|
a2p(1) -- Awk to Perl translator
|
A2p takes an awk script specified on the command line (or from standard input) and produces a comparable perl script on the standard output. Options    [Toc]    [Back] Options include: -D sets... |
addftinfo(1) -- add information to troff font files for use with groff
|
addftinfo reads a troff font file and adds some additional font-metric information that is used by the groff system. The font file with the information added is written on the standard output. The inf... |
|
afmtodit(1) -- create font files for use with groff -Tps
|
afmtodit creates a font file for use with groff and grops. afmtodit is written in perl; you must have perl version 3 installed in order to run afmtodit. afm_file is the AFM (Adobe Font Metric) file fo... |
afslog(1) -- obtains AFS tokens
|
The afslog command obtains AFS tokens for the cell or path args. args is treated as a path if it contains the characters ., .., or /. If not, it is treated as a cellname or the beginning of a cellname... |
alias(1) -- a shell (command interpreter) with C-like syntax
|
csh is a command language interpreter incorporating a history mechanism (see History substitutions), job control facilities (see Jobs), interactive file name and user name completion (see File name co... |
apply(1) -- apply a command to a set of arguments
|
apply runs the named command on each given argument in turn. Character sequences of the form ``%d'' in command, where `d' is a digit from 1 to 9, are replaced by the d'th following unused argument... |
apropos(1) -- locate commands by keyword lookup
|
apropos shows which manual pages contain instances of any of the given keyword(s) in their title line. Each word is considered separately and case of letters is ignored. Words which are part of other ... |
ar(1) -- create, modify, and extract from archives.
|
The GNU ar program creates, modifies, and extracts from archives. An archive is a single file holding a collection of other files in a structure that makes it possible to retrieve the original individ... |
arch(1) -- print architecture type
|
The arch and machine commands display the machine's architecture in slightly different ways. arch by default displays the application architecture, defined by both the operating system and the instru... |
as(1) -- the portable GNU assembler.
|
GNU as is really a family of assemblers. If you use (or have used) the GNU assembler on one architecture, you should find a fairly similar environment when you use it on another architecture. Each ver... |
asa(1) -- interpret carriage-control characters
|
The asa utility reads files sequentially, mapping FORTRAN carriage-control characters to line-printer control sequences, and writes them to the standard output. The first character of each line is int... |
at(1) -- queue, examine or delete jobs for later execution
|
at and batch read commands from standard input or a specified file which are to be executed at a later time, via the user's shell as specified by the SHELL environment variable. If SHELL is not set, ... |
atq(1) -- display the at(1) job queue
|
atq displays the queue of jobs, created by the at(1) command, which are currently awaiting execution. Unless the user is the superuser, only the user's own jobs will be displayed. With no flags, the ... |
atrm(1) -- remove jobs spooled by at(1)
|
atrm removes jobs that were created with the at(1) command. The options are as follows: -a Remove all jobs belonging to the user invoking atrm. If the user is the superuser, remove all jobs. -f All in... |
aucat(1) -- concatenate and play audio files
|
The aucat utility reads files sequentially, writing them to the specified device. By default, aucat plays audio through the /dev/audio device. The file operands are processed in command line order. If... |
audioctl(1) -- control audio device
|
The audioctl command displays or sets various audio system driver variables. If a list of variables is present on the command line, audioctl prints the current value of those variables for the specifi... |
awk(1) -- pattern-directed scanning and processing language
|
awk scans each input file for lines that match any of a set of patterns specified literally in prog or in one or more files specified as -f progfile. With each pattern there can be an associated actio... |
b64decode(1) -- encode/decode a binary file
|
The uuencode and uudecode utilities are used to transmit binary files over transmission mediums that do not support formats other than printable ASCII data. b64encode and b64decode are equivalent to r... |
b64encode(1) -- encode/decode a binary file
|
The uuencode and uudecode utilities are used to transmit binary files over transmission mediums that do not support formats other than printable ASCII data. b64encode and b64decode are equivalent to r... |
banner(1) -- print strings in large letters
|
banner prints up to 10 characters of each string in large letters on the standard output. |
basename(1) -- return filename portion of pathname
|
basename deletes any prefix ending with the last slash (`/') character present in string, and a suffix, if given. The resulting filename is written to the standard output. A non-existent suffix is ig... |
batch(1) -- queue, examine or delete jobs for later execution
|
at and batch read commands from standard input or a specified file which are to be executed at a later time, via the user's shell as specified by the SHELL environment variable. If SHELL is not set, ... |
bc(1) -- arbitrary-precision arithmetic language and calculator
|
bc is an interactive processor for a language which resembles C but provides unlimited precision arithmetic. It takes input from any files given, then reads the standard input. Options available: -c b... |
bdes(1) -- encrypt/decrypt using the Data Encryption Standard
|
bdes implements all DES modes of operation described in FIPS PUB 81, including alternative cipher feedback mode and both authentication modes. bdes reads from the standard input and writes to the stan... |
bg(1) -- a shell (command interpreter) with C-like syntax
|
csh is a command language interpreter incorporating a history mechanism (see History substitutions), job control facilities (see Jobs), interactive file name and user name completion (see File name co... |
biff(1) -- be notified if mail arrives and who it is from
|
biff informs the system whether you want to be notified when mail arrives during the current terminal session. The options are as follows: n Disables notification. y Enables notification. When mail no... |
c++(1) -- GNU project C++ Compiler
|
The C and C++ compilers are integrated; g++ is a script to call gcc with options to recognize C++. gcc processes input files through one or more of four stages: preprocessing, compilation, assembly, a... |
c++filt(1) -- demangle C++ symbols
|
The C++ language provides function overloading, which means that you can write many functions with the same name (providing each takes parameters of different types). All C++ function names are encode... |
c2ph(1) -- Dump C structures as generated from "cc -g
|
The following is the old c2ph.doc documentation by Tom Christiansen Date: 25 Jul 91 08:10:21 GMT Once upon a time, I wrote a program called pstruct. It was a perl program that tried... |
cal(1) -- displays a calendar
|
cal displays a simple calendar. If arguments are not specified, the current month is displayed. The options are as follows: -j Display Julian dates (days one-based, numbered from January 1). -y Displa... |
calendar(1) -- reminder service
|
The calendar utility checks the current directory or the directory specified by the CALENDAR_DIR environment variable for a file named calendar and displays lines that begin with either today's date ... |
captoinfo(1) -- convert a termcap description into a terminfo description
|
captoinfo looks in file for termcap descriptions. For each one found, an equivalent terminfo description is written to standard output. Termcap tc capabilities are translated directly to terminfo use ... |
cap_mkdb(1) -- create capability database
|
cap_mkdb builds a hashed database out of the getcap(3) or terminfo(5) logical database constructed by the concatenation of the specified files. The database is named by the basename of the first file ... |
cat(1) -- concatenate and print files
|
The cat utility reads files sequentially, writing them to the standard output. The file operands are processed in command-line order. If file is a single dash (`-') or absent, cat reads from the stan... |
cc(1) -- GNU project C and C++ Compiler (gcc-2.95)
|
The C and C++ compilers are integrated. Both process input files through one or more of four stages: preprocessing, compilation, assembly, and linking. Source filename suffixes identify the source lan... |
cd(1) -- change working directory
|
directory is an absolute or relative pathname which becomes the new working directory. The interpretation of a relative pathname by cd depends on the CDPATH environment variable (see below). Note that... |
cdio(1) -- compact disc audio player and control utility
|
The cdio program controls audio features of a CD drive. The device is a name such as ``cd0'' or ``mcd0''. If a device is not specified, the environment variable DISC will be used to find the CD de... |
checknr(1) -- check nroff/troff files
|
checknr checks a list of nroff(1) or troff(1) input files for certain kinds of errors involving mismatched opening and closing delimiters and unknown commands. If no files are specified, checknr check... |
chflags(1) -- change file flags
|
The chflags utility modifies the file flags of the listed files as specified by the flags operand. The flags of a file dictate special restrictions beyond those enforced by its mode/permissions. The o... |
chfn(1) -- add or change user database information
|
chpass allows editing of the user database information associated with user, or, by default, the current user. The information is formatted and supplied to an editor for changes. Only the information ... |
chgrp(1) -- change group
|
chgrp sets the group ID of the specified files. The options are as follows: -H If the -R option is specified, symbolic links on the command line are followed. (Symbolic links encountered in the tree t... |
chio(1) -- medium changer control utility
|
The chio utility is used to control the operation of medium changers, such as those found in tape and optical disk jukeboxes. The options are as follows: -f changer Use the device changer rather than ... |
chmod(1) -- change file modes
|
The chmod utility modifies the file mode bits of the listed files as specified by the mode operand. The mode of a file dictates its permissions, among other attributes. The options are as follows: -R ... |
chpass(1) -- add or change user database information
|
chpass allows editing of the user database information associated with user, or, by default, the current user. The information is formatted and supplied to an editor for changes. Only the information ... |
chsh(1) -- add or change user database information
|
chpass allows editing of the user database information associated with user, or, by default, the current user. The information is formatted and supplied to an editor for changes. Only the information ... |
ci(1) -- check in RCS revisions
|
ci stores new revisions into RCS files. Each pathname matching an RCS suffix is taken to be an RCS file. All others are assumed to be working files containing new revisions. ci deposits the contents o... |
cksum(1) -- display file checksums and block counts
|
The cksum utility writes to the standard output a single line for each input file. The format of this line varies with the algorithm being used as follows: cksum The output line consists of three whit... |
clear(1) -- terminal capability interface
|
The tput utility makes terminal-dependent information available to users or shell applications. The options are as follows: -T The terminal name as found in the terminfo database; for example, ``vt100... |
cmp(1) -- compare two files
|
The cmp utility compares two files of any type and writes the results to the standard output. By default, cmp is silent if the files are the same; if they differ, the byte and line number at which the... |
co(1) -- check out RCS revisions
|
co retrieves a revision from each RCS file and stores it into the corresponding working file. Pathnames matching an RCS suffix denote RCS files; all others denote working files. Names are paired as ex... |
col(1) -- filter reverse line feeds from input
|
col filters out reverse (and half-reverse) line feeds so that the output is in the correct order with only forward and half-forward line feeds, and replaces whitespace characters with tabs where possi... |
colcrt(1) -- filter nroff output for CRT previewing
|
colcrt provides virtual half-line and reverse line feed sequences for terminals without such capability, and on which overstriking is destructive. Half-line characters and underlining (changed to dash... |
colrm(1) -- remove columns from a file
|
colrm removes selected columns from the lines of a file. A column is defined as a single character in a line. Input is read from the standard input. Output is written to the standard output. If only t... |
column(1) -- columnate lists
|
The column utility formats its input into multiple columns. Rows are filled before columns. Input is taken from file operands, or, by default, from the standard input. Empty lines are ignored. The opt... |
comm(1) -- select or reject lines common to two files
|
The comm utility reads file1 and file2, which should be sorted lexically, and produces three text columns as output: lines only in file1; lines only in file2; and lines in both files. The filename ``-... |
compile_et(1) -- error table compiler
|
compile_et converts a table listing error-code names and associated messages into a C source file suitable for use with the com_err(3) library. The source file name must end with a suffix of ``.et''... |
compress(1) -- compress and expand data
|
The compress and gzip utilities reduce the size of the named files using adaptive Lempel-Ziv coding. They are functionally identical, but use different algorithms for compression. If invoked as gzip o... |
cp(1) -- copy files
|
In the first synopsis form, the cp utility copies the contents of the source_file to the target_file. In the second synopsis form, the contents of each named source_file are copied to the destination ... |
cpan(1) -- easily interact with CPAN from the command line
|
This script provides a command interface (not a shell) to CPAN.pm. Meta Options    [Toc]    [Back] These options are mutually exclusive, and the script processes them in this order: [ahvr]. Once the s... |
cpio(1) -- copy file archives in and out
|
The cpio command copies files to and from a cpio archive. The options are as follows: -o Create an archive. Reads the list of files to store in the archive from standard input, and writes the archive ... |
cpp(1) -- The GNU C-Compatible Compiler Preprocessor.
|
The C preprocessor is a macro processor that is used automatically by the C compiler to transform your program before actual compilation. It is called a macro processor because it allows you to define... |
crontab(1) -- maintain crontab files for individual users
|
crontab is the program used to install, deinstall, or list the tables used to drive the cron(8) daemon. Each user can have their own crontab(5), and though these are files in /var/cron/tabs, they are ... |
csh(1) -- a shell (command interpreter) with C-like syntax
|
csh is a command language interpreter incorporating a history mechanism (see History substitutions), job control facilities (see Jobs), interactive file name and user name completion (see File name co... |
ctags(1) -- create a tags file
|
ctags makes a tags file for ex(1) from the specified C, Pascal, Fortran, YACC, lex, and lisp sources. A tags file gives the locations of specified objects in a group of files. Each line of the tags fi... |
cu(1) -- connect to a remote system
|
tip and cu establish a full-duplex connection to another machine, giving the appearance of being logged in directly on the remote CPU. It goes without saying that you must have a login on the machine ... |
cut(1) -- select portions of each line of a file
|
The cut utility selects portions of each line (as specified by list) from each file (or the standard input by default), and writes them to the standard output. The items specified by list can be in te... |
cvs(1) -- Concurrent Versions System
|
CVS is a version control system, which allows you to keep old versions of files (usually source code), keep a log of who, when, and why changes occurred, etc., like RCS or SCCS. Unlike the simpler sys... |
date(1) -- display or set date and time
|
When invoked without arguments, the date utility displays the current date and time. Otherwise, depending on the options specified, date will set the date and time or print it in a user-defined way. O... |
dbmmanage(1) -- Create and update user authentication files in DBM format
|
dbmmanage is used to create and update the DBM format files used to store usernames and password for basic authentication of HTTP users. Resources available from the httpd Apache web server can be res... |
dc(1) -- desk calculator
|
dc is an arbitrary precision arithmetic package. The overall structure of dc is a stacking (reverse Polish) calculator i.e. numbers are stored on a stack. Adding a number pushes it onto the stack. Ari... |
dd(1) -- convert and copy a file
|
The dd utility copies the standard input to the standard output, applying any specified conversions. Input data is read and written in 512-byte blocks. If input reads are short, input from multiple re... |
deroff(1) -- remove nroff/troff, eqn, pic and tbl constructs
|
deroff reads each file in sequence and removes all nroff(1) and troff(1) command lines, backslash constructions, macro definitions, eqn(1) constructs (between `.EQ' and `.EN' lines or between delimi... |
df(1) -- display free disk space
|
The df utility displays statistics about the amount of free disk space on the specified file_system or on the file system of which file is a part. By default, values are displayed as 512-byte block co... |
diff(1) -- differential file and directory comparator
|
The diff utility compares the contents of file1 and file2 and writes to the standard output the list of changes necessary to convert one file into the other. No output is produced if the files are ide... |
diff3(1) -- 3-way differential file comparison
|
The diff3 utility compares the contents of three different versions of a file, file1, file2 and file3, writing the result to the standard output. The options describe different methods of merging and ... |
dig(1) -- DNS lookup utility
|
dig (domain information groper) is a flexible tool for interrogating DNS name servers. It performs DNS lookups and displays the answers that are returned from the name server(s) that were queried. Mos... |
dirname(1) -- return directory portion of pathname
|
dirname deletes the filename portion, beginning with the last slash (`/') character to the end of pathname, and writes the result to the standard output. The dirname utility exits 0 on success or >0 ... |
dirs(1) -- a shell (command interpreter) with C-like syntax
|
csh is a command language interpreter incorporating a history mechanism (see History substitutions), job control facilities (see Jobs), interactive file name and user name completion (see File name co... |
domainname(1) -- set or print YP domain of current host system
|
The domainname utility prints the YP domain name of the current host. The superuser can set the domain name by supplying a /etc/defaultdomain file (see defaultdomain(5)). This is used at system boot t... |
dprofpp(1) -- display perl profile data
|
The dprofpp command interprets profile data produced by a profiler, such as the Devel::DProf profiler. Dprofpp will read the file tmon.out and will display the 15 subroutines which are using the most ... |
du(1) -- display disk usage statistics
|
The du utility displays the file system block usage for each file argument and for each directory in the file hierarchy rooted in each directory argument. Note that the system block usage is usually g... |
echo(1) -- write arguments to the standard output
|
The echo utility writes any specified operands, separated by single blank (` ') characters and followed by a newline (`0) character, to the standard output. When no operands are given, only the newli... |
ed(1) -- text editor
|
ed is a line-oriented text editor. It is used to create, display, modify, and otherwise manipulate text files. If invoked with a file argument, then a copy of file is read into the editor's buffer. C... |
egrep(1) -- file pattern searcher
|
The grep utilities search the given input files selecting lines that match one or more patterns. By default, a pattern matches an input line if any regular expression (RE) in the pattern matches the i... |
eject(1) -- magnetic tape and removable media manipulating program
|
The mt utility sends commands to a magnetic tape drive. By default, mt performs the requested operation once. Operations may be performed multiple times by specifying count. Note that device must refe... |
elf2olf(1) -- convert between ELF and OLF object module format
|
The elf2olf utility reads the specified ELF version 1 module operands and converts them to the default operating system's OLF object module format. The olf2elf utility reverses the process. The modul... |
enc2xs(1) -- Perl Encode Module Generator
|
enc2xs builds a Perl extension for use by Encode from either Unicode Character Mapping files (.ucm) or Tcl Encoding Files (.enc). Besides being used internally during the build process of the Encode m... |
encrypt(1) -- encrypt passwords from the command line or standard input
|
encrypt prints the encrypted form of string to the standard output. This is mostly useful for encrypting passwords from within scripts. The options are as follows: -k Run in makekey compatible mode; a... |
env(1) -- set and print environment
|
env executes utility after modifying the environment as specified on the command line. The option name=value specifies an environment variable, name, with a value of value. The options are as follows:... |
eqn(1) -- format equations for troff
|
This manual page describes the GNU version of eqn, which is part of the groff document formatting system. eqn compiles descriptions of equations embedded within troff input files into commands that ar... |
ex(1) -- text editor
|
ex is a line-oriented text editor; vi is a screen-oriented text editor. ex and vi are different interfaces to the same program, and it is possible to switch back and forth during an edit session. view... |
expand(1) -- expand tabs to spaces, and vice versa
|
expand processes the named files or the standard input, writing the standard output with tabs changed into blanks. Backspace characters are preserved into the output and decrement the column count for... |
expr(1) -- evaluate expression
|
The expr utility evaluates expression and writes the result on standard output. All operators are separate arguments to the expr utility. Characters special to the command interpreter must be escaped.... |
f77(1) -- GNU project Fortran Compiler (v0.5.24)
|
The C and F77 compilers are integrated; g77 is a program to call gcc with options to recognize programs written in Fortran (ANSI FORTRAN 77, also called F77). gcc processes input files through one or ... |
false(1) -- return false value
|
The false utility always exits with a non-zero exit code. |
sparc/fdformat(1) -- format floppy disks
|
fdformat formats a floppy disk at device device_name. device_name should be a character device; it may be given either with a full path name of a raw device node for a floppy disk drive (e.g., /dev/rf... |
i386/fdformat(1) -- format floppy disks
|
fdformat formats a floppy disk at device device_name. device_name should be a character device; it may be given either with a full path name of a raw device node for a floppy disk drive (e.g., /dev/rf... |
fg(1) -- a shell (command interpreter) with C-like syntax
|
csh is a command language interpreter incorporating a history mechanism (see History substitutions), job control facilities (see Jobs), interactive file name and user name completion (see File name co... |
fgen(1) -- IEEE 1275 Open Firmware FCode Tokenizer
|
Reads Forth source and generates tokenized FCode object file. |
fgrep(1) -- file pattern searcher
|
The grep utilities search the given input files selecting lines that match one or more patterns. By default, a pattern matches an input line if any regular expression (RE) in the pattern matches the i... |
file(1) -- determine file type
|
This manual page documents version 3.22 of the file command. file tests each argument in an attempt to classify it. There are three sets of tests, performed in this order: filesystem tests, magic numb... |
file2c(1) -- convert file to c-source
|
The file2c utility reads a file from the standard input and writes it to the standard output, converting each byte to its decimal representation on the fly. If the first string is present, it is print... |
find(1) -- walk a file hierarchy
|
find recursively descends the directory tree for each file listed, evaluating an expression (composed of the ``primaries'' and ``operands'' listed below) in terms of each file in the tree. In the ... |
find2perl(1) -- translate find command lines to Perl code
|
find2perl is a little translator to convert find command lines to equivalent Perl code. The resulting code is typically faster than running find itself. "paths" are a set of paths where find2perl wi... |
finger(1) -- user information lookup program
|
The finger utility displays information about local and remote system users. By default, the following information is displayed about each user currently logged-in to the local host: +o login name +o ... |
flex(1) -- fast lexical analyzer generator
|
flex is a tool for generating scanners: programs which recognize lexical patterns in text. flex reads the given input files, or its standard input if no file names are given, for a description of a sc... |
flex++(1) -- fast lexical analyzer generator
|
flex is a tool for generating scanners: programs which recognize lexical patterns in text. flex reads the given input files, or its standard input if no file names are given, for a description of a sc... |
fmt(1) -- simple text formatter
|
fmt is a simple text formatter which reads the concatenation of input files (or standard input if none are given) and produces on standard output a version of its input with lines as close to the goal... |
fold(1) -- fold long lines for finite width output device
|
fold is a filter which folds the contents of the specified files, or the standard input if no files are specified, breaking the lines to have a maximum of 80 characters. The options are as follows: -b... |
foreach(1) -- a shell (command interpreter) with C-like syntax
|
csh is a command language interpreter incorporating a history mechanism (see History substitutions), job control facilities (see Jobs), interactive file name and user name completion (see File name co... |
fpr(1) -- interpret carriage-control characters
|
The asa utility reads files sequentially, mapping FORTRAN carriage-control characters to line-printer control sequences, and writes them to the standard output. The first character of each line is int... |
from(1) -- print names of those who have sent mail
|
from prints out the mail header lines from the invoker's mailbox. The options are as follows: -f file The supplied file is examined instead of the invoker's mailbox. If the -f option is used, the us... |
fs(1) -- Manage AFS directories
|
The fs utility is used to manipulate the AFS filesystem. Note that the fs utility does not modify the traditional UNIX filesystem, only files in AFS. The fs utility provides several commands: apropos ... |
fsplit(1) -- split a multi-routine Fortran file into individual files
|
fsplit takes as input either a file or standard input containing Fortran source code. It attempts to split the input into separate routine files of the form name.f, where name is the name of the progr... |
fstat(1) -- display status of open files
|
fstat identifies open files. A file is considered open by a process if it was explicitly opened, is the working directory, root directory, active pure text, or kernel trace file for that process. If n... |
ftp(1) -- ARPANET file transfer program
|
ftp is the user interface to the ARPANET standard File Transfer Protocol. The program allows a user to transfer files to and from a remote network site. The latter three usage formats will fetch a fil... |
g++(1) -- GNU project C++ Compiler
|
The C and C++ compilers are integrated; g++ is a script to call gcc with options to recognize C++. gcc processes input files through one or more of four stages: preprocessing, compilation, assembly, a... |
g77(1) -- GNU project Fortran Compiler (v0.5.24)
|
The C and F77 compilers are integrated; g77 is a program to call gcc with options to recognize programs written in Fortran (ANSI FORTRAN 77, also called F77). gcc processes input files through one or ... |
gcc(1) -- GNU project C and C++ Compiler (gcc-2.95)
|
The C and C++ compilers are integrated. Both process input files through one or more of four stages: preprocessing, compilation, assembly, and linking. Source filename suffixes identify the source lan... |
gcc-local(1) -- local modifications to gcc
|
Some OpenBSD platforms use a derivative of gcc 2.95.3, others use a derivative of gcc 3.3.2. In both cases, the gcc software comes with specific modifications for OpenBSD. - gcc does not search under ... |
gcov(1) -- test coverage program
|
The gcov utility is a test coverage program. Use it in concert with gcc(1) to analyze programs to help create more efficient, faster running code. gcov can be used as a profiling tool to help discover... |
gdb(1) -- The GNU Debugger
|
The purpose of a debugger such as GDB is to allow you to see what is going on ``inside'' another program while it executes--or what another program was doing at the moment it crashed. GDB can do fou... |
gencat(1) -- NLS catalog compiler
|
The gencat utility merges the text NLS (National Language Support) in input-file into a formatted message catalog file output-file. The file output-file will be created if it does not already exist. I... |
getconf(1) -- get configuration values
|
The getconf utility writes the current value of a configurable system limit or option variable to the standard output. The name argument specifies the system variable to be queried. The pathname argum... |
getopt(1) -- parse command options
|
getopt is used to break up options in command lines for easy parsing by shell procedures, and to check for legal options. [optstring] is a string of recognized option letters (see getopt(3)); if a let... |
gprof(1) -- display call graph profile data
|
gprof produces an execution profile of C, Pascal, or Fortran77 programs. The effect of called routines is incorporated in the profile of each caller. The profile data is taken from the call graph prof... |
grep(1) -- file pattern searcher
|
The grep utilities search the given input files selecting lines that match one or more patterns. By default, a pattern matches an input line if any regular expression (RE) in the pattern matches the i... |
hp300/grfinfo(1) -- display information about grf graphics devices
|
grfinfo displays information about the graphics framebuffer device list. The options are as follows: -a For each device, display the type and all possible information. -t For each device, display the ... |
grodvi(1) -- convert groff output to TeX dvi format
|
grodvi is a driver for groff that produces TeX dvi format. Normally it should be run by groff -Tdvi. This will run troff -Tdvi; it will also input the macros /usr/share/tmac/tmac.dvi; if the input is ... |
groff(1) -- front end for the groff document formatting system
|
groff is a front-end to the groff document formatting system. Normally it runs the troff program and a postprocessor appropriate for the selected device. Available devices are: ps For PostScript print... |
grog(1) -- guess options for groff command
|
grog reads files and guesses which of the groff(1) options -e, -man, -me, -mm, -ms, -p, -s, and -t are required for printing files, and prints the groff command including those options on the standard... |
grohtml(1) -- html driver for groff
|
grohtml translates the output of GNU troff to html. Normally grohtml should be invoked by using the groff command with a -Thtml option. If no files are given, grohtml will read the standard input. A f... |
grolj4(1) -- groff driver for HP Laserjet 4 family
|
grolj4 is a driver for groff that produces output in PCL5 format suitable for an HP Laserjet 4 printer. There is an additional drawing command available: 'R dh dv' Draw a rule (solid black rectangle... |
grops(1) -- PostScript driver for groff
|
grops translates the output of GNU troff to PostScript. Normally grops should be invoked by using the groff command with a -Tps option. (Actually, this is the default for groff.) If no files are given... |
grotty(1) -- groff driver for typewriter-like devices
|
grotty translates the output of GNU troff into a form suitable for typewriter-like devices. Normally grotty should invoked by using the groff command with a -Tascii or -Tlatin1 option. If no files are... |
groups(1) -- show group memberships
|
The groups utility has been obsoleted by the id(1) utility, and is equivalent to id -Gn [user]. The command id -p is suggested for normal interactive use. The groups utility displays the groups to whi... |
gunzip(1) -- compress and expand data
|
The compress and gzip utilities reduce the size of the named files using adaptive Lempel-Ziv coding. They are functionally identical, but use different algorithms for compression. If invoked as gzip o... |
gzcat(1) -- compress and expand data
|
The compress and gzip utilities reduce the size of the named files using adaptive Lempel-Ziv coding. They are functionally identical, but use different algorithms for compression. If invoked as gzip o... |
gzexe(1) -- create auto-decompressing executables
|
The gzexe utility uses gzip(1) to compress executables, producing executables that decompress on-the-fly when executed. This saves disk space, at the cost of slower execution times. The original execu... |
gzip(1) -- compress and expand data
|
The compress and gzip utilities reduce the size of the named files using adaptive Lempel-Ziv coding. They are functionally identical, but use different algorithms for compression. If invoked as gzip o... |
h2ph(1) -- convert .h C header files to .ph Perl header files
|
h2ph converts any C header files specified to the corresponding Perl header file format. It is most easily run while in /usr/include: cd /usr/include; h2ph * sys/* or cd /usr/include; h2ph * sys/* arp... |
h2xs(1) -- convert .h C header files to Perl extensions
|
h2xs builds a Perl extension from C header files. The extension will include functions which can be used to retrieve the value of any #define statement which was in the C header files. The module_name... |
head(1) -- display first few lines of files
|
The head utility copies the first count lines of each specified file to the standard output. If no files are named, head copies lines from the standard input. If count is omitted, it defaults to 10. T... |
help(1) -- help for new users and administrators
|
This document is meant to familiarize new users and system administrators with OpenBSD and, if necessary, UNIX in general. Firstly, a wealth of information is contained within the system manual pages.... |
hexdump(1) -- ascii, decimal, hexadecimal, octal dump
|
The hexdump utility is a filter which displays the specified files, or the standard input, if no files are specified, in a userspecified format. The options are as follows: -b One-byte octal display. ... |
history(1) -- a shell (command interpreter) with C-like syntax
|
csh is a command language interpreter incorporating a history mechanism (see History substitutions), job control facilities (see Jobs), interactive file name and user name completion (see File name co... |
host(1) -- DNS lookup utility
|
host is a simple utility for performing DNS lookups. It is normally used to convert names to IP addresses and vice versa. When no arguments or options are given, host prints a short summary of its com... |
hostname(1) -- set or print name of current host system
|
The hostname utility prints the name of the current host. The superuser can set the host name by supplying a /etc/myname file. This is used at system boot time by netstart(8) to initialize the hostnam... |
hoststat(1) -- an electronic mail transport agent
|
Sendmail sends a message to one or more recipients, routing the message over whatever networks are necessary. Sendmail does internetwork forwarding as necessary to deliver the message to the correct p... |
hpftodit(1) -- create font description files for use with
|
hpftodit creates a font file for use with groff -Tlj4 from an HP tagged font metric file. tfm_file is the name of the tagged font metric file for the font. map_file is a file giving the groff names fo... |
htdigest(1) -- Create and update user authentication files
|
htdigest is used to create and update the flat-files used to store usernames, realm and password for digest authentication of HTTP users. Resources available from the httpd Apache web server can be re... |
htpasswd(1) -- Create and update user authentication files
|
htpasswd is used to create and update the flat-files used to store usernames and password for basic authentication of HTTP users. If htpasswd cannot access a file, such as not being able to write to t... |
id(1) -- return user identity
|
The id utility displays the user and group names and numeric IDs, of the calling process, to the standard output. If the real and effective IDs are different, both are displayed, otherwise only the re... |
ident(1) -- identify RCS keyword strings in files
|
ident searches for all instances of the pattern $keyword: text $ in the named files or, if no files are named, the standard input. These patterns are normally inserted automatically by the RCS command... |
indent(1) -- indent and format C program source
|
indent is a C program formatter. It reformats the C program in the input-file according to the switches. The switches which can be specified are described below. They may appear before or after the fi... |
indxbib(1) -- make inverted index for bibliographic databases
|
indxbib makes an inverted index for the bibliographic databases in filename... for use with refer(1), look- bib(1), and lkbib(1). The index will be named filename.i; the index is written to a temporar... |
info(1) -- read Info documents
|
Read documentation in Info format. |
infocmp(1) -- compare or print out terminfo descriptions
|
infocmp can be used to compare a binary terminfo entry with other terminfo entries, rewrite a terminfo description to take advantage of the use= terminfo field, or print out a terminfo description fro... |
infokey(1) -- compile custom key bindings file
|
The infokey utility compiles a source file ($HOME/.infokey by default) containing info(1) customizations into a binary format ($HOME/.info by default). info(1) reads the binary file at startup to over... |
infotocap(1) -- convert a terminfo description into a termcap description
|
infotocap looks in file for terminfo descriptions. For each one found, an equivalent termcap description is written to standard output. Terminfo use capabilities are translated directly to termcap tc ... |
install(1) -- install binaries
|
The source file(s) are copied to the target file or directory. If the target file already exists, it is either renamed to file.old if the -b option is given or overwritten if permissions allow. An alt... |
install-info(1) -- update info/dir entries
|
Install or delete dir entries from INFO-FILE in the Info directory file DIR-FILE. |
intro(1) -- introduction to general commands (tools and utilities)
|
The manual pages in section one contain most of the commands which comprise the BSD user environment. Some of the commands included in section one are text editors, command shell interpreters, searchi... |
ipcrm(1) -- remove the specified message queues, semaphore sets, and shared memory segments
|
ipcrm removes the specified message queues, semaphores and shared memory segments. These System V IPC objects can be specified by their creation ID or any associated key. The options are as follows: -... |
ipcs(1) -- report System V interprocess communication facilities status
|
The ipcs program provides information on System V interprocess communication (IPC) facilities on the system. The options are as follows: -a Show the maximum amount of information possible when display... |
jobs(1) -- a shell (command interpreter) with C-like syntax
|
csh is a command language interpreter incorporating a history mechanism (see History substitutions), job control facilities (see Jobs), interactive file name and user name completion (see File name co... |
join(1) -- relational database operator
|
The join utility performs an ``equality join'' on the specified files and writes the result to the standard output. The ``join field'' is the field in each file by which the files are compared. Th... |
jot(1) -- print sequential or random data
|
jot is used to print out increasing, decreasing, random, or redundant data, usually numbers, one per line. The options are as follows: -b word Just print word repetitively. -c This is an abbreviation ... |
kauth(1) -- acquire initial tickets
|
kinit is used to authenticate to the Kerberos server as principal, or if none is given, a system generated default (typically your login name at the default realm), and acquire a ticket granting ticke... |
kdestroy(1) -- destroy the current ticket file
|
kdestroy removes the current set of tickets. Supported options: -c cachefile -cache=cachefile The cache file to remove. --no-unlog Do not remove AFS tokens. --no-delete-v4 Do not remove v4 tickets. |
kdump(1) -- display kernel trace data
|
kdump displays the kernel trace files produced with ktrace(1) in humanreadable format. By default, the file ktrace.out in the current directory is displayed, unless overridden by the -f option. The op... |
keynote(1) -- command line tool for keynote(3) operations
|
For more details on KeyNote, see RFC 2704. |
kill(1) -- terminate or signal a process
|
The kill utility sends a signal to the process(es) specified by the pid operand(s). If no signal is specified, SIGTERM is used. Only the superuser may send signals to other users' processes. The opti... |
kinit(1) -- acquire initial tickets
|
kinit is used to authenticate to the Kerberos server as principal, or if none is given, a system generated default (typically your login name at the default realm), and acquire a ticket granting ticke... |
klist(1) -- list Kerberos credentials
|
klist reads and displays the current tickets in the credential cache (also known as the ticket file). Options supported: -c cache, --cache=cache credential cache to list -s, -t, --test Test for there ... |
ksh(1) -- public domain Korn shell
|
ksh is a command interpreter intended for both interactive and shell script use. Its command language is a superset of the sh(1) shell language. Shell startup    [Toc]    [Back] The following options ... |
ktrace(1) -- enable kernel process tracing
|
ktrace enables kernel trace logging for the specified processes. By default, kernel trace data is logged to the file ktrace.out, unless overridden by the -f option. The kernel operations that are trac... |
lam(1) -- laminate files
|
lam copies the named files side by side onto the standard output. The n- th input lines from the input files are considered fragments of the single long n-th output line into which they are assembled.... |
last(1) -- indicate last logins of users and ttys
|
The last utility will either (1) list the sessions of specified users, ttys, and hosts, in reverse time order, or (2) list the users logged in at a specified snapshot date & time in reverse time order... |
lastcomm(1) -- show last commands executed in reverse order
|
lastcomm gives information on previously executed commands. With no arguments, lastcomm prints information about all the commands recorded during the current accounting file's lifetime. The options a... |
ld(1) -- Using LD, the GNU linker
|
ld combines a number of object and archive files, relocates their data and ties up symbol references. Usually the last step in compiling a program is to run ld. ld accepts Linker Command Language file... |
ld.so(1) -- run-time link-editor
|
ld.so is a self-contained, position independent program image providing run-time support for loading and link-editing shared objects into a process's address space. It uses the data structures (see l... |
ldd(1) -- list dynamic object dependencies
|
ldd displays the shared objects needed to run program. ldd uses the DT_NEEDED tags to determine what dynamic objects are required. To list the objects ldd sets the environment variable LD_TRACE_LOADED... |
leave(1) -- remind you when you have to leave
|
leave waits until the specified time, then reminds you that you have to leave. You are reminded 5 minutes and 1 minute before the actual time, at the time, and every minute thereafter. When you log of... |
less(1) -- view files on a CRT
|
less is a program similar to the traditional more(1), but which allows backward movement in the file as well as forward movement. Also, less does not have to read the entire input file before starting... |
lesskey(1) -- specify key bindings for less
|
lesskey is used to specify a set of key bindings to be used by less(1). The input file is a text file which describes the key bindings. If the input file is `-', standard input is read. If no input f... |
lex(1) -- fast lexical analyzer generator
|
flex is a tool for generating scanners: programs which recognize lexical patterns in text. flex reads the given input files, or its standard input if no file names are given, for a description of a sc... |
libnetcfg(1) -- configure libnet
|
The libnetcfg utility can be used to configure the libnet. Starting from perl 5.8 libnet is part of the standard Perl distribution, but the libnetcfg can be used for any libnet installation. |
limit(1) -- a shell (command interpreter) with C-like syntax
|
csh is a command language interpreter incorporating a history mechanism (see History substitutions), job control facilities (see Jobs), interactive file name and user name completion (see File name co... |
lint(1) -- a C program verifier
|
lint attempts to detect features of the named C program files that are likely to be bugs, non-portable, or wasteful. It also performs stricter type checking than the C compiler. lint runs the C prepro... |
lkbib(1) -- search bibliographic databases
|
lkbib searches bibliographic databases for references that contain the keys key... and prints any references found on the standard output. lkbib will search any databases given by -p options, and then... |
ln(1) -- make hard and symbolic links to files
|
The ln utility creates a new directory entry (linked file) which has the same modes as the original file. It is useful for maintaining multiple copies of a file in many places at once without using up... |
lndir(1) -- create a shadow directory of symbolic links to another directory tree
|
The lndir program makes a shadow copy todir of a directory tree fromdir, except that the shadow is not populated with real files but instead with symbolic links pointing at the real files in the fromd... |
locate(1) -- find filenames quickly
|
The locate utility searches a database for all pathnames which match the specified pattern. The database is recomputed periodically (usually weekly or daily), and contains the pathnames of all files w... |
lock(1) -- reserve a terminal
|
lock requests a password from the user, reads it again for verification and then will normally not relinquish the terminal until the password is repeated. There are two other conditions under which it... |
lockspool(1) -- lock user's system mailbox
|
lockspool is useful for a client mail program to attain proper locking. lockspool obtains a username.lock for the calling user and retains it until stdin is closed or a signal like SIGINT, SIGTERM, or... |
logger(1) -- make entries in the system log
|
The logger utility provides a shell command interface to the syslog(3) system log module. The options are as follows: -i Log the process ID of the logger process with each line. -f file Log the specif... |
login(1) -- log into the computer
|
The login utility logs users (and pseudo-users) into the computer system. If no user is specified, or if a user is specified and authentication of the user fails, login prompts for a user name. Authen... |
logname(1) -- display user's login name
|
The logname utility writes the user's login name to standard output followed by a newline (`0). The logname utility explicitly ignores the LOGNAME and USER environment variables because the environme... |
look(1) -- display lines beginning with a given string
|
The look utility displays any lines in file which contain string as a prefix. As look performs a binary search, the lines in file must be sorted. If file is not specified, the file /usr/share/dict/wor... |
lookbib(1) -- search bibliographic databases
|
lookbib prints a prompt on the standard error (unless the standard input is not a terminal), reads from the standard input a line containing a set of keywords, searches the bibliographic databases fil... |
lorder(1) -- list dependencies for object files
|
The lorder utility uses nm(1) to determine interdependencies in the list of object files specified on the command line. lorder outputs a list of file names where the first file contains a symbol which... |
lpq(1) -- spool queue examination program
|
lpq examines the spooling area used by lpd(8) for printing files on the line printer, and reports the status of the specified jobs or all jobs associated with a user. lpq invoked without any arguments... |
lpr(1) -- off line print
|
lpr uses a spooling daemon to print the named files when facilities become available. If no names appear, the standard input is assumed. The following single letter options are used to notify the line... |
lprm(1) -- remove jobs from the line printer spooling queue
|
lprm will remove a job, or jobs, from a printer's spool queue. Since the spooling directory is protected from users, using lprm is normally the only method by which a user may remove a job. The owner... |
lptest(1) -- generate lineprinter ripple pattern
|
lptest writes the traditional ``ripple test'' pattern on standard output. In 96 lines, this pattern will print all 96 printable ASCII characters in each position. While originally created to test pr... |
ls(1) -- list directory contents
|
For each operand that names a file of a type other than directory, ls displays its name as well as any requested, associated information. For each named directory, ls displays the names of files conta... |
lynx(1) -- a general purpose distributed information browser for the World Wide Web
|
Lynx is a fully-featured World Wide Web (WWW) client for users running cursor-addressable, character-cell display devices (e.g., vt100 terminals, vt100 emulators running on Windows 95/NT or Macintoshe... |
m4(1) -- macro language processor
|
The m4 utility is a macro processor that can be used as a front end to any language (e.g., C, ratfor, fortran, lex, and yacc). m4 reads from the standard input and writes the processed text to the sta... |
machine(1) -- print architecture type
|
The arch and machine commands display the machine's architecture in slightly different ways. arch by default displays the application architecture, defined by both the operating system and the instru... |
Mail(1) -- send and receive mail
|
mail is an intelligent mail processing system which has a command syntax reminiscent of ed(1) with lines replaced by messages. The options are as follows: -b list Send blind carbon copies to list. -c ... |
mail(1) -- send and receive mail
|
mail is an intelligent mail processing system which has a command syntax reminiscent of ed(1) with lines replaced by messages. The options are as follows: -b list Send blind carbon copies to list. -c ... |
mailx(1) -- send and receive mail
|
mail is an intelligent mail processing system which has a command syntax reminiscent of ed(1) with lines replaced by messages. The options are as follows: -b list Send blind carbon copies to list. -c ... |
make(1) -- maintain program dependencies
|
make is a program designed to simplify the maintenance of other programs. Its input is a list of specifications as to the files upon which programs and other files depend. If the file `BSDmakefile' e... |
makeinfo(1) -- translate Texinfo documents
|
Translate Texinfo source documentation to various other formats, by default Info files suitable for reading online with Emacs or standalone GNU Info. General options: --error-limit=NUM quit after NUM ... |
man(1) -- display the on-line manual pages
|
The man utility displays the BSD manual pages entitled name. The options are as follows: -a Display all of the manual pages for a specified section and name combination. (Normally, only the first manu... |
md5(1) -- calculate a message-digest fingerprint (checksum) for a file
|
md5 takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input. It was conjectured that it would be computationally infeasible to ... |
merge(1) -- three-way file merge
|
merge incorporates all changes that lead from file2 to file3 into file1. The result ordinarily goes into file1. merge is useful for combining separate changes to an original. Suppose file2 is the orig... |
mesg(1) -- display (do not display) messages from other users
|
The mesg utility is invoked by a user to control write access others have to the terminal device associated with the standard error output. Write access is allowed by default, and programs such as tal... |
mg(1) -- emacs-like text editor
|
mg is intended to be a small, fast, and portable editor for people who can't (or don't want to) run the real emacs for one reason or another, or are not familiar with the vi(1) editor. It is compati... |
midiplay(1) -- play MIDI files
|
The midiplay command plays MIDI files using the sequencer device. If no file name is given it will play from standard input, otherwise it will play the named files. The options are as follows: -d devn... |
mixerctl(1) -- control audio mixing
|
The mixerctl command displays or sets various audio system mixing variables. If a list of variables is present on the command line, mixerctl prints the current value of those variables for the specifi... |
mkdep(1) -- construct Makefile dependency list
|
mkdep takes a set of flags for the C compiler and a list of C source files as arguments and constructs a set of include file dependencies which are written into the file .depend. An example of its use... |
mkdir(1) -- make directories
|
The mkdir utility creates the directories named as operands, in the order specified, using mode rwxrwxrwx (0777) as modified by the current umask(2). The options are as follows: -m mode Set the file p... |
mkfifo(1) -- make FIFOs
|
mkfifo creates the FIFOs requested, in the order specified, using mode 0666 modified by the current umask(2). The options are as follows: -m mode Set the file permission bits of newly created director... |
mkstr(1) -- create an error message file by massaging C source
|
mkstr creates files containing error messages extracted from C source, and restructures the same C source, to utilize the created error message file. The intent of mkstr was to reduce the size of larg... |
mktemp(1) -- make temporary filename (unique)
|
The mktemp utility takes the given filename template and overwrites a portion of it to create a unique filename. The template may be any filename with some number of `Xs' appended to it, for example ... |
mopa.out(1) -- create MOP image from an a.out file
|
mopa.out is used to convert an a.out file to a MOP-image. This program will check if a.out(5) machine ID is recognized. If not it will try to swap the a.out(5) header, and try again. |
mopchk(1) -- MOP check utility
|
mopchk shows information about which devices are known, version of mopd suite or information about a MOP-image. If filename is given, information about the MOP-image is read from the header of the fil... |
mopprobe(1) -- MOP Probe Utility
|
mopprobe prints the Ethernet address and nodename of DECserver 100/200/250/300 on the Ethernet connected to interface or all known interfaces if -a is given. `-a' is given. If `-o' inhibits all mess... |
moptrace(1) -- MOP Trace Utility
|
moptrace prints the contents of MOP packages on the Ethernet connected to interface or all known interfaces if -a is given. The options are as follows: -a Listen on all the Ethernets attached to the s... |
more(1) -- view files on a CRT
|
less is a program similar to the traditional more(1), but which allows backward movement in the file as well as forward movement. Also, less does not have to read the entire input file before starting... |
mset(1) -- retrieve ASCII to IBM 3270 keyboard map
|
Mset retrieves mapping information for the ASCII keyboard to IBM 3270 terminal special functions. Normally, these mappings are found in /usr/share/misc/map3270 (see map3270(5)). This information is us... |
msgs(1) -- system messages and junk mail program
|
msgs is used to read system messages. These messages are sent by mailing to the login ``msgs'' and should be short pieces of information which are suitable to be read once by most users of the syste... |
mt(1) -- magnetic tape and removable media manipulating program
|
The mt utility sends commands to a magnetic tape drive. By default, mt performs the requested operation once. Operations may be performed multiple times by specifying count. Note that device must refe... |
mv(1) -- move files
|
In its first form, the mv utility renames the file named by the source operand to the destination path named by the target operand. This form is assumed when the last operand does not name an already ... |
nawk(1) -- pattern-directed scanning and processing language
|
awk scans each input file for lines that match any of a set of patterns specified literally in prog or in one or more files specified as -f progfile. With each pattern there can be an associated actio... |
nc(1) -- arbitrary TCP and UDP connections and listens
|
The nc (or netcat) utility is used for just about anything under the sun involving TCP or UDP. It can open TCP connections, send UDP packets, listen on arbitrary TCP and UDP ports, do port scanning, a... |
neqn(1) -- format equations for troff
|
This manual page describes the GNU version of eqn, which is part of the groff document formatting system. eqn compiles descriptions of equations embedded within troff input files into commands that ar... |
netstat(1) -- show network status
|
The netstat command symbolically displays the contents of various network-related data structures. There are a number of output formats, depending on the options for the information presented. The fir... |
nfsstat(1) -- display NFS statistics
|
nfsstat displays statistics kept about NFS client and server activity. If neither -M nor -N option was specified statics will be obtained from the running system by calling sysctl(3) routine. Otherwis... |
nice(1) -- execute a utility with an altered scheduling priority
|
nice runs utility at an altered scheduling priority. If an increment is given, it is used; otherwise an increment of 10 is assumed. The superuser can run utilities with priorities higher than normal b... |
nm(1) -- display name list (symbol table)
|
The symbol table (name list) of each object in file(s) is displayed. If a library (archive) is given, nm displays a list for each object archive member. If file is not present, nm searches for the fil... |
nohup(1) -- invoke a command immune to hangups
|
The nohup utility invokes command with its arguments and at this time sets the signal SIGHUP to be ignored. If the standard output is a terminal, the standard output is appended to the file nohup.out ... |
nroff(1) -- emulate nroff command with groff
|
The nroff script emulates the nroff command using groff. The -T option with an argument other than ascii and latin1 will be ignored. The -h option is equivalent to the grotty -h option. The -i, -n, -m... |
objcopy(1) -- copy and translate object files
|
The GNU `objcopy' utility copies the contents of an object file to another. `objcopy' uses the GNU BFD Library to read and write the object files. It can write the destination object file in a forma... |
objdump(1) -- display information from object files.
|
objdump displays information about one or more object files. The options control what particular information to display. This information is mostly useful to programmers who are working on the compila... |
od(1) -- octal, decimal, hex, ascii dump
|
od has been deprecated in favor of hexdump(1). hexdump(1), if called as od, provides compatibility for the options described below. It does not provide compatibility for the -s option (see strings(1))... |
oldrdist(1) -- remote file distribution program
|
oldrdist is a program to maintain identical copies of files over multiple hosts. It preserves the owner, group, mode, and mtime of files if possible and can update programs that are executing. oldrdis... |
olf2elf(1) -- convert between ELF and OLF object module format
|
The elf2olf utility reads the specified ELF version 1 module operands and converts them to the default operating system's OLF object module format. The olf2elf utility reverses the process. The modul... |
openssl(1) -- OpenSSL command line tool
|
OpenSSL is a cryptography toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) network protocols and related cryptography standards required by them. The ope... |
otp-md4(1) -- respond to an OTP challenge
|
S/Key is a procedure for using one-time passwords to authenticate access to computer systems. It uses 64 bits of information transformed by the MD4, MD5, SHA1, or RIPEMD-160 algorithms. The user suppl... |
otp-md5(1) -- respond to an OTP challenge
|
S/Key is a procedure for using one-time passwords to authenticate access to computer systems. It uses 64 bits of information transformed by the MD4, MD5, SHA1, or RIPEMD-160 algorithms. The user suppl... |
otp-rmd160(1) -- respond to an OTP challenge
|
S/Key is a procedure for using one-time passwords to authenticate access to computer systems. It uses 64 bits of information transformed by the MD4, MD5, SHA1, or RIPEMD-160 algorithms. The user suppl... |
otp-sha1(1) -- respond to an OTP challenge
|
S/Key is a procedure for using one-time passwords to authenticate access to computer systems. It uses 64 bits of information transformed by the MD4, MD5, SHA1, or RIPEMD-160 algorithms. The user suppl... |
page(1) -- view files on a CRT
|
less is a program similar to the traditional more(1), but which allows backward movement in the file as well as forward movement. Also, less does not have to read the entire input file before starting... |
pagesize(1) -- print system page size
|
pagesize prints the size of a page of memory in bytes, as returned by getpagesize(3). This program is useful in constructing portable shell scripts. |
pagsh(1) -- execute a command without authentication
|
Starts a new subprocess that is detached from any Kerberos ticket cache and AFS tokens. Without command a new shell is started. |
passwd(1) -- modify a user's password
|
passwd changes the user's local, Kerberos, or YP password. First, the user is prompted for their current password. If the current password is correctly typed, a new password is requested. The new pas... |
paste(1) -- merge corresponding or subsequent lines of files
|
The paste utility concatenates the corresponding lines of the given input files, replacing all but the last file's newline characters with a single tab character, and writes the resulting lines to st... |
patch(1) -- apply a diff file to an original
|
patch will take a patch file containing any of the four forms of difference listing produced by the diff(1) program and apply those differences to an original file, producing a patched version. If pat... |
pax(1) -- read and write file archives and copy directory hierarchies
|
pax will read, write, and list the members of an archive file, and will copy directory hierarchies. pax operation is independent of the specific archive format, and supports a wide variety of differen... |
i386/pctr(1) -- display CPU performance counters
|
The pctr program is a sample implementation of how to access the pctr(4) pseudo device available on many i386 compatible machines. By default, the pctr command displays the current values of the TSC a... |
perl(1) -- Practical Extraction and Report Language
|
Perl is a language optimized for scanning arbitrary text files, extracting information from those text files, and printing reports based on that information. It's also a good language for many system... |
perl5004delta(1) -- what's new for perl5.004
|
This document describes differences between the 5.003 release (as documented in Programming Perl, second edition--the Camel Book) and this one. |
perl5005delta(1) -- what's new for perl5.005
|
This document describes differences between the 5.004 release and this one. |
perl561delta(1) -- what's new for perl v5.6.x
|
This document describes differences between the 5.005 release and the 5.6.1 release. |
perl56delta(1) -- what's new for perl v5.6.0
|
This document describes differences between the 5.005 release and the 5.6.0 release. |
perl570delta(1) -- what's new for perl v5.7.0
|
This document describes differences between the 5.6.0 release and the 5.7.0 release. |
perl571delta(1) -- what's new for perl v5.7.1
|
This document describes differences between the 5.7.0 release and the 5.7.1 release. (To view the differences between the 5.6.0 release and the 5.7.0 release, see perl570delta.) |
perl572delta(1) -- what's new for perl v5.7.2
|
This document describes differences between the 5.7.1 release and the 5.7.2 release. (To view the differences between the 5.6.0 release and the 5.7.0 release, see perl570delta. To view the differences... |
perl573delta(1) -- what's new for perl v5.7.3
|
This document describes differences between the 5.7.2 release and the 5.7.3 release. (To view the differences between the 5.6.0 release and the 5.7.0 release, see perl570delta. To view the differences... |
perl581delta(1) -- what is new for perl v5.8.1
|
This document describes differences between the 5.8.0 release and the 5.8.1 release. If you are upgrading from an earlier release such as 5.6.1, first read the perl58delta, which describes differences... |
perl582delta(1) -- what is new for perl v5.8.2
|
This document describes differences between the 5.8.1 release and the 5.8.2 release. If you are upgrading from an earlier release such as 5.6.1, first read the perl58delta, which describes differences... |
perl583delta(1) -- what is new for perl v5.8.3
|
This document describes differences between the 5.8.2 release and the 5.8.3 release. If you are upgrading from an earlier release such as 5.6.1, first read the perl58delta, which describes differences... |
perl584delta(1) -- what is new for perl v5.8.4
|
This document describes differences between the 5.8.3 release and the 5.8.4 release. |
perl585delta(1) -- what is new for perl v5.8.5
|
This document describes differences between the 5.8.4 release and the 5.8.5 release. |
perl58delta(1) -- what is new for perl v5.8.0
|
This document describes differences between the 5.6.0 release and the 5.8.0 release. Many of the bug fixes in 5.8.0 were already seen in the 5.6.1 maintenance release since the two releases were kept ... |
perlapi(1) -- autogenerated documentation for the perl public API
|
This file contains the documentation of the perl public API generated by embed.pl, specifically a listing of functions, macros, flags, and variables that may be used by extension writers. The interfac... |
perlapio(1) -- perl's IO abstraction interface.
|
Perl's source code, and extensions that want maximum portability, should use the above functions instead of those defined in ANSI C's stdio.h. The perl headers (in particular "perlio.h") will "#d... |
perlartistic(1) -- the Perl Artistic License
|
This is "The Artistic License". It's here so that modules, programs, etc., that want to declare this as their distribution license, can link to it. It is also one of the two licenses Perl allows it... |
perlbook(1) -- Perl book information
|
The Camel Book, officially known as Programming Perl, Third Edition, by Larry Wall et al, is the definitive reference work covering nearly all of Perl. You can order it and other Perl books from O'Re... |
perlboot(1) -- Beginner's Object-Oriented Tutorial
|
If you're not familiar with objects from other languages, some of the other Perl object documentation may be a little daunting, such as perlobj, a basic reference in using objects, and perltoot, whic... |
perlbot(1) -- Bag'o Object Tricks (the BOT)
|
The following collection of tricks and hints is intended to whet curious appetites about such things as the use of instance variables and the mechanics of object and class relationships. The reader is... |
perlbug(1) -- how to submit bug reports on Perl
|
A program to help generate bug reports about perl or the modules that come with it, and mail them. If you have found a bug with a non-standard port (one that was not part of the standard distribution)... |
perlcall(1) -- Perl calling conventions from C
|
The purpose of this document is to show you how to call Perl subroutines directly from C, i.e., how to write call- backs. Apart from discussing the C interface provided by Perl for writing callbacks t... |
perlcc(1) -- generate executables from Perl programs
|
perlcc creates standalone executables from Perl programs, using the code generators provided by the B module. At present, you may either create executable Perl bytecode, using the "-B" option, or ge... |
perlcheat(1) -- Perl 5 Cheat Sheet
|
This 'cheat sheet' is a handy reference, meant for beginning Perl programmers. Not everything is mentioned, but 194 features may already be overwhelming. The sheet    [Toc]    [Back] CONTEXTS SIGILS... |
perlclib(1) -- Internal replacements for standard C library functions
|
One thing Perl porters should note is that perl doesn't tend to use that much of the C standard library internally; you'll see very little use of, for example, the ctype.h functions in there. This i... |
perlcn(1) -- 1/4oIaODIA Perl O,AI
|
>>9|O-A'u1/2 Perl uAIiuO! 'O 5.8.0 oaecaE1/4, Perl 3/4B+-,AEIeEAEuA Unicode (I3O>>Ae) OSO(R), O2A~'oOSO(R)AEDi9|aA-9|iOiIuOOIauA+-aAe.1/2E1/2; CJK (ODEOo<<) +-aECAEaODuAO>>2c.Y. Unicode EC1u1/4EDOu... |
perlcompile(1) -- Introduction to the Perl Compiler-Translator
|
Perl has always had a compiler: your source is compiled into an internal form (a parse tree) which is then optimized before being run. Since version 5.005, Perl has shipped with a module capable of in... |
perldata(1) -- Perl data types
|
Variable names Perl has three built-in data types: scalars, arrays of scalars, and associative arrays of scalars, known as "hashes". A scalar is a single string (of any size, limited only by the ava... |
perldbmfilter(1) -- Perl DBM Filters
|
The four "filter_*" methods shown above are available in all the DBM modules that ship with Perl, namely DB_File, GDBM_File, NDBM_File, ODBM_File and SDBM_File. Each of the methods work identically,... |
perldebguts(1) -- Guts of Perl debugging
|
This is not the perldebug(1) manpage, which tells you how to use the debugger. This manpage describes low-level details concerning the debugger's internals, which range from difficult to impossible t... |
perldebtut(1) -- Perl debugging tutorial
|
A (very) lightweight introduction in the use of the perl debugger, and a pointer to existing, deeper sources of information on the subject of debugging perl programs. There's an extraordinary number ... |
perldebug(1) -- Perl debugging
|
First of all, have you tried using the -w switch? If you're new to the Perl debugger, you may prefer to read perldebtut, which is a tutorial introduction to the debugger . |
perldiag(1) -- various Perl diagnostics
|
These messages are classified as follows (listed in increasing order of desperation): (W) A warning (optional). (D) A deprecation (optional). (S) A severe warning (default). (F) A fatal error (trappab... |
perldoc(1) -- Look up Perl documentation in Pod format.
|
perldoc looks up a piece of documentation in .pod format that is embedded in the perl installation tree or in a perl script, and displays it via "pod2man | nroff -man | $PAGER". (In addition, if run... |
perldsc(1) -- Perl Data Structures Cookbook
|
The single feature most sorely lacking in the Perl programming language prior to its 5.0 release was complex data structures. Even without direct language support, some valiant programmers did manage ... |
perlembed(1) -- how to embed perl in your C program
|
PREAMBLE Do you want to: Use C from Perl? Read perlxstut, perlxs, h2xs, perlguts, and perlapi. Use a Unix program from Perl? Read about back-quotes and about "system" and "exec" in perlfunc. Use P... |
perlfaq(1) -- frequently asked questions about Perl ($Date: 2003/12/03 03:02:44 $)
|
The perlfaq is divided into several documents based on topics. A table of contents is at the end of this document. Where to get the perlfaq    [Toc]    [Back] Extracts of the perlfaq are posted regula... |
perlfaq1(1) -- General Questions About Perl ($Revision: 1.7 $, $Date: 2004/04/07 21:33:08 $)
|
This section of the FAQ answers very general, high-level questions about Perl. What is Perl? Perl is a high-level programming language with an eclectic heritage written by Larry Wall and a cast of tho... |
perlfaq2(1) -- Obtaining and Learning about Perl ($Revision: 1.7 $, $Date: 2004/04/07 21:33:08 $)
|
This section of the FAQ answers questions about where to find source and documentation for Perl, support, and related matters. What machines support Perl? Where do I get it? The standard release of Pe... |
perlfaq3(1) -- Programming Tools ($Revision: 1.7 $, $Date: 2004/04/07 21:33:08 $)
|
This section of the FAQ answers questions related to programmer tools and programming support. How do I do (anything)? Have you looked at CPAN (see perlfaq2)? The chances are that someone has already ... |
perlfaq4(1) -- Data Manipulation ($Revision: 1.7 $, $Date: 2004/04/07 21:33:08 $)
|
This section of the FAQ answers questions related to manipulating numbers, dates, strings, arrays, hashes, and miscellaneous data issues. Data: Numbers Why am I getting long decimals (eg, 19.949999999... |
perlfaq5(1) -- Files and Formats ($Revision: 1.8 $, $Date: 2004/08/09 18:10:15 $)
|
This section deals with I/O and the "f" issues: filehandles, flushing, formats, and footers. How do I flush/unbuffer an output filehandle? Why must I do this? Perl does not support truly unbuffered ... |
perlfaq6(1) -- Regular Expressions ($Revision: 1.6 $, $Date: 2003/12/03 03:02:44 $)
|
This section is surprisingly small because the rest of the FAQ is littered with answers involving regular expressions. For example, decoding a URL and checking whether something is a number are handle... |
perlfaq7(1) -- General Perl Language Issues ($Revision: 1.6 $, $Date: 2003/12/03 03:02:45 $)
|
This section deals with general Perl language issues that don't clearly fit into any of the other sections. Can I get a BNF/yacc/RE for the Perl language? There is no BNF, but you can paw your way th... |
perlfaq8(1) -- System Interaction ($Revision: 1.7 $, $Date: 2004/08/09 18:10:15 $)
|
This section of the Perl FAQ covers questions involving operating system interaction. Topics include interprocess communication (IPC), control over the user-interface (keyboard, screen and pointing de... |
perlfaq9(1) -- Networking ($Revision: 1.6 $, $Date: 2003/12/03 03:02:45 $)
|
This section deals with questions related to networking, the internet, and a few on the web. What is the correct form of response from a CGI script? (Alan Flavell answers... |
perlfilter(1) -- Source Filters
|
This article is about a little-known feature of Perl called source filters. Source filters alter the program text of a module before Perl sees it, much as a C preprocessor alters the source text of a ... |
perlfork(1) -- Perl's fork() emulation
|
The fork() emulation is implemented at the level of the Perl interpreter. What this means in general is that running fork() will actually clone the running interpreter and all its state, and run the c... |
perlform(1) -- Perl formats
|
Perl has a mechanism to help you generate simple reports and charts. To facilitate this, Perl helps you code up your output page close to how it will look when it's printed. It can keep track of thin... |
perlfunc(1) -- Perl builtin functions
|
The functions in this section can serve as terms in an expression. They fall into two major categories: list operators and named unary operators. These differ in their precedence relationship with a f... |
perlgpl(1) -- the GNU General Public License, version 2
|
This is "The GNU General Public License, version 2". It's here so that modules, programs, etc., that want to declare this as their distribution license, can link to it. It is also one of the two li... |
perlguts(1) -- Introduction to the Perl API
|
This document attempts to describe how to use the Perl API, as well as to provide some info on the basic workings of the Perl core. It is far from complete and probably contains many errors. Please re... |
perlhack(1) -- How to hack at the Perl internals
|
This document attempts to explain how Perl development takes place, and ends with some suggestions for people wanting to become bona fide porters. The perl5-porters mailing list is where the Perl stan... |
perlhist(1) -- the Perl history records
|
This document aims to record the Perl source code releases. |
perlintern(1) -- autogenerated documentation of purely inter- nal Perl functions
|
This file is the autogenerated documentation of functions in the Perl interpreter that are documented using Perl's internal documentation format but are not marked as part of the Perl API. In other w... |
perlintro(1) -- a brief introduction and overview of Perl
|
This document is intended to give you a quick overview of the Perl programming language, along with pointers to further documentation. It is intended as a "bootstrap" guide for those who are new to ... |
perliol(1) -- C API for Perl's implementation of IO in Layers.
|
This document describes the behavior and implementation of the PerlIO abstraction described in perlapio when "USE_PERLIO" is defined (and "USE_SFIO" is not). History and Background    [Toc]    [Ba... |
perlipc(1) -- Perl interprocess communication (signals, fifos, pipes, safe subprocesses, sockets, and semaphores)
|
The basic IPC facilities of Perl are built out of the good old Unix signals, named pipes, pipe opens, the Berkeley socket routines, and SysV IPC calls. Each is used in slightly different situations. |
perlivp(1) -- Perl Installation Verification Procedure
|
The perlivp program is set up at Perl source code build time to test the Perl version it was built under. It can be used after running: make install (or your platform's equivalent procedure) to verif... |
perljp(1) -- AEuEU,i Perl Y~YxYE `A^a`I`A Perl xIAx3|xOxex|x3x1/2! Perl 5.8.0 xexeicUni- _ codeYuYYi1/4YEx~AcEyxE...
|
|
perlko(1) -- Perlou CN+-13/4i AIAUuu DESCRIPTION _ PerlAC 1/41/4oeci cA1/2A oIA>> E cuCO'I'U ! _ PerlAo 5.8.0AECo...
