HP-UX Reference Section 1: User Commands (N-Z) HP-UX 11i Version 2 September 2004 Volume 2 of 10 Manufacturing Part Number : B2355-90840 Printed In USA E0904 Printed in USA © Copyright 1983-2004 Hewlett-Packard Development Company LP.
Legal Notices The information in this document is subject to change without notice. Warranty The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. U.S. Government License Confidential computer software.
Copyright 1996 Morning Star Technologies, Inc. Copyright 1996 Progressive Systems, Inc. Trademark Notices Intel and Itanium are registered trademarks of Intel Corporation in the US and other countries and are used under license. Java is a US trademark of Sun Microsystems, Inc. Microsoft and MS-DOS are U.S. registered trademarks of Microsoft Corporation. OSF/Motif is a trademark of The Open Group in the US and other countries. UNIX is a registered trademark of The Open Group.
Revision History This document’s printing date and part number indicate its edition. The printing date changes when a new edition is printed. (Minor corrections and updates which are incorporated at reprint do not cause the date to change.) New editions of this manual incorporate all material updated since the previous edition. Part Number Date; Release; Format; Distribution B2355-60105 September 2004; HP-UX 11i version 2; one volume HTML; docs.hp.com and Instant Information.
audit (5) An HP-UX manpage. audit is the name and 5 is the section in the HP-UX Reference. On the web and on the Instant Information CD, it may be a hot link to the manpage itself. From the HP-UX command line, you can enter “man audit” or “man 5 audit” to view the manpage. See man (1). Book Title The title of a book. On the web and on the Instant Information CD, it may be a hot link to the book itself. KeyCap The name of a keyboard key. Note that Return and Enter both refer to the same key.
vi
Preface HP-UX is the Hewlett-Packard Company’s implementation of an operating system that is compatible with various industry standards. It is based on the UNIX System V Release 4 operating system and includes important features from the Fourth Berkeley Software Distribution. The ten volumes of this manual contain the system reference documentation, made up of individual entries called manpages, named for the man command that displays them on the system.
viii
Volume Two Table of Contents Section 1
Volume Two Table of Contents Section 1
Table of Contents Volumes One and Two Section 1: User Commands Entry Name(Section): name Description intro(1): intro ................................................... introduction to command utilities and application programs adb(1): adb ............................................................................................................................ absolute debugger adjust(1): adjust ............................................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description checknr(1): checknr ........................................................................................................ check nroff/troff files chfn(1): chfn ......................................................... change user information in password file; used by finger chgrp: change file group .................................................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description dosmkdir(1): dosmkdir ................................................................................................. make a DOS directory dosrm(1): dosrm, dosrmdir ............................................................................ remove DOS files or directories dosrmdir : remove DOS directories ................................................................................................. see dosrm(1) du(1): du .....
Table of Contents Volumes One and Two Entry Name(Section): name Description gencat(1): gencat ........................................................................... generate a formatted message catalog file genxlt(1): genxlt .................................................................................................... generate iconv translation get(1): get ............................................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description ktutil(1): ktutil ............................................................................... Kerberos keytab file maintenance utility kvno(1): kvno ...................................................................... print key version numbers of Kerberos principals l: list contents of directories ....................................................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description mesg(1): mesg .......................................................................................... permit or deny messages to terminal mkdir(1): mkdir ..................................................................................................................... make a directory mkfifo(1): mkfifo ..................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description osdd: print/check documents formatted with the mm macros ........................................................... see mm(1) pack(1): pack, pcat, unpack .................................................................................. compress and expand files page: file perusal filter for screen viewing ..................................................................................... see more(1) parstatus(1): parstatus .....
Table of Contents Volumes One and Two Entry Name(Section): name Description rlogin(1): rlogin .......................................................................................................................... remote login rm(1): rm ................................................................................................................... remove files or directories rmail: send mail to users or read mail .........................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description tcpdmatch(1): tcpdmatch .................................................................... evaluate tcp wrapper service requests tee(1): tee ........................................................................................................................................ pipe fitting telnet(1): telnet .................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description until: execute commands until expression is nonzero ........................................................................ see ksh(1) until: execute commands until expression is nonzero ................................................................ see sh-posix(1) uptime(1): uptime, w ................................................................................. show how long system has been up users(1): users ...............
Section 1 Part 2 User Commands N-Z
Section 1 Part 2 User Commands N-Z
named-checkconf(1) named-checkconf(1) NAME named-checkconf - named configuration file syntax checking tool SYNOPSIS /usr/sbin/named-checkconf [-t] directory ] [-v] [filename ] DESCRIPTION named-checkconf is a tool to check the syntax, but not semantics, of the configuration file for named. Options -t directory chroot to directory so that include directives in the configuration file are processed as if run by a similarly chrooted named. -v Print the version of the named-checkconf program and exit.
named-checkzone(1) named-checkzone(1) NAME named-checkzone - zone validity checking tool SYNOPSIS /usr/sbin/named-checkzone [-c class ] [-dq] zone [filename ] DESCRIPTION named-checkzone is a tool for performing integrity checks on the zone contents. It uses the same integrity checks as named. It mainly checks for syntax errors and also the RR type. Options -c class Specify the class of the zone. -d Enable debugging. -q Enable quiet mode for exit code only.
neqn(1) neqn(1) NAME neqn - format mathematical text for nroff SYNOPSIS neqn [-dxy] [-sn] [-fn] [-pn] [file ]... Remarks The output of neqn is very device-dependent. See the WARNINGS section. The examples shown approximate the results in a dtterm window. To see the actual results on an output device, send the output of the man neqn command directly to the device. DESCRIPTION neqn is a preprocessor for nroff (see nroff(1)) for typesetting mathematical text on typewriter-like terminals.
neqn(1) neqn(1) Fractions Fractions are produced by using over: Source Text Result a over b a _ b Square Roots sqrt produces square roots: Source Text Result 1 over sqrt {ax sup 2+bx+c} _____1____ ________ \|ax2+bx+c Upper and Lower Limits The keywords from and to specify lower and upper limits: A nA Source Text Result lim from {n -> inf } sum from 0 to n x sub i n lim Rx n->oo0 i Brackets and Braces Left and right brackets, braces, and such, of proper height are made with left and right: S
neqn(1) neqn(1) Matrices and Determinants Matrices are made with matrix: Source Text Result left | { matrix { lcol { x sub i above y sub 2 } ccol { 1 above 234 } } } right | |xi | |y2 | 1 | | 234| | In addition, there is rcol for a right-aligned column. Diacritical Marks Diacritical marks are made with dot, dotdot, hat, tilde, bar, vec, dyad, and under: Source Text Result x dot = f(t) bar . ____ x=f(t) y dotdot bar ˜=˜ n under __ ..
neqn(1) neqn(1) Verbatim Text Strings enclosed in double quotes ("string ") are passed through untouched; this permits keywords to be entered as text, and can be used to communicate with nroff when other methods fail. Details are given in the manuals cited below. Options neqn accepts the following options: -dxy Define the characters x and y as the start and end in-text delimiter characters. See the Delimiters subsection. -fn Change the font number globally for the output equations in the document to n.
netstat(1) netstat(1) NAME netstat - show network status SYNOPSIS netstat [-an] [-f address-family ] [ system ] netstat [-an] [-f address-family ] [ system [ core ]] # PA-RISC only netstat [-Mnrsv] [-f address-family ] [-p protocol ] [ system ] netstat [-Mnrsv] [-f address-family ] [-p protocol ] [ system [ core ]] # PA-RISC only netstat [-ginw] [-I interface ] [ interval ] [ system ] netstat [-ginw] [-I interface ] [ interval ] [ system [ core ]] # PA-RISC only DESCRIPTION netstat displays statist
netstat(1) netstat(1) -r and -v options. -p protocol Show statistics for the specified protocol. The following protocols are recognized: tcp, udp, ip, icmp, igmp, ipv6, and icmpv6. -r Show the routing tables. When -v is used with the -r option, netstat also displays the network masks in the route entries. This option is ignored if the g, -i, -I, -p or interval option is specified and is invalid if the -s option is specified. -s Show statistics for all protocols.
netstat(1) netstat(1) MTU. Otherwise, the PMTU value is the same as the MTU of the network interface used for the route. The Prefix field is for IPv6 only. Its format is similar to the CIDR notation in IPv4. The prefix is an integer between 0 and 128 inclusive. It specifies how many of the leftmost contiguous bits of the address comprise the prefix. A host route has a prefix of 128. A default route has a prefix of 0 (see route (1M)). The prefix is also used in selecting a route to forward an IPv6 packet.
newalias(1) newalias(1) NAME newalias - install new elm aliases for user or system SYNOPSIS newalias [-g] Remarks newalias replaces the former functionality of the elmalias command. DESCRIPTION The newalias command creates new alias database files from an alias text file for use by elm and other programs. For user aliases, this functionality can also be performed from the Alias Menu of the elm program (see elm(1)). Options newalias recognizes the following option: -g Global.
newalias(1) firstname newalias(1) The first name of the person (or group). It is combined with lastname to form the fullname . This field can contain any characters except an unquoted equal sign (=) or an unquoted comma (,). See the Quoting Characters subsection. The only first name under the Personal or Group Aliases subheading below is: John in Smith; John. lastname The last name of the person (or group). It is combined with firstname to form the fullname .
newalias(1) newalias(1) AUTHOR newalias was developed by HP. SEE ALSO elm(1), elmalias(1), mail(1), mailx(1).
newform(1) newform(1) NAME newform - change or reformat a text file SYNOPSIS newform [-i tabspec ] [-o tabspec ] [-l n ] [-b n ] [-e n ] [-c char ] [-p n ] [-a n ] [-f] [-s] [ files ] DESCRIPTION newform reads lines from the named files , or the standard input if no input file is named, and reproduces the lines on the standard output. Lines are reformatted in accordance with command line options in effect.
newform(1) newform(1) of the processed line. For example, to convert a file with leading digits, one or more tabs, and text on each line, to a file beginning with the text, all tabs after the first expanded to spaces, padded with spaces out to column 72 (or truncated to column 72), and the leading digits placed starting at column 73, the command would be: newform -s -i -l -a -e file-name RETURN VALUE newform returns one of the following values upon completion: 0 No errors encountered.
newgrp(1) newgrp(1) NAME newgrp - switch to a new group SYNOPSIS newgrp [-] [group ] DESCRIPTION The newgrp command changes your group ID without changing your user ID and replaces your current shell with a new one. If you specify group , the change is successful if group exists and either your user ID is a member of the new group , or group has a password and you can supply it from the terminal. If you omit group , newgroup changes to the group specified in your entry in the password file, /etc/passwd.
newgrp(1) newgrp(1) SEE ALSO csh(1), ksh(1), login(1), sh-posix(1), group(4), passwd(4), environ(5).
newmail(1) newmail(1) NAME newmail - notify users of new mail in mailboxes SYNOPSIS newmail [-i interval ] [-w] [file-spec ]... DESCRIPTION The newmail utility monitors your incoming mailbox or specified mail folders. The basic operation is that the program checks the folders each interval seconds (default 60) and lists any new mail that has arrived in any of the mailboxes, indicating the sender’s name, and the subject of the message.
news(1) news(1) NAME news - print news items SYNOPSIS news [-a] [-n] [-s] [ items ] DESCRIPTION news is used to keep the user informed of current events. By convention, these events are described by files in the directory /var/news. When invoked without arguments, news prints the contents of all current files in /var/news, most recent first, with each preceded by an appropriate header. news stores the ‘‘currency’’ time as the modification date of a file named .
nice(1) nice(1) NAME nice - run a command at nondefault priority SYNOPSIS nice [-priority_change] command [command_args ] nice [-n priority_change] command [command_args ] DESCRIPTION The nice command executes command at a nondefault CPU scheduling priority. (The name is derived from being "nice" to other system users by running large programs at lower priority.
nice(1) nice(1) from a login shell whose current nice value is 20 spawns a subshell with a system nice value of 30. Attempting to use nice --2 ksh from the new shell to spawn another subshell whose system nice value would be 28, is rejected (unless the user has appropriate privileges), even though the resulting system nice value would be less than the priority of the original login shell process.
nis+(1) nis+(1) NAME nis+, NIS+, nis - a new version of the network information name service DESCRIPTION NIS+ is a new version of the network information name service. This version differs in several significant ways from version 2, which is referred to as NIS or YP in earlier releases. Specific areas of enhancement include the ability to scale to larger networks, security, and the administration of the service. The manpages for NIS+ are broken up into three basic categories.
nis+(1) nis+(1) Simple Names Simple names consist of a series of labels that are separated by the dot (.) character. Each label is composed of printable characters from the ISO Latin 1 set. Each label can be of any nonzero length, provided that the fully qualified name is fewer than NIS_MAXNAMELEN octets including the separating dots. (See for the actual value of NIS_MAXNAMELEN in the current release.) Labels that contain special characters (see Grammar ) must be quoted.
nis+(1) nis+(1) partially qualified name. This expansion is actually done by the NIS+ library function nis_getnames (3N) which generates a list of names using the default NIS+ directory search path or the NIS_PATH environment variable. The default NIS+ directory search path includes all the names in its path. nis_getnames() is invoked by the functions nis_lookup (3N) and nis_list (3N) when the EXPAND_NAME flag is used. The NIS_PATH environment variable contains an ordered list of simple names.
nis+(1) nis+(1) tion path set in site-specific tables. Refer to nis_list (3N) for more details. Namespaces The NIS+ service defines two additional disjoint namespaces for its own use. These namespaces are the NIS+ Principal namespace, and the NIS+ Group namespace. The names associated with the group and principal namespaces are syntactically identical to simple names. However, the information they represent cannot be obtained by directly presenting these names to the NIS+ interfaces.
nis+(1) nis+(1) This mechanism of mapping UID and netnames into an NIS+ principal name guarantees that a client of the NIS+ service has only one principal name. This principal name is used as the basis for authorization which is described below. All objects in the NIS+ namespace and all entries in NIS+ tables must have an owner specified for them. This owner field always contains an NIS+ principal name. Group Names Like NIS+ principal names, NIS+ group names take the form: group_name .
nis+(1) nis+(1) directory and table objects are granted to those clients for all of the objects "contained" by the parent object. This notion of containment is abstract. The objects do not actually contain other objects within them. Note that group objects do contain the list of principals within their definition. Access rights are interpreted as follows: read This right grants read access to an object.
nis+(1) nis+(1) Note that there is currently no command line interface to set or change the OAR of the directory object. Table Authorization As with directories, additional capabilities are provided for granting access to entries within tables. Rights granted to a client by the access rights field in a table object apply to the table object and all of the entry objects "contained" by that table. If an access right is not granted by the table object, it may be granted by an entry within the table.
nis+(1) nis+(1) nisclient (1M) nisd (1M) nisd_resolv (1M) nisinit (1M) nislog (1M) nisping (1M) nispopulate (1M) nisserver (1M) nissetup (1M) nisshowcache (1M) nisstat (1M) nisupdkeys (1M) rpc.nisd (1M) rpc.
nis+(1) nis_map_group(3N) nis_mkdir (3N) nis_modify (3N) nis_modify_entry(3N) nis_name_of (3N) nis_names (3N) nis_next_entry(3N) nis_objects (3N) nis_perror (3N) nis_ping (3N) nis_print_group_entry(3N) nis_print_object(3N) nis_remove (3N) nis_remove_entry(3N) nis_removemember(3N) nis_rmdir (3N) nis_server (3N) nis_servstate(3N) nis_sperrno (3N) nis_sperror (3N) nis_sperror_r(3N) nis_stats (3N) nis_subr (3N) nis_tables (3N) nis_verifygroup(3N) NIS+ Files and Directories nisfiles (4) nis+(1) NIS+ group man
niscat(1) niscat(1) NAME niscat - display NIS+ tables and objects SYNOPSIS niscat [ -AhLMv ] tablename . . . niscat [ -ALMP ] -o name . . . DESCRIPTION In the first synopsis, niscat displays the contents of the NIS+ tables named by tablename . In the second synopsis, it displays the internal representation of the NIS+ objects named by name. Options A nA -A Display the data within the table and all of the data in tables in the initial table’s concatenation path.
niscat(1) niscat(1) separator, access rights, and other defaults. Display the directory object for org_dir, which includes information such as the access rights and replica information: niscat -o org_dir EXTERNAL INFLUENCES Environment Variables NIS_PATH If this variable is set and the NIS+ table name is not fully qualified, each directory specified will be searched until the table is found (see nisdefaults (1)). RETURN VALUE niscat returns 0 on success and 1 on failure.
nischgrp(1) nischgrp(1) NAME nischgrp - change the group owner of an NIS+ object SYNOPSIS nischgrp [ -AfLP ] group name . . . DESCRIPTION nischgrp changes the group owner of the NIS+ objects or entries specified by name to the specified NIS+ group . Entries are specified using indexed names (see nismatch (1)). If group is not a fully qualified NIS+ group name, it will be resolved using the directory search path (see nisdefaults (1)).
nischgrp(1) nischgrp(1) SEE ALSO nis+(1), nischmod(1), nischown(1), nisdefaults(1), nisgrpadm(1), nis_objects(3N).
nischmod(1) nischmod(1) NAME nischmod - change access rights on an NIS+ object SYNOPSIS nischmod [ -AfLP ] mode name . . . DESCRIPTION nischmod changes the access rights (mode) of the NIS+ objects or entries specified by name to mode. Entries are specified using indexed names (see nismatch (1)). Only principals with modify access to an object may change its mode. mode has the following form: rights [,rights ] . . . rights has the form: [ who ] op permission [ op permission ] . . .
nischmod(1) nischmod(1) nischmod g+m ’[uid=55],passwd.org_dir’ Change the permissions of a linked object: nischmod -L w+mr linkname EXTERNAL INFLUENCES Environment Variables NIS_PATH If this variable is set and the NIS+ name is not fully qualified, each directory specified will be searched until the object is found (see nisdefaults (1)). RETURN VALUE nischmod returns 0 on success and 1 on failure. WARNINGS HP-UX 11i Version 2 is the last HP-UX release on which NIS+ is supported.
nischown(1) nischown(1) NAME nischown - change the owner of an NIS+ object SYNOPSIS nischown [ -AfLP ] owner name . . . DESCRIPTION nischown changes the owner of the NIS+ objects or entries specified by name to owner . Entries are specified using indexed names (see nismatch (1)). If owner is not a fully qualified NIS+ principal name (see nisaddcred (1M)), the default domain (see nisdefaults (1)) will be appended to it.
nischttl(1) nischttl(1) NAME nischttl - change the time to live value of an NIS+ object SYNOPSIS nischttl [ -AfLP ] time name . . . DESCRIPTION nischttl changes the time to live value (ttl) of the NIS+ objects or entries specified by name to time . Entries are specified using indexed names (see nismatch (1)). The time to live value is used by object caches to expire objects within their cache.
nischttl(1) nischttl(1) RETURN VALUE nischttl returns 0 on success and 1 on failure. WARNINGS HP-UX 11i Version 2 is the last HP-UX release on which NIS+ is supported. LDAP is the recommended replacement for NIS+. HP fully supports the industry standard naming services based on LDAP. AUTHOR nischttl was developed by Sun Microsystems, Inc. SEE ALSO nis+(1), nischgrp(1), nischmod(1), nischown(1), nisdefaults(1), nis_objects(3N).
nisdefaults(1) nisdefaults(1) NAME nisdefaults - display NIS+ default values SYNOPSIS nisdefaults [ -adghprstv ] DESCRIPTION nisdefaults prints the default values that are returned by calls to the NIS+ local name functions (see nis_local_names(3N)). With no options specified, all defaults will be printed in a verbose format. With options, only that option is displayed in a terse form suitable for shell scripts. See the example below. Options -a Print all defaults in a terse format.
nisdefaults(1) nisdefaults(1) objects. The default for this value is the principal who is executing the command. group=groupname This token specifies that the group groupname should be the group owner for created objects. The default is NULL. access=rights This token specifies the set of access rights that are to be granted for created objects. The value rights is specified in the format as defined by the nischmod command. (See nischmod (1)). The default value is - - - -rmcdr- - -r- - -.
niserror(1) niserror(1) NAME niserror - display NIS+ error messages SYNOPSIS niserror error-num DESCRIPTION niserror prints the NIS+ error associated with status value error-num on the standard output. It is used by shell scripts to translate NIS+ error numbers that are returned into text messages. EXAMPLES Print the error associated with the error number 20: niserror 20 Not Found, no such name WARNINGS HP-UX 11i Version 2 is the last HP-UX release on which NIS+ is supported.
