HP-UX Reference Section 1: User Commands (A-M) HP-UX 11i Version 3 Volume 1 of 10 Manufacturing Part Number : B2355-91017 E0207 Printed in USA © Copyright 1983-2007 Hewlett-Packard Development Company LP.
Legal Notices The information in this document is subject to change without notice. Warranty The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. U.S. Government License Confidential computer software.
Copyright 1996 Morning Star Technologies, Inc. Copyright 1996 Progressive Systems, Inc. Trademark Notices Intel and Itanium are registered trademarks of Intel Corporation in the US and other countries and are used under license. Java is a US trademark of Sun Microsystems, Inc. Microsoft and MS-DOS are U.S. registered trademarks of Microsoft Corporation. OSF/Motif is a trademark of The Open Group in the US and other countries. UNIX is a registered trademark of The Open Group.
Preface HP-UX is the Hewlett-Packard Company’s implementation of a UNIX operating system that is compatible with various industry standards. It is based on the System V Release 4 operating system and includes important features from the Fourth Berkeley Software Distribution. The ten volumes of this manual contain the system reference documentation, made up of individual entries called manpages, named for the man command (see man (1)) that displays them on the system.
Typographical Conventions audit (5) An HP-UX manpage reference. For example, audit is the name and 5 is the section in the HP-UX Reference. On the web and on the Instant Information CD, it may be a hyperlink to the manpage itself. From the HP-UX command line, you can enter “man audit” or “man 5 audit” to view the manpage. See man (1). Book Title The title of a book. On the web and on the Instant Information CD, it may be a hyperlink to the book itself.
Command Syntax Literal A word or character that you enter literally. Replaceable A word or phrase that you replace with an appropriate value. -chars One or more grouped command options, such as -ikx. The chars are usually a string of literal characters that each represent a specific option. For example, the entry -ikx is equivalent to the individual options -i, -k, and -x. The plus character (+) is sometimes used as an option prefix. -word A single command option, such as -help.
Function Synopsis and Syntax HP-UX functions are described in a definition format rather than a usage format. The definition format includes type information that is omitted when the function call is actually included in a program. The function syntax elements are the same as for commands, except for the options; see “Command Syntax” on page 7. Function General Definition The general definition form is: type func ( type param [ , type param ]...
Revision History Part Number Release; Date; Format; Distribution B2355-60130 HP-UX 11i Version 3; February 2007; one volume HTML; http://docs.hp.com and Instant Information. B2355-91017-26 HP-UX 11i Version 3; February 2007; ten volumes PDF; http://docs.hp.com, Instant Information and print. B2355-60127 HP-UX 11i Version 1; September 2005 Update; one volume HTML; http://docs.hp.com and Instant Information. B2355-90902-11 HP-UX 11i Version 1; September 2005 Update; ten volumes PDF; http://docs.hp.
Volume One Table of Contents Section 1
Volume One Table of Contents Section 1
Table of Contents Volumes One and Two Section 1: User Commands Entry Name(Section): name Description intro(1): intro ..................................................... introduction to command utilities and application programs adb(1): adb ........................................................................................................................... absolute debugger adjust(1): adjust ...........................................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description chkey(1): chkey .................................................................................................... change user’s secure RPC key chmod(1): chmod ...................................................................................... change file mode access permissions chown(1): chown, chgrp .........................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description echo(1): echo ................................................................................................................ echo (print) arguments echo: echo (print) arguments ............................................................................................................... see csh(1) echo: echo (print) arguments .........................................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description for: execute a do list ................................................................................................................ see sh-posix(1) forder(1): forder .......................................................................................................... convert file data order foreach: initiate repetitive loop .....................................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description kdestroy(1): kdestroy .............................................................................................. destroy Kerberos tickets kermit(1): kermit ........................ C-Kermit 8.0 communications software for serial and network connections: modem dialing, file transfer and management, terminal connections, character-set translation, numeric and alpha paging, and script programming keylogin(1): keylogin .............
Table of Contents Volumes One and Two Entry Name(Section): name Description lpfilter(1): divpage, fontdl, lprpp, plotdvr, printstat, reverse ........................................................................................................ filters invoked by lp interface scripts lprpp: filters invoked by lp interface scripts ............................................................................... see lpfilter(1) lpstat(1): lpstat .................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description nsquery(1): nsquery ........................................................... query the Name Service Switch backend libraries nsupdate(1): nsupdate ....................................................................................... Dynamic DNS update utility od(1): od, xd ......................................................................................................... octal and hexadecimal dump odump(1): odump ........
Table of Contents Volumes One and Two Entry Name(Section): name Description read(1): read ................................................................................................... read a line from standard input read: input and parse a line ................................................................................................................ see ksh(1) read: input and parse a line .....................................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description slp(1): slp ...................................................................................... set printing options for a non-serial printer soelim(1): soelim ............................................................................................. eliminate .so’s from nroff input sort(1): sort ........................................................................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description umask: set permissions mask for creating new files ............................................................................. see ksh(1) umask: set permissions mask for creating new files ................................................................... see sh-posix(1) umodem(1): umodem ............................................................................
Table of Contents Volumes One and Two Entry Name(Section): name Description who(1): who ........................................................................................ who is currently logged in on the system whoami(1): whoami ........................................................................................... print effective current user ID whois(1): whois ......................................................................................
Notes 24 Hewlett-Packard Company HP-UX 11i Version 3: February 2007
Section 1 Part 1 User Commands A-M
Section 1 Part 1 User Commands A-M
intro(1) intro(1) NAME intro - introduction to command utilities and application programs DESCRIPTION This section describes commands accessible by users, as opposed to system calls in Section (2) or library routines in Section (3), which are accessible by user programs.
intro(1) intro(1) NETWORKING FEATURES Information under this heading is applicable only if you are using the networking feature described there (such as NFS). RETURN VALUE DIAGNOSTICS Discusses various values returned upon completion of program calls. ERRORS EXAMPLES WARNINGS DEPENDENCIES Lists error conditions and their corresponding error message or return value. Discusses diagnostics indications that may be produced. Self-explanatory messages are not listed.
adb(1) adb(1) NAME adb - absolute debugger SYNOPSIS adb [-h] adb adb adb adb adb a [-n -o] [-w ] [-I path] kernelfile memfile [-n -o] [-w ] [-I path] kernelfile crashdir [-n -o] [-w ] [-I path] crashdir [-n -o] [-w ] [-I path] [objfile] [corefile] [-n -o] [-w ] [-I path] -P pid [execfile] DESCRIPTION The adb command executes a general-purpose debugging program that is sensitive to the underlying architecture of the processor and operating system on which it is run It can be used to examine files
adb(1) adb(1) -I path path specifies a list of directories where files read with < or << (see below) are sought. This list has the same syntax as, and similar semantics to, the PATH shell variable; the default is .:/usr/lib/adb. -n Specify the normal mode. This is the default on Itanium systems. This option is mutually exclusive with the -o option. The last one specified takes effect. -o Specify backward compatibility mode. This is the default on PA-RISC systems.
adb(1) adb(1) In backward compatibility mode, a variable is a single numeral or alphabet except for registers and the prefix letter is >. Here is a list of variables supported in both modes. 9 b d t e s m The count on the last $< command. a The base address of the data segment. The data segment size. The text segment size. The entry point. The stack segment size. The ‘‘magic’’ number as defined in On entry, b, d, and t are set from the headers in the current memory file.
adb(1) adb(1) Traditional Form Commands The following categories of commands are specified in the traditional command form: • • • • • a File commands Keyword commands Process commands Thread commands Shell commands In backward compatibility mode: • Variable commands File commands These commands operate on the current object file or the current memory file and are used to read, write, etc.
adb(1) adb(1) W It has same behavior as modifier / with an implicit size of 4. It sets dotincr to 4. dot is set as for w. m *m It has same behavior as modifier > with an implicit index of 0. It has same behavior as modifier > with an implicit index of 1. a For these modifiers, no explicit size or index can be mentioned. These modifiers are deprecated. Keyword Commands Run the Keyword Command Form using the traditional command form by prefixing the command with $.
adb(1) adb(1) d [ num | * ] Deletes all breakpoints at address in the current subprocess, if it is specified. If * is specified, it deletes all the current subprocess breakpoints. If num is specified, breakpoint with number num is deleted. en [ num | * ] Enables all breakpoints at address in the current subprocess, if it is specified. If * is specified, it enables all the current subprocess breakpoints. If num is specified, breakpoint with number num is enabled.
adb(1) adb(1) Variable Commands This is supported in backward compatibility mode only. It consists of a > followed by a variable, var and an optional value. This action assigns value to the variable or register named by var. If not specified, value is assumed to be the value of dot . This behavior is deprecated. a Keyword Form Commands All commands in this form consist of a keyword followed by a variable number of arguments. In backward compatibility mode, a $ must precede these keyword form commands.
adb(1) adb(1) d [ radix ] Set the default radix to radix. In backward compatibility mode, this command has a non-standard deprecated behavior. If radix is not mentioned, address is taken as radix. a x q v m The default radix for all integers input is set to hexadecimal. z zt Print a list of signals and how they are handled for the current subprocess. k Print all DLKM modules or shared libraries. Quit adb . Print the value of all variables. Print the address map.
adb(1) adb(1) 1. Conversion Specifier Each conversion specifier consists of an optional count or pspec followed by an optional size specifier character, followed by a conversion specifier character. count This is available only for the traditional style format string. The count specifies the number of times this conversion specifier is to be repeated. If not specified, count is assumed to be 1. pspec This is available only for the printf -style format string.
adb(1) adb(1) Size Specifier Character Same as size specifier character of conversion specifier. Dot operator character This can be one of these a Increment dotincr by count times size. v z Decrement dotincr by count times size. For example: =5bv, =5bv5bz Backward Compatibility Mode In backward compatibility mode, the traditional style can be a conversion specifier, dot operator, spacing specifier, or a literal string. 1.
adb(1) adb(1) a 0 p n The value of dot is printed in symbolic form. The object is printed in symbolic form. The value of n s machine-dependent. For example: main=ba, ’a’=c, main?10box 2. Dot Operator a A dot operator consists of an optional count followed by a dot operator character. count Same as that of count of conversion specifier.
adb(1) adb(1) macropath List of directories to be searched for adb macros. Initial value is .:/usr/lib/adb. pager Pager command used by adb. Initial value is more -c. backcompat Set to 1 if adb is in backward compatibility mode. Initial value depends on the host processor. a Note adb64 is a symbolic link to adb . This symbolic link is maintained for backward compatibility with some old scripts which may be using adb64 .
adjust(1) adjust(1) NAME adjust - simple text formatter SYNOPSIS adjust [-b] [-c|-j|-r] [-m column] [-t tabsize] [files]... DESCRIPTION The adjust command is a simple text formatter for filling, centering, left and right justifying, or only right justifying text paragraphs, and is designed for interactive use. It reads the concatenation of input files (or standard input if none are given) and produces on standard output a formatted version of its input, with each paragraph formatted separately.
adjust(1) adjust(1) adjust also has a rudimentary understanding of tagged paragraphs (such as this one) when filling. If the second line of a paragraph is indented more than the first, and the first line has a word beginning at the same indentation as the second line, the input column position of the tag word or words (prior to the one matching the second line indentation) is preserved. Tag words are passed through without change of column position, even if they extend beyond the right margin.
adjust(1) adjust(1) WARNINGS This program is designed to be simple and fast. It does not recognize backslash to escape whitespace or other characters. It does not recognize tagged paragraphs where the tag is on a line by itself. It knows that lines end in newline or null, and how to deal with tabs and backspaces, but it does not do anything special with other characters such as form feed (they are simply ignored). For complex operations, standard text processors are likely to be more appropriate.
admin(1) admin(1) NAME admin - create and administer SCCS files SYNOPSIS admin -i[name] [-n] [-b] [-a login] ... [-d flag[flag-val] ] ... [-f flag[flag-val] ] ... [-m mrlist] ... [-r rel] [-t[name] ] [-y [comment ] ] file ... admin -n [-a login] ... [-d flag[flag-val] ] ... [-f flag[flag-val] ] ... [-m mrlist] ... [-t[name] ] [-y [comment ] ] file ... admin [-a login] ... [-e login] ... [-d flag[flag-val] ] ... [-m mrlist] ... [-r rel] [-t[name] ] file ... admin -h file ... admin -z file ...
admin(1) -f flag admin(1) This option specifies a flag, and possibly a value for the flag, to be placed in the SCCS file. Several -f options can be supplied on a single admin command line. The allowable flags and their values are: b Allows use of the -b option on a get command (see get(1)) to create branch deltas. cceil The highest release (i.e., "ceiling"), a number less than or equal to 9999, which can be retrieved by a get command for editing. The default value for an unspecified c flag is 9999.
admin(1) a -d flag admin(1) v[pgm] Causes delta to prompt for Modification Request (MR) numbers as the reason for creating a delta. The optional value specifies the name of a (MR) number validity checking program (see delta(1)). (If this flag is set when creating an SCCS file, the m option must also be used even if its value is null). x Causes get to create files with execute permissions. Causes removal (deletion) of the specified flag from an SCCS file.
admin(1) admin(1) to the empty string, a default of C (see lang(5)) is used instead of LANG . If any internationalization variable contains an invalid setting, admin behaves as if all internationalization variables are set to C. See environ(5). International Code Set Support Single-byte and multi-byte character code sets are supported. a DIAGNOSTICS Use sccshelp(1) for explanations. WARNINGS Number of lines in a SCCS file cannot exceed 99,999 lines.
answer(1) answer(1) NAME answer - phone message transcription system SYNOPSIS a answer [-pu] DESCRIPTION The answer interactive program helps you to transcribe telephone (and other) messages into electronic mail. The program uses your personal elm alias database and the system elm alias database, allowing you to use aliases to address the messages. Options answer supports the following options: -p Prompt for phone-slip-type message fields. -u Allow addresses that are not aliases.
answer(1) answer(1) > And here is the message. > ----------------------------------------------------------------- a Message to: albert einstein Sorry, could not find ’albert einstein’ [a_einstein] in list! Message to: john jones address ’mrjones@companybee.com (John P. Jones)’ Enter message for john jones ending with a blank line.
answer(1) $HOME/.elm/aliases.pag $HOME/.elm/aliases.text /var/mail/.elm/aliases /var/mail/.elm/aliases.dir /var/mail/.elm/aliases.pag /var/mail/.elm/aliases.text /tmp/snd. pid a answer(1) User alias database hash table User alias source text System alias database data table System alias database directory table System alias database hash table System alias source text Outbound mail message edit buffer AUTHOR answer was developed by HP. SEE ALSO elm(1), newalias(1).
ar(1) ar(1) NAME ar - create and maintain portable archives and libraries SYNOPSIS ar [-]key [-][modifier ...] [posname] afile [name ...] DESCRIPTION The ar command maintains groups of files combined into a single archive file. Its main use is to create and update library files as used by the link editor (see ld(1)). It can be used, however, for any similar purpose. The magic string and file headers used by ar consist of printable ASCII characters.
ar(1) ar(1) The following list describes the optional modifier characters: a b c a Position the files after the existing positioning file specified by posname . Place the new files before the existing positioning file specified by posname . Suppress the message normally produced when afile is created. For r and q operations, ar normally creates afile if it does not already exist. f Truncate the named file names to 14 bytes before performing operations on an archive.
ar(1) ar(1) p: x: v, f, F, s v, f, F, s, C, T EXTERNAL INFLUENCES Environment Variables The following internationalization variables affect the execution of ar : a LANG Determines the locale category for native language, local customs and coded character set in the absence of LC_ALL and other LC_* environment variables. If LANG is not specified or is set to the empty string, a default of C (see lang(5)) is used instead of LANG .
ar(1) ar(1) f1 f3 f2 f4 Note that the relative order of f2 and f3 has not changed. The second command says "move f3 after f2 in newlib.a", creating the order: f1 f2 f3 f4 a The third command then replaces files f2 and f3 . Since files f2 and f3 both already existed in the archive, this sequence of commands could not be simply replaced by: ar ra f1 newlib.
as(1) as(1) NAME as - assembler SYNOPSIS Remarks For Integrity systems, see as_ia(1). a For PA-RISC systems, see as_pa(1). Use the uname command to determine your system type. uname -m returns ia64 on Integrity systems. All other values represent PA-RISC systems. SEE ALSO as_ia(1), as_pa(1), uname(1).
as_ia(1) as_ia(1) Integrity Systems Only NAME as_ia: as - assembler for Integrity systems a SYNOPSIS as [-eVw ] [+A32 ] [+A64 ] [+E32 ] [-elf32 ] [-elf64 ] -W num[,num]... -We num[,num]... [file] -H lvl[=what[,what]...] [-o outfile] Remarks This manpage describes as on Integrity systems. For as on PA-RISC systems, see as_pa(1). DESCRIPTION as assembles the named source file file, or the standard input if file is not specified.
as_ia(1) Integrity Systems Only as_ia(1) International Code Set Support Single- and multi-byte character code sets are supported. WARNINGS The assembler does not check dependencies. DIAGNOSTICS When syntactic or semantic errors occur, a single-line diagnostic is displayed on standard error, together with the line number and the file name in which it occurred. FILES /usr/lib/nls/C/as.cat a.out assembler error message catalog default assembler output file SEE ALSO cc(1), ld(1), elf(3E).
as_pa(1) as_pa(1) PA-RISC Systems Only NAME as_pa: as - assembler for PA-RISC systems a SYNOPSIS as [-eflsuV ] [-o objfile] [-p number] [-v xrfile] [-w[number] ]... [file]... [+DA architecture] [+z ] [+Z ] Remarks This manpage describes as on PA-RISC systems. For as on Integrity systems, see as_ia(1). DESCRIPTION The as command assembles source text from files or standard input and produces a relocatable object file suitable for the link editor, ld (see ld(1)).
as_pa(1) as_pa(1) PA-RISC Systems Only The assembler uses the following precedence to determine the target architecture. 1. Use the .LEVEL directive within the assembly source file. 2. Use the +DA command-line specification. 3. Use the default architecture of PA_RISC_1.0 . +z,+Z Both of these options are used in the building of shared libraries. For a more complete discussion regarding these options, see the manual HP-UX Linker and Libraries User’s Guide.
asa(1) asa(1) NAME asa - interpret ASA carriage control characters a SYNOPSIS asa [files] DESCRIPTION asa interprets the output of FORTRAN programs that utilize ASA carriage control characters. It processes either the files whose names are given as arguments, or the standard input if - is specified or if no file names are given. The first character of each line is assumed to be a control character.
at(1) at(1) NAME at, batch - execute batched commands immediately or at a later time SYNOPSIS Enter commands from standard input to run at a specified time: at [-m] [ -q queue] -t spectime commands eof a at [-m] [-q queue] time [date] [next timeunit +count timeunit] commands eof Enter commands from a file to run at a specified time: at -f job-file [-m] [-q queue] -t spectime at -f job-file [-m] [-q queue] time [date] [next timeunit +count timeunit] List scheduled jobs: at -d job-id ...
at(1) at(1) privileges is able to display information about all jobs. -f job-file -l [job-id ...] -m a Read in the commands contained in job-file instead of using standard input. List the jobs specified. If no job-ids are given, all jobs are listed. Send mail to the invoking user after the job has run, announcing its completion. Unless redirected elsewhere within the job, standard output and standard error produced by the job are automatically mailed to the user as well.
at(1) at(1) comma (,). If defined in langinfo(5), special date unit characters can be present. A field having a value greater than 31 is treated as the year field and the remaining two fields in the date string are treated as month and day fields. Otherwise, if a given date is ambiguous (such as 2/5 or 2/5/10 ), the D_T_FMT string (if defined in langinfo(5)) is used to resolve the ambiguity. Two special days, today and tomorrow , are also recognized.
at(1) at(1) positive number or the string INFINITE (the default value). If the value is set to INFINITE , batch requests a unique job-id until it successfully receives one. The at command can schedule only one job per queue for a given time. If a job is already scheduled for a given time, the at command schedules the new job for the next second. You can remove this limitation by setting the variable MULTI_JOB_SUPPORT to 1 in the /etc/default/cron file.
at(1) at(1) at -f $HOME/future -t201312271220.00 Redirect standard error to a pipe (useful in a shell procedure). Note that the sequence of the output redirection specifications is significant. Standard error is redirected to where standard output is going; standard output is redirected to a file; the original "standard output" (which now consists of the former standard error) is piped to the mail program.
at(1) at(1) AUTHOR at was developed by AT&T and HP. FILES /etc/default/cron /usr/bin/sh /usr/lib/cron/at.allow /usr/lib/cron/at.deny /var/adm/cron /var/adm/cron/.proto a /var/adm/cron/queuedefs /var/spool/cron/atjobs Configuration file POSIX shell List of allowed users List of denied users Main cron directory This file contains a set of shell commands which are added to the at job file to make the environment for the at job same as the current environment. See proto(4).
attributes(1) attributes(1) NAME attributes - describe an audio file SYNOPSIS /opt/audio/bin/attributes filename DESCRIPTION This command provides information about an audio file, including file format, data format, sampling rate, number of channels, data length and header length. EXAMPLE The following is an example of using attributes on an audio file supplied with HP-UX. $ /opt/audio/bin/attributes /opt/audio/sounds/welcome.au File Name: /opt/audio/sounds/welcome.
awk(1) awk(1) NAME awk - pattern-directed scanning and processing language a SYNOPSIS awk [-Ffs ] [-v var =value ] [ program -f progfile ... ] [ file ... ] DESCRIPTION awk scans each input file for lines that match any of a set of patterns specified literally in program or in one or more files specified as -f progfile. With each pattern there can be an associated action that is to be performed when a line in a file matches the pattern.
awk(1) awk(1) The print statement prints its arguments on the standard output (or on a file if >file or >> file is present or on a pipe if |cmd is present), separated by the current output field separator, and terminated by the output record separator. file and cmd can be literal names or parenthesized expressions. Identical string values in different statements denote the same open file. The printf statement formats its expression list according to the format (see printf(3S)).
awk(1) awk(1) A pattern can consist of two patterns separated by a comma; in this case, the action is performed for all lines from an occurrence of the first pattern though an occurrence of the second. A relational expression is one of the following: expression matchop regular-expression expression relop expression expression in array-name (expr,expr,... ) in array-name a where a relop is any of the six relational operators in C, and a matchop is either ˜ (matches) or !˜ (does not match).
awk(1) awk(1) The arguments in ARGV can be modified or added to; ARGC can be altered. As each input file ends, awk will treat the next non-null element of ARGV , up to the current value of ARGC -1, inclusive, as the name of the next input file. Thus, setting an element of ARGV to null means that it will not be treated as an input file. The name - indicates the standard input.
awk(1) awk(1) International Code Set Support Single- and multi-byte character code sets are supported except that variable names must contain only ASCII characters and regular expressions must contain only valid characters. a DIAGNOSTICS awk supports up to 199 fields ($1, $2, ..., $199 ) per record.
banner(1) banner(1) NAME banner - make posters in large letters SYNOPSIS banner strings DESCRIPTION banner prints its arguments (each up to 10 characters long) in large letters on the standard output. b Each argument is printed on a separate line. Note that multiple-word arguments must be enclosed in quotes in order to be printed on the same line.
basename(1) basename(1) NAME basename, dirname - extract portions of path names SYNOPSIS basename string [suffix] dirname [string] b DESCRIPTION basename deletes any prefix ending in / and the suffix (if present in string) from string, and prints the result on the standard output. If string consists entirely of slash characters, string is set to a single slash character. If there are any trailing slash characters in string, they are removed.
bc(1) bc(1) NAME bc - arbitrary-precision arithmetic language SYNOPSIS bc [-c] [-l] [file...] DESCRIPTION bc is an interactive processor for a language that resembles C but provides unlimited-precision arithmetic. It takes input from any files given, then reads the standard input. Options bc recognizes the following command-line options: -c Compile only. bc is actually a preprocessor for dc which bc invokes automatically (see dc(1)).
bc(1) bc(1) Statements E { S ; ... ; S } if ( R ) S while ( R ) S for ( E ; R ; E ) S null statement break quit b Function Definitions define L ( L ,..., L ) { auto L, ... , L S; ... S return ( E ) } Functions in − l Math Library Functions in the -l math library include: s(x) c(x) e(x) l(x) a(x) j(n,x) sine cosine exponential log arctangent Bessel function All function arguments are passed by value. Trigonometric angles are in radians where 2 pi radians = 360 degrees.
bc(1) bc(1) WARNINGS There are currently no && (AND) or || (OR) comparisons. The for statement must have all three expressions. quit is interpreted when read, not when executed. bc’s parser is not robust in the face of input errors. Some simple expression such as 2+2 helps get it back into phase. The assignment operators: =+ =- =* =/ =% and =ˆ are obsolete. Any occurences of these operators cause a syntax error with the exception of =- which is interpreted as = followed by a unary minus.
bdiff(1) bdiff(1) NAME bdiff - diff for large files SYNOPSIS bdiff file1 file2 [ n ] [-s] b DESCRIPTION bdiff compares two files and produces output identical to what would be produced by diff (see diff(1)), specifying changes that must be made to make the files identical. bdiff is designed for handling files that are too large for diff , but it can be used on files of any length. bdiff processes files as follows: • Ignore lines common to the beginning of both files.
bdiff(1) bdiff(1) FILES /tmp/bd?????? SEE ALSO diff(1).
bs(1) bs(1) NAME bs - a compiler/interpreter for modest-sized programs SYNOPSIS bs [ file [ args ] ] b DESCRIPTION bs is a remote descendant of BASIC and SNOBOL4 with some C language added. bs is designed for programming tasks where program development time is as important as the resulting speed of execution. Formalities of data declaration and file/process manipulation are minimized.
bs(1) bs(1) does not cause stored statements to execute (see run below). for name = expression expression statement for name = expression expression ... next for expression , expression , expression statement for expression , expression , expression b ... next The for statement repetitively executes a statement (first form) or a group of statements (second form) under control of a named variable.
bs(1) bs(1) stop Execution of internal statements is stopped. bs reverts to immediate mode. trace [expression] The trace statement controls function tracing. If the expression is null (or evaluates to zero), tracing is turned off. Otherwise, a record of user-function calls/returns is printed. Each return decrements the trace expression value. while expression statement while expression b ... next while is similar to for except that only the conditional expression for loop-continuation is given.
bs(1) bs(1) ++ name - - name !expression Increments the value of the variable (or array reference). The result is the new value. expression operator expression Common functions of two arguments are abbreviated by the two arguments separated by an operator denoting the function. Except for the assignment, concatenation, and relational operators, both operands are converted to numeric form before the function is applied. Decrements the value of the variable. The result is the new value.
bs(1) bs(1) possible to know whether a is a number or a string when the format call is coded, coercing a to the type required by f by either adding zero (for e or f format) or concatenating (_) the null string (for s format) should be considered. index( x , y ) returns the number of the first position in x that any of the characters from y matches. No match yields zero. b trans( s , f, t ) Translates characters of the source s from matching characters in f to a character in the same position in t.
bs(1) bs(1) interrogate operator, returns null) if there was no valid subscript for the previous item call. The name argument should not be quoted. Since exact table sizes are not defined, the interrogation operator should be used to detect end-of-table; for example: table("t", 100) ... # If word contains "party", the following expression adds one # to the count of that word: ++t[word] ...
bs(1) bs(1) plot(12, x1, y1, x2, y2 ) causes subsequent x (y) coordinates to be multiplied by x1 (y1) and then added to x2 (y2) before they are plotted. The initial scaling is plot(12, 1.0, 1.0, 0.0, 0.0) . Some requests do not apply to all plotters. All requests except zero and twelve are implemented by piping characters to tplot. b Each statement executed from the keyboard re-invokes tplot , making the results unpredictable if a complete picture is not done in a single operation.
bs(1) bs(1) Input/Output examples: # Copy file oldfile to file newfile. open("read", "oldfile", "r") open("write", "newfile", "w") ... while ?(write = read) ... # close "read" and "write": close("read") close("write") # Pipe between commands. open("ls", "!ls *", "r") open("pr", "!pr -2 -h ’List’", "w") while ?(pr = ls) ... ... # be sure to close (wait for) these: close("ls") close("pr") b WARNINGS The graphics mode (plot ...
cal(1) cal(1) NAME cal - print calendar SYNOPSIS cal [ [ month ] year ] c DESCRIPTION cal prints a calendar for the specified year. If a month is also specified, a calendar just for that month is printed. If neither is specified, a calendar for the present month is printed. year can be between 1 and 9999. month is a decimal number between 1 and 12. The calendar produced is a Gregorian calendar. EXTERNAL INFLUENCES For information about the UNIX Standard environment, see standards(5).
cal(1) cal(1) STANDARDS CONFORMANCE cal : SVID2, SVID3, XPG2, XPG3, XPG4 c HP-UX 11i Version 3: February 2007 −2− Hewlett-Packard Company 89
calendar(1) calendar(1) NAME calendar - reminder service SYNOPSIS calendar [-] DESCRIPTION calendar consults the file calendar in the current directory and prints out lines containing today’s or tomorrow’s date anywhere in the line. On weekends, ‘‘tomorrow’’ extends through Monday. c When a - command-line argument is present, calendar searches for the file calendar in each user’s home directory, and sends any positive results to the user by mail (see mail(1)).
calendar(1) calendar(1) Jim’s birthday is on the 3. February 30/3/87 - quarter end review 26-4 Management council meeting at 1:00 pm It is first of the month ( 1/* ); status report due. WARNINGS To get reminder service, either your calendar must be public information or you must run calendar from your personal crontab file, independent of any calendar - run systemwide. Note that if you run calendar yourself, the calendar file need not reside in your home directory.
cat(1) cat(1) NAME cat - concatenate, copy, and print files SYNOPSIS cat [-benrstuv ] file ... DESCRIPTION cat reads each file in sequence and writes it on the standard output. Thus: cat file c prints file on the default standard output device; cat file1 file2 > file3 concatenates file1 and file2, and places the result in file3. If - is appears as a file argument, cat uses standard input. To combine standard input and other files, use a combination of - and file arguments.
cat(1) cat(1) International Code Set Support Single- and multi-byte character code sets are supported. RETURN VALUE Exit values are: 0 >0 Successful completion. Error condition occurred.
cc_bundled(1) cc_bundled(1) (Bundled C Compiler - Limited Functionality) NAME cc_bundled: cc - bundled C compiler SYNOPSIS cc [options] files DESCRIPTION cc invokes the HP-UX bundled C compiler. C source code is compiled directly to object code. The command uses the ecom (Itanium(R)-based systems) or ccom (PA-RISC, Precision Architecture) compiler for preprocessing, syntax and type checking, as well as for code generation. c cc accepts several types of arguments as files: .
cc_bundled(1) cc_bundled(1) (Bundled C Compiler - Limited Functionality) -b Cause the linker, ld, to create a shared library rather than a normal executable file. For details see ld(1), HP-UX Linker and Libraries Online User’s Guide and the Programming on HP-UX manual. -c Suppress the link edit phase of the compilation, and force an object (.o ) file to be produced for each .c or .i file even if only one program is compiled. Object files produced from C programs must be linked before being executed.
cc_bundled(1) cc_bundled(1) (Bundled C Compiler - Limited Functionality) Suppress warning messages. -w -Wx,arg1[,arg2...] Pass the comma-separated argument(s) to subprocess x, where x can assume one of the values listed under the -t option as well as d (driver program) but not x (all subprocesses). The -W option specification allows additional, implementation-specific options to be recognized by the compiler driver. Itanium-based Systems Only Options -z Do not bind anything to address zero.
cc_bundled(1) cc_bundled(1) (Bundled C Compiler - Limited Functionality) Other arguments are taken to be HP C compatible object files, typically produced by an earlier cc run, or perhaps libraries of HP cc compatible routines. These files, together with the results of any compilations specified, are linked (in the order given) to produce an executable program with the name a.out . Pointers Accessing the object of a NULL (zero) pointer is technically illegal, but many systems have permitted it in the past.
cc_bundled(1) cc_bundled(1) (Bundled C Compiler - Limited Functionality) /usr/ccs/lbin/ecom C Compiler (Itanium-based systems) /usr/ccs/lbin/ccom C Compiler (PA-RISC systems) /usr/ccs/lbin/cpp preprocessor, to assemble .s files /usr/lib/nls/msg/$LANG/ecc.cat C compiler message catalog (Itanium-based systems) /usr/lib/nls/msg/$LANG/cc.cat C compiler message catalog (PA-RISC systems) /usr/ccs/bin/as assembler, as(1) /usr/ccs/bin/ld link editor, ld(1) /usr/ccs/lib/crt0.
cc_bundled(1) cc_bundled(1) (Bundled C Compiler - Limited Functionality) Miscellaneous strip(1) crt0(3) end(3C) exit(2) strip symbol and line number information from an object file execution startup routine symbol of the last locations in program termination of a process Tutorials and Standards Documents American National Standard for Information Systems - Programming language C, ANS X3.159-1989. See the HP C Online help.