|
|
perllexwarn(1) -- Perl Lexical Warnings
|
The "use warnings" pragma is a replacement for both the command line flag -w and the equivalent Perl variable, $^W. The pragma works just like the existing "strict" pragma. This means that the sco... |
perllocale(1) -- Perl locale handling (internationalization and localization)
|
Perl supports language-specific notions of data such as "is this a letter", "what is the uppercase equivalent of this letter", and "which of these letters comes first". These are important issue... |
perllol(1) -- Manipulating Arrays of Arrays in Perl
|
Declaration and Access of Arrays of Arrays The simplest thing to build is an array of arrays (sometimes imprecisely called a list of lists). It's reasonably easy to understand, and almost everything ... |
perlmod(1) -- Perl modules (packages and symbol tables)
|
Packages Perl provides a mechanism for alternative namespaces to protect packages from stomping on each other's variables. In fact, there's really no such thing as a global variable in Perl. The pac... |
perlmodinstall(1) -- Installing CPAN Modules
|
You can think of a module as the fundamental unit of reusable Perl code; see perlmod for details. Whenever anyone creates a chunk of Perl code that they think will be useful to the world, they registe... |
perlmodlib(1) -- constructing new Perl modules and finding existing ones
|
|
perlmodstyle(1) -- Perl module style guide
|
|
perlnewmod(1) -- preparing a new module for distribution
|
This document gives you some suggestions about how to go about writing Perl modules, preparing them for distribution, and making them available via CPAN. One of the things that makes Perl really power... |
perlnumber(1) -- semantics of numbers and numeric operations in Perl
|
This document describes how Perl internally handles numeric values. Perl's operator overloading facility is completely ignored here. Operator overloading allows user-defined behaviors for numbers, su... |
perlobj(1) -- Perl objects
|
First you need to understand what references are in Perl. See perlref for that. Second, if you still find the following reference work too complicated, a tutorial on object-oriented programming in Per... |
perlop(1) -- Perl operators and precedence
|
Operator Precedence and Associativity Operator precedence and associativity work in Perl more or less like they do in mathematics. Operator precedence means some operators are evaluated before others.... |
perlopentut(1) -- tutorial on opening things in Perl
|
Perl has two simple, built-in ways to open files: the shell way for convenience, and the C way for precision. The shell way also has 2- and 3-argument forms, which have different semantics for handlin... |
perlothrtut(1) -- old tutorial on threads in Perl
|
WARNING: This tutorial describes the old-style thread model that was introduced in release 5.005. This model is now deprecated, and will be removed, probably in version 5.10. The interfaces described ... |
perlpacktut(1) -- tutorial on "pack" and "unpack"
|
"pack" and "unpack" are two functions for transforming data according to a user-defined template, between the guarded way Perl stores values and some well-defined representation as might be requir... |
perlpod(1) -- the Plain Old Documentation format
|
Pod is a simple-to-use markup language used for writing documentation for Perl, Perl programs, and Perl modules. Translators are available for converting Pod to various formats like plain text, HTML, ... |
perlpodspec(1) -- Plain Old Documentation: format specification and notes
|
This document is detailed notes on the Pod markup language. Most people will only have to read perlpod to know how to write in Pod, but this document may answer some incidental questions to do with pa... |
perlport(1) -- Writing portable Perl
|
Perl runs on numerous operating systems. While most of them share much in common, they also have their own unique features. This document is meant to help you to find out what constitutes portable Per... |
perlre(1) -- Perl regular expressions
|
This page describes the syntax of regular expressions in Perl. If you haven't used regular expressions before, a quickstart introduction is available in perlrequick, and a longer tutorial introductio... |
perlref(1) -- Perl references and nested data structures
|
Before release 5 of Perl it was difficult to represent complex data structures, because all references had to be symbolic--and even then it was difficult to refer to a variable instead of a symbol tab... |
perlreftut(1) -- Mark's very short tutorial about references
|
One of the most important new features in Perl 5 was the capability to manage complicated data structures like multidimensional arrays and nested hashes. To enable these, Perl 5 introduced a feature c... |
perlrequick(1) -- Perl regular expressions quick start
|
This page covers the very basics of understanding, creating and using regular expressions ('regexes') in Perl. |
perlreref(1) -- Perl Regular Expressions Reference
|
This is a quick reference to Perl's regular expressions. For full information see perlre and perlop, as well as the "SEE ALSO" section in this document. OPERATORSÂ Â Â Â [Toc]Â Â Â Â [Back] =~ determines t... |
perlretut(1) -- Perl regular expressions tutorial
|
This page provides a basic tutorial on understanding, creating and using regular expressions in Perl. It serves as a complement to the reference page on regular expressions perlre. Regular expressions... |
perlrun(1) -- how to execute the Perl interpreter
|
The normal way to run a Perl program is by making it directly executable, or else by passing the name of the source file as an argument on the command line. (An interactive Perl environment is also po... |
perlsec(1) -- Perl security
|
Perl is designed to make it easy to program securely even when running with extra privileges, like setuid or setgid programs. Unlike most command line shells, which are based on multiple substitution ... |
perlstyle(1) -- Perl style guide
|
Each programmer will, of course, have his or her own preferences in regards to formatting, but there are some general guidelines that will make your programs easier to read, understand, and maintain. ... |
perlsub(1) -- Perl subroutines
|
Like many languages, Perl provides for user-defined subroutines. These may be located anywhere in the main program, loaded in from other files via the "do", "require", or "use" keywords, or gene... |
perlsyn(1) -- Perl syntax
|
A Perl program consists of a sequence of declarations and statements which run from the top to the bottom. Loops, subroutines and other control structures allow you to jump around within the code. Per... |
perlthrtut(1) -- tutorial on threads in Perl
|
NOTE: this tutorial describes the new Perl threading flavour introduced in Perl 5.6.0 called interpreter threads, or ithreads for short. In this model each thread runs in its own Perl interpreter, and... |
perltie(1) -- how to hide an object class in a simple variable
|
Prior to release 5.0 of Perl, a programmer could use dbmopen() to connect an on-disk database in the standard Unix dbm(3x) format magically to a %HASH in their program. However, their Perl was either ... |
perltoc(1) -- perl documentation table of contents
|
This page provides a brief table of contents for the rest of the Perl documentation set. It is meant to be scanned quickly or grepped through to locate the proper section you're looking for. |
perltodo(1) -- Perl TO-DO List
|
This is a list of wishes for Perl. Send updates to perl5-porters@perl.org. If you want to work on any of these projects, be sure to check the perl5-porters archives for past ideas, flames, and propaga... |
perltooc(1) -- Tom's OO Tutorial for Class Data in Perl
|
When designing an object class, you are sometimes faced with the situation of wanting common state shared by all objects of that class. Such class attributes act somewhat like global variables for the... |
perltoot(1) -- Tom's object-oriented tutorial for perl
|
Object-oriented programming is a big seller these days. Some managers would rather have objects than sliced bread. Why is that? What's so special about an object? Just what is an object anyway? An ob... |
perltrap(1) -- Perl traps for the unwary
|
The biggest trap of all is forgetting to "use warnings" or use the -w switch; see perllexwarn and perlrun. The second biggest trap is not making your entire program runnable under "use strict". Th... |
perltw(1) -- YcAexxxa Perl <
|
Awai"O"i Perl aoxN|a! +-q 5.8.0 a(C)9|}(C)l, Perl "a3AExFS1u1/2ao Unicode (,Uoe1/2X) xa'(C), x]3s+-axa'(C)xF3h(C)OxB>>y"tYHY~ao1/2s1/2Xxe|i; CJK (xxxeAu) <>U(C)... |
perlunicode(1) -- Unicode support in Perl
|
Important Caveats Unicode support is an extensive requirement. While Perl does not implement the Unicode standard or the accompanying technical reports from cover to cover, Perl does support many Unic... |
perluniintro(1) -- Perl Unicode introduction
|
This document gives a general idea of Unicode and how to use Unicode in Perl. Unicode    [Toc]    [Back] Unicode is a character set standard which plans to codify all of the writing systems of the wor... |
perlutil(1) -- utilities packaged with the Perl distribution
|
Along with the Perl interpreter itself, the Perl distribution installs a range of utilities on your system. There are also several utilities which are used by the Perl distribution itself as part of t... |
perlvar(1) -- Perl predefined variables
|
Predefined Names The following names have special meaning to Perl. Most punctuation names have reasonable mnemonics, or analogs in the shells. Nevertheless, if you wish to use long variable names, you... |
perlxs(1) -- XS language reference manual
|
Introduction XS is an interface description file format used to create an extension interface between Perl and C code (or a C library) which one wishes to use with Perl. The XS interface is combined w... |
perlxstut(1) -- Tutorial for writing XSUBs
|
This tutorial will educate the reader on the steps involved in creating a Perl extension. The reader is assumed to have access to perlguts, perlapi and perlxs. This tutorial starts with very simple ex... |
pfbtops(1) -- translate a PostScript font in .pfb format to ASCII
|
pfbtops translates a PostScript font in .pfb format to ASCII. If pfb_file is omitted the pfb file will be read from the standard input. The ASCII format PostScript font will be written on the standard... |
pgrep(1) -- find or signal processes by name
|
The pgrep command searches the process table on the running system and prints the process IDs of all processes that match the criteria given on the command line. The pkill command searches the process... |
pic(1) -- compile pictures for troff or TeX
|
This manual page describes the GNU version of pic, which is part of the groff document formatting system. pic compiles descriptions of pictures embedded within troff or TeX input files into commands t... |
piconv(1) -- iconv(1), reinvented in perl
|
piconv is perl version of iconv, a character encoding converter widely available for various Unixen today. This script was primarily a technology demonstrator for Perl 5.8.0, but you can use piconv in... |
pkg(1) -- replacement-to-be of pkg_* tools
|
pkg is meant to be a replacement of the old pkg_* tools. For the time being, it should only be invoked internally by pkg_add(1), to handle dependencies. |
pkg_add(1) -- install software package distributions
|
The pkg_add command is used to install packages created with the pkg_create(1) command. Selected packages containing precompiled applications from the /usr/ports tree can be found on the OpenBSD FTP s... |
pkg_create(1) -- create binary software package for distribution
|
The pkg_create command creates a binary package named pkg-name, for subsequent use with pkg_add(1), pkg_delete(1) and pkg_info(1). pkg-name will traditionally have a .tgz extension, to denote the unde... |
pkg_delete(1) -- a utility for deleting previously installed software package distributions
|
The pkg_delete command is used to delete packages that have been previously installed with the pkg_add(1) command. Package names may be specified either as the package name itself, or as a filename wh... |
pkg_info(1) -- a utility for displaying information on software packages
|
The pkg_info command is used to dump out information for packages, as created by pkg_create(1), which may be still packed up or already installed on the system with the pkg_add(1) command. The pkg-nam... |
pkill(1) -- find or signal processes by name
|
The pgrep command searches the process table on the running system and prints the process IDs of all processes that match the criteria given on the command line. The pkill command searches the process... |
pl2pm(1) -- Rough tool to translate Perl4 .pl files to Perl5 .pm modules.
|
pl2pm is a tool to aid in the conversion of Perl4-style .pl library files to Perl5-style library modules. Usually, your old .pl file will still work fine and you should only use this tool if you plan ... |
pmdb(1) -- debugger
|
The pmdb utility can be used to see what is happening inside a running process or to catch program crashes and examine the state at the time of the crash. The only way to start pmdb at this moment is ... |
pod2html(1) -- convert .pod files to .html files
|
Converts files from pod format (see perlpod) to HTML format. |
pod2latex(1) -- convert pod documentation to latex format
|
"pod2latex" is a program to convert POD format documentation (perlpod) into latex. It can process multiple input documents at a time and either generate a latex file per input document or a single c... |
pod2man(1) -- Convert POD data to formatted *roff input
|
pod2man is a front-end for Pod::Man, using it to generate *roff input from POD source. The resulting *roff code is suitable for display on a terminal using nroff(1), normally via man(1), or printing u... |
pod2text(1) -- Convert POD data to formatted ASCII text
|
pod2text is a front-end for Pod::Text and its subclasses. It uses them to generate formatted ASCII text from POD source. It can optionally use either termcap sequences or ANSI color escape sequences t... |
pod2usage(1) -- print usage messages from embedded pod docs in files
|
pod2usage will read the given input file looking for pod documentation and will print the corresponding usage message. If no input file is specified then standard input is read. pod2usage invokes the ... |
podchecker(1) -- check the syntax of POD format documentation files
|
podchecker will read the given input files looking for POD syntax errors in the POD documentation and will print any errors it find to STDERR. At the end, it will print a status message indicating the... |
podselect(1) -- print selected sections of pod documentation on standard output
|
podselect will read the given input files looking for pod documentation and will print out (in raw pod format) all sections that match one ore more of the given section specifications. If no section s... |
popd(1) -- a shell (command interpreter) with C-like syntax
|
csh is a command language interpreter incorporating a history mechanism (see History substitutions), job control facilities (see Jobs), interactive file name and user name completion (see File name co... |
pr(1) -- print files
|
The pr utility is a printing and pagination filter for text files. When multiple input files are specified, each is read, formatted, and written to standard output. By default, the input is separated ... |
praliases(1) -- display system mail aliases
|
The praliases utility displays the current system aliases, one per line, in no particular order. The special internal @:@ alias will be displayed if present. The options are as follows: -C Read the sp... |
printenv(1) -- print out the environment
|
printenv prints out the names and values of the variables in the environment, with one name/value pair per line. If name is specified, only its value is printed. If a name is specified and it is not d... |
printf(1) -- formatted output
|
printf formats and prints its arguments, after the first, under control of the format. The format is a character string which contains three types of objects: plain characters, which are simply copied... |
procmap(1) -- display process memory map
|
The procmap utility lists the virtual memory mappings underlying the given process. The start address of each entry is always given, and, depending on the options given, other information such as the ... |
protoize(1) -- automatically add or remove function prototypes
|
protoize is an optional part of GNU C. You can use it to add prototypes to a program, thus converting the program to ANSI C in one respect. The companion program unprotoize does the reverse: it remove... |
prove(1) -- A command-line tool for running tests against Test::Harness
|
|
ps(1) -- process status
|
The ps utility displays information about active processes. When given no options, ps prints information about processes associated with the controlling terminal. The information displayed is selected... |
psbb(1) -- extract bounding box from PostScript document
|
psbb reads file which should be a PostScript document conforming to the Document Structuring conventions and looks for a %%BoundingBox comment. If it finds one, it prints a line llx lly urx ury on the... |
psed(1) -- a stream editor
|
A stream editor reads the input stream consisting of the specified files (or standard input, if none are given), processes is line by line by applying a script consisting of edit commands, and writes ... |
pstruct(1) -- Dump C structures as generated from "cc -g
|
The following is the old c2ph.doc documentation by Tom Christiansen Date: 25 Jul 91 08:10:21 GMT Once upon a time, I wrote a program called pstruct. It was a perl program that tried... |
pts(1) -- Manage AFS protection database
|
The pts utility is used to manipulate the contents of the AFS Protection Database, which contains information about users and groups in AFS. Note that the pts utility does not modify the traditional U... |
purgestat(1) -- an electronic mail transport agent
|
Sendmail sends a message to one or more recipients, routing the message over whatever networks are necessary. Sendmail does internetwork forwarding as necessary to deliver the message to the correct p... |
pushd(1) -- a shell (command interpreter) with C-like syntax
|
csh is a command language interpreter incorporating a history mechanism (see History substitutions), job control facilities (see Jobs), interactive file name and user name completion (see File name co... |
pwd(1) -- return working directory name
|
The pwd utility prints the absolute pathname of the current working directory to the standard output. Both the Bourne shell (sh(1)) and Korn shell (ksh(1)) have their own built-in version of pwd. The ... |
quota(1) -- display disk usage and limits
|
quota displays users' disk usage and limits. By default only the user quotas are printed. The options are as follows: -g Print group quotas for the group of which the user is a member. The optional -... |
radioctl(1) -- control radio tuners
|
The radioctl command displays or sets various variables that affect the radio tuner behavior. If a variable is present on the command line, radioctl prints the current value of this variable for the s... |
ranlib(1) -- generate index to archive.
|
ranlib generates an index to the contents of an archive, and stores it in the archive. The index lists each symbol defined by a member of an archive that is a relocatable object file. You may use `nm ... |
rcp(1) -- remote file copy
|
The rcp utility copies files between machines. Each file or directory argument is either a remote file name of the form ``rname@rhost:path'', or a local file name (containing no `:' characters, or ... |
rcs(1) -- change RCS file attributes
|
rcs creates new RCS files or changes attributes of existing ones. An RCS file contains multiple revisions of text, an access list, a change log, descriptive text, and some control attributes. For rcs ... |
rcs2log(1) -- RCS to ChangeLog generator
|
The rcs2log utility generates a change log prefix from RCS files (perhaps in the CVS repository) and the ChangeLog (if any). The options are as follows: -c changelog Output a change log prefix to chan... |
rcsclean(1) -- clean up working files
|
rcsclean removes files that are not being worked on. rcsclean -u also unlocks and removes files that are being worked on but have not changed. For each file given, rcsclean compares the working file a... |
rcsdiff(1) -- compare RCS revisions
|
rcsdiff runs diff(1) to compare two revisions of each RCS file given. Pathnames matching an RCS suffix denote RCS files; all others denote working files. Names are paired as explained in ci(1). The op... |
rcsfreeze(1) -- freeze a configuration of sources checked in under RCS
|
rcsfreeze assigns a symbolic revision number to a set of RCS files that form a valid configuration. The idea is to run rcsfreeze each time a new version is checked in. A unique symbolic name (C_number... |
rcsintro(1) -- introduction to RCS commands
|
The Revision Control System (RCS) manages multiple revisions of files. RCS automates the storing, retrieval, logging, identification, and merging of revisions. RCS is useful for text that is revised f... |
rcsmerge(1) -- merge RCS revisions
|
rcsmerge incorporates the changes between two revisions of an RCS file into the corresponding working file. Pathnames matching an RCS suffix denote RCS files; all others denote working files. Names ar... |
rdist(1) -- remote file distribution client program
|
rdist is a program to maintain identical copies of files over multiple hosts. It preserves the owner, group, mode, and mtime of files if possible and can update programs that are executing. rdist read... |
rdistd(1) -- remote file distribution server program
|
rdistd is the server program for the rdist(1) command. It is normally run by rdist via rsh(1) or ssh(1). The options are as follows: -D Enable debugging messages. Messages are logged via syslog(3). -S... |
readlink(1) -- display target of symbolic link on standard output
|
The readlink utility when invoked with the pathname of a symbolic link as its argument dereferences the symbolic link and prints the name of target on standard output. If readlink is invoked with an a... |
refer(1) -- preprocess bibliographic references for groff
|
This file documents the GNU version of refer, which is part of the groff document formatting system. refer copies the contents of filename... to the standard output, except that lines between .[ and .... |
rehash(1) -- a shell (command interpreter) with C-like syntax
|
csh is a command language interpreter incorporating a history mechanism (see History substitutions), job control facilities (see Jobs), interactive file name and user name completion (see File name co... |
repeat(1) -- a shell (command interpreter) with C-like syntax
|
csh is a command language interpreter incorporating a history mechanism (see History substitutions), job control facilities (see Jobs), interactive file name and user name completion (see File name co... |
reset(1) -- terminal initialization
|
tset initializes terminals. tset first determines the type of terminal that you are using. This determination is done as follows, using the first terminal type found: 1. The terminal argument specifie... |
rev(1) -- reverse lines of a file
|
The rev utility copies the specified files to the standard output, reversing the order of characters in every line. If no files are specified, the standard input is read. |
rksh(1) -- public domain Korn shell
|
ksh is a command interpreter intended for both interactive and shell script use. Its command language is a superset of the sh(1) shell language. Shell startup    [Toc]    [Back] The following options ... |
rlog(1) -- print log messages and other information about RCS files
|
rlog prints information about RCS files. Pathnames matching an RCS suffix denote RCS files; all others denote working files. Names are paired as explained in ci(1). rlog prints the following informati... |
rm(1) -- remove directory entries
|
The rm utility attempts to remove the non-directory type files specified on the command line. If the permissions of the file do not permit writing, and the standard input device is a terminal, the use... |
rmd160(1) -- calculate a message-digest fingerprint (checksum) for a file
|
rmd160 takes as input a message of arbitrary length and produces as output a 160-bit "fingerprint" or "message digest" of the input. It is conjectured that it is computationally infeasible to prod... |
rmdir(1) -- remove directories
|
The rmdir utility removes the directory entry specified by each directory argument, provided it is empty. Arguments are processed in the order given. In order to remove both a parent directory and a s... |
rpcgen(1) -- RPC protocol compiler
|
rpcgen is a tool that generates C code to implement an RPC protocol. The input is a language similar to C known as RPC Language (Remote Procedure Call Language). rpcgen is normally used as in the firs... |
rs(1) -- reshape a data array
|
rs reads the standard input, interpreting each line as a row of blankseparated entries in an array, transforms the array according to the options, and writes it on the standard output. With no argumen... |
rsh(1) -- remote shell
|
rsh executes command on hostname. Note: rsh has been deprecated in favor of ssh(1). Use of rsh is discouraged due to the inherent insecurity of host-based authentication. rsh copies its standard input... |
rup(1) -- remote status display
|
rup displays a summary of the current system status of a particular host or all hosts on the local network. The output shows the current time of day, how long the system has been up, and the load aver... |
ruptime(1) -- show host status of local machines
|
ruptime gives a status line like uptime(1) for each machine on the local network; these are formed from packets broadcast by each host on the network once a minute. Machines for which no status report... |
rusers(1) -- who is logged in to machines on local network
|
The rusers command produces output similar to who(1), but for the list of hosts or all machines on the local network. For each host responding to the rusers query, the hostname with the names of the u... |
rwall(1) -- send a message to users logged on a host
|
The rwall command sends a message to the users logged into the specified host. The message to be sent can be typed in and terminated with EOF or it can be in a file. |
rwho(1) -- who is logged in on local machines
|
The rwho command produces output similar to who(1), but for all machines on the local network. If no report has been received from a machine for 11 minutes then rwho assumes the machine is down, and d... |
s2p(1) -- a stream editor
|
A stream editor reads the input stream consisting of the specified files (or standard input, if none are given), processes is line by line by applying a script consisting of edit commands, and writes ... |
scp(1) -- secure copy (remote file copy program)
|
scp copies files between hosts on a network. It uses ssh(1) for data transfer, and uses the same authentication and provides the same security as ssh(1). Unlike rcp(1), scp will ask for passwords or p... |
script(1) -- make typescript of terminal session
|
script makes a typescript of everything printed on your terminal. It is useful for students who need a hardcopy record of an interactive session as proof of an assignment, as the typescript file can b... |
sectok(1) -- communicate with smartcards using iso7816
|
sectok is a command-line-like interface for communicating with smartcards. APDUs can be sent to the card, and results are displayed. Some commands are card-specific, and focus on the Schlumberger Cybe... |
sed(1) -- stream editor
|
The sed utility reads the specified files, or the standard input if no files are specified, modifying the input as specified by a list of commands. The input is then written to the standard output. A ... |
sendbug(1) -- report a bug in OpenBSD
|
sendbug is a tool used to submit problem reports (PRs) to the OpenBSD bugs database. sendbug invokes an editor on a problem report template (after filling in some fields with reasonable default values... |
sftp(1) -- secure file transfer program
|
sftp is an interactive file transfer program, similar to ftp(1), which performs all operations over an encrypted ssh(1) transport. It may also use many features of ssh, such as public key authenticati... |
sh(1) -- public domain Bourne shell
|
sh is a reimplementation of the Bourne shell, a command interpreter for both interactive and script use. Shell startup    [Toc]    [Back] The following options can be specified only on the command lin... |
sha1(1) -- calculate a message-digest fingerprint (checksum) for a file
|
sha1 takes as input a message of arbitrary length and produces as output a 160-bit "fingerprint" or "message digest" of the input. It is conjectured that it is computationally infeasible to produc... |
shar(1) -- create a shell archive of files
|
shar writes an sh(1) shell script to the standard output which will recreate the file hierarchy specified by the command line operands. Directories will be recreated and must be specified before the f... |
size(1) -- display object file segment sizes (text, data and bss)
|
size displays the text, data and bss segment sizes of the specified file(s) in bytes (in decimal), and the sum of the three segments (in decimal and hexadecimal). If a library (archive) is given, size... |
skey(1) -- respond to an OTP challenge
|
S/Key is a procedure for using one-time passwords to authenticate access to computer systems. It uses 64 bits of information transformed by the MD4, MD5, SHA1, or RIPEMD-160 algorithms. The user suppl... |
skeyaudit(1) -- warn users if their S/Key will soon expire
|
skeyaudit searches through the files in /etc/skey for users whose S/Key sequence number is less than limit, and mails them a reminder to run skeyinit(1) soon. The options are as follows: -a Check all ... |
skeyinfo(1) -- obtain the next S/Key challenge for a user
|
skeyinfo prints out the next S/Key challenge for the specified user or for the current user if no user is specified. The options are as follows: -v Print the hash algorithm as well. |
skeyinit(1) -- change password or add user to S/Key authentication system
|
skeyinit initializes the system so you can use S/Key onetime passwords to log in. The program will ask you to enter a secret passphrase which is used by skey(1) to generate one-time passwords; enter a... |
sleep(1) -- suspend execution for an interval of time
|
The sleep utility suspends execution for a minimum of the specified number of seconds. This number must be positive and may contain a decimal fraction. sleep is commonly used to schedule the execution... |
slogin(1) -- OpenSSH SSH client (remote login program)
|
ssh (SSH client) is a program for logging into a remote machine and for executing commands on a remote machine. It is intended to replace rlogin and rsh, and provide secure encrypted communications be... |
soelim(1) -- interpret .so requests in groff input
|
soelim reads files and replaces lines of the form .so file by the contents of file. It is useful if files included with so need to be preprocessed. Normally, soelim should be invoked with the -s optio... |
sort(1) -- sort or merge text files
|
The sort utility sorts text files by lines. Comparisons are based on one or more sort keys extracted from each line of input, and are performed lexicographically. By default, if keys are not given, so... |
source(1) -- a shell (command interpreter) with C-like syntax
|
csh is a command language interpreter incorporating a history mechanism (see History substitutions), job control facilities (see Jobs), interactive file name and user name completion (see File name co... |
spell(1) -- find spelling errors
|
spell collects words from the named documents and looks them up in a spelling list. Words that neither occur among nor are derivable (by applying certain inflections, prefixes or suffixes) from words ... |
splain(1) -- produce verbose warning diagnostics
|
The "diagnostics" Pragma This module extends the terse diagnostics normally emitted by both the perl compiler and the perl interpreter, augmenting them with the more explicative and endearing descri... |
split(1) -- split a file into pieces
|
The split utility reads the given file (or standard input if no file is specified) and breaks it up into files of 1000 lines each. The options are as follows: -b Create smaller files byte_count bytes ... |
ssh(1) -- OpenSSH SSH client (remote login program)
|
ssh (SSH client) is a program for logging into a remote machine and for executing commands on a remote machine. It is intended to replace rlogin and rsh, and provide secure encrypted communications be... |
ssh-add(1) -- adds RSA or DSA identities to the authentication agent
|
ssh-add adds RSA or DSA identities to the authentication agent, ssh-agent(1). When run without arguments, it adds the files $HOME/.ssh/id_rsa, $HOME/.ssh/id_dsa and $HOME/.ssh/identity. Alternative fi... |
ssh-agent(1) -- authentication agent
|
ssh-agent is a program to hold private keys used for public key authentication (RSA, DSA). The idea is that ssh-agent is started in the beginning of an X-session or a login session, and all other wind... |
ssh-keygen(1) -- authentication key generation, management and conversion
|
ssh-keygen generates, manages and converts authentication keys for ssh(1). ssh-keygen can create RSA keys for use by SSH protocol version 1 and RSA or DSA keys for use by SSH protocol version 2. The t... |
ssh-keyscan(1) -- gather ssh public keys
|
ssh-keyscan is a utility for gathering the public ssh host keys of a number of hosts. It was designed to aid in building and verifying ssh_known_hosts files. ssh-keyscan provides a minimal interface s... |
stop(1) -- a shell (command interpreter) with C-like syntax
|
csh is a command language interpreter incorporating a history mechanism (see History substitutions), job control facilities (see Jobs), interactive file name and user name completion (see File name co... |
strings(1) -- print the strings of printable characters in files
|
For each file given, GNU strings prints the printable character sequences that are at least 4 characters long (or the number given with the options below) and are followed by an unprintable character.... |
strip(1) -- Discard symbols from object files.
|
GNU strip discards all symbols from the object files objfile. The list of object files may include archives. At least one object file must be given. strip modifies the files named in its argument, rat... |
stty(1) -- set the options for a terminal device interface
|
The stty utility sets or reports on terminal characteristics for the device that is its standard input. If no options or operands are specified, it reports the settings of a subset of characteristics ... |
su(1) -- substitute user identity
|
su requests the Kerberos password for login (or for ``login.root'', if no login is provided), and switches to that user and group ID after obtaining a Kerberos ticket granting access. A shell is the... |
sum(1) -- display file checksums and block counts
|
The cksum utility writes to the standard output a single line for each input file. The format of this line varies with the algorithm being used as follows: cksum The output line consists of three whit... |
sup(1) -- software upgrade protocol
|
Sup is a program used for upgrading collections of files from other machines to your machine. You execute sup, the client program, which talks over the network using IP/TCP to a file server process. T... |
suspend(1) -- a shell (command interpreter) with C-like syntax
|
csh is a command language interpreter incorporating a history mechanism (see History substitutions), job control facilities (see Jobs), interactive file name and user name completion (see File name co... |
systat(1) -- display system statistics on a CRT
|
systat displays various system statistics in a screen oriented fashion using the curses screen display library, curses(3). While systat is running the screen is usually divided into two windows (an ex... |
systrace(1) -- generate and enforce system call policies
|
The systrace utility monitors and controls an application's access to the system by enforcing access policies for system calls. The systrace utility might be used to trace an untrusted application's... |
tail(1) -- display the last part of a file
|
The tail utility displays the contents of file or, by default, its standard input, to the standard output. The display begins at a byte, line, or 512-byte block location in the input. Numbers having a... |
talk(1) -- talk to another user
|
talk is a visual communication program which copies lines from your terminal to that of another user. The command arguments are as follows: -H Don't escape characters with the high bit set. This may ... |
tar(1) -- tape archiver
|
The tar command creates, adds files to, or extracts files from an archive file in ``tar'' format. A tar archive is often stored on a magnetic tape, but can be stored equally well on a floppy, CD-ROM... |
tbl(1) -- format tables for troff
|
tbl is a preprocessor for troff which is used to format tables. These tables are composed from columns that can be independently justified, headings may be placed over single columns or groups of colu... |
tcopy(1) -- copy and/or verify mag tapes
|
tcopy is designed to copy magnetic tapes. The only assumption made about the tape is that there are two tape marks at the end. tcopy with only a source tape (/dev/rst0 by default) specified will print... |
tee(1) -- pipe fitting
|
The tee utility copies standard input to standard output, making a copy in zero or more files. The output is unbuffered. The options are as follows: -a Append the output to the files rather than overw... |
telnet(1) -- user interface to the TELNET protocol
|
The telnet command is used to communicate with another host using the TELNET protocol. If telnet is invoked without the host argument, it enters command mode, indicated by its prompt (telnet>). In thi... |
test(1) -- condition evaluation utility
|
The test utility evaluates the expression and, if it evaluates to true, returns a zero (true) exit status; otherwise it returns 1 (false). If no expression is given, test also returns 1 (false). All o... |
texi2dvi(1) -- print Texinfo documents
|
Run each Texinfo or LaTeX FILE through TeX in turn until all cross-references are resolved, building all indices. The directory containing each FILE is searched for included files. The suffix of FILE ... |
texindex(1) -- sort Texinfo index files
|
Generate a sorted index for each TeX output FILE. Usually FILE... is specified as `foo.??' for a document `foo.texi'. |
tfmtodit(1) -- create font files for use with groff -Tdvi
|
tfmtodit creates a font file for use with groff -Tdvi. tfm_file is the name of the TeX font metric file for the font. map_file is a file giving the groff names for characters in the font; this file sh... |
tftp(1) -- trivial file transfer program
|
tftp is the user interface to the Internet TFTP (Trivial File Transfer Protocol), which allows users to transfer files to and from a remote machine. The remote host and port may be specified on the co... |
tic(1) -- the terminfo entry-description compiler
|
The command tic translates a terminfo file from source format into compiled format. The compiled format is necessary for use with the library routines in curses(3). The results are normally placed in ... |
time(1) -- time command execution
|
time executes and times utility. After the utility finishes, time writes the total time elapsed, the time consumed by system overhead, and the time used to execute utility to the standard error stream... |
tip(1) -- connect to a remote system
|
tip and cu establish a full-duplex connection to another machine, giving the appearance of being logged in directly on the remote CPU. It goes without saying that you must have a login on the machine ... |
tn3270(1) -- full-screen remote login to IBM VM/CMS
|
tn3270 permits a full-screen, full-duplex connection from a UNIX machine to an IBM (or compatible) machine. tn3270 gives the appearance of being logged in to the remote machine from an IBM 3270 termin... |
top(1) -- display and update information about the top CPU processes
|
top displays the top processes on the system and periodically updates this information. If standard output is an intelligent terminal (see below) then as many processes as will fit on the terminal scr... |
touch(1) -- change file access and modification times
|
The touch utility sets the modification and access times of files to the current time of day. If the file doesn't exist, it is created with default permissions. The options are as follows: -a Change ... |
tput(1) -- terminal capability interface
|
The tput utility makes terminal-dependent information available to users or shell applications. The options are as follows: -T The terminal name as found in the terminfo database; for example, ``vt100... |
tr(1) -- translate characters
|
The tr utility copies the standard input to the standard output with substitution or deletion of selected characters. The options are as follows: -c Complements the set of characters in string1; for i... |
troff(1) -- format documents
|
This manual page describes the GNU version of troff, which is part of the groff document formatting system. It is highly compatible with Unix troff. Usually it should be invoked using the groff comman... |
true(1) -- return true value
|
The true utility always returns with exit code 0. |
tset(1) -- terminal initialization
|
tset initializes terminals. tset first determines the type of terminal that you are using. This determination is done as follows, using the first terminal type found: 1. The terminal argument specifie... |
tsort(1) -- topological sort of a directed graph
|
tsort takes a list of pairs of node names representing directed arcs in a graph and prints the nodes in topological order on standard output. That is, the input describes a partial ordering relation, ... |
tty(1) -- return user's terminal name
|
The tty utility writes the name of the terminal attached to standard input to standard output. The name that is written is the string returned by ttyname(3). If the standard input is not a terminal, t... |
ul(1) -- do underlining
|
ul reads the named files (or standard input if none are given) and translates occurrences of underscores to the sequence which indicates underlining for the terminal in use, as specified by the enviro... |
ulimit(1) -- public domain Korn shell
|
ksh is a command interpreter intended for both interactive and shell script use. Its command language is a superset of the sh(1) shell language. Shell startup    [Toc]    [Back] The following options ... |
uname(1) -- print operating system name
|
The uname utility writes symbols representing one or more system characteristics to the standard output. The options are as follows: -a Behave as though all of the options -mnrsv were specified. -m Pr... |
uncompress(1) -- compress and expand data
|
The compress and gzip utilities reduce the size of the named files using adaptive Lempel-Ziv coding. They are functionally identical, but use different algorithms for compression. If invoked as gzip o... |
unexpand(1) -- expand tabs to spaces, and vice versa
|
expand processes the named files or the standard input, writing the standard output with tabs changed into blanks. Backspace characters are preserved into the output and decrement the column count for... |
unifdef(1) -- remove preprocessor conditionals from code
|
The unifdef utility selectively processes conditional cpp(1) directives. It removes from a file both the directives and any additional text that they specify should be removed, while otherwise leaving... |
uniq(1) -- report or filter out repeated lines in a file
|
The uniq utility reads the standard input comparing adjacent lines and writes a copy of each unique input line to the standard output. The second and succeeding copies of identical adjacent input line... |
units(1) -- conversion program
|
The units program converts quantities expressed in various scales to their equivalents in other scales. The units program can only handle multiplicative scale changes. It cannot convert Celsius to Fah... |
unlimit(1) -- a shell (command interpreter) with C-like syntax
|
csh is a command language interpreter incorporating a history mechanism (see History substitutions), job control facilities (see Jobs), interactive file name and user name completion (see File name co... |
unprotoize(1) -- automatically add or remove function prototypes
|
protoize is an optional part of GNU C. You can use it to add prototypes to a program, thus converting the program to ANSI C in one respect. The companion program unprotoize does the reverse: it remove... |
unvis(1) -- revert a visual representation of data back to original form
|
unvis is the inverse function of vis(1). It reverts a visual representation of data back to its original form on standard output. |
uptime(1) -- show how long system has been running
|
The uptime utility displays the current time, the length of time the system has been up, the number of users, and the load average of the system over the last 1, 5, and 15 minutes. This is the ``headi... |
usbhidaction(1) -- perform actions according to USB HID controls
|
usbhidaction can be used to execute commands when certain values appear on HID controls. The normal operation for this program is to read the configuration file and then become a daemon and execute co... |
usbhidctl(1) -- manipulate USB HID devices
|
usbhidctl can be used to output or modify the state of a USB HID (Human Interface Device). If a list of items is present on the command line, then usbhidctl prints the current value of those items for... |
users(1) -- list current users
|
users lists the login names of the users currently on the system, in sorted order, space separated, on a single line. |
uudecode(1) -- encode/decode a binary file
|
The uuencode and uudecode utilities are used to transmit binary files over transmission mediums that do not support formats other than printable ASCII data. b64encode and b64decode are equivalent to r... |
uuencode(1) -- encode/decode a binary file
|
The uuencode and uudecode utilities are used to transmit binary files over transmission mediums that do not support formats other than printable ASCII data. b64encode and b64decode are equivalent to r... |
vacation(1) -- return ``I am not here'' indication
|
vacation returns a message to the sender of a message telling them that you are currently not reading your mail. The intended use is in a .forward file. For example, your .forward file might have: \r... |
vgrind(1) -- grind nice listings of programs
|
vgrind formats the program sources which are arguments in a nice style using troff(1). Comments are placed in italics, keywords in bold face, and the name of the current function is listed down the ma... |
vi(1) -- text editor
|
ex is a line-oriented text editor; vi is a screen-oriented text editor. ex and vi are different interfaces to the same program, and it is possible to switch back and forth during an edit session. view... |
view(1) -- text editor
|
ex is a line-oriented text editor; vi is a screen-oriented text editor. ex and vi are different interfaces to the same program, and it is possible to switch back and forth during an edit session. view... |
vis(1) -- display non-printable characters in a visual format
|
vis is a filter for converting non-printable characters into a visual representation. It differs from cat -v in that the form can be unique and invertible. By default, all non-printing characters exce... |
w(1) -- display users who are logged on and what they are doing
|
The w utility prints a summary of the current activity on the system, including what each user is doing. The first line displays the current time of day, how long the system has been running, the numb... |
wait(1) -- await process completion
|
If invoked with no arguments, the wait utility waits until all existing child processes in the background have terminated. Available operands: pid If a pid operand is specified, and it is the process ... |
wall(1) -- write a message to users
|
wall displays the contents of file, or, by default, its standard input, on the terminals of all currently logged in users. Only the superuser can write on the terminals of users who have chosen to den... |
wc(1) -- word, line, and byte or character count
|
The wc utility reads one or more input text files, and, by default, writes the number of lines, words, and bytes contained in each input file to the standard output. If more than one input file is spe... |
what(1) -- show what versions of object modules were used to construct a file
|
what reads each file and searches for sequences of either the form ``$'' immediately followed by the system name (sysname) as defined by uname(3), or the form ``@(#)'' as inserted by the source co... |
whatis(1) -- describe what a command is
|
whatis looks up a given command and gives the header line from the manual page. You can then use the man(1) command to get more information. whatis will match on a case insensitive basis and for multi... |
whereis(1) -- locate programs
|
The whereis utility checks the standard binary directories for the specified name, printing out the paths of any it finds that are executable by the user. The path searched is the string returned by t... |
which(1) -- locate a program file (or files) in the path
|
which takes a list of names and looks for the files which would be executed had these names been given as commands. Each argument is searched for along the user's path. If the -a flag is given, which... |
who(1) -- display who is logged in
|
The who utility displays a list of all users currently logged on, showing for each user the login name, tty name, the date and time of login, and hostname if not local. The options are as follows: -H ... |
whoami(1) -- display effective user ID
|
The whoami utility has been obsoleted by the id(1) utility, and is equivalent to id -un. The command id -p is suggested for normal interactive use. The whoami utility displays your effective user ID a... |
whois(1) -- Internet domain name and network number directory service
|
The whois utility looks up records in the databases maintained by several Network Information Centers (NICs). The options are as follows: -6 Use the IPv6 Resource Center (6bone) database. It contains ... |
window(1) -- window environment
|
window implements a window environment on ASCII terminals. A window is a rectangular portion of the physical terminal screen associated with a set of processes. Its size and position can be changed by... |
write(1) -- send a message to another user
|
write allows you to communicate with other users, by copying lines from your terminal to theirs. When you run the write command, the user you are writing to gets a message of the form: Message from yo... |
x99token(1) -- X9.9 software token calculator
|
The x99token program is a simple X9.9 software token calculator. The token is initialized by using the -i option. In this mode, x99token requests a key. The key consists of 8 bytes encoded in either h... |
xargs(1) -- construct argument list(s) and execute utility
|
The xargs utility reads space, tab, newline, and end-of-file delimited strings from the standard input and executes the specified utility with the strings as arguments. Any arguments specified on the ... |
xstr(1) -- extract strings from C programs to implement shared strings
|
xstr maintains a file strings into which strings in component parts of a large program are hashed. These strings are replaced with references to this common area. This serves to implement shared const... |
xsubpp(1) -- compiler to convert Perl XS code into C code
|
This compiler is typically run by the makefiles created by ExtUtils::MakeMaker. xsubpp will compile XS code into C code by embedding the constructs necessary to let C functions manipulate Perl values ... |
yacc(1) -- an LALR(1) parser generator
|
yacc reads the grammar specification in the file filename and generates an LR(1) parser for it. The parsers consist of a set of LALR(1) parsing tables and a driver routine written in the C programming... |
yes(1) -- be repetitively affirmative
|
yes outputs expletive, or, by default, ``y'', forever. |
ypcat(1) -- print the values of all keys in a YP database
|
ypcat prints out the values of all keys from the YP database specified by mapname, which may be a map name or a map nickname. The options are as follows: -d domainname Specify a domain other than the ... |
ypmatch(1) -- print the values of one or more keys in a YP database
|
ypmatch prints out the values of one or more keys from the YP database specified by mapname, which may be a map name or a map nickname. The options are as follows: -d domainname Specify a domain other... |
ypwhich(1) -- return hostname of YP server or map master
|
ypwhich tells which YP server supplies YP services to a client, or which is the master for a map. If invoked without arguments, it gives the YP server for the local machine. If host is specified, that... |
yyfix(1) -- extract tables from y.tab.c
|
Programs have historically used a script (often named ``:yyfix'') to extract tables from the yacc(1) generated file y.tab.c. As the names of the tables generated by the current version of yacc are d... |
zcat(1) -- compress and expand data
|
The compress and gzip utilities reduce the size of the named files using adaptive Lempel-Ziv coding. They are functionally identical, but use different algorithms for compression. If invoked as gzip o... |
zcmp(1) -- compare compressed files
|
zcmp and zdiff are filters that invoke cmp(1) or diff(1) respectively to compare compressed files. Such files generally have a ``Z'' or ``gz'' extension (both the compress(1) and gzip(1) formats a... |
zdiff(1) -- compare compressed files
|
zcmp and zdiff are filters that invoke cmp(1) or diff(1) respectively to compare compressed files. Such files generally have a ``Z'' or ``gz'' extension (both the compress(1) and gzip(1) formats a... |
zegrep(1) -- file pattern searcher
|
The grep utilities search the given input files selecting lines that match one or more patterns. By default, a pattern matches an input line if any regular expression (RE) in the pattern matches the i... |
zfgrep(1) -- file pattern searcher
|
The grep utilities search the given input files selecting lines that match one or more patterns. By default, a pattern matches an input line if any regular expression (RE) in the pattern matches the i... |
zforce(1) -- force gzip files to have a .gz suffix
|
The zforce utility renames gzip(1) files to have a `.gz' suffix, so that gzip(1) will not compress them twice. This can be useful if file names were truncated during a file transfer. Files that have ... |
zgrep(1) -- file pattern searcher
|
The grep utilities search the given input files selecting lines that match one or more patterns. By default, a pattern matches an input line if any regular expression (RE) in the pattern matches the i... |
zmore(1) -- view compressed files on a CRT
|
zmore is a filter that allows the viewing of files compressed with Lempel-Ziv encoding. Such files generally have a ``Z'' or ``gz'' extension (both the compress(1) and gzip(1) formats are supporte... |
znew(1) -- convert compressed files to gzipped files
|
The znew utility uncompresses files compressed by compress(1) and recompresses them with gzip(1). The options are as follows: -f Overwrite existing `.gz' files. Unless this option is specified, znew ... |
[(1) -- condition evaluation utility
|
The test utility evaluates the expression and, if it evaluates to true, returns a zero (true) exit status; otherwise it returns 1 (false). If no expression is given, test also returns 1 (false). All o... |
accept(2) -- accept a connection on a socket
|
The argument s is a socket that has been created with socket(2), bound to an address with bind(2), and is listening for connections after a listen(2). The accept() argument extracts the first connecti... |
access(2) -- check access permissions of a file or pathname
|
The access() function checks the accessibility of the file named by path for the access permissions indicated by mode. The value of mode is the bitwise inclusive OR of the access permissions to be che... |
acct(2) -- enable or disable process accounting
|
The acct() call enables or disables the collection of system accounting records. If file is NULL, accounting is disabled. If file is an existing, null-terminated pathname, record collection is enabled... |
adjtime(2) -- correct the time to allow synchronization of the system clock
|
adjtime() makes small adjustments to the system time, as returned by gettimeofday(2), advancing or retarding it by the time specified by the timeval delta. If delta is negative, the clock is slowed do... |
amd64/amd64_get_ioperm(2) -- manage amd64 per-process I/O permission bitmap
|
amd64_get_ioperm() copies the current I/O permission bitmap into the memory referenced by iomap. amd64_set_ioperm() sets the I/O permission bitmap from the data pointed to by iomap. This call is restr... |
amd64/amd64_get_ldt(2) -- manage amd64 per-process Local Descriptor Table entries
|
amd64_get_ldt() will return the list of amd64 descriptors that the process has in its LDT. amd64_set_ldt() will set a list of amd64 descriptors for the current process in its LDT. Both routines accept... |
amd64/amd64_get_mtrr(2) -- access Memory Type Range Registers
|
These functions provide an interface to the MTRR registers found on 686-class processors for controlling processor access to memory ranges. This is most useful for accessing devices such as video acce... |
amd64/amd64_iopl(2) -- change the amd64 I/O privilege level
|
amd64_iopl() sets the amd64 I/O privilege level to the value specified by iopl. This call is restricted to the superuser. Note: Code using the amd64_iopl() function must be compiled using -lamd64. |
amd64/amd64_set_ioperm(2) -- manage amd64 per-process I/O permission bitmap
|
amd64_get_ioperm() copies the current I/O permission bitmap into the memory referenced by iomap. amd64_set_ioperm() sets the I/O permission bitmap from the data pointed to by iomap. This call is restr... |
amd64/amd64_set_ldt(2) -- manage amd64 per-process Local Descriptor Table entries
|
amd64_get_ldt() will return the list of amd64 descriptors that the process has in its LDT. amd64_set_ldt() will set a list of amd64 descriptors for the current process in its LDT. Both routines accept... |
amd64/amd64_set_mtrr(2) -- access Memory Type Range Registers
|
These functions provide an interface to the MTRR registers found on 686-class processors for controlling processor access to memory ranges. This is most useful for accessing devices such as video acce... |
bind(2) -- bind a name to a socket
|
bind() assigns a name to an unnamed socket. When a socket is created with socket(2) it exists in a name space (address family) but has no name assigned. bind() requests that name be assigned to the so... |
brk(2) -- change data segment size
|
The brk() and sbrk() functions are historical curiosities left over from earlier days before the advent of virtual memory management. The brk() function sets the break or lowest address of a process'... |
chdir(2) -- change current working directory
|
The path argument points to the pathname of a directory. The chdir() function causes the named directory to become the current working directory, that is, the starting point for path searches of pathn... |
chflags(2) -- set file flags
|
The file whose name is given by path or referenced by the descriptor fd has its flags changed to flags. The flags specified are formed by OR'ing the following values UF_NODUMP Do not dump the file. U... |
chmod(2) -- change mode of file
|
The function chmod() sets the file permission bits of the file specified by the pathname path to mode. fchmod() sets the permission bits of the specified file descriptor fd. chmod() verifies that the ... |
chown(2) -- change owner and group of a file or link
|
The owner ID and group ID of the file (or link) named by path or referenced by fd is changed as specified by the arguments owner and group. The owner of a file may change the group to a group of which... |
chroot(2) -- change root directory
|
dirname is the address of the pathname of a directory, terminated by an ASCII NUL. chroot() causes dirname to become the root directory, that is, the starting point for path searches of pathnames begi... |
clock_getres(2) -- get/set/calibrate date and time
|
The clock_gettime() and clock_settime() allow the calling process to retrieve or set the value used by a clock which is specified by clock_id. clock_id can be one of four values: CLOCK_REALTIME for ti... |
clock_gettime(2) -- get/set/calibrate date and time
|
The clock_gettime() and clock_settime() allow the calling process to retrieve or set the value used by a clock which is specified by clock_id. clock_id can be one of four values: CLOCK_REALTIME for ti... |
clock_settime(2) -- get/set/calibrate date and time
|
The clock_gettime() and clock_settime() allow the calling process to retrieve or set the value used by a clock which is specified by clock_id. clock_id can be one of four values: CLOCK_REALTIME for ti... |
close(2) -- delete a descriptor
|
The close() call deletes a descriptor from the per-process object reference table. If this is the last reference to the underlying object, the object will be deactivated. For example, on the last clos... |
closefrom(2) -- delete many descriptors
|
The closefrom() call deletes all descriptors numbered fd and higher from the per-process file descriptor table. It is effectively the same as calling close(2) on each descriptor. |
connect(2) -- initiate a connection on a socket
|
The parameter s is a socket. If it is of type SOCK_DGRAM, this call specifies the peer with which the socket is to be associated; this address is that to which datagrams are to be sent, and the only a... |
alpha/dense_base(2) -- Alpha devices I/O ports and memory access functions
|
The functions in libalpha give userland programs access to the I/O ports on the OpenBSD/alpha platform. The in*() functions return data read from the specified I/O port. The out*() functions write dat... |
dup(2) -- duplicate an existing file descriptor
|
dup() duplicates an existing object descriptor and returns its value to the calling process (newd = dup(oldd)). The argument oldd is a small non-negative integer index in the per-process descriptor ta... |
dup2(2) -- duplicate an existing file descriptor
|
dup() duplicates an existing object descriptor and returns its value to the calling process (newd = dup(oldd)). The argument oldd is a small non-negative integer index in the per-process descriptor ta... |
errno(2) -- introduction to system calls and error numbers
|
The manual pages in section 2 provide an overview of the system calls, their error returns, and other common definitions and concepts. |
exect(2) -- execute a file
|
execve() transforms the calling process into a new process. The new process is constructed from an ordinary file, whose name is pointed to by path, called the new process file. This file is either an ... |
execve(2) -- execute a file
|
execve() transforms the calling process into a new process. The new process is constructed from an ordinary file, whose name is pointed to by path, called the new process file. This file is either an ... |
extattr(2) -- system calls to manipulate VFS extended attributes
|
Named extended attributes are meta-data associated with vnodes representing files and directories. They exist as "name=value" pairs within a set of namespaces. The extattr_get_file() call retrieves ... |
extattr_delete_fd(2) -- system calls to manipulate VFS extended attributes
|
Named extended attributes are meta-data associated with vnodes representing files and directories. They exist as "name=value" pairs within a set of namespaces. The extattr_get_file() call retrieves ... |
extattr_delete_file(2) -- system calls to manipulate VFS extended attributes
|
Named extended attributes are meta-data associated with vnodes representing files and directories. They exist as "name=value" pairs within a set of namespaces. The extattr_get_file() call retrieves ... |
extattr_get_fd(2) -- system calls to manipulate VFS extended attributes
|
Named extended attributes are meta-data associated with vnodes representing files and directories. They exist as "name=value" pairs within a set of namespaces. The extattr_get_file() call retrieves ... |
extattr_get_file(2) -- system calls to manipulate VFS extended attributes
|
Named extended attributes are meta-data associated with vnodes representing files and directories. They exist as "name=value" pairs within a set of namespaces. The extattr_get_file() call retrieves ... |
extattr_set_fd(2) -- system calls to manipulate VFS extended attributes
|
Named extended attributes are meta-data associated with vnodes representing files and directories. They exist as "name=value" pairs within a set of namespaces. The extattr_get_file() call retrieves ... |
extattr_set_file(2) -- system calls to manipulate VFS extended attributes
|
Named extended attributes are meta-data associated with vnodes representing files and directories. They exist as "name=value" pairs within a set of namespaces. The extattr_get_file() call retrieves ... |
fchdir(2) -- change current working directory
|
The path argument points to the pathname of a directory. The chdir() function causes the named directory to become the current working directory, that is, the starting point for path searches of pathn... |
fchflags(2) -- set file flags
|
The file whose name is given by path or referenced by the descriptor fd has its flags changed to flags. The flags specified are formed by OR'ing the following values UF_NODUMP Do not dump the file. U... |
fchmod(2) -- change mode of file
|
The function chmod() sets the file permission bits of the file specified by the pathname path to mode. fchmod() sets the permission bits of the specified file descriptor fd. chmod() verifies that the ... |
fchown(2) -- change owner and group of a file or link
|
The owner ID and group ID of the file (or link) named by path or referenced by fd is changed as specified by the arguments owner and group. The owner of a file may change the group to a group of which... |
fcntl(2) -- file control
|
The fcntl() provides control over the properties of a file that is already open. The argument fd is a descriptor to be operated on by cmd as described below. The third parameter is called arg and is t... |
fhopen(2) -- access file via file handle
|
These functions provide a means to access a file given the file handle fhp. As this method bypasses directory access restrictions, these calls are restricted to the superuser. fhopen() opens the file ... |
fhstat(2) -- access file via file handle
|
These functions provide a means to access a file given the file handle fhp. As this method bypasses directory access restrictions, these calls are restricted to the superuser. fhopen() opens the file ... |
fhstatfs(2) -- access file via file handle
|
These functions provide a means to access a file given the file handle fhp. As this method bypasses directory access restrictions, these calls are restricted to the superuser. fhopen() opens the file ... |
flock(2) -- apply or remove an advisory lock on an open file
|
flock() applies or removes an advisory lock on the file associated with the file descriptor fd. A lock is applied by specifying an operation parameter that is one of LOCK_SH or LOCK_EX with the option... |
fork(2) -- create a new process
|
fork() causes creation of a new process. The new process (child process) is an exact copy of the calling process (parent process) except for the following: +o The child process has a unique process ID... |
fpathconf(2) -- get configurable pathname variables
|
The pathconf() and fpathconf() functions provides a method for applications to determine the current value of a configurable system limit or option variable associated with a pathname or file descript... |
fstat(2) -- get file status
|
The stat() function obtains information about the file pointed to by path. Read, write, or execute permission of the named file is not required, but all directories listed in the path name leading to ... |
fstatfs(2) -- get file system statistics
|
statfs() returns information about a mounted file system. path is the path name of any file within the mounted file system. buf is a pointer to a statfs structure defined as follows: typedef struct { ... |
fsync(2) -- synchronize a file's in-core state with that on disk
|
fsync() causes all modified data and attributes of fd to be moved to a permanent storage device. This normally results in all incore modified copies of buffers for the associated file to be written to... |
ftruncate(2) -- truncate or extend a file to a specified length
|
truncate() causes the file named by path or referenced by fd to be truncated or extended to length bytes in size. If the file was larger than this size, the extra data is lost. If the file was smaller... |
futimes(2) -- set file access and modification times
|
The access and modification times of the file named by path or referenced by fd are changed as specified by the argument times. If times is NULL, the access and modification times are set to the curre... |
getdirentries(2) -- get directory entries in a filesystem independent format
|
getdirentries() reads directory entries from the directory referenced by the file descriptor fd into the buffer pointed to by buf, in a filesystem independent format. Up to nbytes of data will be tran... |
getegid(2) -- get group process identification
|
The getgid() function returns the real group ID of the calling process, getegid() returns the effective group ID of the calling process. The real group ID is specified at login time. The real group ID... |
geteuid(2) -- get user identification
|
The getuid() function returns the real user ID of the calling process. The geteuid() function returns the effective user ID of the calling process. The real user ID is that of the user who has invoked... |
getfh(2) -- get file handle
|
getfh() returns a file handle for the specified file or directory in the file handle pointed to by fhp. This system call is restricted to the superuser. |
getfsstat(2) -- get list of all mounted file systems
|
getfsstat() returns information about all mounted file systems. buf is a pointer to an array of statfs(2) structures defined as follows: typedef struct { int32_t val[2]; } fsid_t; #define MFSNAMELEN 1... |
getgid(2) -- get group process identification
|
The getgid() function returns the real group ID of the calling process, getegid() returns the effective group ID of the calling process. The real group ID is specified at login time. The real group ID... |
getgroups(2) -- get group access list
|
getgroups() gets the current group access list of the current user process and stores it in the array gidset. The parameter gidsetlen indicates the number of entries that may be placed in gidset. getg... |
getitimer(2) -- get/set value of interval timer
|
The system provides each process with three interval timers, defined in . The getitimer() call returns the current value for the timer specified in which in the structure at value. The set... |
getlogin(2) -- get/set login name
|
The getlogin() routine returns the login name of the user associated with the current session, as previously set by setlogin(). The name is normally associated with a login shell at the time a session... |
getlogin_r(2) -- get/set login name
|
The getlogin() routine returns the login name of the user associated with the current session, as previously set by setlogin(). The name is normally associated with a login shell at the time a session... |
getpeereid(2) -- get effective user and group identification of
|
getpeereid() returns the effective user ID and group ID of the peer connected to a UNIX domain socket (see unix(4)). The argument s must be of type SOCK_STREAM. One common use is for UNIX domain serve... |
getpeername(2) -- get name of connected peer
|
getpeername() returns the address information of the peer connected to socket s. One common use occurs when a process inherits an open socket, such as TCP servers forked from inetd(8). In this scenari... |
getpgid(2) -- get process group
|
The process group of the current process is returned by getpgrp(). The process group of the pid process is returned by getpgid(). Process groups are used for distribution of signals, and by terminals ... |
getpgrp(2) -- get process group
|
The process group of the current process is returned by getpgrp(). The process group of the pid process is returned by getpgid(). Process groups are used for distribution of signals, and by terminals ... |
getpid(2) -- get parent or calling process identification
|
getpid() returns the process ID of the calling process. Though the ID is guaranteed to be unique, it should NOT be used for constructing temporary file names; see mkstemp(3) instead. getppid() returns... |
getppid(2) -- get parent or calling process identification
|
getpid() returns the process ID of the calling process. Though the ID is guaranteed to be unique, it should NOT be used for constructing temporary file names; see mkstemp(3) instead. getppid() returns... |
getpriority(2) -- get/set program scheduling priority
|
The scheduling priority of the process, process group, or user, as indicated by which and who is obtained with the getpriority() call and set with the setpriority() call. which is one of PRIO_PROCESS,... |
getresgid(2) -- get or set real, effective and saved user or group ID
|
The setresuid() function sets the real, effective and saved user IDs of the current process. The analogous setresgid() sets the real, effective and saved group IDs. Privileged processes may set these ... |
getresuid(2) -- get or set real, effective and saved user or group ID
|
The setresuid() function sets the real, effective and saved user IDs of the current process. The analogous setresgid() sets the real, effective and saved group IDs. Privileged processes may set these ... |
getrlimit(2) -- control maximum system resource consumption
|
Limits on the consumption of system resources by the current process and each process it creates may be obtained with the getrlimit() call, and set with the setrlimit() call. The resource parameter is... |
getrusage(2) -- get information about resource utilization
|
getrusage() returns information describing the resources utilized by the current process, or all its terminated child processes. The who parameter is either RUSAGE_SELF or RUSAGE_CHILDREN. The buffer ... |
getsid(2) -- get process session
|
The session ID of the process identified by pid is returned by getsid(). If pid is zero, getsid() returns the session ID of the current process. |
getsockname(2) -- get socket name
|
getsockname() returns the locally bound address information for a specified socket. Common uses of this function are as follows: +o When bind(2) is called with a port number of 0 (indicating the kerne... |
getsockopt(2) -- get and set options on sockets
|
getsockopt() and setsockopt() manipulate the options associated with a socket. Options may exist at multiple protocol levels; they are always present at the uppermost ``socket'' level. When manipula... |
gettimeofday(2) -- get/set date and time
|
Note: timezone is no longer used; this information is kept outside the kernel. The system's notion of the current Greenwich time and the current time zone is obtained with the gettimeofday() call, an... |
getuid(2) -- get user identification
|
The getuid() function returns the real user ID of the calling process. The geteuid() function returns the effective user ID of the calling process. The real user ID is that of the user who has invoked... |
i386/i386_get_ioperm(2) -- manage i386 per-process I/O permission bitmap
|
i386_get_ioperm() copies the current I/O permission bitmap into the memory referenced by iomap. i386_set_ioperm() sets the I/O permission bitmap from the data pointed to by iomap. This call is restric... |
i386/i386_get_ldt(2) -- manage i386 per-process Local Descriptor Table entries
|
i386_get_ldt() will return the list of i386 descriptors that the process has in its LDT. i386_set_ldt() will set a list of i386 descriptors for the current process in its LDT. Both routines accept a s... |
i386/i386_iopl(2) -- change the i386 I/O privilege level
|
i386_iopl() sets the i386 I/O privilege level to the value specified by iopl. This call is restricted to the superuser. Note: Code using the i386_iopl() function must be compiled using -li386. |
i386/i386_set_ioperm(2) -- manage i386 per-process I/O permission bitmap
|
i386_get_ioperm() copies the current I/O permission bitmap into the memory referenced by iomap. i386_set_ioperm() sets the I/O permission bitmap from the data pointed to by iomap. This call is restric... |
i386/i386_set_ldt(2) -- manage i386 per-process Local Descriptor Table entries
|
i386_get_ldt() will return the list of i386 descriptors that the process has in its LDT. i386_set_ldt() will set a list of i386 descriptors for the current process in its LDT. Both routines accept a s... |
i386/i386_vm86(2) -- set virtual 8086 processor registers and mode
|
i386_vm86() will set the process into virtual 8086 mode using the registers and selectors specified by the context pointed to by vmcp. The processor registers are set from vmcp->substr.regs, and the e... |
alpha/inb(2) -- Alpha devices I/O ports and memory access functions
|
The functions in libalpha give userland programs access to the I/O ports on the OpenBSD/alpha platform. The in*() functions return data read from the specified I/O port. The out*() functions write dat... |
alpha/inl(2) -- Alpha devices I/O ports and memory access functions
|
The functions in libalpha give userland programs access to the I/O ports on the OpenBSD/alpha platform. The in*() functions return data read from the specified I/O port. The out*() functions write dat... |
intro(2) -- introduction to system calls and error numbers
|
The manual pages in section 2 provide an overview of the system calls, their error returns, and other common definitions and concepts. |
alpha/inw(2) -- Alpha devices I/O ports and memory access functions
|
The functions in libalpha give userland programs access to the I/O ports on the OpenBSD/alpha platform. The in*() functions return data read from the specified I/O port. The out*() functions write dat... |
ioctl(2) -- control device
|
The ioctl() function manipulates the underlying device parameters of special files. In particular, many operating characteristics of character special files (e.g., terminals) may be controlled with io... |
alpha/ioperm(2) -- Alpha devices I/O ports and memory access functions
|
The functions in libalpha give userland programs access to the I/O ports on the OpenBSD/alpha platform. The in*() functions return data read from the specified I/O port. The out*() functions write dat... |
issetugid(2) -- is current executable running setuid or setgid
|
The issetugid() function returns 1 if the process was made setuid or setgid as the result of the last or other previous execve() system calls. Otherwise it returns 0. This system call exists so that l... |
kevent(2) -- kernel event notification mechanism
|
kqueue() provides a generic method of notifying the user when an event happens or a condition holds, based on the results of small pieces of kernel code termed ``filters''. A kevent is identified by... |
kill(2) -- send signal to a process
|
The kill() function sends the signal given by sig to pid, a process or a group of processes. sig may be one of the signals specified in sigaction(2) or it may be 0, in which case error checking is per... |
kqueue(2) -- kernel event notification mechanism
|
kqueue() provides a generic method of notifying the user when an event happens or a condition holds, based on the results of small pieces of kernel code termed ``filters''. A kevent is identified by... |
ktrace(2) -- process tracing
|
The ktrace() function enables or disables tracing of one or more processes. Users may only trace their own processes. Only the superuser can trace setuid or setgid programs. tracefile gives the pathna... |
lchown(2) -- change owner and group of a file or link
|
The owner ID and group ID of the file (or link) named by path or referenced by fd is changed as specified by the arguments owner and group. The owner of a file may change the group to a group of which... |
link(2) -- make a hard file link
|
The link() function atomically creates the specified directory entry (hard link) name2 with the attributes of the underlying object pointed at by name1. If the link is successful: the link count of th... |
listen(2) -- listen for connections on a socket
|
To accept connections, a socket is first created with socket(2), a willingness to accept incoming connections and a queue limit for incoming connections are specified with listen(), and then the conne... |
lseek(2) -- reposition read/write file offset
|
The lseek() function repositions the offset of the file descriptor fildes to the argument offset according to the directive whence. The argument fildes must be an open file descriptor. lseek() reposit... |
lstat(2) -- get file status
|
The stat() function obtains information about the file pointed to by path. Read, write, or execute permission of the named file is not required, but all directories listed in the path name leading to ... |
madvise(2) -- give advice about use of memory
|
The madvise() system call allows a process that has knowledge of its memory behavior to describe it to the system. The possible behaviors are: MADV_NORMAL No further special treatment needed. MADV_RAN... |
alpha/map_memory(2) -- Alpha devices I/O ports and memory access functions
|
The functions in libalpha give userland programs access to the I/O ports on the OpenBSD/alpha platform. The in*() functions return data read from the specified I/O port. The out*() functions write dat... |
mincore(2) -- determine residency of memory pages
|
The mincore() system call allows a process to obtain information about whether pages are core resident. Here the current core residency of the pages is returned in the character array vec, with a valu... |
minherit(2) -- control the inheritance of pages
|
The minherit() system call changes the specified pages to have the inheritance characteristic inherit, which can be set to MAP_INHERIT_NONE, MAP_INHERIT_COPY, or MAP_INHERIT_SHARE. Not all implementat... |
mkdir(2) -- make a directory file
|
The directory path is created with the access permissions specified by mode and restricted by the umask(2) of the calling process. The directory's owner ID is set to the process's effective user ID.... |
mkfifo(2) -- make a FIFO file
|
mkfifo() creates a new FIFO file with name path. The access permissions are specified by mode and restricted by the umask(2) of the calling process. The FIFO's owner ID is set to the process's effec... |
mknod(2) -- make a special file node
|
The device special file path is created with the major and minor device numbers extracted from mode. The access permissions of path are descendant from the umask(2) of the parent process. If mode indi... |
mlock(2) -- lock (unlock) physical pages in memory
|
The mlock system call locks into memory the physical pages associated with the virtual address range starting at addr for len bytes. The munlock call unlocks pages previously locked by one or more mlo... |
mlockall(2) -- lock (unlock) the address space of a process
|
The mlockall system call locks into memory the physical pages associated with the address space of a process until the address space is unlocked, the process exits, or execs another program image. The... |
mmap(2) -- map files or devices into memory
|
The mmap function causes the pages starting at addr and continuing for at most len bytes to be mapped from the object described by fd, starting at byte offset offset. If offset or len is not a multipl... |
mount(2) -- mount or dismount a filesystem
|
The mount() function grafts a filesystem object onto the system file tree at the point dir. The argument data describes the filesystem object to be mounted. The argument type tells the kernel how to i... |
mprotect(2) -- control the protection of pages
|
The mprotect() system call changes the specified pages to have protection prot. Not all implementations will guarantee protection on a page basis; the granularity of protection changes may be as large... |
mquery(2) -- provide mapping hints to applications
|
The mquery system call checks the existing memory mappings of a process and returns hints to the caller about where to put a memory mapping. This hint can be later used when performing memory mappings... |
msgctl(2) -- message control operations
|
The msgctl() system call performs some control operations on the message queue specified by msqid. Each message queue has a data structure associated with it, parts of which may be altered by msgctl()... |
msgget(2) -- get message queue
|
msgget() returns the message queue identifier associated with key. A message queue identifier is a unique integer greater than zero. A message queue is created if either key is equal to IPC_PRIVATE, o... |
msgrcv(2) -- receive a message from a message queue
|
The msgrcv() function receives a message from the message queue specified in msqid, and places it into the structure pointed to by msgp. This structure should consist of the following members: long mt... |
msgsnd(2) -- send a message to a message queue
|
The msgsnd() function sends a message from the message queue specified in msqid. msgp points to a structure containing the message. This structure should consist of the following members: long mtype; ... |
msync(2) -- synchronize a mapped region
|
The msync() system call writes all pages with shared modifications in the specified region of the process's address space back to permanent storage, and, if requested, invalidates cached data mapped ... |
munlock(2) -- lock (unlock) physical pages in memory
|
The mlock system call locks into memory the physical pages associated with the virtual address range starting at addr for len bytes. The munlock call unlocks pages previously locked by one or more mlo... |
munlockall(2) -- lock (unlock) the address space of a process
|
The mlockall system call locks into memory the physical pages associated with the address space of a process until the address space is unlocked, the process exits, or execs another program image. The... |
munmap(2) -- remove a mapping
|
The munmap() system call deletes the mappings for the specified address range, and causes further references to addresses within the range to generate invalid memory references. |
nanosleep(2) -- high resolution sleep
|
nanosleep() suspends execution of the calling process for the time specified. An unmasked signal will cause it to terminate the sleep early, regardless of the SA_RESTART value on the interrupting sign... |
nfssvc(2) -- NFS services
|
The nfssvc() function is used by the NFS daemons to pass information into and out of the kernel and also to enter the kernel as a server daemon. The flags argument consists of several bits that show w... |
open(2) -- open or create a file for reading or writing
|
The file name specified by path is opened for reading and/or writing as specified by the argument flags and the file descriptor returned to the calling process. The flags argument may indicate the fil... |
alpha/outb(2) -- Alpha devices I/O ports and memory access functions
|
