks all symbols as "local" in the symbol table. See also the -h and +e options. +ild Specify incremental linking. If the output file does not exist, or if it was created without the +ild option, the linker performs an initial incremental link. The output file produced is suitable for subsequent incremental links.
ld(1) ld(1) +interp filename Change the dld path to use the program specified by filename for the "interpreter" program as the dynamic loader. This is useful when using special versions of dld.so for debugging. The default path is /usr/lib/hpux32/uld.so:/usr/lib/hpux32/dld.so for 32-bit programs and /usr/lib/hpux64/uld.so:/usr/lib/hpux64/dld.so for 64-bit programs. +interposer Used only when building a shared library. This will create a shared library that can be used for interposition.
ld(1) ld(1) +noenvvar Instruct the dynamic loader to ignore the dynamic path searching environment variables, LD_LIBRARY_PATH, SHLIB_PATH, and $ORIGIN at runtime. By default, or if you specify the +std option, the dynamic loader looks at the environment variables, that is, the environment variables are enabled. If you specify the +compat option or the +noenvvar option, the option takes effect and the dynamic loader ignores the variables (the environment variables are disabled).
ld(1) ld(1) allocation, thus reduce TLB misses by allowing the kernel to allocate fewer, larger data pages. Use of this option increases your output file size. +pd size Request a particular virtual memory page size that should be used for data. Sizes of 4K, 16K, 64K, 256K, 1M, 4M, 16M, 64M, 256M, D, and L are supported. A size of D allows the kernel to choose what page size should be used. A size of L results in using the largest page size available.
ld(1) ld(1) not used. +vtype type Produces verbose output about the link operation. type can have the following values: all Dumps all of the information from the +vtype options. Same as -v. files Dump info about each object file loaded. heap Dump info about the size of the heap used by a link. libraries Dump info about libraries searched. procelim Dump info about sections that have been eliminated by the +Oprocelim option sections Dump info about each input section added to the output file.
ld(1) ld(1) presence of dynamic profiling. +Oselectivesize size This option is accepted and ignored. +OselectiveO3 This option is accepted and ignored. +Ostaticprediction This option is ignored and generates a warning message. Defaults Unless otherwise directed, ld names its output file a.out. The -o option overrides this. The default is to create a dynamically linked program unless you specify the -noshared option.
ld(1) ld(1) warning message and does a complete initial incremental link of the module. On the initial incremental link, the linker processes the input object files and libraries in the same way as the normal link. In addition to the normal linking process, the incremental linker saves information about object files, global symbols, and relocations, and pads sections in the output file for expansion.
ld(1) ld(1) The following internationalization variables affect the execution of ld: LANG Determines the locale category for native language, local customs and coded character set in the absence of LC_ALL and other LC_* environment variables. If LANG is not specified or is set to the empty string, a default of C (see lang (5)) is used instead of LANG. LC_ALL Determines the values for all locale categories and has precedence over LANG and other LC_* environment variables.
ld(1) ld(1) chatr a.out ... shared library list: libfoo1.sl Add $ORIGIN before the shared library name in the shared library list. ld -dynamic main.o -L /usr/lib/hpux32/ +origin -lc ld -dynamic main.o +origin /usr/lib/hpux32/libc.so chatr a.out ... shared library list: $ORIGIN/libc.so WARNINGS ld recognizes several names as having special meanings. The symbol _end is reserved by the linker to refer to the first address beyond the end of the program’s address space.
ld(1) ld(1) The behavior of normal executables does not match the behavior of executables built with +compat. For any setuid or setgid programs, dld disables any dynamic library searching through environment variables, SHLIB_PATH and LD_LIBRARY_PATH.
ld(1) ld(1) Miscellaneous a.out (4) ar (4) crt0 (3) dld.so (5) end(3C) uld.
ldd(1) ldd(1) NAME ldd - list dynamic dependencies of executable files or shared libraries SYNOPSIS ldd [-d] [-r] [-s] [-v] filename ... DESCRIPTION ldd is a command that can list the dynamic dependencies of incomplete executable files or shared libraries. ldd lists verbose information about dynamic dependencies and symbol references. If the object file is an executable file, ldd lists all shared libraries that would be loaded as a result of executing the file.
ldd(1) ldd(1) ldd returns zero when the operation is successful. A non-zero return code indicates that an error occurred. EXAMPLES By default ldd prints a simple dynamic path information. This consists of the dependencies recorded in the executable (or the shared library) followed by the physical location where these libraries are found. ldd a.out ./libx.so => libc.so => libdl.so => ./libx.so /usr/lib/hpux32/libc.so.1 /usr/lib/hpux32/libdl.so.
leave(1) leave(1) NAME leave - remind you when you have to leave SYNOPSIS leave [ hhmm ] DESCRIPTION The leave command waits until the specified time, then reminds you to leave. You are reminded 5 minutes and 1 minute before the actual time, at the time, and every minute thereafter. When you log off, leave exits. The time of day is in the form hhmm, where hh is a time in hours (which can range from 0 through 11 or 0 through 24 hours), and mm is the number of minutes after the specified hour.
lifcp(1) lifcp(1) NAME lifcp - copy to or from LIF files SYNOPSIS lifcp [ -Txxx ] [ -Lxxx ] [ -vxxx ] [ -a ] [ -b ] [ -i xxx ] [ -r ] [ -t ] file1 file2 lifcp [ -Txxx ] [ -Lxxx ] [ -vxxx ] [ -a ] [ -b ] [ -ixxx ] [ -r ] [ -t ] [ file1 file2 ... ] directory DESCRIPTION lifcp copies a LIF file to an HP-UX file, an HP-UX file to a LIF file, or a LIF file to another LIF file. It also copies a list of (HP-UX/LIF) files to a (LIF/HP-UX) directory.
lifcp(1) lifcp(1) The default copying modes when copying from LIF to HP-UX are summarized in the following table: File Type Default Copying Mode ASCII BINARY BIN ASCII BINARY RAW RAW other When copying from HP-UX to LIF, the default copying mode is ASCII and an ASCII file is created. When copying from LIF to LIF, if no options are specified, then all the LIF directory fields and file contents are duplicated from source to destination.