cd(1) cd(1) NAME cd - change working directory SYNOPSIS cd [ directory ] c DESCRIPTION If directory is not specified, the value of shell parameter HOME is used as the new working directory. If directory specifies a complete path starting with /, ., or .. , directory becomes the new working directory. If neither case applies, cd tries to find the designated directory relative to one of the paths specified by the CDPATH shell variable.
cd(1) cd(1) SEE ALSO csh(1), pwd(1), ksh(1), sh-posix(1), sh(1), chdir(2). STANDARDS CONFORMANCE cd: SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
cdc(1) cdc(1) NAME cdc - change the delta commentary of an SCCS delta SYNOPSIS cdc -r SID [-m[ mrlist ] ] [-y[ comment ] ] files c DESCRIPTION The cdc command changes the delta commentary, for the SID specified by the -r option, of each named SCCS file. Delta commentary is defined to be the Modification Request (MR) and comment information normally specified via the delta(1) command (-m and -y options).
cdc(1) cdc(1) International Code Set Support Single- and multi-byte character code sets are supported. DIAGNOSTICS Use sccshelp(1) for explanations. EXAMPLES Add bl78-12345 and bl79-00001 to the MR list, remove bl77-54321 from the MR list, and add the comment trouble to delta 1.6 of s.file : cdc -r1.6 -m"bl78-12345 !bl77-54321 bl79-00001" -ytrouble s.file The following does the same thing: cdc -r1.6 s.
cerupdate(1) cerupdate(1) NAME cerupdate - update the Common Error Repository (CER) with error metadata SYNOPSIS /opt/sfm/bin/cerupdate -d extract-dir-path [-t logfile] [-l trace-level ] -p public-key [-h] c DESCRIPTION The cerupdate command updates the Common Error Repository (CER) with error metadata supplied by HP, Independent Hardware Vendors (IHV), and Independent Software Vendors (ISV). CER is a database, which is a part of Error Management Technology (EMT).
cerupdate(1) cerupdate(1) FILES /opt/sfm/bin/cerupdate The binary file used for updating the CER. /var/opt/sfm/conf/cerupdate.conf The configuration file used to configure the trace levels. AUTHOR cerupdate was developed by HP. c SEE ALSO emtui(1).
chacl(1) chacl(1) NAME chacl - add, modify, delete, copy, or summarize access control lists (ACLs) of files SYNOPSIS /usr/bin/chacl acl file ... chacl -r acl file ... chacl -d aclpatt file ... chacl -f fromfile tofile ... chacl - [ z Z F ] file... c DESCRIPTION chacl extends the capabilities of chmod(1), by enabling the user to grant or restrict file access to additional specific users and/or groups.
chacl(1) chacl(1) continues, and eventually returns non-zero. -f fromfile tofile Copy the ACL from fromfile to the specified tofile, transferring ownership, if necessary (see acl(5), chown(2), or chownacl(3C)). fromfile can be - to represent standard input. This option implies the -r option. If the owner and group of fromfile are identical to those of tofile, chacl -f is identical to: chacl -r ‘lsacl fromfile‘ tofile ...
chacl(1) chacl(1) chacl -r ’(@.%,rw-)’ - test Delete from file myfile the specific access rights, if any, for user 165 in group 13. Note that this is different from adding an ACL entry that restricts access for that user and group. The user’s resulting access rights depend on the entries remaining in the ACL. The command also deletes all entries for user jpc that have a read bit turned on (the asterisk can be used as a wildcard in the ACL pattern for user, group, or access mode): chacl -d ’165.13, jpc.
chatr(1) chatr(1) NAME chatr - change program’s internal attributes SYNOPSIS Remarks For Integrity systems, see chatr_ia(1). For PA-RISC systems, see chatr_pa(1). Use the uname command to determine your system type. uname -m returns ia64 on Integrity systems. All other values represent PA-RISC systems. SEE ALSO chatr_ia(1), chatr_pa(1), uname(1).
chatr_ia(1) chatr_ia(1) Integrity Systems Only NAME chatr_ia: chatr - change program’s internal attributes on Integrity systems c SYNOPSIS Format 1: for files with a single text segment and a single data segment chatr [-s] [-z|Z] [-l library] [-B mode] [+as mode] [+b flag] [+cd flag] [+ci flag] [+dbg flag] [+es flag] [+gst flag] [+gstsize size] [+id flag] [+k flag] [+l library] [+md flag] [+mergeseg flag] [+mi flag] [+o flag] [+pd size] [+pi size] [+s flag] [+z flag] [+I flag] file ...
chatr_ia(1) chatr_ia(1) Integrity Systems Only disable , respectively enable and disable use of the embedded path list. However, you cannot use disable on an ELF file, and a warning message is issued. See the +s option. You can use the +b option to enable the embedded path for filter libraries. +c flag (Format 2 only.) Enable or disable the code bit for a specified segment. If this is enabled, it is denoted by the c flag for the segment listing in the chatr output.
chatr_ia(1) +o flag chatr_ia(1) Integrity Systems Only Enable or disable the DF_ORIGIN flag to control use of $ORIGIN in calculating the absolute path of the working directory. Enabling the flag instructs the dynamic loader to calculate the absolute path of the current working directory when the parent module (object module, shared library, or executable) is first loaded. The loader then uses this path for all occurrences of $ORIGIN .
chatr_ia(1) Integrity Systems Only chatr_ia(1) should suspect malicious activity and take appropriate action. HP-UX provides two options to permit legitimate execution from a program’s stack(s). Combinations of these two options help make site-specific tradeoffs between security and compatibility. The first method is the use of the +es option of chatr and affects individual programs.
chatr_ia(1) chatr_ia(1) Integrity Systems Only Illegal options If you use an illegal option, chatr returns the number of non-option words present after the first illegal option.
chatr_ia(1) chatr_ia(1) Integrity Systems Only To set the modify bit of a specific segment, first find the index or address number of the segment. chatr a.out a.out: 32-bit ELF executable shared library dynamic path search: LD_LIBRARY_PATH enabled first SHLIB_PATH enabled second embedded path enabled third /CLO/TAHOE_BE/usr/lib/hpux32 shared library list: libsin.so libc.so.
chatr_ia(1) Integrity Systems Only chatr_ia(1) Texts and Tutorials HP-UX Linker and Libraries Online User Guide (See the +help option) HP-UX Linker and Libraries User’s Guide (See manuals(5) for ordering information) c 116 Hewlett-Packard Company −7− HP-UX 11i Version 3: February 2007
chatr_pa(1) chatr_pa(1) PA-RISC Systems Only NAME chatr_pa: chatr - change program’s internal attributes on PA-RISC systems SYNOPSIS PA-RISC 32-bit SOM chatr chatr [-nqsMN [z|Z] ] [-l library] [-B mode] [+b flag] [+dbg flag] [+es flag] [+mergeseg flag] [+gst flag] [+gstbuckets size] [+gstsize size] [+k flag] [+l library] [+pd size] [+pi size] [+plabel_cache flag] [+q3p flag] [+q4p flag] [+r flag] [+s flag] [+z flag] file ...
chatr_pa(1) PA-RISC Systems Only chatr_pa(1) disable , respectively enable and disable use of the embedded path list. However, you cannot use disable on an ELF (PA-RISC 64-bit) file and a warning message is issued. See the +s option. You can use the +b option to enable the embedded path for filter libraries. +dbg flag c Controls the mapping of shared library text segments privately. The flag values, enable and disable , toggle the request on and off.
chatr_pa(1) -Z PA-RISC Systems Only chatr_pa(1) Disable null pointer dereference trap. (This is the complement of the -z option.) Options For PA-RISC 32-bit SOM chatr Only -M Change file from EXEC_MAGIC to SHMEM_MAGIC . (This option is an interim solution until 64-bit addressability is available with a true 64-bit kernel. See chatr and Magic Numbers and Using SHMEM_MAGIC below.) -N Change file from SHMEM_MAGIC to EXEC_MAGIC .
chatr_pa(1) chatr_pa(1) PA-RISC Systems Only +mi Set the modification bit for the file’s text segment(s). OPTIONS FOR PA-RISC 64-bit ELF chatr (FORMAT 2) With common options: -s, -B mode, +k flag, +r flag, +s flag, +z flag. +c Set the code bit for a specified segment. +dz Enable or disable lazy swap allocation for dynamically allocated segments (such as the stack or heap). +m +p +sa +sall +si c Set the modification bit for a specified segment. Set the page size for a specified segment.
chatr_pa(1) chatr_pa(1) PA-RISC Systems Only If you see one of these messages, check with the program’s owner to determine whether this program is legitimately executing code from its stack. If it is, you can use one or both of the methods described below to make the program functional again. If the program is not legitimately executing code from its stack, you should suspect malicious activity and take appropriate action.
chatr_pa(1) chatr_pa(1) PA-RISC Systems Only Illegal options For PA-RISC 32-bit chatr , if you use an illegal option, chatr returns the number of words in the command line. For example, chatr +b enable +xyz enable returns 5 (because of illegal option +xyz ). chatr +b enable +xyz enable +mno file1 file2 returns 8. For PA-RISC 64-bit chatr, if you use an illegal option, chatr returns the number of non-option words present after the first illegal option.
chatr_pa(1) chatr_pa(1) PA-RISC Systems Only chatr -B immediate -B nonfatal +s enable a.out Disallow run-time path lookup for the shared library /usr/lib/libc.sl that the shared library libfoo.sl depends on: chatr +l /usr/lib/libc.sl libfoo.sl Given segment index number 5 from a previous run of chatr , change the page size to 4 kilobytes: chatr +si 5 +p 4K average64 c AUTHOR chatr was developed by HP. SEE ALSO System Tools ld(1) Miscellaneous a.
checknr(1) checknr(1) NAME checknr - check nroff/troff files SYNOPSIS checknr [-s] [-f] [-a. x1 .y1.x2 .y2 ... c .xn .yn ] [-c. x1 .x2 .x3 ...c .xn ] [ file ... ] DESCRIPTION checknr searches a list of nroff or troff input files for certain kinds of errors involving mismatched opening and closing delimiters and unknown commands. If no files are specified, checknr searches the standard input. checknr looks for the following: • Font changes using \fx ... \fP . • Size changes using \sx ... \s0 .
chfn(1) chfn(1) NAME chfn - change user information used by finger command SYNOPSIS chfn chfn chfn chfn [login-name] -r files [login-name] -r nis [login-name] -r dce [login-name] c DESCRIPTION The chfn command changes the user information that is stored in the repository for the current logged-in user or for the user specified by login-name (see passwd(1)). The information is organized as four comma-separated subfields within the reserved (5th) field of the password file entry.
chfn(1) chfn(1) EXAMPLES The following is a sample run. The user’s input is shown in regular type. Name [Tracy Simmons]: Location (Ex: 47U-P5) []: 42L-P1 Office Phone (Ex: 1632) [77777]: 71863 Home Phone (Ex: 9875432) [4085551546]: none c WARNINGS The encoding of office and extension information is installation-dependent. For historical reasons, the user’s name, etc., are stored in the /etc/passwd file. This is an inappropriate place to store the information.
chkey(1) chkey(1) NAME chkey - change user’s secure RPC key pair SYNOPSIS chkey [ -p ] [ -s nis | files | ldap ] DESCRIPTION chkey is used to change a user’s secure RPC public key and secret key pair. chkey prompts for the old secure-rpc password and verifies that it is correct by decrypting the secret key. If the user has not already used keylogin to decrypt and store the secret key with keyserv , chkey registers the secret key with the local keyserv daemon.
chmod(1) chmod(1) NAME chmod - change file mode access permissions SYNOPSIS /usr/bin/chmod [-A] [-R] symbolic_mode_list file ... Obsolescent form /usr/bin/chmod [-A] [-R] numeric_mode file ... c DESCRIPTION The chmod command changes the permissions of one or more files according to the value of symbolic_mode_list or numeric_mode. You can display the current permissions for a file with the ls -l command (see ls(1)). Only the owner of a file, or a user with appropriate privileges, can change its mode.
chmod(1) chmod(1) = Delete permission from the existing file mode bits of who. Replace the existing mode bits of who with permission. permission One or more of the following letters: r w x s t X Add or delete the read permission for who. Add or delete the write permission for who. Add or delete the execute file (search directory) permission for who. Add or delete the set-owner-ID-on-file-execution or set-group-ID-on-fileexecution permission for who.
chmod(1) chmod(1) International Code Set Support Single- and multibyte character code sets are supported. RETURN VALUE Upon completion, chmod returns one of the following values: 0 Successful completion. >0 An error condition occurred.
chown(1) chown(1) NAME chown, chgrp - change file owner or group SYNOPSIS chown [-h] [-R [-H-L-P] ] owner[:group] file ... chgrp [-h] [-R [-H-L-P] ] group file ... DESCRIPTION The chown command changes the owner ID of each specified file to owner and optionally the group ID of each specified file to group. The chgrp command changes the group ID of each specified file to group. In order to change the owner or group, you must own the file and have the CHOWN privilege (see setprivgrp (1M)).
chown(1) chown(1) effect, being superseded by the file’s user:: perm and/or group:: perm entries. Options chown and chgrp recognize the following options: -h Change the owner or group of a symbolic link. By default, the owner or group of the target file that a symbolic link points to is changed. With -h, the target file that the symbolic link points to is not affected. If the target file is a directory, and you specify -h and -R, recursion does not take place.
chsh(1) chsh(1) NAME chsh - change default login shell SYNOPSIS chsh chsh chsh chsh login-name [shell] -r files login-name [shell] -r nis login-name [shell] -r dce login-name [shell] c DESCRIPTION The chsh command changes the login-shell for a user’s login name in the repository (see passwd(1)). The DCE repository (-r dce ) is only available if Integrated Login has been configured; see auth.adm(1M). If Integrated Login has been configured, other considerations apply.
chsh(1) chsh(1) AUTHOR chsh was developed by HP and the University of California, Berkeley. FILES /etc/shells /etc/ptmp c SEE ALSO chfn(1), csh(1), ksh(1), passwd(1), sh(1), sh-posix(1), getusershell(3C), pam(3), passwd(4), shells(4).
ci(1) ci(1) NAME ci - check in RCS revisions SYNOPSIS ci [options] file... DESCRIPTION ci stores new revisions into RCS files. Each file name ending in ,v is treated as an RCS file; all others are assumed to be working files. ci deposits the contents of each working file into the corresponding RCS file (see rcsintro(5)). If the RCS file does not exist, ci creates it and deposits the contents of the working file as the initial revision. The default number is "1.1". The access list is initialized to empty.
ci(1) ci(1) -q[rev] Quiet mode; diagnostic output is not printed. A revision that is not different from the preceding one is not deposited unless -f is given. -r[rev] Assigns the revision number rev to the checked-in revision, releases the corresponding lock, and deletes the working file. This is the default. If rev is omitted, ci derives the new revision number from the caller’s last lock.
ci(1) ci(1) to remove old revisions. RCS is designed to be used with TEXT files only. Attempting to use RCS with nontext (binary) files results in data corruption. AUTHOR ci was developed by Walter F. Tichy. SEE ALSO co(1), ident(1), rcs(1), rcsdiff(1), rcsmerge(1), rlog(1), rcsfile(4), acl(5), rcsintro(5).
ckconfig(1) ckconfig(1) NAME ckconfig - verify the path names of all the FTP configuration files. SYNOPSIS /usr/bin/ckconfig [-V] DESCRIPTION The ckconfig utility is used /etc/ftpd/ftpusers, /etc/ftpd/ftpgroups, /etc/ftpd/pids/*. c to verify the path names of the FTP configuration files, /etc/ftpd/ftpaccess, /etc/ftpd/ftpconversions, /etc/ftpd/ftphosts, /var/adm/syslog/xferlog, and This utility checks to see that all the FTP configuration files are in the path specified.
cksum(1) cksum(1) NAME cksum - print file checksum and sizes SYNOPSIS cksum [file ...] DESCRIPTION The cksum command calculates and prints to standard output a checksum for each named file, the number of octets in the file and the filename. cksum uses a portable algorithm based on a 32-bit Cyclic Redundancy Check. This algorithm finds a broader spectrum of errors than the 16-bit algorithms used by sum (see sum(1)). The CRC is the sum of the following expressions, where x is each byte of the file.
clear(1) clear(1) NAME clear - clear terminal screen SYNOPSIS clear c DESCRIPTION clear clears the terminal screen if it is possible to do so. It reads the TERM environment variable for the terminal type, then reads the appropriate terminfo database to determine how to clear the screen. FILES /usr/share/lib/terminfo/?/* terminal database files AUTHOR clear was developed by the University of California, Berkeley. SEE ALSO terminfo(4).
cmp(1) cmp(1) NAME cmp - compare two files SYNOPSIS cmp [-l] [-s] file1 file2 [skip1 [skip2]] DESCRIPTION cmp compares two files (if file1 or file2 is -, the standard input is used). Under default options, cmp makes no comment if the files are the same; if they differ, it announces the byte and line number at which the difference occurred. If one file is an initial subsequence of the other, that fact is noted.
co(1) co(1) NAME co - check out RCS revisions SYNOPSIS co [options] file... c DESCRIPTION co retrieves revisions from RCS files. Each file name ending in ,v is taken to be an RCS file. All other files are assumed to be working files. co retrieves a revision from each RCS file and stores it in the corresponding working file (see also rcsintro(5)). Revisions of an RCS file can be checked out locked or unlocked. Locking a revision prevents overlapping updates.
co(1) co(1) For 2-digit year input (yy) without the presence of the century field, the following interpretation is taken: [70 -99 , 00 -69 (1970-1999, 2000-2069)]. -r[rev] -sstate -w[login] -jjoinlist Retrieves the latest revision whose number is less than or equal to rev. If rev indicates a branch rather than a revision, the latest revision on that branch is retrieved. rev is composed of one or more numeric or symbolic fields separated by periods (.).
co(1) co(1) Access Control Lists (ACLs) Optional ACL entries should not be added to RCS files because they might be deleted. DIAGNOSTICS The RCS file name, the working file name, and the revision number retrieved are written to the diagnostic output. The exit status always refers to the last file checked out, and is 0 if the operation was successful, 1 if unsuccessful. c EXAMPLES Assume the current directory contains a subdirectory named RCS with an RCS file named io.c,v .
col(1) col(1) NAME col - filter reverse line-feeds and backspaces SYNOPSIS col [-blfxp ] DESCRIPTION col reads from the standard input and writes onto the standard output. It performs the line overlays implied by reverse line feeds (ASCII code ESC-7 ), and by forward and reverse half-line feeds (ESC-9 and ESC-8 ). col is particularly useful for filtering multi-column output made with the nroff .rt command, and output resulting from use of the tbl preprocessor (see nroff(1) and tbl(1)).
col(1) col(1) International Code Set Support Single- and multi-byte character code sets are supported. EXAMPLES col is used most often with nroff and tbl . A common usage is: tbl filename | nroff -man | col | more -s (very similar to the usual man(1) command). This command allows vertical bars and outer boxes to be printed for tables. The file is run through the tbl preprocessor, and the output is then piped through nroff , formatting the output using the -man macros.
comb(1) comb(1) NAME comb - combine SCCS deltas SYNOPSIS comb [-pSID] [-clist] [-o] [-s] file ... DESCRIPTION The comb command generates a shell procedure (see sh(1)) which, when run, reconstructs the given SCCS files. The reconstructed files are usually smaller than the original files. Arguments can be specified in any order, but all options apply to all named SCCS files.
comb(1) comb(1) FILES s.COMB????? comb????? Temporary file Temporary file SEE ALSO admin(1), delta(1), get(1), prs(1), sccshelp(1), sh(1), sccsfile(4).
comm(1) comm(1) NAME comm - select or reject lines common to two sorted files SYNOPSIS comm [-[123 ] ] file1 file2 DESCRIPTION comm reads file1 and file2, which should be ordered in increasing collating sequence (see sort(1) and Environment Variables below), and produces a three-column output: Column 1: Column 2: Column 3: Lines that appear only in file1, Lines that appear only in file2, Lines that appear in both files. If - is used for file1 or file2, the standard input is used.
command(1) command(1) NAME command - execute a simple command SYNOPSIS command command_name [ argument ... ] c DESCRIPTION command enables the shell to treat the arguments as a simple command, suppressing the shell function lookup. If command_name is not the name of the function, the effect of command is the same as omitting command. Operands command recognizes the following operands: command_name The name of a HP-UX command or a shell built-in command.
compact(1) compact(1) NAME compact, uncompact, ccat - compact and uncompact files, and cat them SYNOPSIS compact [ sfile] ... uncompact [ cfile] ... ccat [ cfile] ... DESCRIPTION compact compresses the named files using an adaptive Huffman code. If no file names are given, standard input is compacted and sent to the standard output. compact operates as an on-line algorithm. Each time a byte is read, it is encoded immediately according to the current prefix code.
compact(1) compact(1) FILES *.C compacted file created by compact, removed by uncompact SEE ALSO compress(1), pack(1), acl(5), aclv(5). Gallager, Robert G., "Variations on a Theme of Huffman," I.E.E.E. Transactions on Information Theory, vol. IT-24, no. 6, November 1978, pp. 668 - 674.
compress(1) compress(1) NAME compress, uncompress, zcat, compressdir, uncompressdir - compress and expand data SYNOPSIS Compress Files compress [-d] [-f|-z ] [-z] [-v] [-c] [-V] [-b maxbits ] [ file ... ] uncompress [-f] [-v] [-c] [-V] [ file ... ] zcat [-V] [ file ... ] c Compress Entire Directory Subtrees compressdir [ options ] [ directory ... ] uncompressdir [ options ] [ directory ...
compress(1) compress(1) uncompress -c. -V -b maxbits Print the current version and compile options onto the standard error. Specify the maximum number of bits the compress algorithm will use. The default is 16 and the range can be any integer between 9 and 16. compress uses the modified Lempel-Ziv algorithm popularized in A Technique for High Performance Data Compression , Terry A. Welch, IEEE Computer, vol. 17, no. 6 (June 1984), pages 8-19.
compress(1) compress(1) uncompress: corrupt input A SIGSEGV violation was detected which usually means that the input file has been corrupted. Compression: xx .xx % Percentage of the input saved by compression. (Relevant only for -v .) -- not a regular file: unchanged When the input file is not a regular file (a directory for example), it is left unaltered. -- has xx other links: unchanged The input file has links which are not symbolic links and has been left unchanged. See ln(1) for more information.
convert(1) convert(1) NAME convert - convert an audio file SYNOPSIS /opt/audio/bin/convert [source_file] [target_file] [-sfmt format] [-dfmt format] [-ddata data_type] [-srate rate] [-drate rate] [-schannels number] [-dchannels number] c DESCRIPTION This command converts audio files from one supported file format, data format, sampling rate, and number of channels to another. The unconverted file is retained as a source file.
convert(1) convert(1) cd /opt/audio/bin convert beep beep.au -sfmt l16 -srate 11025 -schannels 2 To save disk space, convert an audio file with CD quality sound to voice quality sound. cd /opt/audio/bin convert idea.au idea2.au -ddata u -drate 8k -dchannels 1 AUTHOR convert was developed by HP. c Sun is a trademark of Sun MicroSystems, Inc. NeXT is a trademark of NeXT Computers, Inc. Microsoft is a trademark of Microsoft Corporation.
cp(1) cp(1) NAME cp - copy files and directory subtrees SYNOPSIS cp [-f-i] [-p] [-S] [-e extarg] file1 new_file cp [-f-i] [-p] [-S] [-e extarg] file1 [file2 ... ] dest_directory cp [-f-i] [-p] [-S] [-R-r] [-e extarg] directory1 [ directory2 ... ] dest_directory cp -R-r [-H-L-P] [-f-i] [-p] [-S] [-e extarg] file1directory1 [file2directory2 ...] c dest_directory DESCRIPTION cp copies: • • • • • file1 to new or existing new_file, file1 to existing dest_directory, file1, file2, ...
cp(1) cp(1) Under the UNIX Standard environment (see standards(5)), cp will exit with error if multiple sources are being copied to a non-existing directory. -R (recursive subtree copy) The -R option is identical to the -r option. With the -R and -r options, in addition to regular files and directories, cp also copies FIFOs, character and block device files and symbolic links. Only superusers can copy device files. All other users get an error.
cp(1) cp(1) EXAMPLES The following command moves the directory sourcedir and its contents to a new location (targetdir) in the file system. Since cp creates the new directory, the destination directory targetdir should not already exist. cp -r sourcedir targetdir && rm -rf sourcedir The -r option copies the subtree (files and subdirectories) in directory sourcedir to directory targetdir. The double ampersand (&&) causes a conditional action.
cpio(1) cpio(1) NAME cpio - copy file archives in and out; duplicate directory trees SYNOPSIS cpio -o [-e extarg] [achvxABC ] cpio -i[bcdfmrstuvxBPRSU6] [pattern...] cpio -p [-e extarg] [adlmruvxU ] directory DESCRIPTION The cpio command saves and restores archives of files on magnetic tape, other devices, or a regular file, and copies files from one directory to another while replicating the directory tree structure. When cpio completes processing the files, it reports the number of blocks written.
cpio(1) cpio(1) system that does not support extent attributes. If -e is not specified, the default value for extarg is warn . c f h Copy in all files except those selected by pattern.... l Whenever possible, link files rather than copying them. This option does not destroy existing files. Use only with -p. m Retain previous file modification time. This option does not affect directories that are being copied. r s Rename files interactively. If the user types a null line, the file is skipped.
cpio(1) cpio(1) U Use the process’s file-mode creation mask (see umask(2)) to modify the mode of files created, in the same manner as creat(2). 6 Process a UNIX Sixth-Edition-format file. Use only with -i. Note that cpio archives created using a raw device file must be read using a raw device file. When the end of the tape is reached, cpio prompts the user for a new special file and continues.
cpio(1) cpio(1) cd olddir find . -depth -print | cpio -pd newdir The trivial case find . -depth -print | cpio -oB >/dev/rtape/tape4QIC150 can be handled more efficiently by: find . -cpio /dev/rtape/tape4QIC150 c WARNINGS Because of industry standards and interoperability goals, cpio does not support the archival of files larger than 2 GB or files that have user/group IDs greater than 60 K.
cpp(1) cpp(1) NAME cpp - the C language preprocessor SYNOPSIS /usr/ccs/lbin/cpp [option]... [ifile [ofile]] DESCRIPTION cpp is the C language preprocessor which is invoked as the first pass of any C compilation using the cc command (see cc(1)). Its purpose is to process #include and conditional compilation instructions and macros. Thus the output of cpp is designed to be in a form acceptable as input to the next pass of the C compiler.
cpp(1) -Uname cpp(1) Remove any initial definition of name, where name is a reserved symbol that is predefined by the particular preprocessor.
cpp(1) cpp(1) Only these operators, integer constants, and names that are known by cpp should be used in constant-expression. In particular, the sizeof operator is not available. #ifdef name The lines following appear in the output if and only if name has been the subject of a previous #define without being the subject of an intervening #undef .
cpp(1) cpp(1) FILES /usr/include Standard directory for #include files SEE ALSO m4(1).
crontab(1) crontab(1) NAME crontab - user job file scheduler SYNOPSIS crontab crontab crontab crontab [file] -e [username] -l [username] -r [username] c DESCRIPTION The crontab command manages a crontab file for the user. You can use a crontab file to schedule jobs that are executed automatically by cron (see cron(1M)) on a regular basis.
crontab(1) 0 crontab(1) 0 * * 1 command runs command only on Mondays. The sixth field, command (the balance of a line including blanks in a crontab file), is a string that is executed by the shell at the specified times. A percent character (%) in this field (unless escaped by a backslash (\)) is translated to a newline character, dividing the field into "lines". Only the first "line" (up to a % or end-of-line) of the command field is executed by the shell.
crontab(1) crontab(1) SEE ALSO sh(1), cron(1M), queuedefs(4), compartments(5), privileges(5).
crypt(1) crypt(1) NAME crypt - encode and decode files SYNOPSIS crypt [password] c DESCRIPTION crypt reads from the standard input and writes on the standard output. password is a key that selects a particular transformation. If no password is given, crypt demands a key from the terminal and turns off printing while the key is being typed in. crypt encrypts and decrypts with the same key: crypt key cypher crypt key
crypt(1) crypt(1) SEE ALSO ed(1), makekey(1), stty(1).
csh(1) csh(1) NAME csh - a shell (command interpreter) with C-like syntax SYNOPSIS csh [-cefinstvxTVX ] [command_file] [argument_list...] c DESCRIPTION csh is a command language interpreter that incorporates a command history buffer, C-like syntax, and job control facilities. Command Options Command options are interpreted as follows: -c Read commands from the (single) following argument which must be present. Any remaining arguments are placed in argv .
csh(1) csh(1) [1] 1234 indicating that the job which was started asynchronously was job number 1 and had one (top-level) process, whose process id was 1234. If you are running a job and want to do something else, you can type the currently defined suspend character (see termio(7)) which sends a stop signal to the current job. csh then normally indicates that the job has been ‘Stopped’, and prints another prompt.
csh(1) csh(1) breaksw Causes a break from a switch , resuming after the endsw . case label : A label in a switch statement as discussed below. cd cd directory_name chdir chdir directory_name c Change the shell’s current working directory to directory_name. If not specified, directory_name defaults to your home directory. If directory_name is not found as a subdirectory of the current working directory (and does not begin with /, ./, or ..
csh(1) csh(1) the output. Useful in programs that use the shell to perform file name expansion on a list of words. goto word The specified word is file name and command expanded to yield a string of the form label . The shell rewinds its input as much as possible and searches for a line of the form label: possibly preceded by blanks or tabs. Execution continues after the specified line.
csh(1) csh(1) c coredumpsize cputime datasize Size of the largest core dump that is created descriptors filesize memoryuse stacksize Maximum number of open files for each process Maximum number of CPU seconds to be used by each process Maximum growth of the data region allowed beyond the end of the program text Largest single file that can be created Maximum size to which a process’s resident set size can grow Maximum size of the automatically extended stack region The maximum_use argument can be sp
csh(1) csh(1) the top. A synonym for popd , called rd , is provided for historical reasons. Its use is not recommended because it is not part of the standard BSD csh and may not be supported in future releases. pushd [name] [+n] With no arguments, pushd exchanges the top two elements of the directory stack. Given a name argument, pushd changes to the new directory (using cd) and pushes the old current working directory (as in csw) onto the directory stack.
csh(1) csh(1) ... breaksw ... default: ... breaksw endsw Each case label (str1) is successively matched against the specified string which is first command and file name expanded. The form of the case labels is the Pattern Matching Notation with the exception that non-matching lists in bracket expressions are not supported (see regexp(5)). If none of the labels match before a default label is found, the execution begins after the default label.
csh(1) csh(1) The operators *= , += , etc., are available as in C. White space can optionally separate the name from the assignment operator. However, spaces are mandatory in separating components of expression which would otherwise be single words. Special postfix ++ and -- operators increment and decrement name, respectively (e.g., @ i++). Non-Built-In Command Execution When a command to be executed is not a built-in command, csh attempts to execute the command via exec(2).
csh(1) csh(1) These forms, without further modification, simply reintroduce the words of the specified events, each separated by a single blank. As a special case, !! is a re-do; it refers to the previous command. To select words from a command, use a colon (:) and a designator for the desired words after the event specification. The words of an input line are numbered from zero. The basic word designators are: 0 First word (i.e., the command name itself). n nth word. ^ First argument.
csh(1) csh(1) ls -ld ˜paul one could execute !{l}a to do ls -ld ˜paula while !la would look for a command starting with la . Quoting with Single and Double Quotes The quotation of strings by single quotes (’) and double quotes (") can be used to prevent all or some of the remaining substitutions. Strings enclosed in single quotes are protected from any further interpretation. Strings enclosed in double quotes are still variable- and command-expanded as described below.
csh(1) csh(1) r w x e o z f d read access write access execute access existence ownership zero size plain file directory The specified filename is command- and file-name expanded then tested to see if it has the specified relationship to the real user. If the file does not exist or is inaccessible, all inquiries return false (0). Command executions succeed, returning true, if the command exits with status 0; otherwise they fail, returning false.
csh(1) csh(1) unset commands. Some of the variables are Boolean, that is, the shell does not care what their value is, only whether they are set or not. Some operations treat variables numerically. The at sign (@) command permits numeric calculations to be performed and the result assigned to a variable. The null string is considered to be zero, and any subsequent words of multi-word values are ignored.
csh(1) csh(1) $$ $< c Substitutes the (decimal) process number of the (parent) shell. Substitutes a line from the standard input, with no further interpretation thereafter. It can be used to read from the keyboard in a shell script. Pre-Defined and Environment Variables The following variables have special meaning to the shell. Of these autologout , argv , cwd , home , path , prompt , shell , and status are always set by the shell.