nisgrpadm(1) nisgrpadm(1) NAME nisgrpadm - NIS+ group administration command SYNOPSIS nisgrpadm -a | -r | -t ] [ -s ] group principal . . . nisgrpadm -c | -d | -l [ -M ] [ -s ] group DESCRIPTION nisgrpadm is used to administer NIS+ groups. This command administers both groups and the groups’ membership lists. nisgrpadm can create, destroy, or list NIS+ groups. nisgrpadm can be used to administer a group’s membership list.
nisgrpadm(1) nisgrpadm(1) Administering Members Add two principals, bob and betty to the group my_buds.foo.com: nisgrpadm -a my_buds.foo.com. bob.bar.com. betty.foo.com. Remove betty from freds_group: nisgrpadm -r freds_group betty.foo.com. EXTERNAL INFLUENCES Environment Variables NIS_PATH If this variable is set and the NIS+ group name is not fully qualified, each directory specified will be searched until the group is found (see nisdefaults (1)).
nisln(1) nisln(1) NAME nisln - symbolically link NIS+ objects SYNOPSIS nisln [ -L ] [ -D defaults ] name linkname DESCRIPTION The nisln command links an NIS+ object named name to an NIS+ name linkname. If name is an indexed name (see nismatch (1)), the link points to entries within an NIS+ table. Clients wishing to look up information in the name service can use the FOLLOW_LINKS flag to force the client library to follow links to the name they point to.
nisln(1) nisln(1) WARNINGS HP-UX 11i Version 2 is the last HP-UX release on which NIS+ is supported. LDAP is the recommended replacement for NIS+. HP fully supports the industry standard naming services based on LDAP. AUTHOR nisln was developed by Sun Microsystems, Inc. SEE ALSO nisdefaults(1), nismatch(1), nisrm(1), nistbladm(1), nis_names(3N), nis_tables(3N).
nisls(1) nisls(1) NAME nisls - list the contents of an NIS+ directory SYNOPSIS nisls [ -dglLmMR ] [ name . . . ] DESCRIPTION For each name that is an NIS+ directory, nisls lists the contents of the directory. For each name that is an NIS+ object other than a directory, nisls simply echos the name. If no name is specified, the first directory in the search path (see nisdefaults (1)) is listed. Options -d Treat NIS+ directories like other NIS+ objects, rather than listing their contents.
nismatch(1) nismatch(1) NAME nismatch, nisgrep - utilities for searching NIS+ tables SYNOPSIS nismatch [ -AchMoPv ] key tablename nismatch [ -AchMoPv ] colname =key. . . tablename nismatch [ -AchMoPv ] indexedname nisgrep [ -AchMov ] keypat tablename nisgrep [ -AchMov ] colname =keypat . . . tablename DESCRIPTION nismatch and nisgrep can be used to search NIS+ tables.
nismatch(1) nismatch(1) nisgrep ’shell=[ck]sh’ passwd.org_dir.zotz.com. EXTERNAL INFLUENCES Environment Variables NIS_PATH If this variable is set and the NIS+ table name is not fully qualified, each directory specified will be searched until the table is found (see nisdefaults (1)). WARNINGS HP-UX 11i Version 2 is the last HP-UX release on which NIS+ is supported. LDAP is the recommended replacement for NIS+. HP fully supports the industry standard naming services based on LDAP.
nismkdir(1) nismkdir(1) NAME nismkdir - create NIS+ directories SYNOPSIS nismkdir [ -D defaults ] [ -m hostname | -s hostname ] dirname DESCRIPTION The nismkdir command creates new NIS+ subdirectories within an existing domain. It can also be used to create replicated directories. Without options, this command will create a subdirectory with the same master and the replicas as its parent directory.
nismkdir(1) nismkdir(1) Create a new directory bar.foo.com. that is not replicated under the foo.com. domain: nismkdir -m myhost.foo.com. bar.foo.com. Add a replica server of the bar.foo.com. directory: nismkdir -s replica.foo.com. bar.foo.com. EXTERNAL INFLUENCES Environment Variables NIS_DEFAULTS This variable contains a defaults string that will override the NIS+ standard defaults. If the -D switch is used, those values will then override both the NIS_DEFAULTS variable and the standard defaults.
nispasswd(1) nispasswd(1) NAME nispasswd - change NIS+ password information SYNOPSIS nispasswd [ -ghs ] [ -D domainname ] [ username ] nispasswd -a nispasswd -D domainname ] [ -d [ username ] ] nispasswd [ -l ] [ -f ] [ -n min ] [ -x max ] [ -w warn ] [ -D domainname ] username DESCRIPTION nispasswd changes a password, gecos (finger) field (-goption), home directory (-hoption), or login shell (-soption) associated with the username (invoker by default) in the NIS+ passwd table.
nispasswd(1) nispasswd(1) mm/dd/yy The date password was last changed for username. (Note that all password aging dates are determined using Greenwich Mean Time and, therefore, may differ by as much as a day in other time zones.) min The minimum number of days required between password changes for username. max The maximum number of days the password is valid for username. warn The number of days relative to max before the password expires that the username will be warned.
nispasswd(1) 7 nispasswd(1) Aging is disabled. WARNINGS HP-UX 11i Version 2 is the last HP-UX release on which NIS+ is supported. LDAP is the recommended replacement for NIS+. HP fully supports the industry standard naming services based on LDAP. AUTHOR nispasswd was developed by Sun Microsystems, Inc. SEE ALSO keylogin(1), login(1), nis+(1), nistbladm(1), passwd(1), domainname(1), getpwent(3C), nsswitch.conf(4), passwd(4).
nisrm(1) nisrm(1) NAME nisrm - remove NIS+ objects from the namespace SYNOPSIS nisrm [ -if ] name . . . DESCRIPTION The nisrm command removes NIS+ objects named name from the NIS+ namespace. This command will fail if the NIS+ master server is not running. Options -i Interactive mode. Like the system rm(1) command, the nisrm command will ask for confirmation prior to removing an object. If the name specified by name is a non-fully qualified name, this option is forced on.
nisrmdir(1) nisrmdir(1) NAME nisrmdir - remove NIS+ directories SYNOPSIS nisrmdir [ -if ] [ -s hostname ] dirname DESCRIPTION nisrmdir deletes existing NIS+ subdirectories. It can remove a directory outright, or simply remove replicas from serving a directory. This command modifies the object that describes the directory dirname , and then notifies each replica to remove the directory named dirname.
nistbladm(1) nistbladm(1) NAME nistbladm - NIS+ table administration command SYNOPSIS nistbladm -a | -A [ -D defaults ] colname =value . . . tablename nistbladm -a | -A [ -D defaults ] indexedname nistbladm -c [ -D defaults ] [ -p path ] [ -s sep ] type colname =[flags][,access ] . . . tablename nistbladm -d tablename nistbladm -e | -E colname =value . . . indexedname nistbladm -m colname =value . . . indexedname nistbladm -r | -R [ colname =value . . .
nistbladm(1) nistbladm(1) already exists. This is analogous to a modify operation on the entry. -c Create a table named tablename in the namespace. The table that is created must have at least one column and at least one column must be searchable. -d tablename Destroy the table named tablename . The table that is being destroyed must be empty. The table’s contents can be deleted with the -R option below. -e |E Edit the entry in the table that is specified by indexdname .
nistbladm(1) nistbladm(1) fully qualified. -s sep When creating or updating a table, this option specifies the table’s separator character. The separator character is used by niscat (1) when displaying tables on the standard output. Its purpose is to separate column data when the table is in ASCII form. The default value is a space. -t type When updating a table, this option specifies the table’s type string. RETURN VALUE This example returns 0 on success and 1 on failure.
nistbladm(1) nistbladm(1) Note that [name=bob],hobbies is an indexed name, and that the characters ‘[’ (open bracket) and ‘]’ (close bracket) are interpreted by the shell. When typing entry names in the form of NIS+ indexed names, the name must be protected by using single quotes. It is possible to specify a set of defaults such that you cannot read or modify the table object later. HP-UX 11i Version 2 is the last HP-UX release on which NIS+ is supported. LDAP is the recommended replacement for NIS+.
nistest(1) nistest(1) NAME nistest - return the state of the NIS+ namespace using a conditional expression SYNOPSIS nistest [ -ALMP ] [ -a rights | -t type ] object nistest [ -ALMP ] [ -a rights ] indexedname DESCRIPTION nistest provides a way for shell scripts and other programs to test for the existence, type, and access rights of objects and entries. Entries are named using indexed names (see nismatch (1)). Options -A All data.
nistest(1) nistest(1) WARNINGS HP-UX 11i Version 2 is the last HP-UX release on which NIS+ is supported. LDAP is the recommended replacement for NIS+. HP fully supports the industry standard naming services based on LDAP. AUTHOR nistest was developed by Sun Microsystems, Inc. SEE ALSO nis+(1), nischmod(1), nisdefaults(1).
nl(1) nl(1) NAME nl - line numbering filter SYNOPSIS nl [-btype ] [-htype ] [-ftype ] [-p] [-vstart# ] [-iincr ] [-ssep ] [-wwidth ] [-nformat ] [-lnum ] [-ddelim ] [ file ] DESCRIPTION nl reads lines from the named file or the standard input if no file is named and reproduces the lines on the standard output. Lines are numbered on the left in accordance with the command options in effect. nl views the text it reads in terms of logical pages. Line numbering is reset at the start of each logical page.
nl(1) nl(1) character is entered, the second character remains the default character (:). No space should appear between the -d and the delimiter characters, however, this restriction is not there for XPG4 compliant nl. To define a backslash as the delimiter, use two backslashes. EXTERNAL INFLUENCES Environment Variables LC_COLLATE determines the collating sequence used in evaluating regular expressions. LC_CTYPE determines the characters matched by character class expressions in regular expressions.
nljust(1) nljust(1) NAME nljust - justify lines, left or right, for printing SYNOPSIS nljust [-acilnt] [-d digits ] [-e seq ] [-j just ] [-m mode ] [-o order ] [-r margin ] [-w width ] [-x ck ] [ file ... ] DESCRIPTION nljust formats for printing data written in languages with a right-to-left orientation. It is designed to be used with the pr and the lp commands (see pr (1) and lp (1)).
nljust(1) nljust(1) must be given. -r margin Designate a number as the print margin . The print margin is the column where truncation or folding takes place. The print margin determines how many characters appear on a single line and can never exceed the print width. The print margin is relative to the justification. If the print margin is 80, folding or truncation occurs at column 80 starting from the right during a right justification.
nm(1) nm(1) NAME nm - print name list of common object file SYNOPSIS /usr/ccs/bin/nm [-ACefghlnNqrsTuUvV] [-d-o-x] [-p-P] [-t format ] file ... DESCRIPTION The nm command displays the symbol table of each object file, file . There are three general output formats: the default (neither -p nor -P specified), -p specified, and -P specified. The output formats are described after the "Options" subsection. By default, nm prints the entire name of the symbols listed.
nm(1) nm(1) -r Prefix each output line with the name of the object file or archive, file . Equivalent to -A. -q (SOM only) Silence some warning messages. -s Print the section index instead of the section name (ELF only). -t format Display each numeric value in the specified format. format can be one of: d Display the value and size of a symbol in decimal. This is the default for the default format or the -p format. Equivalent to -d. o Display the value and size of a symbol in octal.
nm(1) nm(1) name The name of the symbol. value Its value expressed as an offset or an address depending on its storage class. scope The scope of the symbol (external, sdef, static, or undefined). The sdef scope indicates an external symbol that is flagged as a secondary definition. type The type of the symbol (absolute, arg_ext, code, data, entry, milli_ext, millicode, module, null, oct_dis, plabel, pri_prog, sec_prog, storage, stub, sym_ext, tstor).
nm(1) nm(1) "%s[%s]:\n", file, object-file EXTERNAL INFLUENCES Environment Variables The following internationalization variables affect the execution of nm: LANG determines the locale category for native language, local customs and coded character set in the absence of LC_ALL or other LC_* environment variables. If LANG is not specified or is null, it defaults to C (see lang (5)).
nohup(1) nohup(1) NAME nohup - run a command immune to hangups SYNOPSIS nohup command [ arguments ] DESCRIPTION nohup executes command with hangups and quits ignored. If output is not redirected by the user, both standard output and standard error are sent to nohup.out. If nohup.out is not writable in the current directory, output is redirected to $HOME/nohup.out; otherwise, nohup fails. If a file is created, the file’s permission bits will be set to S_IRUSR | S_IWUSR.
nohup(1) 127 nohup(1) An error occurred in the nohup utility or the specified command could not be found Otherwise, the exit status of nohup will be that of the command specified. SEE ALSO chmod(1), nice(1), sh(1), signal(5). STANDARDS CONFORMANCE nohup: SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
nroff(1) nroff(1) NAME nroff - format text SYNOPSIS nroff [ options ] file ... DESCRIPTION nroff is a text formatting program that interprets source text contained in file and prepares it for printing on typewriter-like devices and line printers. If file name is - or not specified, standard input is used as source text.
nroff(1) nroff(1) 832 X 2631 klp lj for the Anderson Jacobson 832 for a (generic) EBCDIC printer for the Hewlett-Packard 2631 line printer for a (generic) 16-bit character printer having ratio of 2 to 3 in 8-bit and 16-bit character width for Hewlett-Packard PCL3 and newer laser printers. -e Produce equally-spaced words in adjusted lines, using the full resolution of the particular terminal. -h Use output tabs during horizontal spacing to speed output and reduce output character count.
nslookup(1) nslookup(1) NAME nslookup - query name servers interactively SYNOPSIS nslookup [-option]... host-to-find [server ] nslookup [-option]... [- [server ] ] DESCRIPTION nslookup is a program to query Internet domain name servers. nslookup has been extended to follow the configured name resolution algorithm of the host and to query NIS, as well as, DNS and host tables. Both an interactive and noninteractive mode are available with nslookup.
nslookup(1) nslookup(1) server domain lserver domain Change the default server to domain . lserver uses the initial server to look up information about domain while server uses the current default server. When server is used while the current name service being pointed to is either NIS or /etc/hosts, then the switch policy will be overridden until a reset is issued. root Changes the default server to the server for the root of the domain name space. Currently, the host ns.nic.ddn.
nslookup(1) nslookup(1) cl[ass]=value Change the query class to one of: IN the Internet class. CHAOS the Chaos class. HESIOD the MIT Athena Hesiod class. ANY wildcard (any of the above). The class specifies the protocol group of the information. (Default = IN) [no]deb[ug] Turn debugging mode on. More information is printed about the packet sent to the server and the resulting answer. (Default = nodebug) [no]d2 Turn exhaustive debugging mode on. Essentially all fields of every packet are printed.
nslookup(1) nslookup(1) [no]rec[urse] Tell the name server to query other servers if it does not have the information. (Default = recurse) ret[ry]=number Set the number of retries to number. When a reply to a request is not received within a certain amount of time (changed with set timeout), the timeout period is doubled and the request is resent. The retry value controls how many times a request is resent before giving up. (Default = 4) ro[ot]=host Change the name of the root server to host .
nslookup(1) nslookup(1) Server failure The name server found an internal inconsistency in its database and could not return a valid answer. Refused The name server refused to service the request. Format error The name server found that the request packet was not in the proper format. AUTHOR nslookup was developed by the University of California, Berkeley. FILES /etc/resolv.conf Initial domain name and name server addresses $HOME/.
nsquery(1) nsquery(1) NAME nsquery - query the Name Service Switch backend libraries SYNOPSIS nsquery lookup_type lookup_query [lookup_policy] DESCRIPTION nsquery is used to find the Name Service that returned the response to a gethostbyname(), gethostbyaddr(), getpwnam(), getpwuid(), getgrnam(), or getgrgid() function call. This application is Name Service Switch aware and follows the lookup policies in /etc/nsswitch.conf.
nsupdate(1) nsupdate(1) NAME nsupdate - Dynamic DNS update utility SYNOPSIS nsupdate [-d] [-v] [-y keyname:secret | -k keyfile ] DESCRIPTION nsupdate is used to submit Dynamic DNS Update requests as defined in RFC2136 to a name server. This allows resource records to be added or removed from a zone without manually editing the zone file. A single update request can contain requests to add or remove more than one resource record.
nsupdate(1) nsupdate(1) server servername port Sends all dynamic update requests to the name server servername . When no server statement is provided, nsupdate will send updates to the master server of the correct zone. The MNAME field of that zone’s SOA record will identify the master server for that zone. port is the port number on servername where the dynamic update requests get sent. If no port number is specified, the default DNS port number of 53 is used.
nsupdate(1) nsupdate(1) Any A records for oldhost.example.com are deleted. An A record for newhost.example.com with IP address 172.16.1.1 is added. The newly-added record has a 1 day TTL (86400 seconds) # nsupdate > prereq nxdomain nickname.example.com > update add nickname.example.com CNAME somehost.example.com > The prerequisite condition gets the name server to check that there are no resource records of any type for nickname.example.com. If there are, the update request fails.
od(1) od(1) NAME od, xd - octal and hexadecimal dump SYNOPSIS od [-v] [-A address_base ] [-j skip ] [-N count ] [-t type_string ] ... [ file ... ] xd [-v] [-A address_base ] [-j skip ] [-N count ] [-t type_string ] ... [ file ... ] Supported Pre-POSIX Usage od [-bcdosx] [ file ] [ [+] [0x]offset[.] [b] ] xd [-bcdosx] [ file ] [ [+] [0x]offset[.] [b] ] DESCRIPTION od and xd concatenate one or more input file s and write their contents to standard output in a userspecified format.
od(1) od(1) the order in which the type specification characters appear. -v Write all input data. Without the -v option, any number of groups of output lines, that would be identical to the immediately preceding group of output lines (except for the byte offsets), are replaced with a line containing only an asterisk (*). file Pathname of one or more input files to be processed. If file is not specified, the standard input is used. Input files can be any file type.
od(1) od(1) • When one or more of the -A, -j, -N, or -t options is specified, an operand starting with the first character as a plus-sign (+) or the first character as numeric is interpreted as a file name. (XPG4 only. Multiple types can be specified by using multiple -bcdox options. Output lines are written for each type specified in the order in which the types are specified.
odump(1) odump(1) (PA-RISC System Only) NAME odump - dump information contained in SOM object files SYNOPSIS odump [-option ...] file ... DESCRIPTION odump takes one or more 32-bit native code files (object files, shared and archive libraries, executables) and dumps information about them. Note: odump skips non-SOM input files and issues a warning. $ odump -all /usr/lib/pa20_64/libc.sl File is not a SOM, skipping: /usr/lib/pa20_64/libc.sl.
odump(1) odump(1) (PA-RISC System Only) V - - - -nclist -octoutput -recover -silent V - - -sldatalinktbl -sldlexporthash V V - - -sldlheader -sldlheaderext V - - -sldlimporthash V - - -sldlplabelhash V - - -sldynamrel V V V - T - -slexportext -slexportlist -slfastbind -slfbdynamrel -slfbhdr -slfbimpexp -slfblibver -slfbmodbound -slhashtbl -slimportlist -slliblist - - - -sllibloadlist V V T - - -sllibsearch -slmodule -slmoduledyn V - - -slmoduleimp - - - -slprocl
odump(1) odump(1) (PA-RISC System Only) V - T - - -toolcompmap -toolsubspmap -unwind -usage -verbose # - - - -verify - - - -verifyall - - - -version Print the linker compilation unit map Print the linker subspace map Print the stack unwind table Print the help screen Set verbosity level for tables that follow, 0=default Verify correctness of tables before they are printed Verify correctness of tables that have verify support Print date of current version RETURN VALUE odump exits with one
odump(1) odump(1) (PA-RISC System Only) AUTHOR odump was developed by HP. SEE ALSO System Tools ld(1) Miscellaneous a.
on(1) on(1) NAME on - execute command on remote host with environment similar to local SYNOPSIS on [-i -n] [-d] host [ command [ argument ] ... ] DESCRIPTION on executes a command on a remote host, using an environment similar to that of the invoking user where: host specifies the name of the host on which to execute the command. command specifies the command to execute on host If command is not specified, on starts a shell on host . argument ... is a list of arguments for command.
on(1) on(1) on: standard input (stdin) is not a tty The standard input (stdin) of the on command with the -i option is not a tty device. on server : rexd: message Errors that occur on the server server are propagated back to the client. These messages are documented in the DIAGNOSTICS section of rexd (1M). AUTHOR on was developed by Sun Microsystems, Inc. SEE ALSO exports(4), rexd(1M).
pack(1) pack(1) NAME pack, pcat, unpack - compress and expand files SYNOPSIS pack [-] [-f] name ... pcat name ... unpack name ... DESCRIPTION pack attempts to store the specified files in a compressed form. Wherever possible, each input file name is replaced by a packed file name .z with the same ownership, modes, and access and modification times. The -f option forces packing of name. This is useful for causing an entire directory to be packed even if some of the files do not benefit.