lifcp(1) lifcp(1) lifcp lifvol:ABC . Copy standard input to LIF file A_FILE on LIF volume /dev/dsk/c0t6d0. lifcp - /dev/dsk/c0t6d0:A_FILE Copy LIF file ABC in lifvol to LIF file CDE on /dev/dsk/c0t6d0 . lifcp lifvol:ABC /dev/dsk/c0t6d0:CDE Copy the output of pr to the LIF file ABC. pr abc | lifcp - lifvol:ABC Copy the output of pr to the LIF volume lifvol. LIF file STDIN is created since no files names are specified. pr abc | lifcp - lifvol: Copy LIF file ABC in lifvol to standard output.
lifinit(1) lifinit(1) NAME lifinit - write LIF volume header on file SYNOPSIS lifinit [-vnnn ] [-dnnn ] [-n string ] [-snnn ] [-lnnn ] [-ennn ] file DESCRIPTION lifinit writes a LIF volume header on a volume or file. Options lifinit recognizes the following options and command-line arguments which can appear in any order: -vnnn Sets volume size to nnn bytes. If nnn is not a multiple of 256, it is rounded down to the next such multiple. -dnnn Sets directory size to nnn file entries.
lifinit(1) lifinit(1) lifinit /dev/rdsk/c0t6d0 WARNINGS To prevent media corruption, do not terminate lifinit once it has started executing. AUTHOR lifinit was developed by HP. SEE ALSO lifcp(1), lifls(1), lifrename(1), lifrm(1), lif(4).
lifls(1) lifls(1) NAME lifls - list contents of a LIF directory SYNOPSIS lifls [ option ] name DESCRIPTION lifls lists the contents of a LIF directory on standard output. The default output format lists file names in multiple columns (similar to ls (1), except unsorted) if standard output is a character special file. If standard output is not a tty device, the output format is one file name per line. name is a path name to an HP-UX file containing a LIF volume and optional file name.
lifrename(1) lifrename(1) NAME lifrename - rename LIF files SYNOPSIS lifrename oldfile newfile DESCRIPTION oldfile is a full LIF file specifier (see lif (4) for details) for the file to be renamed (e.g. liffile:A_FILE). newfile is new name to be given to the file (only the file name portion). This operation does not include copy or delete. Old file names must match the name of the file to be renamed, even if that file name is not a legal LIF name. Do not mount the special file while using lifrename.
lifrm(1) lifrm(1) NAME lifrm - remove a LIF file SYNOPSIS lifrm file1 ... filen DESCRIPTION lifrm removes one or more entries from a LIF volume. File name specifiers are as described in lif (4). Do not mount the special file while using lifrm. DIAGNOSTICS lifrm returns zero if the file is removed successfully. Otherwise it prints a diagnostic and returns nonzero. EXAMPLES lifrm liffile:MAN lifrm /dev/rdsk/c0t6d0:F AUTHOR lifrm was developed by HP.
line(1) line(1) NAME line - read one line from user input SYNOPSIS line [-t timeout ] DESCRIPTION line copies one line (up to a new-line) from the standard input and writes it on the standard output. It returns an exit code of 1 on EOF and always prints at least a new-line. It is often used within shell files to read from the user’s terminal.
listusers(1) listusers(1) NAME listusers - display user login data SYNOPSIS listusers [-g groups ] [-l logins ] DESCRIPTION The listusers command displays data concerning user logins. The output shows the user login and the /etc/passwd comment field value (e.g., user name, etc.). The default displays data about all user logins. Options The listusers command supports the following options: -g groups Display all users belonging to groups , sorted by login.
ln(1) ln(1) NAME ln - link files and directories SYNOPSIS ln [-f] [-i] [-s] file1 new_file ln [-f] [-i] [-s] file1 [file2 ...] dest_directory ln [-f] [-i] [-s] directory1 [directory2 ...] dest_directory DESCRIPTION The ln command links: • file1 to a new or existing new_file , • file1 to a new or existing file named file1 in existing dest_directory, • file1 , file2 , ... to new or existing files of the same name in existing dest_directory, • directory1 , directory2 , ...
ln(1) ln(1) stat (2)). A readlink() call can be used to read the contents of the symbolic link (see readlink (2)). Symbolic links may span file systems and refer to directories. Access Control Lists (ACLs) If optional ACL entries are associated with new_file , ln displays a plus sign (+) after the access mode when asking permission to overwrite the file.
locale(1) locale(1) NAME locale - get locale-specific (NLS) information SYNOPSIS locale [ -a [ 32 | 64 ] -A -m ] locale [ -ck ] name ... locale [ -pa32 ] [ -pa64 ] DESCRIPTION The locale command displays information about the current locale or about available locales.
locale(1) locale(1) -m Display a list of available charmap files on the system. See localedef (1M) for a definition of charmap files and their usage. -c Display names of locale categories that have been selected either explicitly or by giving a keyword contained therein. This option may be used with the -k option. -k Display names of keywords that have been selected either explicitly or by providing their containing category as an argument.
locale(1) locale(1) LC_ALL=POSIX locale -ck decimal_point produces: LC_NUMERIC decimal_point="." If LANG is set to POSIX and no other locale variables are set, the command: locale LC_NUMERIC produces: "." "" "" which correspond to the keywords decimal_point, thousands_sep, grouping , and alt_digit . SEE ALSO localedef(1M), localeconv(3C), nl_langinfo(3C), setlocale(3C), charmap(4), localedef(4), environ(5), lang(5). STANDARDS CONFORMANCE locale: XPG4, POSIX.
lock(1) lock(1) NAME lock - reserve a terminal SYNOPSIS lock DESCRIPTION lock requests a password from the user, then prints LOCKED on the terminal and refuses to relinquish the terminal until the password is repeated. If the user forgets the password, the only recourse is to log in elsewhere and kill the lock process.
logger(1) logger(1) NAME logger - make entries in the system log SYNOPSIS logger [-t tag ] [-p pri ] [-i] [-f file ] [message ... ] DESCRIPTION The logger command provides a program interface to the syslog() system log module (see syslog (3C)). A message can be given on the command line, which is logged immediately, or a file is read and each line is logged. If no file or message is specified, the contents of the standard input are logged.
logger(1) logger(1) SEE ALSO syslogd(1M), getlogin(3C), syslog(3C). STANDARDS CONFORMANCE logger: XPG4, POSIX.