The functions in libalpha give userland programs access to the I/O ports on the OpenBSD/alpha platform. The in*() functions return data read from the specified I/O port. The out*() functions write dat... |
alpha/outl(2) -- Alpha devices I/O ports and memory access functions
|
The functions in libalpha give userland programs access to the I/O ports on the OpenBSD/alpha platform. The in*() functions return data read from the specified I/O port. The out*() functions write dat... |
alpha/outw(2) -- Alpha devices I/O ports and memory access functions
|
The functions in libalpha give userland programs access to the I/O ports on the OpenBSD/alpha platform. The in*() functions return data read from the specified I/O port. The out*() functions write dat... |
pathconf(2) -- get configurable pathname variables
|
The pathconf() and fpathconf() functions provides a method for applications to determine the current value of a configurable system limit or option variable associated with a pathname or file descript... |
pipe(2) -- create descriptor pair for interprocess communication
|
The pipe() function creates a pipe, which is an object allowing unidirectional data flow, and allocates a pair of file descriptors. The first descriptor connects to the read end of the pipe, and the s... |
poll(2) -- synchronous I/O multiplexing
|
poll() provides a mechanism for multiplexing I/O across a set of file descriptors. It is similar in function to select(2). Unlike select(2), however, it is possible to only pass in data corresponding ... |
pread(2) -- read input
|
read() attempts to read nbytes of data from the object referenced by the descriptor d into the buffer pointed to by buf. readv() performs the same action, but scatters the input data into the iovcnt b... |
preadv(2) -- read input
|
read() attempts to read nbytes of data from the object referenced by the descriptor d into the buffer pointed to by buf. readv() performs the same action, but scatters the input data into the iovcnt b... |
profil(2) -- control process profiling
|
The profil() function enables or disables program counter profiling of the current process. If profiling is enabled, then at every clock tick, the kernel updates an appropriate count in the samples bu... |
ptrace(2) -- process tracing and debugging
|
ptrace() provides tracing and debugging facilities. It allows one process (the tracing process) to control another (the traced process). Most of the time, the traced process runs normally, but when it... |
pwrite(2) -- write output
|
write() attempts to write nbytes of data to the object referenced by the descriptor d from the buffer pointed to by buf. writev() performs the same action, but gathers the output data from the iovcnt ... |
pwritev(2) -- write output
|
write() attempts to write nbytes of data to the object referenced by the descriptor d from the buffer pointed to by buf. writev() performs the same action, but gathers the output data from the iovcnt ... |
quotactl(2) -- manipulate filesystem quotas
|
The quotactl() call enables, disables and manipulates filesystem quotas. A quota control command given by cmd operates on the given filename path for the given user id. The address of an optional comm... |
read(2) -- read input
|
read() attempts to read nbytes of data from the object referenced by the descriptor d into the buffer pointed to by buf. readv() performs the same action, but scatters the input data into the iovcnt b... |
alpha/readb(2) -- Alpha devices I/O ports and memory access functions
|
The functions in libalpha give userland programs access to the I/O ports on the OpenBSD/alpha platform. The in*() functions return data read from the specified I/O port. The out*() functions write dat... |
alpha/readl(2) -- Alpha devices I/O ports and memory access functions
|
The functions in libalpha give userland programs access to the I/O ports on the OpenBSD/alpha platform. The in*() functions return data read from the specified I/O port. The out*() functions write dat... |
readlink(2) -- read value of a symbolic link
|
readlink() places the contents of the symbolic link path in the buffer buf, which has size bufsiz. readlink does not append a NUL character to buf. |
readv(2) -- read input
|
read() attempts to read nbytes of data from the object referenced by the descriptor d into the buffer pointed to by buf. readv() performs the same action, but scatters the input data into the iovcnt b... |
alpha/readw(2) -- Alpha devices I/O ports and memory access functions
|
The functions in libalpha give userland programs access to the I/O ports on the OpenBSD/alpha platform. The in*() functions return data read from the specified I/O port. The out*() functions write dat... |
reboot(2) -- reboot system or halt processor
|
reboot() reboots the system. Only the superuser may reboot a machine on demand. However, a reboot is invoked automatically in the event of unrecoverable system failures. howto is a mask of options; th... |
recv(2) -- receive a message from a socket
|
recvfrom() and recvmsg() are used to receive messages from a socket, and may be used to receive data on a socket whether or not it is connectionoriented. If from is non-null and the socket is not conn... |
recvfrom(2) -- receive a message from a socket
|
recvfrom() and recvmsg() are used to receive messages from a socket, and may be used to receive data on a socket whether or not it is connectionoriented. If from is non-null and the socket is not conn... |
recvmsg(2) -- receive a message from a socket
|
recvfrom() and recvmsg() are used to receive messages from a socket, and may be used to receive data on a socket whether or not it is connectionoriented. If from is non-null and the socket is not conn... |
rename(2) -- change the name of a file
|
rename() causes the link named from to be renamed as to. If to exists, it is first removed. Both from and to must be of the same type (that is, both directories or both non-directories), and must resi... |
revoke(2) -- revoke file access
|
The revoke function invalidates all current open file descriptors in the system for the file named by path. Subsequent operations on any such descriptors fail, with the exceptions that a read() from a... |
rfork(2) -- control new processes
|
The fork functions (fork(2), vfork(2), and rfork()) create new processes. The new process (child process) is an exact copy of the calling process (parent process), except as outlined in the fork(2) ma... |
rmdir(2) -- remove a directory file
|
rmdir() removes a directory file whose name is given by path. The directory must not have any entries other than `.' and `..'. |
sbrk(2) -- change data segment size
|
The brk() and sbrk() functions are historical curiosities left over from earlier days before the advent of virtual memory management. The brk() function sets the break or lowest address of a process'... |
select(2) -- synchronous I/O multiplexing
|
select() examines the I/O descriptor sets whose addresses are passed in readfds, writefds, and exceptfds to see if some of their descriptors are ready for reading, are ready for writing, or have an ex... |
semctl(2) -- semaphore control operations
|
The semctl() system call provides a number of control operations on the semaphore specified by semnum and semid. The operation to be performed is specified in cmd (see below). arg is a union of the fo... |
semget(2) -- get semaphore set
|
The semget() system call returns the semaphore identifier associated with key. A new set containing nsems semaphores is created if either key is equal to IPC_PRIVATE, or key does not have a semaphore ... |
semop(2) -- semaphore operations
|
semop() provides a number of atomic operations on a set of semaphores. The semaphore set is specified by semid. sops is an array of semaphore operations, nsops is the number of operations in this arra... |
send(2) -- send a message from a socket
|
send(), sendto(), and sendmsg() are used to transmit a message to another socket. send() may be used only when the socket is in a connected state, while sendto() and sendmsg() may be used at any time.... |
sendmsg(2) -- send a message from a socket
|
send(), sendto(), and sendmsg() are used to transmit a message to another socket. send() may be used only when the socket is in a connected state, while sendto() and sendmsg() may be used at any time.... |
sendto(2) -- send a message from a socket
|
send(), sendto(), and sendmsg() are used to transmit a message to another socket. send() may be used only when the socket is in a connected state, while sendto() and sendmsg() may be used at any time.... |
setegid(2) -- set user and group ID
|
The setuid() function sets the real and effective user IDs and the saved set-user-ID of the current process to the specified value. The setuid() function is permitted if the effective user ID is that ... |
seteuid(2) -- set user and group ID
|
The setuid() function sets the real and effective user IDs and the saved set-user-ID of the current process to the specified value. The setuid() function is permitted if the effective user ID is that ... |
setgid(2) -- set user and group ID
|
The setuid() function sets the real and effective user IDs and the saved set-user-ID of the current process to the specified value. The setuid() function is permitted if the effective user ID is that ... |
setgroups(2) -- set group access list
|
setgroups() sets the group access list of the current user process according to the array gidset. The parameter ngroups indicates the number of entries in the array and must be no more than {NGROUPS_M... |
setitimer(2) -- get/set value of interval timer
|
The system provides each process with three interval timers, defined in . The getitimer() call returns the current value for the timer specified in which in the structure at value. The set... |
setlogin(2) -- get/set login name
|
The getlogin() routine returns the login name of the user associated with the current session, as previously set by setlogin(). The name is normally associated with a login shell at the time a session... |
setpgid(2) -- set process group
|
setpgid() sets the process group of the specified process pid to the specified pgrp. If pid is zero, then the call applies to the current process. If the invoker is not the superuser, then the affecte... |
setpgrp(2) -- set process group
|
setpgid() sets the process group of the specified process pid to the specified pgrp. If pid is zero, then the call applies to the current process. If the invoker is not the superuser, then the affecte... |
setpriority(2) -- get/set program scheduling priority
|
The scheduling priority of the process, process group, or user, as indicated by which and who is obtained with the getpriority() call and set with the setpriority() call. which is one of PRIO_PROCESS,... |
setregid(2) -- set real and effective group IDs
|
The real and effective group IDs of the current process are set according to the arguments. If the real group ID is changed, the saved group ID is changed to the new value of the effective group ID. U... |
setresgid(2) -- get or set real, effective and saved user or group ID
|
The setresuid() function sets the real, effective and saved user IDs of the current process. The analogous setresgid() sets the real, effective and saved group IDs. Privileged processes may set these ... |
setresuid(2) -- get or set real, effective and saved user or group ID
|
The setresuid() function sets the real, effective and saved user IDs of the current process. The analogous setresgid() sets the real, effective and saved group IDs. Privileged processes may set these ... |
setreuid(2) -- set real and effective user IDs
|
The real and effective user IDs of the current process are set according to the arguments. If the real user ID is changed, or the effective user ID is changed to a value other than the real user ID, t... |
setrlimit(2) -- control maximum system resource consumption
|
Limits on the consumption of system resources by the current process and each process it creates may be obtained with the getrlimit() call, and set with the setrlimit() call. The resource parameter is... |
setsid(2) -- create session and set process group ID
|
The setsid function creates a new session. The calling process is the session leader of the new session, is the process group leader of a new process group and has no controlling terminal. The calling... |
setsockopt(2) -- get and set options on sockets
|
getsockopt() and setsockopt() manipulate the options associated with a socket. Options may exist at multiple protocol levels; they are always present at the uppermost ``socket'' level. When manipula... |
settimeofday(2) -- get/set date and time
|
Note: timezone is no longer used; this information is kept outside the kernel. The system's notion of the current Greenwich time and the current time zone is obtained with the gettimeofday() call, an... |
setuid(2) -- set user and group ID
|
The setuid() function sets the real and effective user IDs and the saved set-user-ID of the current process to the specified value. The setuid() function is permitted if the effective user ID is that ... |
shmat(2) -- map/unmap shared memory
|
shmat() maps the shared memory segment associated with the shared memory identifier shmid into the address space of the calling process. The address at which the segment is mapped is determined by the... |
shmctl(2) -- shared memory control operations
|
The shmctl() system call performs some control operations on the shared memory area specified by shmid. Each shared memory segment has a data structure associated with it, parts of which may be altere... |
shmdt(2) -- map/unmap shared memory
|
shmat() maps the shared memory segment associated with the shared memory identifier shmid into the address space of the calling process. The address at which the segment is mapped is determined by the... |
shmget(2) -- get shared memory area identifier
|
shmget() returns the shared memory identifier associated with the key key. A shared memory segment is created if either key is equal to IPC_PRIVATE, or key does not have a shared memory segment identi... |
shutdown(2) -- shut down part of a full-duplex connection
|
The shutdown() call causes all or part of a full-duplex connection on the socket associated with s to be shut down. If how is SHUT_RD, further receives will be disallowed. If how is SHUT_WR, further s... |
sigaction(2) -- software signal facilities
|
The system defines a set of signals that may be delivered to a process. Signal delivery resembles the occurrence of a hardware interrupt: the signal is normally blocked from further occurrence, the cu... |
sigaltstack(2) -- set and/or get signal stack context
|
sigaltstack() allows users to define an alternate stack on which signals are to be processed. If ss is non-zero, it specifies a pointer to and the size of a signal stack on which to deliver signals, a... |
sigpending(2) -- get pending signals
|
The sigpending function returns a mask of the signals pending for delivery to the calling process in the location indicated by set. Signals may be pending because they are currently masked, or transie... |
sigprocmask(2) -- manipulate current signal mask
|
The sigprocmask() function examines and/or changes the current signal mask (those signals that are blocked from delivery). Signals are blocked if they are members of the current signal mask set. If se... |
sigreturn(2) -- return from signal
|
sigreturn() allows users to atomically unmask, switch stacks, and return from a signal context. The processes signal mask and stack status are restored from the context. The system call does not retur... |
sigstack(2) -- set and/or get signal stack context
|
The sigstack() function has been deprecated in favor of the interface described in sigaltstack(2). |
sigsuspend(2) -- atomically release blocked signals and wait for interrupt
|
sigsuspend() temporarily changes the blocked signal mask to the set to which sigmask points, and then waits for a signal to arrive; on return the previous set of masked signals is restored. The signal... |
socket(2) -- create an endpoint for communication
|
socket() creates an endpoint for communication and returns a descriptor. The domain parameter specifies a communications domain within which communication will take place; this selects the protocol fa... |
socketpair(2) -- create a pair of connected sockets
|
The socketpair() call creates an unnamed pair of connected sockets in the specified domain d, of the specified type, and using the optionally specified protocol. The descriptors used in referencing th... |
stat(2) -- get file status
|
The stat() function obtains information about the file pointed to by path. Read, write, or execute permission of the named file is not required, but all directories listed in the path name leading to ... |
statfs(2) -- get file system statistics
|
statfs() returns information about a mounted file system. path is the path name of any file within the mounted file system. buf is a pointer to a statfs structure defined as follows: typedef struct { ... |
swapctl(2) -- modify swap configuration
|
The swapctl() function is used to add and delete swap devices, and modify their configuration. The cmd parameter specifies the operation to be performed. The arg and misc parameters have different mea... |
symlink(2) -- make symbolic link to a file
|
A symbolic link name2 is created to name1 (name2 is the name of the file created, name1 is the string used in creating the symbolic link). Either name may be an arbitrary path name; the files need not... |
sync(2) -- synchronize disk block in-core status with that on disk
|
The sync() function forces a write of dirty (modified) buffers in the block buffer cache out to disk. The kernel keeps this information in core to reduce the number of disk I/O transfers required by t... |
sysarch(2) -- architecture-dependent system call
|
sysarch() performs the architecture-dependent function specified by number with the arguments specified by the args pointer. args is a pointer to a structure defining the actual arguments of the funct... |
syscall(2) -- indirect system call
|
syscall() performs the system call whose assembly language interface has the specified number with the specified arguments. Symbolic constants for system calls can be found in the header file |
truncate(2) -- truncate or extend a file to a specified length
|
truncate() causes the file named by path or referenced by fd to be truncated or extended to length bytes in size. If the file was larger than this size, the extra data is lost. If the file was smaller... |
umask(2) -- set file creation mode mask
|
The umask() routine sets the process's file mode creation mask to numask and returns the previous value of the mask. The 9 low-order access permission bits of numask are used by system calls, includi... |
unlink(2) -- remove directory entry
|
The unlink() function removes the link named by path from its directory and decrements the link count of the file which was referenced by the link. If that decrement reduces the link count of the file... |
alpha/unmap_memory(2) -- Alpha devices I/O ports and memory access functions
|
The functions in libalpha give userland programs access to the I/O ports on the OpenBSD/alpha platform. The in*() functions return data read from the specified I/O port. The out*() functions write dat... |
unmount(2) -- mount or dismount a filesystem
|
The mount() function grafts a filesystem object onto the system file tree at the point dir. The argument data describes the filesystem object to be mounted. The argument type tells the kernel how to i... |
utimes(2) -- set file access and modification times
|
The access and modification times of the file named by path or referenced by fd are changed as specified by the argument times. If times is NULL, the access and modification times are set to the curre... |
vfork(2) -- spawn new process and block parent
|
vfork() was originally used to create new processes without fully copying the address space of the old process, which is horrendously inefficient in a paged environment. It was useful when the purpose... |
wait(2) -- wait for process termination
|
The wait() function suspends execution of its calling process until status information is available for a terminated child process, or a signal is received. On return from a successful wait() call, th... |
wait3(2) -- wait for process termination
|
The wait() function suspends execution of its calling process until status information is available for a terminated child process, or a signal is received. On return from a successful wait() call, th... |
wait4(2) -- wait for process termination
|
The wait() function suspends execution of its calling process until status information is available for a terminated child process, or a signal is received. On return from a successful wait() call, th... |
waitpid(2) -- wait for process termination
|
The wait() function suspends execution of its calling process until status information is available for a terminated child process, or a signal is received. On return from a successful wait() call, th... |
write(2) -- write output
|
write() attempts to write nbytes of data to the object referenced by the descriptor d from the buffer pointed to by buf. writev() performs the same action, but gathers the output data from the iovcnt ... |
alpha/writeb(2) -- Alpha devices I/O ports and memory access functions
|
The functions in libalpha give userland programs access to the I/O ports on the OpenBSD/alpha platform. The in*() functions return data read from the specified I/O port. The out*() functions write dat... |
alpha/writel(2) -- Alpha devices I/O ports and memory access functions
|
The functions in libalpha give userland programs access to the I/O ports on the OpenBSD/alpha platform. The in*() functions return data read from the specified I/O port. The out*() functions write dat... |
writev(2) -- write output
|
write() attempts to write nbytes of data to the object referenced by the descriptor d from the buffer pointed to by buf. writev() performs the same action, but gathers the output data from the iovcnt ... |
alpha/writew(2) -- Alpha devices I/O ports and memory access functions
|
The functions in libalpha give userland programs access to the I/O ports on the OpenBSD/alpha platform. The in*() functions return data read from the specified I/O port. The out*() functions write dat... |
_exit(2) -- terminate the calling process
|
The _exit() function terminates a process with the following consequences: +o All open file descriptors in the calling process are closed. This may entail delays; for example, waiting for output to dr... |
__syscall(2) -- indirect system call
|
syscall() performs the system call whose assembly language interface has the specified number with the specified arguments. Symbolic constants for system calls can be found in the header file |
a64l(3) -- convert between 32-bit integer and radix-64 ASCII string
|
The a64l() and l64a() functions are used to maintain numbers stored in radix-64 ASCII characters. This is a notation by which 32-bit integers can be represented by up to six characters; each character... |
abort(3) -- cause abnormal program termination
|
The abort() function causes abnormal program termination to occur, unless the signal SIGABRT is being caught and the signal handler does not return. Any open streams are flushed and closed. |
abs(3) -- integer absolute value function
|
The abs() function computes the absolute value of the integer j. |
acos(3) -- arc cosine functions
|
The acos() function computes the principal value of the arc cosine of x in the range [0, pi]. The acosf() is a single precision version of acos(). |
acosf(3) -- arc cosine functions
|
The acos() function computes the principal value of the arc cosine of x in the range [0, pi]. The acosf() is a single precision version of acos(). |
acosh(3) -- inverse hyperbolic cosine functions
|
The acosh() function computes the inverse hyperbolic cosine of the real argument x. The acoshf() function is a single precision version of acosh(). |
acoshf(3) -- inverse hyperbolic cosine functions
|
The acosh() function computes the inverse hyperbolic cosine of the real argument x. The acoshf() function is a single precision version of acosh(). |
acss(3) -- ACSS encryption
|
This library implements the Alleged Content Scrambling System. It is believed to be interoperable with CSS of the DVD Copy Control Association. ACSS is a stream cipher with a fixed key length of 40 bi... |
acss_setkey(3) -- ACSS encryption
|
This library implements the Alleged Content Scrambling System. It is believed to be interoperable with CSS of the DVD Copy Control Association. ACSS is a stream cipher with a fixed key length of 40 bi... |
addch(3) -- add a character (with attributes) to a curses window, then advance the cursor
|
The addch, waddch, mvaddch and mvwaddch routines put the character ch into the given window at its current window position, which is then advanced. They are analogous to putchar in stdio(3). If the ad... |
addchnstr(3) -- add a string of characters (and attributes) to a curses window
|
These routines copy chstr into the window image structure at and after the current cursor position. The four routines with n as the last argument copy at most n elements, but no more than will fit on ... |
addchstr(3) -- add a string of characters (and attributes) to a curses window
|
These routines copy chstr into the window image structure at and after the current cursor position. The four routines with n as the last argument copy at most n elements, but no more than will fit on ... |
addnstr(3) -- add a string of characters to a curses window and advance cursor
|
These routines write the characters of the (null-terminated) character string str on the given window. It is similar to calling waddch once for each character in the string. The four routines with n a... |
addr(3) -- Internet address manipulation routines
|
The routines inet_aton(), inet_addr() and inet_network() interpret character strings representing numbers expressed in the Internet standard `.' notation. The inet_pton() function converts a presenta... |
addstr(3) -- add a string of characters to a curses window and advance cursor
|
These routines write the characters of the (null-terminated) character string str on the given window. It is similar to calling waddch once for each character in the string. The four routines with n a... |
adler32(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
alarm(3) -- set signal timer alarm
|
This interface is made obsolete by setitimer(2). The alarm() function waits a count of seconds before asserting the terminating signal SIGALRM. When the signal has successfully been caught, alarm() re... |
alloca(3) -- memory allocator
|
The alloca() function allocates size bytes of space in the stack frame of the caller. This temporary space is automatically freed on return. |
alphasort(3) -- scan a directory
|
The scandir() function reads the directory dirname and builds an array of pointers to directory entries using malloc(3). It returns the number of entries in the array. A pointer to the array of direct... |
arc4random(3) -- arc4 random number generator
|
The arc4random() function provides a high quality 32-bit pseudo-random number very quickly. arc4random() seeds itself on a regular basis from the kernel strong random number subsystem described in ran... |
arc4random_addrandom(3) -- arc4 random number generator
|
The arc4random() function provides a high quality 32-bit pseudo-random number very quickly. arc4random() seeds itself on a regular basis from the kernel strong random number subsystem described in ran... |
arc4random_stir(3) -- arc4 random number generator
|
The arc4random() function provides a high quality 32-bit pseudo-random number very quickly. arc4random() seeds itself on a regular basis from the kernel strong random number subsystem described in ran... |
asctime(3) -- convert date and time to ASCII
|
The ctime() function converts a time_t, pointed to by clock, representing the time in seconds since 00:00:00 UTC, 1970-01-01, and returns a pointer to a 26-character string of the form Thu Nov 24 18:2... |
asctime_r(3) -- convert date and time to ASCII
|
The ctime() function converts a time_t, pointed to by clock, representing the time in seconds since 00:00:00 UTC, 1970-01-01, and returns a pointer to a 26-character string of the form Thu Nov 24 18:2... |
asin(3) -- arc sine functions
|
The asin() function computes the principal value of the arc sine of x in the range [-pi/2, +pi/2]. The asinf() function is a single precision version of asin(). |
asinf(3) -- arc sine functions
|
The asin() function computes the principal value of the arc sine of x in the range [-pi/2, +pi/2]. The asinf() function is a single precision version of asin(). |
asinh(3) -- inverse hyperbolic sine functions
|
The asinh() function computes the inverse hyperbolic sine of the real argument. The asinhf() function is a single precision version of asinh(). |
asinhf(3) -- inverse hyperbolic sine functions
|
The asinh() function computes the inverse hyperbolic sine of the real argument. The asinhf() function is a single precision version of asinh(). |
asprintf(3) -- formatted output conversion
|
The printf() family of functions produce output according to the given format as described below. This format may contain ``conversion specifiers''; the results of such conversions, if any, depend o... |
assert(3) -- expression verification macro
|
The assert() macro tests the given expression and if it is false, the calling process is terminated. A diagnostic message is written to stderr and the abort(3) function is called, effectively terminat... |
assume_default_colors(3) -- use terminal's default colors
|
The use_default_colors() and assume_default_colors() functions are extensions to the curses library. They are used with terminals that support ISO 6429 color, or equivalent. These terminals allow the ... |
atan(3) -- arc tangent functions of one variable
|
The atan() function computes the principal value of the arc tangent of x in the range [-pi/2, +pi/2]. The atanf() function is a single precision version of atan(). |
atan2(3) -- arc tangent functions of two variables
|
The atan2() function computes the principal value of the arc tangent of y/x, using the signs of both arguments to determine the quadrant of the return value. The atan2f() function is a single precisio... |
atan2f(3) -- arc tangent functions of two variables
|
The atan2() function computes the principal value of the arc tangent of y/x, using the signs of both arguments to determine the quadrant of the return value. The atan2f() function is a single precisio... |
atanf(3) -- arc tangent functions of one variable
|
The atan() function computes the principal value of the arc tangent of x in the range [-pi/2, +pi/2]. The atanf() function is a single precision version of atan(). |
atanh(3) -- inverse hyperbolic tangent functions
|
The atanh() function computes the inverse hyperbolic tangent of the real argument x. The atanhf() function is a single precision version of atanh(). |
atanhf(3) -- inverse hyperbolic tangent functions
|
The atanh() function computes the inverse hyperbolic tangent of the real argument x. The atanhf() function is a single precision version of atanh(). |
atexit(3) -- register a function to be called on exit
|
The atexit() function registers the given function to be called at program exit, whether via exit(3) or via return from the program's main(). Functions so registered are called in reverse order; no a... |
atob8(3) -- S/Key library functions
|
These functions implement the S/Key one time password authentication mechanism. The atob8() function converts the 16-byte hex string in to an 8-byte binary array stored in out. The atob8() function re... |
atof(3) -- convert ASCII string to double
|
The atof() function converts the initial portion of the string pointed to by nptr to double representation. It is equivalent to: strtod(nptr, (char **)NULL); |
atoi(3) -- convert ASCII string to integer
|
The atoi() function converts the initial portion of the string pointed to by nptr to integer representation. It is equivalent to: (int)strtol(nptr, (char **)NULL, 10); |
atol(3) -- convert ASCII string to long integer
|
The atol() function converts the initial portion of the string pointed to by nptr to long integer representation. It is equivalent to: strtol(nptr, (char **)NULL, 10); |
atoll(3) -- convert ASCII string to long long integer
|
The atoll() function converts the initial portion of the string pointed to by nptr to long integer representation. It is equivalent to: strtoll(nptr, (char **)NULL, 10); |
attroff(3) -- curses character and window attribute control routines
|
These routines manipulate the current attributes of the named window. The current attributes of a window apply to all characters that are written into the window with wad- dch, waddstr and wprintw. At... |
attron(3) -- curses character and window attribute control routines
|
These routines manipulate the current attributes of the named window. The current attributes of a window apply to all characters that are written into the window with wad- dch, waddstr and wprintw. At... |
attrset(3) -- curses character and window attribute control routines
|
These routines manipulate the current attributes of the named window. The current attributes of a window apply to all characters that are written into the window with wad- dch, waddstr and wprintw. At... |
attr_get(3) -- curses character and window attribute control routines
|
These routines manipulate the current attributes of the named window. The current attributes of a window apply to all characters that are written into the window with wad- dch, waddstr and wprintw. At... |
attr_off(3) -- curses character and window attribute control routines
|
These routines manipulate the current attributes of the named window. The current attributes of a window apply to all characters that are written into the window with wad- dch, waddstr and wprintw. At... |
attr_on(3) -- curses character and window attribute control routines
|
These routines manipulate the current attributes of the named window. The current attributes of a window apply to all characters that are written into the window with wad- dch, waddstr and wprintw. At... |
attr_set(3) -- curses character and window attribute control routines
|
These routines manipulate the current attributes of the named window. The current attributes of a window apply to all characters that are written into the window with wad- dch, waddstr and wprintw. At... |
authenticate(3) -- simplified interface to the BSD Authentication system
|
These functions provide a simplified interface to the BSD Authentication system (see bsd_auth(3)). The auth_userokay() function provides a single function call interface. Provided with a user's name ... |
authnone_create(3) -- library routines for remote procedure calls
|
These routines establish authentication information for use by the RPC functions described in rpc(3). auth_destroy() is a macro that destroys the authentication information associated with auth. Destr... |
authunix_create(3) -- library routines for remote procedure calls
|
These routines establish authentication information for use by the RPC functions described in rpc(3). auth_destroy() is a macro that destroys the authentication information associated with auth. Destr... |
authunix_create_default(3) -- library routines for remote procedure calls
|
These routines establish authentication information for use by the RPC functions described in rpc(3). auth_destroy() is a macro that destroys the authentication information associated with auth. Destr... |
auth_approval(3) -- simplified interface to the BSD Authentication system
|
These functions provide a simplified interface to the BSD Authentication system (see bsd_auth(3)). The auth_userokay() function provides a single function call interface. Provided with a user's name ... |
auth_call(3) -- interface to the BSD Authentication system
|
These functions provide the lower level interface to the BSD Authentication system. They all operate on a BSD Authentication session pointer, as, which is returned by auth_open(). The session pointer ... |
auth_cat(3) -- simplified interface to the BSD Authentication system
|
These functions provide a simplified interface to the BSD Authentication system (see bsd_auth(3)). The auth_userokay() function provides a single function call interface. Provided with a user's name ... |
auth_challenge(3) -- interface to the BSD Authentication system
|
These functions provide the lower level interface to the BSD Authentication system. They all operate on a BSD Authentication session pointer, as, which is returned by auth_open(). The session pointer ... |
auth_checknologin(3) -- simplified interface to the BSD Authentication system
|
These functions provide a simplified interface to the BSD Authentication system (see bsd_auth(3)). The auth_userokay() function provides a single function call interface. Provided with a user's name ... |
auth_check_change(3) -- interface to the BSD Authentication system
|
These functions provide the lower level interface to the BSD Authentication system. They all operate on a BSD Authentication session pointer, as, which is returned by auth_open(). The session pointer ... |
auth_check_expire(3) -- interface to the BSD Authentication system
|
These functions provide the lower level interface to the BSD Authentication system. They all operate on a BSD Authentication session pointer, as, which is returned by auth_open(). The session pointer ... |
auth_clean(3) -- interface to the BSD Authentication system
|
These functions provide the lower level interface to the BSD Authentication system. They all operate on a BSD Authentication session pointer, as, which is returned by auth_open(). The session pointer ... |
auth_close(3) -- interface to the BSD Authentication system
|
These functions provide the lower level interface to the BSD Authentication system. They all operate on a BSD Authentication session pointer, as, which is returned by auth_open(). The session pointer ... |
auth_clrenv(3) -- interface to the BSD Authentication system
|
These functions provide the lower level interface to the BSD Authentication system. They all operate on a BSD Authentication session pointer, as, which is returned by auth_open(). The session pointer ... |
auth_clroption(3) -- interface to the BSD Authentication system
|
These functions provide the lower level interface to the BSD Authentication system. They all operate on a BSD Authentication session pointer, as, which is returned by auth_open(). The session pointer ... |
auth_clroptions(3) -- interface to the BSD Authentication system
|
These functions provide the lower level interface to the BSD Authentication system. They all operate on a BSD Authentication session pointer, as, which is returned by auth_open(). The session pointer ... |
auth_destroy(3) -- library routines for remote procedure calls
|
These routines establish authentication information for use by the RPC functions described in rpc(3). auth_destroy() is a macro that destroys the authentication information associated with auth. Destr... |
auth_getitem(3) -- interface to the BSD Authentication system
|
These functions provide the lower level interface to the BSD Authentication system. They all operate on a BSD Authentication session pointer, as, which is returned by auth_open(). The session pointer ... |
auth_getpwd(3) -- interface to the BSD Authentication system
|
These functions provide the lower level interface to the BSD Authentication system. They all operate on a BSD Authentication session pointer, as, which is returned by auth_open(). The session pointer ... |
auth_getstate(3) -- interface to the BSD Authentication system
|
These functions provide the lower level interface to the BSD Authentication system. They all operate on a BSD Authentication session pointer, as, which is returned by auth_open(). The session pointer ... |
auth_getvalue(3) -- interface to the BSD Authentication system
|
These functions provide the lower level interface to the BSD Authentication system. They all operate on a BSD Authentication session pointer, as, which is returned by auth_open(). The session pointer ... |
auth_mkvalue(3) -- simplified interface to the BSD Authentication system
|
These functions provide a simplified interface to the BSD Authentication system (see bsd_auth(3)). The auth_userokay() function provides a single function call interface. Provided with a user's name ... |
auth_open(3) -- interface to the BSD Authentication system
|
These functions provide the lower level interface to the BSD Authentication system. They all operate on a BSD Authentication session pointer, as, which is returned by auth_open(). The session pointer ... |
auth_setdata(3) -- interface to the BSD Authentication system
|
These functions provide the lower level interface to the BSD Authentication system. They all operate on a BSD Authentication session pointer, as, which is returned by auth_open(). The session pointer ... |
auth_setenv(3) -- interface to the BSD Authentication system
|
These functions provide the lower level interface to the BSD Authentication system. They all operate on a BSD Authentication session pointer, as, which is returned by auth_open(). The session pointer ... |
auth_setitem(3) -- interface to the BSD Authentication system
|
These functions provide the lower level interface to the BSD Authentication system. They all operate on a BSD Authentication session pointer, as, which is returned by auth_open(). The session pointer ... |
auth_setoption(3) -- interface to the BSD Authentication system
|
These functions provide the lower level interface to the BSD Authentication system. They all operate on a BSD Authentication session pointer, as, which is returned by auth_open(). The session pointer ... |
auth_setpwd(3) -- interface to the BSD Authentication system
|
These functions provide the lower level interface to the BSD Authentication system. They all operate on a BSD Authentication session pointer, as, which is returned by auth_open(). The session pointer ... |
auth_setstate(3) -- interface to the BSD Authentication system
|
These functions provide the lower level interface to the BSD Authentication system. They all operate on a BSD Authentication session pointer, as, which is returned by auth_open(). The session pointer ... |
auth_set_va_list(3) -- interface to the BSD Authentication system
|
These functions provide the lower level interface to the BSD Authentication system. They all operate on a BSD Authentication session pointer, as, which is returned by auth_open(). The session pointer ... |
auth_subr(3) -- interface to the BSD Authentication system
|
These functions provide the lower level interface to the BSD Authentication system. They all operate on a BSD Authentication session pointer, as, which is returned by auth_open(). The session pointer ... |
auth_userchallenge(3) -- simplified interface to the BSD Authentication system
|
These functions provide a simplified interface to the BSD Authentication system (see bsd_auth(3)). The auth_userokay() function provides a single function call interface. Provided with a user's name ... |
auth_usercheck(3) -- simplified interface to the BSD Authentication system
|
These functions provide a simplified interface to the BSD Authentication system (see bsd_auth(3)). The auth_userokay() function provides a single function call interface. Provided with a user's name ... |
auth_userokay(3) -- simplified interface to the BSD Authentication system
|
These functions provide a simplified interface to the BSD Authentication system (see bsd_auth(3)). The auth_userokay() function provides a single function call interface. Provided with a user's name ... |
auth_userresponse(3) -- simplified interface to the BSD Authentication system
|
These functions provide a simplified interface to the BSD Authentication system (see bsd_auth(3)). The auth_userokay() function provides a single function call interface. Provided with a user's name ... |
auth_verify(3) -- simplified interface to the BSD Authentication system
|
These functions provide a simplified interface to the BSD Authentication system (see bsd_auth(3)). The auth_userokay() function provides a single function call interface. Provided with a user's name ... |
backspace(3) -- S/Key library functions
|
These functions implement the S/Key one time password authentication mechanism. The atob8() function converts the 16-byte hex string in to an 8-byte binary array stored in out. The atob8() function re... |
basename(3) -- extract the base portion of a pathname
|
The basename() function returns the last component from the pathname pointed to by path, deleting any trailing `/' characters. If path consists entirely of `/' characters, a pointer to the string "... |
baudrate(3) -- curses environment query routines
|
The baudrate routine returns the output speed of the terminal. The number returned is in bits per second, for example 9600, and is an integer. The erasechar routine returns the user's current erase c... |
bcmp(3) -- compare byte string
|
The bcmp() function compares byte string b1 against byte string b2, returning zero if they are identical, non-zero otherwise. Both strings are assumed to be len bytes long. Zero-length strings are alw... |
bcopy(3) -- copy bytes
|
The bcopy() function copies len bytes from buffer src to buffer dst. The two buffers may overlap. If len is zero, no bytes are copied. |
bcrypt(3) -- DES encryption
|
The crypt() function performs password encryption based on the NBS Data Encryption Standard (DES). Additional code has been added to deter key search attempts and to use stronger hashing algorithms. T... |
bcrypt_gensalt(3) -- DES encryption
|
The crypt() function performs password encryption based on the NBS Data Encryption Standard (DES). Additional code has been added to deter key search attempts and to use stronger hashing algorithms. T... |
beep(3) -- curses bell and screen flash routines
|
The beep and flash routines are used to alert the terminal user. The routine beep sounds an audible alarm on the terminal, if possible; otherwise it flashes the screen (visible bell). The routine flas... |
betoh16(3) -- convert values between different byte orderings
|
These routines convert 16, 32 and 64-bit quantities between different byte orderings. The ``swap'' functions reverse the byte ordering of the given quantity, the others converts either from/to the n... |
betoh32(3) -- convert values between different byte orderings
|
These routines convert 16, 32 and 64-bit quantities between different byte orderings. The ``swap'' functions reverse the byte ordering of the given quantity, the others converts either from/to the n... |
betoh64(3) -- convert values between different byte orderings
|
These routines convert 16, 32 and 64-bit quantities between different byte orderings. The ``swap'' functions reverse the byte ordering of the given quantity, the others converts either from/to the n... |
BF_cbc(3) -- Blowfish encryption
|
This library implements the Blowfish cipher, which was invented and described by Counterpane (see http://www.counterpane.com/blowfish.html ). Blowfish is a block cipher that operates on 64 bit (8 byte... |
BF_cbc_encrypt(3) -- Blowfish encryption
|
This library implements the Blowfish cipher, which was invented and described by Counterpane (see http://www.counterpane.com/blowfish.html ). Blowfish is a block cipher that operates on 64 bit (8 byte... |
BF_cfb64_encrypt(3) -- Blowfish encryption
|
This library implements the Blowfish cipher, which was invented and described by Counterpane (see http://www.counterpane.com/blowfish.html ). Blowfish is a block cipher that operates on 64 bit (8 byte... |
BF_decrypt(3) -- Blowfish encryption
|
This library implements the Blowfish cipher, which was invented and described by Counterpane (see http://www.counterpane.com/blowfish.html ). Blowfish is a block cipher that operates on 64 bit (8 byte... |
BF_ecb(3) -- Blowfish encryption
|
This library implements the Blowfish cipher, which was invented and described by Counterpane (see http://www.counterpane.com/blowfish.html ). Blowfish is a block cipher that operates on 64 bit (8 byte... |
BF_ecb_encrypt(3) -- Blowfish encryption
|
This library implements the Blowfish cipher, which was invented and described by Counterpane (see http://www.counterpane.com/blowfish.html ). Blowfish is a block cipher that operates on 64 bit (8 byte... |
BF_encrypt(3) -- Blowfish encryption
|
This library implements the Blowfish cipher, which was invented and described by Counterpane (see http://www.counterpane.com/blowfish.html ). Blowfish is a block cipher that operates on 64 bit (8 byte... |
BF_ofb64_encrypt(3) -- Blowfish encryption
|
This library implements the Blowfish cipher, which was invented and described by Counterpane (see http://www.counterpane.com/blowfish.html ). Blowfish is a block cipher that operates on 64 bit (8 byte... |
BF_options(3) -- Blowfish encryption
|
This library implements the Blowfish cipher, which was invented and described by Counterpane (see http://www.counterpane.com/blowfish.html ). Blowfish is a block cipher that operates on 64 bit (8 byte... |
BF_set_key(3) -- Blowfish encryption
|
This library implements the Blowfish cipher, which was invented and described by Counterpane (see http://www.counterpane.com/blowfish.html ). Blowfish is a block cipher that operates on 64 bit (8 byte... |
bindresvport(3) -- bind a socket to a privileged IP port
|
The bindresvport() and bindresvport_sa() functions are used to bind a socket descriptor to a privileged IP port, that is, a port number in the range 0-1023. The bindresvport() function operates solely... |
bindresvport_sa(3) -- bind a socket to a privileged IP port
|
The bindresvport() and bindresvport_sa() functions are used to bind a socket descriptor to a privileged IP port, that is, a port number in the range 0-1023. The bindresvport() function operates solely... |
bitstring(3) -- bit-string manipulation macros
|
These macros operate on strings of bits. The bit_alloc() macro returns a pointer of type bitstr_t * to sufficient space to store nbits bits, or NULL if no space is available. The bit_decl() macro allo... |
bitstr_size(3) -- bit-string manipulation macros
|
These macros operate on strings of bits. The bit_alloc() macro returns a pointer of type bitstr_t * to sufficient space to store nbits bits, or NULL if no space is available. The bit_decl() macro allo... |
bit_alloc(3) -- bit-string manipulation macros
|
These macros operate on strings of bits. The bit_alloc() macro returns a pointer of type bitstr_t * to sufficient space to store nbits bits, or NULL if no space is available. The bit_decl() macro allo... |
bit_clear(3) -- bit-string manipulation macros
|
These macros operate on strings of bits. The bit_alloc() macro returns a pointer of type bitstr_t * to sufficient space to store nbits bits, or NULL if no space is available. The bit_decl() macro allo... |
bit_decl(3) -- bit-string manipulation macros
|
These macros operate on strings of bits. The bit_alloc() macro returns a pointer of type bitstr_t * to sufficient space to store nbits bits, or NULL if no space is available. The bit_decl() macro allo... |
bit_ffc(3) -- bit-string manipulation macros
|
These macros operate on strings of bits. The bit_alloc() macro returns a pointer of type bitstr_t * to sufficient space to store nbits bits, or NULL if no space is available. The bit_decl() macro allo... |
bit_ffs(3) -- bit-string manipulation macros
|
These macros operate on strings of bits. The bit_alloc() macro returns a pointer of type bitstr_t * to sufficient space to store nbits bits, or NULL if no space is available. The bit_decl() macro allo... |
bit_nclear(3) -- bit-string manipulation macros
|
These macros operate on strings of bits. The bit_alloc() macro returns a pointer of type bitstr_t * to sufficient space to store nbits bits, or NULL if no space is available. The bit_decl() macro allo... |
bit_nset(3) -- bit-string manipulation macros
|
These macros operate on strings of bits. The bit_alloc() macro returns a pointer of type bitstr_t * to sufficient space to store nbits bits, or NULL if no space is available. The bit_decl() macro allo... |
bit_set(3) -- bit-string manipulation macros
|
These macros operate on strings of bits. The bit_alloc() macro returns a pointer of type bitstr_t * to sufficient space to store nbits bits, or NULL if no space is available. The bit_decl() macro allo... |
bit_size(3) -- bit-string manipulation macros
|
These macros operate on strings of bits. The bit_alloc() macro returns a pointer of type bitstr_t * to sufficient space to store nbits bits, or NULL if no space is available. The bit_decl() macro allo... |
bit_test(3) -- bit-string manipulation macros
|
These macros operate on strings of bits. The bit_alloc() macro returns a pointer of type bitstr_t * to sufficient space to store nbits bits, or NULL if no space is available. The bit_decl() macro allo... |
bkgd(3) -- curses window background manipulation routines
|
The bkgdset and wbkgdset routines manipulate the background of the named window. The window background is a chtype consisting of any combination of attributes (i.e., rendition) and a character. The at... |
bkgdset(3) -- curses window background manipulation routines
|
The bkgdset and wbkgdset routines manipulate the background of the named window. The window background is a chtype consisting of any combination of attributes (i.e., rendition) and a character. The at... |
blf_cbc_decrypt(3) -- Blowfish encryption
|
Blowfish is a fast unpatented block cipher designed by Bruce Schneier. It basically consists of a 16 times iterated Feistel network. The block size is 64 bit and the maximum key size is 448 bit. The b... |
blf_cbc_encrypt(3) -- Blowfish encryption
|
Blowfish is a fast unpatented block cipher designed by Bruce Schneier. It basically consists of a 16 times iterated Feistel network. The block size is 64 bit and the maximum key size is 448 bit. The b... |
blf_dec(3) -- Blowfish encryption
|
Blowfish is a fast unpatented block cipher designed by Bruce Schneier. It basically consists of a 16 times iterated Feistel network. The block size is 64 bit and the maximum key size is 448 bit. The b... |
blf_ecb_decrypt(3) -- Blowfish encryption
|
Blowfish is a fast unpatented block cipher designed by Bruce Schneier. It basically consists of a 16 times iterated Feistel network. The block size is 64 bit and the maximum key size is 448 bit. The b... |
blf_ecb_encrypt(3) -- Blowfish encryption
|
Blowfish is a fast unpatented block cipher designed by Bruce Schneier. It basically consists of a 16 times iterated Feistel network. The block size is 64 bit and the maximum key size is 448 bit. The b... |
blf_enc(3) -- Blowfish encryption
|
Blowfish is a fast unpatented block cipher designed by Bruce Schneier. It basically consists of a 16 times iterated Feistel network. The block size is 64 bit and the maximum key size is 448 bit. The b... |
blf_key(3) -- Blowfish encryption
|
Blowfish is a fast unpatented block cipher designed by Bruce Schneier. It basically consists of a 16 times iterated Feistel network. The block size is 64 bit and the maximum key size is 448 bit. The b... |
blowfish(3) -- Blowfish encryption
|
This library implements the Blowfish cipher, which was invented and described by Counterpane (see http://www.counterpane.com/blowfish.html ). Blowfish is a block cipher that operates on 64 bit (8 byte... |
bm(3) -- Boyer-Moore string search
|
These routines implement an efficient mechanism to find an occurrence of a byte string within another byte string. bm_comp() evaluates patlen bytes starting at pattern and returns a pointer to a struc... |
bm_comp(3) -- Boyer-Moore string search
|
These routines implement an efficient mechanism to find an occurrence of a byte string within another byte string. bm_comp() evaluates patlen bytes starting at pattern and returns a pointer to a struc... |
bm_exec(3) -- Boyer-Moore string search
|
These routines implement an efficient mechanism to find an occurrence of a byte string within another byte string. bm_comp() evaluates patlen bytes starting at pattern and returns a pointer to a struc... |
bm_free(3) -- Boyer-Moore string search
|
These routines implement an efficient mechanism to find an occurrence of a byte string within another byte string. bm_comp() evaluates patlen bytes starting at pattern and returns a pointer to a struc... |
bn(3) -- multiprecision integer arithmetics
|
This library performs arithmetic operations on integers of arbitrary size. It was written for use in public key cryptography, such as RSA and Diffie-Hellman. It uses dynamic memory allocation for stor... |
BN_add(3) -- arithmetic operations on BIGNUMs
|
BN_add() adds a and b and places the result in r ("r=a+b"). r may be the same BIGNUM as a or b. BN_sub() subtracts b from a and places the result in r ("r=a-b"). BN_mul() multiplies a and b and pl... |
BN_add_word(3) -- arithmetic functions on BIGNUMs with integers
|
These functions perform arithmetic operations on BIGNUMs with unsigned integers. They are much more efficient than the normal BIGNUM arithmetic operations. BN_add_word() adds w to a ("a+=w"). BN_sub... |
bn_add_words(3) -- BIGNUM library internal functions
|
This page documents the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
BN_bin2bn(3) -- format conversions
|
BN_bn2bin() converts the absolute value of a into bigendian form and stores it at to. to must point to BN_num_bytes(a) bytes of memory. BN_bin2bn() converts the positive integer in big-endian form of ... |
BN_bn2bin(3) -- format conversions
|
BN_bn2bin() converts the absolute value of a into bigendian form and stores it at to. to must point to BN_num_bytes(a) bytes of memory. BN_bin2bn() converts the positive integer in big-endian form of ... |
BN_bn2dec(3) -- format conversions
|
BN_bn2bin() converts the absolute value of a into bigendian form and stores it at to. to must point to BN_num_bytes(a) bytes of memory. BN_bin2bn() converts the positive integer in big-endian form of ... |
BN_bn2hex(3) -- format conversions
|
BN_bn2bin() converts the absolute value of a into bigendian form and stores it at to. to must point to BN_num_bytes(a) bytes of memory. BN_bin2bn() converts the positive integer in big-endian form of ... |
BN_bn2mpi(3) -- format conversions
|
BN_bn2bin() converts the absolute value of a into bigendian form and stores it at to. to must point to BN_num_bytes(a) bytes of memory. BN_bin2bn() converts the positive integer in big-endian form of ... |
bn_check_top(3) -- BIGNUM library internal functions
|
This page documents the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
BN_clear(3) -- allocate and free BIGNUMs
|
BN_new() allocated and initializes a BIGNUM structure. BN_init() initializes an existing uninitialized BIGNUM. BN_clear() is used to destroy sensitive data such as keys when they are no longer needed.... |
BN_clear_bit(3) -- bit operations on BIGNUMs
|
BN_set_bit() sets bit n in a to 1 ("a|=(1< |
BN_clear_free(3) -- allocate and free BIGNUMs
|
BN_new() allocated and initializes a BIGNUM structure. BN_init() initializes an existing uninitialized BIGNUM. BN_clear() is used to destroy sensitive data such as keys when they are no longer needed.... |
BN_cmp(3) -- BIGNUM comparison and test functions
|
BN_cmp() compares the numbers a and b. BN_ucmp() compares their absolute values. BN_is_zero(), BN_is_one() and BN_is_word() test if a equals 0, 1, or w respectively. BN_is_odd() tests if a is odd. BN_... |
bn_cmp_words(3) -- BIGNUM library internal functions
|
This page documents the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
BN_copy(3) -- copy BIGNUMs
|
BN_copy() copies from to to. BN_dup() creates a new BIGNUM containing the value from. |
BN_CTX_end(3) -- use temporary BIGNUM variables
|
These functions are used to obtain temporary BIGNUM variables from a BN_CTX (which can been created by using BN_CTX_new(3)) in order to save the overhead of repeatedly creating and freeing BIGNUMs in ... |
BN_CTX_free(3) -- allocate and free BN_CTX structures
|
A BN_CTX is a structure that holds BIGNUM temporary variables used by library functions. Since dynamic memory allocation to create BIGNUMs is rather expensive when used in conjunction with repeated su... |
BN_CTX_get(3) -- use temporary BIGNUM variables
|
These functions are used to obtain temporary BIGNUM variables from a BN_CTX (which can been created by using BN_CTX_new(3)) in order to save the overhead of repeatedly creating and freeing BIGNUMs in ... |
BN_CTX_init(3) -- allocate and free BN_CTX structures
|
A BN_CTX is a structure that holds BIGNUM temporary variables used by library functions. Since dynamic memory allocation to create BIGNUMs is rather expensive when used in conjunction with repeated su... |
BN_CTX_new(3) -- allocate and free BN_CTX structures
|
A BN_CTX is a structure that holds BIGNUM temporary variables used by library functions. Since dynamic memory allocation to create BIGNUMs is rather expensive when used in conjunction with repeated su... |
BN_CTX_start(3) -- use temporary BIGNUM variables
|
These functions are used to obtain temporary BIGNUM variables from a BN_CTX (which can been created by using BN_CTX_new(3)) in order to save the overhead of repeatedly creating and freeing BIGNUMs in ... |
BN_dec2bn(3) -- format conversions
|
BN_bn2bin() converts the absolute value of a into bigendian form and stores it at to. to must point to BN_num_bytes(a) bytes of memory. BN_bin2bn() converts the positive integer in big-endian form of ... |
BN_div(3) -- arithmetic operations on BIGNUMs
|
BN_add() adds a and b and places the result in r ("r=a+b"). r may be the same BIGNUM as a or b. BN_sub() subtracts b from a and places the result in r ("r=a-b"). BN_mul() multiplies a and b and pl... |
BN_div_recp(3) -- modular multiplication using reciprocal
|
BN_mod_mul_reciprocal() can be used to perform an efficient BN_mod_mul(3) operation when the operation will be performed repeatedly with the same modulus. It computes r=(a*b)%m using recp=1/m, which i... |
BN_div_word(3) -- arithmetic functions on BIGNUMs with integers
|
These functions perform arithmetic operations on BIGNUMs with unsigned integers. They are much more efficient than the normal BIGNUM arithmetic operations. BN_add_word() adds w to a ("a+=w"). BN_sub... |
bn_div_words(3) -- BIGNUM library internal functions
|
This page documents the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
bn_dump(3) -- BIGNUM library internal functions
|
This page documents the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
BN_dup(3) -- copy BIGNUMs
|
BN_copy() copies from to to. BN_dup() creates a new BIGNUM containing the value from. |
BN_exp(3) -- arithmetic operations on BIGNUMs
|
BN_add() adds a and b and places the result in r ("r=a+b"). r may be the same BIGNUM as a or b. BN_sub() subtracts b from a and places the result in r ("r=a-b"). BN_mul() multiplies a and b and pl... |
bn_expand(3) -- BIGNUM library internal functions
|
This page documents the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
bn_expand2(3) -- BIGNUM library internal functions
|
This page documents the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
bn_fix_top(3) -- BIGNUM library internal functions
|
This page documents the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
BN_free(3) -- allocate and free BIGNUMs
|
BN_new() allocated and initializes a BIGNUM structure. BN_init() initializes an existing uninitialized BIGNUM. BN_clear() is used to destroy sensitive data such as keys when they are no longer needed.... |
BN_from_montgomery(3) -- Montgomery multiplication
|
These functions implement Montgomery multiplication. They are used automatically when BN_mod_exp(3) is called with suitable input, but they may be useful when several operations are to be performed us... |
BN_gcd(3) -- arithmetic operations on BIGNUMs
|
BN_add() adds a and b and places the result in r ("r=a+b"). r may be the same BIGNUM as a or b. BN_sub() subtracts b from a and places the result in r ("r=a-b"). BN_mul() multiplies a and b and pl... |
BN_generate_prime(3) -- generate primes and test for primality
|
BN_generate_prime() generates a pseudo-random prime number of num bits. If ret is not NULL, it will be used to store the number. If callback is not NULL, it is called as follows: o callback(0, i, cb_a... |
BN_get_word(3) -- BIGNUM assignment operations
|
BN_zero(), BN_one() and BN_set_word() set a to the values 0, 1 and w respectively. BN_zero() and BN_one() are macros. BN_value_one() returns a BIGNUM constant of value 1. This constant is useful for u... |
BN_hex2bn(3) -- format conversions
|
BN_bn2bin() converts the absolute value of a into bigendian form and stores it at to. to must point to BN_num_bytes(a) bytes of memory. BN_bin2bn() converts the positive integer in big-endian form of ... |
BN_init(3) -- allocate and free BIGNUMs
|
BN_new() allocated and initializes a BIGNUM structure. BN_init() initializes an existing uninitialized BIGNUM. BN_clear() is used to destroy sensitive data such as keys when they are no longer needed.... |
bn_internal(3) -- BIGNUM library internal functions
|
This page documents the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
BN_is_bit_set(3) -- bit operations on BIGNUMs
|
BN_set_bit() sets bit n in a to 1 ("a|=(1< |
BN_is_odd(3) -- BIGNUM comparison and test functions
|
BN_cmp() compares the numbers a and b. BN_ucmp() compares their absolute values. BN_is_zero(), BN_is_one() and BN_is_word() test if a equals 0, 1, or w respectively. BN_is_odd() tests if a is odd. BN_... |
BN_is_one(3) -- BIGNUM comparison and test functions
|
BN_cmp() compares the numbers a and b. BN_ucmp() compares their absolute values. BN_is_zero(), BN_is_one() and BN_is_word() test if a equals 0, 1, or w respectively. BN_is_odd() tests if a is odd. BN_... |
BN_is_prime(3) -- generate primes and test for primality
|
BN_generate_prime() generates a pseudo-random prime number of num bits. If ret is not NULL, it will be used to store the number. If callback is not NULL, it is called as follows: o callback(0, i, cb_a... |
BN_is_prime_fasttest(3) -- generate primes and test for primality
|
BN_generate_prime() generates a pseudo-random prime number of num bits. If ret is not NULL, it will be used to store the number. If callback is not NULL, it is called as follows: o callback(0, i, cb_a... |
BN_is_word(3) -- BIGNUM comparison and test functions
|
BN_cmp() compares the numbers a and b. BN_ucmp() compares their absolute values. BN_is_zero(), BN_is_one() and BN_is_word() test if a equals 0, 1, or w respectively. BN_is_odd() tests if a is odd. BN_... |
BN_is_zero(3) -- BIGNUM comparison and test functions
|
BN_cmp() compares the numbers a and b. BN_ucmp() compares their absolute values. BN_is_zero(), BN_is_one() and BN_is_word() test if a equals 0, 1, or w respectively. BN_is_odd() tests if a is odd. BN_... |
BN_lshift(3) -- bit operations on BIGNUMs
|
BN_set_bit() sets bit n in a to 1 ("a|=(1< |
BN_lshift1(3) -- bit operations on BIGNUMs
|
BN_set_bit() sets bit n in a to 1 ("a|=(1< |
BN_mask_bits(3) -- bit operations on BIGNUMs
|
BN_set_bit() sets bit n in a to 1 ("a|=(1< |
BN_mod(3) -- arithmetic operations on BIGNUMs
|
BN_add() adds a and b and places the result in r ("r=a+b"). r may be the same BIGNUM as a or b. BN_sub() subtracts b from a and places the result in r ("r=a-b"). BN_mul() multiplies a and b and pl... |
BN_mod_exp(3) -- arithmetic operations on BIGNUMs
|
BN_add() adds a and b and places the result in r ("r=a+b"). r may be the same BIGNUM as a or b. BN_sub() subtracts b from a and places the result in r ("r=a-b"). BN_mul() multiplies a and b and pl... |
BN_mod_inverse(3) -- compute inverse modulo n
|
BN_mod_inverse() computes the inverse of a modulo n places the result in r ("(a*r)%n==1"). If r is NULL, a new BIGNUM is created. ctx is a previously allocated BN_CTX used for temporary variables. r... |
BN_mod_mul(3) -- arithmetic operations on BIGNUMs
|
BN_add() adds a and b and places the result in r ("r=a+b"). r may be the same BIGNUM as a or b. BN_sub() subtracts b from a and places the result in r ("r=a-b"). BN_mul() multiplies a and b and pl... |
BN_mod_mul_montgomery(3) -- Montgomery multiplication
|
These functions implement Montgomery multiplication. They are used automatically when BN_mod_exp(3) is called with suitable input, but they may be useful when several operations are to be performed us... |
BN_mod_mul_reciprocal(3) -- modular multiplication using reciprocal
|
BN_mod_mul_reciprocal() can be used to perform an efficient BN_mod_mul(3) operation when the operation will be performed repeatedly with the same modulus. It computes r=(a*b)%m using recp=1/m, which i... |
BN_mod_word(3) -- arithmetic functions on BIGNUMs with integers
|
These functions perform arithmetic operations on BIGNUMs with unsigned integers. They are much more efficient than the normal BIGNUM arithmetic operations. BN_add_word() adds w to a ("a+=w"). BN_sub... |
BN_MONT_CTX_copy(3) -- Montgomery multiplication
|
These functions implement Montgomery multiplication. They are used automatically when BN_mod_exp(3) is called with suitable input, but they may be useful when several operations are to be performed us... |
BN_MONT_CTX_free(3) -- Montgomery multiplication
|
These functions implement Montgomery multiplication. They are used automatically when BN_mod_exp(3) is called with suitable input, but they may be useful when several operations are to be performed us... |
BN_MONT_CTX_init(3) -- Montgomery multiplication
|
These functions implement Montgomery multiplication. They are used automatically when BN_mod_exp(3) is called with suitable input, but they may be useful when several operations are to be performed us... |
BN_MONT_CTX_new(3) -- Montgomery multiplication
|
These functions implement Montgomery multiplication. They are used automatically when BN_mod_exp(3) is called with suitable input, but they may be useful when several operations are to be performed us... |
BN_MONT_CTX_set(3) -- Montgomery multiplication
|
These functions implement Montgomery multiplication. They are used automatically when BN_mod_exp(3) is called with suitable input, but they may be useful when several operations are to be performed us... |
BN_mpi2bn(3) -- format conversions
|
BN_bn2bin() converts the absolute value of a into bigendian form and stores it at to. to must point to BN_num_bytes(a) bytes of memory. BN_bin2bn() converts the positive integer in big-endian form of ... |
BN_mul(3) -- arithmetic operations on BIGNUMs
|
BN_add() adds a and b and places the result in r ("r=a+b"). r may be the same BIGNUM as a or b. BN_sub() subtracts b from a and places the result in r ("r=a-b"). BN_mul() multiplies a and b and pl... |
bn_mul_add_words(3) -- BIGNUM library internal functions
|
This page documents the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
bn_mul_comba4(3) -- BIGNUM library internal functions
|
This page documents the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
bn_mul_comba8(3) -- BIGNUM library internal functions
|
This page documents the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
bn_mul_high(3) -- BIGNUM library internal functions
|
This page documents the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
bn_mul_low_normal(3) -- BIGNUM library internal functions
|
This page documents the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
bn_mul_low_recursive(3) -- BIGNUM library internal functions
|
This page documents the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
bn_mul_normal(3) -- BIGNUM library internal functions
|
This page documents the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
bn_mul_part_recursive(3) -- BIGNUM library internal functions
|
This page documents the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
bn_mul_recursive(3) -- BIGNUM library internal functions
|
This page documents the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
BN_mul_word(3) -- arithmetic functions on BIGNUMs with integers
|
These functions perform arithmetic operations on BIGNUMs with unsigned integers. They are much more efficient than the normal BIGNUM arithmetic operations. BN_add_word() adds w to a ("a+=w"). BN_sub... |
bn_mul_words(3) -- BIGNUM library internal functions
|
This page documents the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
BN_new(3) -- allocate and free BIGNUMs
|
BN_new() allocated and initializes a BIGNUM structure. BN_init() initializes an existing uninitialized BIGNUM. BN_clear() is used to destroy sensitive data such as keys when they are no longer needed.... |
BN_num_bits(3) -- get BIGNUM size
|
These functions return the size of a BIGNUM in bytes or bits, and the size of an unsigned integer in bits. BN_num_bytes() is a macro. |
BN_num_bits_word(3) -- get BIGNUM size
|
These functions return the size of a BIGNUM in bytes or bits, and the size of an unsigned integer in bits. BN_num_bytes() is a macro. |
BN_num_bytes(3) -- get BIGNUM size
|
These functions return the size of a BIGNUM in bytes or bits, and the size of an unsigned integer in bits. BN_num_bytes() is a macro. |
BN_one(3) -- BIGNUM assignment operations
|
BN_zero(), BN_one() and BN_set_word() set a to the values 0, 1 and w respectively. BN_zero() and BN_one() are macros. BN_value_one() returns a BIGNUM constant of value 1. This constant is useful for u... |
BN_print(3) -- format conversions
|
BN_bn2bin() converts the absolute value of a into bigendian form and stores it at to. to must point to BN_num_bytes(a) bytes of memory. BN_bin2bn() converts the positive integer in big-endian form of ... |
bn_print(3) -- BIGNUM library internal functions
|
This page documents the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
BN_print_fp(3) -- format conversions
|
BN_bn2bin() converts the absolute value of a into bigendian form and stores it at to. to must point to BN_num_bytes(a) bytes of memory. BN_bin2bn() converts the positive integer in big-endian form of ... |
BN_pseudo_rand(3) -- generate pseudo-random number
|
BN_rand() generates a cryptographically strong pseudo-random number of bits bits in length and stores it in rnd. If top is -1, the most significant bit of the random number can be zero. If top is 0, i... |
BN_rand(3) -- generate pseudo-random number
|
BN_rand() generates a cryptographically strong pseudo-random number of bits bits in length and stores it in rnd. If top is -1, the most significant bit of the random number can be zero. If top is 0, i... |
BN_rand_range(3) -- generate pseudo-random number
|
BN_rand() generates a cryptographically strong pseudo-random number of bits bits in length and stores it in rnd. If top is -1, the most significant bit of the random number can be zero. If top is 0, i... |
BN_RECP_CTX_free(3) -- modular multiplication using reciprocal
|
BN_mod_mul_reciprocal() can be used to perform an efficient BN_mod_mul(3) operation when the operation will be performed repeatedly with the same modulus. It computes r=(a*b)%m using recp=1/m, which i... |
BN_RECP_CTX_init(3) -- modular multiplication using reciprocal
|
BN_mod_mul_reciprocal() can be used to perform an efficient BN_mod_mul(3) operation when the operation will be performed repeatedly with the same modulus. It computes r=(a*b)%m using recp=1/m, which i... |
BN_RECP_CTX_new(3) -- modular multiplication using reciprocal
|
BN_mod_mul_reciprocal() can be used to perform an efficient BN_mod_mul(3) operation when the operation will be performed repeatedly with the same modulus. It computes r=(a*b)%m using recp=1/m, which i... |
BN_RECP_CTX_set(3) -- modular multiplication using reciprocal
|
BN_mod_mul_reciprocal() can be used to perform an efficient BN_mod_mul(3) operation when the operation will be performed repeatedly with the same modulus. It computes r=(a*b)%m using recp=1/m, which i... |
BN_rshift(3) -- bit operations on BIGNUMs
|
BN_set_bit() sets bit n in a to 1 ("a|=(1< |
BN_rshift1(3) -- bit operations on BIGNUMs
|
BN_set_bit() sets bit n in a to 1 ("a|=(1< |
BN_set_bit(3) -- bit operations on BIGNUMs
|
BN_set_bit() sets bit n in a to 1 ("a|=(1< |
bn_set_high(3) -- BIGNUM library internal functions
|
This page documents the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
bn_set_low(3) -- BIGNUM library internal functions
|
This page documents the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
bn_set_max(3) -- BIGNUM library internal functions
|
This page documents the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
BN_set_word(3) -- BIGNUM assignment operations
|
BN_zero(), BN_one() and BN_set_word() set a to the values 0, 1 and w respectively. BN_zero() and BN_one() are macros. BN_value_one() returns a BIGNUM constant of value 1. This constant is useful for u... |
BN_sqr(3) -- arithmetic operations on BIGNUMs
|
BN_add() adds a and b and places the result in r ("r=a+b"). r may be the same BIGNUM as a or b. BN_sub() subtracts b from a and places the result in r ("r=a-b"). BN_mul() multiplies a and b and pl... |
bn_sqr_comba4(3) -- BIGNUM library internal functions
|
This page documents the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
bn_sqr_comba8(3) -- BIGNUM library internal functions
|
This page documents the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
bn_sqr_normal(3) -- BIGNUM library internal functions
|
This page documents the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
bn_sqr_recursive(3) -- BIGNUM library internal functions
|
This page documents the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
bn_sqr_words(3) -- BIGNUM library internal functions
|
This page documents the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
BN_sub(3) -- arithmetic operations on BIGNUMs
|
BN_add() adds a and b and places the result in r ("r=a+b"). r may be the same BIGNUM as a or b. BN_sub() subtracts b from a and places the result in r ("r=a-b"). BN_mul() multiplies a and b and pl... |
BN_sub_word(3) -- arithmetic functions on BIGNUMs with integers
|
These functions perform arithmetic operations on BIGNUMs with unsigned integers. They are much more efficient than the normal BIGNUM arithmetic operations. BN_add_word() adds w to a ("a+=w"). BN_sub... |
bn_sub_words(3) -- BIGNUM library internal functions
|
This page documents the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
BN_swap(3) -- exchange BIGNUMs
|
BN_swap() exchanges the values of a and b. bn(3) |
BN_to_montgomery(3) -- Montgomery multiplication
|
These functions implement Montgomery multiplication. They are used automatically when BN_mod_exp(3) is called with suitable input, but they may be useful when several operations are to be performed us... |
BN_ucmp(3) -- BIGNUM comparison and test functions
|
BN_cmp() compares the numbers a and b. BN_ucmp() compares their absolute values. BN_is_zero(), BN_is_one() and BN_is_word() test if a equals 0, 1, or w respectively. BN_is_odd() tests if a is odd. BN_... |
BN_value_one(3) -- BIGNUM assignment operations
|
BN_zero(), BN_one() and BN_set_word() set a to the values 0, 1 and w respectively. BN_zero() and BN_one() are macros. BN_value_one() returns a BIGNUM constant of value 1. This constant is useful for u... |
bn_wexpand(3) -- BIGNUM library internal functions
|
This page documents the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
BN_zero(3) -- BIGNUM assignment operations
|
BN_zero(), BN_one() and BN_set_word() set a to the values 0, 1 and w respectively. BN_zero() and BN_one() are macros. BN_value_one() returns a BIGNUM constant of value 1. This constant is useful for u... |
border(3) -- create curses borders, horizontal and vertical lines
|
The border, wborder and box routines draw a box around the edges of a window. The argument ls is a character and attributes used for the left side of the border, rs - right side, ts - top side, bs - b... |
bottom_panel(3) -- panel stack extension for curses
|
Panels are curses(3) windows with the added feature of depth. Panel functions allow the use of stacked windows and ensure the proper portions of each window and the curses stdscr window are hidden or ... |
box(3) -- create curses borders, horizontal and vertical lines
|
The border, wborder and box routines draw a box around the edges of a window. The argument ls is a character and attributes used for the left side of the border, rs - right side, ts - top side, bs - b... |
bsd_auth(3) -- interface to the BSD Authentication system
|
These functions provide the lower level interface to the BSD Authentication system. They all operate on a BSD Authentication session pointer, as, which is returned by auth_open(). The session pointer ... |
bsearch(3) -- binary search of a sorted table
|
The bsearch() function searches an array of nmemb objects, the initial member of which is pointed to by base, for a member that matches the object pointed to by key. The size of each member of the arr... |
bstring(3) -- byte string operations
|
These functions operate on variable length strings of bytes. They do not check for terminating null bytes as the routines listed in string(3) do. See the specific manual pages for more information. |
btoa8(3) -- S/Key library functions
|
These functions implement the S/Key one time password authentication mechanism. The atob8() function converts the 16-byte hex string in to an 8-byte binary array stored in out. The atob8() function re... |
btoe(3) -- S/Key library functions
|
These functions implement the S/Key one time password authentication mechanism. The atob8() function converts the 16-byte hex string in to an 8-byte binary array stored in out. The atob8() function re... |
btree(3) -- btree database access method
|
The dbopen() routine is the library interface to database files. One of the supported file formats is btree files. The general description of the database access methods is in dbopen(3). This manual p... |
bufferevent_disable(3) -- execute a function when a specific event occurs
|
The event API provides a mechanism to execute a function when a specific event on a file descriptor occurs or after a given time has passed. The event API needs to be initialized with event_init() bef... |
bufferevent_enable(3) -- execute a function when a specific event occurs
|
The event API provides a mechanism to execute a function when a specific event on a file descriptor occurs or after a given time has passed. The event API needs to be initialized with event_init() bef... |
bufferevent_free(3) -- execute a function when a specific event occurs
|
The event API provides a mechanism to execute a function when a specific event on a file descriptor occurs or after a given time has passed. The event API needs to be initialized with event_init() bef... |
bufferevent_new(3) -- execute a function when a specific event occurs
|
The event API provides a mechanism to execute a function when a specific event on a file descriptor occurs or after a given time has passed. The event API needs to be initialized with event_init() bef... |
bufferevent_read(3) -- execute a function when a specific event occurs
|
The event API provides a mechanism to execute a function when a specific event on a file descriptor occurs or after a given time has passed. The event API needs to be initialized with event_init() bef... |
bufferevent_settimeout(3) -- execute a function when a specific event occurs
|
The event API provides a mechanism to execute a function when a specific event on a file descriptor occurs or after a given time has passed. The event API needs to be initialized with event_init() bef... |
bufferevent_write(3) -- execute a function when a specific event occurs
|
The event API provides a mechanism to execute a function when a specific event on a file descriptor occurs or after a given time has passed. The event API needs to be initialized with event_init() bef... |
bufferevent_write_buffer(3) -- execute a function when a specific event occurs
|
The event API provides a mechanism to execute a function when a specific event on a file descriptor occurs or after a given time has passed. The event API needs to be initialized with event_init() bef... |
BUF_MEM_free(3) -- simple character arrays structure
|
The buffer library handles simple character arrays. Buffers are used for various purposes in the library, most notably memory BIOs. The library uses the BUF_MEM structure defined in buffer.h: typedef ... |
BUF_MEM_grow(3) -- simple character arrays structure
|
The buffer library handles simple character arrays. Buffers are used for various purposes in the library, most notably memory BIOs. The library uses the BUF_MEM structure defined in buffer.h: typedef ... |
BUF_MEM_new(3) -- simple character arrays structure
|
The buffer library handles simple character arrays. Buffers are used for various purposes in the library, most notably memory BIOs. The library uses the BUF_MEM structure defined in buffer.h: typedef ... |
BUF_strdup(3) -- simple character arrays structure
|
The buffer library handles simple character arrays. Buffers are used for various purposes in the library, most notably memory BIOs. The library uses the BUF_MEM structure defined in buffer.h: typedef ... |
byteorder(3) -- convert values between different byte orderings
|
These routines convert 16, 32 and 64-bit quantities between different byte orderings. The ``swap'' functions reverse the byte ordering of the given quantity, the others converts either from/to the n... |
bzero(3) -- write zeroes to a byte string
|
The bzero() function writes len zero bytes to the string b. If len is zero, bzero() does nothing. |
cabs(3) -- Euclidean distance and complex absolute value functions
|
The hypot() and cabs() functions compute the sqrt(x*x+y*y) in such a way that underflow will not happen, and overflow occurs only if the final result deserves it. The hypotf() and cabsf() functions ar... |
cabsf(3) -- Euclidean distance and complex absolute value functions
|
The hypot() and cabs() functions compute the sqrt(x*x+y*y) in such a way that underflow will not happen, and overflow occurs only if the final result deserves it. The hypotf() and cabsf() functions ar... |
calloc(3) -- memory allocation and deallocation
|
The malloc() function allocates uninitialized space for an object whose size is specified by size. The malloc() function maintains multiple lists of free blocks according to size, allocating space fro... |
callrpc(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
can_change_color(3) -- curses color manipulation routines
|
Overview curses support color attributes on terminals with that capability. To use these routines start_color must be called, usually right after initscr. Colors are always used in pairs (referred to ... |
catclose(3) -- close message catalog
|
The catclose() function closes the message catalog specified by the argument catd. |
catgets(3) -- retrieve string from message catalog
|
The catgets() function attempts to retrieve message msg_id of set set_id from the message catalog referenced by the descriptor catd. The argument s points to a default message which is returned if the... |
catopen(3) -- open message catalog
|
The catopen() function opens the message catalog specified by name and returns a message catalog descriptor. If name contains a `/', then name specifies the full pathname for the message catalog, oth... |
cbreak(3) -- curses input options
|
Normally, the tty driver buffers typed characters until a newline or carriage return is typed. The cbreak routine disables line buffering and erase/kill character-processing (interrupt and flow contro... |
cbrt(3) -- cube root and square root functions
|
The cbrt() function computes the cube root of x. The cbrtf() function is a single precision version of cbrt(). The sqrt() function computes the non-negative square root of x. The sqrtf() function is a... |
cbrtf(3) -- cube root and square root functions
|
The cbrt() function computes the cube root of x. The cbrtf() function is a single precision version of cbrt(). The sqrt() function computes the non-negative square root of x. The sqrtf() function is a... |