pack(1) pack(1) unpack expands files created by pack. For each file name specified in the command, a search is made for a file called name .z (or just name if name ends in .z). If this file appears to be a packed file, it is replaced by its expanded version. The new file has the .z suffix stripped from its name, and has the same access modes, access and modification dates, and owner as those of the packed file. unpack returns a value that is the number of files it was unable to unpack.
parstatus(1) parstatus(1) NAME parstatus - display information about a hardware partitionable complex SYNOPSIS parstatus [ -u username :[passwd ] -h IPaddress|hostname | -g [passwd ] -h IPaddress|hostname ] parstatus -s [ -u username :[passwd ] -h IPaddress|hostname | -g [passwd ] -h IPaddress|hostname ] parstatus -w [ -u username :[passwd ] -h IPaddress|hostname] parstatus -X [ -u username :[passwd ] -h IPaddress|hostname | -g [passwd ] -h IPaddress|hostname ] parstatus -C|-I [-A] [-M] [ -u username :[p
parstatus(1) parstatus(1) Note: This command is a Web-Based Enterprise Management (WBEM) Client Application. The -u option accesses the target partition using a Secure Sockets Layer (SSL) connection. If errors are reported, check that the conditions described in the DEPENDENCIES section are satisfied. SECURITY WARNING: Specifying the password directly on the command line may pose a security risk in your environment.
parstatus(1) parstatus(1) * Details of memory on the cell * Memory interleaving / local memory settings -M Produce a machine readable/parseable output, or restrict the output of the -w option to a partition number. The machine readable output will have the columns separated by a single colon character (:) and will not have a column header. -C Show information for all cells in the complex. Note : The parstatus command displays the maximum CPU count that is supported by the cell hardware.
parstatus(1) parstatus(1) cab0,bay1,chassis1 cab0,bay1,chassis2 cab0,bay1,chassis3 Active Absent Inactive yes yes cab0,cell6 1 cab0,cell2 1 Example 2 The following example displays information for all major components that are physically present in the local complex. No action is specified for the command; the default behaviour is to display all.
parstatus(1) parstatus(1) cab0,bay1,chassis0 cab0,bay1,chassis1 cab0,bay1,chassis2 cab0,bay1,chassis3 [Partition] Par Num Status === ============ 0 Active 1 Active 2 Active Absent Active Absent Inactive # of Cells ===== 2 3 2 # of I/O Chassis ======== 1 2 1 yes yes cab0,cell6 cab0,cell2 Core cell ========== cab0,cell0 cab0,cell6 cab0,cell4 1 1 Partition Name (first 30 chars) =============================== cup2000 cup2006 cup2004 DEPENDENCIES This command uses the Web-Based Enterprise Management
passwd(1) passwd(1) NAME passwd - change login password and associated attributes SYNOPSIS passwd [name] passwd -r files [-F file] [name] passwd -r files [-e [shell ] ] [-gh] [name] passwd -r files -s [-a] passwd -r files -s [name] passwd -r files [-d-l] [-f] [-n min] [-w warn] [-x max] name passwd -r nis [-e [shell ] ] [-gh] [name] passwd -r nisplus [-e [shell ] ] [-gh] [-D domain ] [name] passwd -r nisplus -s [-a] passwd -r nisplus -s [-D domain ] [name] passwd -r nisplus [-l] [-f] [-n min] [-w warn]
passwd(1) passwd(1) -g Change the gecos information in the password file, which is used by the finger command. The user is prompted for each subfield: name, location, work phone, and home phone. -r repository Specify the repository to which the operation is to be applied. Supported repositories include files, nis, nisplus, and dce. If repository is not specified, the default is files. -s name Display some password attributes associated with the specified name.
passwd(1) passwd(1) forced to change the password before using the account. The -n min and -x max arguments are each represented in units of days. These arguments are rounded up to the nearest week on a standard system. If only one of the two arguments is supplied and the other argument does not exist, then the number of days is set to zero. Default values may be set in the /etc/default/security file for the -n min, -x max, and -w warn options. See security (4).
passwd(1) passwd(1) A Smart Card account can be shared among users. If one user modifies the password, other users must use the scsync command to write the new password onto their cards. The scpin command is used to change the Smart Card PIN. SECURITY FEATURES This section applies only to trusted systems. It describes additional capabilities and restrictions. When passwd is invoked on a trusted system, the existing password is requested (if one is present).
passwd(1) passwd(1) WARNINGS Avoid password characters which have special meaning to the tty driver, such as # (erase) and @ (kill). You may not be able to login with these characters. Multiple superusers are allowed, but are strongly discouraged. That is because the system often stores user ID rather than user name. Having unique IDs for all users will guarantee a consistent mapping between user name and user ID. FILES /etc/passwd /etc/shadow /tcb/files/auth/*/* /etc/nsswitch.
paste(1) paste(1) NAME paste - merge same lines of several files or subsequent lines of one file SYNOPSIS paste file1 file2 ... paste -d list file1 file2 ... paste -s [-d list ] file1 file2 ... DESCRIPTION In the first two forms, paste concatenates corresponding lines of the given input files file1 , file2 , etc. It treats each file as a column or columns in a table and pastes them together horizontally (parallel merging).
paste(1) paste(1) ls | paste -d" " List directory in four columns ls | paste - - - Combine pairs of lines into lines paste -s -d"\t\n" file Notes pr -t -m... works similarly, but creates extra blanks, tabs and new-lines for a nice page layout. DIAGNOSTICS too many files Except for the -s option, no more than OPEN_MAX − 3 input files can be specified (see limits (5)). AUTHOR paste was developed by OSF and HP. SEE ALSO cut(1), grep(1), pr(1).
patch(1) patch(1) NAME patch - program for applying a diff file to an original SYNOPSIS Non-XPG4 version patch [options ] orig patchfile [+ [options ] orig ] patch
patch(1) patch(1) Additionally, if the leading garbage contains a Prereq: line, patch will take the first word from the prerequisites line (normally a version number) and check the input file to see if that word can be found. If not, patch will ask for confirmation before proceeding. The upshot of all this is that you should be able to say, while in a news interface, the following: | patch -d /usr/src/local/blurfl and patch a file in the blurfl directory directly from the article containing the patch.
patch(1) patch(1) versions of the file being written to the output file. -p number sets the path name strip count, which controls how path names found in the patch file are treated, in case the you keep your files in a different directory from the person who sent out the patch. The strip count specifies how many slashes are to be stripped from the front of the path name. (Any intervening directory names also go away.) For example, if the file name in the patch file is /u/howard/src/blurfl/blurfl.
patch(1) patch(1) EXTERNAL INFLUENCES Environment Variables UNIX95 determines which version of patch is used. If this variable is set, patch exhibits XPG4 behavior. RETURN VALUE The following exit values are returned for the XPG4 version: 0 1 >1 Successful completion. One or more lines were written to a reject file. An error occurred. For the non-XPG4 version, exit values vary as follows: 0 1 Successful completion or one or more lines were written to a reject file. An error occurred.
pathalias(1) pathalias(1) NAME pathalias - electronic address router SYNOPSIS pathalias [-ivcDf] [-l host ] [-d link ] [-t link ] [files ] DESCRIPTION pathalias computes the shortest paths and corresponding routes from one host (computer system) to all other known, reachable hosts. pathalias reads host-to-host connectivity information on standard input or in the named files , and writes a list of host-route pairs on the standard output.
pathalias(1) pathalias(1) polls every evening, the cost is DIRECT, not DIRECT+EVENING. Some examples: down princeton topaz princeton!(DEDICATED), tilt, %thrash(LOCAL) topaz!(DEMAND+LOW) @rutgers(LOCAL+1) If a link is encountered more than once, the least-cost occurrence dictates the cost and network character. Links are treated as bidirectional but asymmetric: for each link declared in the input, a DEAD reverse link is assumed.
pathalias(1) pathalias(1) If no cost is given, a default of 4000 is used. Input from compressed (and uncompressed) files can be piped into pathalias with the following script. for i in $*; do case $i in *.Z) echo "file {‘expr $i : ’\(.*\).
pathalias(1) pathalias(1) -g file Dump graph edges into file in the form host >host for simple connections and host @host for network connections (from hosts to networks only). -s file Dump shortest path tree into file in the form host&[ @]host[!](cost ), including both connections from hosts to networks and from networks to hosts. This data may be useful for generating lists of one-way connections. WARNINGS The -i option should be the default. The order of arguments is significant.
pathchk(1) pathchk(1) NAME pathchk - check path names SYNOPSIS pathchk [-p] pathname ... DESCRIPTION The pathchk command checks that one or more path names are valid and portable. By default, the pathchk command checks each component of each path name specified by the pathname parameter based on the underlying file system. An error message is written for each path name operand that: • • • • is longer than that allowed by the system. contains any component longer than that allowed by the system.
pax(1) pax(1) NAME pax - Extracts, writes, and lists archive files; copies files and directory hierarchies SYNOPSIS Listing Member Files of Archived Files pax [-cdnv] [-f archive ] [-s replstr ] ... [ pattern ... ] Extracting Archive Files pax -r [-cdiknuvy] [-f archive ] [-p string ] ... [-s replstr ] ... [ pattern ... ] Writing Archive Files pax -w [-adituvXy] [-b blocking ] [-f archive ] [-s replstr ] ... [-x format ] [ file ... ] Copying Files pax -r -w [-diklntuvXy] [-p string ] ... [-s replstr ] ..
pax(1) pax(1) -k Prevents the pax command from writing over existing files. -l Links files when copying files. When both -r and -w are specified, hard links are established between the source and destination file hierarchies whenever possible. -n Selects the first archive member that matches each pattern argument. No more than one archive member is matched for each pattern (although members of type directory will still match the file hierarchy rooted at that file).
pax(1) pax(1) -v Writes information about the process. If neither the -r or -w flags are specified, the -v flag produces a verbose table of contents that resembles the output of ls -l; otherwise, archive-member pathnames are written to standard error. -w Writes files to the standard output in the specified archive format. -x format Specifies the output archive format. The pax command recognizes the following formats: cpio Extended cpio interchange format.
pax(1) pax(1) the -c, -d, -f, -n, -s, and -v flags, and a pattern argument. The access and modification times of the extracted files are the same as the archived files. The access permissions of the extracted files remain as archived unless affected by the user’s default file creation mode. The S_ISUID and S_ISGID bits of the extracted files are cleared.
pax(1) pax(1) (cd /fromdir;find . -print) | cpio -pdlum /todir pax -rwl /fromdir /todir tar cf archive * pax -w -f archive * tar xfv - < archive pax -rv < archive (cd /fromdir; tar cf - . ) | (cd /todir; tar xf -) pax -rw /fromdir /todir Notes When you use the -i flag (interactively renames files) on files to which there are hard links, pax does not create hard links to the renamed files.
pg(1) pg(1) NAME pg - file perusal filter for soft-copy terminals SYNOPSIS pg [-number ] [-pstring ] [-cefnrs ] [+linenumber ] [+/ pattern ] [ file ... ] Remarks pg and more are both used in similar situations (see more(1)). Text highlighting features supported by more are not available from pg. However, pg has some useful features not provided by more. DESCRIPTION pg is a text file filter that allows the examination of files one screenful at a time on a soft-copy terminal.
pg(1) pg(1) pages or lines, depending on the command. A signed address specifies a point relative to the current page or line; an unsigned address specifies an address relative to the beginning of the file. Each command has a default address that is used if none is provided. Perusal commands and their defaults are as follows: (+1) or Displays one page. The address is specified in pages.
pg(1) pg(1) If the standard output is not a terminal, pg is functionally equivalent to cat (see cat (1)), except that a header is printed before each file if more than one file is specified. EXTERNAL INFLUENCES Environment Variables LC_COLLATE determines the collating sequence used in evaluating regular expressions. LC_CTYPE determines the interpretation of text as single and/or multi-byte characters, and the characters matched by character class expressions in regular expressions.
pipcrm(1) pipcrm(1) NAME pipcrm - remove a POSIX message queue or a POSIX named semaphore SYNOPSIS pipcrm [option ]... DESCRIPTION The pipcrm command removes one or more specified POSIX message queue or POSIX named semaphore. Options The identifiers are specified by the following option s: -q msqname Unlinks the queue name from the message queue specified by the argument, msqname. If there are no processes with existing open descriptors for the message queue, the queue is destroyed.
pipcs(1) pipcs(1) NAME pipcs - report status of POSIX interprocess communication facilities SYNOPSIS pipcs [-qs] [-abo] DESCRIPTION pipcs displays certain information on active POSIX interprocess communication facilities. When no options are specified, pipcs displays information in short format for the POSIX message queues and POSIX named semaphores that are currently active in the system. Options The following options restrict the display to the corresponding facilities.
pipcs(1) pipcs(1) MNUM The maximum number of messages allowed on the associated POSIX message queue. QBYTES The maximum number of bytes allowed in messages outstanding on the associated POSIX message queue. VAL The current value on the associated POSIX named semaphore. IVAL The initial value hold on the associated POSIX named semaphore.
pppd(1) pppd(1) NAME pppd - PPP point to point protocal daemon SYNOPSIS pppd [options ]... DESCRIPTION pppd is a daemon process used in UNIX systems to manage connections to other hosts using PPP (Point to Point Protocol) or SLIP (Serial Line Internet Protocol). It uses the UNIX host’s native serial ports. It communicates with the UNIX kernel’s own TCP/IP implementation via the HP IP tunnel driver. The functionality supplied by this daemon supersedes that provided by ppl (1) in HP-UX prior to Release 10.
pppd(1) pppd(1) 9 Characters read or written 10 Procedure call messages 11 Internal timers exec exec-cmd Run exec-cmd up addr args when the link comes up, and exec-cmd down addr args when it goes down. Addr is the IP address of the peer, and args is the list of arguments given to pppd. exec6 exec-cmd Run IC exec-cmd " up " "interface-id args" when the link comes up, and execcmd down interface-id args when it goes down.
pppd(1) pppd(1) Link Management Options nooptions Disable all LCP and IPCP options. A noaccomp Disable HDLC Address and Control Field compression. noprotcomp Disable LCP Protocol Field Compression. slip Use RFC 1055 SLIP packet framing rather than PPP packet framing. Disables all option negotiation, and implies noasyncmap, noipaddress, vjslots 16, novjcid, nomagic, nomru, and mru 1006. Implies vjcomp if peer sends a header-compressed TCP packet.
pppd(1) IP Options local :remote pppd(1) The address of this machine, followed by the expected address for the remote machine. Can be specified either as symbolic names or as literal IP addresses, if their addresses cannot be discovered locally without using the PPP link. Both addresses are optional, but a colon by itself is not valid, and the remote address is required when running as a daemon in "autocall" mode.
pppd(1) pppd(1) rfc1172-addresses Backwards compatibility with older PPP implementations that conform to RFC 1172 section 5.1 (IP-Addresses, IPCP configuration option 1) and not with the newer RFC 1332 (IP-Address, IPCP configuration option 3), but that respond with something besides a Configure-Reject when they receive an IPCP Configure-Request containing an option 3.
pppd(1) pppd(1) frag The packet is a middle or later part of a fragmented IP frame. syn The packet has the TCP SYN bit set. fin The packet has the TCP FIN bit set. bringup The transmitted packet matches the bringup filter and is bringing up the link. !keepup the packet has been rejected by the keepup filter. !pass The packet has been rejected by the pass filter. dial failed The packet was dropped because pppd is waiting for the call retry timer to expire.
pppd(1) pppd(1) (echo -n ’ backbonesystem’) >/dev/console pppd oursystem:backbonesystem ipv6 , auto up /dev/console pppd oursystem:theirsystem auto noipv6 idle 120 (echo -n ’ theirsystem’) >/dev/console pppd oursystem:theirsystem ipv6 , auto idle 120 >/dev/console To allow a PPP implementation running on "theirsystem" to dial into "oursystem", insert the following into /etc/passwd on "oursystem": Pthem
pppoec(1) pppoec(1) NAME pppoec - PPPoE (Point to Point Protocol over Ethernet) client SYNOPSIS pppoec -i interface-name pppoec -i interface-name [-c config-file ] [-d debug-level ] [-l log-file ] [-r retry-number ] DESCRIPTION pppoec discovers an access concentrator that is willing to offer services to the client. It obtains a unique session-id from the selected access concentrator. pppoec then forks a pppd daemon which performs the session phase functionalities of PPPoE as mentioned in RFC 2516.
pr(1) pr(1) NAME pr - print files SYNOPSIS pr [options ] [files ] DESCRIPTION The pr command prints the named files on the standard output. If file is -, or if no files are specified, the standard input is assumed. By default, the listing is separated into pages, each headed by the page number, a date and time, and the name of the file. By default, columns are of equal width, separated by at least one space; lines that do not fit are truncated.
pr(1) pr(1) -r Print no diagnostic reports on failure to open files. -t Print neither the five-line identifying header nor the five-line trailer normally supplied for each page. Quit printing after the last line of each file without spacing to the end of the page. -sc Separate columns by the single character c instead of by the appropriate number of spaces (default for c is a tab).
praliases(1) praliases(1) NAME praliases - print system-wide sendmail aliases SYNOPSIS praliases [ -C file ] [ -f file ] [ key ... ] DESCRIPTION praliases prints out the contents of the alias data base used by sendmail to resolve system-wide mail aliases. The alias data base is built with the command newaliases or /usr/sbin/sendmail -bi. See sendmail (1M). The options are: -C file Read the sendmail configuration file specified with this option instead of the default configuration file.
prealloc(1) prealloc(1) NAME prealloc - preallocate disk storage SYNOPSIS prealloc name size DESCRIPTION prealloc preallocates at least size bytes of disk space for an ordinary file name, creating the file if name does not already exist. The space is allocated in an implementation-dependent fashion for fast sequential reads and writes of the file.
printenv(1) printenv(1) NAME printenv - print out the environment SYNOPSIS printenv [ name ] DESCRIPTION printenv prints out the values of the variables in the environment. If a name is specified, only its value is printed. RETURN VALUE If a name is specified and it is not defined in the environment, printenv returns 1; otherwise it returns zero. SEE ALSO sh(1), environ(5), csh(1).
printf(1) printf(1) NAME printf - format and print arguments SYNOPSIS printf format [ arg ... ] DESCRIPTION printf writes formatted arguments to the standard output. The arg arguments are formatted under control of the format operand. format is a character string patterned after the formatting conventions of printf (3S), and contains the following types of objects: characters Characters that are not escape sequences or conversion specifications (as described below) are copied to standard output.
printf(1) printf(1) followed by a decimal digit string. A null digit string is treated as a zero. conversion characters A conversion character indicates the type of conversion to be applied: A d,i, o,u, x,X The integer argument is printed a signed decimal (d or i), unsigned octal (o), unsigned decimal (u), or unsigned hexadecimal notation (x and X). The x conversion uses the numbers and letters 0123456789abcdef, and the X conversion uses the numbers and letters 0123456789ABCDEF.
printf(1) printf(1) set to the empty string, a default of "C" (see lang (5)) is used instead of LANG. If any internationalization variable contains an invalid setting, printf behaves as if all internationalization variables are set to "C". See environ (5). International Code Set Support Single- and multi-byte character code sets are supported. RETURN VALUE printf exits with one of the following values: 0 >0 Successful completion; Errors occurred.
privatepw(1) privatepw(1) NAME privatepw - Change WU-FTPD Group Access File Information SYNOPSIS /usr/bin/privatepw [-c] [-l] [-V] [ -d accessgroup ] [ -f ftpgroups ] [ -g group accessgroup ] DESCRIPTION If a site supports the SITE GROUP and SITE GPASS commands, it is necessary to be able to add, delete and list enhanced access group information. The privatepw utility is used to update this information in the group access file (/etc/ftpd/ftpgroups).
prmail(1) prmail(1) NAME prmail - print out mail in the incoming mailbox file SYNOPSIS prmail [user ... ] DESCRIPTION prmail prints the mail which waits for you or the specified user in the incoming mailbox file. The mailbox file is not disturbed. prmail is functionally similar to the command: cat /var/mail/mailfile | more or cat /var/mail/mailfile | pg depending upon the setting of the user’s PAGER environment variable AUTHOR prmail was developed by the University of California, Berkeley.
prof(1) prof(1) NAME prof - display profile data SYNOPSIS prof [-tcan] [-ox] [-g] [-z] [-h] [-s] [-m mdata ] [ prog ] DESCRIPTION prof interprets a profile file produced by monitor() (see monitor (3C)). The symbol table in the object file prog (a.out by default) is read and correlated with a profile file (mon.out by default).