csh(1) csh(1) nonomatch If set, it is no longer an error for a file name expansion to not match any existing files. If there is no match, the primitive pattern is returned. It is still an error for the primitive pattern to be malformed. For example, ’echo [’ still gives an error. notify If set, csh notifies you immediately (through your standard output device) of background job completions. The default is unset (indicate job completions just before printing a prompt).
csh(1) csh(1) Matching Notation defined by regexp(5) with the following exceptions: • Non-matching lists in bracket expressions are not supported. • In a list of words specifying file name substitution it is an error for no pattern to match an existing file name, but it is not required for each pattern to match. • The metanotation a{b,c,d}e is a shorthand for "abe ace ade". Left to right order is preserved, with results of matches being sorted separately at a low level to preserve this order.
csh(1) csh(1) original standard input of the shell. The << mechanism should be used to present inline data. This permits shell scripts to function as components of pipelines and allows the shell to block-read its input. Diagnostic output can be directed through a pipe with the standard output. Simply use the form |& rather than | by itself.
csh(1) csh(1) Command Line Control A ˆR re-prints the current command line; ˆW erases the last word entered on the current command line. Sanity C shell restores your terminal to a sane mode if it appears to return from some command in raw, cbreak, or noecho mode. c Saving Your History Buffer csh has the ability to save your history list between login sessions. If the shell variable savehist is set to a number, that number of command events from your history list is saved.
csh(1) csh(1) Alias substitution is most often used to clumsily simulate shell procedures; shell procedures should be provided rather than aliases. Commands within loops, prompted for by ?, are not placed in the history list. Control structure should be parsed rather than being recognized as built-in commands. This would allow control commands to be placed anywhere, to be combined with |, and to be used with & and ; metasyntax.
csh(1) c csh(1) /etc/passwd /usr/bin/sh /etc/csh.login Source of home directories for ˜name . /tmp/sh* Temporary file for << . Standard shell, for shell scripts not starting with a #. A csh script sourced (executed) before ˜/.cshrc and ˜/.login when starting a csh login (analogous to /etc/profile in the POSIX shell). SEE ALSO cd(1), echo(1), kill(1), nice(1), sh(1), umask(1), access(2), exec(2), fork(2), pipe(2), umask(2), wait(2), a.out(4), environ(5), lang(5), regexp(5), tty(7).
csplit(1) csplit(1) NAME csplit - context split SYNOPSIS csplit [-s] [-k] [-f prefix [-n number] file arg1 [ ... argn] DESCRIPTION csplit reads file, separates it into n+1 sections as defined by the arguments arg1 ... argn, and places the results in separate files. The maximum number of arguments (arg1 through argn) allowed is 99 unless the -n number option is used to allow for more output file names.
csplit(1) csplit(1) EXTERNAL INFLUENCES Environment Variables LC_COLLATE determines the collating sequence used in evaluating regular expressions. LC_CTYPE determines the characters matched by character class expressions in regular expressions. LC_MESSAGES determines the language in which messages are displayed. If LC_COLLATE or LC_CTYPE or LC_MESSAGES is not specified in the environment or is set to the empty string, the value of LANG is used as a default for each unspecified or empty variable.
ct(1) ct(1) NAME ct - spawn getty to a remote terminal (call terminal) SYNOPSIS ct [-w n] [-x n] [-h] [-v] [-s speed] telno... DESCRIPTION ct dials telno, the telephone number of a modem that is attached to a terminal, and spawns a getty(1M) process to that terminal. ct tries each line listed in file /etc/uucp/Devices until it finds an available line with appropriate attributes or runs out of entries.
ctags(1) ctags(1) NAME ctags - create a tags file SYNOPSIS ctags [-xvFBatwu ] files ... c DESCRIPTION ctags makes a tags file for ex(1) (or vi(1)) from the specified C, Pascal and FORTRAN sources. A tags file gives the locations of specified objects (for C, functions, macros with argments, and typedefs; Pascal, procedures, programs and functions; FORTRAN, subroutines, programs and functions) in a group of files.
ctags(1) ctags(1) DIAGNOSTICS Too many entries to sort. An attempt to get additional heap space failed; the sort could not be performed. Unexpected end of function in file file , line line . The tags file may be incorrect. A } character was found unexpectedly in the first column. This can lead to incorrect entries in the tags file. Duplicate entry in file file , line line : name. Second entry ignored. The same name was detected twice in the same file.
ctags(1) ctags(1) SEE ALSO ex(1), vi(1).
cu(1) cu(1) NAME cu - call another (UNIX) system; terminal emulator SYNOPSIS cu [-s speed] [-l line] [-h] [-q] [-t] [-d level] [-e-o] [-m] [-n] [telnosystemnamedir ] UNIX Standard Syntax cu [-s speed] [-l line] [-h] [-q] [-t] [-d] [-e-o] [-m] [-n] [telnosystemnamedir ] DESCRIPTION cu calls up another system, which is usually a UNIX operating system, but can be a terminal or a nonUNIX operating system. cu manages all interaction between systems, including possible transfers of ASCII files.
cu(1) cu(1) • receive process accepts data from the remote system and, except for lines beginning with ˜, passes it to the standard output. Normally, an automatic DC3/DC1 protocol is used to control input from the remote to ensure that the buffer is not overrun. "Prompt handshaking" can be used to control transfer of ASCII files to systems that have no type-ahead capability but require data to be sent only after a prompt is given. This is described in detail below.
cu(1) cu(1) ~%setps xy Set the handshake prompt to the characters xy. The default is DC1. The prompt can be any one or two characters. To specify a control character for x or y, use the Ctrl-X form where a circumflex (ASCII 94) precedes the character, as in ˆX . A null character can be specified with ˆ@. (A null first character in the prompt implies a "null" prompt, which always appears to be satisfied.) A circumflex is specified by ˆ ˆ.
cu(1) cu(1) DIAGNOSTICS Exit code is zero for normal exit; non-zero (various values) otherwise. EXAMPLES To dial a system whose number is 9 201 555 1212 using 1200 baud: cu -s1200 9=2015551212 If the speed is not specified, 300 is the default value.
cut(1) cut(1) NAME cut - cut out (extract) selected fields of each line of a file SYNOPSIS cut -c list [file]... cut -b list [-n] [file]... cut -f list [-d char ] [-s] [file]... DESCRIPTION cut cuts out (extracts) columns from a table or fields from each line in a file; in data base parlance, it implements the projection of a relation.
cut(1) cut(1) default of "C" (see lang(5)) is used instead of LANG . If any internationalization variable contains an invalid setting, cut behaves as if all internationalization variables are set to "C". See environ(5). International Code Set Support cut supports both single- and multi-byte character code sets. International code set characters may be specified in the char given to the -d option.
date(1) date(1) NAME date - display or set the date and time SYNOPSIS date date date date [-u] [-u] +format [-u] [mmddhhmm[[cc]yy]] [-a [-]sss[.fff]] DESCRIPTION The date command displays or sets the current HP-UX system clock date and time. Since the HP-UX system operates in Coordinated Universal Time (UTC), date automatically converts to and from local standard or daylight/summer time, based on your TZ environment variable. See Environment Variables in EXTERNAL INFLUENCES below.
date(1) date(1) do you really want to run time backwards?[yes/no] Type yes or the equivalent for your locale to set the clock backwards; anything else to cancel the command. When date is used to set the date, a pair of date change records is written to the file /var/adm/wtmps. (UNIX Standard only, see standards(5).) No warning is generated if date is set backwards.
date(1) date(1) %w Weekday as a one-digit decimal number [0-6 (Sunday-Saturday)]. For example, 3. %W Week number of the year (Monday as the first day of the week) as a two-digit decimal number [00 -53 ]. All days that precede the first Monday in the year are considered to be in week 00 . For example, 02. %x Current date representation. For example, 01/12/94 . %X Current time representation. For example, 19:45:58 . %y Year without century as a two-digit decimal number [00-99]. For example, 93.
date(1) date(1) %Oy Year (offset from %C) in alternate representation. Field Width and Precision An optional field width and precision specification can immediately follow the initial % of a formatting directive in the following order: [-0]width The decimal digit string width specifies a minimum field width in which the result of the conversion is right- or left-justified. The default is right-justified with space padding on the left.
date(1) date(1) The character c is not a valid format directive, field width specifier, or precision specifier. do you really want to run time backwards?[yes/no] The date/time you specified is earlier than the current clock value. Type yes (or the equivalent for your locale) to set the clock backwards; anything else to cancel the command. no permission You need the superuser privilege to change the date. EXAMPLES Date in Different Languages Display the date.
date(1) date(1) SEE ALSO locale(1), stime(2), ctime(3C), strftime(3C), tztab(4), environ(5), lang(5), langinfo(5), standards(5). STANDARDS CONFORMANCE date : SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
dc(1) dc(1) NAME dc - desk calculator SYNOPSIS dc [ file ] DESCRIPTION dc is an arbitrary precision arithmetic package. Ordinarily it operates on decimal integers, but one may specify an input base, output base, and a number of fractional digits to be maintained. (See bc(1), a preprocessor for dc that provides infix notation and a C-like syntax that implements functions. bc also provides reasonable control structures for programs.) The overall structure of dc is a stacking (reverse Polish) calculator.
dc(1) d dc(1) o The top value on the stack is popped and used as the number radix for further output. See below for notes on output base. O k pushes the output base on the top of the stack. K z Z ? ; and : Y pushes the scale factor on the top of the stack. the top of the stack is popped, and that value is used as a non-negative scale factor: the appropriate number of places are printed on output, and maintained during multiplication, division, and exponentiation.
dd(1) dd(1) NAME dd - convert, reblock, translate, and copy a (tape) file SYNOPSIS dd [option=value] ... DESCRIPTION dd copies the specified input file to the specified output file with possible conversions. The standard input and output are used by default. Input and output block size can be specified to take advantage of raw physical I/O. Upon completion, dd reports the number of whole and partial input and output records.
dd(1) dd(1) Swap every pair of input bytes. swab noerror d Do not stop processing on an input error. If the sync conversion symbol is also specified, missing input is replaced with null bytes and processed normally; otherwise, the input block is omitted from the output. notrunc Do not truncate existing output file. Blocks in the output file not overwritten by this invocation of dd are preserved. sync Pad every input block to size ibs .
dd(1) dd(1) Note the use of the raw magnetic tape device file. dd is especially suited to I/O on raw physical devices because it allows reading and writing in arbitrary block sizes. WARNINGS Some devices, such as 1/2-inch magnetic tapes, are incapable of seeking. Such devices may be positioned prior to running dd by using mt(1) or some other appropriate command. The skip , seek , iseek and oseek options do work for such devices.
delta(1) delta(1) NAME delta - make a delta (change) to an SCCS file SYNOPSIS delta [-r SID ] [-s ] [-n ] [-g list ] [-m mrlist ] [-y comment ] [-p ] files DESCRIPTION The delta command is used to permanently introduce into the named SCCS file changes that were made to the file retrieved by get (called the g-file, or generated file). See get(1). delta makes a delta to each named SCCS file.
delta(1) delta(1) LC_MESSAGES determines the language in which messages are displayed. If LC_CTYPE or LC_MESSAGES is not specified in the environment or is set to the empty string, the value of LANG is used as a default for each unspecified or empty variable. If LANG is not specified or is set to the empty string, a default of "C" (see lang(5)) is used instead of LANG . If any internationalization variable contains an invalid setting, delta behaves as if all internationalization variables are set to "C".
deroff(1) deroff(1) NAME deroff - remove nroff, tbl, and neqn constructs SYNOPSIS deroff [-mx ] [-w] [-i] [ file ... ] d DESCRIPTION deroff reads each file in sequence and removes all nroff requests, macro calls, backslash constructs, neqn constructs (between .EQ and .EN lines, and between delimiters — see neqn(1)), and tbl descriptions (see tbl(1)), replacing them with white space (blanks and blank lines), and writes the remainder of the file on the standard output.
dhcpv6client_ui(1) dhcpv6client_ui(1) NAME dhcpv6client_ui - DHCPv6 client interface for requesting configuration parameters from the DHCPv6 server SYNOPSIS /usr/bin/dhcpv6client_ui /usr/bin/dhcpv6client_ui [-s vendor_specific_options] /usr/bin/dhcpv6client_ui /usr/bin/dhcpv6client_ui -m interface_name -[t|T] [-R] -m interface_name -[t|T] [-I] [-o config_options] -r list_of_addresses -v d DESCRIPTION dhcpv6client_ui is the interface through which a user contacts the client daemon, dhcpv6clientd, to o
dhcpv6client_ui(1) -R dhcpv6client_ui(1) Notify the client daemon to utilize the IPv6 addresses already obtained for an interface instead of requesting new IPv6 addresses from the server. This option must be used in conjunction with the -m option. -T Get both temporary and non-temporary addresses from the client daemon. When there is no -t or -T option specified dhcpv6client_ui obtains only non-temporary addresses. RETURN VALUES dhcpv6client_ui returns 0 on success and 1 on failure.
diff(1) diff(1) NAME diff - differential file and directory comparator SYNOPSIS diff [-C n ] [-S name ] [-lrs ] [-bcefhintw ] dir1 dir2 diff [-C n ] [-S name ] [-bcefhintw ] file1 file2 diff [-D string ] [-biw ] file1 file2 DESCRIPTION Comparing Directories If both arguments are directories, diff sorts the contents of the directories by name, then runs the regular file diff algorithm (described below) on text files that have the same name in each directory but are different.
diff(1) diff(1) -C n -h Output format similar to -c but with n lines of context. Do a fast, half-hearted job. This option works only when changed stretches are short and well separated, but can be used on files of unlimited length.
diff(1) diff(1) WARNINGS Editing scripts produced by the -e or -f option are naive about creating lines consisting of a single dot (.). When comparing directories with the -b , -w , or -i options specified, diff first compares the files in the same manner as cmp , then runs the diff algorithm if they are not equal. This may cause a small amount of spurious output if the files are identical except for insignificant blank strings or uppercase/lowercase differences.
diff3(1) diff3(1) NAME diff3 - 3-way differential file comparison SYNOPSIS diff3 [-exEX3 ] file1 file2 file3 DESCRIPTION diff3 compares three versions of a file, and prints disagreeing ranges of text flagged with these codes: ==== ====1 ====2 ====3 d all three files differ file1 is different file2 is different file3 is different The type of change required to convert a given range of a given file to some other is indicated in one of these ways: f :n1 a Text is to be appended after line number n1 in
diffmk(1) diffmk(1) NAME diffmk - mark changes between two different versions of a file SYNOPSIS diffmk prevfile currfile markfile DESCRIPTION diffmk compares the previous version of a file with the current version and creates a file that includes nroff /troff ‘‘change mark’’ commands. prevfile is the name of the previous version of the file and currfile is the name of the current version of the file.
dircmp(1) dircmp(1) NAME dircmp - directory comparison SYNOPSIS dircmp [-d] [-s] [-wn ] dir1 dir2 d DESCRIPTION dircmp examines dir1 and dir2 and generates various tabulated information about the contents of the directories. Sorted listings of files that are unique to each directory are generated for all the options. If no option is entered, a sorted list is output indicating whether the filenames common to both directories have the same contents.
dmpxlt(1) dmpxlt(1) NAME dmpxlt - dump iconv translation tables to a readable format SYNOPSIS /usr/bin/dmpxlt [-f output_filename] [input_filename] DESCRIPTION dmpxlt dumps the compiled version of the iconv codeset conversion tables into an ASCII-readable format that can be modified and used as input to genxlt(1) to regenerate the table for iconv(1). Options dmpxlt recognizes the following options: -f output_filename If this option is not selected, the data will be sent to standard output.
dnssec-keygen(1) dnssec-keygen(1) (BIND 9.3) NAME dnssec-keygen - key generation tool for DNSSEC SYNOPSIS dnssec-keygen [-ehk ] [-a algorithm] [-b keysize] [-c class] [-f flag] [-g generator] [-n nametype] [-p protocol-value] [-r randomdev] [-s strength-value] [-t type] [-v level] name DESCRIPTION d dnssec-keygen generates keys for Secure DNS (DNSSEC) as defined in RFC 2535. It also generates keys for use in Transaction Signatures (TSIG), which are defined in RFC 2845.
dnssec-keygen(1) dnssec-keygen(1) (BIND 9.3) -s strength-value Set the key’s strength value. The generated key will sign DNS resource records with a strength value of strength-value. It should be a number in the range 0-15 . The default strength is 0. The key strength field currently has no defined purpose in DNSSEC. -t type Indicate if the key is used for authentication or confidentiality. type can be one of AUTHCONF The key can be used for authentication and confidentiality.
dnssec-keygen(1) dnssec-keygen(1) (BIND 9.3) AUTHOR dnssec-keygen was developed by the Internet Systems Consortium (ISC). FILES /dev/random SEE ALSO dnssec-signzone(1). Requests for Comments (RFC): editor.org/ . d HP-UX IP Address and 2535, 2539, and 2845, available online at http://www.rfc- Client Management Administrator’s Guide, available online at http://docs.hp.com. BIND 9 Administrator Reference Manual, available from the Internet Systems Consortium at http://www.isc.
dnssec-makekeyset(1) dnssec-makekeyset(1) NAME dnssec-makekeyset - used to produce a set of DNSSEC keys SYNOPSIS dnssec-makekeyset [-a] [-h help] [-s start-time ] [-e end-time] [-t TTL] [-r randomdev] [-p] [-v level] keyfile... DESCRIPTION dnssec-makekeyset generates a key set from one or more keys created by dnssec-keygen. It creates a file containing KEY and SIG records for some zone which can then be signed by the zone’s parent if the parent zone is DNSSEC-aware.
dnssec-makekeyset(1) dnssec-makekeyset(1) If dnssec-makekeyset is successful, it creates a file name of the form nnnn.keyset. This file contains the KEY and SIG records for domain nnnn, the domain name part from the key file identifier produced when dnssec-keygen created the domain’s public and private keys. The .keyset file can then be transferred to the DNS administrator of the parent zone for them to sign the contents with dnssec-signkey.
dnssec-signkey(1) dnssec-signkey(1) NAME dnssec-signkey - DNSSEC keyset signing tool SYNOPSIS dnssec-signkey [-a] [-c class] [-e end-time] [-h] [-p] [-r randomdev] [-s start-time ] [-v level] keyset keyfile ... DESCRIPTION dnssec-signkey is used to sign a key set for a child zone. Typically this would be provided by a .keyset file generated by the dnssec-makekeyset utility. This provides a mechanism for a DNSSEC-aware zone to sign the keys of any DNSSEC-aware child zones.
dnssec-signkey(1) dnssec-signkey(1) next gets signed with dnssec-signzone. A copy of the generated signedkey file should be kept by the parent zone’s DNS administrator, since it will be needed when signing the parent zone. EXAMPLE The DNS administrator for a DNSSEC-aware .com zone would use the following command to make dnssec-signkey sign the .keyset file for example.com created in the example shown in the man page for dnssec-makekeyset: dnssec-signkey example.com.keyset Kcom.+003+51944 where Kcom.
dnssec-signzone(1) dnssec-signzone(1) (BIND 9.3) NAME dnssec-signzone - DNSSEC zone signing tool SYNOPSIS dnssec-signzone [-aghptz ] [-c class] [-d directory] [-e end-time] [-f output-file] [-k key]... [-l domain] [-i interval] [-n nthreads] [-o origin] [-r randomdev] [-s start-time ] [-v level] zonefile key... DESCRIPTION dnssec-signzone is used to sign a zone. It generates NSEC and RRSIG records and produces a signed version of the zone.
dnssec-signzone(1) dnssec-signzone(1) (BIND 9.3) -p Use pseudo-random data when signing the keys. This is faster, but less secure, than using genuinely random data for signing. This option may be useful when there are many child zone key sets to sign or if the entropy source is limited. It could also be used for short-lived keys and signatures that don’t require as much protection against cryptanalysis, such as when the key will be discarded long before it could be compromised.
domainname(1) domainname(1) NAME domainname - set or display name of Network Information Service domain SYNOPSIS domainname [ name_of_domain ] DESCRIPTION Network Information Service (NIS) uses domain names to refer collectively to a group of hosts. Without an argument, domainname displays the name of the NIS domain. Only superuser can set the domain name by providing name_of_domain. The domain name is usually set in the configuration file /etc/rc.config.d/namesvrs by setting the NIS_DOMAIN variable.
dos2ux(1) dos2ux(1) NAME dos2ux, ux2dos - convert ASCII file format between HP-UX and DOS formats SYNOPSIS dos2ux file... ux2dos file... d DESCRIPTION dos2ux and ux2dos read each specified file in sequence and write it to standard output, converting to HP-UX format or to DOS format, respectively. Each file can be in either DOS format or HP-UX format for either command. A DOS file name is recognized by the presence of an embedded colon (:) delimiter; see dosif(4) for DOS file naming conventions.
dosdf(1) dosdf(1) TO BE OBSOLETED TO BE OBSOLETED NAME dosdf - report number of free disk clusters SYNOPSIS dosdf device[:] Remarks The dosdf command is obsolescent; see the WARNINGS section. DESCRIPTION dosdf is the DOS counterpart of the df command (see df(1)). It prints the cluster size in bytes and the number of free clusters on the specified DOS volume. WARNINGS Use of dosdf is discouraged because it is targeted for removal from HP-UX. SEE ALSO df(1), dos2ux(1), dosif(4).
dspcat(1) dspcat(1) NAME dspcat - display all or part of a message catalog SYNOPSIS dspcat [-g] catalog_name [set_number [message_number]] DESCRIPTION The dspcat command displays a particular message, all of the messages in a set, or all of the messages in a catalog. If you include all three command operands, dspcat displays a particular message. If you do not include message_number, all the messages in the specified set are displayed.
dspmsg(1) dspmsg(1) NAME dspmsg - display a selected message from a message catalog SYNOPSIS dspmsg [-e | -E] [-s set_number] catalog_name message_number [’default_string’ [argument ... ]] DESCRIPTION The dspmsg command displays a particular message from a message catalog. The display may include a message identifier, depending on the presence of the -e or -E option and settings for the CAT_MIDSET_ catname, CAT_MIDSET , and CAT_MIDFMT environment variables.
dspmsg(1) dspmsg(1) nothing if the message cannot be retrieved from the catalog. The following example displays message number 2 in set 3 of test.cat: dspmsg -s 3 store.cat 2 ’Sorry, that item is no longer in stock.’ If dspmsg does not find the specified message in the catalog or cannot find or open the catalog, it displays the string "Sorry, that item is no longer in stock.
dspmsg(1) dspmsg(1) Using the CAT_MIDSET* Environment Variables The CAT_MIDSET_ catname and CAT_MIDSET environment variables are used to control how to activate the message identifier feature. You can use them to specify a space-separated list of numeric identifiers for the sets containing messages that will be displayed with message identifiers. For example, if you set one of these variables to "3 4", only messages in sets 3 and 4 will have their message identfiers displayed.
dspmsg(1) dspmsg(1) LC_ALL , when set to a non-empty string value, overrides the values of all other internationalization variables. LC_MESSAGES determines the language in which messages are displayed. NLSPATH determines the path to be used for searching the specified message catalog file. It affects how the internationalization variables are being used in locating the desired message catalog. EXAMPLES To display message number 2 in set number 1 of test.cat, enter: dspmsg test.
du(1) du(1) NAME du - summarize disk usage SYNOPSIS du [-a-s] [-bkrx ] [-H-L] [-t type ] [name]... DESCRIPTION The du command gives the number of 512-byte blocks allocated for all files and (recursively) directories within each directory and file specified by the name operands. The block count includes the indirect blocks of the file. A file with two or more links is counted only once. If name is missing, the current working directory is used.
du(1) du(1) WARNINGS Block counts are incorrect for files that contain holes. SEE ALSO df(1M), bdf(1M), quot(1M), standards(5).
echo(1) echo(1) NAME echo - echo (print) arguments SYNOPSIS echo [ arg ] ... DESCRIPTION echo writes its arguments separated by blanks and terminated by a new-line on the standard output.
ed(1) ed(1) NAME ed, red - line-oriented text editor SYNOPSIS ed [-p string] [-s-] [-x] [file] red [-p string] [-s-] [-x] [file] DESCRIPTION The ed command executes a line-oriented text editor. It is most commonly used in scripts and noninteractive editing applications because, even though it can be used interactively, other editors such as vi and ex are typically easier to use in an interactive environment.
ed(1) ed(1) s/s1/s2 s/s1/s2/p g/s1 g/s1/p ?s1 ?s1? Line Addresses To understand line addressing, remember that ed maintains a pointer to the current line. Generally speaking, the current line is the last line affected by a command. The exact effect of a given command on the current line is discussed under the description of each command. Addresses are interpreted according to the following rules: 1. The character . refers to the current line. 2. The character $ refers to the last line of the buffer.
ed(1) (.,. )c text . ed(1) The c (change) command deletes the addressed lines then accepts input text to replace the deleted lines. Upon completion, the new current line is the last line in text or, if no text was provided, at the first line after the deleted line or lines. Address 0 would be interpreted as address 1. (.,. )d The d (delete) command deletes the addressed lines from the buffer.
ed(1) ed(1) sequence. Nonprintable characters not in the table are written as a three-digit octal number (with a preceding backslash character) for each byte in the character (most significant byte first). Long lines are folded with the point of folding indicated by writing a backslash character followed by a newline. The end of each line is marked with a $. An l (ell) command can be appended to any command other than e, E, f, q, Q, r, w, or !.
ed(1) ed(1) As a more general feature, the characters \n, where n is a digit, are replaced by the text matched by the nth regular subexpression of the specified RE enclosed between \( and \) . When nested parenthesized subexpressions are present, n is determined by counting occurrences of \(, starting from the left. When the character % is the only character in replacement, the replacement used in the most recent substitute command is used as the replacement in the current substitute command.
ed(1) ed(1) current line address is unchanged. (.+1 ) newline An address alone on a line causes the addressed line to be printed. A newline alone is equivalent to .+1p . This technique is useful for stepping forward through the buffer. If an interrupt signal (ASCII DEL or BREAK) is sent, ed prints a ? and returns to its command level. The following size limitations apply: 256 characters per global command list, 64 characters per file name, and 32 MB characters in the buffer.
ed(1) ed(1) A ! command cannot be subject to a g or a v command. The ! command and the ! escape from the e, r, and w commands cannot be used if the the editor is invoked from a restricted shell (see sh(1)). The sequence \n in a regular expression does not match a newline character. The l command does not handle DEL correctly. Files encrypted directly with the crypt command with the null key cannot be edited (see crypt(1)). If the editor input is coming from a command file (e.g.
elfdump(1) elfdump(1) (ELF Applications Only) NAME elfdump - dump information contained in object files. SYNOPSIS elfdump [-acCdfghHjkLopqrsStuUvV] [-dc ] [-dl ] [-tx ] [-tv ] [-D num ] [+D num2 ] [+interp ] [+linkmap ] [+linkmap_bss ] [+linkmap_file] [-n name ] [+objdebug ] [+s section ] [-T num ] [+T num2 ] files... DESCRIPTION elfdump takes one or more object files or libraries and dumps information about them.
elfdump(1) elfdump(1) (ELF Applications Only) e -n name (Modifier) Dumps information about the specified section or symbol name. This option is valid with -h, -r , -s, and -t . If used with -t , name pertains to a symbol name and elfdump will only dump the symbol entry whose name matches name. If used with the other options, name pertains to a section name and elfdump will only dump the section whose name matches it.
elfdump(1) elfdump(1) (ELF Applications Only) Texts and Tutorials HP-UX Linker and Libraries Online User Guide (See the +help option) HP-UX Linker and Libraries User’s Guide (See manuals(5) for ordering information) HP-UX Software Transition Toolkit (STK) -- ELF Object Formats http://www.software.hp.
elm(1) elm(1) NAME elm - process electronic mail through a screen-oriented interface SYNOPSIS elm [-aKkmtVz ] [-f folder] elm elm elm elm e [-s subject] address-list -c [alias-list] -h -v DESCRIPTION The elm program is a screen-oriented electronic mail processing system. It supports the industry-wide MIME standard for nontext mail, a special forms message and forms reply mechanism, and an easy-to-use alias system for individuals and groups.
elm(1) elm(1) Set menu=OFF . Do not display the command menus on several Interactive Mode screens. This overrides the setting of the menu boolean variable (see the ELM CONFIGURATION section). -m -s subject -t Subject. Specify the subject for a File Mode or Message Mode message. Set usetite=OFF . Do not use the termcap ti /te and terminfo cup cursorpositioning entries. This overrides the setting of the usetite boolean variable (see the ELM CONFIGURATION section). -V Verbose transmission.
elm(1) elm(1) mail transport agent (MTA) The program that sends and receives mail messages to and from other systems. On HP-UX systems, the MTA is sendmail (see sendmail(1M)). mailcap A file that contains information on how to compose and display mail messages that are not just seven- and eight-bit ASCII characters. metamail A system program that processes nontext mail messages. message In a folder, a sequence of text lines comprised of a message delimiter, a header, and a body.
elm(1) elm(1) When you leave your editor, you enter the Send Menu, as described for Interactive Mode. If you choose the Send Menu s (send) command, the message is sent and the program terminates. If you select the Send Menu f (forget) command, the message is stored in $HOME/Canceled.mail and the program terminates. If you select other commands, the appropriate action occurs. See the EXAMPLES section.
elm(1) elm(1) INTERACTIVE MODE MENUS AND COMMANDS This section begins with the Message Menu, which is the main screen for Interactive Mode. The rest of the menus are presented alphabetically. Message Menu The Message Index is displayed on the Message Menu. You can use the following commands to manipulate and send messages. Some commands use a series of prompts to complete their action. You can use Ctrl-D to cancel their operations. The commands are: e !command Shell Escape.
elm(1) elm(1) c Change folder. This command is used to change the file whose messages are displayed on the Message Menu. You are asked for a file name. The file must be in message format; otherwise, elm aborts. You can use the customary wildcards for your shell, as well as the following special names: ! > < . @alias =filename Your incoming mail folder. Your received folder, defined by the receivedmail string variable. Your sent folder, defined by the sentmail string variable.
elm(1) elm(1) subject string to string Restrict to entries that contain string in the Subject: header. Restrict to entries that contain string in the To: header. You can add limiting criteria by repeating the l command. Ctrl-L Redraw the screen. m Mail. Send mail to one or more addresses. You are prompted for To: recipients, a Subject: and, if the askcc boolean variable is ON, Cc: recipients.
elm(1) elm(1) If you answer n, all undeleted unread messages will be moved to the folder defined by the receivedmail string variable. If the ask boolean variable is OFF , the answers to the questions (which are not displayed) are taken automatically from the values of the alwaysdelete , alwaysstore , and alwayskeep boolean variables, respectively. Q Quick quit. This is equivalent to executing the q command with the ask boolean variable set to OFF . r Reply to the sender of the current message.
elm(1) elm(1) num The ordinal message index number. mmm The month from the last Date: header entry, or from the From message header. d The day from the last Date: header entry, or from the From message header. from Either the sender name from the last From: header entry or from the From message header. lines The number of lines in the message. subject The subject description from the first Subject: header entry, truncated to fit your screen.
elm(1) elm(1) + Tagged. Tagged messages are handled as a group by some commands. See t and other commands in the Message Menu subsection. Blank. The message is not tagged. Built-In Editor When you are composing an outbound message with the builtin built-in editor, it prompts you for text lines with an empty line. Enter a period (.) to end the message and continue with the Send Menu. Built-in editor commands are lines that begin with an escape character, defined by the escape string variable.
elm(1) elm(1) + /pattern Display the next alias index page, when applicable. //pattern Pattern match. Search for pattern through all the fields of the alias list (alias, user name, comment, and address). The search starts at the current alias and wraps around to the beginning of the alias list. The current alias pointer is set to the first alias that matches. Uppercase and lowercase are treated as equivalent. /pattern Pattern match.
elm(1) elm(1) You can add limiting criteria by repeating the l command. Ctrl-L Redraw the screen. m Mail to the current alias or to the set of tagged aliases. The corresponding expanded addresses are placed in the To: header entry, and processing continues as for the Message Menu m (mail) command. The tags are cleared. n Make a user alias. elm prompts for a unique alias name, then for an address. The information provided is added to your individual alias_text file ($HOME/.elm/aliases.
elm(1) elm(1) num The index number of the alias. fullname The full name for the alias, as it will be used in an expanded address. It has the form: firstname lastname firstname The first name, from the alias database. lastname The last name, from the alias database. comment Comment, from the alias database. e type Type of alias. This is Person for an alias with a single address or Group for an alias with two or more addresses. (S) If present, the entry is from the elm system alias database.