ceil(3) -- round to smallest integral value greater than or equal to x
|
The ceil() function returns the smallest integral value greater than or equal to x. The ceilf() function is a single precision version of ceil(). |
ceilf(3) -- round to smallest integral value greater than or equal to x
|
The ceil() function returns the smallest integral value greater than or equal to x. The ceilf() function is a single precision version of ceil(). |
cfgetispeed(3) -- manipulating the termios structure
|
The cfmakeraw(), tcgetattr(), and tcsetattr() functions are provided for getting and setting the termios structure. The cfgetispeed(), cfsetispeed(), cfgetospeed(), cfsetospeed(), and cfsetspeed() fun... |
cfgetospeed(3) -- manipulating the termios structure
|
The cfmakeraw(), tcgetattr(), and tcsetattr() functions are provided for getting and setting the termios structure. The cfgetispeed(), cfsetispeed(), cfgetospeed(), cfsetospeed(), and cfsetspeed() fun... |
cfmakeraw(3) -- manipulating the termios structure
|
The cfmakeraw(), tcgetattr(), and tcsetattr() functions are provided for getting and setting the termios structure. The cfgetispeed(), cfsetispeed(), cfgetospeed(), cfsetospeed(), and cfsetspeed() fun... |
cfree(3) -- memory allocation and deallocation
|
The malloc() function allocates uninitialized space for an object whose size is specified by size. The malloc() function maintains multiple lists of free blocks according to size, allocating space fro... |
cfsetispeed(3) -- manipulating the termios structure
|
The cfmakeraw(), tcgetattr(), and tcsetattr() functions are provided for getting and setting the termios structure. The cfgetispeed(), cfsetispeed(), cfgetospeed(), cfsetospeed(), and cfsetspeed() fun... |
cfsetospeed(3) -- manipulating the termios structure
|
The cfmakeraw(), tcgetattr(), and tcsetattr() functions are provided for getting and setting the termios structure. The cfgetispeed(), cfsetispeed(), cfgetospeed(), cfsetospeed(), and cfsetspeed() fun... |
cfsetspeed(3) -- manipulating the termios structure
|
The cfmakeraw(), tcgetattr(), and tcsetattr() functions are provided for getting and setting the termios structure. The cfgetispeed(), cfsetispeed(), cfgetospeed(), cfsetospeed(), and cfsetspeed() fun... |
cgetcap(3) -- capability database access routines
|
The cgetent() function extracts the capability record name from the database specified by the null-terminated file array db_array and returns a pointer to a copy of it in buf. cgetent() will first loo... |
cgetclose(3) -- capability database access routines
|
The cgetent() function extracts the capability record name from the database specified by the null-terminated file array db_array and returns a pointer to a copy of it in buf. cgetent() will first loo... |
cgetent(3) -- capability database access routines
|
The cgetent() function extracts the capability record name from the database specified by the null-terminated file array db_array and returns a pointer to a copy of it in buf. cgetent() will first loo... |
cgetfirst(3) -- capability database access routines
|
The cgetent() function extracts the capability record name from the database specified by the null-terminated file array db_array and returns a pointer to a copy of it in buf. cgetent() will first loo... |
cgetmatch(3) -- capability database access routines
|
The cgetent() function extracts the capability record name from the database specified by the null-terminated file array db_array and returns a pointer to a copy of it in buf. cgetent() will first loo... |
cgetnext(3) -- capability database access routines
|
The cgetent() function extracts the capability record name from the database specified by the null-terminated file array db_array and returns a pointer to a copy of it in buf. cgetent() will first loo... |
cgetnum(3) -- capability database access routines
|
The cgetent() function extracts the capability record name from the database specified by the null-terminated file array db_array and returns a pointer to a copy of it in buf. cgetent() will first loo... |
cgetset(3) -- capability database access routines
|
The cgetent() function extracts the capability record name from the database specified by the null-terminated file array db_array and returns a pointer to a copy of it in buf. cgetent() will first loo... |
cgetstr(3) -- capability database access routines
|
The cgetent() function extracts the capability record name from the database specified by the null-terminated file array db_array and returns a pointer to a copy of it in buf. cgetent() will first loo... |
cgetusedb(3) -- capability database access routines
|
The cgetent() function extracts the capability record name from the database specified by the null-terminated file array db_array and returns a pointer to a copy of it in buf. cgetent() will first loo... |
cgetustr(3) -- capability database access routines
|
The cgetent() function extracts the capability record name from the database specified by the null-terminated file array db_array and returns a pointer to a copy of it in buf. cgetent() will first loo... |
check_expire(3) -- check for password expiration
|
The login_check_expire() function is called by a BSD authentication login script to check whether the user's password entry, as described by pwd, has expired. If a class is specified, it is used inst... |
chgat(3) -- curses character and window attribute control routines
|
These routines manipulate the current attributes of the named window. The current attributes of a window apply to all characters that are written into the window with wad- dch, waddstr and wprintw. At... |
CIRCLEQ_EMPTY(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
CIRCLEQ_END(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
CIRCLEQ_ENTRY(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
CIRCLEQ_FIRST(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
CIRCLEQ_FOREACH(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
CIRCLEQ_FOREACH_REVERSE(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
CIRCLEQ_HEAD(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
CIRCLEQ_HEAD_INITIALIZER(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
CIRCLEQ_INIT(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
CIRCLEQ_INSERT_AFTER(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
CIRCLEQ_INSERT_BEFORE(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
CIRCLEQ_INSERT_HEAD(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
CIRCLEQ_INSERT_TAIL(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
CIRCLEQ_LAST(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
CIRCLEQ_NEXT(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
CIRCLEQ_PREV(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
CIRCLEQ_REMOVE(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
clear(3) -- clear all or part of a curses window
|
The erase and werase routines copy blanks to every position in the window, clearing the screen. The clear and wclear routines are like erase and werase, but they also call clearok, so that the screen ... |
clearerr(3) -- check and reset stream status
|
The function clearerr() clears the end-of-file and error indicators for the stream pointed to by stream. The function feof() tests the end-of-file indicator for the stream pointed to by stream, return... |
clearok(3) -- curses output options
|
These routines set options that change the style of output within curses. All options are initially FALSE, unless otherwise stated. It is not necessary to turn these options off before calling endwin.... |
clntraw_create(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
clnttcp_create(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
clntudp_bufcreate(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
clntudp_create(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
clnt_broadcast(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
clnt_call(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
clnt_control(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
clnt_create(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
clnt_destroy(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
clnt_freeres(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
clnt_geterr(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
clnt_pcreateerror(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
clnt_perrno(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
clnt_perror(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
clnt_spcreateerror(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
clnt_sperrno(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
clnt_sperror(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
clock(3) -- determine processor time used
|
The clock() function determines the amount of processor time used since the invocation of the calling process, measured in CLOCKS_PER_SECs. |
closedir(3) -- directory operations
|
The opendir() function opens the directory named by filename, associates a directory stream with it, and returns a pointer to be used to identify the directory stream in subsequent operations. A null ... |
closelog(3) -- control system log
|
The syslog() function writes message to the system message logger. The message is then written to the system console, log files, logged-in users, or forwarded to other machines as appropriate (see sys... |
closelog_r(3) -- control system log
|
The syslog() function writes message to the system message logger. The message is then written to the system console, log files, logged-in users, or forwarded to other machines as appropriate (see sys... |
clrtobot(3) -- clear all or part of a curses window
|
The erase and werase routines copy blanks to every position in the window, clearing the screen. The clear and wclear routines are like erase and werase, but they also call clearok, so that the screen ... |
clrtoeol(3) -- clear all or part of a curses window
|
The erase and werase routines copy blanks to every position in the window, clearing the screen. The clear and wclear routines are like erase and werase, but they also call clearok, so that the screen ... |
color_content(3) -- curses color manipulation routines
|
Overview curses support color attributes on terminals with that capability. To use these routines start_color must be called, usually right after initscr. Colors are always used in pairs (referred to ... |
COLOR_PAIR(3) -- curses color manipulation routines
|
Overview curses support color attributes on terminals with that capability. To use these routines start_color must be called, usually right after initscr. Colors are always used in pairs (referred to ... |
color_set(3) -- curses character and window attribute control routines
|
These routines manipulate the current attributes of the named window. The current attributes of a window apply to all characters that are written into the window with wad- dch, waddstr and wprintw. At... |
compress(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
compress2(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
compressBound(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
com_err(3) -- common error display routine
|
Com_err displays an error message on the standard error stream stderr (see stdio(3S)) composed of the whoami string, which should specify the program name or some subportion of a program, followed by ... |
confstr(3) -- get string-valued configurable variables
|
This interface is obsoleted by sysctl(3). The confstr() function provides a method for applications to get configuration defined string values. The name argument specifies the system variable to be qu... |
copysign(3) -- functions for IEEE arithmetic
|
These functions are required or recommended by IEEE Std 754-1985. copysign() returns x with its sign changed to y's. The copysignf() function is a single precision version of copysign(). finite() ret... |
copysignf(3) -- functions for IEEE arithmetic
|
These functions are required or recommended by IEEE Std 754-1985. copysign() returns x with its sign changed to y's. The copysignf() function is a single precision version of copysign(). finite() ret... |
copywin(3) -- overlay and manipulate overlapped curses windows
|
The overlay and overwrite routines overlay srcwin on top of dstwin. scrwin and dstwin are not required to be the same size; only text where the two windows overlap is copied. The difference is that ov... |
cos(3) -- cosine functions
|
The cos() function computes the cosine of x (measured in radians). The cosf() function is a single precision version of cos(). A large magnitude argument may yield a result with little or no significa... |
cosf(3) -- cosine functions
|
The cos() function computes the cosine of x (measured in radians). The cosf() function is a single precision version of cos(). A large magnitude argument may yield a result with little or no significa... |
cosh(3) -- hyperbolic cosine functions
|
The cosh() function computes the hyperbolic cosine of x. The coshf() function is a single precision version of cosh(). |
coshf(3) -- hyperbolic cosine functions
|
The cosh() function computes the hyperbolic cosine of x. The coshf() function is a single precision version of cosh(). |
crc32(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
creat(3) -- create a new file
|
This interface is made obsolete by: open(2). creat() is the same as: open(path, O_CREAT | O_TRUNC | O_WRONLY, mode); |
crypt(3) -- DES encryption
|
The crypt() function performs password encryption based on the NBS Data Encryption Standard (DES). Additional code has been added to deter key search attempts and to use stronger hashing algorithms. T... |
crypto(3) -- OpenSSL cryptographic library
|
|
CRYPTO_add(3) -- OpenSSL thread support
|
OpenSSL can safely be used in multi-threaded applications provided that at least two callback functions are set. locking_function(int mode, int n, const char *file, int line) is needed to perform lock... |
CRYPTO_add_lock(3) -- OpenSSL thread support
|
OpenSSL can safely be used in multi-threaded applications provided that at least two callback functions are set. locking_function(int mode, int n, const char *file, int line) is needed to perform lock... |
CRYPTO_destroy_dynlockid(3) -- OpenSSL thread support
|
OpenSSL can safely be used in multi-threaded applications provided that at least two callback functions are set. locking_function(int mode, int n, const char *file, int line) is needed to perform lock... |
CRYPTO_get_ex_data(3) -- internal application specific data functions
|
Several OpenSSL structures can have application specific data attached to them. These functions are used internally by OpenSSL to manipulate application specific data attached to a specific structure.... |
CRYPTO_get_new_dynlockid(3) -- OpenSSL thread support
|
OpenSSL can safely be used in multi-threaded applications provided that at least two callback functions are set. locking_function(int mode, int n, const char *file, int line) is needed to perform lock... |
CRYPTO_lock(3) -- OpenSSL thread support
|
OpenSSL can safely be used in multi-threaded applications provided that at least two callback functions are set. locking_function(int mode, int n, const char *file, int line) is needed to perform lock... |
CRYPTO_num_locks(3) -- OpenSSL thread support
|
OpenSSL can safely be used in multi-threaded applications provided that at least two callback functions are set. locking_function(int mode, int n, const char *file, int line) is needed to perform lock... |
CRYPTO_r_lock(3) -- OpenSSL thread support
|
OpenSSL can safely be used in multi-threaded applications provided that at least two callback functions are set. locking_function(int mode, int n, const char *file, int line) is needed to perform lock... |
CRYPTO_r_unlock(3) -- OpenSSL thread support
|
OpenSSL can safely be used in multi-threaded applications provided that at least two callback functions are set. locking_function(int mode, int n, const char *file, int line) is needed to perform lock... |
CRYPTO_set_dynlock_create_callback(3) -- OpenSSL thread support
|
OpenSSL can safely be used in multi-threaded applications provided that at least two callback functions are set. locking_function(int mode, int n, const char *file, int line) is needed to perform lock... |
CRYPTO_set_dynlock_destroy_callback(3) -- OpenSSL thread support
|
OpenSSL can safely be used in multi-threaded applications provided that at least two callback functions are set. locking_function(int mode, int n, const char *file, int line) is needed to perform lock... |
CRYPTO_set_dynlock_lock_callback(3) -- OpenSSL thread support
|
OpenSSL can safely be used in multi-threaded applications provided that at least two callback functions are set. locking_function(int mode, int n, const char *file, int line) is needed to perform lock... |
CRYPTO_set_ex_data(3) -- internal application specific data functions
|
Several OpenSSL structures can have application specific data attached to them. These functions are used internally by OpenSSL to manipulate application specific data attached to a specific structure.... |
CRYPTO_set_id_callback(3) -- OpenSSL thread support
|
OpenSSL can safely be used in multi-threaded applications provided that at least two callback functions are set. locking_function(int mode, int n, const char *file, int line) is needed to perform lock... |
CRYPTO_set_locking_callback(3) -- OpenSSL thread support
|
OpenSSL can safely be used in multi-threaded applications provided that at least two callback functions are set. locking_function(int mode, int n, const char *file, int line) is needed to perform lock... |
CRYPTO_w_lock(3) -- OpenSSL thread support
|
OpenSSL can safely be used in multi-threaded applications provided that at least two callback functions are set. locking_function(int mode, int n, const char *file, int line) is needed to perform lock... |
CRYPTO_w_unlock(3) -- OpenSSL thread support
|
OpenSSL can safely be used in multi-threaded applications provided that at least two callback functions are set. locking_function(int mode, int n, const char *file, int line) is needed to perform lock... |
ctermid(3) -- generate terminal pathname
|
The ctermid() function generates a string, that, when used as a pathname, refers to the current controlling terminal of the calling process. If buf is a null pointer, a pointer to a static area is ret... |
ctime(3) -- convert date and time to ASCII
|
The ctime() function converts a time_t, pointed to by clock, representing the time in seconds since 00:00:00 UTC, 1970-01-01, and returns a pointer to a 26-character string of the form Thu Nov 24 18:2... |
ctime_r(3) -- convert date and time to ASCII
|
The ctime() function converts a time_t, pointed to by clock, representing the time in seconds since 00:00:00 UTC, 1970-01-01, and returns a pointer to a 26-character string of the form Thu Nov 24 18:2... |
ctype(3) -- character classification macros
|
The above macros perform character tests and conversions on the integer c. See each function's own manual page for more information. |
current_field(3) -- set and get form page number
|
The function set_current field sets the current field of the given form; current_field returns the current field of the given form. The function set_form_page sets the form's page number (goes to pag... |
current_item(3) -- set and get current_menu_item
|
The function set_current_item sets the current item (the item on which the menu cursor is positioned). cur- rent_item returns a pointer to the current item in the given menu. The function set_top_row ... |
curses(3) -- CRT screen handling and optimization package
|
The curses library routines give the user a terminal-independent method of updating character screens with reasonable optimization. This implementation is ``new curses'' (ncurses) and is the approve... |
curses_version(3) -- miscellaneous curses extensions
|
These functions are extensions to the curses library which do not fit easily into other categories. Use curses_version() to get the version number, including patch level of the library, e.g., 5.0.1999... |
curs_addch(3) -- add a character (with attributes) to a curses window, then advance the cursor
|
The addch, waddch, mvaddch and mvwaddch routines put the character ch into the given window at its current window position, which is then advanced. They are analogous to putchar in stdio(3). If the ad... |
curs_addchstr(3) -- add a string of characters (and attributes) to a curses window
|
These routines copy chstr into the window image structure at and after the current cursor position. The four routines with n as the last argument copy at most n elements, but no more than will fit on ... |
curs_addstr(3) -- add a string of characters to a curses window and advance cursor
|
These routines write the characters of the (null-terminated) character string str on the given window. It is similar to calling waddch once for each character in the string. The four routines with n a... |
curs_attr(3) -- curses character and window attribute control routines
|
These routines manipulate the current attributes of the named window. The current attributes of a window apply to all characters that are written into the window with wad- dch, waddstr and wprintw. At... |
curs_beep(3) -- curses bell and screen flash routines
|
The beep and flash routines are used to alert the terminal user. The routine beep sounds an audible alarm on the terminal, if possible; otherwise it flashes the screen (visible bell). The routine flas... |
curs_bkgd(3) -- curses window background manipulation routines
|
The bkgdset and wbkgdset routines manipulate the background of the named window. The window background is a chtype consisting of any combination of attributes (i.e., rendition) and a character. The at... |
curs_border(3) -- create curses borders, horizontal and vertical lines
|
The border, wborder and box routines draw a box around the edges of a window. The argument ls is a character and attributes used for the left side of the border, rs - right side, ts - top side, bs - b... |
curs_clear(3) -- clear all or part of a curses window
|
The erase and werase routines copy blanks to every position in the window, clearing the screen. The clear and wclear routines are like erase and werase, but they also call clearok, so that the screen ... |
curs_color(3) -- curses color manipulation routines
|
Overview curses support color attributes on terminals with that capability. To use these routines start_color must be called, usually right after initscr. Colors are always used in pairs (referred to ... |
curs_delch(3) -- delete character under the cursor in a curses window
|
These routines delete the character under the cursor; all characters to the right of the cursor on the same line are moved to the left one position and the last character on the line is filled with a ... |
curs_deleteln(3) -- delete and insert lines in a curses window
|
The deleteln and wdeleteln routines delete the line under the cursor in the window; all lines below the current line are moved up one line. The bottom line of the window is cleared. The cursor positio... |
curs_extend(3) -- miscellaneous curses extensions
|
These functions are extensions to the curses library which do not fit easily into other categories. Use curses_version() to get the version number, including patch level of the library, e.g., 5.0.1999... |
curs_getch(3) -- get (or push back) characters from curses terminal keyboard
|
The getch, wgetch, mvgetch and mvwgetch, routines read a character from the window. In no-delay mode, if no input is waiting, the value ERR is returned. In delay mode, the program waits until the syst... |
curs_getstr(3) -- accept character strings from curses terminal keyboard
|
The function getstr is equivalent to a series of calls to getch, until a newline or carriage return is received (the terminating character is not included in the returned string). The resulting value ... |
curs_getyx(3) -- get curses cursor and window coordinates
|
The getyx macro places the current cursor position of the given window in the two integer variables y and x. If win is a subwindow, the getparyx macro places the beginning coordinates of the subwindow... |
curs_inch(3) -- get a character and attributes from a curses window
|
These routines return the character, of type chtype, at the current position in the named window. If any attributes are set for that position, their values are OR'ed into the value returned. Constant... |
curs_inchstr(3) -- get a string of characters (and attributes) from a curses window
|
These routines return a NULL-terminated array of chtype quantities, starting at the current cursor position in the named window and ending at the right margin of the window. The four functions with n ... |
curs_initscr(3) -- curses screen initialization and manipulation routines
|
initscr is normally the first curses routine to call when initializing a program. A few special routines sometimes need to be called before it; these are slk_init, filter, ripoffline, use_env. For mul... |
curs_inopts(3) -- curses input options
|
Normally, the tty driver buffers typed characters until a newline or carriage return is typed. The cbreak routine disables line buffering and erase/kill character-processing (interrupt and flow contro... |
curs_insch(3) -- insert a character before cursor in a curses window
|
These routines insert the character ch before the character under the cursor. All characters to the right of the cursor are moved one space to the right, with the possibility of the rightmost characte... |
curs_insstr(3) -- insert string before cursor in a curses window
|
These routines insert a character string (as many characters as will fit on the line) before the character under the cursor. All characters to the right of the cursor are shifted right, with the possi... |
curs_instr(3) -- get a string of characters from a curses window
|
These routines return a string of characters in str, extracted starting at the current cursor position in the named window. Attributes are stripped from the characters. The four functions with n as th... |
curs_kernel(3) -- low-level curses routines
|
The following routines give low-level access to various curses capabilities. Theses routines typically are used inside library routines. The def_prog_mode and def_shell_mode routines save the current ... |
curs_mouse(3) -- mouse interface through curses
|
These functions provide an interface to mouse events from curses(3). Mouse events are represented by KEY_MOUSE pseudo-key values in the wgetch input stream. To make mouse events visible, use the mouse... |
curs_move(3) -- move curses window cursor
|
These routines move the cursor associated with the window to line y and column x. This routine does not move the physical cursor of the terminal until refresh is called. The position specified is rela... |
curs_outopts(3) -- curses output options
|
These routines set options that change the style of output within curses. All options are initially FALSE, unless otherwise stated. It is not necessary to turn these options off before calling endwin.... |
curs_overlay(3) -- overlay and manipulate overlapped curses windows
|
The overlay and overwrite routines overlay srcwin on top of dstwin. scrwin and dstwin are not required to be the same size; only text where the two windows overlap is copied. The difference is that ov... |
curs_pad(3) -- create and display curses pads
|
The newpad routine creates and returns a pointer to a new pad data structure with the given number of lines, nlines, and columns, ncols. A pad is like a window, except that it is not restricted by the... |
curs_print(3) -- ship binary data to printer
|
This function uses the mc5p or mc4 and mc5 capabilities, if they are present, to ship given data to a printer attached to the terminal. Note that the mcprint code has no way to do flow control with th... |
curs_printw(3) -- print formatted output in curses windows
|
The printw, wprintw, mvprintw and mvwprintw routines are analogous to printf [see printf(3)]. In effect, the string that would be output by printf is output instead as though waddstr were used on the ... |
curs_refresh(3) -- refresh curses windows and lines
|
The refresh and wrefresh routines (or wnoutrefresh and doupdate) must be called to get actual output to the terminal, as other routines merely manipulate data structures. The routine wrefresh copies t... |
curs_scanw(3) -- convert formatted input from a curses window
|
The scanw, wscanw and mvscanw routines are analogous to scanf [see scanf(3)]. The effect of these routines is as though wgetstr were called on the window, and the resulting line used as input for ssca... |
curs_scroll(3) -- scroll a curses window
|
The scroll routine scrolls the window up one line. This involves moving the lines in the window data structure. As an optimization, if the scrolling region of the window is the entire screen, the phys... |
curs_scr_dump(3) -- read (write) a curses screen from (to) a file
|
The scr_dump routine dumps the current contents of the virtual screen to the file filename. The scr_restore routine sets the virtual screen to the contents of filename, which must have been written us... |
curs_set(3) -- low-level curses routines
|
The following routines give low-level access to various curses capabilities. Theses routines typically are used inside library routines. The def_prog_mode and def_shell_mode routines save the current ... |
curs_slk(3) -- curses soft label routines
|
The slk* functions manipulate the set of soft function-key labels that exist on many terminals. For those terminals that do not have soft labels, curses takes over the bottom line of stdscr, reducing ... |
curs_termattrs(3) -- curses environment query routines
|
The baudrate routine returns the output speed of the terminal. The number returned is in bits per second, for example 9600, and is an integer. The erasechar routine returns the user's current erase c... |
curs_touch(3) -- curses refresh control routines
|
The touchwin and touchline routines throw away all optimization information about which parts of the window have been touched, by pretending that the entire window has been drawn on. This is sometimes... |
curs_util(3) -- miscellaneous curses utility routines
|
The unctrl macro expands to a character string which is a printable representation of the character c. Control characters are displayed in the ^X notation. Printing characters are displayed as is. The... |
curs_window(3) -- create curses windows
|
Calling newwin creates and returns a pointer to a new window with the given number of lines and columns. The upper left-hand corner of the window is at line begin_y, column begin_x. If either nlines o... |
cuserid(3) -- get user name
|
This interface is available from the compatibility library, libcompat. The cuserid() function returns a character string representation of the user name associated with the effective user ID of the ca... |
d2i_DHparams(3) -- PKCS#3 DH parameter functions.
|
These functions decode and encode PKCS#3 DH parameters using the DHparameter structure described in PKCS#3. Othewise these behave in a similar way to d2i_X509() and i2d_X509() described in the d2i_X50... |
d2i_DSAparams(3) -- Digital Signature Algorithm
|
These functions implement the Digital Signature Algorithm (DSA). The generation of shared DSA parameters is described in DSA_generate_parameters(3); DSA_generate_key(3) describes how to generate a sig... |
d2i_DSAPrivateKey(3) -- Digital Signature Algorithm
|
These functions implement the Digital Signature Algorithm (DSA). The generation of shared DSA parameters is described in DSA_generate_parameters(3); DSA_generate_key(3) describes how to generate a sig... |
d2i_DSAPublicKey(3) -- Digital Signature Algorithm
|
These functions implement the Digital Signature Algorithm (DSA). The generation of shared DSA parameters is described in DSA_generate_parameters(3); DSA_generate_key(3) describes how to generate a sig... |
d2i_DSA_SIG(3) -- Digital Signature Algorithm
|
These functions implement the Digital Signature Algorithm (DSA). The generation of shared DSA parameters is described in DSA_generate_parameters(3); DSA_generate_key(3) describes how to generate a sig... |
d2i_Netscape_RSA(3) -- RSA public and private key encoding functions.
|
d2i_RSAPublicKey() and i2d_RSAPublicKey() decode and encode a PKCS#1 RSAPublicKey structure. d2i_RSA_PUBKEY() and i2d_RSA_PUBKEY() decode and encode an RSA public key using a SubjectPublicKeyInfo (cer... |
d2i_RSAPrivateKey(3) -- RSA public and private key encoding functions.
|
d2i_RSAPublicKey() and i2d_RSAPublicKey() decode and encode a PKCS#1 RSAPublicKey structure. d2i_RSA_PUBKEY() and i2d_RSA_PUBKEY() decode and encode an RSA public key using a SubjectPublicKeyInfo (cer... |
d2i_RSAPublicKey(3) -- RSA public and private key encoding functions.
|
d2i_RSAPublicKey() and i2d_RSAPublicKey() decode and encode a PKCS#1 RSAPublicKey structure. d2i_RSA_PUBKEY() and i2d_RSA_PUBKEY() decode and encode an RSA public key using a SubjectPublicKeyInfo (cer... |
d2i_SSL_SESSION(3) -- convert SSL_SESSION object from/to ASN1 representation
|
d2i_SSL_SESSION() transforms the external ASN1 representation of an SSL/TLS session, stored as binary data at location pp with length length, into an SSL_SESSION object. i2d_SSL_SESSION() transforms t... |
daemon(3) -- run in the background
|
The daemon() function is for programs wishing to detach themselves from the controlling terminal and run in the background as system daemons. Unless the argument nochdir is non-zero, daemon() changes ... |
data_ahead(3) -- test for off-screen data in given forms
|
The function data_ahead tests whether there is off-screen data ahead in the given form. It returns TRUE (1) or FALSE (0). The function data_behind tests whether there is off-screen data behind in the ... |
data_behind(3) -- test for off-screen data in given forms
|
The function data_ahead tests whether there is off-screen data ahead in the given form. It returns TRUE (1) or FALSE (0). The function data_behind tests whether there is off-screen data behind in the ... |
db(3) -- database access methods
|
The dbopen() function is the library interface to database files. The supported file formats are btree, hashed, and UNIX file oriented. The btree format is a representation of a sorted, balanced tree ... |
dbm(3) -- database subroutines
|
These functions provide a dbm-compatible interface to the database access methods described in db(3). Each unique record in the database is a key/content pair, the components of which may be any arbit... |
dbmclose(3) -- database subroutines
|
These functions provide a dbm-compatible interface to the database access methods described in db(3). Each unique record in the database is a key/content pair, the components of which may be any arbit... |
dbminit(3) -- database subroutines
|
These functions provide a dbm-compatible interface to the database access methods described in db(3). Each unique record in the database is a key/content pair, the components of which may be any arbit... |
dbm_clearerr(3) -- database access methods
|
These functions provide a ndbm-compatible interface to the database access methods described in db(3). Each unique record in the database is a key/content pair, the components of which may be any arbi... |
dbm_close(3) -- database access methods
|
These functions provide a ndbm-compatible interface to the database access methods described in db(3). Each unique record in the database is a key/content pair, the components of which may be any arbi... |
dbm_delete(3) -- database access methods
|
These functions provide a ndbm-compatible interface to the database access methods described in db(3). Each unique record in the database is a key/content pair, the components of which may be any arbi... |
dbm_dirfno(3) -- database access methods
|
These functions provide a ndbm-compatible interface to the database access methods described in db(3). Each unique record in the database is a key/content pair, the components of which may be any arbi... |
dbm_error(3) -- database access methods
|
These functions provide a ndbm-compatible interface to the database access methods described in db(3). Each unique record in the database is a key/content pair, the components of which may be any arbi... |
dbm_fetch(3) -- database access methods
|
These functions provide a ndbm-compatible interface to the database access methods described in db(3). Each unique record in the database is a key/content pair, the components of which may be any arbi... |
dbm_firstkey(3) -- database access methods
|
These functions provide a ndbm-compatible interface to the database access methods described in db(3). Each unique record in the database is a key/content pair, the components of which may be any arbi... |
dbm_nextkey(3) -- database access methods
|
These functions provide a ndbm-compatible interface to the database access methods described in db(3). Each unique record in the database is a key/content pair, the components of which may be any arbi... |
dbm_open(3) -- database access methods
|
These functions provide a ndbm-compatible interface to the database access methods described in db(3). Each unique record in the database is a key/content pair, the components of which may be any arbi... |
dbm_pagfno(3) -- database access methods
|
These functions provide a ndbm-compatible interface to the database access methods described in db(3). Each unique record in the database is a key/content pair, the components of which may be any arbi... |
dbm_store(3) -- database access methods
|
These functions provide a ndbm-compatible interface to the database access methods described in db(3). Each unique record in the database is a key/content pair, the components of which may be any arbi... |
dbopen(3) -- database access methods
|
The dbopen() function is the library interface to database files. The supported file formats are btree, hashed, and UNIX file oriented. The btree format is a representation of a sorted, balanced tree ... |
default_colors(3) -- use terminal's default colors
|
The use_default_colors() and assume_default_colors() functions are extensions to the curses library. They are used with terminals that support ISO 6429 color, or equivalent. These terminals allow the ... |
define_key(3) -- define a keycode
|
This is an extension to the curses library. It permits an application to define keycodes with their corresponding control strings, so that the curses library will interpret them just as it would the p... |
deflate(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
deflateBound(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
deflateCopy(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
deflateEnd(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
deflateInit(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
deflateInit2(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
deflateParams(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
deflatePrime(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
deflateReset(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
deflateSetDictionary(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
def_prog_mode(3) -- low-level curses routines
|
The following routines give low-level access to various curses capabilities. Theses routines typically are used inside library routines. The def_prog_mode and def_shell_mode routines save the current ... |
def_shell_mode(3) -- low-level curses routines
|
The following routines give low-level access to various curses capabilities. Theses routines typically are used inside library routines. The def_prog_mode and def_shell_mode routines save the current ... |
delay_output(3) -- miscellaneous curses utility routines
|
The unctrl macro expands to a character string which is a printable representation of the character c. Control characters are displayed in the ^X notation. Printing characters are displayed as is. The... |
delch(3) -- delete character under the cursor in a curses window
|
These routines delete the character under the cursor; all characters to the right of the cursor on the same line are moved to the left one position and the last character on the line is filled with a ... |
delete(3) -- database subroutines
|
These functions provide a dbm-compatible interface to the database access methods described in db(3). Each unique record in the database is a key/content pair, the components of which may be any arbit... |
deleteln(3) -- delete and insert lines in a curses window
|
The deleteln and wdeleteln routines delete the line under the cursor in the window; all lines below the current line are moved up one line. The bottom line of the window is cleared. The cursor positio... |
delscreen(3) -- curses screen initialization and manipulation routines
|
initscr is normally the first curses routine to call when initializing a program. A few special routines sometimes need to be called before it; these are slk_init, filter, ripoffline, use_env. For mul... |
delwin(3) -- create curses windows
|
Calling newwin creates and returns a pointer to a new window with the given number of lines and columns. The upper left-hand corner of the window is at line begin_y, column begin_x. If either nlines o... |
del_curterm(3) -- curses interfaces to terminfo database
|
These low-level routines must be called by programs that have to deal directly with the terminfo database to handle certain terminal capabilities, such as programming function keys. For all other func... |
del_panel(3) -- panel stack extension for curses
|
Panels are curses(3) windows with the added feature of depth. Panel functions allow the use of stacked windows and ensure the proper portions of each window and the curses stdscr window are hidden or ... |
derwin(3) -- create curses windows
|
Calling newwin creates and returns a pointer to a new window with the given number of lines and columns. The upper left-hand corner of the window is at line begin_y, column begin_x. If either nlines o... |
des_3cbc_encrypt(3) -- (non USA) DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a des_key_schedule from a key, the second... |
des_3ecb_encrypt(3) -- (non USA) DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a des_key_schedule from a key, the second... |
des_cbc_cksum(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a DES_key_schedule from a key, the second... |
des_cbc_encrypt(3) -- (non USA) DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a des_key_schedule from a key, the second... |
des_cfb64_encrypt(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a DES_key_schedule from a key, the second... |
des_cfb_encrypt(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a DES_key_schedule from a key, the second... |
des_cipher(3) -- DES encryption
|
The crypt() function performs password encryption based on the NBS Data Encryption Standard (DES). Additional code has been added to deter key search attempts and to use stronger hashing algorithms. T... |
des_crypt(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a DES_key_schedule from a key, the second... |
des_ecb2_encrypt(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a DES_key_schedule from a key, the second... |
des_ecb3_encrypt(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a DES_key_schedule from a key, the second... |
des_ecb_encrypt(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a DES_key_schedule from a key, the second... |
des_ede2_cbc_encrypt(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a DES_key_schedule from a key, the second... |
des_ede2_cfb64_encrypt(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a DES_key_schedule from a key, the second... |
des_ede2_ofb64_encrypt(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a DES_key_schedule from a key, the second... |
des_ede3_cbcm_encrypt(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a DES_key_schedule from a key, the second... |
des_ede3_cbc_encrypt(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a DES_key_schedule from a key, the second... |
des_ede3_cfb64_encrypt(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a DES_key_schedule from a key, the second... |
des_ede3_ofb64_encrypt(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a DES_key_schedule from a key, the second... |
des_enc_read(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a DES_key_schedule from a key, the second... |
des_enc_write(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a DES_key_schedule from a key, the second... |
des_fcrypt(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a DES_key_schedule from a key, the second... |
des_is_weak_key(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a DES_key_schedule from a key, the second... |
des_key_sched(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a DES_key_schedule from a key, the second... |
des_ncbc_encrypt(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a DES_key_schedule from a key, the second... |
des_ofb64_encrypt(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a DES_key_schedule from a key, the second... |
des_ofb_encrypt(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a DES_key_schedule from a key, the second... |
des_pcbc_encrypt(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a DES_key_schedule from a key, the second... |
des_quad_cksum(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a DES_key_schedule from a key, the second... |
des_random_key(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a DES_key_schedule from a key, the second... |
des_read_2password(3) -- (non USA) DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a des_key_schedule from a key, the second... |
des_read_2passwords(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a DES_key_schedule from a key, the second... |
des_read_password(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a DES_key_schedule from a key, the second... |
des_read_pw_string(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a DES_key_schedule from a key, the second... |
des_setkey(3) -- DES encryption
|
The crypt() function performs password encryption based on the NBS Data Encryption Standard (DES). Additional code has been added to deter key search attempts and to use stronger hashing algorithms. T... |
des_set_key(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a DES_key_schedule from a key, the second... |
des_set_key_checked(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a DES_key_schedule from a key, the second... |
des_set_key_unchecked(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a DES_key_schedule from a key, the second... |
des_set_odd_parity(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a DES_key_schedule from a key, the second... |
des_string_to_2key(3) -- (non USA) DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a des_key_schedule from a key, the second... |
des_string_to_2keys(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a DES_key_schedule from a key, the second... |
des_string_to_key(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a DES_key_schedule from a key, the second... |
des_xcbc_encrypt(3) -- DES encryption
|
This library contains a fast implementation of the DES encryption algorithm. There are two phases to the use of DES encryption. The first is the generation of a DES_key_schedule from a key, the second... |
devname(3) -- get device name
|
The devname() function returns a pointer to the name of the block or character device in /dev with a device number of dev, and a file type matching the one encoded in type which must be one of S_IFBLK... |
dh(3) -- Diffie-Hellman key agreement
|
These functions implement the Diffie-Hellman key agreement protocol. The generation of shared DH parameters is described in DH_generate_parameters(3); DH_generate_key(3) describes how to perform a key... |
DHparams_print(3) -- print cryptographic parameters
|
A human-readable hexadecimal output of the components of the RSA key, DSA parameters or key or DH parameters is printed to bp or fp. The output lines are indented by offset spaces. |
DHparams_print_fp(3) -- print cryptographic parameters
|
A human-readable hexadecimal output of the components of the RSA key, DSA parameters or key or DH parameters is printed to bp or fp. The output lines are indented by offset spaces. |
DH_check(3) -- generate and check
|
DH_generate_parameters() generates Diffie-Hellman parameters that can be shared among a group of users, and returns them in a newly allocated DH structure. The pseudo-random number generator must be s... |
DH_compute_key(3) -- perform Diffie-Hellman key exchange
|
DH_generate_key() performs the first step of a DiffieHellman key exchange by generating private and public DH values. By calling DH_compute_key(), these are combined with the other party's public val... |
DH_free(3) -- allocate and free DH objects
|
DH_new() allocates and initializes a DH structure. DH_free() frees the DH structure and its components. The values are erased before the memory is returned to the system. |
DH_generate_key(3) -- perform Diffie-Hellman key exchange
|
DH_generate_key() performs the first step of a DiffieHellman key exchange by generating private and public DH values. By calling DH_compute_key(), these are combined with the other party's public val... |
DH_generate_parameters(3) -- generate and check
|
DH_generate_parameters() generates Diffie-Hellman parameters that can be shared among a group of users, and returns them in a newly allocated DH structure. The pseudo-random number generator must be s... |
DH_get_default_method(3) -- select DH method
|
A DH_METHOD specifies the functions that OpenSSL uses for Diffie-Hellman operations. By modifying the method, alternative implementations such as hardware accelerators may be used. IMPORTANT: See the ... |
DH_get_default_openssl_method(3) -- select DH method
|
A DH_METHOD specifies the functions that OpenSSL uses for Diffie-Hellman operations. By modifying the method, alternative implementations such as hardware accelerators may be used. IMPORTANT: See the ... |
DH_get_ex_data(3) -- add application specific data to DH structures
|
These functions handle application specific data in DH structures. Their usage is identical to that of RSA_get_ex_new_index(), RSA_set_ex_data() and RSA_get_ex_data() as described in RSA_get_ex_new_in... |
DH_get_ex_new_index(3) -- add application specific data to DH structures
|
These functions handle application specific data in DH structures. Their usage is identical to that of RSA_get_ex_new_index(), RSA_set_ex_data() and RSA_get_ex_data() as described in RSA_get_ex_new_in... |
DH_new(3) -- allocate and free DH objects
|
DH_new() allocates and initializes a DH structure. DH_free() frees the DH structure and its components. The values are erased before the memory is returned to the system. |
DH_new_method(3) -- select DH method
|
A DH_METHOD specifies the functions that OpenSSL uses for Diffie-Hellman operations. By modifying the method, alternative implementations such as hardware accelerators may be used. IMPORTANT: See the ... |
DH_OpenSSL(3) -- select DH method
|
A DH_METHOD specifies the functions that OpenSSL uses for Diffie-Hellman operations. By modifying the method, alternative implementations such as hardware accelerators may be used. IMPORTANT: See the ... |
DH_set_default_method(3) -- select DH method
|
A DH_METHOD specifies the functions that OpenSSL uses for Diffie-Hellman operations. By modifying the method, alternative implementations such as hardware accelerators may be used. IMPORTANT: See the ... |
DH_set_default_openssl_method(3) -- select DH method
|
A DH_METHOD specifies the functions that OpenSSL uses for Diffie-Hellman operations. By modifying the method, alternative implementations such as hardware accelerators may be used. IMPORTANT: See the ... |
DH_set_ex_data(3) -- add application specific data to DH structures
|
These functions handle application specific data in DH structures. Their usage is identical to that of RSA_get_ex_new_index(), RSA_set_ex_data() and RSA_get_ex_data() as described in RSA_get_ex_new_in... |
DH_set_method(3) -- select DH method
|
A DH_METHOD specifies the functions that OpenSSL uses for Diffie-Hellman operations. By modifying the method, alternative implementations such as hardware accelerators may be used. IMPORTANT: See the ... |
DH_size(3) -- get Diffie-Hellman prime size
|
This function returns the Diffie-Hellman size in bytes. It can be used to determine how much memory must be allocated for the shared secret computed by DH_compute_key(). dh->p must not be NULL. |
difftime(3) -- convert date and time to ASCII
|
The ctime() function converts a time_t, pointed to by clock, representing the time in seconds since 00:00:00 UTC, 1970-01-01, and returns a pointer to a 26-character string of the form Thu Nov 24 18:2... |
directory(3) -- directory operations
|
The opendir() function opens the directory named by filename, associates a directory stream with it, and returns a pointer to be used to identify the directory stream in subsequent operations. A null ... |
dirfd(3) -- directory operations
|
The opendir() function opens the directory named by filename, associates a directory stream with it, and returns a pointer to be used to identify the directory stream in subsequent operations. A null ... |
dirname(3) -- extract the directory portion of a pathname
|
The dirname() function is the converse of basename(3); it returns a pointer to the parent directory of the pathname pointed to by path. Any trailing `/' characters are not counted as part of the dire... |
div(3) -- return quotient and remainder from division
|
The div() function computes the value num/denom and returns the quotient and remainder in a structure named div_t that contains two int members named quot and rem. |
dladdr(3) -- dynamic link interface
|
These functions provide an interface to the run-time linker ld.so(1). They allow new shared objects to be loaded into a process's address space under program control. The dlopen() function takes a na... |
dlclose(3) -- dynamic link interface
|
These functions provide an interface to the run-time linker ld.so(1). They allow new shared objects to be loaded into a process's address space under program control. The dlopen() function takes a na... |
dlctl(3) -- dynamic link interface
|
These functions provide an interface to the run-time linker ld.so(1). They allow new shared objects to be loaded into a process's address space under program control. The dlopen() function takes a na... |
dlerror(3) -- dynamic link interface
|
These functions provide an interface to the run-time linker ld.so(1). They allow new shared objects to be loaded into a process's address space under program control. The dlopen() function takes a na... |
dlfcn(3) -- dynamic link interface
|
These functions provide an interface to the run-time linker ld.so(1). They allow new shared objects to be loaded into a process's address space under program control. The dlopen() function takes a na... |
dlopen(3) -- dynamic link interface
|
These functions provide an interface to the run-time linker ld.so(1). They allow new shared objects to be loaded into a process's address space under program control. The dlopen() function takes a na... |
dlsym(3) -- dynamic link interface
|
These functions provide an interface to the run-time linker ld.so(1). They allow new shared objects to be loaded into a process's address space under program control. The dlopen() function takes a na... |
dn_comp(3) -- resolver routines
|
These routines are used for making, sending, and interpreting query and reply messages with Internet domain name servers. Global configuration and state information that is used by the resolver routin... |
dn_expand(3) -- resolver routines
|
These routines are used for making, sending, and interpreting query and reply messages with Internet domain name servers. Global configuration and state information that is used by the resolver routin... |
doupdate(3) -- refresh curses windows and lines
|
The refresh and wrefresh routines (or wnoutrefresh and doupdate) must be called to get actual output to the terminal, as other routines merely manipulate data structures. The routine wrefresh copies t... |
drand48(3) -- pseudo-random number generators and initialization routines
|
The rand48() family of functions generates pseudo-random numbers using a linear congruential algorithm working on integers 48 bits in size. The particular formula employed is r(n+1) = (a * r(n) + c) m... |
dsa(3) -- Digital Signature Algorithm
|
These functions implement the Digital Signature Algorithm (DSA). The generation of shared DSA parameters is described in DSA_generate_parameters(3); DSA_generate_key(3) describes how to generate a sig... |
DSAparams_print(3) -- print cryptographic parameters
|
A human-readable hexadecimal output of the components of the RSA key, DSA parameters or key or DH parameters is printed to bp or fp. The output lines are indented by offset spaces. |
DSAparams_print_fp(3) -- print cryptographic parameters
|
A human-readable hexadecimal output of the components of the RSA key, DSA parameters or key or DH parameters is printed to bp or fp. The output lines are indented by offset spaces. |
DSA_do_sign(3) -- raw DSA signature operations
|
DSA_do_sign() computes a digital signature on the len byte message digest dgst using the private key dsa and returns it in a newly allocated DSA_SIG structure. DSA_sign_setup(3) may be used to precomp... |
DSA_do_verify(3) -- Digital Signature Algorithm
|
These functions implement the Digital Signature Algorithm (DSA). The generation of shared DSA parameters is described in DSA_generate_parameters(3); DSA_generate_key(3) describes how to generate a sig... |
DSA_dup_DH(3) -- create a DH structure out of DSA structure
|
DSA_dup_DH() duplicates DSA parameters/keys as DH parameters/keys. q is lost during that conversion, but the resulting DH parameters contain its length. |
DSA_free(3) -- Digital Signature Algorithm
|
These functions implement the Digital Signature Algorithm (DSA). The generation of shared DSA parameters is described in DSA_generate_parameters(3); DSA_generate_key(3) describes how to generate a sig... |
DSA_generate_key(3) -- generate DSA key pair
|
DSA_generate_key() expects a to contain DSA parameters. It generates a new key pair and stores it in a->pub_key and a->priv_key. The PRNG must be seeded prior to calling DSA_gener- ate_key(). |
DSA_generate_parameters(3) -- generate DSA parameters
|
DSA_generate_parameters() generates primes p and q and a generator g for use in the DSA. bits is the length of the prime to be generated; the DSS allows a maximum of 1024 bits. If seed is NULL or seed... |
DSA_get_default_method(3) -- Digital Signature Algorithm
|
These functions implement the Digital Signature Algorithm (DSA). The generation of shared DSA parameters is described in DSA_generate_parameters(3); DSA_generate_key(3) describes how to generate a sig... |
DSA_get_default_openssl_method(3) -- select DSA method
|
A DSA_METHOD specifies the functions that OpenSSL uses for DSA operations. By modifying the method, alternative implementations such as hardware accelerators may be used. IMPORTANT: See the NOTES sect... |
DSA_get_ex_data(3) -- Digital Signature Algorithm
|
These functions implement the Digital Signature Algorithm (DSA). The generation of shared DSA parameters is described in DSA_generate_parameters(3); DSA_generate_key(3) describes how to generate a sig... |
DSA_get_ex_new_index(3) -- add application specific data to DSA structures
|
These functions handle application specific data in DSA structures. Their usage is identical to that of RSA_get_ex_new_index(), RSA_set_ex_data() and RSA_get_ex_data() as described in RSA_get_ex_new_i... |
DSA_new(3) -- allocate and free DSA objects
|
DSA_new() allocates and initializes a DSA structure. It is equivalent to calling DSA_new_method(NULL). DSA_free() frees the DSA structure and its components. The values are erased before the memory is... |
DSA_new_method(3) -- Digital Signature Algorithm
|
These functions implement the Digital Signature Algorithm (DSA). The generation of shared DSA parameters is described in DSA_generate_parameters(3); DSA_generate_key(3) describes how to generate a sig... |
DSA_OpenSSL(3) -- Digital Signature Algorithm
|
These functions implement the Digital Signature Algorithm (DSA). The generation of shared DSA parameters is described in DSA_generate_parameters(3); DSA_generate_key(3) describes how to generate a sig... |
DSA_print(3) -- print cryptographic parameters
|
A human-readable hexadecimal output of the components of the RSA key, DSA parameters or key or DH parameters is printed to bp or fp. The output lines are indented by offset spaces. |
DSA_print_fp(3) -- print cryptographic parameters
|
A human-readable hexadecimal output of the components of the RSA key, DSA parameters or key or DH parameters is printed to bp or fp. The output lines are indented by offset spaces. |
DSA_set_default_method(3) -- Digital Signature Algorithm
|
These functions implement the Digital Signature Algorithm (DSA). The generation of shared DSA parameters is described in DSA_generate_parameters(3); DSA_generate_key(3) describes how to generate a sig... |
DSA_set_default_openssl_method(3) -- select DSA method
|
A DSA_METHOD specifies the functions that OpenSSL uses for DSA operations. By modifying the method, alternative implementations such as hardware accelerators may be used. IMPORTANT: See the NOTES sect... |
DSA_set_ex_data(3) -- Digital Signature Algorithm
|
These functions implement the Digital Signature Algorithm (DSA). The generation of shared DSA parameters is described in DSA_generate_parameters(3); DSA_generate_key(3) describes how to generate a sig... |
DSA_set_method(3) -- select DSA method
|
A DSA_METHOD specifies the functions that OpenSSL uses for DSA operations. By modifying the method, alternative implementations such as hardware accelerators may be used. IMPORTANT: See the NOTES sect... |
DSA_sign(3) -- DSA signatures
|
DSA_sign() computes a digital signature on the len byte message digest dgst using the private key dsa and places its ASN.1 DER encoding at sigret. The length of the signature is places in *siglen. sig... |
DSA_sign_setup(3) -- Digital Signature Algorithm
|
These functions implement the Digital Signature Algorithm (DSA). The generation of shared DSA parameters is described in DSA_generate_parameters(3); DSA_generate_key(3) describes how to generate a sig... |
DSA_SIG_free(3) -- Digital Signature Algorithm
|
These functions implement the Digital Signature Algorithm (DSA). The generation of shared DSA parameters is described in DSA_generate_parameters(3); DSA_generate_key(3) describes how to generate a sig... |
DSA_SIG_new(3) -- allocate and free DSA signature objects
|
DSA_SIG_new() allocates and initializes a DSA_SIG structure. DSA_SIG_free() frees the DSA_SIG structure and its components. The values are erased before the memory is returned to the system. |
DSA_size(3) -- get DSA signature size
|
This function returns the size of an ASN.1 encoded DSA signature in bytes. It can be used to determine how much memory must be allocated for a DSA signature. dsa->q must not be NULL. |
DSA_verify(3) -- Digital Signature Algorithm
|
These functions implement the Digital Signature Algorithm (DSA). The generation of shared DSA parameters is described in DSA_generate_parameters(3); DSA_generate_key(3) describes how to generate a sig... |
dupwin(3) -- create curses windows
|
Calling newwin creates and returns a pointer to a new window with the given number of lines and columns. The upper left-hand corner of the window is at line begin_y, column begin_x. If either nlines o... |
dup_field(3) -- create and destroy form fields
|
The function new_field allocates a new field and initializes it from the parameters given: height, width, row of upper-left corner, column of upper-left corner, number off-screen rows, and number of a... |
dynamic_field_info(3) -- retrieve field characteristics
|
The function field_info returns the sizes and other attributes passed in to the field at its creation time. The attributes are: height, width, row of upper-left corner, column of upper-left corner, nu... |
echo(3) -- curses input options
|
Normally, the tty driver buffers typed characters until a newline or carriage return is typed. The cbreak routine disables line buffering and erase/kill character-processing (interrupt and flow contro... |
echochar(3) -- add a character (with attributes) to a curses window, then advance the cursor
|
The addch, waddch, mvaddch and mvwaddch routines put the character ch into the given window at its current window position, which is then advanced. They are analogous to putchar in stdio(3). If the ad... |
ecvt(3) -- convert double to ASCII string
|
These functions are provided for compatibility with legacy code. New code should use the snprintf(3) function for improved safety and porta- bility. The ecvt(), fcvt() and gcvt() functions convert the... |
edata(3) -- end boundaries of image segments
|
The global variables end, etext, and edata correspond to the next address following the end of the text segment, the end of initialized data segment, and the end of the data segment (BSS). |
editline(3) -- line editor and history functions
|
The editline library provides generic line editing and history functions, similar to those found in sh(1). These functions are available in the libedit library (which needs the libcurses library). Pro... |
el_deletestr(3) -- line editor and history functions
|
The editline library provides generic line editing and history functions, similar to those found in sh(1). These functions are available in the libedit library (which needs the libcurses library). Pro... |
el_end(3) -- line editor and history functions
|
The editline library provides generic line editing and history functions, similar to those found in sh(1). These functions are available in the libedit library (which needs the libcurses library). Pro... |
el_get(3) -- line editor and history functions
|
The editline library provides generic line editing and history functions, similar to those found in sh(1). These functions are available in the libedit library (which needs the libcurses library). Pro... |
el_getc(3) -- line editor and history functions
|
The editline library provides generic line editing and history functions, similar to those found in sh(1). These functions are available in the libedit library (which needs the libcurses library). Pro... |
el_gets(3) -- line editor and history functions
|
The editline library provides generic line editing and history functions, similar to those found in sh(1). These functions are available in the libedit library (which needs the libcurses library). Pro... |
el_init(3) -- line editor and history functions
|
The editline library provides generic line editing and history functions, similar to those found in sh(1). These functions are available in the libedit library (which needs the libcurses library). Pro... |
el_insertstr(3) -- line editor and history functions
|
The editline library provides generic line editing and history functions, similar to those found in sh(1). These functions are available in the libedit library (which needs the libcurses library). Pro... |
el_line(3) -- line editor and history functions
|
The editline library provides generic line editing and history functions, similar to those found in sh(1). These functions are available in the libedit library (which needs the libcurses library). Pro... |
el_parse(3) -- line editor and history functions
|
The editline library provides generic line editing and history functions, similar to those found in sh(1). These functions are available in the libedit library (which needs the libcurses library). Pro... |
el_push(3) -- line editor and history functions
|
The editline library provides generic line editing and history functions, similar to those found in sh(1). These functions are available in the libedit library (which needs the libcurses library). Pro... |
el_reset(3) -- line editor and history functions
|
The editline library provides generic line editing and history functions, similar to those found in sh(1). These functions are available in the libedit library (which needs the libcurses library). Pro... |
el_resize(3) -- line editor and history functions
|
The editline library provides generic line editing and history functions, similar to those found in sh(1). These functions are available in the libedit library (which needs the libcurses library). Pro... |
el_set(3) -- line editor and history functions
|
The editline library provides generic line editing and history functions, similar to those found in sh(1). These functions are available in the libedit library (which needs the libcurses library). Pro... |
el_source(3) -- line editor and history functions
|
The editline library provides generic line editing and history functions, similar to those found in sh(1). These functions are available in the libedit library (which needs the libcurses library). Pro... |
encrypt(3) -- DES encryption
|
The crypt() function performs password encryption based on the NBS Data Encryption Standard (DES). Additional code has been added to deter key search attempts and to use stronger hashing algorithms. T... |
end(3) -- end boundaries of image segments
|
The global variables end, etext, and edata correspond to the next address following the end of the text segment, the end of initialized data segment, and the end of the data segment (BSS). |
endfsent(3) -- get file system descriptor file entry
|
The getfsent(), getfsspec(), and getfsfile() functions each return a pointer to an object with the following structure containing the brokenout fields of a line in the file system description file, |
endgrent(3) -- group database operations
|
These functions operate on the group database file /etc/group which is described in group(5). Each line of the database is defined by the structure struct group found in the include file : stru... |
endhostent(3) -- get network host entry
|
The gethostbyname(), gethostbyname2() and gethostbyaddr() functions each return a pointer to an object with the following structure describing an internet host referenced by name or by address, respec... |
endnetent(3) -- get network entry
|
The getnetent(), getnetbyname(), and getnetbyaddr() functions each return a pointer to an object with the following structure containing the broken-out fields of a line in the network database, /etc/n... |
endnetgrent(3) -- netgroup database operations
|
These functions operate on the netgroup database file /etc/netgroup.db which is described in netgroup(5). If that file does not exist, and the system supports YP, then the netgroup YP databases are us... |
endprotoent(3) -- get protocol entry
|
The getprotoent(), getprotobyname(), and getprotobynumber() functions each return a pointer to an object with the following structure containing the broken-out fields of a line in the network protocol... |
endpwent(3) -- password database operations
|
These functions operate on the password database file which is described in passwd(5). Each entry in the database is defined by the structure struct passwd found in the include file : struct pa... |
endrpcent(3) -- get RPC entry
|
getrpcent(), getrpcbyname(), and getrpcbynumber(), each return a pointer to an object with the following structure containing the broken-out fields of a line in the rpc program number database, /etc/r... |
endservent(3) -- get service entry
|
The getservent(), getservbyname(), and getservbyport() functions each return a pointer to an object with the following structure containing the broken-out fields of a line in the network services data... |
endttyent(3) -- get ttys file entry
|
The getttyent() and getttynam() functions each return a pointer to an object, with the following structure, containing the brokenout fields of a line from the tty description file. struct ttyent { cha... |
endusershell(3) -- get legal user shells
|
The getusershell() function returns a pointer to a legal user shell as defined by the system manager in the file /etc/shells. If /etc/shells is unreadable or does not exist, getusershell() behaves as ... |
endwin(3) -- curses screen initialization and manipulation routines
|
initscr is normally the first curses routine to call when initializing a program. A few special routines sometimes need to be called before it; these are slk_init, filter, ripoffline, use_env. For mul... |
erand48(3) -- pseudo-random number generators and initialization routines
|
The rand48() family of functions generates pseudo-random numbers using a linear congruential algorithm working on integers 48 bits in size. The particular formula employed is r(n+1) = (a * r(n) + c) m... |
erase(3) -- clear all or part of a curses window
|
The erase and werase routines copy blanks to every position in the window, clearing the screen. The clear and wclear routines are like erase and werase, but they also call clearok, so that the screen ... |
erasechar(3) -- curses environment query routines
|
The baudrate routine returns the output speed of the terminal. The number returned is in bits per second, for example 9600, and is an integer. The erasechar routine returns the user's current erase c... |
erf(3) -- error function operators
|
These functions calculate the error function of x. The erf() calculates the error function of x, and the erff() function is a single precision version of erf(). The error function is defined as: erf(x... |
erfc(3) -- error function operators
|
These functions calculate the error function of x. The erf() calculates the error function of x, and the erff() function is a single precision version of erf(). The error function is defined as: erf(x... |
erfcf(3) -- error function operators
|
These functions calculate the error function of x. The erf() calculates the error function of x, and the erff() function is a single precision version of erf(). The error function is defined as: erf(x... |
erff(3) -- error function operators
|
These functions calculate the error function of x. The erf() calculates the error function of x, and the erff() function is a single precision version of erf(). The error function is defined as: erf(x... |
err(3) -- formatted error messages
|
The err() and warn() family of functions display a formatted error message on the standard error output. In all cases, the last component of the program name, followed by a colon (`:') character and ... |
errx(3) -- formatted error messages
|
The err() and warn() family of functions display a formatted error message on the standard error output. In all cases, the last component of the program name, followed by a colon (`:') character and ... |
ERR_add_error_data(3) -- record an error
|
ERR_put_error() adds an error code to the thread's error queue. It signals that the error of reason code reason occurred in function func of library lib, in line number line of file. This function is... |
ERR_clear_error(3) -- clear the error queue
|
ERR_clear_error() empties the current thread's error queue. |
ERR_error_string(3) -- obtain human-readable error message
|
ERR_error_string() generates a human-readable string representing the error code e, and places it at buf. buf must be at least 120 bytes long. If buf is NULL, the error string is placed in a static bu... |
ERR_error_string_n(3) -- obtain human-readable error message
|
ERR_error_string() generates a human-readable string representing the error code e, and places it at buf. buf must be at least 120 bytes long. If buf is NULL, the error string is placed in a static bu... |
ERR_free_strings(3) -- load and free error strings
|
ERR_load_crypto_strings() registers the error strings for all libcrypto functions. SSL_load_error_strings() does the same, but also registers the libssl error strings. One of these functions should be... |
ERR_func_error_string(3) -- obtain human-readable error message
|
ERR_error_string() generates a human-readable string representing the error code e, and places it at buf. buf must be at least 120 bytes long. If buf is NULL, the error string is placed in a static bu... |
ERR_get_error(3) -- obtain error code and data
|
ERR_get_error() returns the earliest error code from the thread's error queue and removes the entry. This function can be called repeatedly until there are no more error codes to return. ERR_peek_err... |
ERR_get_error_line(3) -- obtain error code and data
|
ERR_get_error() returns the earliest error code from the thread's error queue and removes the entry. This function can be called repeatedly until there are no more error codes to return. ERR_peek_err... |
ERR_get_error_line_data(3) -- obtain error code and data
|
ERR_get_error() returns the earliest error code from the thread's error queue and removes the entry. This function can be called repeatedly until there are no more error codes to return. ERR_peek_err... |
ERR_GET_FUNC(3) -- get library, function and reason code
|
The error code returned by ERR_get_error() consists of a library number, function code and reason code. ERR_GET_LIB(), ERR_GET_FUNC() and ERR_GET_REASON() can be used to extract these. The library num... |
ERR_GET_LIB(3) -- get library, function and reason code
|
The error code returned by ERR_get_error() consists of a library number, function code and reason code. ERR_GET_LIB(), ERR_GET_FUNC() and ERR_GET_REASON() can be used to extract these. The library num... |
ERR_get_next_error_library(3) -- load arbitrary error strings
|
ERR_load_strings() registers error strings for library number lib. str is an array of error string data: typedef struct ERR_string_data_st { unsigned long error; char *string; } ERR_STRING_DATA; The e... |
ERR_GET_REASON(3) -- get library, function and reason code
|
The error code returned by ERR_get_error() consists of a library number, function code and reason code. ERR_GET_LIB(), ERR_GET_FUNC() and ERR_GET_REASON() can be used to extract these. The library num... |
ERR_lib_error_string(3) -- obtain human-readable error message
|
ERR_error_string() generates a human-readable string representing the error code e, and places it at buf. buf must be at least 120 bytes long. If buf is NULL, the error string is placed in a static bu... |
ERR_load_crypto_strings(3) -- load and free error strings
|
ERR_load_crypto_strings() registers the error strings for all libcrypto functions. SSL_load_error_strings() does the same, but also registers the libssl error strings. One of these functions should be... |
ERR_load_strings(3) -- load arbitrary error strings
|
ERR_load_strings() registers error strings for library number lib. str is an array of error string data: typedef struct ERR_string_data_st { unsigned long error; char *string; } ERR_STRING_DATA; The e... |
ERR_PACK(3) -- load arbitrary error strings
|
ERR_load_strings() registers error strings for library number lib. str is an array of error string data: typedef struct ERR_string_data_st { unsigned long error; char *string; } ERR_STRING_DATA; The e... |
ERR_peek_error(3) -- obtain error code and data
|
ERR_get_error() returns the earliest error code from the thread's error queue and removes the entry. This function can be called repeatedly until there are no more error codes to return. ERR_peek_err... |
ERR_peek_error_line(3) -- obtain error code and data
|
ERR_get_error() returns the earliest error code from the thread's error queue and removes the entry. This function can be called repeatedly until there are no more error codes to return. ERR_peek_err... |
ERR_peek_error_line_data(3) -- obtain error code and data
|
ERR_get_error() returns the earliest error code from the thread's error queue and removes the entry. This function can be called repeatedly until there are no more error codes to return. ERR_peek_err... |
ERR_print_errors(3) -- print error messages
|
ERR_print_errors() is a convenience function that prints the error strings for all errors that OpenSSL has recorded to bp, thus emptying the error queue. ERR_print_errors_fp() is the same, except that... |
ERR_print_errors_fp(3) -- print error messages
|
ERR_print_errors() is a convenience function that prints the error strings for all errors that OpenSSL has recorded to bp, thus emptying the error queue. ERR_print_errors_fp() is the same, except that... |
ERR_put_error(3) -- record an error
|
ERR_put_error() adds an error code to the thread's error queue. It signals that the error of reason code reason occurred in function func of library lib, in line number line of file. This function is... |
ERR_reason_error_string(3) -- obtain human-readable error message
|
ERR_error_string() generates a human-readable string representing the error code e, and places it at buf. buf must be at least 120 bytes long. If buf is NULL, the error string is placed in a static bu... |
ERR_remove_state(3) -- free a thread's error queue
|
ERR_remove_state() frees the error queue associated with thread pid. If pid == 0, the current thread will have its error queue removed. Since error queue data structures are allocated automatically fo... |
etext(3) -- end boundaries of image segments
|
The global variables end, etext, and edata correspond to the next address following the end of the text segment, the end of initialized data segment, and the end of the data segment (BSS). |
ethers(3) -- get ethers entry
|
Ethernet addresses are represented by the following structure: struct ether_addr { u_int8_t ether_addr_octet[6]; }; The ether_ntoa() function converts this structure into an ASCII string of the form `... |
ether_addr(3) -- get ethers entry
|
Ethernet addresses are represented by the following structure: struct ether_addr { u_int8_t ether_addr_octet[6]; }; The ether_ntoa() function converts this structure into an ASCII string of the form `... |
ether_aton(3) -- get ethers entry
|
Ethernet addresses are represented by the following structure: struct ether_addr { u_int8_t ether_addr_octet[6]; }; The ether_ntoa() function converts this structure into an ASCII string of the form `... |
ether_hostton(3) -- get ethers entry
|
Ethernet addresses are represented by the following structure: struct ether_addr { u_int8_t ether_addr_octet[6]; }; The ether_ntoa() function converts this structure into an ASCII string of the form `... |
ether_line(3) -- get ethers entry
|
Ethernet addresses are represented by the following structure: struct ether_addr { u_int8_t ether_addr_octet[6]; }; The ether_ntoa() function converts this structure into an ASCII string of the form `... |
ether_ntoa(3) -- get ethers entry
|
Ethernet addresses are represented by the following structure: struct ether_addr { u_int8_t ether_addr_octet[6]; }; The ether_ntoa() function converts this structure into an ASCII string of the form `... |
ether_ntohost(3) -- get ethers entry
|
Ethernet addresses are represented by the following structure: struct ether_addr { u_int8_t ether_addr_octet[6]; }; The ether_ntoa() function converts this structure into an ASCII string of the form `... |
etob(3) -- S/Key library functions
|
These functions implement the S/Key one time password authentication mechanism. The atob8() function converts the 16-byte hex string in to an 8-byte binary array stored in out. The atob8() function re... |
evbuffer_add(3) -- execute a function when a specific event occurs
|
The event API provides a mechanism to execute a function when a specific event on a file descriptor occurs or after a given time has passed. The event API needs to be initialized with event_init() bef... |
evbuffer_add_buffer(3) -- execute a function when a specific event occurs
|
The event API provides a mechanism to execute a function when a specific event on a file descriptor occurs or after a given time has passed. The event API needs to be initialized with event_init() bef... |
evbuffer_add_printf(3) -- execute a function when a specific event occurs
|
The event API provides a mechanism to execute a function when a specific event on a file descriptor occurs or after a given time has passed. The event API needs to be initialized with event_init() bef... |
evbuffer_drain(3) -- execute a function when a specific event occurs
|
The event API provides a mechanism to execute a function when a specific event on a file descriptor occurs or after a given time has passed. The event API needs to be initialized with event_init() bef... |
evbuffer_find(3) -- execute a function when a specific event occurs
|
The event API provides a mechanism to execute a function when a specific event on a file descriptor occurs or after a given time has passed. The event API needs to be initialized with event_init() bef... |
evbuffer_free(3) -- execute a function when a specific event occurs
|
The event API provides a mechanism to execute a function when a specific event on a file descriptor occurs or after a given time has passed. The event API needs to be initialized with event_init() bef... |
evbuffer_new(3) -- execute a function when a specific event occurs
|
The event API provides a mechanism to execute a function when a specific event on a file descriptor occurs or after a given time has passed. The event API needs to be initialized with event_init() bef... |
evbuffer_read(3) -- execute a function when a specific event occurs
|
The event API provides a mechanism to execute a function when a specific event on a file descriptor occurs or after a given time has passed. The event API needs to be initialized with event_init() bef... |
evbuffer_write(3) -- execute a function when a specific event occurs
|
The event API provides a mechanism to execute a function when a specific event on a file descriptor occurs or after a given time has passed. The event API needs to be initialized with event_init() bef... |
event(3) -- execute a function when a specific event occurs
|
The event API provides a mechanism to execute a function when a specific event on a file descriptor occurs or after a given time has passed. The event API needs to be initialized with event_init() bef... |
event_add(3) -- execute a function when a specific event occurs
|
The event API provides a mechanism to execute a function when a specific event on a file descriptor occurs or after a given time has passed. The event API needs to be initialized with event_init() bef... |
event_del(3) -- execute a function when a specific event occurs
|
The event API provides a mechanism to execute a function when a specific event on a file descriptor occurs or after a given time has passed. The event API needs to be initialized with event_init() bef... |
event_dispatch(3) -- execute a function when a specific event occurs
|
The event API provides a mechanism to execute a function when a specific event on a file descriptor occurs or after a given time has passed. The event API needs to be initialized with event_init() bef... |
event_init(3) -- execute a function when a specific event occurs
|
The event API provides a mechanism to execute a function when a specific event on a file descriptor occurs or after a given time has passed. The event API needs to be initialized with event_init() bef... |
event_initialized(3) -- execute a function when a specific event occurs
|
The event API provides a mechanism to execute a function when a specific event on a file descriptor occurs or after a given time has passed. The event API needs to be initialized with event_init() bef... |
event_loop(3) -- execute a function when a specific event occurs
|
The event API provides a mechanism to execute a function when a specific event on a file descriptor occurs or after a given time has passed. The event API needs to be initialized with event_init() bef... |
event_loopexit(3) -- execute a function when a specific event occurs
|