prof(1) prof(1) Call counts are always recorded precisely, however. Only programs that call exit() (see exit (2)) or return from main cause a profile file to be produced, unless a final call to monitor() is explicitly coded. The use of the cc -p option to invoke profiling imposes a limit of 600 functions that can have call counters established during program execution. For more counters, call monitor() directly. If this limit is exceeded, other data is overwritten and the mon.out file is corrupted.
prs(1) prs(1) NAME prs - print and summarize an SCCS file SYNOPSIS prs [-d dataspec] [-r [SID] ] [-e] [-l] [-c cutoff] [-a] file ... DESCRIPTION The prs command prints, on the standard output, parts or all of an SCCS file (see sccsfile (4)) in a usersupplied format. If a directory is named, prs behaves as though each file in the directory were specified as a named file, except that non-SCCS files (last component of the path name does not begin with s.), and unreadable files are silently ignored.
prs(1) prs(1) backslash backspace carriage return colon \\ \b \r \: form feed new-line single quote tab \f \n \’ \t The default dataspec is: ":Dt:\t:DL:\nMRs:\n:MR:COMMENTS:\n:C:" A HP-UX 11i Version 2: September 2004 −2− Hewlett-Packard Company Section 1−−757 pA
prs(1) A pA prs(1) Keyword :Dt: :DL: :Li: :Ld: :Lu: :DT: :I: :R: :L: :B: :S: :D: :Dy: :Dm: :Dd: :T: :Th: :Tm: :Ts: :P: :DS: :DP: :DI: :Dn: :Dx: :Dg: :MR: :C: :UN: :FL: :Y: :MF: :MP: :KF: :KV: :BF: :J: :LK: :Q: :M: :FB: :CB: :Ds: :ND: :FD: :BD: :GB: :W: :A: :Z: :F: :PN: SCCS File Data Keywords File Data Item Section Delta information Delta Table Delta line statistics " Lines inserted by Delta " Lines deleted by Delta " Lines unchanged by Delta " Delta type " SCCS ID string (SID) " Release number " Level
prs(1) prs(1) EXTERNAL INFLUENCES Environment Variables LC_CTYPE determines the interpretation of dataspec as single- and/or multi-byte characters. LC_MESSAGES determines the language in which messages are displayed. If LC_CTYPE or LC_MESSAGES is not specified in the environment or is set to the empty string, the value of LANG is used as a default for each unspecified or empty variable. If LANG is not specified or is set to the empty string, a default of "C" (see lang (5)) is used instead of LANG.
ps(1) ps(1) NAME ps - report process status SYNOPSIS ps [-adeflPzx] [-g grplist ] [-p proclist ] [-R prmgrplist ] [-t termlist ] [-u uidlist ] [-Z pset_list ] XPG4 Synopsis ps [-aAcdefHjlPzx] [-C cmdlist ] [-g grplist ] [-G gidlist ] [-n namelist ] [-o format ] [-p proclist ] [-R prmgrplist ] [-s sidlist ] [-t termlist ] [-u uidlist ] [-U uidlist ] [-Z pset_list ] DESCRIPTION ps prints information about selected processes.
ps(1) ps(1) If more than one of -a, -A, -d, and -e are specified, the least restrictive option takes effect. If more than one of the -C, -g, -G, -p, -R, -t, -u, -Z, and -U options are specified, processes will be selected if they match any of the options specified. The lists used as arguments to the -C, -g, -G, -p, -R, -t, -u, -Z, and -U options can be specified in one of two forms: • A list of identifiers separated from one another by a comma.
ps(1) ps(1) cls Process scheduling class, see rtsched (1). comm The command name. The output in this column may contain spaces. The default heading for this column is COMMAND if -o is specified and CMD otherwise. cpu Processor utilization for scheduling. The default heading for this column is C. etime Elapsed time of the process. The default heading for this column is ELAPSED.
ps(1) ps(1) time The cumulative execution time for the process. tty The controlling terminal for the process. The default heading for this column is TT if -o is specified and TTY otherwise. uid The user ID number of the effective process owner. user The login name of the effective process owner. vsz The size in kilobytes (1024 byte units) of the core image of the process. See column sz, above.
ps(1) ps(1) WARNINGS Things can change while ps is running; the picture it gives is only a snapshot in time. Some data printed for defunct processes is irrelevant. If two special files for terminals are located at the same select code, that terminal may be reported with either name. The user can select processes with that terminal using either name.
ptx(1) ptx(1) NAME ptx - permuted index SYNOPSIS ptx [ options ] [ input [ output ] ] DESCRIPTION ptx generates the file output that can be processed with a text formatter to produce a permuted index of file input (standard input and output default). It has three phases: the first does the permutation, generating one line for each keyword in an input line. The keyword is rotated to the front. The permuted file is then sorted (see sort (1) and Environment Variables below).
ptx(1) ptx(1) /usr/share/lib/tmac/tmac.ptx NOTES The mptx macro package is not provided as part of the HP-UX operating system. It is part of the Documenters Work Bench (DWB) software package originally developed by AT&T which has been ported to HP 9000 systems by various third-party software suppliers including Elan Computer Group, Inc. of Mountain View California and others. Permuted indexes produced by using ptx usually have a 4-column format that some users prefer and others dislike greatly.
pwd(1) pwd(1) NAME pwd - working directory name SYNOPSIS pwd DESCRIPTION pwd prints the path name of the working (current) directory. EXTERNAL INFLUENCES Environment Variables LC_MESSAGES determines the language in which messages are displayed. If LC_MESSAGES is not specified in the environment or is set to the empty string, the value of LANG is used as a default for each unspecified or empty variable.
pwget(1) pwget(1) NAME pwget, grget - get password and group information SYNOPSIS pwget [-n name -u uid ] grget [-n name -g gid ] DESCRIPTION pwget and grget locate and display information from /etc/passwd and /etc/group. The standard output of pwget contains lines of colon-separated password information whose format is the same as that used in the /etc/passwd file (see passwd (4)).
quota(1) quota(1) NAME quota - display disk usage and limits SYNOPSIS quota [-v] [user ... ] DESCRIPTION The quota command displays the disk usage and limits for one or more user s. Without the -v option, it displays information only when the usage exceeds the limits. user is a user name or a numeric UID. The default is the login user name. Only users with appropriate privileges can view the limits of other users.
ranlib(1) ranlib(1) NAME ranlib - regenerate archive symbol table SYNOPSIS ranlib archive ... DESCRIPTION ranlib regenerates the symbol tables of the specified archives. It is equivalent to executing ar qs archive on each of the archives. After using the z modifier of ar, the symbol table of an archive must be regenerated before it can be used.
rcp(1) rcp(1) NAME rcp - remote file copy SYNOPSIS Copy Single File rcp [-p] [-S size ] [-R size ] source_file1 dest_file Copy Multiple Files rcp [-p] [-S size ] [-R size ] source_file1 [source_file2 ]... dest_dir Copy One or More Directory Subtrees rcp [-p] [-S size ] [-R size ] -r source_dir1 [source_dir2 ]... dest_dir Copy Files and Directory Subtrees rcp [-p] [-S size ] [-R size ] -r file_or_dir1 [file_or_dir2 ]...
rcp(1) rcp(1) both local and remote systems. Multiple files and directory subtrees can be copied from one or more systems to a single destination directory by using a single command. dest_file This option specifies the name of the destination file. If host name and path name are not specified, then the existing file is copied into a file named dest_file in the current directory on the local system. If dest_file already exists and is writable, then the existing file is overwritten.
rcp(1) rcp(1) hostname Hostname of remote system where directories and files are located. pathname Absolute directory path name or directory path name relative to the login directory of user user_name . filename Actual name of source or destination file. File name expansion is allowed on source file names. dirname Actual name of source or destination directory subtree. File name expansion is allowed on source directory names.
rcp(1) rcp(1) will certainly fail on one of the source systems. Perform such a transfer using two separate commands. With the existing implementation of rcp, the remote copy may result in a system overwrite as described in the following example. rcp -r path root@hostname: / In this example, if you run rcp as root, and unintentionally type a space between the colon (:) and the slash (/), then rcp assumes both path and root@hostname: (the remote machine’s root directory) as source.
rcs(1) rcs(1) NAME rcs - change RCS file attributes SYNOPSIS rcs [options ] file ... DESCRIPTION rcs creates new RCS files or changes attributes of existing ones. An RCS file contains multiple revisions of text, an access list, a change log, descriptive text, and some control attributes. For rcs to work, the user’s login name must be on the access list, except if the access list is empty, if the user is the owner of the file or the superuser, or if the -i option is present.
rcs(1) rcs(1) printed. -l[rev] Locks the revision with number rev . If a branch is given, the latest revision on that branch is locked. If rev is omitted, the latest revision on the trunk is locked. Locking prevents overlapping changes. A lock is removed with ci or rcs -u (see below). -L Sets locking to strict. Strict locking means that the owner of an RCS file is not exempt from locking for check in. This option should be used for files that are shared.
rcs(1) rcs(1) Set the comment leader to tab * for file vision: rcs -c’tab*’ vision Associate the symbolic name sso/6_0 with revision 38.1 of file vision: rcs -Nsso/6_0:38.1 vision Lock revision 38.1 of file vision,v so that only the locker is permitted to check in (see ci (1)) the next revision of the file. This command prevents two or more people from simultaneously revising the same file and inadvertently overwriting each other’s work. rcs -l38.
rcsdiff(1) rcsdiff(1) NAME rcsdiff - compare RCS revisions SYNOPSIS rcsdiff [-bcefhn] [-rrev1 ] [-rrev2 ] file ... DESCRIPTION rcsdiff compares two revisions of each given RCS file and creates output very similar to diff (see diff(1)). A file name ending in ,v is an RCS file name, otherwise it is a working file name. rcsdiff derives the working file name from the RCS file name and vice versa, as explained in rcsintro (5). Pairs consisting of both an RCS and a working file name can also be specified.
rcsmerge(1) rcsmerge(1) NAME rcsmerge - merge RCS revisions SYNOPSIS rcsmerge -rrev1 [-rrev2 ] [-p] file DESCRIPTION rcsmerge incorporates the changes between rev1 and rev2 of an RCS file into the corresponding working file. If -p is given, the result is printed on the standard output; otherwise the result overwrites the working file. A file name ending in ,v is an RCS file name; otherwise it is a working file name.
rdist(1) rdist(1) NAME rdist - remote file distribution program SYNOPSIS rdist [ -bhinqvwyMR ] [ -f distfile ] [ -d var =value ] [ -m host ] [ label... ] rdist [ -bhinqvwyMR ] -c name... [login @]host [:dest] DESCRIPTION rdist facilitates the maintaining of identical copies of files over multiple hosts. It preserves the owner, group, mode, and modification time of files if possible and can update programs that are executing. -f distfile Specify a distfile for rdist to execute.
rdist(1) rdist(1) -b Binary comparison. Perform a binary comparison and update files if they differ rather than comparing dates and sizes. -M Check that mode, ownership, and group are the same in addition to any other form of comparison that is in effect. This option will cause files to be replaced but will only correct the problem with a directory and print a warning message.
rdist(1) rdist(1) The except command is used to update all of the files in the source list, except for the files listed in name_list . This is usually used to copy everything in a directory except certain files. The except_pat command is like the except command except that pattern_list is a list of regular expressions (see ed(1) for details). If one of the patterns matches some string within a file name, that file will be ignored.
rdist(1) rdist(1) install /usr/local/lib ; notify ralph ; ${FILES} :: stamp.cory notify root@cory ; WARNINGS Source files must reside on the local host where rdist is executed. There is no easy way to have a special command executed after all files in a directory have been updated. Variable expansion only works for name lists and in the special command string; there should be a general macro facility. rdist aborts on files that have a negative mtime (before Jan 1, 1970).
read(1) read(1) NAME read - read a line from standard input SYNOPSIS read [-r] var ... DESCRIPTION read reads a single line from standard input. The line is split into fields as when processed by the shell (refer to shells in SEE ALSO); the first field is assigned to the first variable var , the second field to the second variable var , and so forth. If there are more fields than there are specified var operands, the remaining fields and their intervening separators are assigned to the last var .
readmail(1) readmail(1) NAME readmail - read mail from a mail folder or incoming mailbox SYNOPSIS readmail [-ahnp] [-f folder ] [number-list pattern ] DESCRIPTION The readmail program displays messages from your incoming mailbox or a specified mail folder. Within the elm mail system (see elm(1) with no operands and optionally the -h or -n option, readmail displays the appropriate headers and the body of the current message.
readmail(1) readmail(1) FILES /var/mail/loginname $HOME/.elm/readmail Incoming mailbox Temporary file for elm SEE ALSO elm(1), newmail(1), vi(1).
remsh(1) remsh(1) NAME remsh, rexec - execute from a remote shell SYNOPSIS remsh host [-l username ] [-n] command host [-l username ] [-n] command rexec host [-l username ] [-n] command In Kerberos V5 Network Authentication Environments remsh host [-l username ] [-f|-F] [-k realm ] [-P] [-n] command host [-l username ] [-f|-F] [-k realm ] [-P] [-n] command DESCRIPTION remsh connects to a specified host and executes a specified command.
remsh(1) remsh(1) -F Forward the TGT to the remote system and have it forwardable from there to another remote system. The -f option and -F option are mutually exclusive. -k realm Obtain tickets from the remote host in the specified realm instead of the remote host’s default realm as specified in the configuration file krb.realms. -P Disable Kerberos authentication.
remsh(1) remsh(1) remsh otherhost -n "command 1>&- 2>&- &" (See remshd (1M) and sh(1)). If your login shell on the remote system is csh , use the following form instead: remsh otherhost -n "sh -c \"command 1>&- 2>&- &\"" RETURN VALUE If remsh fails to set up the secondary socket connection, it returns 2. If it fails in some other way, it returns 1. If it fully succeeds in setting up a connection with remshd, it returns 0 once the remote command has completed.
rev(1) rev(1) NAME rev - reverse lines of a file SYNOPSIS rev [ file ] ... DESCRIPTION rev copies the named files to the standard output, reversing the order of characters in every line. If no file is specified, the standard input is copied. EXTERNAL INFLUENCES Environment Variables LC_CTYPE determines the interpretation of text as single- and/or multi-byte characters.
rexec(1) rexec(1) NAME remsh, rexec - execute from a remote shell SYNOPSIS remsh host [-l username ] [-n] command host [-l username ] [-n] command rexec host [-l username ] [-n] command In Kerberos V5 Network Authentication Environments: remsh host [-l username ] [-f|-F] [-k realm ] [-P] [-n] command host [-l username ] [-f|-F] [-k realm ] [-P] [-n] command DESCRIPTION remsh connects to a specified host and executes a specified command.
rexec(1) rexec(1) to rlogin. If no command and the option -P are specified, rlogin will be invoked with -P to indicate that Kerberos authentication (or secure access) is not necessary. This means that if a password is requested, the password will be sent in cleartext. If command is specified, options specific to rlogin are ignored by remsh. By default, remsh reads its standard input and sends it to the remote command because remsh has no way to determine whether the remote command requires input.
rexec(1) rexec(1) command has completed. Note that the return value of remsh bears no relation to the return value of the remote command. DIAGNOSTICS Besides the errors listed below, errors can also be generated by the library functions rcmd() and rresvport(). In the case of IPv6 systems, the library functions rcmd() and rresvport() are replaced by rcmd_af() and rresvport_af(); respectively, and can generate errors (see rcmd(3N) and rcmd_af (3N)).
rlog(1) rlog(1) NAME rlog - print log messages and other information on RCS files SYNOPSIS rlog [ options ] file ... DESCRIPTION rlog prints information about RCS files. Files ending in ,v are RCS files; all others are working files. If a working file is given, rlog tries to find the corresponding RCS file first in directory ./RCS, then in the current directory, as explained in rcsintro (5). rlog prints the following information for each RCS file: RCS file name, working file name, head (i.e.
rlog(1) rlog(1) rlog -L -h RCS/*,v Print the headers plus the log messages of the locked revisions: rlog -L -l RCS/*,v Print complete log information: rlog RCS/*,v Print the header and log messages of all revisions checked in after 1:00am on December 25th, 1991: rlog -d">12/25/92, 1:00" RCS/*,v Print the header and log messages of those revisions that were created between 10:00am and 2:00pm on July 4th, 1992: rlog -d"07/04/92, 10:00 > 92/07/04, 14:00" RCS/*,v DIAGNOSTICS The exit status always refers
rlogin(1) rlogin(1) NAME rlogin - remote login SYNOPSIS rlogin rhost [-7] [-8] [-ee] [-l username ] rhost [-7] [-8] [-ee] [-l username ] In Kerberos V5 Network Authentication Environments rlogin rhost [-7] [-8] [-ee] [-f|-F] [-k realm ] [-l username ] [-P] rhost [-7] [-8] [-ee] [-f|-F] [-k realm ] [-l username ] [-P] DESCRIPTION The rlogin command connects your terminal on the local host to the remote host (rhost ). rlogin acts as a virtual terminal to the remote system.
rlogin(1) rlogin(1) characters may conflict with your terminal configuration, such as ˆS, ˆQ, or backspace. Using one of these as the escape character may not be possible or may cause problems communicating with the remote host (see stty (1) and tty (7)). -l username This option can be used to set the user login name on the remote host to username . The default name is the current account name of the user invoking rlogin.
rlogin(1) rlogin(1) Remote Host Name As Command The system administrator can arrange for more convenient access to a remote host (rhost ) by linking remsh to /usr/hosts/rhost, allowing use of the remote host name (rhost ) as a command (see remsh (1)).
rlogin(1) rlogin(1) AUTHOR rlogin was developed by the University of California, Berkeley. FILES $HOME/.rhosts /etc/hosts.equiv /usr/hosts/* User’s private equivalence list List of equivalent hosts For rhost version of the command SEE ALSO csh(1), ksh(1), login(1), remsh(1), sh(1), sh-posix(1), stty(1), telnet(1), rlogind(1M), inetsvcs_sec(1M), hosts(4), hosts.equiv(4), inetd.conf(4), krb5.conf(4), services(4), sis(5), termio(7), tty(7).
rm(1) rm(1) NAME rm - remove files or directories SYNOPSIS rm [-f-i] [-Rr] file ... DESCRIPTION The rm command removes the entries for one or more files from a directory. If an entry was the last link to the file, the file is destroyed. Removal of a file requires write and search (execute) permission in its directory, but no permissions on the file itself.
rm(1) rm(1) LC_CTYPE determines the interpretation of file names as single and/or multi-byte characters, the classification of characters as printable, and the characters matched by character class expressions in regular expressions. LC_MESSAGES determines the locale that should be used to affect the format and contents of diagnostic messages written to standard error and informative messages written to standard output.
rm(1) rm(1) NFS rm does not display a plus sign (+) to indicate the existence of optional access control list entries when asking for confirmation before removing a networked file. SEE ALSO rmdir(1), unlink(2), acl(5). STANDARDS CONFORMANCE rm: SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
rmdel(1) rmdel(1) NAME rmdel - remove a delta from an SCCS file SYNOPSIS rmdel -r SID file ... DESCRIPTION The rmdel command removes the delta specified by the SID from each named SCCS file. The delta to be removed must be the newest (most recent) delta in its branch in the delta chain of each named SCCS file. In addition, the SID specified must not be that of a version being edited for the purpose of making a delta (i.e.
rmdir(1) rmdir(1) NAME rmdir - remove directories SYNOPSIS rmdir [-f|-i] [-p] dir ... DESCRIPTION rmdir removes the directory entry for each dir operand that refers to an empty directory. Directories are removed in the order specified. Consequently, if a directory and a subdirectory of that directory are both specified as arguments, the subdirectory must be specified before the parent directory so that the parent directory will be empty when rmdir tries to remove it.
rmdir(1) rmdir(1) EXAMPLES To remove directories with a prompt for verification: rmdir -i directories To remove as much as possible of a path, type: rmdir -p component1 /component2 /dir SEE ALSO rm(1), rmdir(2), stat(2).
rmnl(1) rmnl(1) NAME rmnl - remove extra new-line characters from file SYNOPSIS rmnl DESCRIPTION rmnl removes all blank lines from a file (except at beginning of file as explained below), and is useful for removing excess white space from files for display on a CRT terminal.
rndc(1) rndc(1) NAME rndc - name server control utility SYNOPSIS rndc [-c config-file ] [-k keyname ] [-m] [-p port# ] [-s server ] [-V] [-y key_id ] command [command... ] DESCRIPTION This command allows the system administrator to control the operation of a name server. If rndc is invoked without any command line options or arguments, it prints a short summary of the supported commands and the available options and their arguments.
rndc(1) rndc(1) configuration file, named.conf. If the dump-file directive is not specified, the cache data is dumped to the named_dump.db file in the directory specified by the directory directive of the options statement in the named.conf configuration file. stop Stop the server. Before stopping the server, any recent changes made through dynamic update or IXFR will be saved to the master files of the updated zones. halt Halt the server immediately.