elm(1) elm(1) application/octet-stream This is a catch-all for files such as program binary, or files that contain control characters or characters with high-order bits set. application/postscript The file can be displayed with a PostScript-equipped printer or viewer. message/rfc822 This specifies that the file is in message format, as described in the Terminology subsection. image/jpeg , image/gif These are picture formats that require a display program.
elm(1) elm(1) defined as: e num The index number of the attachment. filename The name of the attached file. size The size of the attachment in bytes, computed from the file or the message. type /subtype The type and subtype of the attachment. This value is placed or found in a Content-Type: header. encoding The encoding type. This value is placed or found in a Content-TransferEncoding: header.
elm(1) elm(1) Mail Archive This feature is the ability to specify the message content that needs to be archived (assuming copy is enabled). To indicate the last line of the message to be archived, you need to have either the [nosave] or [no save] key line in the body of your message. The saved mail will not contain the message following the [nosave] or [no save] key line. However, the outgoing mail will contain all the messages except the key line.
elm(1) elm(1) Options Menu The Options Menu is invoked with the Message Menu o command. It displays a list of the options, defined by the configoptions string variable, that you can modify while elm is running. Enter the appropriate letter (in upper- or lowercase) that is followed with a right parenthesis ()) and follow the directions on the screen. The full set of option prompts and the corresponding variables is listed below. The default options are marked with an *.
elm(1) elm(1) s Send. Send the message. FORMS MESSAGES A feature that is unique to elm is the ability to compose and reply to forms messages. Creating a Forms Message • In your elmrc file, set forms=ON . • Set your userlevel numeric variable to 1 (moderately experienced) or 2 (expert). You can do this in your elmrc file or on the default Options Menu.
elm(1) elm(1) headers of all outbound mail. Entries in the elmheaders file should have the following format: header-name : header-string header-name : must not contain blanks. header-string can be continued over several lines by preceding each continuation line with blanks, as indicated by the output below.
elm(1) elm(1) alteditor The name of the editor to use for messages that have initial text (a copied message in a reply, a signature in any outbound message, etc.). when the editor string variable is set to none or builtin . The default is the value of the EDITOR environment variable, if set and nonnull, or /usr/bin/vi otherwise. See also the editor string variable. alternatives A list of other machine and user name combinations that you receive forwarded mail from.
elm(1) elm(1) n o p r s t u v w y z The names boolean variable. * The sentmail string variable. * The print string variable. * The autocopy boolean variable. The sortby string variable. * The easyeditor string variable. The userlevel numeric variable. * The visualeditor string variable. * The askcc boolean variable. The fullname string variable. * The sigdashes boolean variable. displaycharset The name of the character set supported by the display. This is independent of the charset string variable.
elm(1) elm(1) In elm , you can use the = metacharacter to specify this directory. For example, if you save a message to file =/archive , the = is expanded to the current value of maildir . (The slash (/) is optional.) When you start elm , if the directory specified by maildir does not exist, you are asked if you want to create it. If you answer y (yes), the directory is created, with access permissions set to 700 . pager The program to display each message.
elm(1) elm(1) savecharset The character set to be used to save a message in a folder. Possible values are JIS , SJIS , and EUC . If a value is not specified, the message will be saved according to your locale (given by the LC_TYPE and/or LANG environmental variables). This option is applicable only for the Japanese locale. The default is none. See also the jisconversion boolean variable. sentmail The file where copies of outbound mail can be saved.
elm(1) elm(1) There are two special values: *clear-weed-list* Clear the default list. The default headers are removed from the weedout list, allowing you to completely define your own list. *end-of-user-headers* Mark the end of the weedout list, in case any following lines could be mistaken for headers in the list. The default value of weedout is *end-of-user-headers*. The underscore (_) character can be used to specify a space. Note that From weeds out both From and From: .
elm(1) elm(1) 0 Novice user (the default). Command menus are a small verbose subset of the available commands. 1 Moderately experienced user. Command menus are a larger terse subset of the available commands. Outbound message commands allow you to recover previously unsent messages as the text of the current outbound message. 2 Expert. The features are the same as for 1. Level 1 or 2 is required if you want to send a forms message.
elm(1) elm(1) confirmcreate and confirmfolders Operation below. The default is OFF . confirmfiles If ON, you are asked to confirm before messages are appended to an existing file that is not in your mail directory. This does not affect files in your mail directory. If OFF , see confirmappend and confirmfiles Operation below. The default is OFF . confirmfolders If ON, you are asked to confirm before a new file is created in your mail directory. This does not affect files in other directories.
elm(1) e elm(1) keepempty If ON, keep folders from which all the messages are deleted. If OFF , delete empty folders. The default is OFF . keypad If ON, enable the HP 2622 terminal cursor keys. If OFF , disable the cursor keys. If the program is invoked with the -K command line option, keypad is set to OFF . See also the softkeys boolean variable. The default is ON . menu If OFF , this inhibits the menu display on all program screen displays. If ON, the menus are displayed.
elm(1) elm(1) command line option, softkeys is set to OFF . See also the keypad boolean variable. The default is OFF . titles If ON, title a displayed message with a line in the form: Message number /total sendername date time sendername, date, and time are extracted from the message headers in the manner described in Message Index. This is useful if you have suppressed the relevant header entries with the weedout list. If OFF , the message is not titled. The default is ON .
elm(1) elm(1) image/gif; xv %s RFC 1521 defines a number of Content-Types that elm leaves for metamail to handle: text/richtext multipart/alternative multipart/parallel multipart/digest message/partial message/external-body image/jpeg image/gif audio/basic video/mpeg application/octet-stream application/postscript Check the system mailcap file for entries that handle many of them. e EXTERNAL INFLUENCES Environment Variables HOME Your home (login) directory.
elm(1) elm(1) which reads file help.c and sends it with the default subject. File Mode with a Pipe To mail the output of a command and include a subject line: $ ls -a | elm -s "Directory Listing" j_doe WARNINGS Using two separate mail programs to access the same mail file simultaneously (usually inadvertently from two separate windows) can cause unpredictable results.
elmalias(1) elmalias(1) NAME elmalias - display and verify elm user and system aliases SYNOPSIS elmalias [-dersu ] [-a-f format-n-v-V] [alias-name-list] Remarks The former functionality of the elmalias command has been taken over by the newalias command (see newalias(1)). DESCRIPTION The elmalias command displays and verifies user and system elm aliases. The system database must have been created by the newalias command (see newalias(1)).
elmalias(1) elmalias(1) %a %c %l %n %t %v The alias name. The comment field. The lastname field. The fullname value. The alias type: person , group , or unknown . The address-list field. -n -r Change the display to address-list followed by fullname, if any, in parentheses. -s -u -v Use the system alias database only, unless -u is also specified. -V Use a very verbose, multiline output format with the following titles, corresponding to the format codes of the -f option.
elmalias(1) elmalias(1) mom dad father pop parents siblings brother1 my_mother@a.computer (My Mommy) host!otherhost!dad (Dear Father) host!otherhost!dad (Dear Father) host!otherhost!dad (Dear Father) mom,dad,parent@host (The Folks) brother1,brother2,sister (The Kids) bro1@kid.
emtui(1) emtui(1) NAME emtui - provide displaying options for HP-UX errors defined in the Common Error Repository (CER) SYNOPSIS /opt/sfm/bin/emtui { -b|-v } [-a solutiontext -i errornumber -C causenumlist] [-c category ] [-d -i errornum -u usersolution] [-e etype] [-h] [-i errornum| -q querystring [-w matchtype] ] [-l sevop [sevval ] ] [-m solutiontext -i errornum -u usersolution] [-s scope] e DESCRIPTION The emtui command obtains information about HP-UX errors which are defined in the Common Error Re
emtui(1) emtui(1) The following are examples using the -c option: • Display matching errors in the kernel category: emtui -b -c kernel • Display brief information (-b option) about the matching network errors that contain the word failure (see the -q option): emtui -b -c network -q failure -c causenumlist Specifies a list of cause number(s). Each cause number is associated with an error while adding a custom solution. To specify one cause, type one cause number.
emtui(1) emtui(1) that will match both parameters. wbem [ [ providername ] [ ,eventid ] ] Displays errors generated by Web-Based Event Management (WBEM) providers. providername is a specific WBEM provider. eventid is a single event; it is an integer. If both WBEM provider ID and event ID are specified, the search results will match both parameters.
emtui(1) emtui(1) -m "Contact John Doe in IT Support" -i 1234 -u 9876 -q querystring Provides a query string to query the CER for information about errors, cause, and the recommended action. Obtain specific search results by using the -c , -e , -l , and -s options or the -w option along with the -q option. The -q option is optional.
emtui(1) 0 non 0 emtui(1) Successful completion. An error occurred. EXAMPLES Examples of using emtui follow: Add a user-defined solution solutiontext for the causes causenumlist for the error errornum: /opt/sfm/bin/emtui -a solutiontext -i errornum -C causenumlist Delete the user-defined solution having numbers specified in -u for the error errornum: /opt/sfm/bin/emtui -d -i errornum -u usersolution Modify the user-defined solution having numbers specified in -u for the error errornum.
enable(1) enable(1) NAME enable, disable - enable/disable LP printers SYNOPSIS enable printers disable [-c] [-r[reason] ] printers DESCRIPTION The enable command activates the named printers, enabling them to print requests taken by lp . Use lpstat to find the status of printers (see lp(1) and lpstat(1)). disable deactivates the named printers, disabling them from printing requests taken by lp.
env(1) env(1) NAME env - set environment for command execution SYNOPSIS env [-] [-i] [ name = value ] ... [ command [ arguments ... ] ] DESCRIPTION env obtains the current environment, modifies it according to its arguments, then executes the command with the modified environment. Arguments of the form name =value are merged into the inherited environment before the command is executed.
eucset(1) eucset(1) NAME eucset - set and get code widths for ldterm SYNOPSIS eucset [-p] eucset [ [-c HP15-codeset] or [-c UTF8 ] or [-c ASIAN_UTF8 ] or [-c GB18030 ] or [cswidth] ] e DESCRIPTION The eucset command sets or gets (reports) the encoding and display widths of the Extended UNIX Code (EUC), UCS Transformation Format (UTF8), or GB18030 characters processed by the current input terminal. EUC is an encoding method for codesets composed of single or multiple bytes.
eucset(1) eucset(1) The cswidth argument in the eucset command line is a character string that describes the character widths for codesets 1 through 3. This command does not allow the user to modify the settings for codeset 0. The character string is of the following format: X1 [:Y1 ],X2 [:Y2 ],X3 [:Y3 ] X1 The number of bytes required to encode a character in codeset class 1. Y1 The number of display columns needed to display characters in this class.
eucset(1) eucset(1) eucset 2:2 To set the code width to that of UTF8 , enter: eucset -c UTF8 To set the code width to that of ASIAN_UTF8 , enter: eucset -c ASIAN_UTF8 To set the code width to that of GB18030 , enter: eucset -c GB18030 WARNINGS The cswidth argument does not include the SS2 or SS3 bytes in the byte width values. e This command is not specified by standards, may not be available on other vendor’s systems, and may be subject to change or obsolescence in a future release.
evmget(1) evmget(1) NAME evmget - retrieve stored events SYNOPSIS evmget [-A [-t show_template]] [-e] [-f filter_expr ] [-s sort_spec ] [-C channel-list] DESCRIPTION The evmget command retrieves stored events and outputs them to stdout as EVM events. Events are obtained from a configured set of log files and event channels, using channel-specific retrieval functions as specified in the channel configuration file, /etc/evmchannel.conf.
evmget(1) evmget -A -t "@timestamp evmget(1) @@" • In this example, only events from the my_log channel are retrieved. The events are further filtered to display only messages from the EVM daemon’s logfile. • This example retrieves only events that have a priority value of at least 500. The raw events are sorted into descending timestamp order and stored in a file. evmget -A -C my_log -f "[name *.
evminfo(1) evminfo(1) NAME evminfo - provide information about EVM SYNOPSIS evminfo {-lc | -vp | -verify verify_option [-file verify_file]) DESCRIPTION The evminfo command writes selected information about the EVM environment to its standard output stream. The options determine the information to be displayed. Options -lc Reads the EVM channel configuration file, /etc/evmchannel.conf, and writes a list of all the configured event channels.
evminfo(1) evminfo(1) Files evmchannel.conf(4), evmdaemon.conf(4), evmlogger.conf(4). Event Management EVM(5). EVM Events EvmEvent(5). Event Filter EvmFilter(5).
evmpost(1) evmpost(1) NAME evmpost - post events to the EVM daemon SYNOPSIS evmpost [-r [-m|-M]] [[-a|-u msg [-p priority]] | [filename| -]] DESCRIPTION The evmpost command takes a file or stream of text event sources as input and converts them to binary EVM events. By default, the command then posts them to the EVM daemon for distribution. If the -r option is specified, evmpost writes the EVM events to its stdout stream instead of posting them to the daemon.
evmpost(1) evmpost(1) The following example is successful, even though it does not display any useful information: echo ’event { }’ | evmpost -r | evmshow Unformatted event "(no name)"; The -r option can verify event source and template files by piping the output into evmshow . See evmshow (1). Options Does not post the events, but instead passes them directly to stdout as raw EVM events. -r An error occurs if stdout is directed to a terminal device.
evmpost(1) evmpost(1) evmpost -a "Power outage recovery completed" -p 250 • The following example posts a quick user’s message. evmpost -u "Leaving for lunch." • This example posts an event that includes a variable. evmpost << EOF event { name myco.ops.backup.ok var { name backup.
evmshow(1) evmshow(1) NAME evmshow - display an EVM event SYNOPSIS evmshow [-d | -D | -x] [-t show_template] [-T timespec] [-r | -b item_list ] [-c config_file] [-f filter_exprt ] [-F] [-k skip_count] [-n show_count] [filename | -] DESCRIPTION The evmshow command is EVM’s event formatter. It reads raw EVM events either produced by other EVM commands or stored in a file and converts them to display format for viewing. Events are read from stdin if no filename is specified or if filename is -.
evmshow(1) evmshow(1) The -f option can be used to specify an EVM filter string, to limit the events that are passed through evmshow . If this option is used, only events that match the filter_expr are output. See the EvmFilter(5) manpage for the filter syntax. The -r option can be used in combination with the -f, -k, and -n options to make evmshow act as a filter, reading a stream of events and writing only those that meet the selection criteria specified by the other options.
evmshow(1) evmshow(1) Operands filename Reads events from file filename. If filename is omitted, or is specified as -, events are read from stdin . Notes 1. The -r and -b options should not be used when output is sent indirectly to a terminal device, such as piping the output of the evmshow command to the more command. 2. The evmget and evmwatch commands can be made to run evmshow automatically by use of their -A options. See evmget (1) and evmwatch(1) for more information.
evmshow(1) evmshow(1) evmshow -r -f "[priority >= 500]" file1 > file2 • The following example uses the evmwatch -i option to request a list of all event templates from the EVM daemon, and then uses evmshow to display the name and priority of each template, followed by its explanation text. See evmtemplate (4) for details of event templates. evmwatch -i | evmshow -t "@name [@priority]" -x | more WARNINGS The evmshow command rejects attempts to output raw events to a terminal device.
evmsort(1) evmsort(1) NAME evmsort - sort events SYNOPSIS evmsort [-A [-t show_template]] [-s sport_spec ] [filename | -] DESCRIPTION The evmsort command reads and sorts a stream of EVM events. By default, events are read from stdin , and are sorted into ascending timestamp order. Sorted events are written to the command’s stdout stream in the form of raw EVM events.
evmsort(1) evmsort(1) EXAMPLES • The following example retrieves all events with a priority of 300 or greater, sorts them into descending order of priority (most urgent event first) and then ascending order of time (oldest event first), and automatically runs evmshow to display them. evmget -f ’[priority >= 300]’ | evmsort -s "@priority-:@timestamp" | evmshow -t "@priority @timestamp @@" • The following example yields a list of all events, sorted with the latest event first within name .
evmwatch(1) evmwatch(1) NAME evmwatch - monitor EVM events SYNOPSIS evmwatch [-A [-t show_template]] [-f filter_expr ] [-C channel-list] [-w timeout] [-i | -x] [-R reconnect-timeout] DESCRIPTION The evmwatch command subscribes to the events specified by the -f filter_expr option and passes all events to its stdout stream as they arrive. Output is in the form of raw EVM events.
evmwatch(1) • evmwatch(1) The following example shows how evmwatch waits until another process posts a particular event and then continues. Redirection of output to /dev/null implies that the content of the event is of no concern. evmwatch -f "[name myco.ops.backup.done]" -x >/dev/null The following script builds on the prior example. It waits for five minutes (300 seconds) for the event to occur or exits as soon as the event happens. #! /bin/ksh evmwatch -f "[name myco.ops.backup.
evweb(1) evweb(1) NAME evweb - provides an overview of evweb commands SYNOPSIS evweb [ list | subscribe | eventviewer ] DESCRIPTION The evweb tool provides various commands to view and administer event subscriptions. Each command has a set of options and switches associated with it. You can use the commands in combination with different options and switches to create, modify, and delete event subscriptions. You can also view detailed and summary information about the subscribed events.
evweb_eventviewer(1) evweb_eventviewer(1) NAME evweb_eventviewer - enables you to view and delete events SYNOPSIS evweb eventviewer {-D [ -a|-e|-f|-h|-i|-n|-r|-t|-v ] } {-E [ -h|-n ] } {-L [ -a|-e|-h|-i|-o|-r|-s|-t|-v ] } DESCRIPTION The evweb eventviewer command is used to list the event summary (-L), display details of an event (-E), or to delete an event (-D). The options -D, -E, and -L are mutually exclusive.
evweb_eventviewer(1) evweb_eventviewer(1) le less than or equal to ge greater than or equal to bw between The default value of operator is eq . You must use only one operator at a time. To use the bw operator, you must specify the lower and upper severity levels. For all other operators, you must specify only one severity level. The severity level ranges from 0 to 7, where 0 is least severe and 7 is most severe.
evweb_eventviewer(1) evweb_eventviewer(1) • • • • • • • • -v Event_categories -i Event_IDs -r [is|be|en|co][:]search_string -a age_number[:]{yy|mm|dd|hh} -t [eq|le|ge|bw]:mm:dd:yyyy :hh:mi:ss[,mm:dd:yyyy :hh:mi:ss] -s [asc|desc]:summary_list sort_column_name -o offset_number -c count_of_events -h Following are the examples of the -L option: • evweb eventviewer -L -e eq:4 -a 5:dd • evweb eventviewer -L • evweb eventviewer -L -s severity -o 0 -c 5 • evweb eventviewer -L -h e -n [Event_Numbers] Specifies
evweb_eventviewer(1) evweb_eventviewer(1) • • -s eventcategory -s "asc eventcategory" -t [eq|le|ge|bw]:mm:dd:yyyy :hh:mi:ss[,mm:dd:yyyy :hh:mi:ss] Specifies date and time. Date-time can be represented by an operator followed by the date-time values. The following operators can be used with the -t switch. equal to less than equal to greater than equal to between eq le ge bw Only one operator can be used at one time. To use the bw operator, specify the lower and upper date-time values.
evweb_eventviewer(1) evweb_eventviewer(1) evweb eventviewer -D -n 8432,8434 Deletes the events with event number 8432 and 8434. evweb eventviewer -D -e le:3 Deletes all events with severity less than or equal to 3. evweb eventviewer -D -f -r "be:This is" -a 24:hh Deletes all events starting with the error message "This is" that occurred in the last 24 hours. This command does not prompt users for confirmation before deleting the events. AUTHOR evweb eventviewer is developed by HP.
evweb_list(1) evweb_list(1) NAME evweb_list - lists different categories of events SYNOPSIS evweb list [-h|-v] DESCRIPTION The evweb list command lists different categories of events for the evweb tool. Options The evweb list command supports the following options: -h -v e Displays the usage of the evweb list command. Displays a list of event categories. The list consists of event categories enumerated as a part of the HP_AlertIndication MOF class and HP_ThresholdIndication class.
evweb_subscribe(1) evweb_subscribe(1) NAME evweb_subscribe - enables you to view, create, modify, and delete event subscriptions SYNOPSIS evweb subscribe {-L [ -b|-h ] } {-E [ -h|-n ] } {-C [ -e|-h|-i|-n|-r|-t|-v ] } {-M [ -e|-h|-i|-n|-r|-t|-v } {-D [ -f|-n ] } DESCRIPTION The evweb subscribe command enables you to create (-C), delete (-D), modify (-M), list (-L), and view detailed information (-E) about subscriptions. The options -L, -E, -C, -M, and -D are mutually exclusive.
evweb_subscribe(1) 0 1 2 3 4 5 6 7 evweb_subscribe(1) Unknown Normal Other Information Warning Minor Major Critical Use a colon (:) to separate an operator and a severity level. Use a comma (,) to separate two severity levels. You can also use a space to separate an operator and a severity level. However, in this case, you should enclose the operator and severity values within double quotes. You can specify only one -e switch in a command.
evweb_subscribe(1) evweb_subscribe(1) Following are the examples of the -M option: • • • • evweb evweb evweb evweb subscribe subscribe subscribe subscribe -M -M -M -M -n my_subs_2 -i 1235 -n 2my_subs_2 -i 1235 -r -n my_subs_3 -t archive -h -n subscription_name Specifies the name of the subscription. The subscription name must be unique. Following are the examples of the -n option: • -n MySubs -r Specifies whether the destination should be modified.
evweb_subscribe(1) evweb_subscribe(1) Lists all subscriptions that are created using tools other than EVWEB. evweb subscribe -E -n MySubs Displays details of the subscription named MySubs . evweb subscribe -C -n MySubs -i Evt002 Creates a subscription named MySubs . The subscription criteria is EventId=Evt002. Destination is not selected. evweb subscribe -C -n MySubs -e 3 -t archive Creates a subscription named MySubs . The subscription criteria is severity=3 and destination=archive.
ex(1) ex(1) NAME ex, edit - extended line-oriented text editor SYNOPSIS ex [-] [-l] [-r] [-R] [-t tag] [-v] [-wsize] [-x] [-C] [+command] [file ...] UNIX Standard Synopsis ex [-rR ] [-s -v] [-c command] [-t tag] [-w size] [file ...] Obsolescent Options ex [-rR ] [- -v] [+command] [-t tag] [-w size] [file ...] edit [-] [-l] [-r] [-R] [-t tag] [-v] [-wsize] [-x] [-C] [+command] [file ...] Remarks The program names ex, edit , vi, view , and vedit are separate personalities of the same program.
ex(1) e ex(1) -x Set encryption mode. You are prompted for a key to initiate the creation or editing of an encrypted file (see the crypt command in Command Descriptions below). -C Encryption option. Same as the -x option, except that all text read in is assumed to have been encrypted. -c command +command (UNIX Standard only, see standards(5)) (Obsolescent) Begin editing by executing the specified ex search or positioning command. file Specify the file or files to be edited.
ex(1) ex(1) % +n, +[+]... -n, -[-]... /re / ?re ? ’x Abbreviation for 1,$ , meaning the entire work area. An offset relative to the current line or the preceding line specification. + means forward; - means backward. For example, the forms .+3 , +3 , and +++ are equivalent. The line containing the pattern re, scanning forward (/) or backward (?). The trailing / or ? can be omitted if the line is only being displayed.
ex(1) ex(1) The sequence \n, where n is an integer, is replaced by the text matched by the subpattern enclosed in the nth set of parentheses \( and \) . The sequence \u (\l ) causes the immediately following character in the replacement to be converted to uppercase (lowercase), if the character is a letter. The sequence \U (\L ) turns case conversion on, until the sequence \E or \e is encountered, or the end of the replacement string is reached.
ex(1) ex(1) one unnamed buffer, which is the repository for all text deleteed or yanked when no buffer is specified. There are also numbered buffers, 1 through 9, which shall be accessible only from visual mode. These buffers are special in that, in the visual mode, when deleted text is placed in the unnamed buffer, it also shall be placed in buffer 1, the previous contents buffer 1 shall be placed in buffer 2 and so on. Any text in the buffer 9 shall be lost.
ex(1) copy ex(1) range co[py] line flags range t line flags A copy of the specified lines (range) is placed after the specified destination line; line 0 specifies that the lines are to be placed at the beginning of the work area. (The letter t is an alternative abbreviation for the copy command.) crypt cr[ypt ] X The user is prompted for a key with which to enter encryption mode. This command can also be used to change the key entered from a previous crypt command or the -x command line option.
ex(1) ex(1) visual command is also permitted (unless the global command itself has been issued from visual mode), and takes input from the terminal. (If command contains a visual-mode command (that is, open or visual ), the visual-mode command must be terminated by the visual-mode Q command in order to proceed to the next marked line.) The global command itself and the undo command are not allowed in command. The editor options autoprint , autoindent , and report are inhibited.
ex(1) number ex(1) range nu[mber ] count flags range # count flags (The # character is an alternative abbreviation for the number command.) Print the lines, each preceded by its line number (the only useful flag is l). The last line printed becomes the current line. open line o[pen ] /re / flags Enter open mode, which is similar to visual mode with a one-line window. All the visual-mode commands are available.
ex(1) ex(1) current buffer has been modified since the last write, a warning shall be written and the command shall be aborted. Any warnings can be overridden by appending a !. The current indicator line shall be affected by the editor options, autowrite and writeany . set se[t] [all ] se[t] [no]boolean-option? se[t] value-option[?] se[t] boolean-option se[t] noboolean-option se[t] value-option =value Set and display the values of the editor options (see Editor Options below).
ex(1) ex(1) The form s\& repl is equivalent to s/ subs-re /repl /, where subs-re is the previous substitution string. suspend stop su[spend ][!] st[op][!] susp Suspend the editor job and return to the calling shell. stop and susp are equivalent to suspend . susp is the user process control suspend character, which is typically the character ˆZ (ASCII SUB) (see stty(1)). This command is disabled if the calling shell does not support job control or has disabled it.
ex(1) ex(1) If an alternate file is specified and the file exists, the write fails, but can be forced by appending ! to the command. To append to an existing file, append >> to the command. If the file does not exist, an error is reported. If the file is specified as !string, string is interpreted as a system command, the command interpreter is invoked, and the specified lines are passed as standard input to the command. The command wq is equivalent to a w followed by a q.
ex(1) ex(1) If type is specified, it must be one of the following characters: + . ^ = Display a window of lines following the addressed line. Place the addressed line at the bottom of the window of displayed lines. Place the addressed line at the center of the window. Display a window of lines that is two windows prior to the addressed line. Display the addressed line at the center of the window with a line of dashes above and below the addressed line.
ex(1) ex(1) If the specified directory is set from EXINIT or a .exrc file and is not writable by the user, the editor quits; if set interactively by the user, the editor issues an error message. doubleescape When set, two consecutive ESC (escape) characters are required to leave input mode. In input mode, a single ESC character followed by a different character causes vi to issue an audible or visual warning (see the flash editor option) and insert both characters into the work area.
ex(1) ex(1) list Display all printed lines with tabs shown as ˆI , and the end of line marked by a $. Reversed by nolist . The default is nolist . magic Affect the interpretation of characters in regular expressions and substitution replacement strings (see Regular Expressions and Replacement Strings above). Reversed by nomagic . The ex, vi, and view default is magic . The edit and vedit default is nomagic .
ex(1) scroll= n ex(1) The value of n determines the number of lines scrolled by a ˆD command and the number of lines displayed by the z command (twice the value of scroll). The default is half the value of the window option. sections= pair-string The value of this option is a string, in that successive pairs of characters specify the names of text-processing macros that begin sections. See the paragraphs editor option above. The default is sections=NHSHH\ HUuhsh+c.
ex(1) ex(1) timeoutlen option in order to be accepted as a match for the macro name. If not set, no limit is placed on how long to wait for the completion of a macro name. Reversed by notimeout (noto ). The default is timeout . timeoutlen= n Set, in milliseconds (ms), the length of the macro timeout period (see the timeout editor option). This option has no effect unless timeout is set. The value of n must be at least 1. The default is timeoutlen=500 (half a second).
ex(1) ex(1) HOME shall be interpreted as a pathname of a directory that shall be searched for an editor startup file name .exrc . LC_COLLATE determines the collating sequence used in evaluating regular expressions and in processing the tags file. If it is not specified or is null, it defaults to the value of LANG .
ex(1) ex(1) variable. If the variable is not set, ex shall attempt to read commands from the $HOME/.exrc . If and only if EXINIT or $HOME/.exrc sets the editor option exrc, ex finally shall attempt to read commands from a file .exrc in the current directory. In the event that EXINIT is not set and the current directory is the home directory of the user, any .exrc file shall only be processed once. No .exrc shall be read unless it is owned by the same user ID as the effective user ID of the process.
ex(1) ex(1) STANDARDS COMPLIANCE ex: SVID2, SVID3, XPG2, XPG3, XPG4 e HP-UX 11i Version 3: February 2007 − 19 − Hewlett-Packard Company 345
expand(1) expand(1) NAME expand, unexpand - expand tabs to spaces, and vice versa SYNOPSIS expand [-t tablist ] [ file ... ] unexpand [-a] [-t tablist ] [ file ... ] Obsolescent: expand [-tabstop ] [-tab1,tab2,... , tabn ] [ file ... ] e DESCRIPTION expand processes the named files or the standard input and writes to the standard output with tabs changed into spaces. Backspace characters are preserved in the output, and the column count is decreased by one column for tab calculations.
expand(1) expand(1) STANDARDS CONFORMANCE expand : XPG4, POSIX.2 unexpand : XPG4, POSIX.
expand_alias(1) expand_alias(1) NAME expand_alias - recursively expands the sendmail aliases SYNOPSIS expand_alias [-rmax_recursion] [-t] [-tt ] alias DESCRIPTION Expand_alias is a shell script that recursively expands the sendmail aliases. Through use of telnet host 25 and the expn command, each alias is recursively expanded into its destination(s). Indentation is used to show each level of recursion. Because of the recursive use of telnet , expand_alias is slow.
expr(1) expr(1) NAME expr - evaluate arguments as an expression SYNOPSIS expr arguments DESCRIPTION expr takes arguments as an expression, evaluates, then writes the result on the standard output. Terms in the expression must be separated by blanks. Characters special to the shell must be escaped. Note that 0, rather than the null string, is returned to indicate a zero value. Strings containing blanks or other special characters should be quoted.
expr(1) expr(1) contains an invalid setting, expr behaves as if all internationalization variables are set to "C" (see environ(5)). If UNIX_STD is set to 2003 , it enables the UNIX 2003 Standard environment. International Code Set Support Single- and multi-byte character code sets are supported. RETURN VALUE As a side effect of expression evaluation, expr returns the following exit values: 0 1 2 >2 e Expression is neither null nor zero. Expression is null or zero. Invalid expression.
factor(1) factor(1) NAME factor, primes - factor a number, generate large primes SYNOPSIS factor [ number ] primes [ start [ stop ] ] DESCRIPTION If no arguments are provided on the command line, factor waits for a number to be typed in. If a positive number is typed, it factors the number and print its prime factors; each one is printed the proper number of times. It then waits for another number. factor exits if it encounters a zero or any nonnumeric character.
fastbind(1) fastbind(1) NAME fastbind - Prepare an incomplete executable for faster program start-up SYNOPSIS fastbind [-nu] incomplete-executable... DESCRIPTION fastbind is a tool that can improve the start-up time of programs that use shared libraries (incomplete executables) by storing information about needed shared library symbols in the executable file.
fastbind(1) fastbind(1) LC_CTYPE Determines the locale category for character handling functions. NLSPATH Determines the location of message catalogs for the processing of LC_MESSAGES . If any internationalization variable contains an invalid setting, fastbind behaves as if all internationalization variables are set to C. See environ(5). In addition, the following environment variable affects fastbind : TMPDIR Specifies a directory for temporary files (see tmpnam(3S)).
fastmail(1) fastmail(1) NAME fastmail - quick batch mail interface SYNOPSIS fastmail [-b bcc-list] [-c cc-list] [-C comments ] [-f from-name] [-F from-addr] [-i in-reply-to] [-r reply-to] [-R references] [-s subject] filename address-list DESCRIPTION The fastmail command is a simple interface to the mail system that allows you to send a message without the overhead of an interactive mailer. It is particularly efficient in batch-processing mail to very large groups of people.
fastmail(1) fastmail(1) -d \ -F me@anotherhost.com \ -f My Name \ -i "Your recent message" \ -R REF:13579 \ -r oscar \ -s "Testing fastmail" \ message-file \ addr1 addr2 addr3 addr4 The online execution displays the following debug messages: Mailing to addr1,addr2,addr3,addr4 cc1,cc2,cc3,cc4 bcc1,bcc2,bcc 3,bcc4 [via sendmail] cat /tmp/fastmail.
fastmail(1) fastmail(1) FILES /etc/mail/aliases /usr/sbin/sendmail /tmp/fastmail.pid sendmail aliases file. Mail transport agent. Temporary file. AUTHOR fastmail was developed by HP. SEE ALSO elm(1), sendmail(1M).