The event API provides a mechanism to execute a function when a specific event on a file descriptor occurs or after a given time has passed. The event API needs to be initialized with event_init() bef... |
event_once(3) -- execute a function when a specific event occurs
|
The event API provides a mechanism to execute a function when a specific event on a file descriptor occurs or after a given time has passed. The event API needs to be initialized with event_init() bef... |
event_pending(3) -- execute a function when a specific event occurs
|
The event API provides a mechanism to execute a function when a specific event on a file descriptor occurs or after a given time has passed. The event API needs to be initialized with event_init() bef... |
event_set(3) -- execute a function when a specific event occurs
|
The event API provides a mechanism to execute a function when a specific event on a file descriptor occurs or after a given time has passed. The event API needs to be initialized with event_init() bef... |
EVP_BytesToKey(3) -- password based encryption routine
|
EVP_BytesToKey() derives a key and IV from various parameters. type is the cipher to derive the key and IV for. md is the message digest to use. The salt paramter is used as a salt in the derivation: ... |
EVP_CipherFinal(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. EVP_CIPHER_CTX_init() initializes cipher contex ctx. EVP_EncryptInit_ex() sets up cipher context ctx for encryption wit... |
EVP_CipherInit(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. EVP_CIPHER_CTX_init() initializes cipher contex ctx. EVP_EncryptInit_ex() sets up cipher context ctx for encryption wit... |
EVP_CipherUpdate(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. EVP_CIPHER_CTX_init() initializes cipher contex ctx. EVP_EncryptInit_ex() sets up cipher context ctx for encryption wit... |
EVP_CIPHER_asn1_to_param(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. EVP_CIPHER_CTX_init() initializes cipher contex ctx. EVP_EncryptInit_ex() sets up cipher context ctx for encryption wit... |
EVP_CIPHER_block_size(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. EVP_CIPHER_CTX_init() initializes cipher contex ctx. EVP_EncryptInit_ex() sets up cipher context ctx for encryption wit... |
EVP_CIPHER_CTX_block_size(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. EVP_CIPHER_CTX_init() initializes cipher contex ctx. EVP_EncryptInit_ex() sets up cipher context ctx for encryption wit... |
EVP_CIPHER_CTX_cipher(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. EVP_CIPHER_CTX_init() initializes cipher contex ctx. EVP_EncryptInit_ex() sets up cipher context ctx for encryption wit... |
EVP_CIPHER_CTX_cleanup(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. EVP_CIPHER_CTX_init() initializes cipher contex ctx. EVP_EncryptInit_ex() sets up cipher context ctx for encryption wit... |
EVP_CIPHER_CTX_ctrl(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. EVP_CIPHER_CTX_init() initializes cipher contex ctx. EVP_EncryptInit_ex() sets up cipher context ctx for encryption wit... |
EVP_CIPHER_CTX_iv_length(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. EVP_CIPHER_CTX_init() initializes cipher contex ctx. EVP_EncryptInit_ex() sets up cipher context ctx for encryption wit... |
EVP_CIPHER_CTX_key_length(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. EVP_CIPHER_CTX_init() initializes cipher contex ctx. EVP_EncryptInit_ex() sets up cipher context ctx for encryption wit... |
EVP_CIPHER_CTX_nid(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. EVP_CIPHER_CTX_init() initializes cipher contex ctx. EVP_EncryptInit_ex() sets up cipher context ctx for encryption wit... |
EVP_CIPHER_CTX_set_key_length(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. EVP_CIPHER_CTX_init() initializes cipher contex ctx. EVP_EncryptInit_ex() sets up cipher context ctx for encryption wit... |
EVP_CIPHER_CTX_type(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. EVP_CIPHER_CTX_init() initializes cipher contex ctx. EVP_EncryptInit_ex() sets up cipher context ctx for encryption wit... |
EVP_CIPHER_iv_length(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. EVP_CIPHER_CTX_init() initializes cipher contex ctx. EVP_EncryptInit_ex() sets up cipher context ctx for encryption wit... |
EVP_CIPHER_key_length(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. EVP_CIPHER_CTX_init() initializes cipher contex ctx. EVP_EncryptInit_ex() sets up cipher context ctx for encryption wit... |
EVP_CIPHER_nid(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. EVP_CIPHER_CTX_init() initializes cipher contex ctx. EVP_EncryptInit_ex() sets up cipher context ctx for encryption wit... |
EVP_CIPHER_param_to_asn1(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. EVP_CIPHER_CTX_init() initializes cipher contex ctx. EVP_EncryptInit_ex() sets up cipher context ctx for encryption wit... |
EVP_CIPHER_type(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. EVP_CIPHER_CTX_init() initializes cipher contex ctx. EVP_EncryptInit_ex() sets up cipher context ctx for encryption wit... |
EVP_cleanup(3) -- add algorithms to internal table
|
OpenSSL keeps an internal table of digest algorithms and ciphers. It uses this table to lookup ciphers via functions such as EVP_get_cipher_byname(). OpenSSL_add_all_digests() adds all digest algorith... |
EVP_DecryptFinal(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. EVP_CIPHER_CTX_init() initializes cipher contex ctx. EVP_EncryptInit_ex() sets up cipher context ctx for encryption wit... |
EVP_DecryptInit(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. EVP_CIPHER_CTX_init() initializes cipher contex ctx. EVP_EncryptInit_ex() sets up cipher context ctx for encryption wit... |
EVP_DecryptUpdate(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. EVP_CIPHER_CTX_init() initializes cipher contex ctx. EVP_EncryptInit_ex() sets up cipher context ctx for encryption wit... |
EVP_DigestFinal(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. EVP_MD_CTX_init() initializes digest contet ctx. EVP_MD_CTX_create() allocates, initializes and returns a digest contet. EVP_Dige... |
EVP_DigestInit(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. EVP_MD_CTX_init() initializes digest contet ctx. EVP_MD_CTX_create() allocates, initializes and returns a digest contet. EVP_Dige... |
EVP_DigestUpdate(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. EVP_MD_CTX_init() initializes digest contet ctx. EVP_MD_CTX_create() allocates, initializes and returns a digest contet. EVP_Dige... |
EVP_dss(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. EVP_MD_CTX_init() initializes digest contet ctx. EVP_MD_CTX_create() allocates, initializes and returns a digest contet. EVP_Dige... |
EVP_dss1(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. EVP_MD_CTX_init() initializes digest contet ctx. EVP_MD_CTX_create() allocates, initializes and returns a digest contet. EVP_Dige... |
EVP_EncryptFinal(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. EVP_CIPHER_CTX_init() initializes cipher contex ctx. EVP_EncryptInit_ex() sets up cipher context ctx for encryption wit... |
EVP_EncryptInit(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. EVP_CIPHER_CTX_init() initializes cipher contex ctx. EVP_EncryptInit_ex() sets up cipher context ctx for encryption wit... |
EVP_EncryptUpdate(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. EVP_CIPHER_CTX_init() initializes cipher contex ctx. EVP_EncryptInit_ex() sets up cipher context ctx for encryption wit... |
EVP_get_cipherbyname(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. EVP_CIPHER_CTX_init() initializes cipher contex ctx. EVP_EncryptInit_ex() sets up cipher context ctx for encryption wit... |
EVP_get_cipherbynid(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. EVP_CIPHER_CTX_init() initializes cipher contex ctx. EVP_EncryptInit_ex() sets up cipher context ctx for encryption wit... |
EVP_get_cipherbyobj(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. EVP_CIPHER_CTX_init() initializes cipher contex ctx. EVP_EncryptInit_ex() sets up cipher context ctx for encryption wit... |
EVP_get_digestbyname(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. EVP_MD_CTX_init() initializes digest contet ctx. EVP_MD_CTX_create() allocates, initializes and returns a digest contet. EVP_Dige... |
EVP_get_digestbynid(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. EVP_MD_CTX_init() initializes digest contet ctx. EVP_MD_CTX_create() allocates, initializes and returns a digest contet. EVP_Dige... |
EVP_get_digestbyobj(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. EVP_MD_CTX_init() initializes digest contet ctx. EVP_MD_CTX_create() allocates, initializes and returns a digest contet. EVP_Dige... |
EVP_md2(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. EVP_MD_CTX_init() initializes digest contet ctx. EVP_MD_CTX_create() allocates, initializes and returns a digest contet. EVP_Dige... |
EVP_md5(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. EVP_MD_CTX_init() initializes digest contet ctx. EVP_MD_CTX_create() allocates, initializes and returns a digest contet. EVP_Dige... |
EVP_mdc2(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. EVP_MD_CTX_init() initializes digest contet ctx. EVP_MD_CTX_create() allocates, initializes and returns a digest contet. EVP_Dige... |
EVP_MD_block_size(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. EVP_MD_CTX_init() initializes digest contet ctx. EVP_MD_CTX_create() allocates, initializes and returns a digest contet. EVP_Dige... |
EVP_MD_CTX_block_size(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. EVP_MD_CTX_init() initializes digest contet ctx. EVP_MD_CTX_create() allocates, initializes and returns a digest contet. EVP_Dige... |
EVP_MD_CTX_copy(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. EVP_MD_CTX_init() initializes digest contet ctx. EVP_MD_CTX_create() allocates, initializes and returns a digest contet. EVP_Dige... |
EVP_MD_CTX_md(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. EVP_MD_CTX_init() initializes digest contet ctx. EVP_MD_CTX_create() allocates, initializes and returns a digest contet. EVP_Dige... |
EVP_MD_CTX_size(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. EVP_MD_CTX_init() initializes digest contet ctx. EVP_MD_CTX_create() allocates, initializes and returns a digest contet. EVP_Dige... |
EVP_MD_CTX_type(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. EVP_MD_CTX_init() initializes digest contet ctx. EVP_MD_CTX_create() allocates, initializes and returns a digest contet. EVP_Dige... |
EVP_md_null(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. EVP_MD_CTX_init() initializes digest contet ctx. EVP_MD_CTX_create() allocates, initializes and returns a digest contet. EVP_Dige... |
EVP_MD_pkey_type(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. EVP_MD_CTX_init() initializes digest contet ctx. EVP_MD_CTX_create() allocates, initializes and returns a digest contet. EVP_Dige... |
EVP_MD_size(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. EVP_MD_CTX_init() initializes digest contet ctx. EVP_MD_CTX_create() allocates, initializes and returns a digest contet. EVP_Dige... |
EVP_MD_type(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. EVP_MD_CTX_init() initializes digest contet ctx. EVP_MD_CTX_create() allocates, initializes and returns a digest contet. EVP_Dige... |
EVP_OpenFinal(3) -- EVP envelope decryption
|
The EVP envelope routines are a high level interface to envelope decryption. They decrypt a public key encrypted symmetric key and then decrypt data using it. EVP_OpenInit() initializes a cipher conte... |
EVP_OpenInit(3) -- EVP envelope decryption
|
The EVP envelope routines are a high level interface to envelope decryption. They decrypt a public key encrypted symmetric key and then decrypt data using it. EVP_OpenInit() initializes a cipher conte... |
EVP_OpenUpdate(3) -- EVP envelope decryption
|
The EVP envelope routines are a high level interface to envelope decryption. They decrypt a public key encrypted symmetric key and then decrypt data using it. EVP_OpenInit() initializes a cipher conte... |
EVP_PKEY_size(3) -- EVP signing functions
|
The EVP signature routines are a high level interface to digital signatures. EVP_SignInit_ex() sets up signing context ctx to use digest type from ENGINE impl. ctx must be initialized with EVP_MD_CTX_... |
EVP_ripemd160(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. EVP_MD_CTX_init() initializes digest contet ctx. EVP_MD_CTX_create() allocates, initializes and returns a digest contet. EVP_Dige... |
EVP_SealFinal(3) -- EVP envelope encryption
|
The EVP envelope routines are a high level interface to envelope encryption. They generate a random key and IV (if required) then "envelope" it by using public key encryption. Data can then be encry... |
EVP_SealInit(3) -- EVP envelope encryption
|
The EVP envelope routines are a high level interface to envelope encryption. They generate a random key and IV (if required) then "envelope" it by using public key encryption. Data can then be encry... |
EVP_SealUpdate(3) -- EVP envelope encryption
|
The EVP envelope routines are a high level interface to envelope encryption. They generate a random key and IV (if required) then "envelope" it by using public key encryption. Data can then be encry... |
EVP_sha(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. EVP_MD_CTX_init() initializes digest contet ctx. EVP_MD_CTX_create() allocates, initializes and returns a digest contet. EVP_Dige... |
EVP_sha1(3) -- EVP digest routines
|
The EVP digest routines are a high level interface to message digests. EVP_MD_CTX_init() initializes digest contet ctx. EVP_MD_CTX_create() allocates, initializes and returns a digest contet. EVP_Dige... |
EVP_SignFinal(3) -- EVP signing functions
|
The EVP signature routines are a high level interface to digital signatures. EVP_SignInit_ex() sets up signing context ctx to use digest type from ENGINE impl. ctx must be initialized with EVP_MD_CTX_... |
EVP_SignInit(3) -- EVP signing functions
|
The EVP signature routines are a high level interface to digital signatures. EVP_SignInit_ex() sets up signing context ctx to use digest type from ENGINE impl. ctx must be initialized with EVP_MD_CTX_... |
EVP_SignUpdate(3) -- EVP signing functions
|
The EVP signature routines are a high level interface to digital signatures. EVP_SignInit_ex() sets up signing context ctx to use digest type from ENGINE impl. ctx must be initialized with EVP_MD_CTX_... |
EVP_VerifyFinal(3) -- EVP signature verification functions
|
The EVP signature verification routines are a high level interface to digital signatures. EVP_VerifyInit_ex() sets up verification context ctx to use digest type from ENGINE impl. ctx must be initiali... |
EVP_VerifyInit(3) -- EVP signature verification functions
|
The EVP signature verification routines are a high level interface to digital signatures. EVP_VerifyInit_ex() sets up verification context ctx to use digest type from ENGINE impl. ctx must be initiali... |
EVP_VerifyUpdate(3) -- EVP signature verification functions
|
The EVP signature verification routines are a high level interface to digital signatures. EVP_VerifyInit_ex() sets up verification context ctx to use digest type from ENGINE impl. ctx must be initiali... |
evtimer_add(3) -- execute a function when a specific event occurs
|
The event API provides a mechanism to execute a function when a specific event on a file descriptor occurs or after a given time has passed. The event API needs to be initialized with event_init() bef... |
evtimer_del(3) -- execute a function when a specific event occurs
|
The event API provides a mechanism to execute a function when a specific event on a file descriptor occurs or after a given time has passed. The event API needs to be initialized with event_init() bef... |
evtimer_initialized(3) -- execute a function when a specific event occurs
|
The event API provides a mechanism to execute a function when a specific event on a file descriptor occurs or after a given time has passed. The event API needs to be initialized with event_init() bef... |
evtimer_pending(3) -- execute a function when a specific event occurs
|
The event API provides a mechanism to execute a function when a specific event on a file descriptor occurs or after a given time has passed. The event API needs to be initialized with event_init() bef... |
evtimer_set(3) -- execute a function when a specific event occurs
|
The event API provides a mechanism to execute a function when a specific event on a file descriptor occurs or after a given time has passed. The event API needs to be initialized with event_init() bef... |
exec(3) -- execute a file
|
The exec family of functions replace the current process image with a new process image. The functions described in this manual page are frontends for the function execve(2). (See the manual page for ... |
execl(3) -- execute a file
|
The exec family of functions replace the current process image with a new process image. The functions described in this manual page are frontends for the function execve(2). (See the manual page for ... |
execle(3) -- execute a file
|
The exec family of functions replace the current process image with a new process image. The functions described in this manual page are frontends for the function execve(2). (See the manual page for ... |
execlp(3) -- execute a file
|
The exec family of functions replace the current process image with a new process image. The functions described in this manual page are frontends for the function execve(2). (See the manual page for ... |
execv(3) -- execute a file
|
The exec family of functions replace the current process image with a new process image. The functions described in this manual page are frontends for the function execve(2). (See the manual page for ... |
execvp(3) -- execute a file
|
The exec family of functions replace the current process image with a new process image. The functions described in this manual page are frontends for the function execve(2). (See the manual page for ... |
exit(3) -- perform normal program termination
|
The exit() and _Exit() functions terminate a process. Before termination, exit() performs the following operations in the order listed: 1. Call the functions registered with the atexit(3) function, in... |
exp(3) -- exponential, logarithm, power functions
|
The exp() function computes the exponential value of the given argument x. The expf() function is a single precision version of exp(). The expm1() function computes the value exp(x)-1 accurately even ... |
expf(3) -- exponential, logarithm, power functions
|
The exp() function computes the exponential value of the given argument x. The expf() function is a single precision version of exp(). The expm1() function computes the value exp(x)-1 accurately even ... |
expm1(3) -- exponential, logarithm, power functions
|
The exp() function computes the exponential value of the given argument x. The expf() function is a single precision version of exp(). The expm1() function computes the value exp(x)-1 accurately even ... |
expm1f(3) -- exponential, logarithm, power functions
|
The exp() function computes the exponential value of the given argument x. The expf() function is a single precision version of exp(). The expm1() function computes the value exp(x)-1 accurately even ... |
extattr(3) -- convert an extended attribute namespace identifier to a string and vice versa
|
The extattr_namespace_to_string() function converts a VFS extended attribute identifier to a human-readable string; the extattr_string_to_namespace() function undoes the aforementioned operation, and ... |
extattr_namespace_to_string(3) -- convert an extended attribute namespace identifier to a string and vice versa
|
The extattr_namespace_to_string() function converts a VFS extended attribute identifier to a human-readable string; the extattr_string_to_namespace() function undoes the aforementioned operation, and ... |
extattr_string_to_namespace(3) -- convert an extended attribute namespace identifier to a string and vice versa
|
The extattr_namespace_to_string() function converts a VFS extended attribute identifier to a human-readable string; the extattr_string_to_namespace() function undoes the aforementioned operation, and ... |
f(3) -- S/Key library functions
|
These functions implement the S/Key one time password authentication mechanism. The atob8() function converts the 16-byte hex string in to an 8-byte binary array stored in out. The atob8() function re... |
fabs(3) -- floating-point absolute value functions
|
The fabs() function computes the absolute value of a floating-point number x. The fabsf() function is a single precision version of fabs(). |
fabsf(3) -- floating-point absolute value functions
|
The fabs() function computes the absolute value of a floating-point number x. The fabsf() function is a single precision version of fabs(). |
fclose(3) -- close a stream
|
The fclose() function dissociates the named stream from its underlying file or set of functions. If the stream was being used for output, any buffered data is written first, using fflush(3). |
fcvt(3) -- convert double to ASCII string
|
These functions are provided for compatibility with legacy code. New code should use the snprintf(3) function for improved safety and porta- bility. The ecvt(), fcvt() and gcvt() functions convert the... |
fdopen(3) -- stream open functions
|
The fopen() function opens the file whose name is the string pointed to by path and associates a stream with it. The argument mode points to a string beginning with one of the following sequences (add... |
FD_CLR(3) -- synchronous I/O multiplexing
|
select() examines the I/O descriptor sets whose addresses are passed in readfds, writefds, and exceptfds to see if some of their descriptors are ready for reading, are ready for writing, or have an ex... |
FD_ISSET(3) -- synchronous I/O multiplexing
|
select() examines the I/O descriptor sets whose addresses are passed in readfds, writefds, and exceptfds to see if some of their descriptors are ready for reading, are ready for writing, or have an ex... |
FD_SET(3) -- synchronous I/O multiplexing
|
select() examines the I/O descriptor sets whose addresses are passed in readfds, writefds, and exceptfds to see if some of their descriptors are ready for reading, are ready for writing, or have an ex... |
FD_ZERO(3) -- synchronous I/O multiplexing
|
select() examines the I/O descriptor sets whose addresses are passed in readfds, writefds, and exceptfds to see if some of their descriptors are ready for reading, are ready for writing, or have an ex... |
feof(3) -- check and reset stream status
|
The function clearerr() clears the end-of-file and error indicators for the stream pointed to by stream. The function feof() tests the end-of-file indicator for the stream pointed to by stream, return... |
ferror(3) -- check and reset stream status
|
The function clearerr() clears the end-of-file and error indicators for the stream pointed to by stream. The function feof() tests the end-of-file indicator for the stream pointed to by stream, return... |
fetch(3) -- database subroutines
|
These functions provide a dbm-compatible interface to the database access methods described in db(3). Each unique record in the database is a key/content pair, the components of which may be any arbit... |
fflagstostr(3) -- convert between file flag bits and their string names
|
The fflagstostr() function returns a comma separated string of the file flags represented by flags. If no flags are set a zero length string is returned. If memory cannot be allocated for the return v... |
fflush(3) -- flush a stream
|
The function fflush() forces a write of all buffered data for the given output or update stream via the stream's underlying write function. The open status of the stream is unaffected. If the stream ... |
ffs(3) -- find first bit set in a bit string
|
The ffs() function finds the first bit set in value and returns the index of that bit. Bits are numbered starting from 1, starting at the rightmost bit. A return value of 0 means that the argument was... |
fgetc(3) -- get next character or word from input stream
|
The fgetc() function obtains the next input character (if present) from the stream pointed at by stream, or the next character pushed back on the stream via ungetc(3). The getc() function acts essenti... |
fgetln(3) -- get a line from a stream
|
The fgetln() function returns a pointer to the next line from the stream referenced by stream. This line is not a C string as it does not end with a terminating NUL character. The length of the line, ... |
fgetpos(3) -- reposition a stream
|
The fseek() function sets the file position indicator for the stream pointed to by stream. The new position, measured in bytes, is obtained by adding offset bytes to the position specified by whence. ... |
fgets(3) -- get a line from a stream
|
The fgets() function reads at most one less than the number of characters specified by size from the given stream and stores them in the string str. Reading stops when a newline character is found, at... |
field_arg(3) -- data type validation for fields
|
The function set_field_type declares a data type for a given form field. This is the type checked by validation functions. The types are as follows: TYPE_ALNUM Alphanumeric data. Requires a third int ... |
field_back(3) -- color and attribute control for form fields
|
The function set_field_fore sets the foreground attribute of field. This is the highlight used to display the field contents. The function field_fore returns the foreground attribute. The default is A... |
field_buffer(3) -- field buffer control
|
The function set_field_buffer sets the numbered buffer of the given field to contain a given string. Buffer 0 is the displayed value of the field; other numbered buffers may be allocated by applicatio... |
field_count(3) -- make and break connections between fields and forms
|
The function set_form_fields changes the field pointer array of the given form. The array must be terminated by a NULL. The function form_fields returns the field array of the given form. The function... |
field_fore(3) -- color and attribute control for form fields
|
The function set_field_fore sets the foreground attribute of field. This is the highlight used to display the field contents. The function field_fore returns the foreground attribute. The default is A... |
field_index(3) -- set and get form page number
|
The function set_current field sets the current field of the given form; current_field returns the current field of the given form. The function set_form_page sets the form's page number (goes to pag... |
field_info(3) -- retrieve field characteristics
|
The function field_info returns the sizes and other attributes passed in to the field at its creation time. The attributes are: height, width, row of upper-left corner, column of upper-left corner, nu... |
field_init(3) -- set hooks for automatic invocation by applications
|
These functions make it possible to set hook functions to be called at various points in the automatic processing of input event codes by form_driver. The function set_field_init sets a hook to be cal... |
field_just(3) -- retrieve field characteristics
|
The function set_field_just sets the justification attribute of a field; field_just returns a field's justification attribute. The attribute may be one of NO_JUSTIFICATION, JUSTIFY_RIGHT, JUSTIFY_LEF... |
field_opts(3) -- set and get field options
|
The function set_field_opts sets all the given field's option bits (field option bits may be logically OR'ed together). The function field_opts_on turns on the given option bits, and leaves others a... |
field_opts_off(3) -- set and get field options
|
The function set_field_opts sets all the given field's option bits (field option bits may be logically OR'ed together). The function field_opts_on turns on the given option bits, and leaves others a... |
field_opts_on(3) -- set and get field options
|
The function set_field_opts sets all the given field's option bits (field option bits may be logically OR'ed together). The function field_opts_on turns on the given option bits, and leaves others a... |
field_pad(3) -- color and attribute control for form fields
|
The function set_field_fore sets the foreground attribute of field. This is the highlight used to display the field contents. The function field_fore returns the foreground attribute. The default is A... |
field_status(3) -- field buffer control
|
The function set_field_buffer sets the numbered buffer of the given field to contain a given string. Buffer 0 is the displayed value of the field; other numbered buffers may be allocated by applicatio... |
field_term(3) -- set hooks for automatic invocation by applications
|
These functions make it possible to set hook functions to be called at various points in the automatic processing of input event codes by form_driver. The function set_field_init sets a hook to be cal... |
field_type(3) -- data type validation for fields
|
The function set_field_type declares a data type for a given form field. This is the type checked by validation functions. The types are as follows: TYPE_ALNUM Alphanumeric data. Requires a third int ... |
field_userptr(3) -- associate application data with a form field
|
Every form field has a field that can be used to hold application-specific data (that is, the form-driver code leaves it alone). These functions get and set that field. |
fileno(3) -- check and reset stream status
|
The function clearerr() clears the end-of-file and error indicators for the stream pointed to by stream. The function feof() tests the end-of-file indicator for the stream pointed to by stream, return... |
filter(3) -- miscellaneous curses utility routines
|
The unctrl macro expands to a character string which is a printable representation of the character c. Control characters are displayed in the ^X notation. Printing characters are displayed as is. The... |
finite(3) -- functions for IEEE arithmetic
|
These functions are required or recommended by IEEE Std 754-1985. copysign() returns x with its sign changed to y's. The copysignf() function is a single precision version of copysign(). finite() ret... |
finitef(3) -- functions for IEEE arithmetic
|
These functions are required or recommended by IEEE Std 754-1985. copysign() returns x with its sign changed to y's. The copysignf() function is a single precision version of copysign(). finite() ret... |
firstkey(3) -- database subroutines
|
These functions provide a dbm-compatible interface to the database access methods described in db(3). Each unique record in the database is a key/content pair, the components of which may be any arbit... |
flash(3) -- curses bell and screen flash routines
|
The beep and flash routines are used to alert the terminal user. The routine beep sounds an audible alarm on the terminal, if possible; otherwise it flashes the screen (visible bell). The routine flas... |
flockfile(3) -- application level locking of stdio files
|
The flockfile(), ftrylockfile(), and funlockfile() functions provide for explicit application-level locking of stdio FILE * objects. These functions can be used by a thread to delineate a sequence of ... |
floor(3) -- round to largest integral value not greater than x
|
The floor() function returns the largest integral value less than or equal to x. The floorf() function is a single precision version of floor(). |
floorf(3) -- round to largest integral value not greater than x
|
The floor() function returns the largest integral value less than or equal to x. The floorf() function is a single precision version of floor(). |
flushinp(3) -- miscellaneous curses utility routines
|
The unctrl macro expands to a character string which is a printable representation of the character c. Control characters are displayed in the ^X notation. Printing characters are displayed as is. The... |
fmod(3) -- floating-point remainder functions
|
The fmod() function computes the floating-point remainder of x/ y. The fmodf() function is a single precision version of fmod(). |
fmodf(3) -- floating-point remainder functions
|
The fmod() function computes the floating-point remainder of x/ y. The fmodf() function is a single precision version of fmod(). |
fmt_scaled(3) -- handle numbers with a human-readable scale
|
The scan_scaled() function scans the given number and looks for a terminal scale multiplier of B, K, M, G, T, P or E (in either upper or lower case) for Byte, Kilobyte, Megabyte, Gigabyte, Terabyte, P... |
fnmatch(3) -- match filename or pathname using shell globbing rules
|
The fnmatch() function matches patterns according to the globbing rules used by the shell. It checks the string specified by the string argument to see if it matches the pattern specified by the patte... |
fopen(3) -- stream open functions
|
The fopen() function opens the file whose name is the string pointed to by path and associates a stream with it. The argument mode points to a string beginning with one of the following sequences (add... |
forkpty(3) -- tty utility functions
|
The openpty(), login_tty(), and forkpty() functions perform manipulations on ttys and pseudo-ttys. The openpty() function finds an available pseudo-tty and returns file descriptors for the master and ... |
form(3) -- curses extension for programming forms
|
The form library provides terminal-independent facilities for composing form screens on character-cell terminals. The library includes: field routines, which create and modify form fields; and form ro... |
form_cursor(3) -- position a form window cursor
|
The function pos_form_cursor restores the cursor to the position required for the forms driver to continue processing requests. This is useful after curses routines have been called to do screen-paint... |
form_data(3) -- test for off-screen data in given forms
|
The function data_ahead tests whether there is off-screen data ahead in the given form. It returns TRUE (1) or FALSE (0). The function data_behind tests whether there is off-screen data behind in the ... |
form_driver(3) -- command-processing loop of the form system
|
Once a form has been posted (displayed), you should funnel input events to it through form_driver. This routine has two major input cases; either the input is a form navigation request or it's a prin... |
form_field(3) -- make and break connections between fields and forms
|
The function set_form_fields changes the field pointer array of the given form. The array must be terminated by a NULL. The function form_fields returns the field array of the given form. The function... |
form_fields(3) -- make and break connections between fields and forms
|
The function set_form_fields changes the field pointer array of the given form. The array must be terminated by a NULL. The function form_fields returns the field array of the given form. The function... |
form_fieldtype(3) -- define validation-field types
|
The function new_fieldtype creates a new field type usable for data validation. You supply it with field_check, a predicate to check the validity of an entered data string whenever the user attempts t... |
form_field_attributes(3) -- color and attribute control for form fields
|
The function set_field_fore sets the foreground attribute of field. This is the highlight used to display the field contents. The function field_fore returns the foreground attribute. The default is A... |
form_field_buffer(3) -- field buffer control
|
The function set_field_buffer sets the numbered buffer of the given field to contain a given string. Buffer 0 is the displayed value of the field; other numbered buffers may be allocated by applicatio... |
form_field_info(3) -- retrieve field characteristics
|
The function field_info returns the sizes and other attributes passed in to the field at its creation time. The attributes are: height, width, row of upper-left corner, column of upper-left corner, nu... |
form_field_just(3) -- retrieve field characteristics
|
The function set_field_just sets the justification attribute of a field; field_just returns a field's justification attribute. The attribute may be one of NO_JUSTIFICATION, JUSTIFY_RIGHT, JUSTIFY_LEF... |
form_field_new(3) -- create and destroy form fields
|
The function new_field allocates a new field and initializes it from the parameters given: height, width, row of upper-left corner, column of upper-left corner, number off-screen rows, and number of a... |
form_field_opts(3) -- set and get field options
|
The function set_field_opts sets all the given field's option bits (field option bits may be logically OR'ed together). The function field_opts_on turns on the given option bits, and leaves others a... |
form_field_userptr(3) -- associate application data with a form field
|
Every form field has a field that can be used to hold application-specific data (that is, the form-driver code leaves it alone). These functions get and set that field. |
form_field_validation(3) -- data type validation for fields
|
The function set_field_type declares a data type for a given form field. This is the type checked by validation functions. The types are as follows: TYPE_ALNUM Alphanumeric data. Requires a third int ... |
form_hook(3) -- set hooks for automatic invocation by applications
|
These functions make it possible to set hook functions to be called at various points in the automatic processing of input event codes by form_driver. The function set_field_init sets a hook to be cal... |
form_init(3) -- set hooks for automatic invocation by applications
|
These functions make it possible to set hook functions to be called at various points in the automatic processing of input event codes by form_driver. The function set_field_init sets a hook to be cal... |
form_new(3) -- create and destroy forms
|
The function new_form creates a new form connected to a specified field pointer array (which must be NULL-terminated). The function free_form disconnects form from its field array and frees the storag... |
form_new_page(3) -- form pagination functions
|
The function set_new_page sets or resets a flag marking the given field as the beginning of a new page on its form. The function new_page is a predicate which tests if a given field marks a page begin... |
form_opts(3) -- set and get form options
|
The function set_form_opts sets all the given form's option bits (form option bits may be logically OR'ed together). The function form_opts_on turns on the given option bits, and leaves others alone... |
form_opts_off(3) -- set and get form options
|
The function set_form_opts sets all the given form's option bits (form option bits may be logically OR'ed together). The function form_opts_on turns on the given option bits, and leaves others alone... |
form_opts_on(3) -- set and get form options
|
The function set_form_opts sets all the given form's option bits (form option bits may be logically OR'ed together). The function form_opts_on turns on the given option bits, and leaves others alone... |
form_page(3) -- set and get form page number
|
The function set_current field sets the current field of the given form; current_field returns the current field of the given form. The function set_form_page sets the form's page number (goes to pag... |
form_post(3) -- write or erase forms from associated subwindows
|
The function post_form displays a form to its associated subwindow. To trigger physical display of the subwindow, use refresh or some equivalent curses routine (the implicit doupdate triggered by an c... |
form_requestname(3) -- handle printable form request names
|
The function form_request_name returns the printable name of a form request code. The function form_request_by_name searches in the nametable for a request with the given name and returns its request ... |
form_request_by_name(3) -- handle printable form request names
|
The function form_request_name returns the printable name of a form request code. The function form_request_by_name searches in the nametable for a request with the given name and returns its request ... |
form_request_name(3) -- handle printable form request names
|
The function form_request_name returns the printable name of a form request code. The function form_request_by_name searches in the nametable for a request with the given name and returns its request ... |
form_sub(3) -- make and break form window and subwindow associations
|
Every form has an associated pair of curses windows. The form window displays any title and border associated with the window; the form subwindow displays the items of the form that are currently avai... |
form_term(3) -- set hooks for automatic invocation by applications
|
These functions make it possible to set hook functions to be called at various points in the automatic processing of input event codes by form_driver. The function set_field_init sets a hook to be cal... |
form_userptr(3) -- associate application data with a form item
|
Every form and every form item has a field that can be used to hold application-specific data (that is, the formdriver code leaves it alone). These functions get and set the form user pointer field. |
form_win(3) -- make and break form window and subwindow associations
|
Every form has an associated pair of curses windows. The form window displays any title and border associated with the window; the form subwindow displays the items of the form that are currently avai... |
fparseln(3) -- return the next logical line from a stream
|
The fparseln() function returns a pointer to the next logical line from the stream referenced by stream. This string is null terminated and dynamically allocated on each invocation. It is the responsi... |
fpgetmask(3) -- IEEE FP mode control
|
A rounding mode is one of FP_RZ, FP_RM, FP_RN, or FP_RP, for rounding towards zero, rounding (Minus infinity) down, rounding to nearest, and rounding (Plus infinity) up. The default mode is FP_RN. An ... |
fpgetround(3) -- IEEE FP mode control
|
A rounding mode is one of FP_RZ, FP_RM, FP_RN, or FP_RP, for rounding towards zero, rounding (Minus infinity) down, rounding to nearest, and rounding (Plus infinity) up. The default mode is FP_RN. An ... |
fpgetsticky(3) -- IEEE FP mode control
|
A rounding mode is one of FP_RZ, FP_RM, FP_RN, or FP_RP, for rounding towards zero, rounding (Minus infinity) down, rounding to nearest, and rounding (Plus infinity) up. The default mode is FP_RN. An ... |
fprintf(3) -- formatted output conversion
|
The printf() family of functions produce output according to the given format as described below. This format may contain ``conversion specifiers''; the results of such conversions, if any, depend o... |
fpsetmask(3) -- IEEE FP mode control
|
A rounding mode is one of FP_RZ, FP_RM, FP_RN, or FP_RP, for rounding towards zero, rounding (Minus infinity) down, rounding to nearest, and rounding (Plus infinity) up. The default mode is FP_RN. An ... |
fpsetround(3) -- IEEE FP mode control
|
A rounding mode is one of FP_RZ, FP_RM, FP_RN, or FP_RP, for rounding towards zero, rounding (Minus infinity) down, rounding to nearest, and rounding (Plus infinity) up. The default mode is FP_RN. An ... |
fpsetsticky(3) -- IEEE FP mode control
|
A rounding mode is one of FP_RZ, FP_RM, FP_RN, or FP_RP, for rounding towards zero, rounding (Minus infinity) down, rounding to nearest, and rounding (Plus infinity) up. The default mode is FP_RN. An ... |
fpurge(3) -- flush a stream
|
The function fflush() forces a write of all buffered data for the given output or update stream via the stream's underlying write function. The open status of the stream is unaffected. If the stream ... |
fputc(3) -- output a character or word to a stream
|
The fputc() function writes the character c (converted to an unsigned char) to the output stream pointed to by stream. putc() acts essentially identically to fputc(), but is a macro that expands in-li... |
fputs(3) -- output a line to a stream
|
The function fputs() writes the string pointed to by str to the stream pointed to by stream. The function puts() writes the string str, and a terminating newline character, to the stream stdout. |
fread(3) -- binary stream input/output
|
The function fread() reads nmemb objects, each size bytes long, from the stream pointed to by stream, storing them at the location given by ptr. The function fwrite() writes nmemb objects, each size b... |
free(3) -- memory allocation and deallocation
|
The malloc() function allocates uninitialized space for an object whose size is specified by size. The malloc() function maintains multiple lists of free blocks according to size, allocating space fro... |
freeaddrinfo(3) -- nodename-to-address translation
|
The getaddrinfo() function is defined for protocol-independent nodenameto-address translation. It performs the functionality of gethostbyname(3) and getservbyname(3), but in a more sophisticated manne... |
freeifaddrs(3) -- get interface addresses
|
The getifaddrs() function stores a reference to a linked list of the network interfaces on the local machine in the memory referenced by ifap. The list consists of ifaddrs structures, as defined in th... |
freerrset(3) -- retrieve DNS records
|
getrrsetbyname() gets a set of resource records associated with a hostname, rdclass and rdtype. hostname is a pointer a to null-terminated string. The flags field is currently unused and must be zero.... |
free_field(3) -- create and destroy form fields
|
The function new_field allocates a new field and initializes it from the parameters given: height, width, row of upper-left corner, column of upper-left corner, number off-screen rows, and number of a... |
free_fieldtype(3) -- define validation-field types
|
The function new_fieldtype creates a new field type usable for data validation. You supply it with field_check, a predicate to check the validity of an entered data string whenever the user attempts t... |
free_form(3) -- create and destroy forms
|
The function new_form creates a new form connected to a specified field pointer array (which must be NULL-terminated). The function free_form disconnects form from its field array and frees the storag... |
free_item(3) -- create and destroy menu items
|
The function new_item allocates a new item and initializes it from the name and description pointers. Please notice that the item stores only the pointers to the name and description. Those pointers m... |
free_menu(3) -- create and destroy menus
|
The function new_menu creates a new menu connected to a specified item pointer array (which must be NULL-terminated). The function free_menu disconnects menu from its item array and frees the storage ... |
freopen(3) -- stream open functions
|
The fopen() function opens the file whose name is the string pointed to by path and associates a stream with it. The argument mode points to a string beginning with one of the following sequences (add... |
frexp(3) -- convert floating-point number to fractional and integral components
|
The frexp() function breaks a floating-point number into a normalized fraction and an integral power of 2. It stores the integer in the int object pointed to by exp. |
fropen(3) -- open a stream
|
The funopen() function associates a stream with up to four ``I/O functions''. Either readfn or writefn must be specified; the others can be given as an appropriately typed NULL pointer. These I/O fu... |
fscanf(3) -- input format conversion
|
The scanf() family of functions read input according to the given format as described below. This format may contain ``conversion specifiers''; the results of such conversions, if any, are stored th... |
fseek(3) -- reposition a stream
|
The fseek() function sets the file position indicator for the stream pointed to by stream. The new position, measured in bytes, is obtained by adding offset bytes to the position specified by whence. ... |
fseeko(3) -- reposition a stream
|
The fseek() function sets the file position indicator for the stream pointed to by stream. The new position, measured in bytes, is obtained by adding offset bytes to the position specified by whence. ... |
fsetpos(3) -- reposition a stream
|
The fseek() function sets the file position indicator for the stream pointed to by stream. The new position, measured in bytes, is obtained by adding offset bytes to the position specified by whence. ... |
ftell(3) -- reposition a stream
|
The fseek() function sets the file position indicator for the stream pointed to by stream. The new position, measured in bytes, is obtained by adding offset bytes to the position specified by whence. ... |
ftello(3) -- reposition a stream
|
The fseek() function sets the file position indicator for the stream pointed to by stream. The new position, measured in bytes, is obtained by adding offset bytes to the position specified by whence. ... |
ftime(3) -- get date and time
|
This interface is obsoleted by gettimeofday(2). It is available from the compatibility library, libcompat. The ftime() routine fills in a structure pointed to by its argument, as defined by |
ftok(3) -- create IPC identifier from a pathname
|
The ftok() function attempts to create a unique key suitable for use with the msgget(2), semget(2) and shmget(2) functions given the path of an existing file and a user-selectable id. The specified pa... |
ftrylockfile(3) -- application level locking of stdio files
|
The flockfile(), ftrylockfile(), and funlockfile() functions provide for explicit application-level locking of stdio FILE * objects. These functions can be used by a thread to delineate a sequence of ... |
fts(3) -- traverse a file hierarchy
|
The fts functions are provided for traversing UNIX file hierarchies. The fts_open() function returns a ``handle'' on a file hierarchy, which is then supplied to the other fts functions. The function... |
fts_children(3) -- traverse a file hierarchy
|
The fts functions are provided for traversing UNIX file hierarchies. The fts_open() function returns a ``handle'' on a file hierarchy, which is then supplied to the other fts functions. The function... |
fts_close(3) -- traverse a file hierarchy
|
The fts functions are provided for traversing UNIX file hierarchies. The fts_open() function returns a ``handle'' on a file hierarchy, which is then supplied to the other fts functions. The function... |
fts_open(3) -- traverse a file hierarchy
|
The fts functions are provided for traversing UNIX file hierarchies. The fts_open() function returns a ``handle'' on a file hierarchy, which is then supplied to the other fts functions. The function... |
fts_read(3) -- traverse a file hierarchy
|
The fts functions are provided for traversing UNIX file hierarchies. The fts_open() function returns a ``handle'' on a file hierarchy, which is then supplied to the other fts functions. The function... |
fts_set(3) -- traverse a file hierarchy
|
The fts functions are provided for traversing UNIX file hierarchies. The fts_open() function returns a ``handle'' on a file hierarchy, which is then supplied to the other fts functions. The function... |
ftw(3) -- traverse (walk) a file tree
|
These functions are provided for compatibility with legacy code. New code should use the fts(3) functions. The ftw() and nftw() functions traverse (walk) the directory hierarchy rooted in path. For ea... |
funlockfile(3) -- application level locking of stdio files
|
The flockfile(), ftrylockfile(), and funlockfile() functions provide for explicit application-level locking of stdio FILE * objects. These functions can be used by a thread to delineate a sequence of ... |
funopen(3) -- open a stream
|
The funopen() function associates a stream with up to four ``I/O functions''. Either readfn or writefn must be specified; the others can be given as an appropriately typed NULL pointer. These I/O fu... |
fwopen(3) -- open a stream
|
The funopen() function associates a stream with up to four ``I/O functions''. Either readfn or writefn must be specified; the others can be given as an appropriately typed NULL pointer. These I/O fu... |
fwrite(3) -- binary stream input/output
|
The function fread() reads nmemb objects, each size bytes long, from the stream pointed to by stream, storing them at the location given by ptr. The function fwrite() writes nmemb objects, each size b... |
gai_strerror(3) -- nodename-to-address translation
|
The getaddrinfo() function is defined for protocol-independent nodenameto-address translation. It performs the functionality of gethostbyname(3) and getservbyname(3), but in a more sophisticated manne... |
gamma(3) -- log gamma functions
|
|
gammaf(3) -- log gamma functions
|
|
gcvt(3) -- convert double to ASCII string
|
These functions are provided for compatibility with legacy code. New code should use the snprintf(3) function for improved safety and porta- bility. The ecvt(), fcvt() and gcvt() functions convert the... |
getaddrinfo(3) -- nodename-to-address translation
|
The getaddrinfo() function is defined for protocol-independent nodenameto-address translation. It performs the functionality of gethostbyname(3) and getservbyname(3), but in a more sophisticated manne... |
getbegyx(3) -- get curses cursor and window coordinates
|
The getyx macro places the current cursor position of the given window in the two integer variables y and x. If win is a subwindow, the getparyx macro places the beginning coordinates of the subwindow... |
getbkgd(3) -- curses window background manipulation routines
|
The bkgdset and wbkgdset routines manipulate the background of the named window. The window background is a chtype consisting of any combination of attributes (i.e., rendition) and a character. The at... |
getbsize(3) -- get user block size
|
The getbsize() function determines the user's preferred block size based on the value of the BLOCKSIZE environment variable; see environ(7) for details on its use and format. The getbsize() function ... |
getc(3) -- get next character or word from input stream
|
The fgetc() function obtains the next input character (if present) from the stream pointed at by stream, or the next character pushed back on the stream via ungetc(3). The getc() function acts essenti... |
getcap(3) -- capability database access routines
|
The cgetent() function extracts the capability record name from the database specified by the null-terminated file array db_array and returns a pointer to a copy of it in buf. cgetent() will first loo... |
getch(3) -- get (or push back) characters from curses terminal keyboard
|
The getch, wgetch, mvgetch and mvwgetch, routines read a character from the window. In no-delay mode, if no input is waiting, the value ERR is returned. In delay mode, the program waits until the syst... |
getchar(3) -- get next character or word from input stream
|
The fgetc() function obtains the next input character (if present) from the stream pointed at by stream, or the next character pushed back on the stream via ungetc(3). The getc() function acts essenti... |
getchar_unlocked(3) -- get next character from stream, efficiently
|
The getc_unlocked() and getchar_unlocked() functions are equivalent to their locked counterparts, getc(3) and getchar(3). However, getc_unlocked() and getchar_unlocked() assume that the relevant strea... |
getcwd(3) -- get working directory pathname
|
The getcwd() function copies the absolute pathname of the current working directory into the memory referenced by buf and returns a pointer to buf. The size argument is the size, in bytes, of the arra... |
getc_unlocked(3) -- get next character from stream, efficiently
|
The getc_unlocked() and getchar_unlocked() functions are equivalent to their locked counterparts, getc(3) and getchar(3). However, getc_unlocked() and getchar_unlocked() assume that the relevant strea... |
getdiskbyname(3) -- get generic disk description by its name
|
The getdiskbyname() function takes a disk name (e.g., "rm03") and returns a prototype disk label describing its geometry information and the standard disk partition tables. All information is obtain... |
getdomainname(3) -- get/set YP domain name of current host
|
The getdomainname() function returns the YP domain name for the current processor, as previously set by setdomainname(). The parameter namelen specifies the size of the name array. If insufficient spa... |
getdtablesize(3) -- get descriptor table size
|
Each process has a fixed size descriptor table, which is guaranteed to have at least 20 slots. The entries in the descriptor table are numbered with small integers starting at 0. The call getdtablesiz... |
getenv(3) -- environment variable functions
|
These functions set, unset, and fetch environment variables from the host environment list. For compatibility with differing environment conventions, the given arguments name and value may be appended... |
getfsent(3) -- get file system descriptor file entry
|
The getfsent(), getfsspec(), and getfsfile() functions each return a pointer to an object with the following structure containing the brokenout fields of a line in the file system description file, |
getfsfile(3) -- get file system descriptor file entry
|
The getfsent(), getfsspec(), and getfsfile() functions each return a pointer to an object with the following structure containing the brokenout fields of a line in the file system description file, |
getfsspec(3) -- get file system descriptor file entry
|
The getfsent(), getfsspec(), and getfsfile() functions each return a pointer to an object with the following structure containing the brokenout fields of a line in the file system description file, |
getfstype(3) -- get file system descriptor file entry
|
The getfsent(), getfsspec(), and getfsfile() functions each return a pointer to an object with the following structure containing the brokenout fields of a line in the file system description file, |
getgrent(3) -- group database operations
|
These functions operate on the group database file /etc/group which is described in group(5). Each line of the database is defined by the structure struct group found in the include file : stru... |
getgrgid(3) -- group database operations
|
These functions operate on the group database file /etc/group which is described in group(5). Each line of the database is defined by the structure struct group found in the include file : stru... |
getgrgid_r(3) -- group database operations
|
These functions operate on the group database file /etc/group which is described in group(5). Each line of the database is defined by the structure struct group found in the include file : stru... |
getgrnam(3) -- group database operations
|
These functions operate on the group database file /etc/group which is described in group(5). Each line of the database is defined by the structure struct group found in the include file : stru... |
getgrnam_r(3) -- group database operations
|
These functions operate on the group database file /etc/group which is described in group(5). Each line of the database is defined by the structure struct group found in the include file : stru... |
getgrouplist(3) -- calculate group access list
|
The getgrouplist() function reads through the group file and calculates the group access list for the user specified in name. The basegid is automatically included in the groups list. Typically this v... |
gethostbyaddr(3) -- get network host entry
|
The gethostbyname(), gethostbyname2() and gethostbyaddr() functions each return a pointer to an object with the following structure describing an internet host referenced by name or by address, respec... |
gethostbyname(3) -- get network host entry
|
The gethostbyname(), gethostbyname2() and gethostbyaddr() functions each return a pointer to an object with the following structure describing an internet host referenced by name or by address, respec... |
gethostbyname2(3) -- get network host entry
|
The gethostbyname(), gethostbyname2() and gethostbyaddr() functions each return a pointer to an object with the following structure describing an internet host referenced by name or by address, respec... |
gethostent(3) -- get network host entry
|
The gethostbyname(), gethostbyname2() and gethostbyaddr() functions each return a pointer to an object with the following structure describing an internet host referenced by name or by address, respec... |
gethostid(3) -- get/set unique identifier of current host
|
The sethostid() function establishes a 32-bit identifier for the current processor that is intended to be unique among all UNIX systems in existence. This is normally a DARPA Internet address for the ... |
gethostname(3) -- get/set name of current host
|
The gethostname() function returns the standard host name for the current processor, as previously set by sethostname(). The parameter namelen specifies the size of the name array. If insufficient spa... |
getifaddrs(3) -- get interface addresses
|
The getifaddrs() function stores a reference to a linked list of the network interfaces on the local machine in the memory referenced by ifap. The list consists of ifaddrs structures, as defined in th... |
getloadavg(3) -- get system load averages
|
The getloadavg() function returns the number of processes in the system run queue averaged over various periods of time. Up to nelem samples are retrieved and assigned to successive elements of loadav... |
getmaxpartitions(3) -- get the maximum number of partitions allowed per disk
|
getmaxpartitions() returns the number of partitions that are allowed per disk on the system. |
getmaxyx(3) -- get curses cursor and window coordinates
|
The getyx macro places the current cursor position of the given window in the two integer variables y and x. If win is a subwindow, the getparyx macro places the beginning coordinates of the subwindow... |
getmntinfo(3) -- get information about mounted file systems
|
The getmntinfo() function returns an array of statfs structures describing each currently mounted file system (see statfs(2)). The getmntinfo() function passes its flags parameter transparently to get... |
getmode(3) -- modify mode bits
|
The getmode() function returns a copy of the file permission bits mode as altered by the values pointed to by set. While only the mode bits are altered, other parts of the file mode may be examined. T... |
getmouse(3) -- mouse interface through curses
|
These functions provide an interface to mouse events from curses(3). Mouse events are represented by KEY_MOUSE pseudo-key values in the wgetch input stream. To make mouse events visible, use the mouse... |
getnameinfo(3) -- address-to-nodename translation in protocolindependent manner
|
The getnameinfo() function is defined for protocol-independent addressto-nodename translation. Its functionality is a reverse conversion of getaddrinfo(3), and implements similar functionality to geth... |
getnetbyaddr(3) -- get network entry
|
The getnetent(), getnetbyname(), and getnetbyaddr() functions each return a pointer to an object with the following structure containing the broken-out fields of a line in the network database, /etc/n... |
getnetbyname(3) -- get network entry
|
The getnetent(), getnetbyname(), and getnetbyaddr() functions each return a pointer to an object with the following structure containing the broken-out fields of a line in the network database, /etc/n... |
getnetent(3) -- get network entry
|
The getnetent(), getnetbyname(), and getnetbyaddr() functions each return a pointer to an object with the following structure containing the broken-out fields of a line in the network database, /etc/n... |
getnetgrent(3) -- netgroup database operations
|
These functions operate on the netgroup database file /etc/netgroup.db which is described in netgroup(5). If that file does not exist, and the system supports YP, then the netgroup YP databases are us... |
getnstr(3) -- accept character strings from curses terminal keyboard
|
The function getstr is equivalent to a series of calls to getch, until a newline or carriage return is received (the terminating character is not included in the returned string). The resulting value ... |
getopt(3) -- get option character from command line argument list
|
The getopt() function incrementally parses a command line argument list argv and returns the next known option character. An option character is known if it has been specified in the string of accepte... |
getopt_long(3) -- get long options from command line argument list
|
The getopt_long() function is similar to getopt(3) but it accepts options in two forms: words and characters. The getopt_long() function provides a superset of the functionality of getopt(3). getopt_l... |
getopt_long_only(3) -- get long options from command line argument list
|
The getopt_long() function is similar to getopt(3) but it accepts options in two forms: words and characters. The getopt_long() function provides a superset of the functionality of getopt(3). getopt_l... |
getpagesize(3) -- get system page size
|
This interface is obsoleted by sysconf(3). Use sysconf(_SC_PAGESIZE). The getpagesize() function returns the number of bytes in a page. Page granularity is the granularity of many of the memory manage... |
getparyx(3) -- get curses cursor and window coordinates
|
The getyx macro places the current cursor position of the given window in the two integer variables y and x. If win is a subwindow, the getparyx macro places the beginning coordinates of the subwindow... |
getpass(3) -- get a password
|
The getpass() function displays a prompt to, and reads in a password from, /dev/tty. If this file is not accessible, getpass() displays the prompt on the standard error output and reads from the stand... |
getprotobyname(3) -- get protocol entry
|
The getprotoent(), getprotobyname(), and getprotobynumber() functions each return a pointer to an object with the following structure containing the broken-out fields of a line in the network protocol... |
getprotobynumber(3) -- get protocol entry
|
The getprotoent(), getprotobyname(), and getprotobynumber() functions each return a pointer to an object with the following structure containing the broken-out fields of a line in the network protocol... |
getprotoent(3) -- get protocol entry
|
The getprotoent(), getprotobyname(), and getprotobynumber() functions each return a pointer to an object with the following structure containing the broken-out fields of a line in the network protocol... |
getpwent(3) -- password database operations
|
These functions operate on the password database file which is described in passwd(5). Each entry in the database is defined by the structure struct passwd found in the include file : struct pa... |
getpwnam(3) -- password database operations
|
These functions operate on the password database file which is described in passwd(5). Each entry in the database is defined by the structure struct passwd found in the include file : struct pa... |
getpwuid(3) -- password database operations
|
These functions operate on the password database file which is described in passwd(5). Each entry in the database is defined by the structure struct passwd found in the include file : struct pa... |
getrawpartition(3) -- get the system ``raw'' partition
|
getrawpartition() returns the partition number (`a' == 0, `b' == 1, ...) of the ``raw'' partition of the system's disks. The ``raw'' partition is defined as the partition which provides access ... |
getrpcbyname(3) -- get RPC entry
|
getrpcent(), getrpcbyname(), and getrpcbynumber(), each return a pointer to an object with the following structure containing the broken-out fields of a line in the rpc program number database, /etc/r... |
getrpcbynumber(3) -- get RPC entry
|
getrpcent(), getrpcbyname(), and getrpcbynumber(), each return a pointer to an object with the following structure containing the broken-out fields of a line in the rpc program number database, /etc/r... |
getrpcent(3) -- get RPC entry
|
getrpcent(), getrpcbyname(), and getrpcbynumber(), each return a pointer to an object with the following structure containing the broken-out fields of a line in the rpc program number database, /etc/r... |
getrpcport(3) -- get RPC port number
|
getrpcport() returns the port number for version versnum of the RPC program prognum running on host and using protocol proto. It returns 0 if it cannot contact the portmapper, or if prognum is not reg... |
getrrsetbyname(3) -- retrieve DNS records
|
getrrsetbyname() gets a set of resource records associated with a hostname, rdclass and rdtype. hostname is a pointer a to null-terminated string. The flags field is currently unused and must be zero.... |
gets(3) -- get a line from a stream
|
The fgets() function reads at most one less than the number of characters specified by size from the given stream and stores them in the string str. Reading stops when a newline character is found, at... |
getservbyname(3) -- get service entry
|
The getservent(), getservbyname(), and getservbyport() functions each return a pointer to an object with the following structure containing the broken-out fields of a line in the network services data... |
getservbyport(3) -- get service entry
|
The getservent(), getservbyname(), and getservbyport() functions each return a pointer to an object with the following structure containing the broken-out fields of a line in the network services data... |
getservent(3) -- get service entry
|
The getservent(), getservbyname(), and getservbyport() functions each return a pointer to an object with the following structure containing the broken-out fields of a line in the network services data... |
getstr(3) -- accept character strings from curses terminal keyboard
|
The function getstr is equivalent to a series of calls to getch, until a newline or carriage return is received (the terminating character is not included in the returned string). The resulting value ... |
getsubopt(3) -- get sub options from an argument
|
The getsubopt() function parses a string containing tokens delimited by one or more tab, space or comma (`,') characters. It is intended for use in parsing groups of option arguments provided as part... |
getsyx(3) -- low-level curses routines
|
The following routines give low-level access to various curses capabilities. Theses routines typically are used inside library routines. The def_prog_mode and def_shell_mode routines save the current ... |
getttyent(3) -- get ttys file entry
|
The getttyent() and getttynam() functions each return a pointer to an object, with the following structure, containing the brokenout fields of a line from the tty description file. struct ttyent { cha... |
getttynam(3) -- get ttys file entry
|
The getttyent() and getttynam() functions each return a pointer to an object, with the following structure, containing the brokenout fields of a line from the tty description file. struct ttyent { cha... |
getusershell(3) -- get legal user shells
|
The getusershell() function returns a pointer to a legal user shell as defined by the system manager in the file /etc/shells. If /etc/shells is unreadable or does not exist, getusershell() behaves as ... |
getw(3) -- get next character or word from input stream
|
The fgetc() function obtains the next input character (if present) from the stream pointed at by stream, or the next character pushed back on the stream via ungetc(3). The getc() function acts essenti... |
getwd(3) -- get working directory pathname
|
The getcwd() function copies the absolute pathname of the current working directory into the memory referenced by buf and returns a pointer to buf. The size argument is the size, in bytes, of the arra... |
getwin(3) -- miscellaneous curses utility routines
|
The unctrl macro expands to a character string which is a printable representation of the character c. Control characters are displayed in the ^X notation. Printing characters are displayed as is. The... |
getyx(3) -- get curses cursor and window coordinates
|
The getyx macro places the current cursor position of the given window in the two integer variables y and x. If win is a subwindow, the getparyx macro places the beginning coordinates of the subwindow... |
get_myaddress(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
glob(3) -- generate pathnames matching a pattern
|
The glob() function is a pathname generator that implements the rules for file name pattern matching used by the shell. The include file defines the structure type glob_t, which contains at l... |
globfree(3) -- generate pathnames matching a pattern
|
The glob() function is a pathname generator that implements the rules for file name pattern matching used by the shell. The include file defines the structure type glob_t, which contains at l... |
gmtime(3) -- convert date and time to ASCII
|
The ctime() function converts a time_t, pointed to by clock, representing the time in seconds since 00:00:00 UTC, 1970-01-01, and returns a pointer to a 26-character string of the form Thu Nov 24 18:2... |
gmtime_r(3) -- convert date and time to ASCII
|
The ctime() function converts a time_t, pointed to by clock, representing the time in seconds since 00:00:00 UTC, 1970-01-01, and returns a pointer to a 26-character string of the form Thu Nov 24 18:2... |
group_from_gid(3) -- cache password and group entries
|
The user_from_uid() function returns the user name associated with the argument uid. The user name is cached so that multiple calls with the same uid do not require additional calls to getpwuid(3). If... |
gtty(3) -- set and get terminal state (defunct)
|
These interfaces are obsoleted by ioctl(2). They are available from the compatibility library, libcompat. The stty() function sets the state of the terminal associated with fd. The gtty() function ret... |
gzclearerr(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
gzclose(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
gzdopen(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
gzeof(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
gzerror(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
gzflush(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
gzgetc(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
gzgets(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
gzopen(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
gzprintf(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
gzputc(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
gzputs(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
gzread(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
gzrewind(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
gzseek(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
gzsetparams(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
gztell(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
gzungetc(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
gzwrite(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
halfdelay(3) -- curses input options
|
Normally, the tty driver buffers typed characters until a newline or carriage return is typed. The cbreak routine disables line buffering and erase/kill character-processing (interrupt and flow contro... |
hash(3) -- hash database access method
|
The routine dbopen() is the library interface to database files. One of the supported file formats is hash files. The general description of the database access methods is in dbopen(3). This manual pa... |
has_colors(3) -- curses color manipulation routines
|
Overview curses support color attributes on terminals with that capability. To use these routines start_color must be called, usually right after initscr. Colors are always used in pairs (referred to ... |
has_ic(3) -- curses environment query routines
|
The baudrate routine returns the output speed of the terminal. The number returned is in bits per second, for example 9600, and is an integer. The erasechar routine returns the user's current erase c... |
has_il(3) -- curses environment query routines
|
The baudrate routine returns the output speed of the terminal. The number returned is in bits per second, for example 9600, and is an integer. The erasechar routine returns the user's current erase c... |
has_key(3) -- get (or push back) characters from curses terminal keyboard
|
The getch, wgetch, mvgetch and mvwgetch, routines read a character from the window. In no-delay mode, if no input is waiting, the value ERR is returned. In delay mode, the program waits until the syst... |
hcreate(3) -- manage hash search table
|
The hcreate(), hdestroy() and hsearch() functions manage hash search tables. The hcreate() function allocates and initializes the table. The nel argument specifies an estimate of the maximum number of... |
hdestroy(3) -- manage hash search table
|
The hcreate(), hdestroy() and hsearch() functions manage hash search tables. The hcreate() function allocates and initializes the table. The nel argument specifies an estimate of the maximum number of... |
heapsort(3) -- sort functions
|
The qsort() function is a modified partition-exchange sort, or quicksort. The heapsort() function is a modified selection sort. The mergesort() function is a modified merge sort with exponential searc... |
herror(3) -- get network host entry
|
The gethostbyname(), gethostbyname2() and gethostbyaddr() functions each return a pointer to an object with the following structure describing an internet host referenced by name or by address, respec... |
hide_panel(3) -- panel stack extension for curses
|
Panels are curses(3) windows with the added feature of depth. Panel functions allow the use of stacked windows and ensure the proper portions of each window and the curses stdscr window are hidden or ... |
hid_dispose_report_desc(3) -- USB HID access routines
|
The usbhid library provides routines to extract data from USB Human Interface Devices. INTRODUCTIONÂ Â Â Â [Toc]Â Â Â Â [Back] USB HID devices send and receive data laid out in a device dependent way. The usb... |
hid_end_parse(3) -- USB HID access routines
|
The usbhid library provides routines to extract data from USB Human Interface Devices. INTRODUCTIONÂ Â Â Â [Toc]Â Â Â Â [Back] USB HID devices send and receive data laid out in a device dependent way. The usb... |
hid_get_data(3) -- USB HID access routines
|
The usbhid library provides routines to extract data from USB Human Interface Devices. INTRODUCTIONÂ Â Â Â [Toc]Â Â Â Â [Back] USB HID devices send and receive data laid out in a device dependent way. The usb... |
hid_get_item(3) -- USB HID access routines
|
The usbhid library provides routines to extract data from USB Human Interface Devices. INTRODUCTIONÂ Â Â Â [Toc]Â Â Â Â [Back] USB HID devices send and receive data laid out in a device dependent way. The usb... |
hid_get_report_desc(3) -- USB HID access routines
|
The usbhid library provides routines to extract data from USB Human Interface Devices. INTRODUCTIONÂ Â Â Â [Toc]Â Â Â Â [Back] USB HID devices send and receive data laid out in a device dependent way. The usb... |
hid_init(3) -- USB HID access routines
|
The usbhid library provides routines to extract data from USB Human Interface Devices. INTRODUCTIONÂ Â Â Â [Toc]Â Â Â Â [Back] USB HID devices send and receive data laid out in a device dependent way. The usb... |
hid_locate(3) -- USB HID access routines
|
The usbhid library provides routines to extract data from USB Human Interface Devices. INTRODUCTIONÂ Â Â Â [Toc]Â Â Â Â [Back] USB HID devices send and receive data laid out in a device dependent way. The usb... |
hid_parse_usage_in_page(3) -- USB HID access routines
|
The usbhid library provides routines to extract data from USB Human Interface Devices. INTRODUCTIONÂ Â Â Â [Toc]Â Â Â Â [Back] USB HID devices send and receive data laid out in a device dependent way. The usb... |
hid_parse_usage_page(3) -- USB HID access routines
|
The usbhid library provides routines to extract data from USB Human Interface Devices. INTRODUCTIONÂ Â Â Â [Toc]Â Â Â Â [Back] USB HID devices send and receive data laid out in a device dependent way. The usb... |
hid_report_size(3) -- USB HID access routines
|
The usbhid library provides routines to extract data from USB Human Interface Devices. INTRODUCTIONÂ Â Â Â [Toc]Â Â Â Â [Back] USB HID devices send and receive data laid out in a device dependent way. The usb... |
hid_set_data(3) -- USB HID access routines
|
The usbhid library provides routines to extract data from USB Human Interface Devices. INTRODUCTIONÂ Â Â Â [Toc]Â Â Â Â [Back] USB HID devices send and receive data laid out in a device dependent way. The usb... |
hid_start(3) -- USB HID access routines
|
The usbhid library provides routines to extract data from USB Human Interface Devices. INTRODUCTIONÂ Â Â Â [Toc]Â Â Â Â [Back] USB HID devices send and receive data laid out in a device dependent way. The usb... |
hid_start_parse(3) -- USB HID access routines
|
The usbhid library provides routines to extract data from USB Human Interface Devices. INTRODUCTIONÂ Â Â Â [Toc]Â Â Â Â [Back] USB HID devices send and receive data laid out in a device dependent way. The usb... |
hid_usage_in_page(3) -- USB HID access routines
|
The usbhid library provides routines to extract data from USB Human Interface Devices. INTRODUCTIONÂ Â Â Â [Toc]Â Â Â Â [Back] USB HID devices send and receive data laid out in a device dependent way. The usb... |
hid_usage_page(3) -- USB HID access routines
|
The usbhid library provides routines to extract data from USB Human Interface Devices. INTRODUCTIONÂ Â Â Â [Toc]Â Â Â Â [Back] USB HID devices send and receive data laid out in a device dependent way. The usb... |
hid_use_report_desc(3) -- USB HID access routines
|
The usbhid library provides routines to extract data from USB Human Interface Devices. INTRODUCTIONÂ Â Â Â [Toc]Â Â Â Â [Back] USB HID devices send and receive data laid out in a device dependent way. The usb... |
history(3) -- line editor and history functions
|
The editline library provides generic line editing and history functions, similar to those found in sh(1). These functions are available in the libedit library (which needs the libcurses library). Pro... |
history_end(3) -- line editor and history functions
|
The editline library provides generic line editing and history functions, similar to those found in sh(1). These functions are available in the libedit library (which needs the libcurses library). Pro... |
history_init(3) -- line editor and history functions
|
The editline library provides generic line editing and history functions, similar to those found in sh(1). These functions are available in the libedit library (which needs the libcurses library). Pro... |
hline(3) -- create curses borders, horizontal and vertical lines
|
The border, wborder and box routines draw a box around the edges of a window. The argument ls is a character and attributes used for the left side of the border, rs - right side, ts - top side, bs - b... |
HMAC(3) -- HMAC message authentication code
|
HMAC is a MAC (message authentication code), i.e. a keyed hash function used for message authentication, which is based on a hash function. HMAC() computes the message authentication code of the n byt... |
HMAC_cleanup(3) -- HMAC message authentication code
|
HMAC is a MAC (message authentication code), i.e. a keyed hash function used for message authentication, which is based on a hash function. HMAC() computes the message authentication code of the n byt... |
HMAC_Final(3) -- HMAC message authentication code
|
HMAC is a MAC (message authentication code), i.e. a keyed hash function used for message authentication, which is based on a hash function. HMAC() computes the message authentication code of the n byt... |
HMAC_Init(3) -- HMAC message authentication code
|
HMAC is a MAC (message authentication code), i.e. a keyed hash function used for message authentication, which is based on a hash function. HMAC() computes the message authentication code of the n byt... |
HMAC_Update(3) -- HMAC message authentication code
|
HMAC is a MAC (message authentication code), i.e. a keyed hash function used for message authentication, which is based on a hash function. HMAC() computes the message authentication code of the n byt... |
hosts_access(3) -- tcp wrapper access control library
|
The routines described in this document are part of the libwrap.a library. They implement a rule-based access control language with optional shell commands that are executed when a rule fires. request... |
hosts_ctl(3) -- tcp wrapper access control library
|
The routines described in this document are part of the libwrap.a library. They implement a rule-based access control language with optional shell commands that are executed when a rule fires. request... |
hsearch(3) -- manage hash search table
|
The hcreate(), hdestroy() and hsearch() functions manage hash search tables. The hcreate() function allocates and initializes the table. The nel argument specifies an estimate of the maximum number of... |
hstrerror(3) -- get network host entry
|
The gethostbyname(), gethostbyname2() and gethostbyaddr() functions each return a pointer to an object with the following structure describing an internet host referenced by name or by address, respec... |
htobe16(3) -- convert values between different byte orderings
|
These routines convert 16, 32 and 64-bit quantities between different byte orderings. The ``swap'' functions reverse the byte ordering of the given quantity, the others converts either from/to the n... |
htobe32(3) -- convert values between different byte orderings
|
These routines convert 16, 32 and 64-bit quantities between different byte orderings. The ``swap'' functions reverse the byte ordering of the given quantity, the others converts either from/to the n... |
htobe64(3) -- convert values between different byte orderings
|
These routines convert 16, 32 and 64-bit quantities between different byte orderings. The ``swap'' functions reverse the byte ordering of the given quantity, the others converts either from/to the n... |
htoi(3) -- S/Key library functions
|
These functions implement the S/Key one time password authentication mechanism. The atob8() function converts the 16-byte hex string in to an 8-byte binary array stored in out. The atob8() function re... |
htole16(3) -- convert values between different byte orderings
|
These routines convert 16, 32 and 64-bit quantities between different byte orderings. The ``swap'' functions reverse the byte ordering of the given quantity, the others converts either from/to the n... |
htole32(3) -- convert values between different byte orderings
|
These routines convert 16, 32 and 64-bit quantities between different byte orderings. The ``swap'' functions reverse the byte ordering of the given quantity, the others converts either from/to the n... |
htole64(3) -- convert values between different byte orderings
|
These routines convert 16, 32 and 64-bit quantities between different byte orderings. The ``swap'' functions reverse the byte ordering of the given quantity, the others converts either from/to the n... |
htonl(3) -- convert values between different byte orderings
|
These routines convert 16, 32 and 64-bit quantities between different byte orderings. The ``swap'' functions reverse the byte ordering of the given quantity, the others converts either from/to the n... |
htons(3) -- convert values between different byte orderings
|
These routines convert 16, 32 and 64-bit quantities between different byte orderings. The ``swap'' functions reverse the byte ordering of the given quantity, the others converts either from/to the n... |
hypot(3) -- Euclidean distance and complex absolute value functions
|
The hypot() and cabs() functions compute the sqrt(x*x+y*y) in such a way that underflow will not happen, and overflow occurs only if the final result deserves it. The hypotf() and cabsf() functions ar... |
hypotf(3) -- Euclidean distance and complex absolute value functions
|
The hypot() and cabs() functions compute the sqrt(x*x+y*y) in such a way that underflow will not happen, and overflow occurs only if the final result deserves it. The hypotf() and cabsf() functions ar... |
i2d_DHparams(3) -- PKCS#3 DH parameter functions.