login(1) login(1) NAME login - sign on; start terminal session SYNOPSIS login [name [env-var ] ...] DESCRIPTION The login command is used at the beginning of each terminal session to properly identify a prospective user. login can be invoked as a user command or by the system as an incoming connection is established. login can also be invoked by the system when a previous user shell terminates but the terminal does not disconnect.
login(1) login(1) For superuser, PATH is set to: PATH=:/usr/sbin:/usr/bin:/sbin In the case of a remote login, the environment variable TERM is also set to the remote user’s terminal type. The environment can be expanded or modified by supplying additional arguments to login, either at execution time or when login requests the user’s login name.
login(1) login(1) On a trusted system, login prohibits a user from logging in if any of the following is true: • The password for the account has expired and the user cannot successfully change the password. • The password lifetime for the account has passed. • The time between the last login and the current time exceeds the time allowed for login intervals. • The administrative lock on the account has been set.
login(1) login(1) No directory Consult system administrator. No Root Directory Attempted to log in to a subdirectory root that does not exist. That is, the passwd file entry had shell path *, but the system cannot chroot() to the given home directory. No shell The user shell (/usr/bin/sh if shell name is null in /etc/passwd) could not be started with the exec command. Consult system administrator. No utmp entry.
login(1) login(1) /tcb/files/auth/*/* /var/adm/btmp /var/adm/wtmp /var/mail/login_name /etc/default/security The trusted system password database. History of bad login attempts. History of logins, logouts, and date changes. Mailbox for user. login_name Security defaults configuration file.
logname(1) logname(1) NAME logname - get login name SYNOPSIS logname DESCRIPTION logname writes the user’s login name to standard output. The login name is equivalent to that returned by getlogin() (see getlogin (3C)). EXTERNAL INFLUENCES Environment Variables LANG determines the language in which diagnostic messages are displayed. FILES /etc/profile SEE ALSO env(1), login(1), getlogin(3C), logname(3C), environ(5). STANDARDS CONFORMANCE logname: SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
lorder(1) lorder(1) NAME lorder - find ordering relation for an object library SYNOPSIS lorder [ files ] DESCRIPTION The input consists of one or more object or archive library files (see ar (1)) placed on the command line or read from standard input. The standard output is a list of pairs of object file names, meaning that the first file of the pair refers to external identifiers defined in the second.
lorder(1) lorder(1) FILES /var/tmp/*symref /var/tmp/*symdef SEE ALSO System Tools: ar (1) ld(1) Miscellaneous: tsort (1) temporary files create archived libraries invoke the link editor produce an ordered list of items (topological sort) STANDARDS CONFORMANCE lorder: SVID2, SVID3, XPG2, XPG4 A HP-UX 11i Version 2: August 2003 −2− Hewlett-Packard Company Section 1−−477 lA
lp(1) lp(1) NAME lp, lpalt, cancel - print/alter/cancel requests on an LP destination SYNOPSIS lp [-c] [-ddest] [-m] [-nnumber] [-ooption] [-ppriority] [-s] [-ttitle] [-w] [file ...] lpalt id [-ddest] [-i] [-m] [-nnumber] [-ooption] [-ppriority] [-s] [-ttitle] [-w] cancel [id ...] [dest ...] [-a] [-e] [-i] [-uuser] [-f] DESCRIPTION The lp command queues files for printing. The lpalt command changes information in a queued request. The cancel command deletes a queued request.
lp(1) lp(1) -m Send a mail message (see mail (1)) to the user after the request has been printed. By default, no mail is sent upon normal completion of the print request. -nnumber Print number copies of the output. If illegal number of copies is specified with this option, the default number of copies is 1. -ooption Specify a printer-dependent option . You can specify several printer options by repeating the -o option.
lp(1) lp(1) cancel Options and Arguments cancel recognizes the following options and arguments, which can be specified in any order. Blanks are not permitted between a keyletter and its argument. When cancel is used with a mix of different options and arguments, it will operate first on id ..., next on dest ..., next on -a, next on -e and finally on -u, irrespective of the order in which the options and arguments are specified in the command line. id ... Specifies one or more requests to be canceled.
lp(1) lp(1) International Code Set Support Single- and multibyte character code sets are supported. RETURN VALUE Exit values are: 0 >0 Successful completion. Error condition occurred.
lpfilter(1) lpfilter(1) NAME lpfilter, divpage, fontdl, lprpp, plotdvr, printstat, reverse - filters invoked by lp interface scripts SYNOPSIS /usr/lbin/divpage [-p -l] [-h -q] [-nFontID ] filename /usr/lbin/fontdl [-nFontID ] [-l] [-p] filename /usr/lbin/lprpp [-i] [-o] [-e] [-lnn ] [-n] [-p] /usr/lbin/plotdvr -l request_id -u username [-e] [-f] [-i] filename /usr/sbin/printstat -l request_id -u username filename /usr/sbin/reverse [-l page_length ] Remarks The structure of these filters is currently
lpfilter(1) lpfilter(1) -o Prints only the odd numbered pages. Used with -e for double-sided printing. -e Print only the even numbered pages. Used with -o for double sided printing. -l nn Specifies the page length, in lines. Default is 60 unless -n or -p is selected, in which case it is 66. -n Specifies nroff mode for printing output of the nroff command. Prints 66 lines per page with the first line appearing on logical line 4 of the printer.
lpfilter(1) lpfilter(1) WARNINGS There is little consistency in the interface to these filters. SEE ALSO lp(1), lpadmin(1M). Managing Systems and Workgroups.
lpstat(1) lpstat(1) NAME lpstat - report status information of the LP subsystem SYNOPSIS lpstat [-drst] [-a[list ]] [-c[list ]] [-o[list ]] [-p[list ]] [-u[list ]] [-v[list ]] [ID...] DESCRIPTION The lpstat utility writes to standard output information about the current status of the LP subsystem. If no arguments are given, lpstat writes the status of all requests made to lp by the user that are still in the output queue. OPTIONS The lpstat utility supports the XBD specification, Section 10.