file(1) file(1) NAME file - determine file type SYNOPSIS file [-m mfile ] [-c ] [-f ffile ] [-h ] [-i ] file ... UNIX 2003 (onwards) Synopsis file [-m mfile ] [-M Mfile ] [-c ] [-d ] [-f ffile ] [-h ] [-i ] file ... DESCRIPTION file performs a series of tests on each file in an attempt to classify it. If file appears to be an ASCII file, file examines the first 512 bytes and tries to guess its language. If file is an executable a.
file(1) file(1) SEE ALSO ld(1), standards(5).
find(1) find(1) NAME find - find files SYNOPSIS find [-H-L] pathname_list [expression] DESCRIPTION The find command recursively descends the directory hierarchy for each path name in pathname_list (that is, one or more path names) seeking files that match a Boolean expression written in the primaries given below. By default, find does not follow symbolic links; see Options. The Boolean expression is evaluated using short-circuit evaluation.
find(1) find(1) Any command argument {} is replaced by the current path name. cmd may contain supplementary code set characters. This example shows the difference between using ; and +. Two directories each have a file called, hello .
find(1) find(1) -local True if the file physically resides on the local system. This does not restrict the search to only files which physically reside on the local system, it merely matches such files. See EXAMPLES. -mountstop Identical to -xdev . This primary is provided for backward compatibility only. -xdev is preferred over -mountstop . -mtime n True if the file modification time subtracted from the initialization time is n-1 to n multiples of 24 h.
find(1) find(1) -print Causes the current path name to be printed followed by a newline character. Always true. -print0 Causes the current path name to be printed followed by a null character. Always true. -perm [-]mode In this primary, the argument mode is used to represent file mode bits. The argument is identical in format to the mode operand as described in chmod(1), with the exception that the first character must not be the - operator.
find(1) find(1) HFS Access Control Lists The -acl primary enables the user to search for HFS access control list entries. It is true if the file’s access control list matches an access control list pattern or contains optional access control list entries (see acl(5)). It has three forms: -acl aclpatt Match all files whose access control list includes all (zero or more) pattern entries specified by the aclpatt pattern.
find(1) find(1) If LC_ALL is set to a nonempty string value, it overrides the values of all the other internationalization variables. If any internationalization variable contains an invalid setting, all internationalization variables default to C (see environ(5)). LC_CTYPE determines the interpretation of text as single and/or multibyte characters, the classification of characters as printable, and the characters matched by character class expressions in regular expressions.
find(1) find(1) Note that the spaces delimiting the escaped parentheses are required. • Print a single long listing of all files named *.o in the current directory: find . -name ’*.o’ -exec ls -l {} \+ find . -name ’*.o’ -exec ls -l \+ Note that the curly braces, before plus sign, are optional. • Print the names of all files on this machine.
find(1) find(1) WARNINGS Because of interoperability goals, cpio does not support archiving files larger than 2GB or files that have user/group IDs larger than 60,000 (60K). Files with user/group IDs greater than 60K are archived and restored under the user/group ID of the current process. AUTHOR find was developed by AT&T and HP.
findmsg(1) findmsg(1) NAME findmsg, dumpmsg - create message catalog file for modification SYNOPSIS findmsg [-aiv ] [ [-D sym ] [-U sym ]] file ... dumpmsg file ... DESCRIPTION The findmsg command extracts messages from a C program source file and writes them to the standard output in a format suitable for input to gencat (see gencat(1)). The input file will be preprocessed using cpp (see cpp(1)) in order to select print specifiers and handle ifdef , ifndef ... conditional cpp primitives.
findmsg(1) findmsg(1) WARNINGS The findmsg and dumpmsg commands are HP proprietary, not portable to other vendors’ systems, and will not be provided in future HP-UX releases. AUTHOR findmsg and dumpmsg were developed by HP. SEE ALSO findstr(1), gencat(1), insertmsg(1), catgets(3C).
findstr(1) findstr(1) NAME findstr - find strings for inclusion in message catalogs SYNOPSIS findstr file ... DESCRIPTION findstr examines files of C source code for uncommented string constants which it places, along with the surrounding quotes, on the standard output, preceding each by the file name, start position, and length. This information is used by insertmsg (see insertmsg(1)). findstr does not output strings that are parameters of the catgets() routine (see catgets(3C)).
finger(1) finger(1) NAME finger - user information lookup program SYNOPSIS finger [ options ] user_name ... DESCRIPTION By default, finger lists for each user_name on the system: • • • • • • • • • • f Login name, Full given name, Terminal write status (if write permission is denied), Idle time, Login time, User’s home directory and login shell, Any plan the user has placed in file .plan in their home directory, Project on which they are working from the file .
finger(1) finger(1) SEE ALSO chfn(1), who(1), utmpd(1M).
fmt(1) fmt(1) NAME fmt - format text SYNOPSIS fmt [-cs] [-w width] [file...] DESCRIPTION The fmt command is a simple text formatter that fills and joins lines to produce output lines of (up to) the number of characters specified in the -w width option. The default width is 72. fmt concatenates the file arguments. If none are given, fmt formats text from the standard input. Blank lines are preserved in the output, as is the spacing between words. fmt does not fill lines beginning with a period (.
fold(1) fold(1) NAME fold - fold long lines for finite width output device SYNOPSIS fold [-b] [-s] [-w width ] [ file ... ] Obsolete form: fold [-s] [-width ] [ file ... ] DESCRIPTION The fold command is a filter that folds the contents of the specified files, breaking the lines to have a maximum of width column positions (or bytes, if the -b option is specified).
fold(1) fold(1) SEE ALSO expand(1). STANDARDS CONFORMANCE fold : XPG4, POSIX.
footprints(1) footprints(1) NAME footprints - summarize information from compiler footprint records SYNOPSIS /usr/ccs/bin/footprints [-V] [-v] [-w] filename... DESCRIPTION The footprints command scans the named object files, analyzes the compiler footprint records stored in those files, and generates a summary report. This report is intended for use by HP support and lab engineers to assist in problem diagnosis. The report contains the following information: • Total number of compilation units found.
footprints(1) Total size: f footprints(1) 425.8K (text) 24.8K (data) version architecture -O PBO -g debugopt [A.06.11/ANSI C 51] [ipf32 51] [01 1] [02 [off 51] [off 51] [off 51] +Ointeger_overflow +Olit +eh -fpeval -inline -link_type -mt -rodata ... [moderate [const [off [float [1 [dynamic [(off) [cond 51] 51] 51] 51] 1] [2 51] 51] 51] 50] 50] The version line shows that all 51 compilation units were compiled with Version A.06.11 of the ANSI C compiler.
forder(1) forder(1) NAME forder - convert file data order SYNOPSIS forder [-a] [-l] [-n] [ file ... ] DESCRIPTION The text orientation (mode) of a file can be right-to-left (non-Latin) or left-to-right (Latin). This text orientation can affect the way data is arranged in the file. The data arrangements that result are called screen order and keyboard order. forder converts the order of characters in the file from screen order to keyboard order or vice versa.
forder(1) forder(1) SEE ALSO environ(5), strord(3C), nljust(1).
from(1) from(1) NAME from - who is my mail from? SYNOPSIS from [-s sender ] [ user ] DESCRIPTION from prints the mail header lines in your mailbox file to show who sent you mail. If user is specified, user’s mailbox is examined instead of your own. If the -s option is given, only headers of mail from sender are printed. EXAMPLES List header lines for all current mail in your mailbox that was sent by ken .
fruled(1) fruled(1) NAME fruled - flash/turn off attention LEDs (cell, cabinet and I/O chassis attention LEDs) SYNOPSIS fruled -c cell [-c cell]... [-f|-o] [-B] [ [ -u username [:] -h IPaddress|hostname ] | [ -g -h IPaddress|hostname ] ] fruled -i I/Ochassis [-i I/Ochassis]... [-f|-o] [-B] [ [ -u username [:] -h IPaddress|hostname ] | [ -g -h IPaddress|hostname ] ] fruled -b cabinet [-b cabinet]...
fruled(1) -I -i I/Ochassis fruled(1) Turn off all I/O chassis LEDs. Flash/Turn off the specified I/Ochassis attention LED. An I/Ochassis must be specified in the form of cabinet#/enclosure#/chassis#. For example, the I/O chassis located in cabinet 0, enclosure 1 and I/O chassis slot 1 is identified as 0/1/1. -l cabinet -o Limit the scope of the -C or -I option to a given cabinet. Start flashing specified attention LED(s). The -o option is unavailable with -C or -I .
fruled(1) • • fruled(1) enableHttpsConnection=true The target partition’s digital certificate has been appended to the local partition’s Shared Authentication Store. For the nPartition commands, the Shared Authentication Store is stored in the file: /etc/opt/hp/sslshare/known_hosts.pem. This file is used by all the clients, which use SSL based certificates. If these clients trust a target partition, then the nPartition commands will also trust the target partition.
ftio(1) ftio(1) (TO BE OBSOLETED) NAME ftio - faster tape I/O SYNOPSIS ftio -o-O [achpvxAELM ] [-B blksize] [-D type] [-e extarg] [-K comment ] [-L filelist] [-N datefile] [-S script] [-T tty] [-Z nobufs] tapedev [pathnames] [-F ignorenames] ftio -i-I [cdfmptuvxAEMPR] [-B blksize] [-S script] [-T tty] [-Z nobufs] tapedev [patterns] ftio -g [v] tapedev [patterns] Remarks Note: The fbackup , frecover , and ftio commands are deprecated for creating new archives. See WARNINGS for more information.
ftio(1) ftio(1) (TO BE OBSOLETED) that do not match the remainder of the pattern should be selected. Multiple patterns can be specified. If no patterns are specified, the default for patterns is * (that is, select all files). The extracted files are conditionally created and copied into the current directory tree, based upon the options described below. The permissions of the files are those of the previous -o operation.
ftio(1) ftio(1) (TO BE OBSOLETED) ftio . Typically, the string script specifies a shell script which is used to notify the user that a tape change is required. -T tty Specify alternative to /dev/tty . Normally /dev/tty is opened by ftio when terminal interaction is required. -Z nobufs Specify the number of blksize chunks of memory to use as buffer space between the two processes, where blksize is the size of blocks written to the tape.
ftio(1) ftio(1) (TO BE OBSOLETED) To pass one or more metacharacters to ftio without having the shell expand them, protect them either by preceding each of them with a backslash (as in /usr\* ), or enclosing them in protective single quotes (as in ’/usr*’ ). cpio Compatibility ftio uses the same archive format as cpio . However, by default ftio creates tape headers and uses a tape block size of 16KB. cpio by default uses 512-byte blocks. When used with the -B option, cpio uses 5120 byte blocks.
ftio(1) ftio(1) (TO BE OBSOLETED) WARNINGS The fbackup , frecover , and ftio commands are deprecated for creating new archives. In a future HP-UX release, creation of new archives with these commands will not be supported. Support will be continued for archive retrieval. Use the standard pax command (portable archive interchange) to create archives. See pax(1).
ftp(1) ftp(1) NAME ftp - file transfer program SYNOPSIS ftp [-g] [-i] [-n] [-c] [-v] [-p] [-P] [-l] [-B size] [ server-host ] DESCRIPTION ftp is a user interface to the File Transfer Protocol. ftp copies files over a network connection between the local "client" host and a remote "server" host. ftp runs on the client host. Options The ftp command supports the following options: -g Disable file name "globbing"; see the glob command, below.
ftp(1) ftp(1) COMMANDS ftp supports the following commands. Command arguments with embedded spaces must be enclosed in quotes (for example, "argument with embedded spaces"). ![ command [ args ] ] Invoke a shell on the local host. The SHELL environment variable specifies which shell program to invoke. ftp invokes /usr/bin/sh if SHELL is undefined. If command is specified, the shell executes it and returns to ftp . Otherwise, an interactive shell is invoked. When the shell terminates, it returns to ftp .
ftp(1) ftp(1) longaddr Toggle the use of the LPRT/LPSV commands for data connection in the IPv6 environment. By default, the EPRT/EPSV commands are used in the IPv6 environment. In the IPv4 environment PORT/PASV commands are used. form format Set the file transfer form to format. The only supported format is non-print get remote-file [ local-file ] Copy remote-file to local-file.
ftp(1) ftp(1) mls remote-files local-file Write an abbreviated listing of remote-files to local-file. If globbing is enabled, globbing metacharacters are expanded. If interactive prompting is on, ftp prompts the user to verify that the last argument is indeed the target local file for mls output. mode [ mode-name ] Set the FTP file transfer mode to mode-name. The only supported mode is stream . modtime remote-file Show the last modification time of remote-file.
ftp(1) ftp(1) prompt Toggle interactive prompting. By default, ftp prompts the user for a yes or no response for each output file during multiple-file commands. If interactive prompting is disabled, ftp performs the command for all specified files. proxy ftp-command Execute an ftp command on a secondary control connection. This command allows simultaneous connection to two remote FTP servers for transferring files between the two servers.
ftp(1) ftp(1) send local-file [ remote-file ] A synonym for put . sendport Toggle the use of PORT commands. By default, ftp attempts to use a PORT command when establishing a connection for each data transfer. If the PORT command fails, ftp uses the default data port. When the use of PORT commands is disabled, ftp makes no attempt to use PORT commands for each data transfer. This is useful for certain FTP implementations that ignore PORT commands but (incorrectly) indicate that they’ve been accepted.
ftp(1) ftp(1) the remote server, including violations of the FTP protocol. If the delay results from unexpected remote server behavior, the local ftp program must be killed manually. File Naming Conventions Files specified as arguments to ftp commands are processed according to the following rules. • If the file name - is specified, ftp uses the standard input (for reading) or standard output (for writing).
ftpcount(1) ftpcount(1) NAME ftpcount - show current number of users for each class SYNOPSIS /usr/bin/ftpcount [-V] DESCRIPTION The ftpcount command shows the current number of users (and the limit) for each class defined in the ftpaccess file. If the ftpaccess file does not exist, the ftpcount command will not display anything. However, if the ftpaccess file exists and it is of zero bytes, ftpcount will display an error message: ftpcount:no service classes defined, no usage count kept.
ftprestart(1) ftprestart(1) NAME ftprestart - remove the shutdown message file created by ftpshut utility. SYNOPSIS /usr/bin/ftprestart [-V] DESCRIPTION The ftprestart command removes all the shutdown message files from the real, anonymous, and virtual user accounts. The message files are created by the ftpshut utility in the path as specified by the ‘shutdown’ directive in the /etc/ftpd/ftpaccess file (see ftpshut(1) for more details). This command is always used after the ftpshut command is executed.
ftpshut(1) ftpshut(1) NAME ftpshut - create shutdown message file to shut down the ftp servers at a given time SYNOPSIS /usr/bin/ftpshut [-V] [ -l min ] [ -d min ] time [ warning-message ... ] DESCRIPTION The ftpshut command provides an automated shutdown procedure that a superuser can use to notify ftp users when the ftp server is shutting down.
ftpshut(1) ftpshut(1) -1 the wrong parameter was passed to ftpshut . AUTHOR ftpshut was developed by the Washington University, St. Louis, Missouri.
ftpwho(1) ftpwho(1) NAME ftpwho - show current process information for each ftp user. SYNOPSIS /usr/bin/ftpwho [-V] DESCRIPTION The ftpwho command shows the current process information for each user logged into the ftp server. If the ftpaccess file does not exist, this command will not display anything. However, if the ftpaccess file exists and it is of zero bytes then this command will display an error message: ftpwho: no service classes defined, no usage count kept.
gcore(1) gcore(1) NAME gcore - get core images of running processes SYNOPSIS gcore [-o filename] process-id... DESCRIPTION The gcore command creates a core image of each specified process. By default, the name of the core image file for process-id will be core. process-id. The process information in the core file can be obtained by using debuggers. When the gcore command creates a core image of each specified process, the process is temporarily stopped.
gcore(1) gcore(1) AUTHOR gcore was developed by Chris Bertin (HP). SEE ALSO adb(1), gdb(1), kill(1), ttrace(2), a.out(4), core(4).
gencat(1) gencat(1) NAME gencat - generate a formatted message catalog file SYNOPSIS gencat [-l] catfile msgfile ... DESCRIPTION Message catalogs allow a program to process input and produce output according to local customs and languages. For details, see Native Language Support Users Guide. The gencat command merges each message source msgfile into a formatted message catalog catfile that can be accessed by catgets() (see catgets(3C)). If catfile does not exist, it is created.
gencat(1) $ comment gencat(1) A $ followed by a space or tab is treated as a comment and can appear anywhere in a file. A line consisting of zero or more spaces or tabs is treated as a comment line. NL_TEXTMAX , NL_SETMAX , and NL_MSGMAX are defined in . NL_SETD is defined in . MAX_BUFLEN is defined in . EXTERNAL INFLUENCES Environment Variables LANG provides a default value for the internationalization variables that are unset or null.
genxlt(1) genxlt(1) NAME genxlt - generate iconv translation tables SYNOPSIS genxlt [-f output_filename] [input_filename] DESCRIPTION genxlt generates a compiled, nonreadable binary version of the iconv table that is suitable for use by iconv(1) and iconv(3C). If input_filename or output_filename is not supplied, standard input and/or standard output will be used.
genxlt(1) genxlt(1) This is an example of the input_file: #What: CodesetA to CodesetB: version 1.0 #Galley: 0xffff # the conversion data is as follows: 0x01 0x01 0x02 0x42 ... 0xff87 0x4567 ... etc. WARNINGS Because genxlt will write over the existing table, it is wise to save the existing table into another file before using genxlt . Warnings are not given for incorrect data in the input_file. You must have superuser privileges to install files in /usr/lib/nls/iconv/tables.
get(1) get(1) NAME get - get a version of an SCCS file SYNOPSIS get [-r SID] [-c cutoff] [-e] [-b] [-i list] [-x list] [-k] [-l[p] ] [-p] [-s] [-m] [-n] [-g] [-t] [-w string] [-a seq-number] file ... DESCRIPTION The get command generates an ASCII text file from each named SCCS file according to the specifications given by its option arguments, which begin with -. The arguments can be specified in any order, but all option arguments apply to all named SCCS files.
get(1) get(1) SID, the SCCS Identification of a delta, can be in any form shown in the "SID Specified" column of Table 1. Partial SIDs are interpreted as shown in the "SID Retrieved" column of Table 1. See WARNINGS. -xlist A list of deltas to be excluded (forced not to be applied) in the creation of the generated file. See the -i option for the list format. -k Suppresses replacement of identification keywords (see below) in the retrieved text by their value. The -k option is implied by the -e option.
get(1) get(1) Table 1. Determination of SCCS Identification String SID* − b Option Specified Used % g Other Conditions SID Retrieved SID of Delta to be Created none %% none %% no yes R defaults to mR R defaults to mR mR.mL mR.mL mR.(mL+1) mR.mL.(mB+1).1 R R R R R no no yes yes - mR.mL mR.mL mR.mL mR.mL hR.mL** R.1*** mR.(mL+1) mR.mL.(mB+1).1 mR.mL.(mB+1).1 hR.mL.(mB+1).1 R - R > mR R = mR R > mR R = mR R < mR and R does not exist Trunk succ. in release > R and R exists R.mL R.L R.L R.
get(1) get(1) %R% %L% %B% %S% %D% %H% %T% %E% %G% %U% %Y% %F% %P% %Q% %C% Release. %Z% %W% The 4-character string @(#) recognizable by what (see what(1)). %A% Another shorthand notation for constructing what strings for non-HP-UX system program files. Level. Branch. Sequence. Current date (YY/MM/DD). Current date (MM/DD/YY). Current time (HH:MM:SS). Date newest applied delta was created (YY/MM/DD). Date newest applied delta was created (MM/DD/YY). Time newest applied delta was created (HH:MM:SS).
get(1) get(1) files are named by replacing the leading s with the tag. The g-file is an exception to this scheme: the g-file is named by removing the s. prefix. For example, s.xyz.c , the auxiliary file names would be xyz.c , l.xyz.c , p.xyz.c , and z.xyz.c , respectively. The g-file, which contains the generated text, is created in the current directory (unless the -p option is used). A g-file is created in all cases, whether or not any lines of text were generated by the get .
getaccess(1) getaccess(1) NAME getaccess - list access rights to file(s) SYNOPSIS getaccess [-u user ] [-g user ] group [, group ] ... ] [-n] file ... getaccess -r [-n] file ... DESCRIPTION getaccess lists for the specified files the effective access rights of the caller (that is, for their effective user ID, effective group ID, and supplementary groups list).
getaccess(1) 2 getaccess(1) A file is nonexistent or unreachable (by the caller). getaccess prints an appropriate message to standard error, continues, then returns a value of 2 upon completion. EXAMPLES The following command prints the caller’s access rights to file1 using the file’s group ID instead of the caller’s effective group ID and groups list.
getacl(1) getacl(1) NAME getacl - list access control lists (ACLs) for files (JFS File Systems only) SYNOPSIS /usr/bin/getacl [-ad ] file... DESCRIPTION For each argument that is a regular file, special file, or named pipe, getacl displays the owner, group, and the Access Control List (ACL). For each directory argument, getacl displays the owner, group, and the ACL and/or the default ACL. Only directories contain default ACLs.
getacl(1) getacl(1) (write), x (execute/search), or the placeholder character -. The perm will be displayed in the following order: rwx . If a permission is not granted by an ACL entry, the placeholder character will appear. The ACL entries will be displayed in the order in which they will be evaluated when an access check is performed. The default ACL entries that may exist on a directory have no effect on access checks.
getacl(1) getacl(1) # file: fileb # owner: fletcher # group: us user::rwx user:spy:--user:archer:rwgroup::r-other:--default:user::rwx default:user:spy:--default:group::r-default:other:--NOTICES The output from getacl will be in the correct format for input to the setacl command. If the output from getacl is redirected to a file, the file may be used as input to setacl . In this way, a user may easily assign one file’s ACL to another file.
getconf(1) getconf(1) NAME getconf - get system configuration values SYNOPSIS getconf [-v specification ] system_var getconf [-v specification ] system_var pathname DESCRIPTION The getconf command provides an interface to the confstr(3C), pathconf(2), and sysconf(2) library routines and system calls. The system_var argument specifies the configuration value desired in confstr() , pathconf() , or sysconf() .
getconf(1) getconf(1) getconf gives the following output: 1 If the implementation supports multiple locality domains. undefined If the implementation doesn’t support multiple locality domains.
getconf(1) POSIX_CHOWN_RESTRICTED getconf(1) POSIX_NO_TRUNC POSIX_VDISABLE Note For a complete list of parameters supported by getconf , look into the manual pages of sysconf() , pathconf() , and confstr() . AUTHOR getconf was developed by HP and POSIX. SEE ALSO pathconf(2), sysconf(2), confstr(3C). STANDARDS CONFORMANCE getconf : POSIX.
getopt(1) getopt(1) NAME getopt - parse command options SYNOPSIS getopt optstring args DESCRIPTION getopt is used to break up options in command lines for easy parsing by shell procedures and to check for legal options. optstring is a string of recognized option letters (see getopt(3C)). If a letter is followed by a colon, the option is expected to have an argument, which may or may not be separated from it by whitespace. The positional parameters ($1, $2, ...
getopt(1) getopt(1) done This code accepts any of the following as equivalent: cmd cmd cmd cmd -aoarg file file -a -o arg file file -oarg -a file file -a -oarg -- file file WARNINGS getopt option arguments must not be null strings nor contain embedded blanks. SEE ALSO getopts(1), sh(1), getopt(3C).
getopts(1) getopts(1) NAME getopts - parse utility (command) options SYNOPSIS getopts optstring name [ arg ... ] DESCRIPTION getopts is used to retrieve options and option-arguments from a list of parameters. Each time it is invoked, getopts places the value of the next option in the shell variable specified by the name operand and the index of the next argument to be processed in the shell variable OPTIND . Whenever the shell is invoked, OPTIND is initialized to 1.
getopts(1) getopts(1) getopts by default parses positional parameters passed to the invoking shell procedures. If args are given, they are parsed instead of the positional parameters. EXTERNAL INFLUENCES Environment Variable The following environment variable affects the execution of the getopts utility: OPTIND Used by getopts as the index of the next argument to be processed.
getopts(1) getopts(1) SEE ALSO getopt(1), ksh(1), sh-posix(1), sh(1), getopt(3C). STANDARDS CONFORMANCE getopts : XPG4, POSIX.
getprivgrp(1) getprivgrp(1) NAME getprivgrp - get special attributes for group SYNOPSIS getprivgrp [-g group_name ] DESCRIPTION getprivgrp lists the access privileges of privileged groups set by setprivgrp (see setprivgrp (1M)). If group_name is supplied, access privileges are listed for that group only. If the caller is not a member of group_name, no information is displayed. If -g is used, getprivgrp lists access privileges that have been granted to all groups.
gprof(1) gprof(1) NAME gprof - display call graph profile data SYNOPSIS gprof [ options ] [ a.out [ gmon.out ... ] ] DESCRIPTION The gprof command produces an execution profile of C++, C and FORTRAN programs. The effect of called routines is incorporated into the profile of each caller. Profile data is taken from the call graph profile file (gmon.out default) that is created by programs compiled with the -G option of aCC , cc , and f90 .
gprof(1) gprof(1) or mcrt0.o . This turns on profiling of a.out , which is not compatible with profiling of shared libraries. You can either profile your executable or a shared library, but not both. Set LD_PROFILE to the exact string with which you call shl_load . If the library is implicitly loaded, LD_PROFILE must match the path encoded in the a.out . You can find this value by running the ldd command on the executable.
gprof(1) gprof(1) EXAMPLES To profile a.out and libtest.so on Itanium-based systems: $ cat > test.c void a() { printf("I in a\n"); } $ cc -c +Z -G test.c $ ld -b -o libtest.so.1 test.o $ ln -s ./libtest.so.1 libtest.so $ cat > main.c extern void a(); main() { printf("Hello world\n"); a(); } g $ cc -G main.c -L. -ltest $ export LD_PROFILE=a.out:libtest.so $ export LD_PROFILEBUCKET_SIZE=16 $ ./a.out hello world I in a $ unset LD_PROFILE $ unset LD_PROFILEBUCKET_SIZE $ ls gmon.out gmon.
gprof(1) gprof(1) Parents that are not profiled have the time of their profiled children propagated to them, but they appear to be spontaneously invoked in the call graph listing, and do not have their time propagated further. Similarly, signal catchers, even though profiled, appear to be spontaneous (although for more obscure reasons).
grep(1) grep(1) NAME grep, egrep, fgrep - search a file for a pattern SYNOPSIS Plain call with pattern grep [-E -F] [-c-l-q] [-bhinsvwx ] pattern [ file ... ] Call with (multiple) − e pattern grep [-E -F] [-c-l-q] [-bhinsvwx ] -e pattern ... [-e pattern ] ... [ file ... ] Call with − f file grep [-E -F] [-c-l-q] [-bhinsvwx ] [-f pattern_ file ] [ file ... ] Obsolescent: egrep [-cefilnsv ] [ expression ] [ file ... ] fgrep [-cefilnsvx ] [ strings ] [ file ...
grep(1) grep(1) -q (Quiet) Do not write anything to the standard output, regardless of matching lines. Exit with zero status upon finding the first matching line. Overrides any options that would produce output. -s -v -w Error messages produced for nonexistent or unreadable files are suppressed. -x (eXact) Matches are recognized only when the entire input line matches the fixed string or regular expression. All lines but those matching are printed.
grep(1) Ken Judy Ann grep(1) 112 Warring St. Apt. A 387 Bowditch Apt. 12 429 Sixth St. the command: grep Judy address prints: Judy 387 Bowditch Apt.
groups(1) groups(1) NAME groups - show group memberships SYNOPSIS groups [-p] [-g] [-l] [ user ] DESCRIPTION groups shows the groups to which the caller or the optionally specified user belong. If invoked with no arguments, groups prints the current access list returned by getgroups() (see getgroups(2)). Each user belongs to a group specified in the password file /etc/passwd and possibly to other groups as specified in the files /etc/group and /etc/logingroup.
head(1) head(1) NAME head - give first few lines SYNOPSIS head [-c-l] [-n count ] [ file ... ] Obsolescent: head [-count ] [ file ... ] DESCRIPTION head prints on standard output the first count lines of each of the specified files, or of the standard input. If count is omitted it defaults to 10. If multiple files are specified, head outputs before each file a line of this form: ==> file <== Options -c -count The quantity of output is measured in bytes.
host(1) host(1) (BIND 9.3) NAME host - DNS lookup utility SYNOPSIS host [-4|-6] [-aCdilrTwv ] [-c class] [-N ndots] [-R number] [-t type] [-W wait] name [server ] DESCRIPTION host is a simple utility for performing DNS lookups. It is normally used to convert names to IP addresses and vice versa. With no options or operands, host prints an annotated usage summary. Options -4 -6 -a -C h Use only the IPv4 query transport. Use only the IPv6 query transport. Equivalent to using -v -t ANY .
host(1) host(1) (BIND 9.3) The type values are case-insensitive. When the -t option is omitted, host automatically selects an appropriate query type. By default, it looks for A records, but if the -C option is given, queries are made for SOA records. If the name operand is an IPv4 or IPv6 address, host queries for PTR records. For a query type of IXFR , you can specify the starting serial number by appending an equals sign followed by the starting serial number (for example, -t IXFR=12345678).
hostname(1) hostname(1) NAME hostname - set or display name of current host system SYNOPSIS hostname [name_of_host ] DESCRIPTION The hostname command displays the name of the current host, as given in the gethostname() system call (see gethostname(2)). Users who have appropriate privileges can set the hostname by giving the argument name_of_host ; this is usually done in the startup script /sbin/init.d/hostname.
hp(1) hp(1) NAME hp - handle special functions of HP 2640 and HP 2621-series terminals SYNOPSIS hp [-e] [-m] DESCRIPTION hp supports special functions of the Hewlett-Packard HP 2640 and HP 2621 series of terminals, with the primary purpose of producing accurate representations of most nroff output. A typical use is: nroff -h files ... | hp Regardless of the hardware options on a given terminal, hp tries to do sensible things with underlining and reverse line-feeds.
hyphen(1) hyphen(1) NAME hyphen - find hyphenated words SYNOPSIS hyphen [ files ] DESCRIPTION hyphen finds all the hyphenated words ending lines in files and prints them on the standard output. If no arguments are given, the standard input is used; thus, hyphen can be used as a filter. EXAMPLES Prepare an nroff hyphenation proofreading file for textfile. mm textfile | hyphen WARNINGS hyphen cannot cope with hyphenated italics (i.e., underlined) words; it often misses them completely or mangles them.
iconv(1) iconv(1) NAME iconv - codeset conversion SYNOPSIS iconv iconv iconv iconv [-cs ] -f frommap -t tomap [file]... [-cs ] -f fromcode [-t tocode] [file]... [-cs ] -t tocode [-f fromcode] [file]... -l DESCRIPTION The iconv command converts the encoding of characters in the input files from one codeset to another, and writes the results to standard output. If no input files are given, iconv reads from standard input.
iconv(1) iconv(1) LC_MESSAGES determines the locale that should be used to affect the format and contents of diagnostic messages written to standard error and informative messages written to standard output. NLSPATH determines the location of message catalogs for the processing of LC_MESSAGES . International Code Set Support Single and multi-byte character codesets are supported. RETURN VALUE iconv returns the following values: 0 Successful completion. >0 An error occurred.
id(1) id(1) NAME id - print user and group IDs and names SYNOPSIS id [-u] [-nr ] [user] id [-g] [-nr ] [user] id [-G] [-n] [user] id [-P] DESCRIPTION The id command writes a message to standard output, giving the user and group IDs and names for the process. If the effective and real IDs are different, both are printed. If the process has supplementary group affiliations (see groups(1)), the supplementary group affiliations are also written.
id(1) id(1) To display the group name for the current process: id -gn produces: users To display the user and group data for another user: id ralford produces: uid=329(ralford) gid=20(users) To display the PRM group ID for the current process: id -P produces: uid=329(ralford) gid=20(users) prmid=1(OTHERS) i DEPENDENCIES HP Process Resource Manager The -P option requires that the optional HP Process Resource Manager (PRM) software be installed and configured.
ident(1) ident(1) NAME ident - identify files in RCS SYNOPSIS ident file... DESCRIPTION ident searches the named files for all occurrences of the pattern $keyword :... $, where keyword is one of the following: Author Date Header Locker Log Revision Source State These patterns are normally inserted automatically by the RCS co command, but can also be inserted manually (see co(1)). ident works on text files as well as object files. For example, if the C program in file f.
idlookup(1) idlookup(1) NAME idlookup - identify the user of a particular TCP connection SYNOPSIS idlookup host-or-ip-number local-port foreign-port DESCRIPTION idlookup can be used to identify the user at the remote end of a TCP connection, assuming the host at the other end is running an Identification Server. host-or-ip-number is the name of the host at the other end of the connection, or its IP address.