|
These functions decode and encode PKCS#3 DH parameters using the DHparameter structure described in PKCS#3. Othewise these behave in a similar way to d2i_X509() and i2d_X509() described in the d2i_X50... |
i2d_DSAparams(3) -- Digital Signature Algorithm
|
These functions implement the Digital Signature Algorithm (DSA). The generation of shared DSA parameters is described in DSA_generate_parameters(3); DSA_generate_key(3) describes how to generate a sig... |
i2d_DSAPrivateKey(3) -- Digital Signature Algorithm
|
These functions implement the Digital Signature Algorithm (DSA). The generation of shared DSA parameters is described in DSA_generate_parameters(3); DSA_generate_key(3) describes how to generate a sig... |
i2d_DSAPublicKey(3) -- Digital Signature Algorithm
|
These functions implement the Digital Signature Algorithm (DSA). The generation of shared DSA parameters is described in DSA_generate_parameters(3); DSA_generate_key(3) describes how to generate a sig... |
i2d_DSA_SIG(3) -- Digital Signature Algorithm
|
These functions implement the Digital Signature Algorithm (DSA). The generation of shared DSA parameters is described in DSA_generate_parameters(3); DSA_generate_key(3) describes how to generate a sig... |
i2d_Netscape_RSA(3) -- RSA public and private key encoding functions.
|
d2i_RSAPublicKey() and i2d_RSAPublicKey() decode and encode a PKCS#1 RSAPublicKey structure. d2i_RSA_PUBKEY() and i2d_RSA_PUBKEY() decode and encode an RSA public key using a SubjectPublicKeyInfo (cer... |
i2d_RSAPrivateKey(3) -- RSA public and private key encoding functions.
|
d2i_RSAPublicKey() and i2d_RSAPublicKey() decode and encode a PKCS#1 RSAPublicKey structure. d2i_RSA_PUBKEY() and i2d_RSA_PUBKEY() decode and encode an RSA public key using a SubjectPublicKeyInfo (cer... |
i2d_RSAPublicKey(3) -- RSA public and private key encoding functions.
|
d2i_RSAPublicKey() and i2d_RSAPublicKey() decode and encode a PKCS#1 RSAPublicKey structure. d2i_RSA_PUBKEY() and i2d_RSA_PUBKEY() decode and encode an RSA public key using a SubjectPublicKeyInfo (cer... |
i2d_SSL_SESSION(3) -- convert SSL_SESSION object from/to ASN1 representation
|
d2i_SSL_SESSION() transforms the external ASN1 representation of an SSL/TLS session, stored as binary data at location pp with length length, into an SSL_SESSION object. i2d_SSL_SESSION() transforms t... |
idcok(3) -- curses output options
|
These routines set options that change the style of output within curses. All options are initially FALSE, unless otherwise stated. It is not necessary to turn these options off before calling endwin.... |
idlok(3) -- curses output options
|
These routines set options that change the style of output within curses. All options are initially FALSE, unless otherwise stated. It is not necessary to turn these options off before calling endwin.... |
ieee(3) -- functions for IEEE arithmetic
|
These functions are required or recommended by IEEE Std 754-1985. copysign() returns x with its sign changed to y's. The copysignf() function is a single precision version of copysign(). finite() ret... |
ieeef(3) -- functions for IEEE arithmetic
|
These functions are required or recommended by IEEE Std 754-1985. copysign() returns x with its sign changed to y's. The copysignf() function is a single precision version of copysign(). finite() ret... |
if_freenameindex(3) -- convert interface index to name, and vice versa
|
These functions map interface indexes to interface names (such as ``lo0''), and vice versa. The if_nametoindex() function converts an interface name specified by the ifname argument to an interface ... |
if_indextoname(3) -- convert interface index to name, and vice versa
|
These functions map interface indexes to interface names (such as ``lo0''), and vice versa. The if_nametoindex() function converts an interface name specified by the ifname argument to an interface ... |
if_nameindex(3) -- convert interface index to name, and vice versa
|
These functions map interface indexes to interface names (such as ``lo0''), and vice versa. The if_nametoindex() function converts an interface name specified by the ifname argument to an interface ... |
if_nametoindex(3) -- convert interface index to name, and vice versa
|
These functions map interface indexes to interface names (such as ``lo0''), and vice versa. The if_nametoindex() function converts an interface name specified by the ifname argument to an interface ... |
ilogb(3) -- functions for IEEE arithmetic
|
These functions are required or recommended by IEEE Std 754-1985. copysign() returns x with its sign changed to y's. The copysignf() function is a single precision version of copysign(). finite() ret... |
ilogbf(3) -- functions for IEEE arithmetic
|
These functions are required or recommended by IEEE Std 754-1985. copysign() returns x with its sign changed to y's. The copysignf() function is a single precision version of copysign(). finite() ret... |
immedok(3) -- curses output options
|
These routines set options that change the style of output within curses. All options are initially FALSE, unless otherwise stated. It is not necessary to turn these options off before calling endwin.... |
inch(3) -- get a character and attributes from a curses window
|
These routines return the character, of type chtype, at the current position in the named window. If any attributes are set for that position, their values are OR'ed into the value returned. Constant... |
inchnstr(3) -- get a string of characters (and attributes) from a curses window
|
These routines return a NULL-terminated array of chtype quantities, starting at the current cursor position in the named window and ending at the right margin of the window. The four functions with n ... |
inchstr(3) -- get a string of characters (and attributes) from a curses window
|
These routines return a NULL-terminated array of chtype quantities, starting at the current cursor position in the named window and ending at the right margin of the window. The four functions with n ... |
index(3) -- locate first occurrence of a character in a string
|
The strchr() function locates the first occurrence of the character c in the string s. The terminating NUL character is considered part of the string. If c is ` ', strchr() locates the terminating ` ... |
inet(3) -- Internet address manipulation routines
|
The routines inet_aton(), inet_addr() and inet_network() interpret character strings representing numbers expressed in the Internet standard `.' notation. The inet_pton() function converts a presenta... |
inet6_option_alloc(3) -- IPv6 Hop-byHop and Destination Options manipulation
|
Building and parsing the Hop-by-Hop and Destination options is complicated due to alignment constraints, padding and ancillary data manipulation. RFC 2292 defines a set of functions to help the applic... |
inet6_option_append(3) -- IPv6 Hop-byHop and Destination Options manipulation
|
Building and parsing the Hop-by-Hop and Destination options is complicated due to alignment constraints, padding and ancillary data manipulation. RFC 2292 defines a set of functions to help the applic... |
inet6_option_find(3) -- IPv6 Hop-byHop and Destination Options manipulation
|
Building and parsing the Hop-by-Hop and Destination options is complicated due to alignment constraints, padding and ancillary data manipulation. RFC 2292 defines a set of functions to help the applic... |
inet6_option_init(3) -- IPv6 Hop-byHop and Destination Options manipulation
|
Building and parsing the Hop-by-Hop and Destination options is complicated due to alignment constraints, padding and ancillary data manipulation. RFC 2292 defines a set of functions to help the applic... |
inet6_option_next(3) -- IPv6 Hop-byHop and Destination Options manipulation
|
Building and parsing the Hop-by-Hop and Destination options is complicated due to alignment constraints, padding and ancillary data manipulation. RFC 2292 defines a set of functions to help the applic... |
inet6_option_space(3) -- IPv6 Hop-byHop and Destination Options manipulation
|
Building and parsing the Hop-by-Hop and Destination options is complicated due to alignment constraints, padding and ancillary data manipulation. RFC 2292 defines a set of functions to help the applic... |
inet6_rthdr_add(3) -- IPv6 Routing Header Options manipulation
|
RFC 2292 IPv6 advanced API defines eight functions that the application calls to build and examine a Routing header. Four functions build a Routing header: inet6_rthdr_space() return #bytes required f... |
inet6_rthdr_getaddr(3) -- IPv6 Routing Header Options manipulation
|
RFC 2292 IPv6 advanced API defines eight functions that the application calls to build and examine a Routing header. Four functions build a Routing header: inet6_rthdr_space() return #bytes required f... |
inet6_rthdr_getflags(3) -- IPv6 Routing Header Options manipulation
|
RFC 2292 IPv6 advanced API defines eight functions that the application calls to build and examine a Routing header. Four functions build a Routing header: inet6_rthdr_space() return #bytes required f... |
inet6_rthdr_init(3) -- IPv6 Routing Header Options manipulation
|
RFC 2292 IPv6 advanced API defines eight functions that the application calls to build and examine a Routing header. Four functions build a Routing header: inet6_rthdr_space() return #bytes required f... |
inet6_rthdr_lasthop(3) -- IPv6 Routing Header Options manipulation
|
RFC 2292 IPv6 advanced API defines eight functions that the application calls to build and examine a Routing header. Four functions build a Routing header: inet6_rthdr_space() return #bytes required f... |
inet6_rthdr_reverse(3) -- IPv6 Routing Header Options manipulation
|
RFC 2292 IPv6 advanced API defines eight functions that the application calls to build and examine a Routing header. Four functions build a Routing header: inet6_rthdr_space() return #bytes required f... |
inet6_rthdr_segments(3) -- IPv6 Routing Header Options manipulation
|
RFC 2292 IPv6 advanced API defines eight functions that the application calls to build and examine a Routing header. Four functions build a Routing header: inet6_rthdr_space() return #bytes required f... |
inet6_rthdr_space(3) -- IPv6 Routing Header Options manipulation
|
RFC 2292 IPv6 advanced API defines eight functions that the application calls to build and examine a Routing header. Four functions build a Routing header: inet6_rthdr_space() return #bytes required f... |
inet_addr(3) -- Internet address manipulation routines
|
The routines inet_aton(), inet_addr() and inet_network() interpret character strings representing numbers expressed in the Internet standard `.' notation. The inet_pton() function converts a presenta... |
inet_aton(3) -- Internet address manipulation routines
|
The routines inet_aton(), inet_addr() and inet_network() interpret character strings representing numbers expressed in the Internet standard `.' notation. The inet_pton() function converts a presenta... |
inet_lnaof(3) -- Internet address manipulation routines
|
The routines inet_aton(), inet_addr() and inet_network() interpret character strings representing numbers expressed in the Internet standard `.' notation. The inet_pton() function converts a presenta... |
inet_makeaddr(3) -- Internet address manipulation routines
|
The routines inet_aton(), inet_addr() and inet_network() interpret character strings representing numbers expressed in the Internet standard `.' notation. The inet_pton() function converts a presenta... |
inet_net(3) -- Internet network number manipulation routines
|
The inet_net_ntop() function converts an Internet network number from network format (usually a struct in_addr or some other binary form, in network byte order) to CIDR presentation format (suitable f... |
inet_netof(3) -- Internet address manipulation routines
|
The routines inet_aton(), inet_addr() and inet_network() interpret character strings representing numbers expressed in the Internet standard `.' notation. The inet_pton() function converts a presenta... |
inet_network(3) -- Internet address manipulation routines
|
The routines inet_aton(), inet_addr() and inet_network() interpret character strings representing numbers expressed in the Internet standard `.' notation. The inet_pton() function converts a presenta... |
inet_net_ntop(3) -- Internet network number manipulation routines
|
The inet_net_ntop() function converts an Internet network number from network format (usually a struct in_addr or some other binary form, in network byte order) to CIDR presentation format (suitable f... |
inet_net_pton(3) -- Internet network number manipulation routines
|
The inet_net_ntop() function converts an Internet network number from network format (usually a struct in_addr or some other binary form, in network byte order) to CIDR presentation format (suitable f... |
inet_ntoa(3) -- Internet address manipulation routines
|
The routines inet_aton(), inet_addr() and inet_network() interpret character strings representing numbers expressed in the Internet standard `.' notation. The inet_pton() function converts a presenta... |
inet_ntop(3) -- Internet address manipulation routines
|
The routines inet_aton(), inet_addr() and inet_network() interpret character strings representing numbers expressed in the Internet standard `.' notation. The inet_pton() function converts a presenta... |
inet_pton(3) -- Internet address manipulation routines
|
The routines inet_aton(), inet_addr() and inet_network() interpret character strings representing numbers expressed in the Internet standard `.' notation. The inet_pton() function converts a presenta... |
inflate(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
inflateBack(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
inflateBackEnd(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
inflateBackInit(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
inflateCopy(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
inflateEnd(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
inflateInit(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
inflateInit2(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
inflateReset(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
inflateSetDictionary(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
inflateSync(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
infnan(3) -- signals invalid floating-point operations on a VAX (temporary)
|
At some time in the future, some of the useful properties of the Infinities and NaNs in the IEEE standard 754 for Binary FloatingPoint Arithmetic will be simulated in UNIX on the DEC VAX by using its ... |
initgroups(3) -- initialize supplementary group IDs
|
The initgroups() function uses the getgrouplist(3) function to calculate the supplementary group IDs for the user specified in name. This group list is then set up for the current process using setgro... |
initscr(3) -- curses screen initialization and manipulation routines
|
initscr is normally the first curses routine to call when initializing a program. A few special routines sometimes need to be called before it; these are slk_init, filter, ripoffline, use_env. For mul... |
initstate(3) -- better random number generator; routines for changing generators
|
The random() function uses a non-linear additive feedback random number generator employing a default table of size 31 long integers to return successive pseudo-random numbers in the range from 0 to (... |
init_color(3) -- curses color manipulation routines
|
Overview curses support color attributes on terminals with that capability. To use these routines start_color must be called, usually right after initscr. Colors are always used in pairs (referred to ... |
init_pair(3) -- curses color manipulation routines
|
Overview curses support color attributes on terminals with that capability. To use these routines start_color must be called, usually right after initscr. Colors are always used in pairs (referred to ... |
innetgr(3) -- netgroup database operations
|
These functions operate on the netgroup database file /etc/netgroup.db which is described in netgroup(5). If that file does not exist, and the system supports YP, then the netgroup YP databases are us... |
innstr(3) -- get a string of characters from a curses window
|
These routines return a string of characters in str, extracted starting at the current cursor position in the named window. Attributes are stripped from the characters. The four functions with n as th... |
insch(3) -- insert a character before cursor in a curses window
|
These routines insert the character ch before the character under the cursor. All characters to the right of the cursor are moved one space to the right, with the possibility of the rightmost characte... |
insdelln(3) -- delete and insert lines in a curses window
|
The deleteln and wdeleteln routines delete the line under the cursor in the window; all lines below the current line are moved up one line. The bottom line of the window is cleared. The cursor positio... |
insertln(3) -- delete and insert lines in a curses window
|
The deleteln and wdeleteln routines delete the line under the cursor in the window; all lines below the current line are moved up one line. The bottom line of the window is cleared. The cursor positio... |
insnstr(3) -- insert string before cursor in a curses window
|
These routines insert a character string (as many characters as will fit on the line) before the character under the cursor. All characters to the right of the cursor are shifted right, with the possi... |
insque(3) -- insert/remove element from a queue
|
These interfaces have been superceded by the queue(3) macros and are pro- vided for compatibility with legacy code. insque() and remque() manipulate queues built from doubly linked lists. The queue ca... |
insstr(3) -- insert string before cursor in a curses window
|
These routines insert a character string (as many characters as will fit on the line) before the character under the cursor. All characters to the right of the cursor are shifted right, with the possi... |
instr(3) -- get a string of characters from a curses window
|
These routines return a string of characters in str, extracted starting at the current cursor position in the named window. Attributes are stripped from the characters. The four functions with n as th... |
intrflush(3) -- curses input options
|
Normally, the tty driver buffers typed characters until a newline or carriage return is typed. The cbreak routine disables line buffering and erase/kill character-processing (interrupt and flow contro... |
intro(3) -- introduction to the C libraries
|
The manual pages in section 3 provide an overview of the C library functions, their error returns, and other common definitions and concepts. Most of these functions are available from the C library, ... |
ipx(3) -- IPX address conversion routines
|
The routine ipx_addr() interprets character strings representing IPX addresses, returning binary information suitable for use in system calls. The routine ipx_ntoa() takes IPX addresses and returns AS... |
ipx_addr(3) -- IPX address conversion routines
|
The routine ipx_addr() interprets character strings representing IPX addresses, returning binary information suitable for use in system calls. The routine ipx_ntoa() takes IPX addresses and returns AS... |
ipx_ntoa(3) -- IPX address conversion routines
|
The routine ipx_addr() interprets character strings representing IPX addresses, returning binary information suitable for use in system calls. The routine ipx_ntoa() takes IPX addresses and returns AS... |
iruserok(3) -- routines for returning a stream to a remote command
|
The rcmd() function is used by the superuser to execute a command on a remote machine using an authentication scheme based on reserved port numbers. If the calling process is not setuid, the RSH envir... |
iruserok_sa(3) -- routines for returning a stream to a remote command
|
The rcmd() function is used by the superuser to execute a command on a remote machine using an authentication scheme based on reserved port numbers. If the calling process is not setuid, the RSH envir... |
isalnum(3) -- alphanumeric character test
|
The isalnum() macro tests for any character for which isalpha(3) or isdigit(3) is true. |
isalpha(3) -- alphabetic character test
|
The isalpha() function tests for any character for which isupper(3) or islower(3) is true and for which none of iscntrl(3), isdigit(3), ispunct(3), or isspace(3) is true. In the C locale, isalpha() re... |
isascii(3) -- ASCII character test
|
The isascii() function tests for an ASCII character, which is any character with a value less than or equal to 0177. |
isatty(3) -- get name of associated terminal (tty) from file descriptor
|
These functions operate on the system file descriptors for terminal type devices. These descriptors are not related to the standard I/O FILE typedef, but refer to the special device files found in /de... |
isblank(3) -- blank-space character test
|
The isblank() function tests for the standard blank-space characters. The standard blank-space characters are the following: ` ' Space character. Horizontal tab. In the C locale, isblank() returns tr... |
iscntrl(3) -- control character test
|
The iscntrl() function tests for any control character. |
isdigit(3) -- decimal-digit character test
|
The isdigit() function tests for any decimal-digit character. |
isendwin(3) -- curses screen initialization and manipulation routines
|
initscr is normally the first curses routine to call when initializing a program. A few special routines sometimes need to be called before it; these are slk_init, filter, ripoffline, use_env. For mul... |
isfdtype(3) -- determine whether a file descriptor is of a specific type
|
The isfdtype() function checks whether or not the file descriptor fd is of type fdtype. A list of possible file types may be found in stat(2) and the include file. |
isgraph(3) -- printing character test (space character exclusive)
|
The isgraph() function tests for any printing character except space (` '). |
isinf(3) -- test for infinity or not-anumber
|
The isinf() function returns 1 if the number n is Infinity, otherwise 0. The isinff() function is a single precision version of isinf(). The isnan() function returns 1 if the number n is ``not-anumber... |
isinff(3) -- test for infinity or not-anumber
|
The isinf() function returns 1 if the number n is Infinity, otherwise 0. The isinff() function is a single precision version of isinf(). The isnan() function returns 1 if the number n is ``not-anumber... |
islower(3) -- lower-case character test
|
The islower() function tests for any lower-case letter for which none of iscntrl(3), isdigit(3), ispunct(3), or isspace(3) is true. In the C locale, islower() returns true only for the characters defi... |
isnan(3) -- test for infinity or not-anumber
|
The isinf() function returns 1 if the number n is Infinity, otherwise 0. The isinff() function is a single precision version of isinf(). The isnan() function returns 1 if the number n is ``not-anumber... |
isnanf(3) -- test for infinity or not-anumber
|
The isinf() function returns 1 if the number n is Infinity, otherwise 0. The isinff() function is a single precision version of isinf(). The isnan() function returns 1 if the number n is ``not-anumber... |
isprint(3) -- printing character test (space character inclusive)
|
The isprint() function tests for any printing character including space (` '). |
ispunct(3) -- punctuation character test
|
The ispunct() function tests for any printing character except space (` ') or a character for which isalnum(3) is true. |
isspace(3) -- whitespace character test
|
The isspace() function tests for the standard whitespace characters for which isalnum(3) is false. The standard whitespace characters are the following: ` ' Space character. Form feed. NCarriage retu... |
isupper(3) -- upper-case character test
|
The isupper() function tests for any upper-case letter or any of an implementation-defined set of characters for which none of iscntrl(3), isdigit(3), ispunct(3), or isspace(3) is true. In the C local... |
isxdigit(3) -- hexadecimal-digit character test
|
The isxdigit() function tests for any hexadecimal-digit character. |
is_linetouched(3) -- curses refresh control routines
|
The touchwin and touchline routines throw away all optimization information about which parts of the window have been touched, by pretending that the entire window has been drawn on. This is sometimes... |
is_wintouched(3) -- curses refresh control routines
|
The touchwin and touchline routines throw away all optimization information about which parts of the window have been touched, by pretending that the entire window has been drawn on. This is sometimes... |
item_count(3) -- make and break connections between items and menus
|
The function set_menu_items changes the item pointer array of the given menu. The array must be terminated by a NULL. The function menu_items returns the item array of the given menu. The function ite... |
item_description(3) -- get menu item name and description fields
|
The function item_name returns the name part of the given item. The function item_description returns the description part of the given item. |
item_index(3) -- set and get current_menu_item
|
The function set_current_item sets the current item (the item on which the menu cursor is positioned). cur- rent_item returns a pointer to the current item in the given menu. The function set_top_row ... |
item_init(3) -- set hooks for automatic invocation by applications
|
These functions make it possible to set hook functions to be called at various points in the automatic processing of input event codes by menu_driver. The function set_item_init sets a hook to be call... |
item_name(3) -- get menu item name and description fields
|
The function item_name returns the name part of the given item. The function item_description returns the description part of the given item. |
item_opts(3) -- set and get menu item options
|
The function set_item_opts sets all the given item's option bits (menu option bits may be logically OR'ed together). The function item_opts_on turns on the given option bits, and leaves others alone... |
item_opts_off(3) -- set and get menu item options
|
The function set_item_opts sets all the given item's option bits (menu option bits may be logically OR'ed together). The function item_opts_on turns on the given option bits, and leaves others alone... |
item_opts_on(3) -- set and get menu item options
|
The function set_item_opts sets all the given item's option bits (menu option bits may be logically OR'ed together). The function item_opts_on turns on the given option bits, and leaves others alone... |
item_term(3) -- set hooks for automatic invocation by applications
|
These functions make it possible to set hook functions to be called at various points in the automatic processing of input event codes by menu_driver. The function set_item_init sets a hook to be call... |
item_userptr(3) -- associate application data with a menu item
|
Every menu item has a field that can be used to hold application-specific data (that is, the menu-driver code leaves it alone). These functions get and set that field. |
item_value(3) -- set and get menu item values
|
If you turn off the menu option O_ONEVALUE (e.g., with set_menu_opts or menu_opts_off; see menu_opts(3)), the menu becomes multi-valued; that is, more than one item may simultaneously be selected. In ... |
item_visible(3) -- check visibility of a menu item
|
A menu item is visible when it is in the portion of a posted menu that is mapped onto the screen (if the menu is scrollable, in particular, this portion will be smaller than the whole menu). |
j0(3) -- Bessel functions of first and second kind
|
The functions j0() and j1() compute the Bessel function of the first kind of the order 0 and the order 1, respectively, for the real value x; the function jn() computes the Bessel function of the firs... |
j0f(3) -- Bessel functions of first and second kind
|
The functions j0() and j1() compute the Bessel function of the first kind of the order 0 and the order 1, respectively, for the real value x; the function jn() computes the Bessel function of the firs... |
j1(3) -- Bessel functions of first and second kind
|
The functions j0() and j1() compute the Bessel function of the first kind of the order 0 and the order 1, respectively, for the real value x; the function jn() computes the Bessel function of the firs... |
j1f(3) -- Bessel functions of first and second kind
|
The functions j0() and j1() compute the Bessel function of the first kind of the order 0 and the order 1, respectively, for the real value x; the function jn() computes the Bessel function of the firs... |
jn(3) -- Bessel functions of first and second kind
|
The functions j0() and j1() compute the Bessel function of the first kind of the order 0 and the order 1, respectively, for the real value x; the function jn() computes the Bessel function of the firs... |
jnf(3) -- Bessel functions of first and second kind
|
The functions j0() and j1() compute the Bessel function of the first kind of the order 0 and the order 1, respectively, for the real value x; the function jn() computes the Bessel function of the firs... |
jrand48(3) -- pseudo-random number generators and initialization routines
|
The rand48() family of functions generates pseudo-random numbers using a linear congruential algorithm working on integers 48 bits in size. The particular formula employed is r(n+1) = (a * r(n) + c) m... |
kafs(3) -- AFS library
|
k_hasafs() initializes some library internal structures, and tests for the presence of AFS in the kernel, none of the other functions should be called before k_hasafs() is called, or if it fails. kafs... |
keybound(3) -- return definition of keycode
|
This is an extension to the curses library. It permits an application to determine the string which is defined in the terminfo for specific keycodes. |
keycrunch(3) -- S/Key library functions
|
These functions implement the S/Key one time password authentication mechanism. The atob8() function converts the 16-byte hex string in to an 8-byte binary array stored in out. The atob8() function re... |
keyname(3) -- miscellaneous curses utility routines
|
The unctrl macro expands to a character string which is a printable representation of the character c. Control characters are displayed in the ^X notation. Printing characters are displayed as is. The... |
keynote(3) -- a trust-management system library
|
For more details on keynote, see RFC 2704. keynote_errno contains an error code if some library call failed. Failed calls return -1 (if their return value is integer), or NULL (if their return value i... |
keyok(3) -- enable or disable a keycode
|
This is an extension to the curses library. It permits an application to disable specific keycodes, rather than use the keypad function to disable all keycodes. Keys that have been disabled can be ree... |
keypad(3) -- curses input options
|
Normally, the tty driver buffers typed characters until a newline or carriage return is typed. The cbreak routine disables line buffering and erase/kill character-processing (interrupt and flow contro... |
killchar(3) -- curses environment query routines
|
The baudrate routine returns the output speed of the terminal. The number returned is in bits per second, for example 9600, and is an integer. The erasechar routine returns the user's current erase c... |
killpg(3) -- send signal to a process group
|
killpg() sends the signal sig to the process group pgrp. See sigaction(2) for a list of signals. If pgrp is 0, killpg() sends the signal to the sending process's process group. The sending process an... |
kn_add_action(3) -- a trust-management system library
|
For more details on keynote, see RFC 2704. keynote_errno contains an error code if some library call failed. Failed calls return -1 (if their return value is integer), or NULL (if their return value i... |
kn_add_assertion(3) -- a trust-management system library
|
For more details on keynote, see RFC 2704. keynote_errno contains an error code if some library call failed. Failed calls return -1 (if their return value is integer), or NULL (if their return value i... |
kn_add_authorizer(3) -- a trust-management system library
|
For more details on keynote, see RFC 2704. keynote_errno contains an error code if some library call failed. Failed calls return -1 (if their return value is integer), or NULL (if their return value i... |
kn_cleanup_action_environment(3) -- a trust-management system library
|
For more details on keynote, see RFC 2704. keynote_errno contains an error code if some library call failed. Failed calls return -1 (if their return value is integer), or NULL (if their return value i... |
kn_close(3) -- a trust-management system library
|
For more details on keynote, see RFC 2704. keynote_errno contains an error code if some library call failed. Failed calls return -1 (if their return value is integer), or NULL (if their return value i... |
kn_decode_base64(3) -- a trust-management system library
|
For more details on keynote, see RFC 2704. keynote_errno contains an error code if some library call failed. Failed calls return -1 (if their return value is integer), or NULL (if their return value i... |
kn_decode_hex(3) -- a trust-management system library
|
For more details on keynote, see RFC 2704. keynote_errno contains an error code if some library call failed. Failed calls return -1 (if their return value is integer), or NULL (if their return value i... |
kn_decode_key(3) -- a trust-management system library
|
For more details on keynote, see RFC 2704. keynote_errno contains an error code if some library call failed. Failed calls return -1 (if their return value is integer), or NULL (if their return value i... |
kn_do_query(3) -- a trust-management system library
|
For more details on keynote, see RFC 2704. keynote_errno contains an error code if some library call failed. Failed calls return -1 (if their return value is integer), or NULL (if their return value i... |
kn_encode_base64(3) -- a trust-management system library
|
For more details on keynote, see RFC 2704. keynote_errno contains an error code if some library call failed. Failed calls return -1 (if their return value is integer), or NULL (if their return value i... |
kn_encode_hex(3) -- a trust-management system library
|
For more details on keynote, see RFC 2704. keynote_errno contains an error code if some library call failed. Failed calls return -1 (if their return value is integer), or NULL (if their return value i... |
kn_encode_key(3) -- a trust-management system library
|
For more details on keynote, see RFC 2704. keynote_errno contains an error code if some library call failed. Failed calls return -1 (if their return value is integer), or NULL (if their return value i... |
kn_free_key(3) -- a trust-management system library
|
For more details on keynote, see RFC 2704. keynote_errno contains an error code if some library call failed. Failed calls return -1 (if their return value is integer), or NULL (if their return value i... |
kn_get_authorizer(3) -- a trust-management system library
|
For more details on keynote, see RFC 2704. keynote_errno contains an error code if some library call failed. Failed calls return -1 (if their return value is integer), or NULL (if their return value i... |
kn_get_failed(3) -- a trust-management system library
|
For more details on keynote, see RFC 2704. keynote_errno contains an error code if some library call failed. Failed calls return -1 (if their return value is integer), or NULL (if their return value i... |
kn_get_licensees(3) -- a trust-management system library
|
For more details on keynote, see RFC 2704. keynote_errno contains an error code if some library call failed. Failed calls return -1 (if their return value is integer), or NULL (if their return value i... |
kn_get_string(3) -- a trust-management system library
|
For more details on keynote, see RFC 2704. keynote_errno contains an error code if some library call failed. Failed calls return -1 (if their return value is integer), or NULL (if their return value i... |
kn_init(3) -- a trust-management system library
|
For more details on keynote, see RFC 2704. keynote_errno contains an error code if some library call failed. Failed calls return -1 (if their return value is integer), or NULL (if their return value i... |
kn_keycompare(3) -- a trust-management system library
|
For more details on keynote, see RFC 2704. keynote_errno contains an error code if some library call failed. Failed calls return -1 (if their return value is integer), or NULL (if their return value i... |
kn_query(3) -- a trust-management system library
|
For more details on keynote, see RFC 2704. keynote_errno contains an error code if some library call failed. Failed calls return -1 (if their return value is integer), or NULL (if their return value i... |
kn_read_asserts(3) -- a trust-management system library
|
For more details on keynote, see RFC 2704. keynote_errno contains an error code if some library call failed. Failed calls return -1 (if their return value is integer), or NULL (if their return value i... |
kn_remove_action(3) -- a trust-management system library
|
For more details on keynote, see RFC 2704. keynote_errno contains an error code if some library call failed. Failed calls return -1 (if their return value is integer), or NULL (if their return value i... |
kn_remove_assertion(3) -- a trust-management system library
|
For more details on keynote, see RFC 2704. keynote_errno contains an error code if some library call failed. Failed calls return -1 (if their return value is integer), or NULL (if their return value i... |
kn_remove_authorizer(3) -- a trust-management system library
|
For more details on keynote, see RFC 2704. keynote_errno contains an error code if some library call failed. Failed calls return -1 (if their return value is integer), or NULL (if their return value i... |
kn_sign_assertion(3) -- a trust-management system library
|
For more details on keynote, see RFC 2704. keynote_errno contains an error code if some library call failed. Failed calls return -1 (if their return value is integer), or NULL (if their return value i... |
kn_verify_assertion(3) -- a trust-management system library
|
For more details on keynote, see RFC 2704. keynote_errno contains an error code if some library call failed. Failed calls return -1 (if their return value is integer), or NULL (if their return value i... |
krb5_425_conv_principal(3) -- converts to and from version 4 principals
|
Converting between version 4 and version 5 principals can at best be described as a mess. A version 4 principal consists of a name, an instance, and a realm. A version 5 principal consists of one or m... |
krb5_425_conv_principal_ext(3) -- converts to and from version 4 principals
|
Converting between version 4 and version 5 principals can at best be described as a mess. A version 4 principal consists of a name, an instance, and a realm. A version 5 principal consists of one or m... |
krb5_524_conv_principal(3) -- converts to and from version 4 principals
|
Converting between version 4 and version 5 principals can at best be described as a mess. A version 4 principal consists of a name, an instance, and a realm. A version 5 principal consists of one or m... |
krb5_addlog_dest(3) -- Heimdal logging functions
|
These functions logs messages to one or more destinations. The krb5_openlog() function creates a logging facility, that is used to log messages. A facility consists of one or more destinations (which ... |
krb5_addlog_func(3) -- Heimdal logging functions
|
These functions logs messages to one or more destinations. The krb5_openlog() function creates a logging facility, that is used to log messages. A facility consists of one or more destinations (which ... |
krb5_appdefault(3) -- get application configuration value
|
These functions get application defaults from the appdefaults section of the krb5.conf(5) configuration file. These defaults can be specified per application, and/or per realm. These values will be lo... |
krb5_appdefault_boolean(3) -- get application configuration value
|
These functions get application defaults from the appdefaults section of the krb5.conf(5) configuration file. These defaults can be specified per application, and/or per realm. These values will be lo... |
krb5_appdefault_string(3) -- get application configuration value
|
These functions get application defaults from the appdefaults section of the krb5.conf(5) configuration file. These defaults can be specified per application, and/or per realm. These values will be lo... |
krb5_appdefault_time(3) -- get application configuration value
|
These functions get application defaults from the appdefaults section of the krb5.conf(5) configuration file. These defaults can be specified per application, and/or per realm. These values will be lo... |
krb5_auth_context(3) -- manage authentication on connection level
|
The krb5_auth_context structure holds all context related to an authenticated connection, in a similar way to krb5_context that holds the context for the thread or process. krb5_auth_context is used b... |
krb5_auth_con_free(3) -- manage authentication on connection level
|
The krb5_auth_context structure holds all context related to an authenticated connection, in a similar way to krb5_context that holds the context for the thread or process. krb5_auth_context is used b... |
krb5_auth_con_genaddrs(3) -- manage authentication on connection level
|
The krb5_auth_context structure holds all context related to an authenticated connection, in a similar way to krb5_context that holds the context for the thread or process. krb5_auth_context is used b... |
krb5_auth_con_getaddrs(3) -- manage authentication on connection level
|
The krb5_auth_context structure holds all context related to an authenticated connection, in a similar way to krb5_context that holds the context for the thread or process. krb5_auth_context is used b... |
krb5_auth_con_getflags(3) -- manage authentication on connection level
|
The krb5_auth_context structure holds all context related to an authenticated connection, in a similar way to krb5_context that holds the context for the thread or process. krb5_auth_context is used b... |
krb5_auth_con_getkey(3) -- manage authentication on connection level
|
The krb5_auth_context structure holds all context related to an authenticated connection, in a similar way to krb5_context that holds the context for the thread or process. krb5_auth_context is used b... |
krb5_auth_con_getlocalsubkey(3) -- manage authentication on connection level
|
The krb5_auth_context structure holds all context related to an authenticated connection, in a similar way to krb5_context that holds the context for the thread or process. krb5_auth_context is used b... |
krb5_auth_con_getrcache(3) -- manage authentication on connection level
|
The krb5_auth_context structure holds all context related to an authenticated connection, in a similar way to krb5_context that holds the context for the thread or process. krb5_auth_context is used b... |
krb5_auth_con_getremotesubkey(3) -- manage authentication on connection level
|
The krb5_auth_context structure holds all context related to an authenticated connection, in a similar way to krb5_context that holds the context for the thread or process. krb5_auth_context is used b... |
krb5_auth_con_getuserkey(3) -- manage authentication on connection level
|
The krb5_auth_context structure holds all context related to an authenticated connection, in a similar way to krb5_context that holds the context for the thread or process. krb5_auth_context is used b... |
krb5_auth_con_init(3) -- manage authentication on connection level
|
The krb5_auth_context structure holds all context related to an authenticated connection, in a similar way to krb5_context that holds the context for the thread or process. krb5_auth_context is used b... |
krb5_auth_con_initivector(3) -- manage authentication on connection level
|
The krb5_auth_context structure holds all context related to an authenticated connection, in a similar way to krb5_context that holds the context for the thread or process. krb5_auth_context is used b... |
krb5_auth_con_setaddrs(3) -- manage authentication on connection level
|
The krb5_auth_context structure holds all context related to an authenticated connection, in a similar way to krb5_context that holds the context for the thread or process. krb5_auth_context is used b... |
krb5_auth_con_setaddrs_from_fd(3) -- manage authentication on connection level
|
The krb5_auth_context structure holds all context related to an authenticated connection, in a similar way to krb5_context that holds the context for the thread or process. krb5_auth_context is used b... |
krb5_auth_con_setflags(3) -- manage authentication on connection level
|
The krb5_auth_context structure holds all context related to an authenticated connection, in a similar way to krb5_context that holds the context for the thread or process. krb5_auth_context is used b... |
krb5_auth_con_setivector(3) -- manage authentication on connection level
|
The krb5_auth_context structure holds all context related to an authenticated connection, in a similar way to krb5_context that holds the context for the thread or process. krb5_auth_context is used b... |
krb5_auth_con_setkey(3) -- manage authentication on connection level
|
The krb5_auth_context structure holds all context related to an authenticated connection, in a similar way to krb5_context that holds the context for the thread or process. krb5_auth_context is used b... |
krb5_auth_con_setlocalsubkey(3) -- manage authentication on connection level
|
The krb5_auth_context structure holds all context related to an authenticated connection, in a similar way to krb5_context that holds the context for the thread or process. krb5_auth_context is used b... |
krb5_auth_con_setrcache(3) -- manage authentication on connection level
|
The krb5_auth_context structure holds all context related to an authenticated connection, in a similar way to krb5_context that holds the context for the thread or process. krb5_auth_context is used b... |
krb5_auth_con_setremotesubkey(3) -- manage authentication on connection level
|
The krb5_auth_context structure holds all context related to an authenticated connection, in a similar way to krb5_context that holds the context for the thread or process. krb5_auth_context is used b... |
krb5_auth_con_setuserkey(3) -- manage authentication on connection level
|
The krb5_auth_context structure holds all context related to an authenticated connection, in a similar way to krb5_context that holds the context for the thread or process. krb5_auth_context is used b... |
krb5_auth_getauthenticator(3) -- manage authentication on connection level
|
The krb5_auth_context structure holds all context related to an authenticated connection, in a similar way to krb5_context that holds the context for the thread or process. krb5_auth_context is used b... |
krb5_auth_getcksumtype(3) -- manage authentication on connection level
|
The krb5_auth_context structure holds all context related to an authenticated connection, in a similar way to krb5_context that holds the context for the thread or process. krb5_auth_context is used b... |
krb5_auth_getkeytype(3) -- manage authentication on connection level
|
The krb5_auth_context structure holds all context related to an authenticated connection, in a similar way to krb5_context that holds the context for the thread or process. krb5_auth_context is used b... |
krb5_auth_getlocalseqnumber(3) -- manage authentication on connection level
|
The krb5_auth_context structure holds all context related to an authenticated connection, in a similar way to krb5_context that holds the context for the thread or process. krb5_auth_context is used b... |
krb5_auth_getremoteseqnumber(3) -- manage authentication on connection level
|
The krb5_auth_context structure holds all context related to an authenticated connection, in a similar way to krb5_context that holds the context for the thread or process. krb5_auth_context is used b... |
krb5_auth_setcksumtype(3) -- manage authentication on connection level
|
The krb5_auth_context structure holds all context related to an authenticated connection, in a similar way to krb5_context that holds the context for the thread or process. krb5_auth_context is used b... |
krb5_auth_setkeytype(3) -- manage authentication on connection level
|
The krb5_auth_context structure holds all context related to an authenticated connection, in a similar way to krb5_context that holds the context for the thread or process. krb5_auth_context is used b... |
krb5_auth_setlocalseqnumber(3) -- manage authentication on connection level
|
The krb5_auth_context structure holds all context related to an authenticated connection, in a similar way to krb5_context that holds the context for the thread or process. krb5_auth_context is used b... |
krb5_auth_setremoteseqnumber(3) -- manage authentication on connection level
|
The krb5_auth_context structure holds all context related to an authenticated connection, in a similar way to krb5_context that holds the context for the thread or process. krb5_auth_context is used b... |
krb5_build_principal(3) -- principal creation functions
|
These functions create a Kerberos 5 principal from a realm and a list of components. All of these functions return an allocated principal in the principal parameter, this should be freed with krb5_fre... |
krb5_build_principal_ext(3) -- principal creation functions
|
These functions create a Kerberos 5 principal from a realm and a list of components. All of these functions return an allocated principal in the principal parameter, this should be freed with krb5_fre... |
krb5_build_principal_va(3) -- principal creation functions
|
These functions create a Kerberos 5 principal from a realm and a list of components. All of these functions return an allocated principal in the principal parameter, this should be freed with krb5_fre... |
krb5_build_principal_va_ext(3) -- principal creation functions
|
These functions create a Kerberos 5 principal from a realm and a list of components. All of these functions return an allocated principal in the principal parameter, this should be freed with krb5_fre... |
krb5_checksumsize(3) -- creates and verifies checksums
|
These functions are used to create and verify checksums. krb5_create_checksum() creates a checksum of the specified data, and puts it in result. If crypto is NULL, usage_or_type specifies the checksum... |
krb5_checksum_is_collision_proof(3) -- creates and verifies checksums
|
These functions are used to create and verify checksums. krb5_create_checksum() creates a checksum of the specified data, and puts it in result. If crypto is NULL, usage_or_type specifies the checksum... |
krb5_checksum_is_keyed(3) -- creates and verifies checksums
|
These functions are used to create and verify checksums. krb5_create_checksum() creates a checksum of the specified data, and puts it in result. If crypto is NULL, usage_or_type specifies the checksum... |
krb5_closelog(3) -- Heimdal logging functions
|
These functions logs messages to one or more destinations. The krb5_openlog() function creates a logging facility, that is used to log messages. A facility consists of one or more destinations (which ... |
krb5_config(3) -- get configuration value
|
These functions get values from the krb5.conf(5) configuration file, or another configuration database specified by the c parameter. The variable arguments should be a list of strings naming each subs... |
krb5_config_get_bool_default(3) -- get configuration value
|
These functions get values from the krb5.conf(5) configuration file, or another configuration database specified by the c parameter. The variable arguments should be a list of strings naming each subs... |
krb5_config_get_int_default(3) -- get configuration value
|
These functions get values from the krb5.conf(5) configuration file, or another configuration database specified by the c parameter. The variable arguments should be a list of strings naming each subs... |
krb5_config_get_string_default(3) -- get configuration value
|
These functions get values from the krb5.conf(5) configuration file, or another configuration database specified by the c parameter. The variable arguments should be a list of strings naming each subs... |
krb5_config_get_time_default(3) -- get configuration value
|
These functions get values from the krb5.conf(5) configuration file, or another configuration database specified by the c parameter. The variable arguments should be a list of strings naming each subs... |
krb5_context(3) -- krb5 state structure
|
The krb5_context structure is designed to hold all per thread state. All global variables that are context specific are stored in this structure, including default encryption types, credentials-cache ... |
krb5_create_checksum(3) -- creates and verifies checksums
|
These functions are used to create and verify checksums. krb5_create_checksum() creates a checksum of the specified data, and puts it in result. If crypto is NULL, usage_or_type specifies the checksum... |
krb5_crypto_destroy(3) -- initialize encryption context
|
These functions are used to initialize an encryption context that can be used to encrypt or checksum data. The krb5_crypt_init() initializes the encrytion context crypto. The key parameter is the key ... |
krb5_crypto_init(3) -- initialize encryption context
|
These functions are used to initialize an encryption context that can be used to encrypt or checksum data. The krb5_crypt_init() initializes the encrytion context crypto. The key parameter is the key ... |
krb5_decrypt(3) -- encrypt and decrypt data
|
These functions are used to encrypt and decrypt data. krb5_encrypt() puts the encrypted version of data (of size len) in result. If the encryption type supports using derived keys, usage should be the... |
krb5_decrypt_EncryptedData(3) -- encrypt and decrypt data
|
These functions are used to encrypt and decrypt data. krb5_encrypt() puts the encrypted version of data (of size len) in result. If the encryption type supports using derived keys, usage should be the... |
krb5_encrypt(3) -- encrypt and decrypt data
|
These functions are used to encrypt and decrypt data. krb5_encrypt() puts the encrypted version of data (of size len) in result. If the encryption type supports using derived keys, usage should be the... |
krb5_encrypt_EncryptedData(3) -- encrypt and decrypt data
|
These functions are used to encrypt and decrypt data. krb5_encrypt() puts the encrypted version of data (of size len) in result. If the encryption type supports using derived keys, usage should be the... |
krb5_err(3) -- Heimdal warning and error functions
|
These functions prints a warning message to some destination. format is a printf style format specifying the message to print. The forms not ending in an ``x'' prints the error string associated wit... |
krb5_errx(3) -- Heimdal warning and error functions
|
These functions prints a warning message to some destination. format is a printf style format specifying the message to print. The forms not ending in an ``x'' prints the error string associated wit... |
krb5_free_context(3) -- create and delete krb5_context structures
|
The krb5_init_context() function initializes the context structure and reads the configration file /etc/kerberosV/krb5.conf. The structure should be freed by calling krb5_free_context() when it is no ... |
krb5_free_principal(3) -- principal free function
|
The krb5_free_principal() will free a principal that has been created with krb5_build_principal(), krb5_parse_name(), or with some other function. |
krb5_initlog(3) -- Heimdal logging functions
|
These functions logs messages to one or more destinations. The krb5_openlog() function creates a logging facility, that is used to log messages. A facility consists of one or more destinations (which ... |
krb5_init_context(3) -- create and delete krb5_context structures
|
The krb5_init_context() function initializes the context structure and reads the configration file /etc/kerberosV/krb5.conf. The structure should be freed by calling krb5_free_context() when it is no ... |
krb5_keytab(3) -- manage keytab (key storage) files
|
A keytab name is on the form type:residual. The residual part is specific to each keytab-type. When a keytab-name is resolved, the type is matched with an internal list of keytab types. If there is no... |
krb5_keytab_entry(3) -- manage keytab (key storage) files
|
A keytab name is on the form type:residual. The residual part is specific to each keytab-type. When a keytab-name is resolved, the type is matched with an internal list of keytab types. If there is no... |
krb5_kt_add_entry(3) -- manage keytab (key storage) files
|
A keytab name is on the form type:residual. The residual part is specific to each keytab-type. When a keytab-name is resolved, the type is matched with an internal list of keytab types. If there is no... |
krb5_kt_close(3) -- manage keytab (key storage) files
|
A keytab name is on the form type:residual. The residual part is specific to each keytab-type. When a keytab-name is resolved, the type is matched with an internal list of keytab types. If there is no... |
krb5_kt_compare(3) -- manage keytab (key storage) files
|
A keytab name is on the form type:residual. The residual part is specific to each keytab-type. When a keytab-name is resolved, the type is matched with an internal list of keytab types. If there is no... |
krb5_kt_copy_entry_contents(3) -- manage keytab (key storage) files
|
A keytab name is on the form type:residual. The residual part is specific to each keytab-type. When a keytab-name is resolved, the type is matched with an internal list of keytab types. If there is no... |
krb5_kt_cursor(3) -- manage keytab (key storage) files
|
A keytab name is on the form type:residual. The residual part is specific to each keytab-type. When a keytab-name is resolved, the type is matched with an internal list of keytab types. If there is no... |
krb5_kt_default(3) -- manage keytab (key storage) files
|
A keytab name is on the form type:residual. The residual part is specific to each keytab-type. When a keytab-name is resolved, the type is matched with an internal list of keytab types. If there is no... |
krb5_kt_default_name(3) -- manage keytab (key storage) files
|
A keytab name is on the form type:residual. The residual part is specific to each keytab-type. When a keytab-name is resolved, the type is matched with an internal list of keytab types. If there is no... |
krb5_kt_end_seq_get(3) -- manage keytab (key storage) files
|
A keytab name is on the form type:residual. The residual part is specific to each keytab-type. When a keytab-name is resolved, the type is matched with an internal list of keytab types. If there is no... |
krb5_kt_free_entry(3) -- manage keytab (key storage) files
|
A keytab name is on the form type:residual. The residual part is specific to each keytab-type. When a keytab-name is resolved, the type is matched with an internal list of keytab types. If there is no... |
krb5_kt_get_entry(3) -- manage keytab (key storage) files
|
A keytab name is on the form type:residual. The residual part is specific to each keytab-type. When a keytab-name is resolved, the type is matched with an internal list of keytab types. If there is no... |
krb5_kt_get_name(3) -- manage keytab (key storage) files
|
A keytab name is on the form type:residual. The residual part is specific to each keytab-type. When a keytab-name is resolved, the type is matched with an internal list of keytab types. If there is no... |
krb5_kt_next_entry(3) -- manage keytab (key storage) files
|
A keytab name is on the form type:residual. The residual part is specific to each keytab-type. When a keytab-name is resolved, the type is matched with an internal list of keytab types. If there is no... |
krb5_kt_ops(3) -- manage keytab (key storage) files
|
A keytab name is on the form type:residual. The residual part is specific to each keytab-type. When a keytab-name is resolved, the type is matched with an internal list of keytab types. If there is no... |
krb5_kt_read_service_key(3) -- manage keytab (key storage) files
|
A keytab name is on the form type:residual. The residual part is specific to each keytab-type. When a keytab-name is resolved, the type is matched with an internal list of keytab types. If there is no... |
krb5_kt_register(3) -- manage keytab (key storage) files
|
A keytab name is on the form type:residual. The residual part is specific to each keytab-type. When a keytab-name is resolved, the type is matched with an internal list of keytab types. If there is no... |
krb5_kt_remove_entry(3) -- manage keytab (key storage) files
|
A keytab name is on the form type:residual. The residual part is specific to each keytab-type. When a keytab-name is resolved, the type is matched with an internal list of keytab types. If there is no... |
krb5_kt_resolve(3) -- manage keytab (key storage) files
|
A keytab name is on the form type:residual. The residual part is specific to each keytab-type. When a keytab-name is resolved, the type is matched with an internal list of keytab types. If there is no... |
krb5_kt_start_seq_get(3) -- manage keytab (key storage) files
|
A keytab name is on the form type:residual. The residual part is specific to each keytab-type. When a keytab-name is resolved, the type is matched with an internal list of keytab types. If there is no... |
krb5_log(3) -- Heimdal logging functions
|
These functions logs messages to one or more destinations. The krb5_openlog() function creates a logging facility, that is used to log messages. A facility consists of one or more destinations (which ... |
krb5_log_msg(3) -- Heimdal logging functions
|
These functions logs messages to one or more destinations. The krb5_openlog() function creates a logging facility, that is used to log messages. A facility consists of one or more destinations (which ... |
krb5_make_principal(3) -- principal creation functions
|
These functions create a Kerberos 5 principal from a realm and a list of components. All of these functions return an allocated principal in the principal parameter, this should be freed with krb5_fre... |
krb5_openlog(3) -- Heimdal logging functions
|
These functions logs messages to one or more destinations. The krb5_openlog() function creates a logging facility, that is used to log messages. A facility consists of one or more destinations (which ... |
krb5_parse_name(3) -- string to principal conversion
|
krb5_parse_name() converts a string representation of a principal name to krb5_principal. The principal will point to allocated data that should be freed with krb5_free_principal(). The string should ... |
krb5_set_warn_dest(3) -- Heimdal warning and error functions
|
These functions prints a warning message to some destination. format is a printf style format specifying the message to print. The forms not ending in an ``x'' prints the error string associated wit... |
krb5_sname_to_principal(3) -- create a service principal
|
These functions create a ``service'' principal that can, for instance, be used to lookup a key in a keytab. For both these function the sname parameter will be used for the first component of the cr... |
krb5_sock_to_principal(3) -- create a service principal
|
These functions create a ``service'' principal that can, for instance, be used to lookup a key in a keytab. For both these function the sname parameter will be used for the first component of the cr... |
krb5_unparse_name(3) -- principal to string conversion
|
This function takes a principal, and will convert in to a printable representation with the same syntax as described in krb5_parse_name(3). *name will point to allocated data and should be freed by th... |
krb5_verify_checksum(3) -- creates and verifies checksums
|
These functions are used to create and verify checksums. krb5_create_checksum() creates a checksum of the specified data, and puts it in result. If crypto is NULL, usage_or_type specifies the checksum... |
krb5_verify_user(3) -- Heimdal password verifying functions.
|
The krb5_verify_user function verifies the password supplied by a user. The principal whose password will be verified is specified in principal. New tickets will be obtained as a side-effect and store... |
krb5_verify_user_lrealm(3) -- Heimdal password verifying functions.