rndc-confgen(1) rndc-confgen(1) NAME rndc-confgen - rndc key generation tool SYNOPSIS rndc-confgen [-a] [-b keysize ] [-c keyfile ] [-h] [-k keyname ] [-p port ] [-r randomfile ] [-s address ] [-t chrootdir ] [-u user ] DESCRIPTION rndc-confgen can be used to generate rndc.conf, the configuration file for rndc. Alternatively, it can be run with the -a option to set up a rndc.key file and avoid the need for a rndc.conf file and a controls statement altogether.
rndc-confgen(1) rndc-confgen(1) AUTHOR rndc-confgen was developed by the Hewlett-Packard Company. SEE ALSO rndc(1), named(1M), rndc.conf(4), and BIND 9 Administrator Reference Manual.
rpcgen(1) rpcgen(1) NAME rpcgen - an RPC protocol compiler SYNOPSIS rpcgen [-u] infile rpcgen [-a] [-b] [-C] [-Dname[=value] ] [-i size ] [-I [-K seconds ] ] [-L] [-M] [-N] [-T] [-u] [-Y pathname ] infile rpcgen [-c|-h|-l|-m|-t|-Sc|-Ss|-Sm] [-o outfile ] [infile ] rpcgen [-o outfile ] [-s nettype ] [-u] [infile] rpcgen [-n netid ] [-o outfile ] [-u] [infile ] DESCRIPTION rpcgen is a tool that generates C code to implement an RPC protocol.
rpcgen(1) rpcgen(1) must be provided. Providing an undefined data type allows customization of XDR routines. Options -a Generate all files, including sample files. -b Backward compatibility mode. Generate transport specific RPC code for older versions of the operating system. -c Compile into XDR routines. -C Generate header and stub files which can be used with ANSI C compilers. Headers generated with this option can also be used with C++ programs. -Dname[=value] Define a symbol name.
rpcgen(1) -o outfile rpcgen(1) Specify the name of the output file. If none is specified, standard output is used (-c, -h, -l, -m, -n, -s, -Sc, -Sm, -Ss, and -t modes only). -s nettype Compile into server-side stubs for all the transports belonging to the class nettype . The supported classes are netpath, visible, circuit_n, circuit_v, datagram_n, datagram_v, tcp, and udp (see rpc (3N) for the meanings associated with these classes). This option may be specified more than once.
rtprio(1) rtprio(1) NAME rtprio - execute process with real-time priority SYNOPSIS rtprio priority command [ arguments ] rtprio priority -pid rtprio -t command [ arguments ] rtprio -t -pid DESCRIPTION rtprio executes command with a real-time priority, or changes the real-time priority of currently executing process pid . Real-time priorities range from zero (highest) to 127 (lowest).
rtsched(1) rtsched(1) NAME rtsched - execute process with real-time priority SYNOPSIS rtsched -s scheduler -p priority command [ arguments ] rtsched [ -s scheduler ] -p priority -P pid DESCRIPTION Rtsched executes command with POSIX or HP-UX real-time priority, or changes the real-time priority of currently executing process pid . All POSIX real-time priority processes are of greater scheduling importance than processes with HP-UX real-time or HP-UX timeshare priority.
rtsched(1) rtsched(1) 0 if command is successfully scheduled or if pid ’s real-time priority is successfully changed; 1 if command is not executable, pid does not exist, or priority is not within the priority range for the corresponding scheduler; 2 if command (pid ) lacks real-time capability, or the invoker’s effective user ID is not a user who has appropriate privileges, or the real or effective user or the real or effective user ID does not match the real or saved user ID of the process being cha
rup(1) rup(1) NAME rup - show host status of local machines (RPC version) SYNOPSIS rup [-h] [-l] [-t] [host ...] DESCRIPTION rup gives a status similar to uptime for remote machines. It broadcasts on the local network and displays the responses it receives. Though the listing is normally in the order responses are received, the order can be changed by using command-line options. The broadcast process takes about two minutes.
ruptime(1) ruptime(1) NAME ruptime - show status of local machines SYNOPSIS ruptime [-a] [-r] [-l] [-t] [-u] DESCRIPTION ruptime outputs a status line for each machine on the local network that is running the rwho daemon. ruptime’s status lines are formed from packets broadcast once every 3 minutes between rwho daemons (see rwhod(1M)) on each host on the network.
rusers(1) rusers(1) NAME rusers - determine who is logged in on machines on local network SYNOPSIS rusers [-a] [-h] [-i] [-l] [-u] [host ...] DESCRIPTION rusers produces output similar to the "quick" option of who(1), but for remote machines. It broadcasts on the local network and prints the responses it receives. Though the listing is normally in the order that responses are received, the order can be changed by specifying a command-line option. The broadcast process takes about two minutes.
rwho(1) rwho(1) NAME rwho - show who is logged in on local machines SYNOPSIS rwho [-a] DESCRIPTION rwho produces output similar to the output of the HP-UX who command for all machines on the local network that are running the rwho daemon (see who(1) and rwhod(1M)). If rwhod has not received a report from a machine for 11 minutes, rwho assumes the machine is down and rwho does not report users last known to be logged into that machine.
sact(1) sact(1) NAME sact - print current SCCS file editing activity SYNOPSIS sact file ... DESCRIPTION The sact command informs the user of any impending deltas to a named SCCS file. This situation occurs when get -e has been previously executed without a subsequent execution of delta (see delta (1) and get (1)).
samlog_viewer(1) samlog_viewer(1) NAME samlog_viewer - a tool for viewing and saving the SAM logfile SYNOPSIS /usr/sam/bin/samlog_viewer [-s mmddhhmm[[cc]yy]] [-e mmddhhmm[[cc]yy]] [-l SDVC] [-u user ] [-o ofile ] [-t] [-n] [file ] DESCRIPTION The samlog_viewer command enables the viewing of part or all of the SAM logfile (or another file containing data in the same format) at varying levels of detail. This tool is run by SAM whenever the View SAM Log option is chosen.
samlog_viewer(1) samlog_viewer(1) mm Month specified as a two digit number (e.g., 08). dd Day specified as a two digit number. hh Hour specified as a two digit number (24-hour clock form). mm Minute specified as a two digit number. cc Century minus one. cc is optional when specifying the year. yy The last two digits of the desired year. If this is not specified, the current year is used. Note: To specify a year in two digits, the valid ranges are 70-99 (20th century) and 00-37 (21st century).
samlog_viewer(1) samlog_viewer(1) samlog_viewer -s 060508001994 -e 081422001994 -lC -u tom Noninteractively read data from stdin, timestamp it, and save the result in a file called stdin.out: cat datafile | samlog_viewer -t -o stdin.out Do the same as above, but instead have the data appear on stdout: cat datafile | samlog_viewer -t -o - or cat datafile | samlog_viewer -tn FILES A /var/sam/log/samlog SAM logfile. /var/sam/log/samlog.
sccs(1) sccs(1) NAME sccs - front-end utility program for SCCS commands SYNOPSIS sccs [-r] [-d rootpath ] [-p dirpath ] command [options ] [file ]... DESCRIPTION The sccs command is a straightforward front end to the various programs comprising the Source Code Control System. It includes the capability of running set-user-id to another user to allow shared access to the SCCS files. sccs reduces the need to explicitly reference the SCCS file names.
sccs(1) sccs(1) are always run as the real user. Options The options supplied to the SCCS commands are documented in the corresponding SCCS man pages. The options supplied to the pseudo commands are documented in the above section. All other options preceding command are documented as follows: -d rootpath Gives the path name to be used as the root directory for the SCCS files. rootpath defaults to the current directory. This flag takes precedence over the PROJECTDIR environment variable.
sccs(1) sccs(1) sccs -d /usr/src get cmd/cc.c To make a delta of a large number of files in the current directory, enter: sccs delta *.
sccsdiff(1) sccsdiff(1) NAME sccsdiff - compare two versions of an SCCS file SYNOPSIS sccsdiff -rSID1 -rSID2 [-p] [-sn ] file ... DESCRIPTION The sccsdiff command compares two versions of an SCCS file, and generates the differences between the two versions. Any number of SCCS files may be specified, but arguments apply to all files. -rSID? SID1 and SID2 specify the deltas of an SCCS file that are to be compared. Versions are passed to bdiff in the order given (see bdiff(1)).
sccshelp(1) sccshelp(1) NAME sccshelp - ask for help on SCCS commands SYNOPSIS sccshelp [arg] ... DESCRIPTION The sccshelp command finds information to explain a message from an SCCS command or to explain the use of a SCCS command. Zero or more arguments can be supplied.
sccshelp(1) sccshelp(1) cm3: "missing file arg" You left off the name of the file to be processed. WARNINGS Only SCCS commands currently use sccshelp.
script(1) script(1) NAME script - make typescript of terminal session SYNOPSIS script [-a] [ file ] DESCRIPTION script makes a typescript of everything printed on your terminal. It starts a shell named by the SHELL environment variable, or by default /usr/bin/sh, and silently records a copy of output to your terminal from that shell or its descendents, using a pseudo-terminal device (see pty (7)). All output is written to file , or appended to file if the -a option is given.
sdiff(1) sdiff(1) NAME sdiff - side-by-side file difference program SYNOPSIS sdiff [option ]... file1 file2 DESCRIPTION sdiff uses the output of diff(1) with the -b option, which ignores trailing blanks (spaces and tabs) and treats other strings of blanks as equal, to produce a side-by-side listing of two files, indicating those lines that are different.
sed(1) sed(1) NAME sed - stream text editor SYNOPSIS sed [-n] script [ file ... ] sed [-n] [-e script ] ... [-f script_file ] ... [ file ... ] DESCRIPTION sed copies the named text file s (standard input default) to the standard output, edited according to a script containing up to 100 commands. Only complete input lines are processed. Any input text at the end of a file that is not terminated by a new-line character is ignored.
sed(1) sed(1) command, and can be used to protect initial blanks and tabs against the stripping that is done on every script line. rfile Must terminate the command line, and must be preceded by exactly one blank. wfile Must terminate the command line, and must be preceded by exactly one blank. Each wfile is created before processing begins. There can be at most 10 distinct wfile arguments. sed recognizes the following functions: (1) a\ text (2) b label (2) c\ text A sA Append.
sed(1) sed(1) (2) w wfile Write. Append the pattern space to wfile . (2) x Exchange the contents of the pattern and hold spaces. (2) y/string1 /string2 / Transform. Replace all occurrences of characters in string1 with the corresponding character in string2 . The lengths of string1 and string2 must be equal. (2) ! function Don’t. Apply the function (or group, if function is { ) only to lines not selected by the address or addresses.
sed(1) sed(1) sed -e ’s/abc/xyz/’ -e ’s/lmn/rst/’ file1 >file1.out or sed -e ’s/abc/xyz/’ \ -e ’s/lmn/rst/’ \ file1 >file1.out WARNINGS sed limits command scripts to a total of not more than 100 commands. The hold space is limited to 8192 characters. sed processes only text files. See the glossary for a definition of text files and their limitations. AUTHOR sed was developed by OSF and HP. SEE ALSO awk(1), ed(1), grep(1), environ(5), lang(5), regexp(5).
send_sound(1) send_sound(1) NAME send_sound - play an audio file SYNOPSIS /opt/audio/bin/send_sound [ -format_switch ] [ -server system ] [ -loop number ] [ -pri priority ] [ -srate rate ] [ -prate rate ] [ -stereo ] DESCRIPTION This command plays an audio file. send_sound is the command used when you double-click an audio file from the HP VUE File Manager. The file begins playing, according to the settings of the Audio Control Panel.
serialize(1) serialize(1) NAME serialize - force target process to run serially with other processes SYNOPSIS serialize command [command_args ] serialize [-t] [-p pid ] DESCRIPTION The serialize command is used to force the target process to run serially with other processes also marked by this command. The target process can be referred to by pid value, or it can be invoked directly on the command.
serialize(1) serialize(1) AUTHOR serialize was developed by HP. SEE ALSO setprivgrp(1M), getprivgrp(2), serialize(2).
setacl(1) setacl(1) NAME setacl - modify access control lists (ACLs) for files (JFS File Systems only) SYNOPSIS setacl [-n] -s acl_entries file... setacl [-n] -m|-d acl_entries [-m|-d acl_entries ]... setacl [-n] -f acl_file file... file... DESCRIPTION For each file specified, setacl will either replace its entire ACL, including the default ACL on a directory, or it will add, modify, or delete one or more ACL entries, including default entries on directories.
setacl(1) setacl(1) ignored. If the -n option is specified, the recalculation is not performed, and the value specified in the class entry is used. -s Set a file’s ACL. All old ACL entries are removed, and replaced with the newly specified ACL. There must be exactly one user entry specified for the owner of the file, exactly one group entry specified for the owning group of the file, and exactly one other entry specified.
setacl(1) setacl(1) EXAMPLES To add one ACL entry to file filea, giving user archer read permission only, type: setacl -m user:archer:r-- filea If an entry for user archer already exists, this command will set the permissions in that entry to r--.
sh(1) sh(1) NAME sh - overview of various system shells SYNOPSIS POSIX Shell: sh [ ±aefhikmnoprstuvx] [ ±o option ] ... [-c string ] [arg ... ] rsh [ ±aefhikmnoprstuvx] [ ±o option ] ... [-c string ] [arg ... ] Korn Shell: ksh [ ±aefhikmnoprstuvx] [ ± o option ] ... [-c string ] [ arg ... ] rksh [ ±aefhikmnoprstuvx] [ ±o option ] ... [-c string ] [ arg ... ] C Shell: csh [-cefinstvxTVX] [ command_file ] [ argument_list ... ] Key Shell: keysh DESCRIPTION Remarks: The POSIX.
sh(1) sh(1) To obtain: POSIX Shell Korn Shell C Shell Key Shell Use the command: /usr/bin/sh ... /usr/bin/ksh ... /usr/bin/csh ... /usr/bin/keysh These shells can also be the default invocation, depending on the entry in the /etc/passwd file. See also chsh (1). WARNINGS Many manual entries contain descriptions of shell behavior or describe program or application behavior similar to ‘‘the shell’’ with a reference to ‘‘see sh(1)’’.
sh-posix(1) sh-posix(1) NAME sh-posix: sh, rsh - standard and restricted POSIX.2-conformant command shells SYNOPSIS sh [-+aefhikmnprstuvx] [{-+}o option ]... [-c string ] [arg]... rsh [±aefhikmnprstuvx] [±o option ]... [-c string ] [arg]... Remarks This shell is intended to conform to the shell specification of the POSIX.2 Shell and Utility standards. Check any standards conformance documents shipped with your system for information on the conformance of this shell to any other standards.
sh-posix(1) • • • sh-posix(1) Setting the value of SHELL, ENV, or PATH Specifying path or command names containing / Redirecting output (>, >|, <>, and >>) The restrictions above are enforced after the .profile and ENV files are interpreted. When a command to be executed is found to be a shell procedure, rsh invokes sh to execute it. Thus, the end-user is provided with shell procedures accessible to the full power of the standard shell, while being restricted to a limited menu of commands.
sh-posix(1) sh-posix(1) the logical negation of the exit status of the last command in the pipeline. A list is a sequence of one or more pipelines separated by ;, &, &&, or ||, and optionally terminated by ;, &, or |&. ; Causes sequential execution of the preceding pipeline. An arbitrary number of newlines can appear in a list , instead of semicolons, to delimit commands. & Causes asynchronous execution of the preceding pipeline (that is, the shell does not wait for that pipeline to finish).
sh-posix(1) sh-posix(1) time pipeline Execute the pipeline and print the elapsed time, the user time, and the system time on standard error. Note that the time keyword can appear anywhere in the pipeline to time the entire pipeline . To time a particular command in a pipeline , see time (1). until list ; do list ; done Execute the until list . If the exit status of the last command in the list is nonzero, execute the do list and execute the until list again.
sh-posix(1) sh-posix(1) the alias remains tracked. With name =value omitted, print the list of tracked aliases in the form name =pathname on standard output. With -x, set exported aliases. An exported alias is defined across subshell environments. With name =value omitted, print the list of exported aliases in the form name =value on standard output. Alias returns true unless a name is given for which no alias has been defined. See also the unalias special command. bg [job]...
sh-posix(1) sh-posix(1) % exit [n] Exit from the shell with the exit status specified by n. If n is omitted, the exit status is that of the last command executed. An end-of-file also causes the shell to exit, except when a shell has the ignoreeof option set. (See the set special command.) %& export [name[=value] ]... %& export -p Mark the given variable names for automatic export to the environment of subsequently executed commands. Optionally, assign values to the variables.
sh-posix(1) sh-posix(1) With -r, forget all previously remembered utility locations. jobs [-lnp] [job]... List information about each given job, or all active jobs if job is not specified. With -l, list process IDs in addition to the normal information. With -n, display only jobs that have stopped or exited since last notified. With -p, list only the process group. See the Jobs subsection for a description of the format of job. kill [-s signal] process ... kill -l kill [-signal] process ...
sh-posix(1) sh-posix(1) If the first argument contains a ?, the remainder of the argument is used as a prompt when the shell is interactive. If the given file descriptor is open for writing and is a terminal device, the prompt is placed on that unit. Otherwise, the prompt is issued on file descriptor 2 (standard error). %& readonly [name[=value] ]... %& readonly -p Mark the given names read only. These names cannot be changed by subsequent assignment.
sh-posix(1) -o sh-posix(1) Set an option argument from the following list. Repeat the -o option to specify additional option arguments. Same as -a. Run all background jobs at a lower priority. Use a emacs-style inline editor for command entry. Same as -e. Use a gmacs-style inline editor for command entry. Do not exit from the shell on end-of-file (eof , as defined by stty; default is ^D). The exit special command must be used. keyword Same as -k.
sh-posix(1) sh-posix(1) % trap [arg] [sig]... Set arg as a command that is read and executed when the shell receives a sig signal. (Note that arg is scanned once when the trap is set and once when the trap is taken.) Each sig can be given as the number or name of a signal. Letter case is ignored. For example, 3, QUIT, quit, and SIGQUIT all specify the same signal. Use kill -l to get a list of signals. Trap commands are executed in signal number order.
sh-posix(1) sh-posix(1) typeset alone displays a list of parameter names, prefixed by any flags specified above. typeset - displays the parameter names followed by their values. Specify one or more of the option letters to restrict the list. Some options are incompatible with others. typeset + displays the parameter names alone. Specify one or more of the option letters to restrict the list. Some options are incompatible with others. ulimit [-HSacdfnst] [limit] Set or display a resource limit.
sh-posix(1) sh-posix(1) Aliasing The first word of each command is replaced by the text of an alias, if an alias for this word has been defined. An alias name consists of any number of characters excluding metacharacters, quoting characters, file expansion characters, parameter and command substitution characters, and =. The replacement string can contain any valid shell script, including the metacharacters listed above.
sh-posix(1) sh-posix(1) The shell supports a limited one-dimensional array facility. An element of an array parameter is referenced by a subscript. A subscript is denoted by a [, followed by an arithmetic expression, followed by a ]. See the Arithmetic Evaluation subsection. To assign values to an array, use set -A name value .... The value of all subscripts must be in the range of 0 through 1023. Arrays need not be declared.
sh-posix(1) echo sh-posix(1) ${d:-$(pwd)} If the colon (:) is omitted from the above expressions, the shell only checks to determine whether or not parameter is set. • The following parameters are set automatically by the shell: A sA 0 The string used to call the command or script, set from invocation argument zero. 1, 2, ... The positional parameters. *, @ All the set positional parameters, separated by a field separator character. See the Quoting subsection.
sh-posix(1) sh-posix(1) current environment. HISTFILE If this parameter is set when the shell is invoked, its value is the path name of the file that is used to store the command history. The default value is $HOME/.sh_history. If the user is a superuser and no HISTFILE is given, then no history file is used. See the Command Reentry subsection and the WARNINGS section.
sh-posix(1) sh-posix(1) PS1 The value of this parameter is expanded for parameter substitution, to define the primary prompt string. The default value is "$ ". The character ! in the primary prompt string is replaced by the command number. See the Command Reentry subsection. PS2 Secondary prompt string for command completion. The default value is "> ". PS3 Selection prompt string used within a select loop. If unset, it defaults to "#? ".
sh-posix(1) sh-posix(1) Arithmetic Evaluation Integer arithmetic is provided with the special command let. Evaluations are performed using long integer arithmetic. Constants take the form base #n or n, where base is a decimal number between two and thirty-six representing the arithmetic base and n is a number in that base. If base # is omitted, base 10 is used. An arithmetic expression uses the same syntax, precedence, and associativity of expression as the C language.