lpstat(1) lpstat(1) ENVIRONMENT VARIABLES The following environment variables affect the execution of lpstat: LANG Provide a default value for the internationalisation variables that are unset or null. If LANG is unset or null, the corresponding value from the implementation-specific default locale will be used. If any of the internationalisation variables contains an invalid setting, the utility will behave as if none of the variables had been defined.
lpstat(1) lpstat(1) EXAMPLES 1. Obtain the status of two printers, the pathnames of two printers, a list of all class names and the status of the request named HiPri-33: lpstat -plaser1,laser4 -v"laser2 laser3" -cHiPri-33 2. Obtain user print job status using the obsolescent mixed blank and comma form: lpstat -u"ddg,gmv, maw" FUTURE DIRECTIONS A version of lpstat that fully supports the XBD specification, Section 10.2, Utility Syntax Guidelines may be introduced in a future issue.
lpstat(1) lpstat(1) HP-UX EXTENSIONS DESCRIPTION Any arguments that are not options are assumed to be request ids (as returned by lp) or LP destinations. lpstat prints the status of requests corresponding to such request ids or the status of requests belonging to such destinations. options can appear in any order and can be repeated and intermixed with other arguments. -i Inhibit the reporting of remote status. -o[ list ] Also see the -i option. -t Print all status information.
ls(1) ls(1) NAME ls, lc, l, ll, lsf, lsr, lsx - list contents of directories SYNOPSIS ls [-abcdefgilmnopqrstuxACFLR1] [names ] lc [-abcdefgilmnopqrstuxACFLR1] [names ] l [ls_options ] [names ] ll [ls_options ] [names ] lsf [ls_options ] [names ] lsr [ls_options ] [names ] lsx [ls_options ] [names ] DESCRIPTION For each directory argument, the ls command lists the contents of the directory. For each file argument, ls repeats its name and any other information requested.
ls(1) ls(1) size field contains the major and minor device numbers rather than a size. If the file is a symbolic link, the filename is printed, followed by -> and the pathname of the referenced file. A lA -m Stream output format. -n The same as -l, (ell) except that the owner’s UID and group’s GID numbers are printed, rather than the associated character strings. -o The same as -l, (ell) except that only the owner is printed (group is omitted).
ls(1) ls(1) c d l n p s - Character special file Directory Symbolic link Network special file Fifo (also called a "named pipe") special file Socket Ordinary file The next 9 characters are interpreted as three sets of three characters each which identify access and execution permissions for the owner, group, and others categories, as described in chmod(1). The - indicates the permission is not granted.
ls(1) ls(1) LC_COLLATE determines the order in which the output is sorted. LC_CTYPE determines which characters are classified as nonprinting for the -b and -q options, and the interpretation of single- and/or multibyte characters within file names. LC_TIME determines the date and time strings output by the -g, -l (ell), -n, and -o options. LC_MESSAGES determines the language in which messages (other than the date and time strings) are displayed.
lsacl(1) lsacl(1) NAME lsacl - list access control lists (ACLs) of files SYNOPSIS /usr/bin/lsacl [-l] file ... DESCRIPTION lsacl lists access control lists (ACLs) of one or more files in symbolic, ‘‘short’’ form, one file’s ACL per line of output, followed by the file name; see acl (5) for ACL syntax. Options lsacl recognizes the following option: -l Print ACLs in long form. Each file’s ACL can be more than one line long, and is always preceded by file name, colon, and newline.
m4(1) m4(1) NAME m4 - macro processor SYNOPSIS m4 [options ] [file ...] DESCRIPTION m4 is a macro processor intended as a front end for Ratfor, C, and other languages. Each of the argument files is processed in order; if there are no files, or if a file name is -, standard input is read. The processed text is written to standard output. Options m4 recognizes the following options: -e Operate interactively. Interrupts are ignored and the output is unbuffered. Using this mode may be very difficult.
m4(1) m4(1) (i.e., ‘ and ’). decr Returns the value of its argument decremented by 1. define The second argument is installed as the value of the macro whose name is the first argument. Each occurrence of $n in the replacement text, where n is a digit, is replaced by the nth argument.
m4(1) m4(1) of the first string. syscmd Executes the HP-UX system command given in the first argument. No value is returned. sysval Is the return code from the last call to syscmd. traceoff Turns off trace globally and for any macros specified. Macros specifically traced by traceon can be untraced only by specific calls to traceoff. traceon With no arguments, turns on tracing for all macros (including built-ins). Otherwise, turns on tracing for named macros.
machid(1) machid(1) NAME hp9000s200, hp9000s300, hp9000s500, hp9000s800, pdp11, u3b, u3b2, u3b5, u3b10, u370, vax - provide truth value about processor type SYNOPSIS hp9000s200 hp9000s300 hp9000s400 hp9000s500 hp9000s700 hp9000s800 hp-mc680x0 hp-pa pdp11 u3b u3b2 u3b5 u3b10 u370 vax DESCRIPTION The following commands return a true value (exit code 0) if the a processor type matches the command name. Otherwise a false value (exit code non-zero) is returned.
machid(1) machid(1) SEE ALSO getconf(1), make(1), sh(1), test(1), true(1).
machinfo(1) machinfo(1) NAME machinfo - print machine information SYNOPSIS machinfo DESCRIPTION machinfo prints useful debugging information about the machine. The information includes chip stepping, firmware revision, number of CPUs, and amount of memory. Note the CPU-specific data only applies to the processor running the machinfo command. Running the machinfo command on another CPU could result in different CPU-specific information being displayed.
mail(1) mail(1) NAME mail, rmail - send mail to users or read mail SYNOPSIS mail [+] [-epqr] [-f file ] mail [-dt] person ... rmail [-dt] person ... Remarks: See mailx (1) and elm(1) for an enhanced user mail interface. DESCRIPTION The mail command, when used without arguments, prints the user’s mail, message-by-message, in lastin, first-out order. For each message, mail prints a ? prompt and reads a line from the standard input to determine the disposition of the message.
mail(1) mail(1) -r Same as +. -f file Causes mail to use file (for example, mbox) instead of the default mailfile . -t Causes the outbound message to be preceded by each person the mail is sent to. A person is usually a user name recognized by login (see login (1)). If a person being sent mail is not recognized, or if mail is interrupted during input, the file dead.letter will be saved to allow editing and resending. Note that dead.