|
The krb5_verify_user function verifies the password supplied by a user. The principal whose password will be verified is specified in principal. New tickets will be obtained as a side-effect and store... |
krb5_verr(3) -- Heimdal warning and error functions
|
These functions prints a warning message to some destination. format is a printf style format specifying the message to print. The forms not ending in an ``x'' prints the error string associated wit... |
krb5_verrx(3) -- Heimdal warning and error functions
|
These functions prints a warning message to some destination. format is a printf style format specifying the message to print. The forms not ending in an ``x'' prints the error string associated wit... |
krb5_vlog(3) -- Heimdal logging functions
|
These functions logs messages to one or more destinations. The krb5_openlog() function creates a logging facility, that is used to log messages. A facility consists of one or more destinations (which ... |
krb5_vlog_msg(3) -- Heimdal logging functions
|
These functions logs messages to one or more destinations. The krb5_openlog() function creates a logging facility, that is used to log messages. A facility consists of one or more destinations (which ... |
krb5_vwarn(3) -- Heimdal warning and error functions
|
These functions prints a warning message to some destination. format is a printf style format specifying the message to print. The forms not ending in an ``x'' prints the error string associated wit... |
krb5_vwarnx(3) -- Heimdal warning and error functions
|
These functions prints a warning message to some destination. format is a printf style format specifying the message to print. The forms not ending in an ``x'' prints the error string associated wit... |
krb5_warn(3) -- Heimdal warning and error functions
|
These functions prints a warning message to some destination. format is a printf style format specifying the message to print. The forms not ending in an ``x'' prints the error string associated wit... |
krb5_warnx(3) -- Heimdal warning and error functions
|
These functions prints a warning message to some destination. format is a printf style format specifying the message to print. The forms not ending in an ``x'' prints the error string associated wit... |
krb_afslog(3) -- AFS library
|
k_hasafs() initializes some library internal structures, and tests for the presence of AFS in the kernel, none of the other functions should be called before k_hasafs() is called, or if it fails. kafs... |
krb_afslog_uid(3) -- AFS library
|
k_hasafs() initializes some library internal structures, and tests for the presence of AFS in the kernel, none of the other functions should be called before k_hasafs() is called, or if it fails. kafs... |
kvm(3) -- kernel memory interface
|
The kvm library provides a uniform interface for accessing kernel virtual memory images, including live systems and crash dumps. Access to live systems is via /dev/mem while crash dumps can be examine... |
kvm_close(3) -- initialize kernel virtual memory access
|
The functions kvm_open() and kvm_openfiles() return a descriptor used to access kernel virtual memory via the kvm(3) library routines. Both active kernels and crash dumps are accessible through this i... |
kvm_dump(3) -- crash dump support functions
|
First note that the functions described here were designed to be used by savecore(8). The function kvm_dump_mkheader() checks if the physical memory file associated with kd contains a valid crash dump... |
kvm_dump_inval(3) -- crash dump support functions
|
First note that the functions described here were designed to be used by savecore(8). The function kvm_dump_mkheader() checks if the physical memory file associated with kd contains a valid crash dump... |
kvm_dump_mkheader(3) -- crash dump support functions
|
First note that the functions described here were designed to be used by savecore(8). The function kvm_dump_mkheader() checks if the physical memory file associated with kd contains a valid crash dump... |
kvm_dump_wrtheader(3) -- crash dump support functions
|
First note that the functions described here were designed to be used by savecore(8). The function kvm_dump_mkheader() checks if the physical memory file associated with kd contains a valid crash dump... |
kvm_getargv(3) -- access user process state
|
kvm_getprocs() returns a (sub-)set of active processes in the kernel indicated by kd. The op and arg arguments constitute a predicate which limits the set of processes returned. The value of op descri... |
kvm_getargv2(3) -- access user process state
|
kvm_getprocs() returns a (sub-)set of active processes in the kernel indicated by kd. The op and arg arguments constitute a predicate which limits the set of processes returned. The value of op descri... |
kvm_getenvv(3) -- access user process state
|
kvm_getprocs() returns a (sub-)set of active processes in the kernel indicated by kd. The op and arg arguments constitute a predicate which limits the set of processes returned. The value of op descri... |
kvm_getenvv2(3) -- access user process state
|
kvm_getprocs() returns a (sub-)set of active processes in the kernel indicated by kd. The op and arg arguments constitute a predicate which limits the set of processes returned. The value of op descri... |
kvm_geterr(3) -- get error message on kvm descriptor
|
This function returns a string describing the most recent error condition on the descriptor kd. The results are undefined if the most recent kvm(3) library call did not produce an error. The string re... |
kvm_getfiles(3) -- survey open files
|
kvm_getfiles() returns a (sub-)set of the open files in the kernel indicated by kd. The op and arg arguments constitute a predicate which limits the set of files returned. No predicates are currently ... |
kvm_getloadavg(3) -- get load average of the system
|
The kvm_getloadavg() function returns the number of processes in the system run queue of the kernel indicated by kd, averaged over various periods of time. Up to nelem samples are retrieved and assign... |
kvm_getproc2(3) -- access user process state
|
kvm_getprocs() returns a (sub-)set of active processes in the kernel indicated by kd. The op and arg arguments constitute a predicate which limits the set of processes returned. The value of op descri... |
kvm_getprocs(3) -- access user process state
|
kvm_getprocs() returns a (sub-)set of active processes in the kernel indicated by kd. The op and arg arguments constitute a predicate which limits the set of processes returned. The value of op descri... |
kvm_nlist(3) -- retrieve symbol table names from a kernel image
|
kvm_nlist() retrieves the symbol table entries indicated by the name list argument nl. This argument points to an array of nlist structures, terminated by an entry whose n_name field is NULL (see nlis... |
kvm_open(3) -- initialize kernel virtual memory access
|
The functions kvm_open() and kvm_openfiles() return a descriptor used to access kernel virtual memory via the kvm(3) library routines. Both active kernels and crash dumps are accessible through this i... |
kvm_openfiles(3) -- initialize kernel virtual memory access
|
The functions kvm_open() and kvm_openfiles() return a descriptor used to access kernel virtual memory via the kvm(3) library routines. Both active kernels and crash dumps are accessible through this i... |
kvm_read(3) -- read or write kernel virtual memory
|
The kvm_read() and kvm_write() functions are used to read and write kernel virtual memory (or a crash dump file). See kvm_open(3) or kvm_openfiles(3) for information regarding opening kernel virtual m... |
kvm_write(3) -- read or write kernel virtual memory
|
The kvm_read() and kvm_write() functions are used to read and write kernel virtual memory (or a crash dump file). See kvm_open(3) or kvm_openfiles(3) for information regarding opening kernel virtual m... |
k_afs_cell_of_file(3) -- AFS library
|
k_hasafs() initializes some library internal structures, and tests for the presence of AFS in the kernel, none of the other functions should be called before k_hasafs() is called, or if it fails. kafs... |
k_hasafs(3) -- AFS library
|
k_hasafs() initializes some library internal structures, and tests for the presence of AFS in the kernel, none of the other functions should be called before k_hasafs() is called, or if it fails. kafs... |
k_pioctl(3) -- AFS library
|
k_hasafs() initializes some library internal structures, and tests for the presence of AFS in the kernel, none of the other functions should be called before k_hasafs() is called, or if it fails. kafs... |
k_setpag(3) -- AFS library
|
k_hasafs() initializes some library internal structures, and tests for the presence of AFS in the kernel, none of the other functions should be called before k_hasafs() is called, or if it fails. kafs... |
k_unlog(3) -- AFS library
|
k_hasafs() initializes some library internal structures, and tests for the presence of AFS in the kernel, none of the other functions should be called before k_hasafs() is called, or if it fails. kafs... |
l64a(3) -- convert between 32-bit integer and radix-64 ASCII string
|
The a64l() and l64a() functions are used to maintain numbers stored in radix-64 ASCII characters. This is a notation by which 32-bit integers can be represented by up to six characters; each character... |
labs(3) -- return the absolute value of a long integer
|
The labs() function returns the absolute value of the long integer i. The llabs() function returns the absolute value of the long long integer j. |
lcong48(3) -- pseudo-random number generators and initialization routines
|
The rand48() family of functions generates pseudo-random numbers using a linear congruential algorithm working on integers 48 bits in size. The particular formula employed is r(n+1) = (a * r(n) + c) m... |
ldexp(3) -- multiply floating-point number by integral power of 2
|
The ldexp() function multiplies a floating-point number by an integral power of 2. |
ldiv(3) -- return quotient and remainder from division
|
The ldiv() function computes the value num/denom and returns the quotient and remainder in a structure named ldiv_t that contains two long integer members named quot and rem. |
leaveok(3) -- curses output options
|
These routines set options that change the style of output within curses. All options are initially FALSE, unless otherwise stated. It is not necessary to turn these options off before calling endwin.... |
letoh16(3) -- convert values between different byte orderings
|
These routines convert 16, 32 and 64-bit quantities between different byte orderings. The ``swap'' functions reverse the byte ordering of the given quantity, the others converts either from/to the n... |
letoh32(3) -- convert values between different byte orderings
|
These routines convert 16, 32 and 64-bit quantities between different byte orderings. The ``swap'' functions reverse the byte ordering of the given quantity, the others converts either from/to the n... |
letoh64(3) -- convert values between different byte orderings
|
These routines convert 16, 32 and 64-bit quantities between different byte orderings. The ``swap'' functions reverse the byte ordering of the given quantity, the others converts either from/to the n... |
lfind(3) -- linear searching routines
|
The functions lsearch(), and lfind() provide basic linear searching functionality. base is the pointer to the beginning of an array. The argument nelp is the current number of elements in the array, w... |
lgamma(3) -- log gamma functions
|
|
lgammaf(3) -- log gamma functions
|
|
lhash(3) -- dynamic hash table
|
This library implements dynamic hash tables. The hash table entries can be arbitrary structures. Usually they consist of key and value fields. lh_new() creates a new LHASH structure to store arbitrary... |
lh_delete(3) -- dynamic hash table
|
This library implements dynamic hash tables. The hash table entries can be arbitrary structures. Usually they consist of key and value fields. lh_new() creates a new LHASH structure to store arbitrary... |
lh_doall(3) -- dynamic hash table
|
This library implements dynamic hash tables. The hash table entries can be arbitrary structures. Usually they consist of key and value fields. lh_new() creates a new LHASH structure to store arbitrary... |
lh_doall_arg(3) -- dynamic hash table
|
This library implements dynamic hash tables. The hash table entries can be arbitrary structures. Usually they consist of key and value fields. lh_new() creates a new LHASH structure to store arbitrary... |
lh_error(3) -- dynamic hash table
|
This library implements dynamic hash tables. The hash table entries can be arbitrary structures. Usually they consist of key and value fields. lh_new() creates a new LHASH structure to store arbitrary... |
lh_free(3) -- dynamic hash table
|
This library implements dynamic hash tables. The hash table entries can be arbitrary structures. Usually they consist of key and value fields. lh_new() creates a new LHASH structure to store arbitrary... |
lh_insert(3) -- dynamic hash table
|
This library implements dynamic hash tables. The hash table entries can be arbitrary structures. Usually they consist of key and value fields. lh_new() creates a new LHASH structure to store arbitrary... |
lh_new(3) -- dynamic hash table
|
This library implements dynamic hash tables. The hash table entries can be arbitrary structures. Usually they consist of key and value fields. lh_new() creates a new LHASH structure to store arbitrary... |
lh_node_stats(3) -- LHASH statistics
|
The LHASH structure records statistics about most aspects of accessing the hash table. This is mostly a legacy of Eric Young writing this library for the reasons of implementing what looked like a nic... |
lh_node_stats_bio(3) -- LHASH statistics
|
The LHASH structure records statistics about most aspects of accessing the hash table. This is mostly a legacy of Eric Young writing this library for the reasons of implementing what looked like a nic... |
lh_node_usage_stats(3) -- LHASH statistics
|
The LHASH structure records statistics about most aspects of accessing the hash table. This is mostly a legacy of Eric Young writing this library for the reasons of implementing what looked like a nic... |
lh_node_usage_stats_bio(3) -- LHASH statistics
|
The LHASH structure records statistics about most aspects of accessing the hash table. This is mostly a legacy of Eric Young writing this library for the reasons of implementing what looked like a nic... |
lh_retrieve(3) -- dynamic hash table
|
This library implements dynamic hash tables. The hash table entries can be arbitrary structures. Usually they consist of key and value fields. lh_new() creates a new LHASH structure to store arbitrary... |
lh_stats(3) -- LHASH statistics
|
The LHASH structure records statistics about most aspects of accessing the hash table. This is mostly a legacy of Eric Young writing this library for the reasons of implementing what looked like a nic... |
lh_stats_bio(3) -- LHASH statistics
|
The LHASH structure records statistics about most aspects of accessing the hash table. This is mostly a legacy of Eric Young writing this library for the reasons of implementing what looked like a nic... |
link_addr(3) -- elementary address specification routines for link level access
|
The link_addr() function interprets character strings representing linklevel addresses, returning binary information suitable for use in system calls. link_ntoa() takes a link-level address and return... |
link_field(3) -- create and destroy form fields
|
The function new_field allocates a new field and initializes it from the parameters given: height, width, row of upper-left corner, column of upper-left corner, number off-screen rows, and number of a... |
link_fieldtype(3) -- define validation-field types
|
The function new_fieldtype creates a new field type usable for data validation. You supply it with field_check, a predicate to check the validity of an entered data string whenever the user attempts t... |
link_ntoa(3) -- elementary address specification routines for link level access
|
The link_addr() function interprets character strings representing linklevel addresses, returning binary information suitable for use in system calls. link_ntoa() takes a link-level address and return... |
LIST_EMPTY(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
LIST_END(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
LIST_ENTRY(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
LIST_FIRST(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
LIST_FOREACH(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
LIST_HEAD(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
LIST_HEAD_INITIALIZER(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
LIST_INIT(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
LIST_INSERT_AFTER(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
LIST_INSERT_BEFORE(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
LIST_INSERT_HEAD(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
LIST_NEXT(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
LIST_REMOVE(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
LIST_REPLACE(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
llabs(3) -- return the absolute value of a long integer
|
The labs() function returns the absolute value of the long integer i. The llabs() function returns the absolute value of the long long integer j. |
localeconv(3) -- natural language formatting for C
|
The setlocale() function sets the C library's notion of natural language formatting style for particular sets of routines. Each such style is called a ``locale'' and is invoked using an appropriate... |
localtime(3) -- convert date and time to ASCII
|
The ctime() function converts a time_t, pointed to by clock, representing the time in seconds since 00:00:00 UTC, 1970-01-01, and returns a pointer to a 26-character string of the form Thu Nov 24 18:2... |
localtime_r(3) -- convert date and time to ASCII
|
The ctime() function converts a time_t, pointed to by clock, representing the time in seconds since 00:00:00 UTC, 1970-01-01, and returns a pointer to a 26-character string of the form Thu Nov 24 18:2... |
lockf(3) -- record locking on files
|
The lockf() function allows sections of a file to be locked with advisory-mode locks. Calls to lockf() from other processes which attempt to lock the locked file section will either return an error va... |
log(3) -- exponential, logarithm, power functions
|
The exp() function computes the exponential value of the given argument x. The expf() function is a single precision version of exp(). The expm1() function computes the value exp(x)-1 accurately even ... |
log10(3) -- exponential, logarithm, power functions
|
The exp() function computes the exponential value of the given argument x. The expf() function is a single precision version of exp(). The expm1() function computes the value exp(x)-1 accurately even ... |
log10f(3) -- exponential, logarithm, power functions
|
The exp() function computes the exponential value of the given argument x. The expf() function is a single precision version of exp(). The expm1() function computes the value exp(x)-1 accurately even ... |
log1p(3) -- exponential, logarithm, power functions
|
The exp() function computes the exponential value of the given argument x. The expf() function is a single precision version of exp(). The expm1() function computes the value exp(x)-1 accurately even ... |
log1pf(3) -- exponential, logarithm, power functions
|
The exp() function computes the exponential value of the given argument x. The expf() function is a single precision version of exp(). The expm1() function computes the value exp(x)-1 accurately even ... |
logb(3) -- IEEE test functions
|
These functions allow users to test conformance to IEEE Std 754-1985. Their use is not otherwise recommended. logb(x) returns x's exponent n, a signed integer converted to double-precision floating-p... |
logbf(3) -- IEEE test functions
|
These functions allow users to test conformance to IEEE Std 754-1985. Their use is not otherwise recommended. logb(x) returns x's exponent n, a signed integer converted to double-precision floating-p... |
logf(3) -- exponential, logarithm, power functions
|
The exp() function computes the exponential value of the given argument x. The expf() function is a single precision version of exp(). The expm1() function computes the value exp(x)-1 accurately even ... |
login(3) -- login utility functions
|
The login(), logout(), and logwtmp() functions operate on the database of current users in /var/run/utmp and on the logfile /var/log/wtmp of logins and logouts. The login() function updates the /var/r... |
login_cap(3) -- query login.conf database about a user class
|
The login_getclass() function extracts the entry specified by class (or default if class is NULL or the empty string) from /etc/login.conf (see login.conf(5)). If the entry is found, a login_cap_t poi... |
login_check_expire(3) -- check for password expiration
|
The login_check_expire() function is called by a BSD authentication login script to check whether the user's password entry, as described by pwd, has expired. If a class is specified, it is used inst... |
login_close(3) -- query login.conf database about a user class
|
The login_getclass() function extracts the entry specified by class (or default if class is NULL or the empty string) from /etc/login.conf (see login.conf(5)). If the entry is found, a login_cap_t poi... |
login_fbtab(3) -- implement device security based on /etc/fbtab
|
The login_fbtab() function reads the /etc/fbtab file and implements device security as described in the fbtab(5) manual page. |
login_getcapbool(3) -- query login.conf database about a user class
|
The login_getclass() function extracts the entry specified by class (or default if class is NULL or the empty string) from /etc/login.conf (see login.conf(5)). If the entry is found, a login_cap_t poi... |
login_getcapnum(3) -- query login.conf database about a user class
|
The login_getclass() function extracts the entry specified by class (or default if class is NULL or the empty string) from /etc/login.conf (see login.conf(5)). If the entry is found, a login_cap_t poi... |
login_getcapsize(3) -- query login.conf database about a user class
|
The login_getclass() function extracts the entry specified by class (or default if class is NULL or the empty string) from /etc/login.conf (see login.conf(5)). If the entry is found, a login_cap_t poi... |
login_getcapstr(3) -- query login.conf database about a user class
|
The login_getclass() function extracts the entry specified by class (or default if class is NULL or the empty string) from /etc/login.conf (see login.conf(5)). If the entry is found, a login_cap_t poi... |
login_getcaptime(3) -- query login.conf database about a user class
|
The login_getclass() function extracts the entry specified by class (or default if class is NULL or the empty string) from /etc/login.conf (see login.conf(5)). If the entry is found, a login_cap_t poi... |
login_getclass(3) -- query login.conf database about a user class
|
The login_getclass() function extracts the entry specified by class (or default if class is NULL or the empty string) from /etc/login.conf (see login.conf(5)). If the entry is found, a login_cap_t poi... |
login_getstyle(3) -- query login.conf database about a user class
|
The login_getclass() function extracts the entry specified by class (or default if class is NULL or the empty string) from /etc/login.conf (see login.conf(5)). If the entry is found, a login_cap_t poi... |
login_tty(3) -- tty utility functions
|
The openpty(), login_tty(), and forkpty() functions perform manipulations on ttys and pseudo-ttys. The openpty() function finds an available pseudo-tty and returns file descriptors for the master and ... |
logout(3) -- login utility functions
|
The login(), logout(), and logwtmp() functions operate on the database of current users in /var/run/utmp and on the logfile /var/log/wtmp of logins and logouts. The login() function updates the /var/r... |
logwtmp(3) -- login utility functions
|
The login(), logout(), and logwtmp() functions operate on the database of current users in /var/run/utmp and on the logfile /var/log/wtmp of logins and logouts. The login() function updates the /var/r... |
longjmp(3) -- non-local jumps
|
The sigsetjmp(), setjmp(), and _setjmp() functions save their calling environment in env. Each of these functions returns 0. The corresponding longjmp() functions restore the environment saved by the ... |
longjmperror(3) -- non-local jumps
|
The sigsetjmp(), setjmp(), and _setjmp() functions save their calling environment in env. Each of these functions returns 0. The corresponding longjmp() functions restore the environment saved by the ... |
longname(3) -- curses environment query routines
|
The baudrate routine returns the output speed of the terminal. The number returned is in bits per second, for example 9600, and is an integer. The erasechar routine returns the user's current erase c... |
lrand48(3) -- pseudo-random number generators and initialization routines
|
The rand48() family of functions generates pseudo-random numbers using a linear congruential algorithm working on integers 48 bits in size. The particular formula employed is r(n+1) = (a * r(n) + c) m... |
lsearch(3) -- linear searching routines
|
The functions lsearch(), and lfind() provide basic linear searching functionality. base is the pointer to the beginning of an array. The argument nelp is the current number of elements in the array, w... |
malloc(3) -- memory allocation and deallocation
|
The malloc() function allocates uninitialized space for an object whose size is specified by size. The malloc() function maintains multiple lists of free blocks according to size, allocating space fro... |
math(3) -- introduction to mathematical library functions
|
These functions constitute the C math library, libm. The link editor searches this library under the ``-lm'' option. Declarations for these functions may be obtained from the include file . |
mathf(3) -- introduction to mathematical library functions
|
These functions constitute the C math library, libm. The link editor searches this library under the ``-lm'' option. Declarations for these functions may be obtained from the include file . |
mcprint(3) -- ship binary data to printer
|
This function uses the mc5p or mc4 and mc5 capabilities, if they are present, to ship given data to a printer attached to the terminal. Note that the mcprint code has no way to do flow control with th... |
MD2(3) -- MD2, MD4, and MD5 hash functions
|
MD2, MD4, and MD5 are cryptographic hash functions with a 128 bit output. MD2(), MD4(), and MD5() compute the MD2, MD4, and MD5 message digest of the n bytes at d and place it in md (which must have s... |
MD2_Final(3) -- MD2, MD4, and MD5 hash functions
|
MD2, MD4, and MD5 are cryptographic hash functions with a 128 bit output. MD2(), MD4(), and MD5() compute the MD2, MD4, and MD5 message digest of the n bytes at d and place it in md (which must have s... |
MD2_Init(3) -- MD2, MD4, and MD5 hash functions
|
MD2, MD4, and MD5 are cryptographic hash functions with a 128 bit output. MD2(), MD4(), and MD5() compute the MD2, MD4, and MD5 message digest of the n bytes at d and place it in md (which must have s... |
MD2_Update(3) -- MD2, MD4, and MD5 hash functions
|
MD2, MD4, and MD5 are cryptographic hash functions with a 128 bit output. MD2(), MD4(), and MD5() compute the MD2, MD4, and MD5 message digest of the n bytes at d and place it in md (which must have s... |
MD4(3) -- MD2, MD4, and MD5 hash functions
|
MD2, MD4, and MD5 are cryptographic hash functions with a 128 bit output. MD2(), MD4(), and MD5() compute the MD2, MD4, and MD5 message digest of the n bytes at d and place it in md (which must have s... |
md4(3) -- calculate the RSA Data Security, Inc., ``MD4'' message digest
|
The MD4 functions calculate a 128-bit cryptographic checksum (digest) for any number of input bytes. A cryptographic checksum is a one-way hashfunction, that is, you cannot find (except by exhaustive ... |
MD4Data(3) -- calculate the RSA Data Security, Inc., ``MD4'' message digest
|
The MD4 functions calculate a 128-bit cryptographic checksum (digest) for any number of input bytes. A cryptographic checksum is a one-way hashfunction, that is, you cannot find (except by exhaustive ... |
MD4End(3) -- calculate the RSA Data Security, Inc., ``MD4'' message digest
|
The MD4 functions calculate a 128-bit cryptographic checksum (digest) for any number of input bytes. A cryptographic checksum is a one-way hashfunction, that is, you cannot find (except by exhaustive ... |
MD4File(3) -- calculate the RSA Data Security, Inc., ``MD4'' message digest
|
The MD4 functions calculate a 128-bit cryptographic checksum (digest) for any number of input bytes. A cryptographic checksum is a one-way hashfunction, that is, you cannot find (except by exhaustive ... |
MD4FileChunk(3) -- calculate the RSA Data Security, Inc., ``MD4'' message digest
|
The MD4 functions calculate a 128-bit cryptographic checksum (digest) for any number of input bytes. A cryptographic checksum is a one-way hashfunction, that is, you cannot find (except by exhaustive ... |
MD4Final(3) -- calculate the RSA Data Security, Inc., ``MD4'' message digest
|
The MD4 functions calculate a 128-bit cryptographic checksum (digest) for any number of input bytes. A cryptographic checksum is a one-way hashfunction, that is, you cannot find (except by exhaustive ... |
MD4Init(3) -- calculate the RSA Data Security, Inc., ``MD4'' message digest
|
The MD4 functions calculate a 128-bit cryptographic checksum (digest) for any number of input bytes. A cryptographic checksum is a one-way hashfunction, that is, you cannot find (except by exhaustive ... |
MD4Pad(3) -- calculate the RSA Data Security, Inc., ``MD4'' message digest
|
The MD4 functions calculate a 128-bit cryptographic checksum (digest) for any number of input bytes. A cryptographic checksum is a one-way hashfunction, that is, you cannot find (except by exhaustive ... |
MD4Transform(3) -- calculate the RSA Data Security, Inc., ``MD4'' message digest
|
The MD4 functions calculate a 128-bit cryptographic checksum (digest) for any number of input bytes. A cryptographic checksum is a one-way hashfunction, that is, you cannot find (except by exhaustive ... |
MD4Update(3) -- calculate the RSA Data Security, Inc., ``MD4'' message digest
|
The MD4 functions calculate a 128-bit cryptographic checksum (digest) for any number of input bytes. A cryptographic checksum is a one-way hashfunction, that is, you cannot find (except by exhaustive ... |
MD4_Final(3) -- MD2, MD4, and MD5 hash functions
|
MD2, MD4, and MD5 are cryptographic hash functions with a 128 bit output. MD2(), MD4(), and MD5() compute the MD2, MD4, and MD5 message digest of the n bytes at d and place it in md (which must have s... |
MD4_Init(3) -- MD2, MD4, and MD5 hash functions
|
MD2, MD4, and MD5 are cryptographic hash functions with a 128 bit output. MD2(), MD4(), and MD5() compute the MD2, MD4, and MD5 message digest of the n bytes at d and place it in md (which must have s... |
MD4_Update(3) -- MD2, MD4, and MD5 hash functions
|
MD2, MD4, and MD5 are cryptographic hash functions with a 128 bit output. MD2(), MD4(), and MD5() compute the MD2, MD4, and MD5 message digest of the n bytes at d and place it in md (which must have s... |
MD5(3) -- MD2, MD4, and MD5 hash functions
|
MD2, MD4, and MD5 are cryptographic hash functions with a 128 bit output. MD2(), MD4(), and MD5() compute the MD2, MD4, and MD5 message digest of the n bytes at d and place it in md (which must have s... |
md5(3) -- calculate the RSA Data Security, Inc., ``MD5'' message digest
|
The MD5 functions calculate a 128-bit cryptographic checksum (digest) for any number of input bytes. A cryptographic checksum is a one-way hashfunction, that is, you cannot find (except by exhaustive ... |
md5crypt(3) -- DES encryption
|
The crypt() function performs password encryption based on the NBS Data Encryption Standard (DES). Additional code has been added to deter key search attempts and to use stronger hashing algorithms. T... |
MD5Data(3) -- calculate the RSA Data Security, Inc., ``MD5'' message digest
|
The MD5 functions calculate a 128-bit cryptographic checksum (digest) for any number of input bytes. A cryptographic checksum is a one-way hashfunction, that is, you cannot find (except by exhaustive ... |
MD5End(3) -- calculate the RSA Data Security, Inc., ``MD5'' message digest
|
The MD5 functions calculate a 128-bit cryptographic checksum (digest) for any number of input bytes. A cryptographic checksum is a one-way hashfunction, that is, you cannot find (except by exhaustive ... |
MD5File(3) -- calculate the RSA Data Security, Inc., ``MD5'' message digest
|
The MD5 functions calculate a 128-bit cryptographic checksum (digest) for any number of input bytes. A cryptographic checksum is a one-way hashfunction, that is, you cannot find (except by exhaustive ... |
MD5FileChunk(3) -- calculate the RSA Data Security, Inc., ``MD5'' message digest
|
The MD5 functions calculate a 128-bit cryptographic checksum (digest) for any number of input bytes. A cryptographic checksum is a one-way hashfunction, that is, you cannot find (except by exhaustive ... |
MD5Final(3) -- calculate the RSA Data Security, Inc., ``MD5'' message digest
|
The MD5 functions calculate a 128-bit cryptographic checksum (digest) for any number of input bytes. A cryptographic checksum is a one-way hashfunction, that is, you cannot find (except by exhaustive ... |
MD5Init(3) -- calculate the RSA Data Security, Inc., ``MD5'' message digest
|
The MD5 functions calculate a 128-bit cryptographic checksum (digest) for any number of input bytes. A cryptographic checksum is a one-way hashfunction, that is, you cannot find (except by exhaustive ... |
MD5Pad(3) -- calculate the RSA Data Security, Inc., ``MD5'' message digest
|
The MD5 functions calculate a 128-bit cryptographic checksum (digest) for any number of input bytes. A cryptographic checksum is a one-way hashfunction, that is, you cannot find (except by exhaustive ... |
MD5Transform(3) -- calculate the RSA Data Security, Inc., ``MD5'' message digest
|
The MD5 functions calculate a 128-bit cryptographic checksum (digest) for any number of input bytes. A cryptographic checksum is a one-way hashfunction, that is, you cannot find (except by exhaustive ... |
MD5Update(3) -- calculate the RSA Data Security, Inc., ``MD5'' message digest
|
The MD5 functions calculate a 128-bit cryptographic checksum (digest) for any number of input bytes. A cryptographic checksum is a one-way hashfunction, that is, you cannot find (except by exhaustive ... |
MD5_Final(3) -- MD2, MD4, and MD5 hash functions
|
MD2, MD4, and MD5 are cryptographic hash functions with a 128 bit output. MD2(), MD4(), and MD5() compute the MD2, MD4, and MD5 message digest of the n bytes at d and place it in md (which must have s... |
MD5_Init(3) -- MD2, MD4, and MD5 hash functions
|
MD2, MD4, and MD5 are cryptographic hash functions with a 128 bit output. MD2(), MD4(), and MD5() compute the MD2, MD4, and MD5 message digest of the n bytes at d and place it in md (which must have s... |
MD5_Update(3) -- MD2, MD4, and MD5 hash functions
|
MD2, MD4, and MD5 are cryptographic hash functions with a 128 bit output. MD2(), MD4(), and MD5() compute the MD2, MD4, and MD5 message digest of the n bytes at d and place it in md (which must have s... |
memccpy(3) -- copy string until character found
|
The memccpy() function copies bytes from string src to string dst. If the character c (as converted to an unsigned char) occurs in the string src, the copy stops and a pointer to the byte after the co... |
memchr(3) -- locate byte in byte string
|
The memchr() function locates the first occurrence of c (converted to an unsigned char) in string b. |
memcmp(3) -- compare byte string
|
The memcmp() function compares byte string b1 against byte string b2. Both strings are assumed to be len bytes long. |
memcpy(3) -- copy bytes
|
The memcpy() function copies len bytes from buffer src to buffer dst. |
memmove(3) -- copy bytes
|
The memmove() function copies len bytes from buffer src to buffer dst. The two buffers may overlap; the copy is always done in a non-destructive manner. |
memset(3) -- write a byte to byte string
|
The memset() function writes len bytes of value c (converted to an unsigned char) to the string b. |
menu(3) -- curses extension for programming menus
|
The menu library provides terminal-independent facilities for composing menu systems on character-cell terminals. The library includes: item routines, which create and modify menu items; and menu rout... |
menu_attributes(3) -- color and attribute control for menus
|
The function set_menu_fore sets the foreground attribute of menu. This is the highlight used for selected menu items. menu_fore returns the foreground attribute. The default is A_STANDOUT. The functio... |
menu_back(3) -- color and attribute control for menus
|
The function set_menu_fore sets the foreground attribute of menu. This is the highlight used for selected menu items. menu_fore returns the foreground attribute. The default is A_STANDOUT. The functio... |
menu_cursor(3) -- position a menu's cursor
|
The function pos_menu_cursor restores the cursor to the current position associated with the menu's selected item. This is useful after curses routines have been called to do screen-painting in respo... |
menu_driver(3) -- command-processing loop of the menu system
|
Once a menu has been posted (displayed), you should funnel input events to it through menu_driver. This routine has three major input cases; either the input is a menu navigation request, it's a prin... |
menu_fore(3) -- color and attribute control for menus
|
The function set_menu_fore sets the foreground attribute of menu. This is the highlight used for selected menu items. menu_fore returns the foreground attribute. The default is A_STANDOUT. The functio... |
menu_format(3) -- set and get menu sizes
|
The function set_menu_format sets the maximum display size of the given menu. If this size is too small to display all menu items, the menu will be made scrollable. If this size is larger than the men... |
menu_grey(3) -- color and attribute control for menus
|
The function set_menu_fore sets the foreground attribute of menu. This is the highlight used for selected menu items. menu_fore returns the foreground attribute. The default is A_STANDOUT. The functio... |
menu_hook(3) -- set hooks for automatic invocation by applications
|
These functions make it possible to set hook functions to be called at various points in the automatic processing of input event codes by menu_driver. The function set_item_init sets a hook to be call... |
menu_init(3) -- set hooks for automatic invocation by applications
|
These functions make it possible to set hook functions to be called at various points in the automatic processing of input event codes by menu_driver. The function set_item_init sets a hook to be call... |
menu_items(3) -- make and break connections between items and menus
|
The function set_menu_items changes the item pointer array of the given menu. The array must be terminated by a NULL. The function menu_items returns the item array of the given menu. The function ite... |
menu_mark(3) -- get and set the menu mark string
|
In order to make menu selections visible on older terminals without highlighting or color capability, the menu library marks selected items in a menu with a prefix string. The function set_menu_mark s... |
menu_new(3) -- create and destroy menus
|
The function new_menu creates a new menu connected to a specified item pointer array (which must be NULL-terminated). The function free_menu disconnects menu from its item array and frees the storage ... |
menu_opts(3) -- set and get menu options
|
The function set_menu_opts sets all the given menu's option bits (menu option bits may be logically OR'ed together). The function menu_opts_on turns on the given option bits, and leaves others alone... |
menu_opts_off(3) -- set and get menu options
|
The function set_menu_opts sets all the given menu's option bits (menu option bits may be logically OR'ed together). The function menu_opts_on turns on the given option bits, and leaves others alone... |
menu_opts_on(3) -- set and get menu options
|
The function set_menu_opts sets all the given menu's option bits (menu option bits may be logically OR'ed together). The function menu_opts_on turns on the given option bits, and leaves others alone... |
menu_pad(3) -- color and attribute control for menus
|
The function set_menu_fore sets the foreground attribute of menu. This is the highlight used for selected menu items. menu_fore returns the foreground attribute. The default is A_STANDOUT. The functio... |
menu_pattern(3) -- get and set a menu's pattern buffer
|
Every menu has an associated pattern match buffer. As input events that are printable ASCII characters come in, they are appended to this match buffer and tested for a match, as described in menu_driv... |
menu_post(3) -- write or erase menus from associated subwindows
|
The function post_menu displays a menu to its associated subwindow. To trigger physical display of the subwindow, use refresh or some equivalent curses routine (the implicit doupdate triggered by an c... |
menu_requestname(3) -- handle printable menu request names
|
The function menu_request_name returns the printable name of a menu request code. The function menu_request_by_name searches in the nametable for a request with the given name and returns its request ... |
menu_request_by_name(3) -- handle printable menu request names
|
The function menu_request_name returns the printable name of a menu request code. The function menu_request_by_name searches in the nametable for a request with the given name and returns its request ... |
menu_request_name(3) -- handle printable menu request names
|
The function menu_request_name returns the printable name of a menu request code. The function menu_request_by_name searches in the nametable for a request with the given name and returns its request ... |
menu_spacing(3) -- Control spacing between menu items.
|
The function set_menu_spacing sets the spacing informations for the menu. spc_description controls the number of spaces between an item name and an item description. It must not be larger than TABSIZE... |
menu_sub(3) -- make and break menu window and subwindow associations
|
Every menu has an associated pair of curses windows. The menu window displays any title and border associated with the window; the menu subwindow displays the items of the menu that are currently avai... |
menu_term(3) -- set hooks for automatic invocation by applications
|
These functions make it possible to set hook functions to be called at various points in the automatic processing of input event codes by menu_driver. The function set_item_init sets a hook to be call... |
menu_userptr(3) -- associate application data with a menu item
|
Every menu and every menu item has a field that can be used to hold application-specific data (that is, the menudriver code leaves it alone). These functions get and set the menu user pointer field. |
menu_win(3) -- make and break menu window and subwindow associations
|
Every menu has an associated pair of curses windows. The menu window displays any title and border associated with the window; the menu subwindow displays the items of the menu that are currently avai... |
mergesort(3) -- sort functions
|
The qsort() function is a modified partition-exchange sort, or quicksort. The heapsort() function is a modified selection sort. The mergesort() function is a modified merge sort with exponential searc... |
meta(3) -- curses input options
|
Normally, the tty driver buffers typed characters until a newline or carriage return is typed. The cbreak routine disables line buffering and erase/kill character-processing (interrupt and flow contro... |
mitem_current(3) -- set and get current_menu_item
|
The function set_current_item sets the current item (the item on which the menu cursor is positioned). cur- rent_item returns a pointer to the current item in the given menu. The function set_top_row ... |
mitem_name(3) -- get menu item name and description fields
|
The function item_name returns the name part of the given item. The function item_description returns the description part of the given item. |
mitem_new(3) -- create and destroy menu items
|
The function new_item allocates a new item and initializes it from the name and description pointers. Please notice that the item stores only the pointers to the name and description. Those pointers m... |
mitem_opts(3) -- set and get menu item options
|
The function set_item_opts sets all the given item's option bits (menu option bits may be logically OR'ed together). The function item_opts_on turns on the given option bits, and leaves others alone... |
mitem_userptr(3) -- associate application data with a menu item
|
Every menu item has a field that can be used to hold application-specific data (that is, the menu-driver code leaves it alone). These functions get and set that field. |
mitem_value(3) -- set and get menu item values
|
If you turn off the menu option O_ONEVALUE (e.g., with set_menu_opts or menu_opts_off; see menu_opts(3)), the menu becomes multi-valued; that is, more than one item may simultaneously be selected. In ... |
mitem_visible(3) -- check visibility of a menu item
|
A menu item is visible when it is in the portion of a posted menu that is mapped onto the screen (if the menu is scrollable, in particular, this portion will be smaller than the whole menu). |
mkdtemp(3) -- make temporary file name (unique)
|
The mktemp() function takes the given file name template and overwrites a portion of it to create a file name. This file name is unique and suitable for use by the application. The template may be any... |
mkstemp(3) -- make temporary file name (unique)
|
The mktemp() function takes the given file name template and overwrites a portion of it to create a file name. This file name is unique and suitable for use by the application. The template may be any... |
mkstemps(3) -- make temporary file name (unique)
|
The mktemp() function takes the given file name template and overwrites a portion of it to create a file name. This file name is unique and suitable for use by the application. The template may be any... |
mktemp(3) -- make temporary file name (unique)
|
The mktemp() function takes the given file name template and overwrites a portion of it to create a file name. This file name is unique and suitable for use by the application. The template may be any... |
mktime(3) -- convert date and time to ASCII
|
The ctime() function converts a time_t, pointed to by clock, representing the time in seconds since 00:00:00 UTC, 1970-01-01, and returns a pointer to a 26-character string of the form Thu Nov 24 18:2... |
modf(3) -- extract signed integral and fractional values from
|
The modf() function breaks the argument value into integral and fractional parts, each of which has the same sign as the argument. It stores the integral part as a double in the object pointed to by i... |
moncontrol(3) -- control execution profile
|
An executable program compiled using the -pg option to cc(1) automatically includes calls to collect statistics for the gprof(1) call-graph execution profiler. In typical operation, profiling begins a... |
monstartup(3) -- control execution profile
|
An executable program compiled using the -pg option to cc(1) automatically includes calls to collect statistics for the gprof(1) call-graph execution profiler. In typical operation, profiling begins a... |
mouseinterval(3) -- mouse interface through curses
|
These functions provide an interface to mouse events from curses(3). Mouse events are represented by KEY_MOUSE pseudo-key values in the wgetch input stream. To make mouse events visible, use the mouse... |
mousemask(3) -- mouse interface through curses
|
These functions provide an interface to mouse events from curses(3). Mouse events are represented by KEY_MOUSE pseudo-key values in the wgetch input stream. To make mouse events visible, use the mouse... |
mouse_trafo(3) -- mouse interface through curses
|
These functions provide an interface to mouse events from curses(3). Mouse events are represented by KEY_MOUSE pseudo-key values in the wgetch input stream. To make mouse events visible, use the mouse... |
move(3) -- move curses window cursor
|
These routines move the cursor associated with the window to line y and column x. This routine does not move the physical cursor of the terminal until refresh is called. The position specified is rela... |
move_field(3) -- make and break connections between fields and forms
|
The function set_form_fields changes the field pointer array of the given form. The array must be terminated by a NULL. The function form_fields returns the field array of the given form. The function... |
move_panel(3) -- panel stack extension for curses
|
Panels are curses(3) windows with the added feature of depth. Panel functions allow the use of stacked windows and ensure the proper portions of each window and the curses stdscr window are hidden or ... |
mpool(3) -- shared memory buffer pool
|
mpool is the library interface intended to provide page oriented buffer management of files. The buffers may be shared between processes. The function mpool_open() initializes a memory pool. The key a... |
mpool_close(3) -- shared memory buffer pool
|
mpool is the library interface intended to provide page oriented buffer management of files. The buffers may be shared between processes. The function mpool_open() initializes a memory pool. The key a... |
mpool_delete(3) -- shared memory buffer pool
|
mpool is the library interface intended to provide page oriented buffer management of files. The buffers may be shared between processes. The function mpool_open() initializes a memory pool. The key a... |
mpool_filter(3) -- shared memory buffer pool
|
mpool is the library interface intended to provide page oriented buffer management of files. The buffers may be shared between processes. The function mpool_open() initializes a memory pool. The key a... |
mpool_get(3) -- shared memory buffer pool
|
mpool is the library interface intended to provide page oriented buffer management of files. The buffers may be shared between processes. The function mpool_open() initializes a memory pool. The key a... |
mpool_new(3) -- shared memory buffer pool
|
mpool is the library interface intended to provide page oriented buffer management of files. The buffers may be shared between processes. The function mpool_open() initializes a memory pool. The key a... |
mpool_open(3) -- shared memory buffer pool
|
mpool is the library interface intended to provide page oriented buffer management of files. The buffers may be shared between processes. The function mpool_open() initializes a memory pool. The key a... |
mpool_put(3) -- shared memory buffer pool
|
mpool is the library interface intended to provide page oriented buffer management of files. The buffers may be shared between processes. The function mpool_open() initializes a memory pool. The key a... |
mpool_sync(3) -- shared memory buffer pool
|
mpool is the library interface intended to provide page oriented buffer management of files. The buffers may be shared between processes. The function mpool_open() initializes a memory pool. The key a... |
mrand48(3) -- pseudo-random number generators and initialization routines
|
The rand48() family of functions generates pseudo-random numbers using a linear congruential algorithm working on integers 48 bits in size. The particular formula employed is r(n+1) = (a * r(n) + c) m... |
mul(3) -- BIGNUM library internal functions
|
This page documents the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
mul_add(3) -- BIGNUM library internal functions
|
This page documents the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
mvaddch(3) -- add a character (with attributes) to a curses window, then advance the cursor
|
The addch, waddch, mvaddch and mvwaddch routines put the character ch into the given window at its current window position, which is then advanced. They are analogous to putchar in stdio(3). If the ad... |
mvaddchnstr(3) -- add a string of characters (and attributes) to a curses window
|
These routines copy chstr into the window image structure at and after the current cursor position. The four routines with n as the last argument copy at most n elements, but no more than will fit on ... |
mvaddchstr(3) -- add a string of characters (and attributes) to a curses window
|
These routines copy chstr into the window image structure at and after the current cursor position. The four routines with n as the last argument copy at most n elements, but no more than will fit on ... |
mvaddnstr(3) -- add a string of characters to a curses window and advance cursor
|
These routines write the characters of the (null-terminated) character string str on the given window. It is similar to calling waddch once for each character in the string. The four routines with n a... |
mvaddstr(3) -- add a string of characters to a curses window and advance cursor
|
These routines write the characters of the (null-terminated) character string str on the given window. It is similar to calling waddch once for each character in the string. The four routines with n a... |
mvchgat(3) -- curses character and window attribute control routines
|
These routines manipulate the current attributes of the named window. The current attributes of a window apply to all characters that are written into the window with wad- dch, waddstr and wprintw. At... |
mvcur(3) -- curses interfaces to terminfo database
|
These low-level routines must be called by programs that have to deal directly with the terminfo database to handle certain terminal capabilities, such as programming function keys. For all other func... |
mvdelch(3) -- delete character under the cursor in a curses window
|
These routines delete the character under the cursor; all characters to the right of the cursor on the same line are moved to the left one position and the last character on the line is filled with a ... |
mvderwin(3) -- create curses windows
|
Calling newwin creates and returns a pointer to a new window with the given number of lines and columns. The upper left-hand corner of the window is at line begin_y, column begin_x. If either nlines o... |
mvgetch(3) -- get (or push back) characters from curses terminal keyboard
|
The getch, wgetch, mvgetch and mvwgetch, routines read a character from the window. In no-delay mode, if no input is waiting, the value ERR is returned. In delay mode, the program waits until the syst... |
mvgetnstr(3) -- accept character strings from curses terminal keyboard
|
The function getstr is equivalent to a series of calls to getch, until a newline or carriage return is received (the terminating character is not included in the returned string). The resulting value ... |
mvgetstr(3) -- accept character strings from curses terminal keyboard
|
The function getstr is equivalent to a series of calls to getch, until a newline or carriage return is received (the terminating character is not included in the returned string). The resulting value ... |
mvhline(3) -- create curses borders, horizontal and vertical lines
|
The border, wborder and box routines draw a box around the edges of a window. The argument ls is a character and attributes used for the left side of the border, rs - right side, ts - top side, bs - b... |
mvinch(3) -- get a character and attributes from a curses window
|
These routines return the character, of type chtype, at the current position in the named window. If any attributes are set for that position, their values are OR'ed into the value returned. Constant... |
mvinchnstr(3) -- get a string of characters (and attributes) from a curses window
|
These routines return a NULL-terminated array of chtype quantities, starting at the current cursor position in the named window and ending at the right margin of the window. The four functions with n ... |
mvinchstr(3) -- get a string of characters (and attributes) from a curses window
|
These routines return a NULL-terminated array of chtype quantities, starting at the current cursor position in the named window and ending at the right margin of the window. The four functions with n ... |
mvinnstr(3) -- get a string of characters from a curses window
|
These routines return a string of characters in str, extracted starting at the current cursor position in the named window. Attributes are stripped from the characters. The four functions with n as th... |
mvinsch(3) -- insert a character before cursor in a curses window
|
These routines insert the character ch before the character under the cursor. All characters to the right of the cursor are moved one space to the right, with the possibility of the rightmost characte... |
mvinsnstr(3) -- insert string before cursor in a curses window
|
These routines insert a character string (as many characters as will fit on the line) before the character under the cursor. All characters to the right of the cursor are shifted right, with the possi... |
mvinsstr(3) -- insert string before cursor in a curses window
|
These routines insert a character string (as many characters as will fit on the line) before the character under the cursor. All characters to the right of the cursor are shifted right, with the possi... |
mvinstr(3) -- get a string of characters from a curses window
|
These routines return a string of characters in str, extracted starting at the current cursor position in the named window. Attributes are stripped from the characters. The four functions with n as th... |
mvprintw(3) -- print formatted output in curses windows
|
The printw, wprintw, mvprintw and mvwprintw routines are analogous to printf [see printf(3)]. In effect, the string that would be output by printf is output instead as though waddstr were used on the ... |
mvscanw(3) -- convert formatted input from a curses window
|
The scanw, wscanw and mvscanw routines are analogous to scanf [see scanf(3)]. The effect of these routines is as though wgetstr were called on the window, and the resulting line used as input for ssca... |
mvvline(3) -- create curses borders, horizontal and vertical lines
|
The border, wborder and box routines draw a box around the edges of a window. The argument ls is a character and attributes used for the left side of the border, rs - right side, ts - top side, bs - b... |
mvwaddch(3) -- add a character (with attributes) to a curses window, then advance the cursor
|
The addch, waddch, mvaddch and mvwaddch routines put the character ch into the given window at its current window position, which is then advanced. They are analogous to putchar in stdio(3). If the ad... |
mvwaddchnstr(3) -- add a string of characters (and attributes) to a curses window
|
These routines copy chstr into the window image structure at and after the current cursor position. The four routines with n as the last argument copy at most n elements, but no more than will fit on ... |
mvwaddchstr(3) -- add a string of characters (and attributes) to a curses window
|
These routines copy chstr into the window image structure at and after the current cursor position. The four routines with n as the last argument copy at most n elements, but no more than will fit on ... |
mvwaddnstr(3) -- add a string of characters to a curses window and advance cursor
|
These routines write the characters of the (null-terminated) character string str on the given window. It is similar to calling waddch once for each character in the string. The four routines with n a... |
mvwaddstr(3) -- add a string of characters to a curses window and advance cursor
|
These routines write the characters of the (null-terminated) character string str on the given window. It is similar to calling waddch once for each character in the string. The four routines with n a... |
mvwchgat(3) -- curses character and window attribute control routines
|
These routines manipulate the current attributes of the named window. The current attributes of a window apply to all characters that are written into the window with wad- dch, waddstr and wprintw. At... |
mvwdelch(3) -- delete character under the cursor in a curses window
|
These routines delete the character under the cursor; all characters to the right of the cursor on the same line are moved to the left one position and the last character on the line is filled with a ... |
mvwgetch(3) -- get (or push back) characters from curses terminal keyboard
|
The getch, wgetch, mvgetch and mvwgetch, routines read a character from the window. In no-delay mode, if no input is waiting, the value ERR is returned. In delay mode, the program waits until the syst... |
mvwgetnstr(3) -- accept character strings from curses terminal keyboard
|
The function getstr is equivalent to a series of calls to getch, until a newline or carriage return is received (the terminating character is not included in the returned string). The resulting value ... |
mvwgetstr(3) -- accept character strings from curses terminal keyboard
|
The function getstr is equivalent to a series of calls to getch, until a newline or carriage return is received (the terminating character is not included in the returned string). The resulting value ... |
mvwhline(3) -- create curses borders, horizontal and vertical lines
|
The border, wborder and box routines draw a box around the edges of a window. The argument ls is a character and attributes used for the left side of the border, rs - right side, ts - top side, bs - b... |
mvwin(3) -- create curses windows
|
Calling newwin creates and returns a pointer to a new window with the given number of lines and columns. The upper left-hand corner of the window is at line begin_y, column begin_x. If either nlines o... |
mvwinch(3) -- get a character and attributes from a curses window
|
These routines return the character, of type chtype, at the current position in the named window. If any attributes are set for that position, their values are OR'ed into the value returned. Constant... |
mvwinchnstr(3) -- get a string of characters (and attributes) from a curses window
|
These routines return a NULL-terminated array of chtype quantities, starting at the current cursor position in the named window and ending at the right margin of the window. The four functions with n ... |
mvwinchstr(3) -- get a string of characters (and attributes) from a curses window
|
These routines return a NULL-terminated array of chtype quantities, starting at the current cursor position in the named window and ending at the right margin of the window. The four functions with n ... |
mvwinnstr(3) -- get a string of characters from a curses window
|
These routines return a string of characters in str, extracted starting at the current cursor position in the named window. Attributes are stripped from the characters. The four functions with n as th... |
mvwinsch(3) -- insert a character before cursor in a curses window
|
These routines insert the character ch before the character under the cursor. All characters to the right of the cursor are moved one space to the right, with the possibility of the rightmost characte... |
mvwinsnstr(3) -- insert string before cursor in a curses window
|
These routines insert a character string (as many characters as will fit on the line) before the character under the cursor. All characters to the right of the cursor are shifted right, with the possi... |
mvwinsstr(3) -- insert string before cursor in a curses window
|
These routines insert a character string (as many characters as will fit on the line) before the character under the cursor. All characters to the right of the cursor are shifted right, with the possi... |
mvwinstr(3) -- get a string of characters from a curses window
|
These routines return a string of characters in str, extracted starting at the current cursor position in the named window. Attributes are stripped from the characters. The four functions with n as th... |
mvwprintw(3) -- print formatted output in curses windows
|
The printw, wprintw, mvprintw and mvwprintw routines are analogous to printf [see printf(3)]. In effect, the string that would be output by printf is output instead as though waddstr were used on the ... |
mvwscanw(3) -- convert formatted input from a curses window
|
The scanw, wscanw and mvscanw routines are analogous to scanf [see scanf(3)]. The effect of these routines is as though wgetstr were called on the window, and the resulting line used as input for ssca... |
mvwvline(3) -- create curses borders, horizontal and vertical lines
|
The border, wborder and box routines draw a box around the edges of a window. The argument ls is a character and attributes used for the left side of the border, rs - right side, ts - top side, bs - b... |
napms(3) -- low-level curses routines
|
The following routines give low-level access to various curses capabilities. Theses routines typically are used inside library routines. The def_prog_mode and def_shell_mode routines save the current ... |
ncurses(3) -- CRT screen handling and optimization package
|
The curses library routines give the user a terminal-independent method of updating character screens with reasonable optimization. This implementation is ``new curses'' (ncurses) and is the approve... |
ndbm(3) -- database access methods
|
These functions provide a ndbm-compatible interface to the database access methods described in db(3). Each unique record in the database is a key/content pair, the components of which may be any arbi... |
network(3) -- Internet address manipulation routines
|
The routines inet_aton(), inet_addr() and inet_network() interpret character strings representing numbers expressed in the Internet standard `.' notation. The inet_pton() function converts a presenta... |
net_addrcmp(3) -- compare socket address structures
|
The net_addrcmp() function compares two socket address structures, sa1 and sa2. |
newpad(3) -- create and display curses pads
|
The newpad routine creates and returns a pointer to a new pad data structure with the given number of lines, nlines, and columns, ncols. A pad is like a window, except that it is not restricted by the... |
newterm(3) -- curses screen initialization and manipulation routines
|
initscr is normally the first curses routine to call when initializing a program. A few special routines sometimes need to be called before it; these are slk_init, filter, ripoffline, use_env. For mul... |
newwin(3) -- create curses windows
|
Calling newwin creates and returns a pointer to a new window with the given number of lines and columns. The upper left-hand corner of the window is at line begin_y, column begin_x. If either nlines o... |
new_field(3) -- create and destroy form fields
|
The function new_field allocates a new field and initializes it from the parameters given: height, width, row of upper-left corner, column of upper-left corner, number off-screen rows, and number of a... |
new_fieldtype(3) -- define validation-field types
|
The function new_fieldtype creates a new field type usable for data validation. You supply it with field_check, a predicate to check the validity of an entered data string whenever the user attempts t... |
new_form(3) -- create and destroy forms
|
The function new_form creates a new form connected to a specified field pointer array (which must be NULL-terminated). The function free_form disconnects form from its field array and frees the storag... |
new_item(3) -- create and destroy menu items
|
The function new_item allocates a new item and initializes it from the name and description pointers. Please notice that the item stores only the pointers to the name and description. Those pointers m... |
new_menu(3) -- create and destroy menus
|
The function new_menu creates a new menu connected to a specified item pointer array (which must be NULL-terminated). The function free_menu disconnects menu from its item array and frees the storage ... |
new_page(3) -- form pagination functions
|
The function set_new_page sets or resets a flag marking the given field as the beginning of a new page on its form. The function new_page is a predicate which tests if a given field marks a page begin... |
new_panel(3) -- panel stack extension for curses
|
Panels are curses(3) windows with the added feature of depth. Panel functions allow the use of stacked windows and ensure the proper portions of each window and the curses stdscr window are hidden or ... |
nextafter(3) -- functions for IEEE arithmetic
|
These functions are required or recommended by IEEE Std 754-1985. copysign() returns x with its sign changed to y's. The copysignf() function is a single precision version of copysign(). finite() ret... |
nextafterf(3) -- functions for IEEE arithmetic
|
These functions are required or recommended by IEEE Std 754-1985. copysign() returns x with its sign changed to y's. The copysignf() function is a single precision version of copysign(). finite() ret... |
nextkey(3) -- database subroutines
|
These functions provide a dbm-compatible interface to the database access methods described in db(3). Each unique record in the database is a key/content pair, the components of which may be any arbit... |
nftw(3) -- traverse (walk) a file tree
|
These functions are provided for compatibility with legacy code. New code should use the fts(3) functions. The ftw() and nftw() functions traverse (walk) the directory hierarchy rooted in path. For ea... |
nice(3) -- change process scheduling priority
|
This interface is obsoleted by setpriority(2). The nice() function adds the value specified in incr to the scheduling priority of the invoking process. incr is an integer such that the resulting sched... |
nl(3) -- curses output options
|
These routines set options that change the style of output within curses. All options are initially FALSE, unless otherwise stated. It is not necessary to turn these options off before calling endwin.... |
nlist(3) -- retrieve symbol table name list from an executable file
|
The nlist() function retrieves name list entries from the symbol table of an executable file. (See a.out(5).) The argument nl is set to reference the beginning of the list. The list is preened of bina... |
nl_langinfo(3) -- get locale information
|
The nl_langinfo() function returns a pointer to a string containing information set by the program's locale. The names and values of item are defined in . |
nocbreak(3) -- curses input options
|
Normally, the tty driver buffers typed characters until a newline or carriage return is typed. The cbreak routine disables line buffering and erase/kill character-processing (interrupt and flow contro... |
nodelay(3) -- curses input options
|
Normally, the tty driver buffers typed characters until a newline or carriage return is typed. The cbreak routine disables line buffering and erase/kill character-processing (interrupt and flow contro... |
noecho(3) -- curses input options
|
Normally, the tty driver buffers typed characters until a newline or carriage return is typed. The cbreak routine disables line buffering and erase/kill character-processing (interrupt and flow contro... |
nonl(3) -- curses output options
|
These routines set options that change the style of output within curses. All options are initially FALSE, unless otherwise stated. It is not necessary to turn these options off before calling endwin.... |
noqiflush(3) -- curses input options
|
Normally, the tty driver buffers typed characters until a newline or carriage return is typed. The cbreak routine disables line buffering and erase/kill character-processing (interrupt and flow contro... |
noraw(3) -- curses input options
|
Normally, the tty driver buffers typed characters until a newline or carriage return is typed. The cbreak routine disables line buffering and erase/kill character-processing (interrupt and flow contro... |
notimeout(3) -- curses input options
|
Normally, the tty driver buffers typed characters until a newline or carriage return is typed. The cbreak routine disables line buffering and erase/kill character-processing (interrupt and flow contro... |
nrand48(3) -- pseudo-random number generators and initialization routines
|
The rand48() family of functions generates pseudo-random numbers using a linear congruential algorithm working on integers 48 bits in size. The particular formula employed is r(n+1) = (a * r(n) + c) m... |
ns(3) -- Xerox NS(tm) address conversion routines
|
The routine ns_addr() interprets character strings representing XNS addresses, returning binary information suitable for use in system calls. The routine ns_ntoa() takes XNS addresses and returns ASCI... |
ns_addr(3) -- Xerox NS(tm) address conversion routines
|
The routine ns_addr() interprets character strings representing XNS addresses, returning binary information suitable for use in system calls. The routine ns_ntoa() takes XNS addresses and returns ASCI... |
ns_ntoa(3) -- Xerox NS(tm) address conversion routines
|
The routine ns_addr() interprets character strings representing XNS addresses, returning binary information suitable for use in system calls. The routine ns_ntoa() takes XNS addresses and returns ASCI... |
ntoa(3) -- Internet address manipulation routines
|
The routines inet_aton(), inet_addr() and inet_network() interpret character strings representing numbers expressed in the Internet standard `.' notation. The inet_pton() function converts a presenta... |
ntohl(3) -- convert values between different byte orderings
|
These routines convert 16, 32 and 64-bit quantities between different byte orderings. The ``swap'' functions reverse the byte ordering of the given quantity, the others converts either from/to the n... |
ntohs(3) -- convert values between different byte orderings
|
These routines convert 16, 32 and 64-bit quantities between different byte orderings. The ``swap'' functions reverse the byte ordering of the given quantity, the others converts either from/to the n... |
OBJ_nid2sn(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. EVP_CIPHER_CTX_init() initializes cipher contex ctx. EVP_EncryptInit_ex() sets up cipher context ctx for encryption wit... |
OBJ_obj2nid(3) -- EVP cipher routines
|
The EVP cipher routines are a high level interface to certain symmetric ciphers. EVP_CIPHER_CTX_init() initializes cipher contex ctx. EVP_EncryptInit_ex() sets up cipher context ctx for encryption wit... |
ocurses(3) -- screen functions with ``optimal'' cursor motion
|
These routines give the user a method of updating screens with reasonable optimization. They keep an image of the current screen, and the user sets up an image of a new one. Then refresh() tells the r... |
ohash_create_entry(3) -- helper functions for open hashing
|
These functions are commonly used to simplify open hashing usage, and use similar conventions. They operate indifferently on nullterminated strings (by setting *pend = NULL) or memory ranges (delimite... |
ohash_delete(3) -- light-weight open hashing
|
Those functions have been designed as a fast, extensible alternative to the usual hash table functions. They provide storage and retrieval of records indexed by keys, where a key is a contiguous seque... |
ohash_entries(3) -- light-weight open hashing
|
Those functions have been designed as a fast, extensible alternative to the usual hash table functions. They provide storage and retrieval of records indexed by keys, where a key is a contiguous seque... |
ohash_find(3) -- light-weight open hashing
|
Those functions have been designed as a fast, extensible alternative to the usual hash table functions. They provide storage and retrieval of records indexed by keys, where a key is a contiguous seque... |
ohash_first(3) -- light-weight open hashing
|
Those functions have been designed as a fast, extensible alternative to the usual hash table functions. They provide storage and retrieval of records indexed by keys, where a key is a contiguous seque... |
ohash_init(3) -- light-weight open hashing
|
Those functions have been designed as a fast, extensible alternative to the usual hash table functions. They provide storage and retrieval of records indexed by keys, where a key is a contiguous seque... |
ohash_insert(3) -- light-weight open hashing
|
Those functions have been designed as a fast, extensible alternative to the usual hash table functions. They provide storage and retrieval of records indexed by keys, where a key is a contiguous seque... |
ohash_interval(3) -- helper functions for open hashing
|
These functions are commonly used to simplify open hashing usage, and use similar conventions. They operate indifferently on nullterminated strings (by setting *pend = NULL) or memory ranges (delimite... |
ohash_lookup_interval(3) -- light-weight open hashing
|
Those functions have been designed as a fast, extensible alternative to the usual hash table functions. They provide storage and retrieval of records indexed by keys, where a key is a contiguous seque... |
ohash_lookup_memory(3) -- light-weight open hashing
|
Those functions have been designed as a fast, extensible alternative to the usual hash table functions. They provide storage and retrieval of records indexed by keys, where a key is a contiguous seque... |
ohash_next(3) -- light-weight open hashing
|
Those functions have been designed as a fast, extensible alternative to the usual hash table functions. They provide storage and retrieval of records indexed by keys, where a key is a contiguous seque... |
ohash_qlookup(3) -- helper functions for open hashing
|
These functions are commonly used to simplify open hashing usage, and use similar conventions. They operate indifferently on nullterminated strings (by setting *pend = NULL) or memory ranges (delimite... |
ohash_qlookupi(3) -- helper functions for open hashing
|
These functions are commonly used to simplify open hashing usage, and use similar conventions. They operate indifferently on nullterminated strings (by setting *pend = NULL) or memory ranges (delimite... |
ohash_remove(3) -- light-weight open hashing
|
Those functions have been designed as a fast, extensible alternative to the usual hash table functions. They provide storage and retrieval of records indexed by keys, where a key is a contiguous seque... |
opendev(3) -- short form device open routine
|
The opendev() function opens a device using the ``short form'' name. This is typically ``sd0'' or ``sd0c'', for instance, which will be expanded to /dev/rsd0c on most architectures. Device name ... |
opendir(3) -- directory operations
|
The opendir() function opens the directory named by filename, associates a directory stream with it, and returns a pointer to be used to identify the directory stream in subsequent operations. A null ... |
opendisk(3) -- open a disk's ``raw'' partition
|
opendisk() opens path, for reading and/or writing as specified by the argument flags using open(2), and the file descriptor is returned to the caller. buf is used to store the resultant filename. bufl... |
openlog(3) -- control system log
|
The syslog() function writes message to the system message logger. The message is then written to the system console, log files, logged-in users, or forwarded to other machines as appropriate (see sys... |
openlog_r(3) -- control system log
|
The syslog() function writes message to the system message logger. The message is then written to the system console, log files, logged-in users, or forwarded to other machines as appropriate (see sys... |
openpty(3) -- tty utility functions
|
The openpty(), login_tty(), and forkpty() functions perform manipulations on ttys and pseudo-ttys. The openpty() function finds an available pseudo-tty and returns file descriptors for the master and ... |
OpenSSL_add_all_algorithms(3) -- add algorithms to internal table
|
OpenSSL keeps an internal table of digest algorithms and ciphers. It uses this table to lookup ciphers via functions such as EVP_get_cipher_byname(). OpenSSL_add_all_digests() adds all digest algorith... |
OpenSSL_add_all_ciphers(3) -- add algorithms to internal table
|
OpenSSL keeps an internal table of digest algorithms and ciphers. It uses this table to lookup ciphers via functions such as EVP_get_cipher_byname(). OpenSSL_add_all_digests() adds all digest algorith... |
OpenSSL_add_all_digests(3) -- add algorithms to internal table
|
OpenSSL keeps an internal table of digest algorithms and ciphers. It uses this table to lookup ciphers via functions such as EVP_get_cipher_byname(). OpenSSL_add_all_digests() adds all digest algorith... |
OpenSSL_add_ssl_algorithms(3) -- initialize SSL library by registering algorithms
|
SSL_library_init() registers the available ciphers and digests. OpenSSL_add_ssl_algorithms() and SSLeay_add_ssl_algo- rithms() are synonyms for SSL_library_init(). |
OPENSSL_VERSION_NUMBER(3) -- get OpenSSL version number
|
OPENSSL_VERSION_NUMBER is a numeric release version identifier: MMNNFFPPS: major minor fix patch status The status nibble has one of the values 0 for development, 1 to e for betas 1 to 14, and f for r... |
ossaudio(3) -- OSS audio emulation
|
The ossaudio library provides an emulation of the OSS (Linux) audio interface. Use the native interface for new programs and the emulation library only for porting programs. |
otermcap(3) -- terminal independent operation routines
|
These functions extract and use capabilities from a terminal capability data base, usually /usr/share/misc/termcap, the format of which is described in termcap(5). This version of these routines has b... |
overlay(3) -- overlay and manipulate overlapped curses windows
|
The overlay and overwrite routines overlay srcwin on top of dstwin. scrwin and dstwin are not required to be the same size; only text where the two windows overlap is copied. The difference is that ov... |
overwrite(3) -- overlay and manipulate overlapped curses windows
|
The overlay and overwrite routines overlay srcwin on top of dstwin. scrwin and dstwin are not required to be the same size; only text where the two windows overlap is copied. The difference is that ov... |
pair_content(3) -- curses color manipulation routines
|
Overview curses support color attributes on terminals with that capability. To use these routines start_color must be called, usually right after initscr. Colors are always used in pairs (referred to ... |
PAIR_NUMBER(3) -- curses character and window attribute control routines