ied(1) ied(1) NAME ied - input editor and command history for interactive programs SYNOPSIS ied [-dirt ] [-h file] [-k charmap] [-p prompt] [-s size] utility [arguments]... DESCRIPTION The ied utility command is intended to act as an interface between the user and an interactive program such as bc, bs, or a shell, providing most of the line editing and history functionality found in the Korn shell.
ied(1) ied(1) \t \b tab backspace \v vertical tab Three- and four-character sequences must be \nn or \nnn, giving the octal value for the character. If charmap is less than 256 lines long, the remaining characters are mapped to themselves. i -p prompt Many commands do not prompt when ready for input. ied approximates a prompting mechanism for such commands. This is not always perfectly successful, but for many commands it helps.
ied(1) ied(1) ESC ,*,= @ (File name expansion). Not supported. Macro expansion. Not supported. Note however that ksh has a rarely-used function _ that substitutes words from the previous line (this is not the macro $_ , but rather an editor command). If a preceding count is given, it uses the countth word of the last line. This is much more useful with ied . In emacs /gmacs mode: M-* , M-= , M-ESC (file name expansion) Not supported. Note that the command M-.
insertmsg(1) insertmsg(1) NAME insertmsg - use findstr(1) output to insert calls to catgets(3C) SYNOPSIS insertmsg [-h] [-nnumber ] [-iamount ] [-snumber ] stringlist DESCRIPTION insertmsg examines the file stringlist, which is assumed to be the output of findstr after subsequent editing to remove any strings that do not need to be localized (see findstr(1)).
insertmsg(1) insertmsg(1) AUTHOR insertmsg was developed by HP. SEE ALSO findstr(1), gencat(1), catgets(3C), catopen(3C).
iostat(1) iostat(1) NAME iostat - report I/O statistics SYNOPSIS iostat [-t] [-L] [ interval [ count ] ] DESCRIPTION iostat iteratively reports I/O statistics for each active disk on the system. Disk data is arranged in a four-column format: Column Heading device bps sps msps Interpretation Device name Kilobytes transferred per second Number of seeks per second Milliseconds per average seek If two or more disks are present, data is presented on successive lines for each disk.
iostat(1) iostat(1) EXAMPLES Show current I/O statistics for all disks: iostat Display I/O statistics for all disks every 10 seconds until INTERRUPT or QUIT is pressed: iostat 10 Display I/O statistics for all disks every 10 seconds and terminate after 5 successive readings: iostat 10 5 Display I/O statistics for all disks every 10 seconds, also show terminal and processor statistics, and terminate after 5 successive readings: iostat -t 10 5 Display I/O statistics for all active lunpaths: iostat -L D
ipcrm(1) ipcrm(1) NAME ipcrm - remove a message queue, semaphore set, or shared memory identifier SYNOPSIS ipcrm [option]... DESCRIPTION The ipcrm command removes one or more specified message queue, semaphore set, or shared memory identifiers. Options The identifiers are specified by the following options: -m shmid Remove the shared memory identifier shmid from the system. The shared memory segment and data structure associated with it are destroyed after the last detach.
ipcs(1) ipcs(1) NAME ipcs - report status of interprocess communication facilities SYNOPSIS ipcs [-mqs ] [-abcopt ] [-C core] [-N namelist] DESCRIPTION ipcs displays certain information about active interprocess communication facilities. With no options, ipcs displays information in short format for the message queues, shared memory segments, and semaphores that are currently active in the system. Options The following options restrict the display to the corresponding facilities.
ipcs(1) ipcs(1) R S D C - A process is waiting on a msgrcv() . A process is waiting on a msgsnd() . The associated shared memory segment has been removed. It will disappear when the last process attached to the segment detaches it. The associated shared memory segment is to be cleared when the first attach is executed. The corresponding special flag is not set. The next 9 characters are interpreted as three sets of three characters each.
ipcs(1) ipcs(1) FILES /dev/kmem /etc/group /etc/passwd /stand/vmunix Kernel virtual memory Group names User names System namelist SEE ALSO msgop(2), semop(2), shmop(2).
join(1) join(1) NAME join - relational database operator SYNOPSIS join [ options ] file1 file2 DESCRIPTION join forms, on the standard output, a join of the two relations specified by the lines of file1 and file2. If file1 or file2 is -, the standard input is used. file1 and file2 must be sorted in increasing collating sequence (see Environment Variables below) on the fields on which they are to be joined; normally the first in each line.
join(1) join(1) EXAMPLES The following command line joins the password file and the group file, matching on the numeric group ID, and outputting the login name, the group name, and the login directory. It is assumed that the files have been sorted in the collating sequence defined by the LC_COLLATE or LANG environment variable on the group ID fields. join -1 4 -2 3 -o 1.1 2.1 1.
kdestroy(1) kdestroy(1) NAME kdestroy - destroy Kerberos tickets SYNOPSIS kdestroy [-q] [-c cache_filename] DESCRIPTION The kdestroy utility destroys the user’s active Kerberos tickets by writing zeros to the specified credentials cache that contains them. If the credentials cache is not specified, the default credentials cache is destroyed. Options -q Run quietly. Normally, kdestroy beeps if it fails to destroy the user’s tickets. The -q flag suppresses this behavior.
kermit(1) kermit(1) (HP-UX C-Kermit) NAME kermit - C-Kermit 8.0 communications software for serial and network connections: modem dialing, file transfer and management, terminal connections, character-set translation, numeric and alpha paging, and script programming SYNOPSIS kermit [command-file] [options]... DESCRIPTION Kermit is a family of file transfer, management, and communication software programs from the Kermit Project at Columbia University available for most computers and operating systems.
kermit(1) kermit(1) (HP-UX C-Kermit) commands can also be collected into command files or macros. C-Kermit’s command and script language is portable to many and diverse platforms. STARTING C-KERMIT You can start C-Kermit by typing /usr/bin/kermit, or just kermit if your PATH includes /usr/bin , possibly followed by command-line options.
kermit(1) kermit(1) (HP-UX C-Kermit) error-correcting modems with hardware flow control). If you experience file transfer failures, use the CAUTIOUS or ROBUST commands to choose more conservative (and therefore slower) protocol settings. For fine tuning of performance, you can choose specific packet lengths, window sizes, and control-character prefixing strategies as explained in Chapter 12 of the manual, Using C-Kermit.
kermit(1) kermit(1) (HP-UX C-Kermit) \ b (or B) l (or L) n (or N) a decimal digit {} anything else: the backslash character itself the BREAK signal (OUTPUT command only) a Long BREAK signal (OUTPUT only) a NUL (0) character (OUTPUT only) a 1-, 2-, or 3-digit decimal number, such as \27 used for grouping, e.g., \{27}123 following character taken literally. Note that numbers turn into the character with that binary code (0-255), so you can use \7 for a bell, \13 for carriage return, \10 for linefeed.
kermit(1) kermit(1) (HP-UX C-Kermit) * HANGUP EIGHTBIT PAD PING REDIAL LOG CONNECTIONS REDIRECT PIPE SET CARRIER * SET DIAL * SET FLOW * SET HOST * SET LINE SET PORT * SET MODEM TYPE * SET NETWORK SET TCP SET TELNET SET X.
kermit(1) kermit(1) (HP-UX C-Kermit) MAIL RESEND PSEND * RECEIVE *R *S GET MGET REGET G FAST CAUTIOUS ROBUST SET ATTRIB * SET BLOCK SET BUFFERS SET PREFIX SET DELAY SET DESTINATION * SET FILE * SET RECEIVE SET REPEAT SET RETRY SET SEND SET HANDSHAKE SET LANGUAGE PATTERNS SET SESSION-LOG SET TRANSFER SET TRANSMIT SET UNKNOWN * SET WINDOW SHOW ATTRIB SHOW CONTROL * SHOW FILE SHOW PROTOCOL SHOW LANGUAGE SHOW TRANSMIT * STATISTICS TRANSMIT XMIT k SEND Command switches /AS-NAME: /AFTER: /BEFORE: /BINARY /COM
kermit(1) kermit(1) (HP-UX C-Kermit) /QUIET /RECOVER /RECURSIVE /RENAME-TO: /SMALLER-THAN: /STARTING-AT: /SUBJECT: /TEXT Don’t display file-transfer progress. Recover interrupted transfer from point of failure. Send a directory tree. Rename files as specified after successfully sending. Send files smaller than given size. Send file starting at given byte number. Subject for SEND /MAIL. Send in text mode. GET and RECEIVE Command switches /AS-NAME: Store incoming file under given name.
kermit(1) kermit(1) (HP-UX C-Kermit) REMOTE ASSIGN REMOTE CD REMOTE COPY REMOTE DELETE REMOTE DIR REMOTE EXIT REMOTE HELP REMOTE HOST REMOTE KERMIT REMOTE LOGIN REMOTE LOGOUT REMOTE MKDIR REMOTE PRINT REMOTE PWD REMOTE QUERY REMOTE RENAME REMOTE RMDIR REMOTE SET REMOTE SPACE REMOTE TYPE REMOTE WHO SERVER SET SERVER SHOW SERVER k Script programming ASK ASKQ ASSERT ASSIGN CLEAR CLOSE DECLARE DECREMENT DEFINE DO ECHO ELSE END EVALUATE FAIL FOPEN FREAD FWRITE FSEEK FCLOSE FOR FORWARD GETC GETOK GOTO IF INCR
kermit(1) kermit(1) (HP-UX C-Kermit) READ REINPUT RETURN SCREEN SCRIPT SET ALARM SET CASE SET COMMAND SET COUNT SET INPUT SET MACRO SET TAKE SHIFT SHOW ARGUMENTS SHOW ARRAYS SHOW COUNT SHOW FUNCTIONS SHOW GLOBALS SHOW MACROS SHOW SCRIPTS SHOW VARIABLES SLEEP SORT STATUS STOP SUCCEED SWITCH TAKE UNDEFINE WAIT WHILE WRITE WRITE-LINE WRITELN XECHO XIF Read a line from a local file into a variable. Reexamine text previously received from another computer. Return from a user-defined function.
kermit(1) kermit(1) (HP-UX C-Kermit) \v(d$cc) \v(d$ip) \v(d$lc) \v(d$px) \v(date) \v(day) \v(dialcount) \v(dialnumber) \v(dialresult) \v(dialstatus) \v(dialsuffix) \v(dialtype) \v(directory) \v(download) \v(editor) \v(editfile) \v(editopts) \v(errno) \v(errstring) \v(escape) \v(evaluate) \v(exitstatus) \v(filename) \v(filenumber) \v(filespec) \v(fsize) \v(ftype) \v(herald) \v(home) \v(host) \v(hwparity) \v(input) \v(inchar) \v(incount) \v(inidir) \v(inmatch) \v(instatus) \v(intime) \v(inwait) \v(ipaddress
kermit(1) kermit(1) (HP-UX C-Kermit) \v(ntime) \v(osname) \v(osrelease) \v(osversion) \v(packetlen) \v(parity) \v(pexitstat) \v(pid) \v(platform) \v(program) \v(protocol) \v(p_8bit) \v(p_ctl) \v(p_rpt) \v(query) \v(return) \v(rows) \v(sendlist) \v(serial) \v(speed) \v(startup) \v(status) \v(sysid) \v(system) \v(terminal) \v(test) \v(textdir) \v(tfsize) \v(time) \v(tmpdir) \v(trigger) \v(ttyfd) \v(ty_xx) \v(userid) \v(version) \v(window) \v(xferstatus) \v(xfermsg) \v(xfer_xxx) \v(xprogram) \v(xversion) Cu
kermit(1) kermit(1) (HP-UX C-Kermit) Actions -s files -s -r -k -x -O -f -g files -G files -a name -c -n k Settings -l line -l n -j host -J host -l n -X -Z -o n -u -q -I -8 -0 -i -T -P -b bps -m name -p x -t -e n -v n -L -Q -w -D n -V Other -y name -Y -R -d -S -C "cmds" -z -B -h = -- send files send files from stdin receive files receive files to stdout enter server mode like -x but exits after one transaction finish remote server get remote files from server (quote wildcards) like -g but sends file to
kermit(1) kermit(1) (HP-UX C-Kermit) sends file oofa.bin in binary mode (-i) using a window size of 4 (-v 4). Local-mode example (C-Kermit makes the connection): kermit -l /dev/tty0p0 -b 19200 -c -r -n makes a 19200-bps direct connection out through /dev/tty0p0, CONNECTs (-c) so you can log in and, presumably start a remote Kermit program and tell it to send a file, then it RECEIVEs the file (-r), then it CONNECTs back (-n) so you can finish up and log out.
kermit(1) kermit(1) (HP-UX C-Kermit) Frank da Cruz, Kermit, A File Transfer Protocol, Digital Press / Butterworth-Heinemann, Woburn, MA, USA (1987). ISBN 0-932376-88-6. The Kermit file transfer protocol specification. Christine M. Gianone, Using MS-DOS Kermit, Digital Press / Butterworth-Heinemann, Woburn, MA, USA (1992). ISBN 15558-082-3. Also available in a German edition from Heise, and a French edition from Heinz Schiefer & Cie, Versailles.
keylogin(1) keylogin(1) NAME keylogin - decrypt and store secret key with keyserv SYNOPSIS /usr/bin/keylogin [ -r ] DESCRIPTION The keylogin command prompts for a password, and uses it to decrypt the user’s secret key. The key may be found in the /etc/publickey file (see publickey(4)), the NIS map publickey.byname or user/host entries in the LDAP directory in the user’s home domain. The sources and their lookup order are specified in the /etc/nsswitch.conf file (see nsswitch.conf(4)).
keylogout(1) keylogout(1) NAME keylogout - delete stored secret key with keyserv SYNOPSIS /usr/bin/keylogout [ -f ] DESCRIPTION keylogout deletes the key stored by the key server process keyserv . Further access to the key is revoked; however, current session keys may remain valid until they expire or are refreshed. Deleting the keys stored by keyserv will cause any background jobs or scheduled at(1) jobs that need secure RPC services to fail.
keysh(1) keysh(1) NAME keysh - context-sensitive softkey shell SYNOPSIS keysh DESCRIPTION keysh is an extension of the standard Korn-shell (for a description of the basic Korn-shell functionality, see ksh(1)). keysh uses hierarchical softkey menus and context-sensitive help to aid users in building command-lines, combining the power of the Korn-shell with the ease-of-use of a menu system. And keysh is entirely data-driven, allowing its menus and help to be easily extended as needed.
keysh(1) keysh(1) Translate any softkey commands in the current command-line and then edit the result. Delete the character under the cursor. Toggle between insert and overwrite modes. Recall the previous/next command from the history buffer. Move the cursor left/right. Move the cursor to the beginning/end of the command-line.
keysh(1) keysh(1) USING KEYSH WITH TERMINAL SESSION MANAGER When operating under the Terminal Session Manager (see tsm(1)), keysh displays the tsm softkeys instead of the backup softkeys. If desired, this interaction can be overridden by setting the $KEYTSM environment variable (see Environment Variables below). When operating under tsm , keysh also automatically displays the tsm window number in the statusline.
keysh(1) selectors keysh(1) Enable or disable the use of keyboard selectors. When enabled, keysh displays an upper-case selector character in each softkey label. Typing the unquoted (upper-case) character selects the softkey just as if its corresponding function key had been pressed. Quoting the selector character in any way restores its traditional meaning. Selector keys are intended to be used on terminals that do not support a sufficient number of softkeys.
keysh(1) keysh(1) EXAMPLES To add the od (see od(1)) softkey to the end of the top-level softkey menu and label it Octal_dump , kc softkey add od with_label Octal_dump To add the paste(1) softkey to the beginning of the top-level softkey menu and label it Paste , kc softkey add paste and_place as_first_softkey To add the custom emacs softkey from the file ˜rpt/.
keysh(1) keysh(1) KEYESC Specifies the maximum allowable delay between characters (in milliseconds) if they are to be treated as part of a terminal escape sequence. The default is 350 ms. KEYKSH If set, specifies that keysh should mimic the behavior of the Korn-shell as closely as possible. No softkeys or status-line are displayed. This mode is particularly useful over slow modem lines.
keysh(1) keysh(1) keysh normally maintains the $HOME/.keyshrc file without user intervention; however, start-up errors may occasionally occur and persist. In this case, either execute the command kc restart default (to remove the file and revert to the default user configuration) or execute the command kc write (to rewrite the file with the current configuration). keysh assumes that HP-UX commands are not heavily aliased; otherwise unexpected command translations may occur.
kill(1) kill(1) NAME kill - send a signal to a process; terminate a process SYNOPSIS kill [-s signame] pid ... kill [-s signum] pid ... kill -l Obsolescent Versions: kill -signame pid ... kill -signum pid ... DESCRIPTION The kill command sends a signal to each process specified by a pid process identifier. The default signal is SIGTERM , which normally terminates processes that do not trap or ignore the signal.
kill(1) kill(1) 15 24 25 26 SIGTERM SIGSTOP SIGTSTP SIGCONT Terminate Stop Terminal stop Continue Terminate; can be trapped Pause the process; cannot be trapped Pause the process; can be trapped Run a stopped process SIGNULL (0), the null signal, invokes error checking but no signal is actually sent. This can be used to test the validity or existence of pid.
kinit(1) kinit(1) NAME kinit - obtain and cache the Kerberos ticket-granting ticket SYNOPSIS kinit [-l life_time] [-s start_time ] [-v] [-p | -P] [-f | -F] [-a | -A] [-k [-t keytab_filename] ] [-r renewable_life] [-R] [-c cache_filename] [-S service-name ] [principal] DESCRIPTION kinit obtains and caches an initial ticket-granting ticket for the principal. Options -l life_time Requests a ticket with the lifetime value defined in life_time.
kinit(1) kinit(1) -c cache_filename Uses cache_filename as the credentials ticket cache name and location. If this option is not used, the default cache name and location are used. The default credentials cache may vary between systems. If the KRB5CCNAME environment variable is set, its value is used to name the default ticket cache. Any existing contents of the cache are destroyed by kinit . -S service_name Specifies an alternate service name to use when getting initial tickets.
klist(1) klist(1) NAME klist - list cached Kerberos tickets SYNOPSIS klist [-e] [ [-c] [-f] [-s] [-a [-n] ] [cache_filename] ] [-k [-t] [-K] [keytab_filename] ] DESCRIPTION klist lists the Kerberos principal and Kerberos tickets held in a credentials cache, or the keys held in a keytab file. Options -e Displays the encryption types of the session key and the ticket for each credential in the credential cache, or each key in the keytab file. -c -f List tickets held in a credentials cache.
klist(1) klist(1) SEE ALSO kdestroy(1), kinit(1), Kerberos(5).
kpasswd(1) kpasswd(1) NAME kpasswd - change a user’s Kerberos password SYNOPSIS kpasswd [principal] DESCRIPTION The kpasswd command is used to change a Kerberos principal’s password. kpasswd prompts for the current Kerberos password, which is used to obtain a changepw ticket from the KDC (Key Distribution Center) for the user’s Kerberos realm. If kpasswd successfully obtains the changepw ticket, the user is prompted twice for the new password and the password is changed.
ksh(1) ksh(1) NAME ksh, rksh - shell, the standard/restricted command programming language SYNOPSIS ksh [-aefhikmnoprstuvx] [+aefhikmnoprstuvx] [-o option]... [+o option]... [-c string] [arg]... rksh [-aefhikmnoprstuvx] [+aefhikmnoprstuvx] [-o option]... [+o option]... [-c string] [arg]... DESCRIPTION ksh is a command programming language that executes commands read from a terminal or a file.
ksh(1) ksh(1) for identifier [ in word ... ] do list done Each time for is executed, identifier is set to the next word taken from the in word list. If in word ... is omitted, for executes the do list once for each positional parameter set (see Parameter Substitution below). Execution ends when there are no more words in the list. select identifier [ in word... ] do list done A select command prints on standard error (file descriptor 2), the set of words, each preceded by a number. If in word ...
ksh(1) ksh(1) command in the replaced text, other than any that are in the process of being replaced, is tested for additional aliases. If the last character of the alias value is a blank, the word following the alias is also checked for alias substitution. Aliases can be used to redefine special built-in commands, but cannot be used to redefine the keywords listed above. Aliases can be created, listed, and exported with the alias command and can be removed with the unalias command.
ksh(1) ksh(1) The shell supports a limited one-dimensional array facility. An element of an array parameter is referenced by a subscript. A subscript is denoted by a [ followed by an arithmetic expression (see Arithmetic Evaluation below) followed by a ]. To assign values to an array, use set -A name value ... . The value of all subscripts must be in the range of 0 through 1023 . Arrays need not be declared.
ksh(1) ksh(1) If the colon (:) is omitted from the above expressions, the shell only checks to determine whether or not parameter is set. The following parameters are set automatically by the shell: # ? $ _ The number of positional parameters in decimal. ! COLUMNS The process number of the last background command invoked. ERRNO The value of errno as set by the most recently failed system call. This value is system dependent and is intended for debugging purposes.
ksh(1) ksh(1) IFS Internal field separators, normally space, tab, and newline that are used to separate command words resulting from command or parameter substitution, and for separating words with the special command read . The first character of the IFS parameter is used to separate arguments for the "$*" substitution (see Quoting below). HISTFILE If this parameter is set when the shell is invoked, its value is the path name of the file that is used to store the command history.
ksh(1) ksh(1) the pattern, the word is left unchanged. In addition to the notation described in regexp(5), ksh recognizes composite patterns made up of one or more pattern lists separated from each other with a |. Composite patterns can be formed with one or more of the following: ?(pattern-list ) *(pattern-list ) +(pattern-list ) @(pattern-list ) !(pattern-list ) Optionally matches any one of the given patterns. Matches zero or more occurrences of the given patterns.
ksh(1) ksh(1) -d -f -g -h -k -n -o -p -r -s -t file file file file file string option file file file fildes -u file -w file -x file string file file file file file1 -nt file2 file1 -ot file2 file1 -ef file2 string = pattern string != pattern string1 < string2 -z -L -O -G -S k string1 > exp1 -eq exp1 -ne exp1 -lt exp1 -gt exp1 -le exp1 -ge string2 exp2 exp2 exp2 exp2 exp2 exp2 True if file exists and is a directory. True if file exists and is an ordinary file.
ksh(1) ksh(1) <<[ - ]word The shell input is read up to a line that matches word, or to an end-of-file. No parameter substitution, command substitution, or file name generation is performed on word. The resulting document, called a here-document, becomes the standard input. If any character of word is quoted, no interpretation is placed upon the characters of the document.
ksh(1) ksh(1) are equivalent (as far as the above execution of cmd is concerned except for special commands listed below that are preceded by a percent sign). If the -k option is set, all parameter assignment arguments are placed in the environment, even if they occur after the command name. The following echo statement prints a=b c.
ksh(1) ksh(1) %?string %% %+ %- Any job whose command line contains string. Current job. Equivalent to %% . Previous job. The shell learns immediately when a process changes state. It informs the user when a job is blocked and prevented from further progress, but only just before it prints a prompt. When the monitor mode is on, each background job that completes triggers any trap set for CHLD .
ksh(1) ksh(1) For example, if r is aliased to fc -e -, typing r bad=good c re-executes the most recent command that starts with the letter c and replaces the first occurrence of the string bad with the string good . The history file will be trimmed when all of the following conditions occurs: Its size is greater than four kilobytes. The number of commands in it is more than HISTSIZE . The file has not been modified in the last ten minutes.
ksh(1) ksh(1) the default arg. The parameter PWD is set to the current directory. The shell parameter CDPATH defines the search path for the directory containing arg. Alternative directory names are separated by a colon (:). If CDPATH is null or undefined, the default value is the current directory. Note that the current directory is specified by a null path name which can appear immediately after the equal sign or between the colon delimiters anywhere else in the path list.
ksh(1) ksh(1) jobs [ -lnp ] [ job ... ] Lists information about each given job; or all active jobs if job is omitted. The -l option lists process ids in addition to the normal information. The -n option only displays jobs that have stopped or exited since last notified. The -p option causes only the process group to be listed. See Jobs for a description of the format of job. kill [ -sig ] process ... Sends either the TERM (terminate) signal or the specified signal to the specified jobs or processes.
ksh(1) ksh(1) set [ ±aefhkmnopstuvx | ±o option ] ... [ ±A name ] [ arg ... ] The following options are used for this command: -A -a -e -f -h -k -m -n -o Array assignment. Unset the variable name and assign values sequentially from the list arg. If +A is used, the variable name is not unset first. All subsequent defined parameters are automatically exported. If the shell is non-interactive and if a command fails, execute the ERR trap, if set, and exit immediately.
ksh(1) ksh(1) Unless -A is specified, the remaining arg arguments are positional parameters and are assigned consecutively to $1 , $2 , ... . If neither arguments nor options are given, the values of all names are printed on the standard output. % shift [ n ] The positional parameters from $n +1 ... are renamed $1 ... ; default n is 1. The parameter n can be any arithmetic expression that evaluates to a non-negative number less than or equal to $#. test [ expr ] Evaluate conditional expression expr.
ksh(1) ksh(1) -u Convert all lowercase characters to uppercase characters. The lowercase -l option is turned off. -x Mark any given name for automatic export to the environment of subsequently executed commands. Using + instead of - causes these options to be turned off. If no name arguments are given but options are specified, a list of names (and optionally the values) of the parameters that have these options set is printed. Using + instead of - retains the values to be printed.
ksh(1) ksh(1) execute. When running ksh with arg, the script arg must have read permission and any setuid and getgid settings are ignored. Commands are then read as described below. The following options are interpreted by the shell when it is invoked: -c string -s -i -r If the -c option is present, commands are read from string. If the -s option is present or if no arguments remain, commands are read from the standard input.
ksh(1) ksh(1) Emacs Editing Mode This mode is invoked by either the emacs or gmacs option. Their sole difference is their handling of ˆT . To edit, the user moves the cursor to the point needing correction and inserts or deletes characters or words. All editing commands are control characters or escape sequences. The notation for control characters is circumflex (ˆ) followed by the character. For example, ˆF is the notation for Ctrl-F.
ksh(1) k ksh(1) @ M-space ˆJ ˆM ˆP (Null character) Set mark. ˆN Fetch next command. Each time ˆN is entered the next command in the history list is accessed. M-< M-> ˆRstring Fetch the least recent (oldest) history line. (Meta space) Set mark. (Newline) Execute the current line. (Return) Execute the current line. Fetch previous command. Each time ˆP is entered, the next previous command in the history list is accessed. Fetch the most recent (youngest) history line.
ksh(1) ksh(1) Input Edit Commands By default the editor is in input mode. erase Delete previous character. (erase is a user-defined erase character, as defined by the stty(1) command, usually ˆH or #.) ˆW ˆD ˆV Delete the previous blank separated word. \ Escape the next erase or kill character. Terminate the shell. Escape next character. Editing characters, erase or kill characters can be entered in a command line or in a search string if preceded by a ˆV .
ksh(1) ksh(1) ?string n N Same as / but search in the forward direction. Search for next match of the last pattern to / or ? commands. Search for next match of the last pattern to / or ?, but in reverse direction. Search history for the string entered by the previous / command. Text Modification Edit Commands These commands modify the line. a A [count]cmotion c[count]motion Append text to the end of the line. Equivalent to $a .
ksh(1) ksh(1) u U Undo the last text modifying command. [count]v Returns the command fc -e ${VISUAL:-${EDITOR:-vi}} count in the input buffer. If count is omitted, the current line is used. ^L ^J ^M # Line feed and print current line. Has effect only in control mode. = @letter Undo all the text modifying commands performed on the line. (New line) Execute the current line, regardless of mode. (Return) Execute the current line, regardless of mode. Equivalent to I# followed by Return.
ksh(1) ksh(1) Using the fc built-in command within a compound command causes the entire command to disappear from the history file. The built-in command . file reads the entire file before any commands are executed. Therefore, alias and unalias commands in the file do not apply to any functions defined in the file. Traps are not processed while the shell is waiting for a foreground job. Thus, a trap on CHLD is not executed until the foreground job terminates.
ktutil(1) ktutil(1) NAME ktutil - Kerberos keytab file maintenance utility SYNOPSIS ktutil DESCRIPTION The ktutil command invokes a subshell from which an administrator can read, write, or edit entries in a Kerberos V5 keytab or V4 srvtab file. ktutil Commands list read_kt keytab_filename Display the current key list. Alias: l read_st srvtab_filename Read the Kerberos V4 srvtab file, srvtab_filename, into the current key list.
kvno(1) kvno(1) NAME kvno - print key version numbers of Kerberos principals SYNOPSIS kvno [-e etype] [-q] [-h] [-c ccache] service1 , [service2,]... DESCRIPTION kvno acquires a service ticket for the specified Kerberos principals and prints out the key version numbers of each principal. Options -e etype Specifies the encryption type which will be requested for the session key of all the services named on the command line. This is useful in certain backward compatibility situations.
last(1) last(1) NAME last, lastb - indicate last logins of users and ttys SYNOPSIS /usr/bin/last [ -R ] [ -number ] [ -x] [ -X] [ -f file ] [ name ... ] [ tty ... ] /usr/bin/lastb [ -R ] [ -number ] [ -x] [ -X] [ -f file ] [ name ... ] [ tty ... ] DESCRIPTION The last command searches backwards through the file /var/adm/wtmps (which contains a record of all logins and logouts) for information about a user, a tty, or any group of users and ttys. Arguments specify names of users or ttys of interest.
lastcomm(1) lastcomm(1) NAME lastcomm - show last commands executed in reverse order SYNOPSIS lastcomm [commandname] ... [username] ... [terminalname] ... DESCRIPTION lastcomm gives information on previously executed commands. If no arguments are specified, lastcomm prints information about all the commands recorded in the accounting file, /var/adm/pacct during the current accounting file’s lifetime.
ld(1) ld(1) NAME ld - link editor SYNOPSIS Remarks For Integrity systems, see ld_ia(1). For PA-RISC systems, see ld_pa(1). Use the uname command to determine your system type. uname -m returns ia64 on Integrity systems. All other values represent PA-RISC systems. SEE ALSO ld_ia(1), ld_pa(1), uname(1).
ld_ia(1) ld_ia(1) Integrity Systems Only NAME ld_ia: ld - link editor for Integrity systems l SYNOPSIS The link editor ld [-bdmnqrstvwxzEGINOPQSTVZ] [-a search] [-c filename] [-dynamic ] [-e epsym] [-h symbol]... [-k filename] [-lx file]... [-l: library] [-m] [-noshared ] [-noshared_dynamic] [-o outfile] [-symbolic symbol]... [-u symbol]... [-y symbol]... [-A name] [-B bind]... [-C n] [-D offset] [-Fl ] [-Fw ] [-Fz ] [-G] [-L dir]...
ld_ia(1) ld_ia(1) Integrity Systems Only The text segment of a shared library is shared among all processes that use the library; each process using the library receives its own copy of the data segment. If pxdb -s on has been run on the executable that loads the library, the text segment of a shared library is mapped privately for each process running the executable. ld recursively examines the dependencies of shared libraries used by a program that was created by ld .
ld_ia(1) ld_ia(1) Integrity Systems Only -lx Search a library lib x .a , lib x .so , or lib x .sl , where x is one or more characters. The current state of the -a option determines whether the archive (.a ) or shared (.sl or .so) version of a library is searched. Because a library is searched when its name is encountered, the placement of a -l is significant. By default, 32-bit libraries are located in /usr/lib/hpux32. 64-bit libraries are located in /usr/lib/hpux64.
ld_ia(1) ld_ia(1) Integrity Systems Only -v Display verbose messages during linking. This option is equivalent to +vtype all (see the +vtype option for more information). -w -x Suppress all warnings. Strip local symbols from the output file. This reduces the size of the output file without impairing the effectiveness of object file utilities. This option is incompatible with the -r option and the +ild options.
ld_ia(1) ld_ia(1) Integrity Systems Only restricted Causes the search for a symbol definition to be restricted to those symbols that were visible when the library was loaded. symbolic Used only when building a shared library. This option causes all references in a shared library to be resolved internally if possible. Such internally-resolved symbols are still externally visible.
ld_ia(1) ld_ia(1) Integrity Systems Only -L dir Search for lib x .a , lib x .sl , or lib x .so , in dir before looking in default locations. You can specify more than one directory, but each must be preceded by the -L option. The -L option is effective only if it precedes the -l option on the command line. -N In 32-bit mode only, cause the data to be placed immediately following the text, and make the text writable. Files of this type cannot be shared. -O Turn on linker optimizations.
ld_ia(1) Integrity Systems Only ld_ia(1) +as mode Control the address space model to be used by the kernel. Possible values for mode are default , share_magic , exec_magic , shmem_magic , and mpas . The default value is currently equivalent to share_magic . In order to set the mode to any value other than the default, this option must be used in conjunction with the -N option to ensure that the text and data segments are contiguous.