sh-posix(1) sh-posix(1) string < string2 string > string2 exp1 exp1 exp1 exp1 exp1 exp1 -eq -ne -lt -gt -le -ge exp2 exp2 exp2 exp2 exp2 exp2 True, ters. True, ters. True, True, True, True, True, True, if string1 comes before string2 based on the ASCII value of their characif string1 comes after string2 based on the ASCII value of their characif if if if if if exp1 exp1 exp1 exp1 exp1 exp1 is equal to exp2 . is not equal to exp2 . is less than exp2 . is greater than exp2 .
sh-posix(1) sh-posix(1) Order is significant in redirection. The shell evaluates each redirection in terms of the (file descriptor , file ) assignment at the time of evaluation. For example: 1>fname 2>&1 first assigns file descriptor 1 to file fname . It then assigns file descriptor 2 to the file assigned to file descriptor 1 (that is, fname ).
sh-posix(1) sh-posix(1) Function identifiers can be listed with the +f option of the typeset special command. Function identifiers and the associated text of the functions can be listed with the -f option. Functions can be undefined with the -f option of the unset special command. Ordinarily, functions are unset when the shell executes a shell script. The -xf option of the typeset command allows a function to be exported to scripts that are executed without reinvoking the shell.
sh-posix(1) sh-posix(1) The shell parameter PATH defines the search path for the directory containing the command. Alternative directory names are separated by a colon (:). The default path is /usr/bin: (specifying /usr/bin, and the current directory, in that order). Note that the current directory is specified by a null path name, which can appear immediately after the equal sign, between colon delimiters, or at the end of the path list. The search path is not used if the command name contains a /.
sh-posix(1) sh-posix(1) emacs/gmacs Editing Mode This mode is invoked by either the emacs or gmacs option. The sole difference is how they handle Control-T. To edit, the user moves the cursor to the point needing correction and inserts or deletes characters or words. All editing commands are control characters or escape sequences. The notation for control characters is caret (ˆ) followed by a character. For example, ˆF is the notation for Control-F.
sh-posix(1) M-< M-> ^Rstring ^O M-digits M-letter M-. M-_ M-* M-ˆ[ M-= ^U \ ^V M-# sh-posix(1) Fetch the least recent (oldest) history line. Fetch the most recent (youngest) history line. Reverse search history for a previous command line containing string . If a parameter of zero is given, the search is forward. string is terminated by a return or newline. If string is preceded by a ˆ, the matched line must begin with string .
sh-posix(1) sh-posix(1) Motion Edit Commands These commands move the cursor. The use of count causes a repetition of the command the cited number of times. [count]l [count]w [count]W [count]e [count]E [count]h [count]b [count]B [count]| [count]fc [count]Fc [count]tc [count]Tc [count]; [count], 0 ^ $ Cursor forward (right) one character. Cursor forward one alphanumeric word. Cursor forward to the beginning of the next word that follows a blank. Cursor forward to the end of the word.
sh-posix(1) R [count]rc [count]x [count]X [count]. ~ [count]_ * sh-posix(1) Enter insert mode and replace characters on the screen with characters you type, overlay fashion. Replace the current character with c. Delete the current character. Delete the preceding character. Repeat the previous text modification command. Invert the case of the current character and advance the cursor.
sh-posix(1) sh-posix(1) brackets ([]) after the command or function name. WARNINGS Some file descriptors are used internally by the POSIX shell. For HP-UX releases 10.10 and beyond, file descriptors 24 through 30 are reserved. HP-UX releases 10.00 and 10.01 reserve descriptors 54 through 60. Applications using these and forking a subshell should not depend upon them surviving in the subshell or its descendants.
sh-posix(1) sh-posix(1) Here-Document Temp Files The contents of here-documents are stored in temporary files named /var/tmp/shpid .number. Usually, these temporary files are removed after they are used. However, due to design limitations, these temporary files may sometimes continue to exist after the shell exits. pid is the process ID of the shell. number is a sequence number for the here-document files. AUTHOR sh was developed by AT&T, OSF, and HP. FILES $HOME/.
shar(1) shar(1) NAME shar - make a shell archive package SYNOPSIS shar [options ] [file dir ] ... > package DESCRIPTION The shar command bundles the named files and directories into a single distribution package suitable for mailing or moving. The files can contain any data, including executables. The resulting package, written to standard output, is a shell script file that can be edited (to add messages at the beginning, etc.).
shar(1) shar(1) -m Retain modification and access times on files when they are unpacked. -o Preserve user and group ownership on files and directories. -r Cause the archive to contain code requiring that the user unpacking it be root. This is useful for processing system archives. -s Perform error checking using sum (see sum(1)). Both -c and -s can be specified for better error checking. Also see WARNINGS below.
shar(1) shar(1) the directory specified in it is accessible. /var/tmp/unpack* For unpacking non-ASCII files if TMPDIR environment variable is not set or the directory specified in it is not accessible and /var/tmp directory is accessible. /tmp/unpack* For unpacking non-ASCII files if TMPDIR environment variable is not set or the directory specified in it is not accessible and /var/tmp directory is not accessible.
shl(1) shl(1) NAME shl - shell layer manager SYNOPSIS shl DESCRIPTION shl provides a means for interacting with more than one shell from a single terminal by using shell layers. A layer is a shell that is bound to a virtual device. The virtual device can be manipulated like an actual terminal by using stty and ioctl() (see stty (1) and ioctl (2)). Each layer has its own process group ID. The user controls these layers by using the commands described below.
shl(1) shl(1) name Change the status of the layer referred to by name to that of current layer. Any unique prefix is accepted. WARNINGS Commands The behavior of the block and unblock shl commands is not guaranteed when the SHELL environment variable is set to /usr/bin/csh (for csh (1)) or /usr/bin/ksh (for ksh(1)), or when the shell saves and restores the tty state (defined in termio (7)) before and after each command is invoked interactively from that shell.
size(1) size(1) NAME size - print section sizes of object files SYNOPSIS size [-d] [-o] [-x] [-V] [-v] [-f] [-F] [-n] [-U] files DESCRIPTION size produces section size information for each section in the object files. The size of the text, data and bss (uninitialized data) sections are printed along with the total size of the object file. If an archive file is input to the size command, the information for all archive members is displayed.
size(1) size(1) EXAMPLES Compare the sizes of the text, data, and bss sections for two versions of a program: size ./version1 ./version2 SEE ALSO System Tools: as (1) cc(1) ld(1) translate assembly code to machine code invoke the HP-UX C compiler invoke the link editor Miscellaneous: a.
sleep(1) sleep(1) NAME sleep - suspend execution for an interval SYNOPSIS sleep time DESCRIPTION sleep suspends execution for time seconds. It is used to execute a command after a certain amount of time, as in: (sleep 105; command)& or to execute a command periodically, as in: while true do command sleep 37 done RETURN VALUE sleep exits with one of the following values: 0 The execution was successfully suspended for time seconds, or a SIGALRM signal was received.
slp(1) slp(1) NAME slp - set printing options for a non-serial printer SYNOPSIS slp [-a] [-b] [-c cols ] [-d] [-i indent ] [-k] [-l lines ] [-n] [-o] [-r] [-C pages ] [-O pages ] DESCRIPTION slp sets printer formatting options such as the number of lines per page, number of characters per line, and indentation. These characteristics are controlled by the printer driver as described in lp (7). slp acts on the current standard output.
soelim(1) soelim(1) NAME soelim - eliminate .so’s from nroff input SYNOPSIS soelim [ file ... ] DESCRIPTION soelim reads the specified files or the standard input and performs the textual inclusion implied by nroff directives of the form .so some_file when they appear at the beginning of input lines. This is useful when using programs such as tbl (1) that do not normally do this, allowing placement of individual tables or other text objects in separate files to be run as a part of a large document.
sort(1) sort(1) NAME sort - sort or merge files SYNOPSIS sort [-m] [-o output ] [-bdfinruM] [-t char ] [-k keydef ] [-y [kmem ] ] [-z recsz ] [-T dir ] [ file ... ] sort [-c] [-AbdfinruM] [-t char ] [-k keydef ] [-y [ kmem ] ] [-z recsz ] [-T dir ] [file ... ] DESCRIPTION sort performs one of the following functions: 1. Sorts lines of all the named files together and writes the result to the specified output. 2.
sort(1) sort(1) The following options override the default ordering rules: -d Quasi-dictionary order: only alphanumeric characters and blanks (spaces and tabs), as defined by LC_CTYPE are significant in comparisons (see environ (5)). (XPG4 only.) The behavior is undefined for a sort key to which -i or -n also applies. -f Fold letters. Prior to being compared, all lowercase letters are effectively converted into their uppercase equivalents, as defined by LC_CTYPE.
sort(1) sort(1) A field_start position specified by m .n is interpreted to mean the nth character in the mth field. A missing n means .1, indicating the first character of the mth field. If the -b option is in effect, n is counted from the first non-blank character in the mth field. A field_end position specified by m .n is interpreted to mean the nth character in the mth field. If n is missing, the mth field ends at the last character of the field.
sort(1) sort(1) International Code Set Support Single- and multi-byte character code sets are supported. EXAMPLES Sort the contents of infile with the second field as the sort key: sort -k 2,2 infile Sort, in reverse order, the contents of infile1 and infile2, placing the output in outfile and using the first two characters of the second field as the sort key: sort -r -o outfile -k 2.1,2.
sort(1) sort(1) STANDARDS CONFORMANCE sort: SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
spell(1) spell(1) NAME spell, hashmake, spellin, hashcheck - find spelling errors SYNOPSIS spell [-v] [-b] [-x] [-l] [-i] [+local_file ] [ files ] /usr/lbin/spell/hashmake /usr/lbin/spell/spellin n /usr/lbin/spell/hashcheck spelling_list DESCRIPTION The spell command collects words from the named files and looks them up in a spelling list.
spell(1) spell(1) EXAMPLES To check spelling of a single word: echo word | spell If word is spelled correctly, a prompt is returned. If it is spelled incorrectly, word is printed before the prompt is returned. To check spelling of multiple words, they can also be typed as a group on the same command line: echo worda wordb wordc ...
split(1) split(1) NAME split - split a file into pieces SYNOPSIS split [-l line_count ] [-a suffix_length ] [ file [ name ]] split [-b n[km] ] [-a suffix_length ] [ file [ name ]] Obsolescent split [-n ] [ file [ name ] ] DESCRIPTION split reads file and writes it in pieces (default 1000 lines) onto a set of output files. The name of the first output file is name with aa appended, and so on lexicographically, up to zz (only ASCII letters are used, a maximum of 676 files).
ssp(1) ssp(1) NAME ssp - remove multiple line-feeds from output SYNOPSIS ssp DESCRIPTION ssp (single-space) removes redundant blank lines from the standard input and sends the result to the standard output. All blank lines at the beginning of a file are removed, and all multiple blank lines elsewhere in the file (including end-of-file) are reduced to a single blank line. ssp is typically used in pipelines such as nroff -ms file1 | ssp ssp is equivalent to the 4.2BSD cat -s command.
strings(1) strings(1) NAME strings - find the printable strings in an object or other binary file SYNOPSIS strings [-a] [-t format ] [-n number ] [ file ] ... Obsolescent strings [-a] [-o] [-number ] [ file ] ... DESCRIPTION strings looks for ASCII strings in a file. If no file is specified, standard input is used. A string is any sequence of four or more printing characters ending with a newline or null character. strings is useful for identifying random object files and many other things.
strip(1) strip(1) NAME strip - strip symbol and line number information from an object file SYNOPSIS strip [-l] [-x] [-r] [-V] [-U] filename ... DESCRIPTION strip removes the symbol table and line number information from object files, including archives. Thereafter, no symbolic debugging access is available for that file; thus, this command is normally run only on production modules that have been debugged and tested. The effect is nearly identical to using the -s option of ld.
strip(1) strip(1) In addition, the following environment variable affects strip: TMPDIR Specifies a directory for temporary files (see tmpnam (3S)). International Code Set Support Single- and multi-byte character code sets are supported. DIAGNOSTICS strip: name : cannot open name cannot be read. strip: name : bad magic name is not an appropriate object file. strip: name : relocation entries present; cannot strip name contains relocation entries and the -r option was not specified.
stty(1) stty(1) NAME stty - set the options for a terminal port SYNOPSIS stty [-a-g options ] DESCRIPTION stty sets or reports current settings of certain terminal I/O options for the device that is the current standard input. The command takes four forms: stty Report the settings of a system-defined set of options; stty -a Report all of current option settings; stty -g Report current settings in a form that can be used as an argument to another stty command.
stty(1) stty(1) ienqak (-ienqak) Enable (disable) ENQ-ACK Handshaking. brkint (-brkint) Signal (do not signal) INTR on break. ignpar (-ignpar) Ignore (do not ignore) parity errors. parmrk (-parmrk) Mark (do not mark) parity errors (see termio (7)). inpck (-inpck) Enable (disable) input parity checking. istrip (-istrip) Strip (do not strip) input characters to seven bits. inlcr (-inlcr) Map (do not map) newline character to carriage return (CR) on input.
stty(1) stty(1) However, it does not keep track of column position and, as a result, may not correctly erase escaped characters, tabs, and backspaces. echok (-echok) Echo (do not echo) a newline character after a KILL character. lfkc (-lfkc) (obsolete) Same as echok (-echok). echonl (-echonl) Echo (do not echo) newline character. noflsh (-noflsh) Disable (enable) flush after INTR or QUIT.
stty(1) stty(1) Reporting Functions size Print terminal window size to standard output in a rows-and-columns format. +queryGSP Print the status of the Guardian Service Processor (GSP) of the console. This function can be used only by the superuser. This feature is available only on specific hardware. Control Character Default Assignments The control characters are assigned default values when the terminal port is opened, see termio (7).
su(1) su(1) NAME su - switch user SYNOPSIS su [-] [username [arguments ] ] su [-] -d [username ] DESCRIPTION The su (set user or superuser) command allows one user to become another user without logging out. username is the name of a user defined in the /etc/passwd file (see passwd (4)). The default name is root (that is, superuser). To use su, the appropriate password must be supplied unless the current user is superuser and is not using the -d option.
su(1) su(1) If the shell specified in /etc/passwd is /usr/bin/sh, su sets the value of parameter 0 in the new shell (referenced as $0) to su. If the - option of the su command is specified, su sets parameter 0 to -su. If the shell specified in /etc/passwd is not /usr/bin/sh, su sets the value of parameter 0 in the new shell to shellname . If the - option of the su command is specified, su sets parameter 0 to -shellname.
su(1) su(1) su bin -c ’echo hello’ Become user DCEPrincipal in the DCE environment: su -d DCEPrincipal WARNINGS After a valid password is supplied, su uses information from /etc/passwd and /etc/logingroup to determine the user’s group ID and group access list. If /etc/group is linked to /etc/logingroup, and group membership for the user trying to log in is managed by the Network Information Service (NIS), and no NIS server is able to respond, su waits until a server does respond.
sum(1) sum(1) NAME sum - print checksum and block or byte count of file(s) SYNOPSIS sum [-r] [-p] [file ...] Remarks sum is obsolescent and should not be used in new applications that are intended to be portable between systems. Use cksum instead (see cksum(1)). DESCRIPTION sum calculates and prints to standard output a checksum for each named file, and also prints the size of the file in 512 byte blocks, rounded up. The default algorithm is a 16-bit sum of the bytes in which overflow is ignored.
tabs(1) tabs(1) NAME tabs - set tabs on a terminal SYNOPSIS tabs [ tabspec ] [+m n ] [-T type ] DESCRIPTION tabs sets the tab stops on the user’s terminal according to the tab specification tabspec , after clearing any previous settings. The user’s terminal must have remotely-settable hardware tabs. If you are using a non-HP terminal, you should keep in mind that behavior will vary for some tab settings.
tabs(1) tabs(1) correct tab settings, and is suitable for use with the pr command (see pr (1)): tabs -- file; pr file Any of the following can be used also; if a given option occurs more than once, the last value given takes effect: -Ttype tabs usually needs to know the type of terminal in order to set tabs and always needs to know the type to set margins. type is a name listed in term (5). If no -T option is supplied, tabs searches for the $TERM value in the environment (see environ (5)).
tail(1) tail(1) NAME tail - deliver the last part of a file SYNOPSIS tail [-f] [-b number ] [ file ] tail [-f] [-c number ] [ file ] tail [-f] [-n number ] [ file ] Obsolescent: tail [ ±[ number ] ] [lbc] [-f] [ file ] DESCRIPTION tail copies the named file to the standard output beginning at a designated place. If no file is named, standard input is used. Command Forms tail can be used in three forms as indicated above: tail -b number...
tail(1) tail(1) EXTERNAL INFLUENCES Environment Variables LC_CTYPE determines the locale for the interpretation of sequences of bytes of text data as characters (e.g., single- versus multibyte characters in arguments and input files). LC_MESSAGES determines the language in which messages are displayed. If LC_CTYPE or LC_MESSAGES is not specified in the environment or is set to the empty string, the value of LANG is used as a default for each unspecified or empty variable.
talk(1) talk(1) NAME talk - talk to another user SYNOPSIS talk talk_party [ ttyname ] DESCRIPTION The talk utility is a two-way, screen-oriented communication program. The command argument talk_party can take one the following forms: user user @host host !user host :user host .user where user is a login name and host is a host name. The optional command argument, ttyname , can be used to specify the terminal to be used when contacting a user who is logged in more than once.
tar(1) tar(1) NAME tar - tape file archiver SYNOPSIS tar [-]key [arg ...] [file -C directory] ... DESCRIPTION The tar command saves and restores archives of files on a magnetic tape, a flexible disk, or a regular file. The default archive file is /dev/rmt/0m. See the -f option below. Its actions are controlled by the key argument. Arguments key is a string of characters containing exactly one function letter and zero or more function modifiers, specified in any order.
tar(1) tar(1) A Suppress warning messages that tar did not archive a file’s access control list. By default, tar writes a warning message for each file with optional ACL entries. b Use the next arg argument as the blocking factor for archive records. The default is 20; the maximum is at least 20. However, if the f - modifier is used to specify standard input, the default blocking factor is 1. The blocking factor is determined automatically when reading nine-track tapes (key letters x and t).
tar(1) tar(1) v Normally, tar does its work silently. The v (verbose) function modifier causes tar to type the name of each file it treats, preceded by the function letter. With the t function, v gives more information about the archive entries than just the name. V Same as the v function modifier except that, when using the t option, tar also prints out a letter indicating the type of the archived file.
tar(1) tar(1) Link names are still limited to 100 characters when using the N function modifier. There is no way to ask for the n-th occurrence of a file. Tape errors are handled ungracefully. The u function key can be slow. If the archive is a file on disk, flexible disk, or cartridge tape, and if the blocking factor specified on output is not the default, the same blocking factor must be specified on input, because the blocking factor is not explicitly stored in the archive.
tbl(1) tbl(1) NAME tbl - format tables for nroff SYNOPSIS tbl [-TX] [file ]... DESCRIPTION tbl is a preprocessor that formats tables for nroff(1). The input files are copied to the standard output, except for lines between .TS and .TE command lines, which are assumed to describe tables and are reformatted by tbl. (The .TS and .TE command lines are not altered by tbl). .TS is followed by global options.
tbl(1) tbl(1) internationalization variables are set to "C". See environ (5). International Code Set Support Single- and multi-byte character code sets are supported. EXAMPLES If we redefine the tab character to a semicolon, then the input: .TS center box tab(;) ; cB s s cI | cI s ^ | c c l | n n. Household Population _ Town;Households ;Number;Size = Bedminster;789;3.26 Bernards Twp.;3087;3.74 Bernardsville;2018;3.30 Bound Brook;3425;3.04 Bridgewater;7897;3.81 Far Hills;240;3.19 .
tcpdchk(1) tcpdchk(1) NAME tcpdchk - check tcp wrapper configuration SYNOPSYS /usr/bin/tcpdchk [-a] [-d] [-i inet_conf ] [-v] DESCRIPTION tcpdchk examines the tcp wrapper configuration and reports all potential and real problems it can encounter. The command examines the tcpd access control files (by default, these are /etc/hosts.allow and /etc/hosts.deny), and compares the entries in these files against entries in the inetd configuration file.
tcpdchk(1) tcpdchk(1) inetd.conf (4), format of the inetd control file. hosts_access (5), format of the tcpd access control tables. hosts_options(5), format of the language extensions.
tcpdmatch(1) tcpdmatch(1) NAME tcpdmatch - evaluate tcp wrapper service requests SYNOPSYS /usr/bin/tcpdmatch [-d] [-i inet_conf ] daemon client /usr/bin/tcpdmatch [-d] [-i inet_conf ] daemon [@server] [user@]client DESCRIPTION tcpdmatch predicts how the tcp wrapper would handle a specific request for service. Examples are given below. The program examines the tcpd access control tables (default /etc/hosts.allow and /etc/hosts.deny) and prints its conclusion.