mail(1) mail(1) mail treats a line consisting solely of a dot ( . ) as the end of the message, except when the rmail -d command is used. The maximum allowable line length in mail messages is 8 times that of BUFSIZ bytes as defined in /usr/include/stdio.h. If line length exceeds this limit, mail truncates the line starting at beginning-of-line, and uses only the trailing 8 * BUFSIZ characters.
mailfrom(1) mailfrom(1) NAME mailfrom - summarize mail folders by subject and sender SYNOPSIS mailfrom [-hnQqStv] [-s status ] [folder username ]... DESCRIPTION The mailfrom command reads one or more mail folders and outputs one line per message in the form: from [subject ] where from is the name of the person the message is from, and subject is the subject of the message, if present.
mailfrom(1) mailfrom(1) EXIT STATUS mailfrom returns the following values: 0 Messages matching status are present. 1 No messages matching status are present, but there are some messages. 2 There are no messages at all. 3 An error occurred. If multiple mailboxes or folders are specified, the exit status only applies to the last one examined. This can be used in scripts to determine what kind of mail a user has. EXAMPLES Display header information from all the messages in your mailbox.
mailq(1) mailq(1) NAME mailq - prints the mail queue SYNOPSIS mailq [-v] DESCRIPTION mailq prints a summary of the mail messages queued for future delivery. The first line printed for each message shows the internal identifier used on this host for the message, the size of the message in bytes, the date and time the message was accepted into the queue, and the envelope sender of the message.
mailstats(1) mailstats(1) NAME mailstats - print mail traffic statistics SYNOPSIS mailstats [-C cffile ] [-f stfile ] [-o] [-p] DESCRIPTION mailstats reads and interprets the sendmail statistics file, and then prints out the mail traffic statistics. The statistics file is the one set by the StatusFile option in the /etc/mail/sendmail.cf. The default statistics file is /etc/mail/sendmail.st. If the statistics file exists, sendmail collects statistics about your mail traffic and stores them in that file.
mailstats(1) mailstats(1) mailstats: statistics-file : No such file or directory The statistics file does not exist. mailstats: statistics-file : Permission denied The statistics file’s permissions are set so that you cannot read it.
mailx(1) mailx(1) NAME mailx - interactive message processing system SYNOPSIS Send mode mailx [-FUm] [-s subject ] [-r address ] [-h number] address ... Receive mode mailx -e mailx [-UHLiNn] [-u user ] mailx -f [-UHLiNn] [filename ] Obsolescent mailx [-f filename ] [-UHLiNn] DESCRIPTION mailx provides a comfortable, flexible environment for sending and receiving messages electronically. When reading mail, mailx provides commands to facilitate saving, deleting, and responding to messages.
mailx(1) mailx(1) -H Print header summary only. -L Print complete header information only. -i Ignore interrupts. Also see the description of the ignore environment below. -n Do not initialize from the system default mailx.rc file. -m Do not add MIME header lines Mime Version, Content Type & Content Encoding to the header information while sending mails. -N Do not print initial header summary. -r address Pass address to network delivery software. All tilde commands are disabled.
mailx(1) mailx(1) d n o r u deleted messages new messages old messages read messages unread messages Note that the context of the command determines whether this type of message specification makes sense. Other arguments are usually arbitrary strings whose usage depends on the command involved. File names, where expected, are expanded using normal shell conventions (see sh(1)). Special characters are recognized by certain commands, and are documented with the commands below.
mailx(1) mailx(1) echo string ... Echo the given string or strings (similar to echo − see echo (1)). edit [msglist] Edit the given messages. The messages are placed in a temporary file and the EDITOR variable is used to get the name of the editor (see the Environment Variables subsection). Default editor is ed (see ed(1)). exit xit file [filename] folder [filename] Exit from mailx, without changing the mailbox. No messages are saved in the mbox (see also quit).
mailx(1) mailx(1) mbox [msglist] Arrange for the given messages to end up in the standard mbox save file when mailx terminates normally. See MBOX description in the Environment Variables subsection for a description of this file. See also the exit and quit commands. next [message] Go to next message matching message . A msglist can be specified, but in this case the first valid message in the list is the only one used.
mailx(1) mailx(1) source filename Read commands from the given file and return to command mode. top [msglist] Print the top few lines of the specified messages. If the toplines variable is set, it is interpreted as the number of lines to print (see the Environment Variables subsection). The default is 5. touch [msglist] Touch the specified messages. If any message in msglist is not specifically saved in a file, it is placed in the mbox upon normal termination. See exit and quit.
mailx(1) mailx(1) ˜e Invoke the editor on the partial message. Also see the EDITOR environment variable description below. ˜f [msglist] Forward the specified messages. The messages are inserted into the message without alteration. ˜h Prompt for Subject line and To, Cc, and Bcc lists. If the field is displayed with an initial value, it can be edited as if you had just typed it. ˜i string Insert the value of the named variable into the text of the message. For example, ~A is equivalent to ˜i Sign.
mailx(1) mailx(1) cmd=command Set the default command for the pipe command. No default value. conv=conversion Convert UUCP addresses to the specified address style. The only valid conversion currently supported is internet , which requires a mail delivery program conforming to the RFC822 standard for electronic mail addressing. Conversion is disabled by default. See also sendmail and the -U command-line option.
mailx(1) mailx(1) onehop When responding to a message that was originally sent to several recipients, the other recipient addresses are normally forced to be relative to the originating author’s machine for the response. This flag disables alteration of the recipients’ addresses, improving efficiency in a network where all machines can send directly to all other machines (i.e., one hop away).
mailx(1) LC_TIME mailx(1) LC_TIME determines the format and contents of the date and time strings displayed. If LC_TIME is not specified in the environment, or is set to the empty string, the value of LANG is used as a default. If LANG is not specified or is set to the empty string, a default of "C" (see lang (5)) is used instead of LANG. If any internationalization variable contains an invalid setting, mailx behaves as if all internationalization variables are set to "C". See environ (5).
make(1) make(1) NAME make - maintain, update, and regenerate groups of programs SYNOPSIS make [-f makefile ] [-bBdeiknpPqrsStuw] [ macro_name =value ] [ names ] DESCRIPTION Makefile Structure A makefile can contain four different kinds of lines: target lines, shell command lines, macro definitions, and include lines.