ld_ia(1) +ee symbol Integrity Systems Only ld_ia(1) This option is similar to the +e option in that it exports a symbol. However, unlike the +e option, the +ee option does not alter the visibility of any other symbol in the file. When building a +compat mode executable, by default ld exports only those symbols that are actually referenced by a shared library seen at link time.
ld_ia(1) ld_ia(1) Integrity Systems Only If more than one +h option is seen on the link line, the linker uses the first one and emits a warning message. +help Start the help browser utility HP-UX Linker and Libraries Online User Guide which comes with the HP-UX operating system. For more information, see to the HP-UX Linker and Libraries User’s Guide manual. See manuals(5) for ordering information. +hideallsymbols Prevent all the symbols from being exported unless explicitly exported with the +e .
ld_ia(1) ld_ia(1) Integrity Systems Only +interp filename Change the dld path to use the program specified by filename for the "interpreter" program as the dynamic loader. This is useful when using special versions of dld.so for debugging. The default path for 32-bit programs is: /usr/lib/hpux32/uld.so:/usr/lib/hpux32/dld.so, and for 64-bit programs is: /usr/lib/hpux64/uld.so:/usr/lib/hpux64/dld.so . +interposer Used only when building a shared library.
ld_ia(1) Integrity Systems Only ld_ia(1) +nodynhash Disable the default linker behavior of the +gst option to create the .dynhash section for executables or shared libraries. Use this option to eliminate generation of precomputed hash table information for a library or an executable that is rarely used with the global symbol table lookup scheme or for which the overhead of storing precomputed hash values is too high. This option has no effect when used with the -r option.
ld_ia(1) Integrity Systems Only ld_ia(1) +objdebug mode. If you are debugging only files compiled with the +objdebug option, +objdebugonly can improve link time by instructing the linker to bypass the processing of debug information from files compiled with +noobjdebug . +origin shared_library_name -lx (Use only before the -l option or the name of a shared library.) Cause the linker to add $ORIGIN before the shared library name in the shared library list and set the DF_ORIGIN flag for the output module.
ld_ia(1) ld_ia(1) Integrity Systems Only +rpathfirst This option will cause the paths specified in RPATH (embedded path) to be used before the paths specified in LD_LIBRARY_PATH or SHLIB_PATH , in searching for shared libraries. This changes the default search order of LD_LIBRARY_PATH, SHLIB_PATH , and RPATH (embedded path). +std This option is the default. Turn on standard mode of the linker. This option is the complement of the +compat option. Options set on with this option are: -dynamic .
ld_ia(1) ld_ia(1) Integrity Systems Only Enable rounding to nearest (the default). RN More than one mode can be specified with a comma separated list. For example: +FP D,O,V,RZ specifies sudden underflow, trapping on overflow and invalid, and rounding toward zero. The commas and the space between +FP and the modes may be omitted. Thus, +FPDOVRZ is equivalent to +FP D,O,V,RZ . To dynamically change these settings at run-time, fesetflushtozero(3M), and fesetround(3M).
ld_ia(1) ld_ia(1) Integrity Systems Only To debug the load modules compiled with +objdebug option, the HP WDB debugger must have access to the object files. (Note that for object files built with the -r option, the individual object files must be available to the debugger.) If you move the object files, use HP WDB’s objdir command to specify the location of these objects. The +noobjdebug compiler option causes the debug information to be copied over to the output file.
ld_ia(1) ld_ia(1) Integrity Systems Only • Archive or shared libraries are added/removed to/from the linker command line. • Object files are removed from the linker command line. Use the +help option or see the Linker and Libraries User’s Guide for more information. Archive Library Processing The incremental linker searches an archive library if there are unsatisfied symbols. It extracts all archive members satisfying unsatisfied symbols and processes them as new object files.
ld_ia(1) ld_ia(1) Integrity Systems Only EXTERNAL INFLUENCES Environment Variables LDOPTS Arguments can be passed to the linker through the LDOPTS environment variable as well as on the command line. The linker gets the value of LDOPTS and places its contents before any arguments on the command line. LPATH Specifies default directories to search for library files. See the -l option. LD_LIBRARY_PATH and SHLIB_PATH Specifies, at runtime, directories to search for library files.
ld_ia(1) ld_ia(1) Integrity Systems Only chatr a.out ... shared library list: libfoo1.so.1 If you do not use +h , the shared library does not have an internal name. The linker does not check whether .so is a symbolic link. It records the library name that it looks at, if it does not have the internal name. chatr a.out ... shared library list: libfoo1.so Add $ORIGIN before the shared library name in the shared library list. ld -dynamic main.o -L /usr/lib/hpux32/ +origin -lc ld -dynamic main.
ld_ia(1) • • • • • • ld_ia(1) Integrity Systems Only +plabel_cache flag +tools +vallcompatwarnings +v[no]compatwarnings +O[no]fastaccess +Ostaticprediction AUTHOR ld was developed by AT&T, the University of California, Berkeley, and HP. FILES /usr/lib/hpux32/lib* /usr/lib/hpux64/lib* a.out /usr/lib/hpux32/dld.so /usr/lib/hpux64/dld.so /usr/ccs/lib/hpux32/crt0.o /usr/ccs/lib/hpux64/crt0.o /usr/lib/hpux32/milli.a /usr/lib/hpux64/milli.a /usr/lib/hpux64/millikern.
ld_ia(1) Miscellaneous a.out(4) ar(4) setfilexsec (1M) crt0(3) compartments (5) privileges(5) dld.
ld_pa(1) ld_pa(1) PA-RISC Systems Only NAME ld_pa: ld - link editor for PA-RISC systems SYNOPSIS Common Options ld [-bdmnqrstvxzEGIOPQTVZ] [-a search] [-c filename] [-dynamic ] [-e epsym] [-h symbol]... [-lx file]... [-l: library] [-noshared ] [-o outfile] [-u symbol]... [-y symbol]... [-B bind] [-D offset] [-Fl lib] [-L dir]... [-R offset] [-Pd ] [-PD file] [-PF file] [+afs func_sym_x=func_sym_y]...
ld_pa(1) ld_pa(1) PA-RISC Systems Only /usr/lib/pa20_64/dld.sl and is invoked by exec for those programs that use shared libraries. crt0.o is not required in shared bound links. The dynamic loader attaches each required library to the process and resolves all symbolic references between the program and its libraries. NOTE: For information on linking secure programs with shared libraries, see the Security Restrictions section below.
ld_pa(1) ld_pa(1) PA-RISC Systems Only with a definition in another file during future processing by ld . More than one symbol can be specified, but -h must precede each one. If used when building a shared library or program, this option prevents the named symbol from being visible to the dynamic loader. l -lx Search a library lib x .a or lib x .sl, where x is one or more characters. The current state of the -a option determines whether the archive (.a ) or shared (.
ld_pa(1) ld_pa(1) PA-RISC Systems Only -z Arrange for run-time dereferencing of null pointers to produce a SIGSEGV signal. (This is the complement of the -Z option.) -B bind Select run-time binding behavior of a program using shared libraries or the binding preference in building a shared library. The most common values for bind are: direct Create a direct link between symbol references and shared libraries by recording the name of the resolved shared library during symbol resolution.
ld_pa(1) ld_pa(1) PA-RISC Systems Only See the +help option or the HP-UX Linker and Libraries User’s Guide manual for more information on the uses of binding modes. -D offset Set the origin (in hexadecimal) for the data segment. When used with the +ild option, if you change the offset after the initial incremental link, the linker performs an initial incremental link automatically. -E Mark all symbols defined by a program for export to shared libraries.
ld_pa(1) -Pd PA-RISC Systems Only ld_pa(1) Reorder debuggable functions. Ordinarily -P does not reorder functions from .o files with debugging information, because reordering renders them non-debuggable. This option overrides this and reorders the functions. Reordering is based on link order file produced from flow.data by default. If you specify the -PF option, the linker uses the specified link order file, instead of flow.data , for reordering. This option is incompatible with +ild .
ld_pa(1) PA-RISC Systems Only ld_pa(1) +e symbol When building a shared library or program, mark the symbol for export to the dynamic loader. Only symbols explicitly marked are exported. When building a shared library, calls to symbols that are not exported are resolved internally. +ee symbol This option is similar to the +e option in that it exports a symbol. However, unlike the +e option, +ee does not alter the visibility of any other symbol in the file.
ld_pa(1) ld_pa(1) PA-RISC Systems Only If internal_name is a fully-qualified pathname, it is recorded as is in the library list of any executable file it is subsequently linked against. internal_name is a relative pathname or no directory component was specified, internal_name is appended to the file system directory component of the input shared library in the library list of any executable file it is subsequently linked against.
ld_pa(1) ld_pa(1) PA-RISC Systems Only +nocopyobjdebug Do not copy objdebug space. Use this option (with -r object files on the link line) to suppress the default behavior of copying LINKMAP space to the executable file. +noobjdebug Override the +objdebug compiler option, and copy all debug information to the executable file.
ld_pa(1) +pd size ld_pa(1) PA-RISC Systems Only Request a particular virtual memory page size that should be used for data. Sizes of 4K, 16K , 64K , 256K , 1M, 4M, 16M , 64M , 256M , D, and L are supported. A size of D allows the kernel to choose what page size should be used. A size of L will result in using the largest page size available. The actual page size may vary if the requested size cannot be fulfilled.
ld_pa(1) ld_pa(1) PA-RISC Systems Only Enable rounding downward (toward -Infinity). RD RZ RN Enable rounding toward zero (truncate, chop). Enable rounding to nearest (the default). NOTE: Enabling sudden underflow is an undefined operation on PA-RISC 1.0-based systems, but it is defined on all subsequent versions of PA-RISC. Selecting this flag enables sudden underflow only if it is available on the processor being used at run-time. More than one mode can be specified with a comma separated list.
ld_pa(1) PA-RISC Systems Only ld_pa(1) +OselectiveO3 Instructs the interprocedural optimizer driver to compile the routines not included in the +O4 list to be compiled at +O3. +Ostaticprediction Meaningful only on PA-RISC 2.0 architecture, this option sets the branch prediction bit in the output executable file’s auxiliary header. PA-RISC 32-Bit Options -A name This option specifies incremental loading. Linking is arranged so that the resulting object can be read into an already executing program.
ld_pa(1) ld_pa(1) PA-RISC Systems Only +plabel_cache Enable the plabel caching mechanism. Use this option with the +gst option. This option is only effective with C++. In C++ applications, the dynamic loader needs to repetitively access PLABEL information (import stub). In order to make this access faster, the dynamic loader uses the global symbol table structure to also contain PLABEL entries.
ld_pa(1) ld_pa(1) PA-RISC Systems Only +hideallsymbols This option is used to prevent all the symbols from being exported unless explicitly exported with the +e . +ild Specify incremental linking. If the output file does not exist, or if it was created without the +ild option, the linker performs an initial incremental link. The output file produced is suitable for subsequent incremental links. The incremental link option is valid for both executable and shared library links.
ld_pa(1) PA-RISC Systems Only ld_pa(1) Lazy loading can be disable during runtime by setting the LD_NOLAZYLOAD environment variable. +linkersyms (Kernel virtual environment support only.) Create linker-generated symbols even if building a shared library. The kernel with virtual environment support is built with the -b option which by default does not create linker-generated symbols in shared libraries. See Kernel Virtual Environment Support for more information.
ld_pa(1) ld_pa(1) PA-RISC Systems Only option if you do not need the unwind table for debugging or C++ exception handling. +tools Request that the application be linked for profiling with CXperf. +vtype type Produces verbose output about the link operation. type can have the following values: files Dump info about each object file loaded. heap Dump info about the size of the heap used by a link. libraries Dump info about libraries searched.
ld_pa(1) ld_pa(1) PA-RISC Systems Only Under certain conditions, the incremental linker cannot perform incremental links. When this occurs, the incremental linker automatically performs an initial incremental link to restore the process. In the following situations, the linker automatically performs an initial incremental link of the output file: • Changed linker command line, where the linker command line does not match the command line stored in the output file.
ld_pa(1) ld_pa(1) PA-RISC Systems Only Kernel Virtual Environment Support For virtual environment support for the kernel, build your kernel with the following linker options (instead of the -noshared option): $ ld ... -B symbolic -b +hideallsymbols +allowrorelocs +linkersyms ... By using these options, you create the kernel as a self-contained shared library with no exported symbols (with the -B symbolic , -b , and +hideallsymbols options).
ld_pa(1) ld_pa(1) PA-RISC Systems Only FLOW_DATA An instrumented executable (see the -I option) writes out the profile data to a database file named flow.data in the current directory. The name and location of this file can be specified by setting FLOW_DATA to the desired path name. The profile data is stored in the database file under a look-up name that is the same as the basename of the executable file specified at run-time. A single flow.
ld_pa(1) ld_pa(1) PA-RISC Systems Only On 64-bit, link a shared bound program in standard mode. Note that crt0.o is not specified because for shared links, it is no longer necessary. ld himom.o +std -lc On 64-bit, link a compatibility mode program. crt0.o is included because this is an archive link. ld /opt/langtools/lib/pa20_64/crt0.o himom.o +compat -a archive -lc Create a shared library: ld -b -o libfunc.sl func1.o func2.o func3.o Create a shared library with an internal name: ld -b -o libfoo1.
ld_pa(1) ld_pa(1) PA-RISC Systems Only • When linking for use with the symbolic debugger dde, the user must ensure that the program contains a routine called main . Also, the user must link in the file /opt/langtools/lib/end.o on 32-bit and /opt/langtools/lib/pa20_64/end.o on 64-bit as the last file named on the command line. There is no guarantee that the linker will pick up files from archive libraries and include them in the final program in the same relative order that they occur within the library.
ld_pa(1) ld_pa(1) PA-RISC Systems Only /opt/langtools/lib/icrt0.o 32-bit run-time start-up with profiling (see discussion of profile based optimization above.) /usr/lib/nls/$LANG/ld.cat /var/tmp/ld* flow.
ldapentry(1) ldapentry(1) NAME ldapentry - simple add, modify, and delete entries in an LDAP directory SYNOPSIS ldapentry {-a | -d | -m} [-D login] [-b base] [-h host] [-p port] [-s scope] [-f] [-v] {service key | dn} DESCRIPTION ldapentry is a script that allows administrators to add, modify, and delete entries in an LDAP directory. The add and modify functions open an entry into an editor so knowledge of the LDIF (RFC2849) syntax is required.
ldapentry(1) ldapentry(1) one Search only the immediate children of the entry specified in the -b option. Only the children is searched, the actual entry specified in the -b option is not searched. sub Search the entry specified in the -b option and all of its descendants. Perform a subtree search starting at the point identified in the -b option. This is the default. Displays verbose information.
ldapentry(1) ldapentry(1) *** May not be stored in a configuration file ***. LDAP_BINDDN LDAP_HOST LDAP_SCOPE The DN of the LDAP administrator allowed to add, delete, or modify the entry. The host name of the LDAP directory server. LDAP_HOST uses the hostname :port format. (If port is missing, ldapentry will automatically default to port 389, as suggested by the RFC2251 standard.) The type of LDAP search (sub , one , base ) under the LDAP_BASEDN . You must define LDAP_BASEDN if you define LDAP_SCOPE .
ldd(1) ldd(1) NAME ldd - list dynamic dependencies of executable files or shared libraries SYNOPSIS Remarks For Integrity systems, see ldd_ia(1). For PA-RISC systems, see ldd_pa(1). Use the uname command to determine your system type. uname -m returns ia64 on Integrity systems. All other values represent PA-RISC systems. SEE ALSO ldd_ia(1), ldd_pa(1), uname(1).
ldd_ia(1) ldd_ia(1) Integrity Systems Only NAME ldd_ia: ldd - list dynamic dependencies of executable files or shared libraries on Integrity systems SYNOPSIS ldd [-d] [-r] [-s] [-v] filename... Remarks This manpage describes ldd on Integrity systems. For ldd on PA-RISC systems, see ldd_pa(1). DESCRIPTION ldd is a command that can list the dynamic dependencies of incomplete executable files or shared libraries. ldd lists verbose information about dynamic dependencies and symbol references.
ldd_ia(1) ldd_ia(1) Integrity Systems Only DIAGNOSTICS ldd prints the record of shared library path names to stdout. The optional list of symbol resolution problems are printed to stderr. ldd returns zero when the operation is successful. A non-zero return code indicates that an error occurred. EXAMPLES By default ldd prints a simple dynamic path information.
ldd_pa(1) ldd_pa(1) PA-RISC Systems Only NAME ldd_pa: ldd - list dynamic dependencies of executable files or shared libraries on PA-RISC systems SYNOPSIS ldd [-b] [-d] [-r] [-s] [-v] filename... Remarks This manpage describes ldd on PA-RISC systems. For ldd on Integrity systems, see ldd_ia(1). DESCRIPTION ldd is a command that can list the dynamic dependencies of incomplete executable files or shared libraries. ldd lists verbose information about dynamic dependencies and symbol references.
ldd_pa(1) ldd_pa(1) PA-RISC Systems Only LC_CTYPE Determines the locale category for character handling functions. NLSPATH Determines the location of message catalogs for the processing of LC_MESSAGES . If any internationalization variable contains an invalid setting, ldd behaves as if all internationalization variables are set to C. See environ(5). DIAGNOSTICS ldd prints the record of shared library path names to stdout. The optional list of symbol resolution problems are printed to stderr.
ldd_pa(1) ldd_pa(1) PA-RISC Systems Only trying path=/var/tmp/libdl.1 trying path=/var/adm/libdl.1 search path=/tmp (SHLIB_PATH ) trying path=/tmp/libdl.1 search path=/usr/lib/pa20_64 (RPATH) trying path=/usr/lib/pa20_64/libdl.1 libdl.1 => /usr/lib/pa20_64/libdl.1 WARNINGS ldd does not list shared libraries explicitly loaded using dlopen(3C) or shl_load(3X). FILES a.out /usr/lib/dld.sl /usr/lib/pa20_64/dld.sl /usr/ccs/lib/lddstub /usr/ccs/lib/pa20_64/lddstub /usr/lib/nls/$LANG/ldd.
leave(1) leave(1) NAME leave - remind you when you have to leave SYNOPSIS leave [ hhmm ] DESCRIPTION The leave command waits until the specified time, then reminds you to leave. You are reminded 5 minutes and 1 minute before the actual time, at the time, and every minute thereafter. When you log off, leave exits. The time of day is in the form hhmm, where hh is a time in hours (which can range from 0 through 11 or 0 through 24 hours), and mm is the number of minutes after the specified hour.
lifcp(1) lifcp(1) NAME lifcp - copy to or from LIF files SYNOPSIS lifcp [-T xxx] [-L xxx] [-v xxx] [-a] [-b] [-i xxx] [-r] [-t] file1 file2 lifcp [-T xxx] [-L xxx] [-v xxx] [-a] [-b] [-i xxx] [-r] [-t] [file1 file2 ...] directory DESCRIPTION lifcp copies a LIF file to an HP-UX file, an HP-UX file to a LIF file, or a LIF file to another LIF file. It also copies a list of (HP-UX/LIF) files to a (LIF/HP-UX) directory. The last name on the argument list is the destination file or directory.
lifcp(1) lifcp(1) The default copying modes when copying from LIF to HP-UX are summarized in the following table: File Type ASCII BINARY BIN other Default Copying Mode ASCII BINARY RAW RAW When copying from HP-UX to LIF, the default copying mode is ASCII and an ASCII file is created. When copying from LIF to LIF, if no options are specified, then all the LIF directory fields and file contents are duplicated from source to destination.
lifcp(1) lifcp(1) Copy standard input to LIF file A_FILE on LIF volume /dev/dsk/c0t6d0. lifcp - /dev/dsk/c0t6d0:A_FILE Copy LIF file ABC in lifvol to LIF file CDE on /dev/dsk/c0t6d0 . lifcp lifvol:ABC /dev/dsk/c0t6d0:CDE Copy the output of pr to the LIF file ABC . pr abc | lifcp - lifvol:ABC Copy the output of pr to the LIF volume lifvol . LIF file STDIN is created since no file names are specified. pr abc | lifcp - lifvol: Copy LIF file ABC in lifvol to standard output.
lifinit(1) lifinit(1) NAME lifinit - write LIF volume header on file SYNOPSIS lifinit [-vnnn ] [-dnnn ] [-n string ] [-snnn ] [-lnnn ] [-ennn ] file DESCRIPTION lifinit writes a LIF volume header on a volume or file. Options lifinit recognizes the following options and command-line arguments which can appear in any order: -vnnn Sets volume size to nnn bytes. If nnn is not a multiple of 256, it is rounded down to the next such multiple. -dnnn Sets directory size to nnn file entries.
lifinit(1) lifinit(1) lifinit /dev/rdsk/c0t6d0 WARNINGS To prevent media corruption, do not terminate lifinit once it has started executing. AUTHOR lifinit was developed by HP. SEE ALSO lifcp(1), lifls(1), lifrename(1), lifrm(1), lif(4).
lifls(1) lifls(1) NAME lifls - list contents of a LIF directory SYNOPSIS lifls [ option ] name DESCRIPTION lifls lists the contents of a LIF directory on standard output. The default output format lists file names in multiple columns (similar to ls(1), except unsorted) if standard output is a character special file. If standard output is not a tty device, the output format is one file name per line. name is a path name to an HPUX file containing a LIF volume and optional file name.
lifrename(1) lifrename(1) NAME lifrename - rename LIF files SYNOPSIS lifrename oldfile newfile DESCRIPTION oldfile is a full LIF file specifier (see lif(4) for details) for the file to be renamed (e.g. liffile:A_FILE). newfile is new name to be given to the file (only the file name portion). This operation does not include copy or delete. Old file names must match the name of the file to be renamed, even if that file name is not a legal LIF name. Do not mount the special file while using lifrename .
lifrm(1) lifrm(1) NAME lifrm - remove a LIF file SYNOPSIS lifrm file1 ... filen DESCRIPTION lifrm removes one or more entries from a LIF volume. File name specifiers are as described in lif(4). Do not mount the special file while using lifrm . DIAGNOSTICS lifrm returns zero if the file is removed successfully. Otherwise it prints a diagnostic and returns nonzero. EXAMPLES lifrm liffile:MAN lifrm /dev/rdsk/c0t6d0:F AUTHOR lifrm was developed by HP.
line(1) line(1) NAME line - read one line from user input SYNOPSIS line [-t timeout ] DESCRIPTION line copies one line (up to a new-line) from the standard input and writes it on the standard output. It returns an exit code of 1 on EOF and always prints at least a new-line. It is often used within shell files to read from the user’s terminal.
listusers(1) listusers(1) NAME listusers - display user login data SYNOPSIS listusers [ [-b|-c] -g groups] [-l logins] [-r local |nis ] DESCRIPTION The listusers command displays data concerning user logins. The output shows the user login and the /etc/passwd comment field value (for example, user name, location). The default displays data about all user logins. Options The listusers command supports the following options: -b -c Display only users who have groups, as their primary group.
ln(1) ln(1) NAME ln - link files and directories SYNOPSIS ln [-f] [-i] [-s] file1 new_file ln [-f] [-i] [-s] file1 [file2]... dest_directory ln [-f] [-i] [-s] directory1 [directory2]... dest_directory DESCRIPTION The ln command links: • file1 to a new or existing new_file, • file1 to a new or existing file named file1 in existing dest_directory, • file1, file2, ... to new or existing files of the same name in existing dest_directory, • directory1, directory2, ...
ln(1) ln(1) to file; an lstat() must be performed to obtain information about the link (see stat(2)). A readlink() call can be used to read the contents of the symbolic link (see readlink(2)). Symbolic links may span file systems and refer to directories. Access Control Lists (ACLs) If optional ACL entries are associated with new_file, ln displays a plus sign (+) after the access mode when asking permission to overwrite the file.
locale(1) locale(1) NAME locale - get locale-specific (NLS) information SYNOPSIS locale [ -a [ 32 | 64 ] -A -m ] locale [ -ck ] name ... locale [ -pa32 ] [ -pa64 ] DESCRIPTION The locale command displays information about the current locale or about available locales.
locale(1) locale(1) -A List Itanium-based system 32-bit locales, Itanium-based system 64-bit locales, PA-RISC 32bit locales and PA-RISC 64-bit locales available on the system. -m Display a list of available charmap files on the system. See localedef(1M) for a definition of charmap files and their usage. -c Display names of locale categories that have been selected either explicitly or by giving a keyword contained therein. This option may be used with the -k option.
locale(1) locale(1) The command: LC_ALL=POSIX locale -ck decimal_point produces: LC_NUMERIC decimal_point="." If LANG is set to POSIX and no other locale variables are set, the command: locale LC_NUMERIC produces: "." "" "" which correspond to the keywords decimal_point, thousands_sep, grouping, and alt_digit. SEE ALSO localedef(1M), catopen(3C), environ(5), lang(5). localeconv(3C), nl_langinfo(3C), setlocale(3C), charmap(4), localedef(4), STANDARDS CONFORMANCE locale : XPG4, POSIX.
lock(1) lock(1) NAME lock - reserve a terminal SYNOPSIS lock DESCRIPTION lock requests a password from the user, then prints LOCKED on the terminal and refuses to relinquish the terminal until the password is repeated. If the user forgets the password, the only recourse is to log in elsewhere and kill the lock process.
logger(1) logger(1) NAME logger - make entries in the system log SYNOPSIS logger [-t tag] [-p pri] [-i] [-f file] [message ... ] DESCRIPTION The logger command provides a program interface to the syslog() system log module (see syslog(3C)). A message can be given on the command line, which is logged immediately, or a file is read and each line is logged. If no file or message is specified, the contents of the standard input are logged.
logger(1) logger(1) AUTHOR logger was developed by the University of California, Berkeley. SEE ALSO syslogd(1M), getlogin(3C), syslog(3C). STANDARDS CONFORMANCE logger : XPG4, POSIX.
login(1) login(1) NAME login - sign on, start terminal session SYNOPSIS login [name [env-var]...] DESCRIPTION The login command is used at the beginning of each terminal session to properly identify a prospective user. login can be invoked as a user command or by the system as an incoming connection is established. login can also be invoked by the system when a previous user shell terminates but the terminal does not disconnect.
login(1) login(1) login_directory, login_name, and login_shell are taken from the corresponding fields of the passwd file entry (see passwd(4)). For superuser, PATH is set to: PATH=:/usr/sbin:/usr/bin:/sbin In the case of a remote login, the environment variable TERM is also set to the remote user’s terminal type. The environment can be expanded or modified by supplying additional arguments to login , either at execution time or when login requests the user’s login name.
login(1) • login(1) The account lifetime has passed (see shadow(4)). On a trusted system, login prohibits a user from logging in if any of the following is true: • The password for the account has expired and the user cannot successfully change the password. • The password lifetime for the account has passed. • The time between the last login and the current time exceeds the time allowed for login intervals. • The administrative lock on the account has been set.
login(1) login(1) Login incorrect User name and password cannot be matched. No /usr/bin/login or /etc/login on root Attempted to log in to a subdirectory root that does not have a subroot login command. That is, the passwd file entry had shell path *, but the system cannot find a login command under the given home directory. No directory Consult system administrator. No Root Directory Attempted to log in to a subdirectory root that does not exist.
login(1) login(1) /etc/d_passwd Dialup security encrypted passwords. /etc/default/security /etc/dialups /etc/hosts.equiv /etc/logingroup /etc/motd /etc/passwd /etc/profile /etc/securetty /etc/shadow /etc/utmps /tcb/files/auth/*/* /var/adm/btmps /var/adm/wtmps /var/mail/ login_name Security defaults configuration file. Lines which require dialup security. System list of equivalent hosts allowing logins without passwords. Group file — defines group access lists. Message-of-the-day.
logname(1) logname(1) NAME logname - get login name SYNOPSIS logname DESCRIPTION logname writes the user’s login name to standard output. The login name is equivalent to that returned by getlogin() (see getlogin(3C)). EXTERNAL INFLUENCES Environment Variables LANG determines the language in which diagnostic messages are displayed. FILES /etc/profile SEE ALSO env(1), login(1), getlogin(3C), logname(3C), environ(5). STANDARDS CONFORMANCE logname : SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
lorder(1) lorder(1) NAME lorder - find ordering relation for an object library SYNOPSIS lorder [ files ] DESCRIPTION The input consists of one or more object or archive library files (see ar(1)) placed on the command line or read from standard input. The standard output is a list of pairs of object file names, meaning that the first file of the pair refers to external identifiers defined in the second.
lorder(1) lorder(1) FILES /var/tmp/*symref /var/tmp/*symdef SEE ALSO System Tools: ar(1) ld(1) Miscellaneous: tsort(1) temporary files create archived libraries invoke the link editor produce an ordered list of items (topological sort) STANDARDS CONFORMANCE lorder : SVID2, SVID3, XPG2, XPG4 l HP-UX 11i Version 3: February 2007 −2− Hewlett-Packard Company 595
lp(1) lp(1) NAME lp, lpalt, cancel - print/alter/cancel requests on an LP destination SYNOPSIS lp [-c] [-ddest] [-m] [-nnumber] [-ooption] [-ppriority] [-s] [-ttitle] [-w] [file ...] lpalt id [-ddest] [-i] [-m] [-nnumber] [-ooption] [-ppriority] [-s] [-ttitle] [-w] cancel [id ...] [dest ...] [-a] [-e] [-i] [-uuser] [-f] DESCRIPTION The lp command queues files for printing. The lpalt command changes information in a queued request. The cancel command deletes a queued request.
lp(1) lp(1) -nnumber Print number copies of the output. If illegal number of copies is specified with this option, the default number of copies is 1. -ooption Specify a printer-dependent option. You can specify several printer options by repeating the -o option. For information about the options that are available for a printer supported on your system, see the interface script for the printer name in the /etc/lp/interface directory. -ppriority Set the priority of the print request.
lp(1) lp(1) cancel Options and Arguments cancel recognizes the following options and arguments, which can be specified in any order. Blanks are not permitted between a keyletter and its argument. When cancel is used with a mix of different options and arguments, it will operate first on id ..., next on dest ..., next on -a , next on -e and finally on -u , irrespective of the order in which the options and arguments are specified in the command line. id ... Specifies one or more requests to be canceled.
lp(1) lp(1) RETURN VALUE Exit values are: 0 Successful completion. >0 Error condition occurred. EXAMPLES For a laserjet printer named lp2 , configured with an interface script that defines the -c option to cause the printer to print in a compressed mode, use the following command to print myfile with compressed print on lp2 : lp -dlp2 -oc myfile lp can be used at the end of a pipeline to print the results of a previous command.
lpfilter(1) lpfilter(1) NAME lpfilter: divpage, fontdl, lprpp, plotdvr, printstat, reverse - filters invoked by lp interface scripts SYNOPSIS /usr/lbin/divpage [-p -l] [-h -q] [-nFontID ] filename /usr/lbin/fontdl [-nFontID ] [-l] [-p] filename /usr/lbin/lprpp [-i] [-o] [-e] [-lnn ] [-n] [-p] /usr/lbin/plotdvr -l request_id -u username [-e] [-f] [-i] filename /usr/sbin/printstat -l request_id -u username filename /usr/sbin/reverse [-l page_length ] Remarks The structure of these filters is currently
lpfilter(1) lpfilter(1) -o -e -l nn Prints only the odd numbered pages. Used with -e for double-sided printing. -n Specifies nroff mode for printing output of the nroff command. Prints 66 lines per page with the first line appearing on logical line 4 of the printer. -p Specifies pr mode for printing output from the pr command. Prints 66 lines per page with the first line appearing on logical line 3 of the printer. Print only the even numbered pages. Used with -o for double sided printing.
lpfilter(1) lpfilter(1) DIAGNOSTICS Error and diagnostic messages appear on the printed output, on the user’s terminal, or are mailed to the user, depending on circumstances. WARNINGS There is little consistency in the interface to these filters. SEE ALSO lp(1), lpadmin(1M). HP-UX System Administrator’s Guide.
lpstat(1) lpstat(1) NAME lpstat - report status information of the LP subsystem SYNOPSIS lpstat [-drst ] [-a[list]] [-c[list]] [-o[list]] [-p[list]] [-u[list]] [-v[list]] [-i] [ID]... [dest]... DESCRIPTION The lpstat utility writes to standard output information about the current status of the LP subsystem. If no arguments are given, lpstat writes the status of all requests made to lp by the user that are still in the output queue. Options The lpstat utility supports the XBD specification, Section 10.
lpstat(1) lpstat(1) Security Restriction Only users who have the lp subsystem authorization or the printqueue secondary subsystem authorization can view the entire queue. Unauthorized users can view only their own jobs whose sensitivity levels are dominated by the user’s current sensitivity level. The allowmacaccess privilege allows viewing jobs at higher sensitivity levels.