tcpdmatch(1) tcpdmatch(1) FILES The default locations of the tcpd access control tables are: /etc/hosts.allow (daemon, client) pairs that are granted access. /etc/hosts.deny (daemon, client) pairs that are denied access. SEE ALSO tcpdchk (1), tcpd configuration checker. inetd.conf (4), format of the inetd control file. hosts_access (5), format of the tcpd access control tables. hosts_options(5), format of the language extensions.
tee(1) tee(1) NAME tee - pipe fitting SYNOPSIS tee [-i] [-a] [ file ] ... DESCRIPTION The tee command transcribes the standard input to the standard output and makes copies in the files . Options -i This option ignores interrupts. -a This option appends the output to the files rather than overwriting the files . EXTERNAL INFLUENCES Environment Variables LC_MESSAGES determines the language in which messages are displayed.
telnet(1) telnet(1) NAME telnet - user interface to the TELNET protocol SYNOPSIS telnet [ [ options ] host [ port ] ] DESCRIPTION telnet is used to communicate with another host using the TELNET protocol. If telnet is invoked without arguments, it enters command mode, indicated by its prompt (telnet>). In this mode, it accepts and executes the commands listed below. If telnet is invoked with arguments, it performs an open command (see below) with those arguments.
telnet(1) telnet(1) autologin, forward, and forwardable respectively. Refer to the appdefaults Section of the krb5.conf (4) manpage for more information. The fallback option can be set in the krb5.conf file within appdefaults Section . If fallback is set to true and the kerberos authentication fails, telnet will use the non-secure mode of authentication. Note: Command line options override configuration file options.
telnet(1) telnet(1) EOF (normally ˆD; see stty (1)). Note: Setting line-mode also sets local echo. Applications that expect to interpret user input character by character (such as more, csh, ksh, and vi) do not work properly in line mode. status Show current status of telnet. telnet reports the current escape character. If telnet is connected, it reports the host to which it is connected and the current mode. If telnet is not connected to a remote host, it reports No connection.
telnet(1) telnet(1) escape This is the telnet escape character (initially ˆ]) that causes entry into telnet command mode (when connected to a remote system). interrupt If telnet is in localchars mode (see toggle localchars below) and the interrupt character is typed, a TELNET IP sequence (see send ip above) is sent to the remote host. The initial value for the interrupt character is taken to be the terminal’s intr character.
telnet(1) telnet(1) discarding all previously typed input until both of the TELNET sequences have been read and acted upon. The initial value of this toggle is FALSE. binary Enable or disable the TELNET BINARY option on both input and output. This option should be enabled in order to send and receive 8-bit characters to and from the TELNET server. crlf If TRUE, end-of-line sequences are sent as an ASCII carriage-return and linefeed pair.
telnet(1) telnet(1) SEE ALSO csh(1), ksh(1), login(1), rlogin(1), stty(1), telnetd(1M), inetsvcs_sec(1M), hosts(4), krb5.conf(4), services(4), sis(5), termio(7).
test(1) test(1) NAME test - condition evaluation command SYNOPSIS test expr [ expr ] DESCRIPTION The test command evaluates the expression expr and, if its value is True, returns a zero (true) exit status; otherwise, a nonzero (false) exit status is returned. test also returns a nonzero exit status if there are no arguments. The following primitives are used to construct expr : A tA -r file True if file exists and is readable. -w file True if file exists and is writable.
test(1) test(1) EXAMPLES Exit if there are not two or three arguments: if [ $# -l2 2 -o $# -gt 3 ]; then exit 1; fi Create a new file containing the text string default if the file does not already exist: [ ! -f thisfile ] && echo default > thisfile Wait for myfile to become non-readable: while test -r myfile do sleep 30 done echo ’"myfile" is no longer readable’ WARNINGS When the [ form of this command is used, the matching ] must be the final argument, and both must be separate arguments from the arg
tftp(1) tftp(1) NAME tftp - trivial file transfer program SYNOPSIS tftp [ -B val ] [ -s ] [ -t val ] [host [port ]] DESCRIPTION tftp is the user interface to the Internet TFTP (Trivial File Transfer Protocol), that allows users to transfer files to and from a remote machine. The remote host can be specified on the command line, in which case tftp uses host as the default host for future transfers (see the connect command below). Note tftp now conforms to the RFCs: 2347, 2348, and 2349.
tftp(1) tftp(1) ascii Shorthand for "mode ascii" binary Shorthand for "mode binary" blksize val Set the block size for data transfer. The client and the server communicate to arrive upon a block size that is suitable for use on the network medium. The valid range is 8 to 65464 octets. The default value is 512 octets. newrexmt val Set the retransmission timeout, in seconds. The client and the server communicate to arrive upon a retransmission timeout value. The valid range is 1 to 255 seconds.
time(1) time(1) NAME time - time a command SYNOPSIS time command XPG4 only time [-p] utility [argument ...] DESCRIPTION command is executed. Upon completion, time prints the elapsed time during the command, the time spent in the system, and the time spent executing the command. Times are reported in seconds. Execution time can depend on the performance of the memory in which the program is running. The times are printed on standard error.
timex(1) timex(1) NAME timex - time a command; report process data and system activity SYNOPSIS timex [-o] [-p[fhkmrt] ] [-s] command DESCRIPTION timex reports in seconds the elapsed time, user time, and system time spent in execution of the given command. Optionally, process accounting data for command and all its children can be listed or summarized, and total system activity during the execution interval can be reported. The output of timex is written on the standard error.
top(1) top(1) NAME top - display and update information about the top processes on the system SYNOPSIS top [-s time ] [-d count ] [-q] [-u] [-w] [-h] [-P] [-n number] [-f filename ] [-p pset_id ] DESCRIPTION top displays the top processes on the system and periodically updates the information. Raw CPU percentage is used to rank the processes.
top(1) top(1) Display Description Three general classes of information are displayed by top: System Data The first few lines at the top of the display show general information about the state of the system, including: • System name and current time. • Load averages in the last one, five, and fifteen minutes of all the active processors in the system. • Number of existing processes and the number of processes in each state (sleeping, waiting, running, starting, zombie, and stopped).
top(1) top(1) top -s2 -d5 top -P -s2 -d5 To display information about pset 2, use: top -p 2 top -P -p 2 To display individual CPU information in place of individual process information, use: top -w and press the w key. AUTHOR top was developed by HP and William LeFebvre of Rice University.
touch(1) touch(1) NAME touch - update access, modification, and/or change times of file SYNOPSIS touch [-amc] [-r ref_file -t time ] file_name ... Obsolescent: touch time_str file_name ... DESCRIPTION touch updates the access, modification, and last-change times of each argument. The file name is created if it does not exist. If no time is specified (see date (1)) the current time is used. The -r and -t options are mutually exclusive.
touch(1) touch(1) This is for backward compatibility. The -t form given above is recommended for future portability. The - - option delimiter can be used before the first file_name if there is a possibility that file_name consists of all digits, in order to ensure that the first syntax is used.
touch(1) touch(1) STANDARDS CONFORMANCE touch: SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
tput(1) tput(1) NAME tput - query terminfo database SYNOPSIS tput [-T type ] capname . . . tput [-T type ] capname [parms . . . ] tput -S DESCRIPTION The tput command uses the terminfo database to make terminal-dependent capabilities and information available to the shell (see terminfo (4)). The tput command outputs a string if the attribute (capname) is of type string, or an integer if the attribute is of type integer.
tput(1) tput(1) Clear the screen, move the cursor to line 10, column 20 and turn on bold. tput -S <4 The capability name is of type integer and does not exist. Usage error. Unknown terminal type.
tr(1) tr(1) NAME tr - translate characters SYNOPSIS tr [-Acs] string1 string2 tr -s [-Ac] string1 tr -d [-Ac] string1 tr -ds [-Ac] string1 string1 DESCRIPTION tr copies the standard input to the standard output with substitution or deletion of selected characters. Input characters from string1 are replaced with the corresponding characters in string2 . If necessary, string1 and string2 can be quoted to avoid pattern matching by the shell.
tr(1) tr(1) When [:lower:] appears in string1 and [:upper:] appears in string2 , the arrays contain the characters from the toupper mapping in the LC_CTYPE category of the current locale. When [:upper:] appears in string1 and [:lower:] appears in string2 , the arrays contain the characters from the tolower mapping in the LC_CTYPE category of the current locale.
tr(1) tr(1) Translate each digit in file1 to a # (number sign), and write the result to file2 . tr "0-9" "[#*]" file2 The * (asterisk) tells tr to repeat the # (number sign) enough times to make the second string as long as the first one. AUTHOR tr was developed by OSF and HP. SEE ALSO ed(1), sh(1), ascii(5), environ(5), lang(5), regexp(5). STANDARDS CONFORMANCE tr: SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
true(1) true(1) NAME true, false - return exit status zero or one respectively SYNOPSIS true false DESCRIPTION The command true does nothing, and returns exit code zero. The command false does nothing, and returns exit code one. They are typically used to construct command procedures. RETURN VALUE Exit values are: 0 1 always from true . always from false . EXAMPLES This command loop repeats without end: while true do command done WARNINGS true is typically used in shell scripts.
tryfrom(1) tryfrom(1) NAME tryfrom, sffinger - utility programs for TCP Wrappers SYNOPSIS /usr/bin/tryfrom /usr/bin/sffinger DESCRIPTION tryfrom This program identifies the end-point details related to a connection. This program must be called via a remote shell command as shown below. It is used to find out if the hostname and the address are properly recognized, and also if the username lookup works properly.
tset(1) tset(1) NAME tset, reset - terminal-dependent initialization SYNOPSIS tset [options ] [-m [ident ] [test baudrate ] :type]... [type ] reset DESCRIPTION tset sets up the terminal when logging in on an HP-UX system. It does terminal-dependent processing, such as setting erase and kill characters, setting or resetting delays, and sending any sequences needed to properly initialize the terminal.
tset(1) tset(1) On terminals that can backspace but not overstrike (such as a CRT), and when the erase character is the default erase character (# on standard systems), the erase character is changed to Backspace. Options tset recognizes the following options: -ec Set the erase character to be the named character c; c defaults to what the terminfo database (see terminfo (4)) entry reports to be the character sent by the Backspace key (usually ˆH).
tset(1) tset(1) the examples small. Assume, for the moment, that you are on an HP 2622. This is suitable for typing by hand but not for a .profile unless you are always on a 2622. export TERM; TERM=‘tset - 2622‘ Assume you have an HP 2623 at home that you dial up on, but your office terminal is hardwired and known in /etc/ttytype.
tsm(1) tsm(1) NAME tsm - Terminal Session Manager SYNOPSIS tsm DESCRIPTION tsm allows a user to interact with more than one shell or application (session) from a single terminal. Each session is bound to a virtual device emulating the physical terminal. The emulation includes maintaining display state, softkeys, and terminal modes for each session. The virtual device can be manipulated like the actual terminal by using stty and ioctl (see stty (1) and ioctl (2)).
tsm(1) tsm(1) s Start a new session containing a shell. o Output the current display to a printer (screen dump). The print mechanism is specified in a file named .tsmprint searched for in the standard way. Character attribute information is ignored. k Load the softkeys of the current session from a file. To load tsm defaults, specify ‘‘file’’ +. To load terminal defaults, specify ‘‘file’’ -. g Same as k above but softkeys are loaded ‘‘globally’’ into all sessions.
tsm.command(1) tsm.command(1) NAME tsm.command - send commands to the Terminal Session Manager (TSM) SYNOPSIS /usr/tsm/bin/tsm.command command DESCRIPTION tsm.command is used to send a command string programmaticly to the Terminal Session Manager (TSM), as if the string were typed on the TSM command line. tsm.command fails unless it is run from inside a TSM session. Actions caused by tsm.command affect only the instance of TSM that tsm.command is run under.
tsm.info(1) tsm.info(1) NAME tsm.info - get Terminal Session Manager state information SYNOPSIS /usr/tsm/bin/tsm.info request DESCRIPTION tsm.info is used to obtain information about TSM. When run from inside a TSM session it returns valid information; otherwise it fails with a nonzero error code. Information returned is written to standard output. request can have any of the following values: is_a_window Successful (returns zero) if executed from a TSM session, nonzero error code otherwise.
tsort(1) tsort(1) NAME tsort - topological sort SYNOPSIS tsort [ file ] DESCRIPTION tsort produces on the standard output a totally ordered list of items consistent with a partial ordering of items mentioned in the input text file . If no file is specified, the standard input is understood. tsort is generally used in conjunction with the lorder command to sort the objects to be installed in a library by ar (see lorder (1) and ar (1)).
tty(1) tty(1) NAME tty, pty - get the name of the terminal SYNOPSIS tty [-s] pty [-s] DESCRIPTION tty and pty print the path name of the user’s terminal. The -s option inhibits printing of the terminal path name and any diagnostics, providing a means to test only the exit code. RETURN VALUE Exit status codes for tty are: 2 1 0 Invalid options were specified, The standard input is not a terminal or pseudo-terminal, The standard input is a terminal or pseudo-terminal.
ttytype(1) ttytype(1) NAME ttytype - terminal identification program SYNOPSIS ttytype [-apsv] [-t type ] DESCRIPTION ttytype automatically identifies the current terminal type by sending an identification request sequence to the terminal. This method works for local, modem, and remote terminal connections, as well as for the hpterm and xterm terminal emulators. Once the terminal has been identified, ttytype prints the terminal’s type to the standard output (see terminfo (4)).
ttytype(1) ttytype(1) 1. ttytype tries the Wyse 30/50/60 id request sequence. 2. ttytype tries the standard ANSI id request sequence. If a response is received, it is converted to a string according to an internal table. 3. ttytype tries the HP id request sequence. 4. If none of the above steps succeed, ttytype prompts interactively for the correct terminal type unless the -a option has been given. ttytype may skip one or more of the first three steps, depending on the presence of -t options.
ul(1) ul(1) NAME ul - do underlining SYNOPSIS ul [-t terminal ] [-i] [ name ... ] DESCRIPTION ul reads the named files (or standard input if none are given) and translates occurrences of underscores to the sequence which indicates underlining for the terminal in use, as specified by the environment variable TERM. The -t option overrides the terminal type specified in the environment. The terminfo (4) file corresponding to TERM is read to determine the appropriate sequences for underlining.
umask(1) umask(1) NAME umask - set or display the file mode creation mask SYNOPSIS Set Mask umask mask Display Mask umask [-S] DESCRIPTION The umask command sets the value of the file mode creation mask or displays the current one. The mask affects the initial value of the file mode (permission) bits for subsequently created files. Setting the File Mode Creation Mask The umask mask command sets a new file mode creation mask for the current shell execution environment.
umask(1) umask(1) Numeric Mask Value (Obsolescent) A numeric mask replaces the current file mode creation mask.
umask(1) umask(1) RETURN VALUE umask exits with one of the following values: 0 >0 The file mode creation mask was successfully changed or no mask operand was supplied. An error occurred. EXAMPLES In these examples, each line show an alternate way of accomplishing the same task.
umodem(1) umodem(1) NAME umodem - XMODEM-protocol file transfer program SYNOPSIS umodem [options ] files ... umodem -c DESCRIPTION umodem is a file transfer program that incorporates the well-known XMODEM protocol used on CP/M systems and on the HP 110 portable computer. Options umodem recognizes the following options and command-line arguments: -1 (one) Employ TERM II FTP 1. -3 Enable TERM FTP 3 (CP/M UG). -7 Enable 7-bit transfer mask. -a Turn on ARPA Net flag. -c Enter command mode.
uname(1) uname(1) NAME uname - display information about computer system; set node name (system name) SYNOPSIS uname [-ailmnrsv] uname [-S nodename ] DESCRIPTION In the first form above, the uname command displays selected information about the current computer system, derived from the utsname structure (see uname(2)). In the second form, uname sets the node name (system name) that is used in the utsname structure. Options uname recognizes the options listed below.
uname(1) uname(1) Many types of networking services are supported on HP-UX, each of which uses a separately assigned system name and naming convention. To ensure predictable system behavior, it is essential that system names (also called host names or node names) be assigned in such a manner that they do not create conflicts when the various networking facilities interact with each other.
unget(1) unget(1) NAME unget - undo a previous get of an SCCS file SYNOPSIS unget [-r SID] [-s] [-n] file ... DESCRIPTION The unget command undoes the effect of a get -e done prior to creating the intended new delta. If file is a directory name, unget treats each file in the directory as a file to be processed, except that non-SCCS files and unreadable files are silently ignored.
unifdef(1) unifdef(1) NAME unifdef - remove preprocessor lines SYNOPSIS unifdef [-clt] [ [-D sym ] [-U sym ] [-iD sym ] [-iU sym ] ] ... [ file ] DESCRIPTION unifdef simulates some of the actions of cpp in interpreting C language preprocessor command lines (see cpp (1)). For unifdef, a valid preprocessor command line contains as its first character a # and one of the following keywords: ifdef, ifndef, if, else, or endif.
unifdef(1) unifdef(1) 100 CONTINUE #endif END The command sequence: unifdef -DANSI77 -UDEBUG -DTEST foo.f > /tmp/foo.f produces the following result in file /tmp/foo.f: PROGRAM TEST1 INTEGER I, J DO I=1,10 J=J+1 PRINT *,J ENDDO END WARNINGS Any symbol name defined in the file must be specified in the unifdef command line; otherwise, unifdef will ignore the line. AUTHOR unifdef was developed in the public domain. SEE ALSO cpp(1).
uniq(1) uniq(1) NAME uniq - report repeated lines in a file SYNOPSIS uniq [-udc [-f fields ] [-s chars ] [ input_file [ output_file ] ] DESCRIPTION uniq reads the input text file input_file , comparing adjacent lines, and copies the result to output_file . If input_file is not specified, the standard input and standard output are used. If input_file is specified, but output_file is not, results are printed to standard output. input_file and output_file must not be the same file.
uniq(1) uniq(1) STANDARDS CONFORMANCE uniq: SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
units(1) units(1) NAME units - conversion program SYNOPSIS units [- file ] DESCRIPTION units converts quantities expressed in various standard scales to their equivalents in other scales. It works interactively as follows: System Prompt User Response You have: You want: inch cm The system responds with two factors; one used if multiplying (preceded by *), the other if dividing (preceded by /): * 2.540000e+00 / 3.
uptime(1) uptime(1) NAME uptime, w - show how long system has been up, and/or who is logged in and what they are doing SYNOPSIS uptime [-hlsuw] [user ] uptime [-p[pset_list ]] w [-hlsuw] [user ] w [-p[pset_list ]] DESCRIPTION uptime prints the current time, the length of time the system has been up, the number of users logged on to the system, and the average number of jobs in the run queue over the last 1, 5, and 15 minutes for the active processors.
uptime(1) uptime(1) The command: uptime -p94,95 or uptime -p"94 95" gives the output which looks like the following, if 94 and 95 are valid pset ids: 7:59pm up 11 days, 6:25, 12 users load average for pset 94 : 0.00, 0.00, 0.00 load average for pset 95 : 0.00, 0.00, 0.00 AUTHOR uptime was developed by the University of California, Berkeley and HP.
users(1) users(1) NAME users - compact list of users who are on the system SYNOPSIS users DESCRIPTION users lists the login names of the users currently on the system in a compact, one-line format. The login names are sorted in ascending collation order (see Environment Variables below). EXTERNAL INFLUENCES Environment Variables LC_COLLATE determines the order in which the output is sorted.
uucp(1) uucp(1) NAME uucp, uulog, uuname, uutry - UNIX system to UNIX system copy SYNOPSIS uucp [ options ] source_files destination_ file uulog -f system [-x ] [-number ] uulog [-s system ] ... [-x ] [-number ] uuname [-l] uutry -r1 -s system [-x debug_level ] DESCRIPTION uucp copies files named by the source_files argument to the destination identified by the destination_ file argument.
uucp(1) uucp(1) -j Output the ASCII job identification string on standard output. This job identification can be used by uustat to obtain the status or terminate a job (see uustat (1)). -mfile Send mail to the requester when the copy is completed. -nuser Notify user on the remote system that a file was sent. -r Do not start the file transfer; just queue the job. -sfile Report status of the transfer to file . Note that file must be a full path name.
uucp(1) uucp(1) WARNINGS The domain of remotely accessible files can (and for obvious security reasons, usually should) be severely restricted. In most cases, you cannot fetch files by path name from a remote system. Ask a responsible person on the remote system to send them to you. For the same reasons, you probably cannot send files to arbitrary path names. As distributed, remotely accessible files are those whose names begin /var/spool/uucppublic (equivalent to ˜/).
