HP-UX Reference (11i v2 04/09) - 7 Device (Special) Files, 9 General Information, Index (vol 10)
Index
All Volumes
Description Entry Name(Section)
scroll the window, enhanced curses ......................................................................................................... scrl(3X)
scroll_lines - number of scrollable lines used by the Internal Terminal Emulator ................ scroll_lines(5)
scrollable lines used by the Internal Terminal Emulator (ITE), number of .................................. scroll_lines(5)
scrollok() - terminal output control functions ............................................................................. clearok(3X)
SCSI device drivers .................................................................................................................................... scsi(7)
SCSI device, control a ......................................................................................................................... scsictl(1M)
SCSI direct access device driver ........................................................................................................ scsi_disk(7)
SCSI media changer device drivers ............................................................................................ autochanger(7)
SCSI pass-through device driver ........................................................................................................... scsi_ctl(7)
SCSI pass-through device driver ........................................................................................................... sioc_io(7)
SCSI sequential access (tape) device driver ...................................................................................... scsi_tape(7)
SCSI subsystem, enable/disable the use of a device’s write cache in the ................................ default_disk_ir(5)
scsi_ctl -
SCSI pass-through device driver ....................................................................................... scsi_ctl(7)
scsi_disk - SCSI direct access device driver .................................................................................. scsi_disk(7)
scsi_max_qdepth - maximum number of I/Os that target will queue up for execution ... scsi_max_qdepth(5)
scsi_maxphys - maximum allowed length of an I/O on all SCSI devices ............................... scsi_maxphys(5)
scsi_tape - SCSI sequential access (tape) device driver ................................................................ scsi_tape(7)
scsictl - control a SCSI device ........................................................................................................ scsictl(1M)
sdiff - side-by-side file difference program ............................................................................................. sdiff(1)
search a file for a string or expression ...................................................................................................... grep(1)
search and print process accounting files ........................................................................................ acctcom(1M)
search directory tree for files ..................................................................................................................... find(1)
search environment list for value of specified variable name ............................................................. getenv(3C)
search for files ............................................................................................................................................ find(1)
search for named file in named directories ..................................................................................... pathfind(3G)
search path for dynamically loadable kernel modules, change ......................................................... modpath(2)
search physical volumes for LVM volume groups .............................................................................. vgscan(1M)
search routine, binary, for sorted tables ........................................................................................... bsearch(3C)
search table for entry; optional update if missing ............................................................................. lsearch(3C)
search tables, hash, manage ............................................................................................................ hsearch(3C)
search tree, manage a binary ............................................................................................................ tsearch(3C)
searching NIS+ tables ....................................................................................................................... nismatch(1)
secdef - security defaults configuration file routines ........................................................................... secdef(3)
secof2(), SECof2() - test for valid second byte in 16-bit character ....................................... nl_tools_16(3X)
second, scheduling interval in clock ticks per ................................................................................... timeslice(5)
secondary prompt ............................................................................................................................... glossary(9)
secret key, decrypt and store ............................................................................................................. keylogin(1)
secret key, delete key stored with keyserv .................................................................................... keylogout(1)
secret key, retrieve public or .................................................................................................. getpublickey(3M)
section data for ELF files, manipulate ........................................................................................ elf_getdata(3E)
section information for ELF files, get ........................................................................................... elf_getscn(3E)
section sizes and allocation space of object files, print ............................................................................... size(1)
section sizes, disk, calculate default ............................................................................................... disksecn(1M)
secure internet services description ............................................................................................................. sis(5)
secure internet services, configuration file ................................................................................. inetsvcs.conf(4)
secure internet services, enable or disable .............................................................................. inetsvcs_sec(1M)
secure password file entry on trusted systems, get ...................................................................... getspwent(3X)
secure password file, get entry from ............................................................................................. getspwent(3X)
secure remote procedure calls, library routines for .................................................................... secure_rpc(3N)
secure RPC key, change user’s ................................................................................................................ chkey(1)
secure_rpc - library routines for secure remote procedure calls ................................................. secure_rpc(3N)
secure_sid_scripts - controls whether setuid and setgid bits on scripts are honored
............................................................................................................................... secure_sid_scripts(5)
securenets - NIS map security file ............................................................................................. securenets(4)
securetty file ........................................................................................................................................ login(1)
security context, delete ............................................................................................. gss_delete_sec_context(3)
security context, establish between context initiator and context acceptor ................... gss_init_sec_context(3)
security context, establish ........................................................................................ gss_accept_sec_context(3)
security context, obtain information about .................................................................... gss_inquire_context(3)
security context, transfer to another process on a single machine .......................... gss_export_sec_context(3)
security context, transfer to another process on a single machine .......................... gss_import_sec_context(3)
Index−−156 Hewlett-Packard Company HP-UX 11i Version 2: September 2004