lpstat(1) lpstat(1) lpstat -t Verify that the job scheduler is running: lpstat -r Obtain the status of two printers, the pathnames of two printers, a list of all class names and the status of the request named HiPri-33: lpstat -plaser1,laser4 -v"laser2 laser3" -cHiPri-33 Obtain user print job status using the obsolescent mixed blank and comma form: lpstat -u"ddg,gmv, maw" FILES /var/spool/lp/* /var/adm/lp/* /etc/lp/* /usr/lib/lp/* SEE ALSO cancel(1), enable(1), lp(1), rlpstat(1M).
ls(1) ls(1) NAME ls, lc, l, ll, lsf, lsr, lsx - list contents of directories SYNOPSIS ls [-abcdefgilmnopqrstuxACFHLR1] [names] lc [-abcdefgilmnopqrstuxACFHLR1] [names] l [ls_options] [names] ll [ls_options] [names] lsf [ls_options] [names] lsr [ls_options] [names] lsx [ls_options] [names] DESCRIPTION For each directory argument, the ls command lists the contents of the directory. For each file argument, ls repeats its name and any other information requested.
ls(1) ls(1) -i For each file, list the inode number in the first column of the report. When used in multicolumn output, the number precedes the file name in each column. -l (ell) List in long format, giving mode, number of links, owner, group, size in bytes, and time of last modification for each file (see further DESCRIPTION and Access Control Lists below).
ls(1) ls(1) l ll lsf lsr lsx is equivalent to is equivalent to is equivalent to is equivalent to is equivalent to ls -m ls -l (ell) ls -F ls -R ls -x The shorthand notations are implemented as links to ls . Option arguments to the shorthand versions behave exactly as if the long form above had been used with the additional arguments. Mode Bits Interpretation (-l option) The mode printed in listings produced by the -l (ell) option consists of 10 characters, for example, -rwxr-xr-x.
ls(1) ls(1) Access Control Lists (ACLs) If a file has optional ACL entries, the -l (ell) option displays a plus sign (+) after the file’s permissions. The permissions shown are a summary representation of the file’s access control list, as returned by stat() in the st_mode field (see stat(2)). To list the contents of an access control list, use the lsacl command (see lsacl(1) and acl(5)) for HFS file systems, or the getacl command (see getacl(1) and aclv(5)) for JFS file systems.
ls(1) ls(1) FILES /etc/group /etc/passwd /usr/share/lib/terminfo/?/* For group IDs for -l (ell) and -g. For user IDs for -l (ell) and -o. For terminal information. SEE ALSO chmod(1), find(1), getacl(1), lsacl(1), stat(2), acl(5), aclv(5), standards(5). STANDARDS CONFORMANCE ls: SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
lsacl(1) lsacl(1) NAME lsacl - list access control lists (ACLs) of files SYNOPSIS /usr/bin/lsacl [-l] file... DESCRIPTION lsacl lists access control lists (ACLs) of one or more files in symbolic, ‘‘short’’ form, one file’s ACL per line of output, followed by the file name; see acl(5) for ACL syntax. Options lsacl recognizes the following option: -l Print ACLs in long form. Each file’s ACL can be more than one line long, and is always preceded by file name, colon, and newline.
m4(1) m4(1) NAME m4 - macro processor SYNOPSIS m4 [options] [file ...] DESCRIPTION m4 is a macro processor intended as a front end for Ratfor, C, and other languages. Each of the argument files is processed in order; if there are no files, or if a file name is -, standard input is read. The processed text is written to standard output. Options m4 recognizes the following options: -e Operate interactively. Interrupts are ignored and the output is unbuffered. Using this mode may be very difficult.
m4(1) decr define m4(1) Returns the value of its argument decremented by 1. The second argument is installed as the value of the macro whose name is the first argument. Each occurrence of $n in the replacement text, where n is a digit, is replaced by the nth argument.
m4(1) m4(1) syscmd Executes the HP-UX system command given in the first argument. No value is returned. sysval traceoff Is the return code from the last call to syscmd . traceon With no arguments, turns on tracing for all macros (including built-ins). Otherwise, turns on tracing for named macros. translit Transliterates the characters in its first argument from the set given by the second argument to the set given by the third. No abbreviations are permitted.
machid(1) machid(1) NAME machid: hp9000s200, hp9000s300, hp9000s400, hp9000s500, hp9000s700, hp9000s800, hp-mc680x0, hp-pa, pdp11, u370, u3b, u3b10, u3b2, u3b5, vax - provide truth value about processor type SYNOPSIS hp9000s200 hp9000s300 hp9000s400 hp9000s500 hp9000s700 hp9000s800 hp-mc680x0 hp-pa pdp11 u3b u3b2 u3b5 u3b10 u370 vax DESCRIPTION The following commands return a true value (exit code 0) if the a processor type matches the command name.
machinfo(1) machinfo(1) NAME machinfo - print machine information SYNOPSIS machinfo [-v] DESCRIPTION machinfo prints useful information about the machine. The output includes information about processors, firmware revision, and amount of memory. The information about processors and memory in a partitioned environment is limited to the partition in which machinfo is run.
mail(1) mail(1) NAME mail, rmail - send mail to users or read mail SYNOPSIS mail [+] [-epqr ] [-f file] mail [-dt ] person... rmail [-dt ] person... Remarks See mailx(1) and elm(1) for an enhanced user mail interface. DESCRIPTION The mail command, when used without arguments, prints the user’s mail, message-by-message, in lastin, first-out order. For each message, mail prints a ? prompt and reads a line from the standard input to determine the disposition of the message.
mail(1) mail(1) -r -f file -t -d Same as +. Causes mail to use file (for example, mbox ) instead of the default mailfile. Causes the outbound message to be preceded by each person the mail is sent to. A person is usually a user name recognized by login (see login(1)). If a person being sent mail is not recognized, or if mail is interrupted during input, the file dead.letter will be saved to allow editing and resending. Note that dead.
mail(1) mail(1) mail treats a line consisting solely of a dot (.) as the end of the message, except when the rmail -d command is used. The maximum allowable line length in mail messages is 8 times that of BUFSIZ bytes as defined in /usr/include/stdio.h. If line length exceeds this limit, mail truncates the line starting at beginning-of-line, and uses only the trailing 8 * BUFSIZ characters.
mailfrom(1) mailfrom(1) NAME mailfrom - summarize mail folders by subject and sender SYNOPSIS mailfrom [-hnQqStv ] [-s status] [folderusername]... DESCRIPTION The mailfrom command reads one or more mail folders and outputs one line per message in the form: from [subject] where from is the name of the person the message is from, and subject is the subject of the message, if present.
mailfrom(1) 0 1 2 3 mailfrom(1) Messages matching status are present. No messages matching status are present, but there are some messages. There are no messages at all. An error occurred. If multiple mailboxes or folders are specified, the exit status only applies to the last one examined. This can be used in scripts to determine what kind of mail a user has. EXAMPLES Display header information from all the messages in your mailbox.
mailq(1) mailq(1) NAME mailq - prints the mail queue SYNOPSIS mailq [-Ac] [-q...] [-v ] DESCRIPTION mailq prints a summary of the mail messages queued for future delivery. The first line printed for each message shows the internal identifier used on this host for the message, the size of the message in bytes, the date and time the message was accepted into the queue, and the envelope sender of the message.
mailstats(1) mailstats(1) NAME mailstats - print mail traffic statistics SYNOPSIS mailstats [-C cffile ] [-f stfile ] [-o] [-p] DESCRIPTION mailstats reads and interprets the sendmail statistics file, and then prints out the mail traffic statistics. The statistics file is the one set by the StatusFile option in the /etc/mail/sendmail.cf. The default statistics file is /etc/mail/sendmail.st. If the statistics file exists, sendmail collects statistics about your mail traffic and stores them in that file.
mailstats(1) mailstats(1) mailstats: statistics-file : Permission denied The statistics file’s permissions are set so that you cannot read it.
mailx(1) mailx(1) NAME mailx - interactive mail message processing system SYNOPSIS Send mode mailx [-FUm ] [-s subject] [-r address] [-h number] address ... Receive mode mailx -e mailx [-UHLiNn ] [-u user] mailx -f [-UHLiNn ] [filename] Obsolescent mailx [-f filename] [-UHLiNn ] DESCRIPTION mailx provides a comfortable, flexible environment for sending and receiving messages electronically. When reading mail, mailx provides commands to facilitate saving, deleting, and responding to messages.
mailx(1) mailx(1) -H -L -i -n -m Print header summary only. -N -r address -s subject -u user Do not print initial header summary. -U Convert UUCP-style addresses to Internet standards. Overrides the conv environment variable. -d Turn on debugging output. Neither particularly interesting nor recommended. Print complete header information only. Ignore interrupts. Also see the description of the ignore environment below. Do not initialize from the system default mailx.rc file.
mailx(1) mailx(1) n -m An inclusive range of message numbers, n through m, where n is less than m. user All messages from user. /string :c All messages with string in the subject line (uppercase-lowercase differences are ignored). All messages of type c, where c is one of: d n o r u deleted messages new messages old messages read messages unread messages Note that the context of the command determines whether this type of message specification makes sense.
mailx(1) mailx(1) included when the message is saved. The Print and Type commands override this command. dp[msglist] dt[msglist] echo string ... edit [msglist] exit xit Delete the specified messages from the mailbox and print the next message after the last one deleted. Roughly equivalent to a delete command followed by a print command. Echo the given string or strings (similar to echo − see echo(1)). Edit the given messages.
mailx(1) mailx(1) included when the message is saved. The Print and Type commands override this command. list mail name ... mbox [msglist] next [message] Prints all commands available. No explanation is given. Mail a message to the specified users. Arrange for the given messages to end up in the standard mbox save file when mailx terminates normally. See MBOX in the Environment Variables subsection for a description of this file. See also the ex it and quit commands.
mailx(1) mailx(1) set set name set name=string set name=number Define a variable called name. The variable can be given a null, string, or numeric value. Set by itself prints all defined variables and their values (see the Environment Variables subsection for detailed descriptions of the mailx variables). shell Invoke an interactive shell (see SHELL in the Environment Variables subsection). size [msglist] Print the size in characters of the specified messages.
mailx(1) mailx(1) ˜A Insert the autograph string Sign into the message (see the Environment Variables subsection). ˜a Insert the autograph string sign into the message (see the Environment Variables subsection). ˜b name ... ˜c name ... ˜d Add name to the blind carbon copy (Bcc) list. ˜e Invoke the editor on the partial message. Also see the EDITOR environment variable description below. ˜f [msglist] Forward the specified messages. The messages are inserted into the message without alteration.
mailx(1) mailx(1) autoprint Enable automatic printing of messages after delete and undelete commands. Default is noautoprint . bang Enable special-case treatment of exclamation points (!) in shell escape command lines as in vi. Default is nobang . charset= charset Set the default character set. If none is specified, mailx will attempt to use the value of LANG to look up the system default for the user’s locale. If that is unsuccessful, the default value of us-ascii will be used.
mailx(1) mailx(1) LISTER= command The command (and options) to use when listing contents of the folder directory. The default is ls . NOMETAMAIL= value To disable the usage of metamail to read MIME messages, set the value to TRUE . By default the NOMETAMAIL variable is not set. onehop When responding to a message that was originally sent to several recipients, the other recipient addresses are normally forced to be relative to the originating author’s machine for the response.
mailx(1) MAIL mailx(1) The name of the initial mailbox file to be read. By default, the mailbox is set to /var/mail/username. This environment variable overrides the default setting and causes mailx to open the mailbox specified by the environment variable. MAILRC The name of the mailer start-up file. Default is $HOME/.mailrc. LC_COLLATE LC_CTYPE LC_COLLATE and LC_CTYPE influence mailx when the command interpreter (see the SHELL environment variable) is invoked.
make(1) make(1) NAME make - maintain, update, and regenerate groups of programs SYNOPSIS make [-f makefile] [-bBdeiknpPqrsStuw] [macro_name =value] [names] DESCRIPTION Makefile Structure A makefile can contain four different kinds of lines: target lines, shell command lines, macro definitions, and include lines.
make(1) make(1) takes effect when target or any dependents of target are being processed. Include Lines If the string include appears as the first seven letters of a line in a makefile, and is followed by one or more space or tab characters, the rest of the line is assumed to be a file name and is read and processed by the current invocation of make as another makefile after any macros in the file name have been expanded. The default behaviour of make is to use .
make(1) make(1) MAKEFLAGS macro under Environment). The -t (touch) option updates the modified date of a file without executing any commands. A command line is normally printed before it is executed, but if the line has a @ at the beginning, printing is suppressed. The -s option or the presence of the special target .SILENT: in the makefile suppresses printing of all command lines. The @ can be used to selectively turn off printing.
make(1) make(1) -S Terminate if an error occurs while executing the commands to bring a target up-to-date. This is the default and the opposite of -k. If both -k and -S are specified, the last one given is used. This enables overriding the presence of the k flag in the MAKEFLAGS environment variable. -t Touch the target files (causing them to be up-to-date) rather than issue the usual commands. -u -w Unconditionally make the target, ignoring all timestamps. Suppress warning messages.
make(1) make(1) is used each time a makefile is executed, the line: SHELL=/usr/bin/sh or a suitable equivalent should be put in the macro definition section of the makefile. Suffixes Target and/or dependent names often have suffixes. Knowledge about certain suffixes is built into make and used to identify appropriate inference rules to be applied to update a target (see the subsection on Inference Rules). The current default list of suffixes is: .o .c .c˜ .C .C˜ .cxx .cxx˜ .cpp .cpp˜ .cc .cc˜ .y .y˜ .
make(1) make(1) A tilde in the above rules refers to an SCCS file (see sccsfile(4)). Thus, the rule .c˜.o would transform an SCCS C source file into an object file (.o ). Since the s. of the SCCS files is a prefix, it is incompatible with the suffix point-of-view of the make command. Hence, the tilde is a way of changing any file reference into an SCCS file reference. A rule to create a file with suffix .o from a file with suffix .c is specified as an entry with .c.o as the target and no dependents.
make(1) make(1) The most common use of the archive interface follows. Here, we assume the source files are all C type source: lib: lib(file1.o) lib(file2.o) lib(file3.o) @echo lib is now up-to-date .c.a: $(CC) -c $(CFLAGS) $< ar rv $@ $*.o rm -f $*.o (See the subsection on Built-in Macros for an explanation of the <, @, and * symbols.) In fact, the .c.a rule listed above is built into make and is unnecessary in this example. This rule is applied to each dependent of lib in turn.
make(1) make(1) the following series of targets to be made is generated: --- pgm with two dependents and an explicit rule to follow --- a.o (recursively) with an implicit dependent of a.c which matches the implicit rule .c.o . --- a.c (recursively) with no implicit dependents and no implicit rules. This stops the recursion and simply returns the last modification time of the file a.c . --- b.o (recursively) with an implicit dependent of b.c which matches the implicit rule .c.o . --- b.
make(1) make(1) be used in target rules in the makefile. They can also be redefined in the makefile. $$@ The $$@ macro has meaning only on dependency lines. Macros of this form are called dynamic dependencies because they are evaluated at the time the dependency is actually processed. $$@ evaluates to exactly the same thing as $@ does on a command line; that is, the current target name. This macro is useful for building large numbers of executable files, each of which has only one source file.
make(1) make(1) International Code Set Support Single and multi-byte character code sets are supported. RETURN VALUE make returns a 0 upon successful completion or a value greater than 0 if an error occurred. If the -q option is specified, make returns 0 if the target was up-to-date and a value greater than 0 if the target was not up-to-date. EXAMPLES The following example creates an executable file from a C source code file without a makefile, if program.
make(1) make(1) SEE ALSO cc_bundled(1), cd(1), lex(1), mkmf(1), sh(1), environ(5), lang(5), regexp(5), standards(5). A Nutshell Handbook, Managing Projects With Make by Steve Talbot, Second Edition, O’Reilly & Associates, Inc., 1986. STANDARDS CONFORMANCE make : SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.
makekey(1) makekey(1) NAME makekey - generate encryption key SYNOPSIS /usr/lbin/makekey DESCRIPTION makekey improves the usefulness of encryption schemes depending on a key by increasing the amount of time required to search the key space. It reads 10 bytes from its standard input and writes 13 bytes on its standard output. The output depends on the input in a way intended to be difficult to compute (i.e., to require a substantial fraction of a second).
man(1) man(1) NAME man - find manpage information by keywords; print out a manpage SYNOPSIS man [-M path] -k keyword... man [-M path] -f file... man [-] [-M path] [-T macro-package] [section[subsection] ] entry_name... DESCRIPTION man accesses information from the HP-UX manpages. It can be used to: • List all manpages whose one-line description contains any of a specified set of keywords. • Display or print one-line descriptions of manpages specified by name.
man(1) man(1) for one or more of the entries indicated. section corresponds to the section number where the manpage appears in the HP-UX Reference. It can be followed by an optional uppercase/lowercase subsection identifier such as 3C which would indicate a library routine in Section 3. 3, 3c , and 3C are interpreted as equivalent, since all Section 3 manpages are stored in the same or in related directories (such as /usr/share/man/man3.Z and /usr/share/man/man3.
man(1) man(1) man*.Z The manpage is uncompressed, formatted, and displayed. If the cat*.Z directory exists, the formatted manpage is compressed and installed in cat*.Z . If the cat* directory exists, the formatted manpage is installed in cat* . cat*.Z man* The manpage is uncompressed and displayed. cat* The manpage is displayed. The manpage is formatted, and displayed. If the cat*.Z directory exists, it is compressed, and installed in cat*.Z .
man(1) man(1) MANPATH=.:/usr/share/man:/usr/contrib/man:/usr/local/man export MANPATH man mypage Display the manpage for id(1), with the output piped through pg -c: PAGER="pg -c" export PAGER man id Display intro(4) and intro(7): man 4 intro man 7 intro WARNINGS Manpages are structured such that they can be printed on a phototypesetter, conventional line printer, and screen display devices. However, due to line printer and display device limitations, some information may be lost in certain situations.
mediainit(1) mediainit(1) NAME mediainit - initialize disk or partition DDS tape SYNOPSIS mediainit [-vr ] [-f fmt_optn] [-i interleave] [-p size] pathname DESCRIPTION mediainit initializes mass storage media by formatting the media, writing and reading test patterns to verify media integrity, then sparing any defective blocks found. This process prepares the disk or tape for error-free operation. Initialization destroys all existing user data in the area being initialized.
mediainit(1) pathname mediainit(1) pathname is the path name to the character (raw) device special file associated with the device unit or volume that is to be initialized. mediainit aborts if you lack either read or write permission to the device special file, or if the device is currently open for any other process. This prevents accidental initialization of the root device or any mounted volume. mediainit locks the unit or volume being initialized so that no other processes can access it.
mediainit(1) mediainit(1) Some applications may require that a file system be placed on the media before use. mediainit does not create a file system; it only prepares media for writing and reading. If such a file system is required, other utilities such as newfs , lifinit , or mkfs must be invoked after running mediainit (see newfs(1M), lifinit(1), and mkfs(1M)). RETURN VALUE mediainit returns one of the following values: 0 Successful completion. 1 A device-related error occurred.
merge(1) merge(1) NAME merge - three-way file merge SYNOPSIS merge [-p] file1 file2 file3 DESCRIPTION merge combines two files that are revisions of a single original file. The original file is file2, and the revised files are file1 and file3. merge identifies all changes that lead from file2 to file3 and from file2 to file1, then deposits the merged text into file1. If the -p option is used, the result goes to standard output instead of file1.
mesg(1) mesg(1) NAME mesg - permit or deny messages to terminal SYNOPSIS mesg [[-] g ] [[-] y ] [[-] n ] mesg DESCRIPTION The command form mesg [-] n forbids messages via write by revoking write permission to users without appropriate privilege on the user’s terminal (see write(1)). The command form mesg [-] g reinstates permission so that only legitimate commands (such as write(1)) can be used by other users to send messages.
mkcatdefs(1) mkcatdefs(1) NAME mkcatdefs - preprocess a message source file SYNOPSIS mkcatdefs [-h] [-m [-p prefix] [-e extension] ] catname source_file... DESCRIPTION The mkcatdefs command preprocesses a message source file to do one or more of the following operations. These operations ease maintenance of compilable programs, scripts, or both: • Convert symbolic identifiers for message sets and messages into numeric constants required by the gencat command. The gencat command creates the catname.
mkcatdefs(1) mkcatdefs(1) Explicitly specifying a catalog-specific prefix is recommended if programs and scripts access multiple message catalogs. Otherwise, there is a risk that the include files generated for the different catalogs might define the same symbol for different message strings.
mkcatdefs(1) mkcatdefs(1) See the EXAMPLES section for an illustration of techniques that provide insulation from changes in how numeric constants are mapped to symbolic identifiers for message sets and messages. EXTERNAL INFLUENCES Environment Variables LANG provides a default value for the internationalization variables that are unset or null. If LANG is unset or null, it defaults to C (see lang(5)).
mkcatdefs(1) mkcatdefs(1) Note that mkcatdefs also created the symbol MF_SYMB by prepending MF_ to catname using uppercase letters. The mkcatdefs command assumes that the name of the generated catalog should be catname.cat, and generates this symbol for your use with the catopen function. Because this include file contains include statements for limits.h and nl_types.h, you do not need to explicitly include these files in your application program. (The nl_types.
mkcatdefs(1) mkcatdefs(1) #define GREET 1 #define BYE 2 #define ENTER 3 /* definitions for set RESULTS */ #define RESULTS 2 #define NADA 1 #define FOUND 2 /* definitions for set PROBLEMS */ #define PROBLEMS 3 #define SERVCONN 1 #define BUSYDAY 2 #endif /* Default messages generated from PFF.src */ #define #define #define you are #define kind of #define #define #define #endif m DEF_GREET "Welcome to the Product Fact Finder program!\n" DEF_BYE "Good-bye. Please come again.
mkcatdefs(1) mkcatdefs(1) . . dspmsg -s 1 PFF.cat 1 "${DEF_GREET}" . . . The dspmsg command in this script displays the message string: % ./test_dspmsg.sh Welcome to the Product Fact Finder program! A default message string is typically English text, whereas a translated message is displayed if a translated version of the catalog is available for the locale. The advantage of using symbols for default message strings is to ensure that only one copy of the original message strings needs to be maintained.
mkdir(1) mkdir(1) NAME mkdir - make a directory SYNOPSIS mkdir [-p] [-m mode ] dirname ... DESCRIPTION mkdir creates specified directories in mode 0777 (possibly altered by umask unless specified otherwise by a -m mode option (see umask(1)). Standard entries, . (for the directory itself) and .. (for its parent) are created automatically. If dirname already exists, mkdir exits with a diagnostic message, and the directory is not changed.
mkdir(1) mkdir(1) DIAGNOSTICS mkdir returns exit code 0 if all directories were created successfully. Otherwise, it prints a diagnostic and returns non-zero. mkdir returns exit code 0 if the -p option was specified, and all the specified directories now exist. If any of the intermediate directories do not have search or write permission (with the -p option), mkdir prints a diagnostic and returns non-zero.
mkfifo(1) mkfifo(1) NAME mkfifo - make FIFO (named pipe) special files SYNOPSIS mkfifo [-p] [-m mode ] filename ... DESCRIPTION mkfifo creates the FIFO special files named by its operand list. The operands are taken sequentially in the order specified and, if the user has write permission in the appropriate directory, the FIFO is created with permissions 0666 modified by the user’s file mode creation mask (see umask(2)).
mkmf(1) mkmf(1) NAME mkmf - make a makefile SYNOPSIS mkmf [-acdeil ] [-f makefile] [-F template] [-M language] [macroname=value]... DESCRIPTION The mkmf command creates a makefile that informs the make command how to construct and maintain programs and libraries (see make(1)).
mkmf(1) CFLAGS mkmf(1) C compiler flags. After searching for included files in the directory currently being processed, mkmf searches in directories named in -I compiler options and then in the /usr/include directory. COMPILESYSTYPE Location of /usr/include . If the COMPILESYSTYPE macro or environment mkmf searches for included files in variable is defined, /$COMPILESYSTYPE/usr/include instead of /usr/include . m CXXFLAGS C++ compiler flags.
mkmf(1) mkmf(1) Ratfor syntax, P = Pascal syntax). The following list shows the default configuration for mkmf: C C++ Fortran Include files Pascal include files Lex or Lisp Object files Pascal Ratfor Assembler Yacc .c:sC .C:sC++ .f:sF .h:h .i:h .l:sC .o:o .p:sP .r:sF .s:s .y:sC For example, to change the object file suffix to .obj , undefine the Pascal include file suffix, and prevent Fortran files from being scanned for included files, the SUFFIX macro definition could be: SUFFIX = .obj:o .i: .
mkmf(1) -F template mkmf(1) Specify an alternative makefile template path name. The path name can be relative or absolute. -M language Specify an alternative language-specific makefile template. The default language is C and the corresponding program and library makefile templates are C.p and C.l , respectively. mkmf looks for these templates in /usr/ccs/lib/mf or $PROJECT/lib/mf. DIAGNOSTICS Exit status 0 is normal. Exit status 1 indicates an error.
mkmsgs(1) mkmsgs(1) NAME mkmsgs - create message files for use by gettxt() SYNOPSIS mkmsgs [-o] [-i locale] textfile msgfile DESCRIPTION The mkmsgs command takes as input a file of localized text strings and generates a message file that can be accessed by the gettxt (3C) routine. textfile is the name of the file that contains the text strings. msgfile is the name of the output message file. mkmsgs appends the suffix .cat to the message file name.
mkstr(1) mkstr(1) NAME mkstr - extract error messages from C source into a file SYNOPSIS mkstr [-] messagefile prefix file... DESCRIPTION mkstr examines a C program and creates a file containing error message strings used by the program. Programs with many error diagnostics can be made much smaller by referring to places in the file, and reduce system overhead in running the program.
mkstr(1) mkstr(1) printf(msg, a1, a2, a3); } EXTERNAL INFLUENCES Environment Variables LC_CTYPE determines the interpretation of comments and string literals as single- and/or multibyte characters. If LC_CTYPE is not specified in the environment or is set to the empty string, the value of LANG is used as a default for each unspecified or empty variable. If LANG is not specified or is set to the empty string, a default of "C" (see lang(5)) is used instead of LANG .
mktemp(1) mktemp(1) NAME mktemp - make a name for a temporary file SYNOPSIS mktemp [-c] [-d directory_name ] [-p prefix ] DESCRIPTION mktemp makes a name that is suitable for use as the pathname of a temporary file, and writes that name to the standard output. The name is chosen such that it does not duplicate the name of an existing file. If the -c option is specified, a zero-length file is created with the generated name.
mm(1) mm(1) NAME mm, osdd - print documents formatted with the mm macros SYNOPSIS mm [ options ] [ files ] osdd [ options ] [ files ] DESCRIPTION mm can be used to format and print documents using nroff and the mm text-formatting macro package (see nroff(1)). It has options to specify preprocessing by tbl and/or neqn , (see tbl(1) and neqn(1)), and postprocessing by various terminal-oriented output filters.
mm(1) • mm(1) If you specify an incorrect output terminal type, mm produces (often subtle) unpredictable results. However, if you are redirecting output into a file, use the -T37 option, then use the appropriate terminal filter when actually printing the formatted file. SEE ALSO col(1), env(1), nroff(1), tbl(1), profile(4), term(4), mm(5).
model(1) model(1) NAME model - print hardware model information SYNOPSIS model DESCRIPTION model prints the machine hardware model. model may also display the manufacturer, product names, or other information. EXAMPLES The model output below indicates an Integrity g4000 server from Hewlett-Packard. ia64 hp server g4000 The model output below is from an HP 9000 L-Class server.
more(1) more(1) NAME more, page - file perusal filter for screen viewing SYNOPSIS more [-n] [-cdefisuvz ] [-n number] [-p command] [-t tagstring] [-x tabs] [-W option] [+linenumber] [+/pattern] [name]... page [-n] [-cdefisuvz ] [-n number] [-p command] [-t tagstring] [-x tabs] [-W option] [+linenumber] [+/pattern] [name]... Remarks The pg command is preferred in some standards and has some added functionality, but does not support character highlighting (see pg(1)).
more(1) more(1) -v Do not display nonprinting characters graphically; by default, all non-ASCII and control characters (except Tab, Backspace, and Return) are displayed visibly in the form ˆx for Ctrl-x, or M- x for non-ASCII character x. -z Same as not specifying -v, with the exception of displaying Backspace as ˆH , Return as ˆM, and Tab as ˆI . -p command Execute the more command initially in the command argument for each file examined.
more(1) more(1) If the standard output is not a terminal device, more always exits when it reaches end-of-file on the last file in its argument list. Otherwise, for all files but the last, more prompts, with an indication that it has reached the end of file, along with the name of the next file. For the last file specified, or for the standard input if no file is specified, more prompts, indicating end-of-file, and accept additional commands.
more(1) if iCtrl-f ib iCtrl-b q Q :q :Q ZZ = :f more(1) Move forward i lines, with a default of one screenful. At end-of-file, more will continue with the next file in the list, or exit if the current file is the last file in the list. Move backward i lines, with a default of one screenful. If i is more than the screen size, only the final screenful will be written. Exit from more .
more(1) more(1) :e[file] E[file] Examine a new file. If the file argument is not specified, the "current" file (see the :n and :p commands) from the list of files in the command line is reexamined. The file name is subjected to the process of shell word expansions. If file is a # (number sign) character, the previously examined file is reexamined. i :n Examine the next file. If i is specified, examines the i-th next file specified in the command line. i :p Examine the previous file.
more(1) TERM more(1) Determines the name of the terminal type. International Code Set Support Single- and multibyte character code sets are supported. APPLICATION USAGE When the standard output is not a terminal, none of the filter-modification options is effective. This is based on historical practice. For example, a typical implementation of man pipes its output through more -s to squeeze excess white space for terminal users.
mpsched(1) mpsched(1) NAME mpsched - control the processor or locality domain on which a specific process executes SYNOPSIS mpsched mpsched mpsched mpsched mpsched -h -s -g command [-P policy] [-f] [-T policy] [-l locality-domain-id] [-c spu] command [-q] [-u] [-P policy] [-f] [-l locality-domain-id] [-c spu] {-p pid}... DESCRIPTION mpsched controls the processor (spu), or locality domain (locality-domain-id) on which a process executes.
mpsched(1) mpsched(1) can be used with the -T, -p, -c, and -l options. policy is one of the following values. RR Round robin launch policy. Under this policy, successive direct child processes of the specified command or process are launched in a round robin fashion across the other locality domains in the system relative to creating process. RR_TREE Tree based round robin launch policy.
mt(1) mt(1) NAME mt - magnetic tape manipulating program SYNOPSIS mt [-f tapename ] command [ count ] Obsolescent mt [-t tapename ] command [ count ] DESCRIPTION mt is used to give commands to the tape drive. If tapename is not specified, the environment variable TAPE is used; if TAPE is not defined, the default drive is used. mt winds the tape in the requested direction (forward or backward), stopping after the specified count EOF marks or records are passed. If count is not specified, one is assumed.
mt(1) mt(1) mt -f /dev/rmt/0mnb rew FILES /dev/rmt/* Raw magnetic tape interface (stape) /dev/rtape/* Raw magnetic tape interface (estape) /dev/rmt/0mnb Default tape interface. If legacy DSF is disabled, the default value is /dev/rtape/tape1_BESTnb. AUTHOR mt was developed by the University of California, Berkeley. SEE ALSO dd(1), st(1M), intro(7), mt(7).
mv(1) mv(1) NAME mv - move or rename files and directories SYNOPSIS mv [-f-i] [-e extarg] file1 new-file mv [-f-i] [-e extarg] file1 [file2 ]... dest-directory mv [-f-i] [-e extarg] directory1 [ directory2 ]... dest-directory DESCRIPTION The mv command moves: • One file (file1) to a new or existing file (new-file). • One or more files (file1, [file2, ...]) to an existing directory (dest-directory). • One or more directory subtrees (directory1, [directory2, ...
mv(1) mv(1) If new-file is a new file, it inherits the access control list of file1, altered to reflect any difference in ownership between the two files (see acl(5) and aclv(5)). In JFS file systems, new files created by mv do not inherit their parent directory’s default ACL entries (if any), but instead retain their original ACLs. When moving files from a JFS file system to an HFS file system or vice versa, optional ACL entries are lost.
mv(1) mv(1) AUTHOR mv was developed by AT&T, the University of California, Berkeley and HP. SEE ALSO cp(1), cpio(1), ln(1), rm(1), link(1M), lstat(2), readlink(2), stat(2), symlink(2), symlink(4), acl(5), aclv(5). STANDARDS CONFORMANCE mv: SVID2, SVID3, XPG2, XPG3, XPG4, POSIX.