uuencode(1) uuencode(1) NAME uuencode, uudecode - encode/decode a binary file for transmission by mailer SYNOPSIS uuencode [ source ] remotedest uudecode [ file ] DESCRIPTION uuencode and uudecode can be used to send a binary file to another machine by means of such services as elm(1), mailx (1), or uucp (1) (see elm(1), mailx (1), and uucp (1)). uuencode takes the named source file (default standard input) and produces an encoded version on the standard output.
uupath(1) uupath(1) (TO BE OBSOLETED) NAME uupath, mkuupath - access and manage the pathalias database SYNOPSIS uupath [-f pathsfile ] mailaddress mkuupath [-v] pathsfile DESCRIPTION The uucp commands, including uupath and mkuupath, are targeted for removal from HP-UX; see the WARNINGS below. uupath provides electronic message routing by expanding a simple UUCP address into a full (see uucp (1)). For example, host !user could be expanded into hostA !hostB !host !user.
uustat(1) uustat(1) NAME uustat - uucp status inquiry and job control SYNOPSIS uustat uustat uustat uustat uustat uustat uustat -a -m -p -q -k jobid ] -r jobid ] [-ssys ] [-uuser ] DESCRIPTION uustat displays the status of, or cancels, previously specified uucp commands, or provide general status on uucp connections to other systems (see uucp (1)). Only one of the following options can be specified with uustat per command execution: -a Output all jobs in queue.
uustat(1) uustat(1) When no options are given, uustat outputs the status of all uucp requests issued by the current user. The format used is the same as with the -s or -u options. EXTERNAL INFLUENCES Environment Variables LC_TIME determines the format and contents of date and time strings. LANG determines the language in which messages are displayed. If LC_TIME is not specified in the environment or is set to the empty string, the value of LANG is used as a default for each unspecified or empty variable.
uuto(1) uuto(1) NAME uuto, uupick - public UNIX system to UNIX system file copy SYNOPSIS uuto [ options ] source-files destination uupick [-s system ] DESCRIPTION uuto sends source-files to destination . uuto uses the uucp facility to send files (see uucp (1)), while allowing the local system to control the file access. A source-file name is a path name on your machine.
uuto(1) uuto(1) Grace Todino and Dale Dougherty, Using UUCP and Usenet , O’Reilly & Associates, Inc. USA.
uux(1) uux(1) NAME uux - UNIX system to UNIX system command execution SYNOPSIS uux [ options ] command-string DESCRIPTION uux gathers zero or more files from various systems, executes a command on a specified system, then sends standard output to a file on a specified system. Note that, for security reasons, many installations limit the list of commands executable on behalf of an incoming request from uux.
uux(1) uux(1) -n Do not notify the user if the command fails. -r Do not start the file transfer, just queue the job. -sfile Report status of the transfer in file . -xdebug_level Produce debugging output on standard output. The debug_level is a number between 0 and 9. The higher the number, the more detailed the information returned. Send success notification to user. -z WARNINGS Only the first command of a shell pipeline can have a system-name !.
vacation(1) vacation(1) NAME vacation - return ‘‘I am not here’’ indication SYNOPSIS vacation -i vacation [ [-a alias ] ... ] login DESCRIPTION The vacation program returns a message to the sender of a message telling them that you are currently not reading your mail. The intended use is in a .forward file in $HOME. For example, your .
vacation(1) vacation(1) DIAGNOSTICS On error, vacation exits with a value from and causes sendmail to report an error back to the sender of the original message. Errors such as the absence of .vacation.msg or calling vacation with incorrect arguments, are logged using syslogd on the system where vacation actually runs (see syslogd (1M)). The syslog file (/var/adm/syslog/mail.log by default − see /etc/syslog.
val(1) val(1) NAME val - validate SCCS file SYNOPSIS val val [-s] [-r SID] [-m name ] [-y type ] [-v] files DESCRIPTION The val command reads one or more file s to determine whether each file read is an SCCS file meeting the characteristics specified by the optional argument list. Command-line options may appear in any order, and are described below. Options The val command recognizes the following options and command-line arguments. The effects of each option apply independently to each specified file .
val(1) val(1) 7 %M % does not match -m name argument; Note that val can process two or more files on a given command line, and in turn can process multiple command lines (when reading the standard input). In these cases an aggregate code is returned; a logical OR of the codes generated for each command line and file processed.
vc(1) vc(1) NAME vc - substitutes assigned values in place of identification keywords. SYNOPSIS vc [-a] [-t] [-c char ] [-s] [ keyword=value ... keyword=value ] DESCRIPTION The vc, or version control command copies lines from the standard input to the standard output under control of command line arguments and control statements encountered in the standard input.
vc(1) vc(1) The syntax of a condition may include the following: ::= ::= ::= ::= ::= ::= [ "not" ] | "|" | "&" "(" ")" | "=" | "!=" | "<" | ">" | The following are available operators and their meanings: = != & | > < ( ) not equal not equal and or greater than less than used for logical groupings allowed only immediately after the if , and when present, inve
vc(1) vc(1) SEE ALSO ed(1), sccshelp(1).
vi(1) vi(1) NAME vi, view, vedit - screen-oriented (visual) text editor SYNOPSIS vi [-] [-l] [-r] [-R] [-t tag ] [-v] [-V] [-wsize ] [-x] [-C] [+command] [file ]... XPG4 Synopsis vi [-rR] [-c command] [-t tag ] [-w size ] [file ]... Obsolescent Options vi [-rR] [+command] [-t tag ] [-w size ] [file ]... view [-] [-l] [-r] [-R] [-t tag ] [-v] [-V] [-wsize ] [-x] [-C] [+command] [file ]...
vi(1) vi(1) transformed version of the key typed in for the -x option (see the crypt command in ex(1)). -C Encryption option. Same as the -x option, except that all text read in is assumed to have been encrypted. -c command (XPG4 only.) Begin editing by executing the specified ex command-mode commands. As with the normal ex command-line entries, the command optionargument can consist of multiple ex commands separated by vertical-line commands (|).
vi(1) vi(1) environment variable (see environ (5)). Unless otherwise specified, the commands are interpreted in command mode and have no special effect in input mode. ^B Scroll backward to display the previous window of text. A preceding count specifies the number of windows to go back. Two lines of overlap are kept if possible. ^D Scroll forward a half-window of text. A preceding count gives the number of (logical) lines to scroll, and is remembered for future ˆD and ˆU commands.
vi(1) vi(1) When entering a command on the bottom line of the screen (ex command line or search pattern with \ or ?), terminate input and execute command. On many terminals, ˆ[ can be entered by pressing the ESC or ESCAPE key. ^\ Exit vi and enter ex command mode. If in input mode, terminate the input first. ^] Take the word at or after the cursor as a tag and execute the tagMbobC editor command (see ex(1)). ^ˆ Return to the previous file (equivalent to :ex #).
vi(1) vi(1) ’ characters can appear between the ., !, or ? and the spaces or end of line. If a count is specified, the cursor moves back the specified number of sentences. If the lisp option is set, the cursor moves to the beginning of a lisp s-expression. Sentences also begin at paragraph and section boundaries (see { and [[). ) Move forward to the beginning of a sentence. If a count is specified, the cursor advances the specified number of sentences (see ().
vi(1) vi(1) @buffer Execute the commands stored in the named buffer. Be careful not to include a character at the end of the buffer contents unless the is part of the command stream. Commands to be executed in ex mode should be preceded by a colon (:). ~ The tilde (˜) switches the case of the character under the cursor (if it is a letter), then moves one character to the right, stopping at the end of the line).
vi(1) vi(1) U Restore the current line to its state before the cursor was last moved to it. (XPG4 only.) The cursor position is set to the column position 1 or to the position indicated by the previous line if the autoindent is set. A vA W Move forward to the beginning of a word in the current line, where a word is a sequence of nonblank characters.
vi(1) vi(1) p Put text after/below the cursor; otherwise like P. r Must be followed by a single character; the character under the cursor is replaced by the specified one. (The new character can be a new-line.) If r is preceded by a count , count characters are replaced by the specified character. s Delete the single character under the cursor and enter input mode; the entered text replaces the deleted character. A preceding count specifies how many characters on the current line are changed.
vi(1) vi(1) terminfo entry command mode map input mode map map name description key_ic key_eic key_up key_down key_left key_right key_home key_il key_dl key_clear key_eol key_sf key_dc key_npage key_ppage key_sr key_eos i i k j h l H oˆ[ dd ˆL d$ ^E x ˆF ˆB ^Y dG ^[ ^[ ^[ka ^[ja ^[ha ^[la ^[Ha ^[oˆ[a ^[dda ^[ˆLa ^[d$a ^[ˆEa ^[xa ^[ˆFa ^[ˆBa ^[ˆYa ^[dGa inschar inschar up down left right home insline delline clear clreol scrollf delchar npage ppage sr clreos insert char end insert char arrow up ar
vi(1) vi(1) International Code Set Support Single- and multi-byte character code sets are supported. WARNINGS See also the WARNINGS section in ex(1). Program Limits vi places the following limits on files being edited. Maximum Line Length 4096 characters including 2-3 bytes for overhead. Thus, a line length up to 4092 characters should cause no problem. If you load a file that contain lines longer than the specified limit, the lines are truncated to the stated maximum length.
vis(1) vis(1) NAME vis, inv - make unprintable and non-ASCII characters in a file visible or invisible SYNOPSIS vis [-n] [-s] [-t] [-u] [-x] file . . . inv [-n] [-s] [-t] [-u] [-x] file . . . DESCRIPTION vis reads characters from each file in sequence and writes them to the standard output, converting those that are not printable or not ASCII into a visible form.
vis(1) vis(1) WARNINGS Redirecting output to an input file destroys the original data. Therefore, command forms such as vis file1 file2 >file1 should be avoided unless the source file can be safely discarded. AUTHOR vis was developed by HP. SEE ALSO cat(1), echo(1), od(1).
vmstat(1) vmstat(1) NAME vmstat - report virtual memory statistics SYNOPSIS vmstat [-dnS] [interval [count ] ] vmstat -f -s -z DESCRIPTION The vmstat command reports certain statistics kept about process, virtual memory, trap, and CPU activity. It also can clear the accumulators in the kernel sum structure. Options vmstat recognizes the following options: -d Report disk transfer information as a separate section, in the form of transfers per second.
vmstat(1) vmstat(1) Information about page faults and paging activity. These are averaged each five seconds, and given in units per second.
vmstat(1) vmstat(1) avm free re at 1158 430 0 0 CPU cpu procs us sy id r b 0 0 100 0 0 4. pi 0 po 0 fr 0 de 0 sr 0 in 111 sy 18 cs 7 w 0 Replace the page reclaims and address translation faults with process swapping in the default output. vmstat -S procs r 0 5. b in 0 111 memory faults cpu w avm free sy cs us sy id 0 1158 430 18 7 0 0 100 page si so pi po fr de sr 0 0 0 0 0 0 0 Display the default output twice at five-second intervals. Note that the headers are not repeated.
vmstat(1) vmstat(1) VM memory avm free re at 1219 425 0 0 CPU cpu procs us sy id r b 1 8 92 0 0 pi 0 page po 0 fr 0 de 0 sr 0 in 111 faults sy 54 cs 15 w 0 Disk Transfers device xfer/sec c0t6d0 0 c0t1d0 0 c0t3d0 0 c0t5d0 0 8. Display the number of forks and pages of virtual memory since boot-up. vmstat -f 24558 forks, 1471595 pages, average= 9. 59.92 Display the counts of paging-related events.
vt(1) vt(1) NAME vt - log into another system over lan SYNOPSIS /usr/bin/vt nodename [ lan_device ] /usr/bin/vt -p [ lan_device ] DESCRIPTION vt enables a user to log into another HP 9000 system (nodename ) over an HP local area network. The -p option causes vt to send a poll request over the local area network to find out what systems currently have vtdaemon running (see vtdaemon (1M)). An asterisk (*) following a nodename in the response indicates that the system is a vt gateway.
vt(1) vt(1) DIAGNOSTICS The diagnostics produced by vt are intended to be self-explanatory. WARNINGS vt uses the Hewlett-Packard LLA (Link Level Access) direct interface to the HP network drivers. vt uses the multicast address 0x01AABBCCBBAA. It should not be used or deleted by other applications accessing the network. vt uses the following IEEE 802.3 sap (service access point) values: 0x90, 0x94, 0x98, 0x9C, 0xA0, 0xA4, 0xA8, 0xAC, 0xB0, 0xB4, 0xB8, 0xBC, 0xC0, 0xC4, 0xC8, 0xCC, 0xD0, and 0xD4.
wait(1) wait(1) NAME wait - await process completion SYNOPSIS wait [ pid ] DESCRIPTION If no argument is specified, wait waits until all processes (started with &) of the current shell have completed, and reports on abnormal terminations. If a numeric argument pid is given and is the process ID of a background process, wait waits until that process has completed. Otherwise, if pid is not a background process, wait exits without waiting for any processes to complete.
wc(1) wc(1) NAME wc - count words, lines, and bytes or characters in a file SYNOPSIS wc [-c-m] [-lw] [file ]... DESCRIPTION The wc command counts lines, words, and bytes or characters in the named files, or in the standard input if no file names are specified. It also keeps a total count for all named files. A word is a string of characters delimited by spaces, tabs, or newlines. Options wc recognizes the following options: -c Report the number of bytes in each input file.
wc(1) wc(1) WARNINGS The wc command counts the number of newlines to determine the line count. If a text file has a final line that is not terminated EXAMPLES Print the number of words and characters in file1: wc -wm file1 The following is printed when the above command is executed: words chars file1 where words is the number of words and chars is the number of characters in file1. STANDARDS CONFORMANCE wc: SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
what(1) what(1) NAME what - get SCCS identification information SYNOPSIS what [-s] file ... DESCRIPTION The what command searches the given files for all occurrences of the pattern that get (1) substitutes for %Z% (currently @(#) at this printing) and prints out what follows until the first ", >, new-line, \, or null character. For example, if the C program in file f.c contains char ident[] = "@(#)identification information "; and f.c is compiled to yield f.o and a.out, the command what f.c f.o a.
whereis(1) whereis(1) NAME whereis - locate source, binary, and/or manual for program SYNOPSIS whereis [-bsm] [-u] [-BMS dir ... -f] name ... DESCRIPTION whereis locates source, binary, and manuals sections for specified files. The supplied names are first stripped of leading path name components and any (single) trailing extension of the form .ext (such as .c). Prefixes of s. resulting from use of SCCS are also dealt with.
which(1) which(1) NAME which - locate a program file including aliases and paths SYNOPSIS which [ name ... ] DESCRIPTION For each name given, which searches for the file that would be executed if name were given as a command, and displays the absolute path of that file. Each argument is expanded if it is aliased, and searched for along the user’s path. Both aliases and path are determined by sourcing (executing) the user’s .cshrc file.
who(1) who(1) NAME who - who is on the system SYNOPSIS who [-muTlHqpdbrtasARW] [ file ] who am i who am I DESCRIPTION The who command can list the user’s name, terminal line, login time, elapsed time since input activity occurred on the line, the user’s host name, and the process-ID of the command interpreter (shell) for each current system user. It examines the utmps database to obtain the information. If file is given, that file is examined, file should be a utmp like file.
who(1) who(1) -d This option displays all processes that have expired and have not been respawned by init. The exit field appears for dead processes and contains the termination and exit values of the dead process (as returned by wait() — see wait (2)). This can be useful in determining why a process terminated. -b Indicates the time and date of the last reboot. -r Indicates the current run-level of the init process.
who(1) who(1) AUTHOR who was developed by AT&T and HP. FILES /etc/inittab /etc/utmp /var/adm/wtmp /var/adm/wtmps SEE ALSO date(1), login(1), mesg(1), su(1), init(1M), utmpd(1M), gethostname(2), wait(2), gethostent(3N), getutsent(3C), getbwent(3C), inittab(4), utmp(4). STANDARDS CONFORMANCE who: SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
whoami(1) whoami(1) NAME whoami - print effective current user id SYNOPSIS whoami DESCRIPTION whoami prints your current user name, even if you have used su to change it since your initial login (see su(1)). The command who am i reports your initial login name because it uses /etc/utmp. FILES /etc/passwd name data base AUTHOR whoami was developed by the University of California, Berkeley. SEE ALSO who(1).
whois(1) whois(1) NAME whois - Internet user name directory service SYNOPSIS whois [-h hostname ] name DESCRIPTION whois looks up records in the Network Information Center database. The operands specified to whois are concatenated together (separated by white-space) and presented to the whois server.
write(1) write(1) NAME write - interactively write (talk) to another user SYNOPSIS write user [terminal] DESCRIPTION The write command copies lines from your terminal to that of another user. When first called, it sends the message: Message from yourname (yourterminal ) [ date ] ... to the receiving user ’s terminal. When it has successfully completed the connection, it also sends two bells to your own terminal to indicate that what you are typing is being sent.
write(1) write(1) Your correspondent sent end-of-file, or you set your terminal to mesg n and your correspondent tried to write to you. If you have a write session established, you can continue to write to your correspondent. Permission denied. The user you are trying to write to has denied write permission (with mesg n). Warning: You have your terminal set to "mesg -n". No reply possible. Your terminal is set to mesg n and the recipient cannot respond to you.
xargs(1) xargs(1) NAME xargs - construct argument list(s) and execute command SYNOPSIS xargs [ options ] [ command [ initial-arguments ] ] DESCRIPTION xargs combines the fixed initial-arguments with arguments read from standard input to execute the specified command one or more times. The number of arguments read for each command invocation and the manner in which they are combined are determined by the options specified.
xargs(1) xargs(1) -p Prompt mode: The user is asked whether to execute command prior to each invocation. Trace mode (-t) is turned on to print the command instance to be executed, followed by a ?... prompt. An affirmative reply (by default, an affirmative reply is y optionally followed by anything) executes the command; anything else, including pressing Return, skips that particular invocation of command. -x Causes xargs to terminate if any argument list would be greater than size bytes.
xargs(1) xargs(1) Execute diff (see diff(1)) with successive pairs of arguments originally typed as shell arguments: echo $* | xargs -n2 diff SEE ALSO sh(1). STANDARDS CONFORMANCE xargs: SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
xstr(1) xstr(1) NAME xstr - extract strings from C programs to implement shared strings SYNOPSIS xstr [-c] [-] [ file ] DESCRIPTION xstr maintains a file strings into which strings in component parts of a large program are hashed. These strings are replaced with references to this common area. This serves to implement shared constant strings, which are most useful if they are also read-only.
yes(1) yes(1) NAME yes - be repetitively affirmative SYNOPSIS yes [ expletive ] DESCRIPTION yes repeatedly outputs y, or if expletive is given, the expletive is output repeatedly. Termination is by interrupt. AUTHOR yes was developed by the University of California, Berkeley.
ypcat(1) ypcat(1) NAME ypcat - print all values in Network Information Service map SYNOPSIS ypcat [-k] [-t] [-d domain ] mname ypcat -x Remarks The Network Information Service (NIS) was formerly known as Yellow Pages (YP). The functionality of the two remains the same; only the name has changed. DESCRIPTION ypcat prints all values in a Network Information Service (NIS) map specified by mname, which can be either a mapname or a map nickname .
ypmatch(1) ypmatch(1) NAME ypmatch - print values of selected keys in Network Information Service map SYNOPSIS ypmatch [-k] [-t] [-d domain ] key [key...] mname ypmatch -x Remarks The Network Information Service (NIS) was formerly known as Yellow Pages (yp). Although the name has changed, the functionality of the service remains the same. DESCRIPTION ypmatch prints the values associated with one or more keys in a Network Information Service (NIS) map specified by mname.
yppasswd(1) yppasswd(1) NAME yppasswd - change login password in Network Information System (NIS) SYNOPSIS yppasswd [name] Remarks The Network Information Service (NIS) was formerly known as Yellow Pages (YP). The functionality remains the same; only the name has changed. DESCRIPTION yppasswd changes or installs a password associated with the login name in the Network Information System (NIS). The NIS password can be different from the one on your own machine.
ypwhich(1) ypwhich(1) NAME ypwhich - list which host is Network Information System server or map master SYNOPSIS ypwhich ypwhich [-d domain ] [-V1 -V2] [ hostname ] ypwhich [-d domain ] [-t] [-m [ mname ] ] ypwhich -x Remarks The Network Information Service (NIS) was formerly known as Yellow Pages (yp). Although the name has changed, the functionality of the service remains the same.
(Notes) A (Notes) yA Section 1−−1028 Hewlett-Packard Company −1− HP-UX 11i Version 2: September 2004