make(1) make(1) INCLUDE LINES If the string include appears as the first seven letters of a line in a makefile, and is followed by one or more space or tab characters, the rest of the line is assumed to be a file name and is read and processed by the current invocation of make as another makefile after any macros in the filename have been expanded. The default behaviour of make is to use .DEFAULT built-in target, if target does not have explicit commands associated with it and .DEFAULT target is defined.
make(1) make(1) MAKEFLAGS macro under Environment). The -t (touch) option updates the modified date of a file without executing any commands. A command line is normally printed before it is executed, but if the line has a @ at the beginning, printing is suppressed. The -s option or the presence of the special target .SILENT: in the makefile suppresses printing of all command lines. The @ can be used to selectively turn off printing.
make(1) make(1) -S Terminate if an error occurs while executing the commands to bring a target up-to-date. This is the default and the opposite of -k. If both -k and -S are specified, the last one given is used. This enables overriding the presence of the k flag in the MAKEFLAGS environment variable. -t Touch the target files (causing them to be up-to-date) rather than issue the usual commands. -u Unconditionally make the target, ignoring all timestamps. -w Suppress warning messages.
make(1) make(1) SHELL=/usr/bin/sh or a suitable equivalent should be put in the macro definition section of the makefile. Suffixes Target and/or dependent names often have suffixes. Knowledge about certain suffixes is built into make and used to identify appropriate inference rules to be applied to update a target (see the section on Inference Rules). The current default list of suffixes is: .o .c .c˜ .C .C˜ .cxx .cxx˜ .cpp .cpp˜ .cc .cc˜ .y .y˜ .l .l˜ .L .L˜ .Y .Y˜ .s .s˜ .sh .sh˜ .h .h˜ .H .H˜ .p .p˜ .
make(1) make(1) A tilde in the above rules refers to an SCCS file (see sccsfile (4)). Thus, the rule .c˜.o would transform an SCCS C source file into an object file (.o). Since the s. of the SCCS files is a prefix, it is incompatible with make’s suffix point-of-view. Hence, the tilde is a way of changing any file reference into an SCCS file reference. A rule to create a file with suffix .o from a file with suffix .c is specified as an entry with .c.o as the target and no dependents.
make(1) make(1) The most common use of the archive interface follows. Here, we assume the source files are all C type source: lib: lib(file1.o) lib(file2.o) lib(file3.o) @echo lib is now up-to-date .c.a: $(CC) -c $(CFLAGS) $< ar rv $@ $*.o rm -f $*.o (See the section on Built-in Macros for an explanation of the <, @, and * symbols.) In fact, the .c.a rule listed above is built into make and is unnecessary in this example. This rule is applied to each dependent of lib in turn.
make(1) make(1) pgm: a.o b.o cc a.o b.o -o pgm the following series of targets to be made is generated: --- pgm with two dependents and an explicit rule to follow --- a.o (recursively) with an implicit dependent of a.c which matches the implicit rule .c.o --- a.c (recursively) with no implicit dependents and no implicit rules. This stops the recursion and simply returns the last modification time of the file a.c. --- b.o (recursively) with an implicit dependent of b.c which matches the implicit rule .
make(1) $$@ make(1) The $$@ macro has meaning only on dependency lines. Macros of this form are called dynamic dependencies because they are evaluated at the time the dependency is actually processed. $$@ evaluates to exactly the same thing as $@ does on a command line; i.e., the current target name. This macro is useful for building large numbers of executable files, each of which has only one source file.
make(1) make(1) International Code Set Support Single and multi-byte character code sets are supported. RETURN VALUE make returns a 0 upon successful completion or a value greater than 0 if an error occurred. If the -q option is specified, make returns 0 if the target was up-to-date and a value greater than 0 if the target was not up-to-date. EXAMPLES The following example creates an executable file from a C source code file without a makefile, if program.
make(1) make(1) SEE ALSO cc_bundled(1), cd(1), lex(1), mkmf(1), sh(1), environ(5), lang(5), regexp(5). A Nutshell Handbook, Managing Projects With Make by Steve Talbot, Second Edition, O’Reilly & Associates, Inc., 1986. STANDARDS CONFORMANCE make: SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
makekey(1) makekey(1) NAME makekey - generate encryption key SYNOPSIS /usr/lbin/makekey DESCRIPTION makekey improves the usefulness of encryption schemes depending on a key by increasing the amount of time required to search the key space. It reads 10 bytes from its standard input and writes 13 bytes on its standard output. The output depends on the input in a way intended to be difficult to compute (i.e., to require a substantial fraction of a second).
man(1) man(1) NAME man - find manual information by keywords; print out a manual entry SYNOPSIS man [-M path] -k keyword ... man [-M path] -f file ... man [-] [-M path] [-T macro-package] [ section [ subsection ] ] entry_name ... DESCRIPTION man accesses information from the HP-UX manual pages. It can be used to: • List all manual entries whose one-line description contains any of a specified set of keywords. • Display or print one-line descriptions of entries specified by name.
man(1) man(1) search for one or more of the entries indicated. section corresponds to the section number where the entry appears in the HP-UX Reference . It can be followed by an optional uppercase/lowercase subsection identifier such as 3C which would indicate a library routine in Section 3. 3, 3c, and 3C are interpreted as equivalent, since all Section 3 manual entries are stored in the same or in related directories (such as /usr/share/man/man3.Z and /usr/share/man/man3.
man(1) man(1) man∗.Z The entry is uncompressed, formatted, and displayed. If the cat∗.Z directory exists, the formatted entry is compressed and installed in cat∗.Z. If the cat∗ directory exists, the formatted entry is installed in cat∗ . cat∗.Z The entry is uncompressed and displayed. man∗ The entry is formatted, and displayed. If the cat∗.Z directory exists, it is compressed, and installed in cat∗.Z. If the cat∗ directory exists, the formatted entry is installed in cat∗ .
man(1) man(1) Display the manual entry for id(1), with the output piped through pg -c: PAGER="pg -c" export PAGER man id List all printed manuals available for the current system (see manuals (5): man manuals Display intro (4) and intro (3): man 4 intro man 3 intro WARNINGS Manual entries are structured such that they can be printed on a phototypesetter, conventional line printer, and screen display devices.
mediainit(1) mediainit(1) NAME mediainit - initialize disk or partition DDS tape SYNOPSIS mediainit [-vr] [-f fmt_optn ] [-i interleave ] [-p size ] pathname DESCRIPTION mediainit initializes mass storage media by formatting the media, writing and reading test patterns to verify media integrity, then sparing any defective blocks found. This process prepares the disk or tape for error-free operation. Initialization destroys all existing user data in the area being initialized.
mediainit(1) pathname mediainit(1) pathname is the path name to the character (raw) device special file associated with the device unit or volume that is to be initialized. mediainit aborts if you lack either read or write permission to the device special file, or if the device is currently open for any other process. This prevents accidental initialization of the root device or any mounted volume. mediainit locks the unit or volume being initialized so that no other processes can access it.
mediainit(1) mediainit(1) Some applications may require that a file system be placed on the media before use. mediainit does not create a file system; it only prepares media for writing and reading. If such a file system is required, other utilities such as newfs, lifinit, or mkfs must be invoked after running mediainit (see newfs (1M), lifinit (1), and mkfs(1M)). RETURN VALUE mediainit returns one of the following values: 0 1 2 Successful completion. A device-related error occurred.
merge(1) merge(1) NAME merge - three-way file merge SYNOPSIS merge [-p] file1 file2 file3 DESCRIPTION merge combines two files that are revisions of a single original file. The original file is file2 , and the revised files are file1 and file3 . merge identifies all changes that lead from file2 to file3 and from file2 to file1 , then deposits the merged text into file1 . If the -p option is used, the result goes to standard output instead of file1 .
mesg(1) mesg(1) NAME mesg - permit or deny messages to terminal SYNOPSIS mesg [[-] g ] [[-] y ] [[-] n ] mesg DESCRIPTION The command form mesg [-] n forbids messages via write by revoking write permission to users without appropriate privilege on the user’s terminal (see write (1)). The command form mesg [-] g reinstates permission so that only legitimate commands (such as write (1)) can be used by other users to send messages.
mkdir(1) mkdir(1) NAME mkdir - make a directory SYNOPSIS mkdir [-p] [-m mode ] dirname ... DESCRIPTION mkdir creates specified directories in mode 0777 (possibly altered by umask unless specified otherwise by a -m mode option (see umask(1)). Standard entries, . (for the directory itself) and .. (for its parent) are created automatically. If dirname already exists, mkdir exits with a diagnostic message, and the directory is not changed.
mkdir(1) mkdir(1) mkdir returns exit code 0 if the -p option was specified, and all the specified directories now exist. If any of the intermediate directories do not have search or write permission (with the -p option), mkdir prints a diagnostic and returns non-zero.
mkfifo(1) mkfifo(1) NAME mkfifo - make FIFO (named pipe) special files SYNOPSIS mkfifo [-p] [-m mode ] filename ... DESCRIPTION mkfifo creates the FIFO special files named by its operand list. The operands are taken sequentially in the order specified and, if the user has write permission in the appropriate directory, the FIFO is created with permissions 0666 modified by the user’s file mode creation mask (see umask(2)).
mkmf(1) mkmf(1) NAME mkmf - make a makefile SYNOPSIS mkmf [-acdeil ] [-f makefile ] [-F template ] [-M language ] [ macroname =value ... ] DESCRIPTION The mkmf command creates a makefile that informs the make command how to construct and maintain programs and libraries (see make(1)).
mkmf(1) CFLAGS mkmf(1) C compiler flags. After searching for included files in the directory currently being processed, mkmf searches in directories named in -I compiler options and then in the /usr/include directory. COMPILESYSTYPE Location of /usr/include. If the COMPILESYSTYPE macro or environment mkmf searches for included files in variable is defined, /$COMPILESYSTYPE/usr/include instead of /usr/include. CXXFLAGS C++ compiler flags.
mkmf(1) mkmf(1) syntax, C++ = C syntax plus the addition of /usr/include/CC as a standard search directory, F = Fortran and Ratfor syntax, P = Pascal syntax). The following list shows the default configuration for mkmf: C C++ Fortran Include files Pascal include files Lex or Lisp Object files Pascal Ratfor Assembler Yacc .c:sC .C:sC++ .f:sF .h:h .i:h .l:sC .o:o .p:sP .r:sF .s:s .y:sC For example, to change the object file suffix to .
mkmf(1) mkmf(1) -l Force the makefile to be a library makefile. -F template Specify an alternative makefile template path name. The path name can be relative or absolute. -M language Specify an alternative language -specific makefile template. The default language is C and the corresponding program and library makefile templates are C.p and C.l, respectively. mkmf looks for these templates in /usr/ccs/lib/mf or $PROJECT/lib/mf. DIAGNOSTICS Exit status 0 is normal. Exit status 1 indicates an error.
mkmsgs(1) mkmsgs(1) NAME mkmsgs - create message files for use by gettxt() SYNOPSIS mkmsgs [-o] [-i locale ] textfile msgfile DESCRIPTION The mkmsgs command takes as input a file of localized text strings and generates a message file that can be accessed by the gettxt (3C) routine. textfile is the name of the file that contains the text strings. msgfile is the name of the output message file. mkmsgs appends the suffix .cat to the message file name.
mkstr(1) mkstr(1) NAME mkstr - extract error messages from C source into a file SYNOPSIS mkstr [-] messagefile prefix file ... DESCRIPTION mkstr examines a C program and creates a file containing error message strings used by the program. Programs with many error diagnostics can be made much smaller by referring to places in the file, and reduce system overhead in running the program.
mkstr(1) mkstr(1) printf(msg, a1, a2, a3); } EXTERNAL INFLUENCES Environment Variables LC_CTYPE determines the interpretation of comments and string literals as single- and/or multi-byte characters. If LC_CTYPE is not specified in the environment or is set to the empty string, the value of LANG is used as a default for each unspecified or empty variable. If LANG is not specified or is set to the empty string, a default of "C" (see lang (5)) is used instead of LANG.
mktemp(1) mktemp(1) NAME mktemp - make a name for a temporary file SYNOPSIS mktemp [-c] [-d directory_name ] [-p prefix ] DESCRIPTION mktemp makes a name that is suitable for use as the pathname of a temporary file, and writes that name to the standard output. The name is chosen such that it does not duplicate the name of an existing file. If the -c option is specified, a zero-length file is created with the generated name.
mm(1) mm(1) NAME mm, osdd - print documents formatted with the mm macros SYNOPSIS mm [ options ] [ files ] osdd [ options ] [ files ] DESCRIPTION mm can be used to format and print documents using nroff and the mm text-formatting macro package (see nroff(1)). It has options to specify preprocessing by tbl and/or neqn, (see tbl (1) and neqn(1)), and postprocessing by various terminal-oriented output filters.
mm(1) mm(1) terminal filter when actually printing the formatted file. SEE ALSO col(1), env(1), nroff(1), tbl(1), profile(4), term(4), mm(5).
model(1) model(1) NAME model - print hardware model information SYNOPSIS model DESCRIPTION model prints the machine hardware model. names, or other information. model may also display the manufacturer, product EXAMPLES The model output below indicates an Itanium(R)-based g4000 server from Hewlett-Packard. ia64 hp server g4000 The model output below is from an HP 9000 L-Class server.
more(1) more(1) NAME more, page - file perusal filter for crt viewing SYNOPSIS more [-n] [-cdefisuvz] [-n number ] [-p command ] [-t tagstring ] [-x tabs ] [-W option ] [+linenumber ] [+/pattern ] [ name ... ] page [-n] [-cdefisuvz] [-n number ] [-p command ] [-t tagstring ] [-x tabs ] [-W option ] [+linenumber ] [+/pattern ] [ name ... ] REMARKS: pg is preferred in some standards and has some added functionality, but does not support character highlighting (see pg(1)).
more(1) A mA more(1) -v Do not display nonprinting characters graphically; by default, all non-ASCII and control characters (except , , and ) are displayed visibly in the form ˆX for , or M-x for non-ASCII character x. -z Same as not specifying -v, with the exception of displaying as ˆH, as ˆM, and as ˆI. -p command Execute the more command initially in the command argument for each file examined.
more(1) more(1) If the standard output is not a terminal device, more always exits when it reaches end-of-file on the last file in its argument list. Otherwise, for all files but the last, more prompts, with an indication that it has reached the end of file, along with the name of the next file. For the last file specified, or for the standard input if no file is specified, more prompts, indicating end-fo-file, and accept additional commands.
more(1) more(1) if i ib i q Q :q :Q ZZ Move forward i lines, with a default of one screenful. At end-of-file, more will continue with the next file in the list, or exit if the current file is the last file in the list. Move backward i lines, with a default of one screenful. If i is more than the screen size, only the final screenful will be written. Exit from more.
more(1) more(1) :e [file ] E [file ] Examine a new file. If the file argument is not specified, the "current" file (see the :n and :p commands) from the list of files in the command line is re-examined. The filename is subjected to the process of shell word expansions. If file is a # (number sign) character, the previously examined file is re-examined. i :n Examine the next file. If i is specified, examines the i-th next file specified in the command line. i :p Examine the previous file.
more(1) TERM more(1) Determines the name of the terminal type. International Code Set Support Single- and multi-byte character code sets are supported. APPLICATION USAGE When the standard output is not a terminal, none of the filter-modification options is effective. This is based on historical practice. For example, a typical implementation of man pipes its output through more -s to squeeze excess white space for terminal users.
mpsched(1) mpsched(1) NAME mpsched - control the processor or locality domain on which a specific process executes SYNOPSIS mpsched -h mpsched -s mpsched -g command mpsched [-P policy ] [-f] [-T policy ] [-l locality-domain-id] [-c spu ] command mpsched [-q] [-u] [-P policy ] [-f] [-l locality-domain-id] [-c spu ] {-p pid }... DESCRIPTION mpsched controls the processor (spu ), or locality domain (locality-domain-id) on which a process executes.
mpsched(1) mpsched(1) option can be used with the -T, -p, -c, and -l options. policy is one of the following values. RR Round robin launch policy. Under this policy, successive direct child processes of the specified command or process are launched in a round robin fashion across the other locality domains in the system relative to creating process. RR_TREE Tree based round robin launch policy.
mt(1) mt(1) NAME mt - magnetic tape manipulating program SYNOPSIS mt [-f tapename ] command [ count ] Obsolescent mt [-t tapename ] command [ count ] DESCRIPTION mt is used to give commands to the tape drive. If tapename is not specified, the environment variable TAPE is used; if TAPE is not defined, the default drive is used. mt winds the tape in the requested direction (forward or backward), stopping after the specified count EOF marks or records are passed. If count is not specified, one is assumed.
mt(1) mt(1) FILES /dev/rmt/* /dev/rmt/0mnb Raw magnetic tape interface Default tape interface AUTHOR mt was developed by the University of California, Berkeley. SEE ALSO dd(1), mt(7), st(1M).
mv(1) mv(1) NAME mv - move or rename files and directories SYNOPSIS mv [-f-i] [-e extarg ] file1 new-file mv [-f-i] [-e extarg ] file1 [file2 ...] dest-directory mv [-f-i] [-e extarg ] directory1 [ directory2 ... ] dest-directory DESCRIPTION The mv command moves: • One file (file1 ) to a new or existing file (new-file ). • One or more files (file1 , [file2 , ...]) to an existing directory (dest-directory). • One or more directory subtrees (directory1 , [directory2 , ...
mv(1) mv(1) If new-file is a new file, it inherits the access control list of file1 , altered to reflect any difference in ownership between the two files (see acl (5) and aclv(5)). In JFS file systems, new files created by mv do not inherit their parent directory’s default ACL entries (if any), but instead retain their original ACLs. When moving files from a JFS file system to an HFS file system or vice versa, optional ACL entries are lost.
mv(1) mv(1) AUTHOR mv was developed by AT&T, the University of California, Berkeley and HP. SEE ALSO cp(1), cpio(1), ln(1), rm(1), link(1M), lstat(2), readlink(2), stat(2), symlink(2), symlink(4), acl(5), aclv(5). STANDARDS CONFORMANCE mv: SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
(Notes) A (Notes) mA Section 1−−566 Hewlett-Packard Company −1− HP-UX 11i Version 2: August 2003