|
These routines manipulate the current attributes of the named window. The current attributes of a window apply to all characters that are written into the window with wad- dch, waddstr and wprintw. At... |
panel(3) -- panel stack extension for curses
|
Panels are curses(3) windows with the added feature of depth. Panel functions allow the use of stacked windows and ensure the proper portions of each window and the curses stdscr window are hidden or ... |
panel_above(3) -- panel stack extension for curses
|
Panels are curses(3) windows with the added feature of depth. Panel functions allow the use of stacked windows and ensure the proper portions of each window and the curses stdscr window are hidden or ... |
panel_below(3) -- panel stack extension for curses
|
Panels are curses(3) windows with the added feature of depth. Panel functions allow the use of stacked windows and ensure the proper portions of each window and the curses stdscr window are hidden or ... |
panel_hidden(3) -- panel stack extension for curses
|
Panels are curses(3) windows with the added feature of depth. Panel functions allow the use of stacked windows and ensure the proper portions of each window and the curses stdscr window are hidden or ... |
panel_userptr(3) -- panel stack extension for curses
|
Panels are curses(3) windows with the added feature of depth. Panel functions allow the use of stacked windows and ensure the proper portions of each window and the curses stdscr window are hidden or ... |
panel_window(3) -- panel stack extension for curses
|
Panels are curses(3) windows with the added feature of depth. Panel functions allow the use of stacked windows and ensure the proper portions of each window and the curses stdscr window are hidden or ... |
pause(3) -- stop until signal
|
Pause is made obsolete by sigsuspend(2). The pause() function forces a process to pause until a signal is received from either the kill(2) function or an interval timer (see setitimer(2)). Upon termin... |
pcap(3) -- Packet Capture library
|
pcap provides a high level interface to packet capture systems. All packets on the network, even those destined for other hosts, are accessible through this mechanism. |
pcap_close(3) -- Packet Capture library
|
pcap provides a high level interface to packet capture systems. All packets on the network, even those destined for other hosts, are accessible through this mechanism. |
pcap_compile(3) -- Packet Capture library
|
pcap provides a high level interface to packet capture systems. All packets on the network, even those destined for other hosts, are accessible through this mechanism. |
pcap_datalink(3) -- Packet Capture library
|
pcap provides a high level interface to packet capture systems. All packets on the network, even those destined for other hosts, are accessible through this mechanism. |
pcap_dispatch(3) -- Packet Capture library
|
pcap provides a high level interface to packet capture systems. All packets on the network, even those destined for other hosts, are accessible through this mechanism. |
pcap_dump(3) -- Packet Capture library
|
pcap provides a high level interface to packet capture systems. All packets on the network, even those destined for other hosts, are accessible through this mechanism. |
pcap_dump_close(3) -- Packet Capture library
|
pcap provides a high level interface to packet capture systems. All packets on the network, even those destined for other hosts, are accessible through this mechanism. |
pcap_dump_open(3) -- Packet Capture library
|
pcap provides a high level interface to packet capture systems. All packets on the network, even those destined for other hosts, are accessible through this mechanism. |
pcap_file(3) -- Packet Capture library
|
pcap provides a high level interface to packet capture systems. All packets on the network, even those destined for other hosts, are accessible through this mechanism. |
pcap_fileno(3) -- Packet Capture library
|
pcap provides a high level interface to packet capture systems. All packets on the network, even those destined for other hosts, are accessible through this mechanism. |
pcap_freecode(3) -- Packet Capture library
|
pcap provides a high level interface to packet capture systems. All packets on the network, even those destined for other hosts, are accessible through this mechanism. |
pcap_geterr(3) -- Packet Capture library
|
pcap provides a high level interface to packet capture systems. All packets on the network, even those destined for other hosts, are accessible through this mechanism. |
pcap_inject(3) -- Packet Capture library
|
pcap provides a high level interface to packet capture systems. All packets on the network, even those destined for other hosts, are accessible through this mechanism. |
pcap_is_swapped(3) -- Packet Capture library
|
pcap provides a high level interface to packet capture systems. All packets on the network, even those destined for other hosts, are accessible through this mechanism. |
pcap_lookupdev(3) -- Packet Capture library
|
pcap provides a high level interface to packet capture systems. All packets on the network, even those destined for other hosts, are accessible through this mechanism. |
pcap_lookupnet(3) -- Packet Capture library
|
pcap provides a high level interface to packet capture systems. All packets on the network, even those destined for other hosts, are accessible through this mechanism. |
pcap_loop(3) -- Packet Capture library
|
pcap provides a high level interface to packet capture systems. All packets on the network, even those destined for other hosts, are accessible through this mechanism. |
pcap_major_version(3) -- Packet Capture library
|
pcap provides a high level interface to packet capture systems. All packets on the network, even those destined for other hosts, are accessible through this mechanism. |
pcap_minor_version(3) -- Packet Capture library
|
pcap provides a high level interface to packet capture systems. All packets on the network, even those destined for other hosts, are accessible through this mechanism. |
pcap_next(3) -- Packet Capture library
|
pcap provides a high level interface to packet capture systems. All packets on the network, even those destined for other hosts, are accessible through this mechanism. |
pcap_open_live(3) -- Packet Capture library
|
pcap provides a high level interface to packet capture systems. All packets on the network, even those destined for other hosts, are accessible through this mechanism. |
pcap_open_offline(3) -- Packet Capture library
|
pcap provides a high level interface to packet capture systems. All packets on the network, even those destined for other hosts, are accessible through this mechanism. |
pcap_perror(3) -- Packet Capture library
|
pcap provides a high level interface to packet capture systems. All packets on the network, even those destined for other hosts, are accessible through this mechanism. |
pcap_setfilter(3) -- Packet Capture library
|
pcap provides a high level interface to packet capture systems. All packets on the network, even those destined for other hosts, are accessible through this mechanism. |
pcap_snapshot(3) -- Packet Capture library
|
pcap provides a high level interface to packet capture systems. All packets on the network, even those destined for other hosts, are accessible through this mechanism. |
pcap_stats(3) -- Packet Capture library
|
pcap provides a high level interface to packet capture systems. All packets on the network, even those destined for other hosts, are accessible through this mechanism. |
pcap_strerror(3) -- Packet Capture library
|
pcap provides a high level interface to packet capture systems. All packets on the network, even those destined for other hosts, are accessible through this mechanism. |
pclose(3) -- process I/O
|
The popen() function ``opens'' a process by creating a pipe, forking, and invoking the shell. Since a pipe is by definition unidirectional, the type argument may specify only reading or writing, not... |
pechochar(3) -- create and display curses pads
|
The newpad routine creates and returns a pointer to a new pad data structure with the given number of lines, nlines, and columns, ncols. A pad is like a window, except that it is not restricted by the... |
perror(3) -- write error messages to standard error
|
The perror() function looks up the language-dependent error message string affiliated with an error number and writes it, followed by a newline, to the standard error stream. If the argument string is... |
pidfile(3) -- write a daemon pid file
|
pidfile() writes a file containing the process ID of the program to the /var/run directory. The file name has the form /var/run/basename.pid. If the basename argument is NULL, pidfile will determine t... |
pmap_getmaps(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
pmap_getport(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
pmap_rmtcall(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
pmap_set(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
pmap_unset(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
pnoutrefresh(3) -- create and display curses pads
|
The newpad routine creates and returns a pointer to a new pad data structure with the given number of lines, nlines, and columns, ncols. A pad is like a window, except that it is not restricted by the... |
popen(3) -- process I/O
|
The popen() function ``opens'' a process by creating a pipe, forking, and invoking the shell. Since a pipe is by definition unidirectional, the type argument may specify only reading or writing, not... |
posix1e(3) -- introduction to the POSIX.1e security API
|
The IEEE POSIX.1e specification never left draft form, but the interfaces it describes are now widely used despite inherent limitations. Currently, only a few of the interfaces and features are implem... |
posix2time(3) -- convert seconds since the Epoch
|
IEEE Standard 1003.1 (POSIX) legislates that a time_t value of 536457599 shall correspond to "Wed Dec 31 23:59:59 UTC 1986." This effectively implies that a POSIX time_t cannot include leap seconds ... |
post_form(3) -- write or erase forms from associated subwindows
|
The function post_form displays a form to its associated subwindow. To trigger physical display of the subwindow, use refresh or some equivalent curses routine (the implicit doupdate triggered by an c... |
post_menu(3) -- write or erase menus from associated subwindows
|
The function post_menu displays a menu to its associated subwindow. To trigger physical display of the subwindow, use refresh or some equivalent curses routine (the implicit doupdate triggered by an c... |
pos_form_cursor(3) -- position a form window cursor
|
The function pos_form_cursor restores the cursor to the position required for the forms driver to continue processing requests. This is useful after curses routines have been called to do screen-paint... |
pos_menu_cursor(3) -- position a menu's cursor
|
The function pos_menu_cursor restores the cursor to the current position associated with the menu's selected item. This is useful after curses routines have been called to do screen-painting in respo... |
pow(3) -- exponential, logarithm, power functions
|
The exp() function computes the exponential value of the given argument x. The expf() function is a single precision version of exp(). The expm1() function computes the value exp(x)-1 accurately even ... |
powf(3) -- exponential, logarithm, power functions
|
The exp() function computes the exponential value of the given argument x. The expf() function is a single precision version of exp(). The expm1() function computes the value exp(x)-1 accurately even ... |
prefresh(3) -- create and display curses pads
|
The newpad routine creates and returns a pointer to a new pad data structure with the given number of lines, nlines, and columns, ncols. A pad is like a window, except that it is not restricted by the... |
printf(3) -- formatted output conversion
|
The printf() family of functions produce output according to the given format as described below. This format may contain ``conversion specifiers''; the results of such conversions, if any, depend o... |
printw(3) -- print formatted output in curses windows
|
The printw, wprintw, mvprintw and mvwprintw routines are analogous to printf [see printf(3)]. In effect, the string that would be output by printf is output instead as though waddstr were used on the ... |
psignal(3) -- system signal messages
|
The psignal() function locates the descriptive message string for the given signal number sig and writes it to the standard error. If the argument s is not NULL it is written to the standard error fil... |
pthreads(3) -- POSIX 1003.1c thread interface
|
A thread is a flow of control within a process. Each thread represents a minimal amount of state; normally just the CPU state and a signal mask. All other process state (such as memory, file descripto... |
pthread_attr_destroy(3) -- initialise and destroy threads attribute object
|
The function pthread_attr_init() initialises a thread attributes object attr with the default value for all of the individual attributes used by a given implementation. The resulting attribute object ... |
pthread_attr_getdetachstate(3) -- set and get detachstate attribute
|
The detachstate attribute controls whether the thread is created in a detached state. If the thread is created detached, then use of the ID of the newly created thread by the pthread_detach(3) or pthr... |
pthread_attr_getstackaddr(3) -- set and get stackaddr attribute
|
The functions pthread_attr_setstackaddr() and pthread_attr_getstackaddr(), respectively, set and get the thread creation stackaddr attribute in the attr object. The stackaddr attribute specifies the l... |
pthread_attr_getstacksize(3) -- set and get stacksize attribute
|
The functions pthread_attr_setstacksize() and pthread_attr_getstacksize(), respectively, set and get the thread creation stacksize attribute in the attr object. The stacksize attribute defines the min... |
pthread_attr_init(3) -- initialise and destroy threads attribute object
|
The function pthread_attr_init() initialises a thread attributes object attr with the default value for all of the individual attributes used by a given implementation. The resulting attribute object ... |
pthread_attr_setdetachstate(3) -- set and get detachstate attribute
|
The detachstate attribute controls whether the thread is created in a detached state. If the thread is created detached, then use of the ID of the newly created thread by the pthread_detach(3) or pthr... |
pthread_attr_setstackaddr(3) -- set and get stackaddr attribute
|
The functions pthread_attr_setstackaddr() and pthread_attr_getstackaddr(), respectively, set and get the thread creation stackaddr attribute in the attr object. The stackaddr attribute specifies the l... |
pthread_attr_setstacksize(3) -- set and get stacksize attribute
|
The functions pthread_attr_setstacksize() and pthread_attr_getstacksize(), respectively, set and get the thread creation stacksize attribute in the attr object. The stacksize attribute defines the min... |
pthread_cancel(3) -- cancel execution of a thread
|
The pthread_cancel() function requests that thread be cancelled. The target thread's cancelability state and type determines when the cancellation takes effect. When the cancellation is acted on, the... |
pthread_cleanup_pop(3) -- call the first cleanup routine
|
The pthread_cleanup_pop() function pops the top cleanup routine off of the current thread's cleanup routine stack, and, if execute is non-zero, it will execute the function. If there is no cleanup ro... |
pthread_cleanup_push(3) -- add a cleanup function for thread exit
|
The pthread_cleanup_push() function adds cleanup_routine to the top of the stack of cleanup handlers that get called when the current thread exits. When cleanup_routine is called, it is passed arg as ... |
pthread_cond_broadcast(3) -- unblock all threads waiting for a condition variable
|
The pthread_cond_broadcast() function unblocks all threads waiting for the condition variable cond. |
pthread_cond_destroy(3) -- destroy a condition variable
|
The pthread_cond_destroy() function frees the resources allocated by the condition variable cond. |
pthread_cond_init(3) -- create a condition variable
|
The pthread_cond_init() function creates a new condition variable, with attributes specified with attr. If attr is NULL the default attributes are used. |
pthread_cond_signal(3) -- unblock a thread waiting for a condition variable
|
The pthread_cond_signal() function unblocks one thread waiting for the condition variable cond. |
pthread_cond_timedwait(3) -- wait on a condition variable for a specific amount of time
|
The pthread_cond_timedwait() function atomically blocks the current thread waiting on the condition variable specified by cond, and unblocks the mutex specified by mutex. The waiting thread unblocks o... |
pthread_cond_wait(3) -- wait on a condition variable
|
The pthread_cond_wait() function atomically blocks the current thread waiting on the condition variable specified by cond, and unblocks the mutex specified by mutex. The waiting thread unblocks only a... |
pthread_create(3) -- create a new thread
|
The pthread_create() function is used to create a new thread, with attributes specified by attr, within a process. If attr is NULL, the default attributes are used. If the attributes specified by attr... |
pthread_detach(3) -- detach a thread
|
The pthread_detach() function is used to indicate to the implementation that storage for the thread thread can be reclaimed when the thread terminates. If thread has not terminated, pthread_detach() w... |
pthread_equal(3) -- compare thread IDs
|
The pthread_equal() function compares the thread IDs t1 and t2. |
pthread_exit(3) -- terminate the calling thread
|
The pthread_exit() function terminates the calling thread and makes the value value_ptr available to any successful join with the terminating thread. Any cancellation cleanup handlers that have been p... |
pthread_getconcurrency(3) -- get or set level of concurrency
|
The pthread_getconcurrency() function allows an application to inform the threads implementation of its desired concurrency level, new_level. The actual level of concurrency provided by the implementa... |
pthread_getschedparam(3) -- thread scheduling parameter manipulation
|
The pthread_setschedparam() and pthread_getschedparam() functions set and get the scheduling parameters of individual threads. The scheduling policy for a thread can either be SCHED_FIFO (first in, fi... |
pthread_getspecific(3) -- get a thread-specific data value
|
The pthread_getspecific() function returns the value currently bound to the specified key on behalf of the calling thread. The effect of calling pthread_getspecific() with a key value not obtained fro... |
pthread_join(3) -- wait for thread termination
|
The pthread_join() function suspends execution of the calling thread until the target thread terminates unless the target thread has already terminated. On return from a successful pthread_join() call... |
pthread_key_create(3) -- thread-specific data key creation
|
The pthread_key_create() function creates a thread-specific data key visible to all threads in the process. Key values provided by pthread_key_create() are opaque objects used to locate thread-specifi... |
pthread_key_delete(3) -- delete a thread-specific data key
|
The pthread_key_delete() function deletes a thread-specific data key previously returned by pthread_key_create(). The thread-specific data values associated with key need not be NULL at the time that ... |
pthread_kill(3) -- send a signal to a specified thread
|
The pthread_kill() function sends a signal, specified by sig, to a thread, specified by thread. If sig is 0, error checking is performed, but no signal is actually sent. |
pthread_main_np(3) -- identify the main thread
|
The pthread_main_np() function identifies the main thread. |
pthread_multi_np(3) -- switch thread scheduling mode
|
The pthread_single_np() function causes the process to enter singlethreaded (non-POSIX) scheduling mode. The pthread_multi_np() function causes the process to return to multithreaded scheduling mode. |
pthread_mutexattr(3) -- mutex attribute operations
|
Mutex attributes are used to specify parameters to pthread_mutex_init(). One attribute object can be used in multiple calls to pthread_mutex_init(), with or without modifications between calls. The pt... |
pthread_mutexattr_destroy(3) -- mutex attribute operations
|
Mutex attributes are used to specify parameters to pthread_mutex_init(). One attribute object can be used in multiple calls to pthread_mutex_init(), with or without modifications between calls. The pt... |
pthread_mutexattr_getprioceiling(3) -- mutex attribute operations
|
Mutex attributes are used to specify parameters to pthread_mutex_init(). One attribute object can be used in multiple calls to pthread_mutex_init(), with or without modifications between calls. The pt... |
pthread_mutexattr_getprotocol(3) -- mutex attribute operations
|
Mutex attributes are used to specify parameters to pthread_mutex_init(). One attribute object can be used in multiple calls to pthread_mutex_init(), with or without modifications between calls. The pt... |
pthread_mutexattr_getpshared(3) -- mutex attribute operations
|
Mutex attributes are used to specify parameters to pthread_mutex_init(). One attribute object can be used in multiple calls to pthread_mutex_init(), with or without modifications between calls. The pt... |
pthread_mutexattr_gettype(3) -- mutex attribute operations
|
Mutex attributes are used to specify parameters to pthread_mutex_init(). One attribute object can be used in multiple calls to pthread_mutex_init(), with or without modifications between calls. The pt... |
pthread_mutexattr_init(3) -- mutex attribute operations
|
Mutex attributes are used to specify parameters to pthread_mutex_init(). One attribute object can be used in multiple calls to pthread_mutex_init(), with or without modifications between calls. The pt... |
pthread_mutexattr_setprioceiling(3) -- mutex attribute operations
|
Mutex attributes are used to specify parameters to pthread_mutex_init(). One attribute object can be used in multiple calls to pthread_mutex_init(), with or without modifications between calls. The pt... |
pthread_mutexattr_setprotocol(3) -- mutex attribute operations
|
Mutex attributes are used to specify parameters to pthread_mutex_init(). One attribute object can be used in multiple calls to pthread_mutex_init(), with or without modifications between calls. The pt... |
pthread_mutexattr_setpshared(3) -- mutex attribute operations
|
Mutex attributes are used to specify parameters to pthread_mutex_init(). One attribute object can be used in multiple calls to pthread_mutex_init(), with or without modifications between calls. The pt... |
pthread_mutexattr_settype(3) -- mutex attribute operations
|
Mutex attributes are used to specify parameters to pthread_mutex_init(). One attribute object can be used in multiple calls to pthread_mutex_init(), with or without modifications between calls. The pt... |
pthread_mutex_destroy(3) -- free resources allocated for a mutex
|
The pthread_mutex_destroy() function frees the resources allocated for mutex. |
pthread_mutex_init(3) -- create a mutex
|
The pthread_mutex_init() function creates a new mutex, with attributes specified with attr. If attr is NULL the default attributes are used. |
pthread_mutex_lock(3) -- lock a mutex
|
The pthread_mutex_lock() function locks mutex. If the mutex is already locked, the calling thread will block until the mutex becomes available. |
pthread_mutex_trylock(3) -- attempt to lock a mutex without blocking
|
The pthread_mutex_trylock() function locks mutex. If the mutex is already locked, pthread_mutex_trylock() will not block waiting for the mutex, but will return an error condition. |
pthread_mutex_unlock(3) -- unlock a mutex
|
If the current thread holds the lock on mutex, then the pthread_mutex_unlock() function unlocks mutex. |
pthread_once(3) -- dynamic package initialization
|
The first call to pthread_once() by any thread in a process, with a given once_control, will call the init_routine() with no arguments. Subsequent calls to pthread_once() with the same once_control wi... |
pthread_resume_all_np(3) -- suspend and resume thread(s)
|
The pthread_suspend_np() function interrupts the given thread and places it in a suspended state. The pthread_suspend_all_np() function interrupts all threads except the current thread and places them... |
pthread_resume_np(3) -- suspend and resume thread(s)
|
The pthread_suspend_np() function interrupts the given thread and places it in a suspended state. The pthread_suspend_all_np() function interrupts all threads except the current thread and places them... |
pthread_rwlockattr_destroy(3) -- destroy a read/write lock
|
The pthread_rwlockattr_destroy() function is used to destroy a read/write lock attribute object previously created with pthread_rwlockattr_init(). |
pthread_rwlockattr_getpshared(3) -- get the process shared attribute
|
The pthread_rwlockattr_getpshared() function is used to get the process shared setting of a read/write lock attribute object. The setting is returned via pshared, and may be one of two values: PTHREAD... |
pthread_rwlockattr_init(3) -- initialize a read/write lock
|
The pthread_rwlockattr_init() function is used to initialize a read/write lock attributes object. |
pthread_rwlockattr_setpshared(3) -- set the process shared attribute
|
The pthread_rwlockattr_setpshared() function sets the process shared attribute of attr to the value referenced by pshared. pshared may be one of two values: PTHREAD_PROCESS_SHARED Any thread of any pr... |
pthread_rwlock_destroy(3) -- destroy a read/write lock
|
The pthread_rwlock_destroy() function is used to destroy a read/write lock previously created with pthread_rwlock_init(). |
pthread_rwlock_init(3) -- initialize a read/write lock
|
The pthread_rwlock_init() function is used to initialize a read/write lock, with attributes specified by attr. If attr is NULL, the default read/write lock attributes are used. The results of calling ... |
pthread_rwlock_rdlock(3) -- acquire a read/write lock for reading
|
The pthread_rwlock_rdlock() function acquires a read lock on lock provided that lock is not presently held for writing and no writer threads are presently blocked on the lock. If the read lock cannot ... |
pthread_rwlock_tryrdlock(3) -- acquire a read/write lock for reading
|
The pthread_rwlock_rdlock() function acquires a read lock on lock provided that lock is not presently held for writing and no writer threads are presently blocked on the lock. If the read lock cannot ... |
pthread_rwlock_trywrlock(3) -- acquire a read/write lock for writing
|
The pthread_rwlock_wrlock() function blocks until a write lock can be acquired against lock. The pthread_rwlock_trywrlock() function performs the same action, but does not block if the lock cannot be ... |
pthread_rwlock_unlock(3) -- release a read/write lock
|
The pthread_rwlock_unlock() function is used to release the read/write lock previously obtained by pthread_rwlock_rdlock(), pthread_rwlock_wrlock(), pthread_rwlock_tryrdlock(), or pthread_rwlock_trywr... |
pthread_rwlock_wrlock(3) -- acquire a read/write lock for writing
|
The pthread_rwlock_wrlock() function blocks until a write lock can be acquired against lock. The pthread_rwlock_trywrlock() function performs the same action, but does not block if the lock cannot be ... |
pthread_schedparam(3) -- thread scheduling parameter manipulation
|
The pthread_setschedparam() and pthread_getschedparam() functions set and get the scheduling parameters of individual threads. The scheduling policy for a thread can either be SCHED_FIFO (first in, fi... |
pthread_self(3) -- get the calling thread's ID
|
The pthread_self() function returns the thread ID of the calling thread. |
pthread_setcancelstate(3) -- set cancelability state
|
The pthread_setcancelstate() function atomically both sets the calling thread's cancelability state to the indicated state and, if oldstate is not NULL, returns the previous cancelability state at th... |
pthread_setcanceltype(3) -- set cancelability state
|
The pthread_setcancelstate() function atomically both sets the calling thread's cancelability state to the indicated state and, if oldstate is not NULL, returns the previous cancelability state at th... |
pthread_setconcurrency(3) -- get or set level of concurrency
|
The pthread_getconcurrency() function allows an application to inform the threads implementation of its desired concurrency level, new_level. The actual level of concurrency provided by the implementa... |
pthread_setschedparam(3) -- thread scheduling parameter manipulation
|
The pthread_setschedparam() and pthread_getschedparam() functions set and get the scheduling parameters of individual threads. The scheduling policy for a thread can either be SCHED_FIFO (first in, fi... |
pthread_setspecific(3) -- set a thread-specific data value
|
The pthread_setspecific() function associates a thread-specific value with a key obtained via a previous call to pthread_key_create(). Different threads may bind different values to the same key. Thes... |
pthread_set_name_np(3) -- set the name of a thread
|
The pthread_set_name_np() function associates name with thread. This can be useful for debugging, as the name is displayed in the thread status as displayed when the process receives the SIGINFO signa... |
pthread_sigmask(3) -- examine and/or change a thread's signal mask
|
The pthread_sigmask() function examines and/or changes the calling thread's signal mask. If set is not NULL, it specifies a set of signals to be modified, and how specifies what to set the signal mas... |
pthread_single_np(3) -- switch thread scheduling mode
|
The pthread_single_np() function causes the process to enter singlethreaded (non-POSIX) scheduling mode. The pthread_multi_np() function causes the process to return to multithreaded scheduling mode. |
pthread_stackseg_np(3) -- return stack size and location
|
The pthread_stackseg_np() function returns information about the given thread's stack. A stack_t is the same as a struct sigaltstack (see sigaltstack(2)) except the ss_sp variable points to the top o... |
pthread_suspend_all_np(3) -- suspend and resume thread(s)
|
The pthread_suspend_np() function interrupts the given thread and places it in a suspended state. The pthread_suspend_all_np() function interrupts all threads except the current thread and places them... |
pthread_suspend_np(3) -- suspend and resume thread(s)
|
The pthread_suspend_np() function interrupts the given thread and places it in a suspended state. The pthread_suspend_all_np() function interrupts all threads except the current thread and places them... |
pthread_testcancel(3) -- set cancelability state
|
The pthread_setcancelstate() function atomically both sets the calling thread's cancelability state to the indicated state and, if oldstate is not NULL, returns the previous cancelability state at th... |
pthread_yield(3) -- yield control of the current thread
|
The pthread_yield() function resets the accumulated time slice of the current thread and then enters the thread scheduler, which resumes execution of the next thread ready to run. If no other thread i... |
put8(3) -- S/Key library functions
|
These functions implement the S/Key one time password authentication mechanism. The atob8() function converts the 16-byte hex string in to an 8-byte binary array stored in out. The atob8() function re... |
putc(3) -- output a character or word to a stream
|
The fputc() function writes the character c (converted to an unsigned char) to the output stream pointed to by stream. putc() acts essentially identically to fputc(), but is a macro that expands in-li... |
putchar(3) -- output a character or word to a stream
|
The fputc() function writes the character c (converted to an unsigned char) to the output stream pointed to by stream. putc() acts essentially identically to fputc(), but is a macro that expands in-li... |
putchar_unlocked(3) -- put next character from stream, efficiently
|
The putc_unlocked() and putchar_unlocked() functions are equivalent to their locked counterparts, putc(3) and putchar(3). However, putc_unlocked() and putchar_unlocked() assume that the relevant strea... |
putc_unlocked(3) -- put next character from stream, efficiently
|
The putc_unlocked() and putchar_unlocked() functions are equivalent to their locked counterparts, putc(3) and putchar(3). However, putc_unlocked() and putchar_unlocked() assume that the relevant strea... |
putenv(3) -- environment variable functions
|
These functions set, unset, and fetch environment variables from the host environment list. For compatibility with differing environment conventions, the given arguments name and value may be appended... |
putp(3) -- curses interfaces to terminfo database
|
These low-level routines must be called by programs that have to deal directly with the terminfo database to handle certain terminal capabilities, such as programming function keys. For all other func... |
puts(3) -- output a line to a stream
|
The function fputs() writes the string pointed to by str to the stream pointed to by stream. The function puts() writes the string str, and a terminating newline character, to the stream stdout. |
putw(3) -- output a character or word to a stream
|
The fputc() function writes the character c (converted to an unsigned char) to the output stream pointed to by stream. putc() acts essentially identically to fputc(), but is a macro that expands in-li... |
putwin(3) -- miscellaneous curses utility routines
|
The unctrl macro expands to a character string which is a printable representation of the character c. Control characters are displayed in the ^X notation. Printing characters are displayed as is. The... |
pwcache(3) -- cache password and group entries
|
The user_from_uid() function returns the user name associated with the argument uid. The user name is cached so that multiple calls with the same uid do not require additional calls to getpwuid(3). If... |
pw_abort(3) -- passwd file update functions
|
The pw_lock(), pw_mkdb(), and pw_abort() functions allow a program to update the system passwd database. The pw_lock() function attempts to lock the passwd database by creating the file /etc/ptmp with... |
pw_copy(3) -- utility functions for interactive passwd file updates
|
These functions are designed as conveniences for interactive programs which update the passwd file and do nothing else. They generally handle errors by printing out a message to the standard error str... |
pw_dup(3) -- make a copy of a struct passwd
|
The pw_dup() function allocates sufficient memory for a copy of the struct passwd pw, does the copy, and returns a pointer to it. This is useful as subsequent calls to getpwent(), getpwnam(), and getp... |
pw_edit(3) -- utility functions for interactive passwd file updates
|
These functions are designed as conveniences for interactive programs which update the passwd file and do nothing else. They generally handle errors by printing out a message to the standard error str... |
pw_error(3) -- utility functions for interactive passwd file updates
|
These functions are designed as conveniences for interactive programs which update the passwd file and do nothing else. They generally handle errors by printing out a message to the standard error str... |
pw_file(3) -- utility functions for interactive passwd file updates
|
These functions are designed as conveniences for interactive programs which update the passwd file and do nothing else. They generally handle errors by printing out a message to the standard error str... |
pw_init(3) -- utility functions for interactive passwd file updates
|
These functions are designed as conveniences for interactive programs which update the passwd file and do nothing else. They generally handle errors by printing out a message to the standard error str... |
pw_lock(3) -- passwd file update functions
|
The pw_lock(), pw_mkdb(), and pw_abort() functions allow a program to update the system passwd database. The pw_lock() function attempts to lock the passwd database by creating the file /etc/ptmp with... |
pw_mkdb(3) -- passwd file update functions
|
The pw_lock(), pw_mkdb(), and pw_abort() functions allow a program to update the system passwd database. The pw_lock() function attempts to lock the passwd database by creating the file /etc/ptmp with... |
pw_prompt(3) -- utility functions for interactive passwd file updates
|
These functions are designed as conveniences for interactive programs which update the passwd file and do nothing else. They generally handle errors by printing out a message to the standard error str... |
pw_scan(3) -- utility functions for interactive passwd file updates
|
These functions are designed as conveniences for interactive programs which update the passwd file and do nothing else. They generally handle errors by printing out a message to the standard error str... |
pw_setdir(3) -- utility functions for interactive passwd file updates
|
These functions are designed as conveniences for interactive programs which update the passwd file and do nothing else. They generally handle errors by printing out a message to the standard error str... |
qabs(3) -- return the absolute value of a quad integer
|
The qabs() function returns the absolute value of the quad integer j. |
qdiv(3) -- return quotient and remainder from division
|
The qdiv() function computes the value num/denom and returns the quotient and remainder in a structure named qdiv_t that contains two quad integer members named quot and rem. |
qiflush(3) -- curses input options
|
Normally, the tty driver buffers typed characters until a newline or carriage return is typed. The cbreak routine disables line buffering and erase/kill character-processing (interrupt and flow contro... |
qsort(3) -- sort functions
|
The qsort() function is a modified partition-exchange sort, or quicksort. The heapsort() function is a modified selection sort. The mergesort() function is a modified merge sort with exponential searc... |
queue(3) -- lists, doubly-linked lists, simple queues, tail queues, and circular queues
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
radixsort(3) -- radix sort
|
The radixsort() and sradixsort() functions are implementations of radix sort. These functions sort an array of nmemb pointers to byte strings. The initial member is referenced by base. The byte string... |
raise(3) -- send a signal to the current process
|
The raise() function sends the signal sig to the current process. |
rand(3) -- bad random number generator
|
These interfaces are obsoleted by random(3). The rand() function computes a sequence of pseudo-random integers in the range of 0 to RAND_MAX (as defined by the header file ). The srand() fun... |
rand48(3) -- pseudo-random number generators and initialization routines
|
The rand48() family of functions generates pseudo-random numbers using a linear congruential algorithm working on integers 48 bits in size. The particular formula employed is r(n+1) = (a * r(n) + c) m... |
random(3) -- better random number generator; routines for changing generators
|
The random() function uses a non-linear additive feedback random number generator employing a default table of size 31 long integers to return successive pseudo-random numbers in the range from 0 to (... |
RAND_add(3) -- add entropy to the PRNG
|
RAND_add() mixes the num bytes at buf into the PRNG state. Thus, if the data at buf are unpredictable to an adversary, this increases the uncertainty about the state and makes the PRNG output less pre... |
RAND_bytes(3) -- generate random data
|
RAND_bytes() puts num cryptographically strong pseudo-random bytes into buf. An error occurs if the PRNG has not been seeded with enough randomness to ensure an unpredictable byte sequence. RAND_pseud... |
RAND_cleanup(3) -- erase the PRNG state
|
RAND_cleanup() erases the memory used by the PRNG. |
RAND_egd(3) -- query entropy gathering daemon
|
RAND_egd() queries the entropy gathering daemon EGD on socket path. It queries 255 bytes and uses RAND_add(3) to seed the OpenSSL built-in PRNG. RAND_egd(path) is a wrapper for RAND_egd_bytes(path, 25... |
RAND_egd_bytes(3) -- query entropy gathering daemon
|
RAND_egd() queries the entropy gathering daemon EGD on socket path. It queries 255 bytes and uses RAND_add(3) to seed the OpenSSL built-in PRNG. RAND_egd(path) is a wrapper for RAND_egd_bytes(path, 25... |
RAND_event(3) -- add entropy to the PRNG
|
RAND_add() mixes the num bytes at buf into the PRNG state. Thus, if the data at buf are unpredictable to an adversary, this increases the uncertainty about the state and makes the PRNG output less pre... |
RAND_file_name(3) -- PRNG seed file
|
RAND_file_name() generates a default path for the random seed file. buf points to a buffer of size num in which to store the filename. The seed file is $RANDFILE if that environment variable is set, $... |
RAND_get_rand_method(3) -- select RAND method
|
A RAND_METHOD specifies the functions that OpenSSL uses for random number generation. By modifying the method, alternative implementations such as hardware RNGs may be used. IMPORTANT: See the NOTES s... |
RAND_load_file(3) -- PRNG seed file
|
RAND_file_name() generates a default path for the random seed file. buf points to a buffer of size num in which to store the filename. The seed file is $RANDFILE if that environment variable is set, $... |
RAND_pseudo_bytes(3) -- generate random data
|
RAND_bytes() puts num cryptographically strong pseudo-random bytes into buf. An error occurs if the PRNG has not been seeded with enough randomness to ensure an unpredictable byte sequence. RAND_pseud... |
rand_r(3) -- bad random number generator
|
These interfaces are obsoleted by random(3). The rand() function computes a sequence of pseudo-random integers in the range of 0 to RAND_MAX (as defined by the header file ). The srand() fun... |
RAND_screen(3) -- add entropy to the PRNG
|
RAND_add() mixes the num bytes at buf into the PRNG state. Thus, if the data at buf are unpredictable to an adversary, this increases the uncertainty about the state and makes the PRNG output less pre... |
RAND_seed(3) -- add entropy to the PRNG
|
RAND_add() mixes the num bytes at buf into the PRNG state. Thus, if the data at buf are unpredictable to an adversary, this increases the uncertainty about the state and makes the PRNG output less pre... |
RAND_set_rand_method(3) -- select RAND method
|
A RAND_METHOD specifies the functions that OpenSSL uses for random number generation. By modifying the method, alternative implementations such as hardware RNGs may be used. IMPORTANT: See the NOTES s... |
RAND_SSLeay(3) -- select RAND method
|
A RAND_METHOD specifies the functions that OpenSSL uses for random number generation. By modifying the method, alternative implementations such as hardware RNGs may be used. IMPORTANT: See the NOTES s... |
RAND_status(3) -- add entropy to the PRNG
|
RAND_add() mixes the num bytes at buf into the PRNG state. Thus, if the data at buf are unpredictable to an adversary, this increases the uncertainty about the state and makes the PRNG output less pre... |
RAND_write_file(3) -- PRNG seed file
|
RAND_file_name() generates a default path for the random seed file. buf points to a buffer of size num in which to store the filename. The seed file is $RANDFILE if that environment variable is set, $... |
raw(3) -- curses input options
|
Normally, the tty driver buffers typed characters until a newline or carriage return is typed. The cbreak routine disables line buffering and erase/kill character-processing (interrupt and flow contro... |
RB_EMPTY(3) -- implementations of splay and redblack trees
|
These macros define data structures for different types of trees: splay trees and red-black trees. In the macro definitions, TYPE is the name tag of a user defined structure that must contain a field ... |
RB_ENTRY(3) -- implementations of splay and redblack trees
|
These macros define data structures for different types of trees: splay trees and red-black trees. In the macro definitions, TYPE is the name tag of a user defined structure that must contain a field ... |
RB_FIND(3) -- implementations of splay and redblack trees
|
These macros define data structures for different types of trees: splay trees and red-black trees. In the macro definitions, TYPE is the name tag of a user defined structure that must contain a field ... |
RB_FOREACH(3) -- implementations of splay and redblack trees
|
These macros define data structures for different types of trees: splay trees and red-black trees. In the macro definitions, TYPE is the name tag of a user defined structure that must contain a field ... |
RB_GENERATE(3) -- implementations of splay and redblack trees
|
These macros define data structures for different types of trees: splay trees and red-black trees. In the macro definitions, TYPE is the name tag of a user defined structure that must contain a field ... |
RB_HEAD(3) -- implementations of splay and redblack trees
|
These macros define data structures for different types of trees: splay trees and red-black trees. In the macro definitions, TYPE is the name tag of a user defined structure that must contain a field ... |
RB_INIT(3) -- implementations of splay and redblack trees
|
These macros define data structures for different types of trees: splay trees and red-black trees. In the macro definitions, TYPE is the name tag of a user defined structure that must contain a field ... |
RB_INITIALIZER(3) -- implementations of splay and redblack trees
|
These macros define data structures for different types of trees: splay trees and red-black trees. In the macro definitions, TYPE is the name tag of a user defined structure that must contain a field ... |
RB_INSERT(3) -- implementations of splay and redblack trees
|
These macros define data structures for different types of trees: splay trees and red-black trees. In the macro definitions, TYPE is the name tag of a user defined structure that must contain a field ... |
RB_LEFT(3) -- implementations of splay and redblack trees
|
These macros define data structures for different types of trees: splay trees and red-black trees. In the macro definitions, TYPE is the name tag of a user defined structure that must contain a field ... |
RB_MAX(3) -- implementations of splay and redblack trees
|
These macros define data structures for different types of trees: splay trees and red-black trees. In the macro definitions, TYPE is the name tag of a user defined structure that must contain a field ... |
RB_MIN(3) -- implementations of splay and redblack trees
|
These macros define data structures for different types of trees: splay trees and red-black trees. In the macro definitions, TYPE is the name tag of a user defined structure that must contain a field ... |
RB_NEXT(3) -- implementations of splay and redblack trees
|
These macros define data structures for different types of trees: splay trees and red-black trees. In the macro definitions, TYPE is the name tag of a user defined structure that must contain a field ... |
RB_PARENT(3) -- implementations of splay and redblack trees
|
These macros define data structures for different types of trees: splay trees and red-black trees. In the macro definitions, TYPE is the name tag of a user defined structure that must contain a field ... |
RB_PROTOTYPE(3) -- implementations of splay and redblack trees
|
These macros define data structures for different types of trees: splay trees and red-black trees. In the macro definitions, TYPE is the name tag of a user defined structure that must contain a field ... |
RB_REMOVE(3) -- implementations of splay and redblack trees
|
These macros define data structures for different types of trees: splay trees and red-black trees. In the macro definitions, TYPE is the name tag of a user defined structure that must contain a field ... |
RB_RIGHT(3) -- implementations of splay and redblack trees
|
These macros define data structures for different types of trees: splay trees and red-black trees. In the macro definitions, TYPE is the name tag of a user defined structure that must contain a field ... |
RB_ROOT(3) -- implementations of splay and redblack trees
|
These macros define data structures for different types of trees: splay trees and red-black trees. In the macro definitions, TYPE is the name tag of a user defined structure that must contain a field ... |
RC4(3) -- RC4 encryption
|
This library implements the Alleged RC4 cipher, which is described for example in Applied Cryptography. It is believed to be compatible with RC4[TM], a proprietary cipher of RSA Security Inc. RC4 is a... |
RC4_set_key(3) -- RC4 encryption
|
This library implements the Alleged RC4 cipher, which is described for example in Applied Cryptography. It is believed to be compatible with RC4[TM], a proprietary cipher of RSA Security Inc. RC4 is a... |
rcmd(3) -- routines for returning a stream to a remote command
|
The rcmd() function is used by the superuser to execute a command on a remote machine using an authentication scheme based on reserved port numbers. If the calling process is not setuid, the RSH envir... |
rcmdsh(3) -- return a stream to a remote command without superuser
|
The rcmdsh() function is used by normal users to execute a command on a remote machine using an authentication scheme based on reserved port numbers using rsh(1) or the value of rshprog (if non-null).... |
rcmd_af(3) -- routines for returning a stream to a remote command
|
The rcmd() function is used by the superuser to execute a command on a remote machine using an authentication scheme based on reserved port numbers. If the calling process is not setuid, the RSH envir... |
readdir(3) -- directory operations
|
The opendir() function opens the directory named by filename, associates a directory stream with it, and returns a pointer to be used to identify the directory stream in subsequent operations. A null ... |
readdir_r(3) -- directory operations
|
The opendir() function opens the directory named by filename, associates a directory stream with it, and returns a pointer to be used to identify the directory stream in subsequent operations. A null ... |
readlabelfs(3) -- read disklabel filesystem type
|
The readlabelfs() function attempts to determine the filesystem type of the disk partition specified by device and returns it in a short form that can be easily used to construct arguments within moun... |
readline(3) -- get a line from a user with editing
|
readline will read a line from the terminal and return it, using prompt as a prompt. If prompt is NULL or the empty string, no prompt is issued. The line returned is allocated with malloc(3); the call... |
readpass(3) -- S/Key library functions
|
These functions implement the S/Key one time password authentication mechanism. The atob8() function converts the 16-byte hex string in to an 8-byte binary array stored in out. The atob8() function re... |
readpassphrase(3) -- get a passphrase from the user
|
The readpassphrase() function displays a prompt to, and reads in a passphrase from, /dev/tty. If this file is inaccessible and the RPP_REQUIRE_TTY flag is not set, readpassphrase() displays the prompt... |
readskey(3) -- S/Key library functions
|
These functions implement the S/Key one time password authentication mechanism. The atob8() function converts the 16-byte hex string in to an 8-byte binary array stored in out. The atob8() function re... |
realloc(3) -- memory allocation and deallocation
|
The malloc() function allocates uninitialized space for an object whose size is specified by size. The malloc() function maintains multiple lists of free blocks according to size, allocating space fro... |
realpath(3) -- returns the canonicalized absolute pathname
|
The realpath() function resolves all symbolic links, extra ``/'' characters and references to /./ and /../ in pathname, and copies the resulting absolute pathname into the memory referenced by resol... |
recno(3) -- record number database access method
|
The dbopen() routine is the library interface to database files. One of the supported file formats is record number files. The general description of the database access methods is in dbopen(3), this ... |
redrawwin(3) -- refresh curses windows and lines
|
The refresh and wrefresh routines (or wnoutrefresh and doupdate) must be called to get actual output to the terminal, as other routines merely manipulate data structures. The routine wrefresh copies t... |
refresh(3) -- refresh curses windows and lines
|
The refresh and wrefresh routines (or wnoutrefresh and doupdate) must be called to get actual output to the terminal, as other routines merely manipulate data structures. The routine wrefresh copies t... |
regcomp(3) -- regular expression routines
|
These routines implement IEEE Std 1003.2 (``POSIX.2'') regular expressions (``REs''); see re_format(7). regcomp() compiles an RE written as a string into an internal form, regexec() matches that i... |
regerror(3) -- regular expression routines
|
These routines implement IEEE Std 1003.2 (``POSIX.2'') regular expressions (``REs''); see re_format(7). regcomp() compiles an RE written as a string into an internal form, regexec() matches that i... |
regex(3) -- regular expression routines
|
These routines implement IEEE Std 1003.2 (``POSIX.2'') regular expressions (``REs''); see re_format(7). regcomp() compiles an RE written as a string into an internal form, regexec() matches that i... |
regexec(3) -- regular expression routines
|
These routines implement IEEE Std 1003.2 (``POSIX.2'') regular expressions (``REs''); see re_format(7). regcomp() compiles an RE written as a string into an internal form, regexec() matches that i... |
regexp(3) -- obsolete regular expression routines
|
This interface is made obsolete by regex(3). It is available from the compatibility library, libcompat. The regcomp(), regexec(), regsub(), and regerror() functions implement egrep(1)-style regular ex... |
regfree(3) -- regular expression routines
|
These routines implement IEEE Std 1003.2 (``POSIX.2'') regular expressions (``REs''); see re_format(7). regcomp() compiles an RE written as a string into an internal form, regexec() matches that i... |
registerrpc(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
regsub(3) -- regular expression routines
|
These routines implement IEEE Std 1003.2 (``POSIX.2'') regular expressions (``REs''); see re_format(7). regcomp() compiles an RE written as a string into an internal form, regexec() matches that i... |
remainder(3) -- functions for IEEE arithmetic
|
These functions are required or recommended by IEEE Std 754-1985. copysign() returns x with its sign changed to y's. The copysignf() function is a single precision version of copysign(). finite() ret... |
remainderf(3) -- functions for IEEE arithmetic
|
These functions are required or recommended by IEEE Std 754-1985. copysign() returns x with its sign changed to y's. The copysignf() function is a single precision version of copysign(). finite() ret... |
remove(3) -- remove a file or directory
|
The remove() function removes the file or directory specified by path. If path specifies a directory, remove(path) is the equivalent of rmdir(path). Otherwise, it is the equivalent of unlink(path). |
remque(3) -- insert/remove element from a queue
|
These interfaces have been superceded by the queue(3) macros and are pro- vided for compatibility with legacy code. insque() and remque() manipulate queues built from doubly linked lists. The queue ca... |
replace_panel(3) -- panel stack extension for curses
|
Panels are curses(3) windows with the added feature of depth. Panel functions allow the use of stacked windows and ensure the proper portions of each window and the curses stdscr window are hidden or ... |
request_init(3) -- tcp wrapper access control library
|
The routines described in this document are part of the libwrap.a library. They implement a rule-based access control language with optional shell commands that are executed when a rule fires. request... |
request_set(3) -- tcp wrapper access control library
|
The routines described in this document are part of the libwrap.a library. They implement a rule-based access control language with optional shell commands that are executed when a rule fires. request... |
resetty(3) -- low-level curses routines
|
The following routines give low-level access to various curses capabilities. Theses routines typically are used inside library routines. The def_prog_mode and def_shell_mode routines save the current ... |
reset_prog_mode(3) -- low-level curses routines
|
The following routines give low-level access to various curses capabilities. Theses routines typically are used inside library routines. The def_prog_mode and def_shell_mode routines save the current ... |
reset_shell_mode(3) -- low-level curses routines
|
The following routines give low-level access to various curses capabilities. Theses routines typically are used inside library routines. The def_prog_mode and def_shell_mode routines save the current ... |
resizeterm(3) -- change the curses terminal size
|
This is an extension to the curses library. It provides callers with a hook into the curses data to resize windows, primarily for use by programs running in an X Window terminal (e.g., xterm). The fun... |
resolver(3) -- resolver routines
|
These routines are used for making, sending, and interpreting query and reply messages with Internet domain name servers. Global configuration and state information that is used by the resolver routin... |
restartterm(3) -- curses interfaces to terminfo database
|
These low-level routines must be called by programs that have to deal directly with the terminfo database to handle certain terminal capabilities, such as programming function keys. For all other func... |
res_init(3) -- resolver routines
|
These routines are used for making, sending, and interpreting query and reply messages with Internet domain name servers. Global configuration and state information that is used by the resolver routin... |
res_mkquery(3) -- resolver routines
|
These routines are used for making, sending, and interpreting query and reply messages with Internet domain name servers. Global configuration and state information that is used by the resolver routin... |
res_query(3) -- resolver routines
|
These routines are used for making, sending, and interpreting query and reply messages with Internet domain name servers. Global configuration and state information that is used by the resolver routin... |
res_search(3) -- resolver routines
|
These routines are used for making, sending, and interpreting query and reply messages with Internet domain name servers. Global configuration and state information that is used by the resolver routin... |
res_send(3) -- resolver routines
|
These routines are used for making, sending, and interpreting query and reply messages with Internet domain name servers. Global configuration and state information that is used by the resolver routin... |
rewind(3) -- reposition a stream
|
The fseek() function sets the file position indicator for the stream pointed to by stream. The new position, measured in bytes, is obtained by adding offset bytes to the position specified by whence. ... |
rewinddir(3) -- directory operations
|
The opendir() function opens the directory named by filename, associates a directory stream with it, and returns a pointer to be used to identify the directory stream in subsequent operations. A null ... |
rexec(3) -- return stream to a remote command
|
This interface is obsoleted by rcmd(3). It is available from the compat- ibility library, libcompat. The rexec() function looks up the host *ahost using gethostbyname(3), returning -1 if the host does... |
re_comp(3) -- regular expression handler
|
This interface is made obsolete by regex(3). It is available from the compatibility library, libcompat. The re_comp() function compiles a string into an internal form suitable for pattern matching. Th... |
re_exec(3) -- regular expression handler
|
This interface is made obsolete by regex(3). It is available from the compatibility library, libcompat. The re_comp() function compiles a string into an internal form suitable for pattern matching. Th... |
rfc1413(3) -- libwrap client side ident implementation
|
rfc1413() retrieves a user name from a remote system using the ident protocol described in RFC 1413. It is implemented in the libwrap.a library. rfc1413() takes two sockaddr pointers as parameters: rm... |
rindex(3) -- locate last occurrence of a character in a string
|
The strrchr() function locates the last occurrence of the character c in the string s. The terminating NUL character is considered part of the string. If c is ` ', strrchr() locates the terminating `... |
rint(3) -- round to integral value in floating-point format
|
The rint() function returns the integral value (represented as a double precision number) nearest to x according to the prevailing rounding mode. The rintf() function is a single precision version of ... |
rintf(3) -- round to integral value in floating-point format
|
The rint() function returns the integral value (represented as a double precision number) nearest to x according to the prevailing rounding mode. The rintf() function is a single precision version of ... |
rip(3) -- S/Key library functions
|
These functions implement the S/Key one time password authentication mechanism. The atob8() function converts the 16-byte hex string in to an 8-byte binary array stored in out. The atob8() function re... |
RIPEMD160(3) -- RIPEMD-160 hash function
|
RIPEMD-160 is a cryptographic hash function with a 160 bit output. RIPEMD160() computes the RIPEMD-160 message digest of the n bytes at d and places it in md (which must have space for RIPEMD160_DIGES... |
RIPEMD160_Final(3) -- RIPEMD-160 hash function
|
RIPEMD-160 is a cryptographic hash function with a 160 bit output. RIPEMD160() computes the RIPEMD-160 message digest of the n bytes at d and places it in md (which must have space for RIPEMD160_DIGES... |
RIPEMD160_Init(3) -- RIPEMD-160 hash function
|
RIPEMD-160 is a cryptographic hash function with a 160 bit output. RIPEMD160() computes the RIPEMD-160 message digest of the n bytes at d and places it in md (which must have space for RIPEMD160_DIGES... |
RIPEMD160_Update(3) -- RIPEMD-160 hash function
|
RIPEMD-160 is a cryptographic hash function with a 160 bit output. RIPEMD160() computes the RIPEMD-160 message digest of the n bytes at d and places it in md (which must have space for RIPEMD160_DIGES... |
ripoffline(3) -- low-level curses routines
|
The following routines give low-level access to various curses capabilities. Theses routines typically are used inside library routines. The def_prog_mode and def_shell_mode routines save the current ... |
rmd160(3) -- ``RIPEMD-160'' message digest
|
The RMD160 functions implement the 160-bit RIPE message digest hash algorithm (RMD-160). RMD-160 is used to generate a condensed representation of a message called a message digest. The algorithm take... |
RMD160Data(3) -- calculate the
|
The RMD160 functions implement the 160-bit RIPE message digest hash algorithm (RMD-160). RMD-160 is used to generate a condensed representation of a message called a message digest. The algorithm take... |
RMD160End(3) -- calculate the
|
The RMD160 functions implement the 160-bit RIPE message digest hash algorithm (RMD-160). RMD-160 is used to generate a condensed representation of a message called a message digest. The algorithm take... |
RMD160File(3) -- calculate the
|
The RMD160 functions implement the 160-bit RIPE message digest hash algorithm (RMD-160). RMD-160 is used to generate a condensed representation of a message called a message digest. The algorithm take... |
RMD160FileChunk(3) -- calculate the
|
The RMD160 functions implement the 160-bit RIPE message digest hash algorithm (RMD-160). RMD-160 is used to generate a condensed representation of a message called a message digest. The algorithm take... |
RMD160Final(3) -- calculate the
|
The RMD160 functions implement the 160-bit RIPE message digest hash algorithm (RMD-160). RMD-160 is used to generate a condensed representation of a message called a message digest. The algorithm take... |
RMD160Init(3) -- calculate the
|
The RMD160 functions implement the 160-bit RIPE message digest hash algorithm (RMD-160). RMD-160 is used to generate a condensed representation of a message called a message digest. The algorithm take... |
RMD160Pad(3) -- calculate the
|
The RMD160 functions implement the 160-bit RIPE message digest hash algorithm (RMD-160). RMD-160 is used to generate a condensed representation of a message called a message digest. The algorithm take... |
RMD160Transform(3) -- calculate the
|
The RMD160 functions implement the 160-bit RIPE message digest hash algorithm (RMD-160). RMD-160 is used to generate a condensed representation of a message called a message digest. The algorithm take... |
RMD160Update(3) -- calculate the
|
The RMD160 functions implement the 160-bit RIPE message digest hash algorithm (RMD-160). RMD-160 is used to generate a condensed representation of a message called a message digest. The algorithm take... |
rpc(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
rpcauth(3) -- library routines for remote procedure calls
|
These routines establish authentication information for use by the RPC functions described in rpc(3). auth_destroy() is a macro that destroys the authentication information associated with auth. Destr... |
rpc_createerr(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
rresvport(3) -- routines for returning a stream to a remote command
|
The rcmd() function is used by the superuser to execute a command on a remote machine using an authentication scheme based on reserved port numbers. If the calling process is not setuid, the RSH envir... |
rresvport_af(3) -- routines for returning a stream to a remote command
|
The rcmd() function is used by the superuser to execute a command on a remote machine using an authentication scheme based on reserved port numbers. If the calling process is not setuid, the RSH envir... |
rsa(3) -- RSA public key cryptosystem
|
These functions implement RSA public key encryption and signatures as defined in PKCS #1 v2.0 [RFC 2437]. The RSA structure consists of several BIGNUM components. It can contain public as well as priv... |
RSA_blinding_off(3) -- protect the RSA operation from timing attacks
|
RSA is vulnerable to timing attacks. In a setup where attackers can measure the time of RSA decryption or signature operations, blinding must be used to protect the RSA operation from that attack. RSA... |
RSA_blinding_on(3) -- protect the RSA operation from timing attacks
|
RSA is vulnerable to timing attacks. In a setup where attackers can measure the time of RSA decryption or signature operations, blinding must be used to protect the RSA operation from that attack. RSA... |
RSA_check_key(3) -- validate private RSA keys
|
This function validates RSA keys. It checks that p and q are in fact prime, and that n = p*q. It also checks that d*e = 1 mod (p-1*q-1), and that dmp1, dmq1 and iqmp are set correctly or are NULL. As ... |
RSA_flags(3) -- select RSA method
|
An RSA_METHOD specifies the functions that OpenSSL uses for RSA operations. By modifying the method, alternative implementations such as hardware accelerators may be used. IMPORTANT: See the NOTES sec... |
RSA_free(3) -- allocate and free RSA objects
|
RSA_new() allocates and initializes an RSA structure. It is equivalent to calling RSA_new_method(NULL). RSA_free() frees the RSA structure and its components. The key is erased before the memory is re... |
RSA_generate_key(3) -- generate RSA key pair
|
RSA_generate_key() generates a key pair and returns it in a newly allocated RSA structure. The pseudo-random number generator must be seeded prior to calling RSA_gener- ate_key(). The modulus size wil... |
RSA_get_default_method(3) -- select RSA method
|
An RSA_METHOD specifies the functions that OpenSSL uses for RSA operations. By modifying the method, alternative implementations such as hardware accelerators may be used. IMPORTANT: See the NOTES sec... |
RSA_get_default_openssl_method(3) -- select RSA method
|
An RSA_METHOD specifies the functions that OpenSSL uses for RSA operations. By modifying the method, alternative implementations such as hardware accelerators may be used. IMPORTANT: See the NOTES sec... |
RSA_get_ex_data(3) -- add application specific data to RSA structures
|
Several OpenSSL structures can have application specific data attached to them. This has several potential uses, it can be used to cache data associated with a structure (for example the hash of some ... |
RSA_get_ex_new_index(3) -- add application specific data to RSA structures
|
Several OpenSSL structures can have application specific data attached to them. This has several potential uses, it can be used to cache data associated with a structure (for example the hash of some ... |
RSA_get_method(3) -- select RSA method
|
An RSA_METHOD specifies the functions that OpenSSL uses for RSA operations. By modifying the method, alternative implementations such as hardware accelerators may be used. IMPORTANT: See the NOTES sec... |
RSA_new(3) -- allocate and free RSA objects
|
RSA_new() allocates and initializes an RSA structure. It is equivalent to calling RSA_new_method(NULL). RSA_free() frees the RSA structure and its components. The key is erased before the memory is re... |
RSA_new_method(3) -- select RSA method
|
An RSA_METHOD specifies the functions that OpenSSL uses for RSA operations. By modifying the method, alternative implementations such as hardware accelerators may be used. IMPORTANT: See the NOTES sec... |
RSA_null_method(3) -- select RSA method
|
An RSA_METHOD specifies the functions that OpenSSL uses for RSA operations. By modifying the method, alternative implementations such as hardware accelerators may be used. IMPORTANT: See the NOTES sec... |
RSA_padding_add_none(3) -- asymmetric encryption padding
|
The RSA_padding_xxx_xxx() functions are called from the RSA encrypt, decrypt, sign and verify functions. Normally they should not be called from application programs. However, they can also be called ... |
RSA_padding_add_PKCS1_OAEP(3) -- asymmetric encryption padding
|
The RSA_padding_xxx_xxx() functions are called from the RSA encrypt, decrypt, sign and verify functions. Normally they should not be called from application programs. However, they can also be called ... |
RSA_padding_add_PKCS1_type_1(3) -- asymmetric encryption padding
|
The RSA_padding_xxx_xxx() functions are called from the RSA encrypt, decrypt, sign and verify functions. Normally they should not be called from application programs. However, they can also be called ... |
RSA_padding_add_PKCS1_type_2(3) -- asymmetric encryption padding
|
The RSA_padding_xxx_xxx() functions are called from the RSA encrypt, decrypt, sign and verify functions. Normally they should not be called from application programs. However, they can also be called ... |
RSA_padding_add_SSLv23(3) -- asymmetric encryption padding
|
The RSA_padding_xxx_xxx() functions are called from the RSA encrypt, decrypt, sign and verify functions. Normally they should not be called from application programs. However, they can also be called ... |
RSA_padding_check_none(3) -- asymmetric encryption padding
|
The RSA_padding_xxx_xxx() functions are called from the RSA encrypt, decrypt, sign and verify functions. Normally they should not be called from application programs. However, they can also be called ... |
RSA_padding_check_PKCS1_OAEP(3) -- asymmetric encryption padding
|
The RSA_padding_xxx_xxx() functions are called from the RSA encrypt, decrypt, sign and verify functions. Normally they should not be called from application programs. However, they can also be called ... |
RSA_padding_check_PKCS1_type_1(3) -- asymmetric encryption padding
|
The RSA_padding_xxx_xxx() functions are called from the RSA encrypt, decrypt, sign and verify functions. Normally they should not be called from application programs. However, they can also be called ... |
RSA_padding_check_PKCS1_type_2(3) -- asymmetric encryption padding
|
The RSA_padding_xxx_xxx() functions are called from the RSA encrypt, decrypt, sign and verify functions. Normally they should not be called from application programs. However, they can also be called ... |
RSA_padding_check_SSLv23(3) -- asymmetric encryption padding
|
The RSA_padding_xxx_xxx() functions are called from the RSA encrypt, decrypt, sign and verify functions. Normally they should not be called from application programs. However, they can also be called ... |
RSA_PKCS1_RSAref(3) -- select RSA method
|
An RSA_METHOD specifies the functions that OpenSSL uses for RSA operations. By modifying the method, alternative implementations such as hardware accelerators may be used. IMPORTANT: See the NOTES sec... |
RSA_PKCS1_SSLeay(3) -- select RSA method
|
An RSA_METHOD specifies the functions that OpenSSL uses for RSA operations. By modifying the method, alternative implementations such as hardware accelerators may be used. IMPORTANT: See the NOTES sec... |
RSA_print(3) -- print cryptographic parameters
|
A human-readable hexadecimal output of the components of the RSA key, DSA parameters or key or DH parameters is printed to bp or fp. The output lines are indented by offset spaces. |
RSA_print_fp(3) -- print cryptographic parameters
|
A human-readable hexadecimal output of the components of the RSA key, DSA parameters or key or DH parameters is printed to bp or fp. The output lines are indented by offset spaces. |
RSA_private_decrypt(3) -- RSA public key cryptography
|
RSA_public_encrypt() encrypts the flen bytes at from (usually a session key) using the public key rsa and stores the ciphertext in to. to must point to RSA_size(rsa) bytes of memory. padding denotes o... |
RSA_private_encrypt(3) -- low level signature operations
|
These functions handle RSA signatures at a low level. RSA_private_encrypt() signs the flen bytes at from (usually a message digest with an algorithm identifier) using the private key rsa and stores th... |
RSA_public_decrypt(3) -- low level signature operations
|
These functions handle RSA signatures at a low level. RSA_private_encrypt() signs the flen bytes at from (usually a message digest with an algorithm identifier) using the private key rsa and stores th... |
RSA_public_encrypt(3) -- RSA public key cryptography
|
RSA_public_encrypt() encrypts the flen bytes at from (usually a session key) using the public key rsa and stores the ciphertext in to. to must point to RSA_size(rsa) bytes of memory. padding denotes o... |
RSA_set_default_method(3) -- select RSA method
|
An RSA_METHOD specifies the functions that OpenSSL uses for RSA operations. By modifying the method, alternative implementations such as hardware accelerators may be used. IMPORTANT: See the NOTES sec... |
RSA_set_default_openssl_method(3) -- select RSA method
|
An RSA_METHOD specifies the functions that OpenSSL uses for RSA operations. By modifying the method, alternative implementations such as hardware accelerators may be used. IMPORTANT: See the NOTES sec... |
RSA_set_ex_data(3) -- add application specific data to RSA structures
|
Several OpenSSL structures can have application specific data attached to them. This has several potential uses, it can be used to cache data associated with a structure (for example the hash of some ... |
RSA_set_method(3) -- select RSA method
|
An RSA_METHOD specifies the functions that OpenSSL uses for RSA operations. By modifying the method, alternative implementations such as hardware accelerators may be used. IMPORTANT: See the NOTES sec... |
RSA_sign(3) -- RSA signatures
|
RSA_sign() signs the message digest m of size m_len using the private key rsa as specified in PKCS #1 v2.0. It stores the signature in sigret and the signature size in siglen. sigret must point to RSA... |
RSA_sign_ASN1_OCTET_STRING(3) -- RSA signatures
|
RSA_sign_ASN1_OCTET_STRING() signs the octet string m of size m_len using the private key rsa represented in DER using PKCS #1 padding. It stores the signature in sigret and the signature size in sigl... |
RSA_size(3) -- get RSA modulus size
|
This function returns the RSA modulus size in bytes. It can be used to determine how much memory must be allocated for an RSA encrypted value. rsa->n must not be NULL. |
RSA_verify(3) -- RSA signatures
|
RSA_sign() signs the message digest m of size m_len using the private key rsa as specified in PKCS #1 v2.0. It stores the signature in sigret and the signature size in siglen. sigret must point to RSA... |
RSA_verify_ASN1_OCTET_STRING(3) -- RSA signatures
|
RSA_sign_ASN1_OCTET_STRING() signs the octet string m of size m_len using the private key rsa represented in DER using PKCS #1 padding. It stores the signature in sigret and the signature size in sigl... |
ruserok(3) -- routines for returning a stream to a remote command
|
The rcmd() function is used by the superuser to execute a command on a remote machine using an authentication scheme based on reserved port numbers. If the calling process is not setuid, the RSH envir... |
savetty(3) -- low-level curses routines
|
The following routines give low-level access to various curses capabilities. Theses routines typically are used inside library routines. The def_prog_mode and def_shell_mode routines save the current ... |
scalb(3) -- IEEE test functions
|
These functions allow users to test conformance to IEEE Std 754-1985. Their use is not otherwise recommended. logb(x) returns x's exponent n, a signed integer converted to double-precision floating-p... |
scalbf(3) -- IEEE test functions
|
These functions allow users to test conformance to IEEE Std 754-1985. Their use is not otherwise recommended. logb(x) returns x's exponent n, a signed integer converted to double-precision floating-p... |
scalbn(3) -- functions for IEEE arithmetic
|
These functions are required or recommended by IEEE Std 754-1985. copysign() returns x with its sign changed to y's. The copysignf() function is a single precision version of copysign(). finite() ret... |
scalbnf(3) -- functions for IEEE arithmetic
|
These functions are required or recommended by IEEE Std 754-1985. copysign() returns x with its sign changed to y's. The copysignf() function is a single precision version of copysign(). finite() ret... |
scale_form(3) -- make and break form window and subwindow associations
|
Every form has an associated pair of curses windows. The form window displays any title and border associated with the window; the form subwindow displays the items of the form that are currently avai... |
scale_menu(3) -- make and break menu window and subwindow associations
|
Every menu has an associated pair of curses windows. The menu window displays any title and border associated with the window; the menu subwindow displays the items of the menu that are currently avai... |
scandir(3) -- scan a directory
|
The scandir() function reads the directory dirname and builds an array of pointers to directory entries using malloc(3). It returns the number of entries in the array. A pointer to the array of direct... |
scanf(3) -- input format conversion
|
The scanf() family of functions read input according to the given format as described below. This format may contain ``conversion specifiers''; the results of such conversions, if any, are stored th... |
scanw(3) -- convert formatted input from a curses window
|
The scanw, wscanw and mvscanw routines are analogous to scanf [see scanf(3)]. The effect of these routines is as though wgetstr were called on the window, and the resulting line used as input for ssca... |
scan_scaled(3) -- handle numbers with a human-readable scale
|
The scan_scaled() function scans the given number and looks for a terminal scale multiplier of B, K, M, G, T, P or E (in either upper or lower case) for Byte, Kilobyte, Megabyte, Gigabyte, Terabyte, P... |
scrl(3) -- scroll a curses window
|
The scroll routine scrolls the window up one line. This involves moving the lines in the window data structure. As an optimization, if the scrolling region of the window is the entire screen, the phys... |
scroll(3) -- scroll a curses window
|
The scroll routine scrolls the window up one line. This involves moving the lines in the window data structure. As an optimization, if the scrolling region of the window is the entire screen, the phys... |
scrollok(3) -- curses output options
|
These routines set options that change the style of output within curses. All options are initially FALSE, unless otherwise stated. It is not necessary to turn these options off before calling endwin.... |
scr_dump(3) -- read (write) a curses screen from (to) a file
|
The scr_dump routine dumps the current contents of the virtual screen to the file filename. The scr_restore routine sets the virtual screen to the contents of filename, which must have been written us... |
scr_init(3) -- read (write) a curses screen from (to) a file
|
The scr_dump routine dumps the current contents of the virtual screen to the file filename. The scr_restore routine sets the virtual screen to the contents of filename, which must have been written us... |
scr_restore(3) -- read (write) a curses screen from (to) a file
|
The scr_dump routine dumps the current contents of the virtual screen to the file filename. The scr_restore routine sets the virtual screen to the contents of filename, which must have been written us... |
scr_set(3) -- read (write) a curses screen from (to) a file
|
The scr_dump routine dumps the current contents of the virtual screen to the file filename. The scr_restore routine sets the virtual screen to the contents of filename, which must have been written us... |
sectok(3) -- library for communicating with ISO 7816 smartcards
|
sectok provides initialization, input, output, and other basic routines for ISO 7816 smart cards. Many of the routines return a status word. This will either be an error code as given in the include f... |
sectok_apdu(3) -- library for communicating with ISO 7816 smartcards
|
sectok provides initialization, input, output, and other basic routines for ISO 7816 smart cards. Many of the routines return a status word. This will either be an error code as given in the include f... |
sectok_cardpresent(3) -- library for communicating with ISO 7816 smartcards
|
sectok provides initialization, input, output, and other basic routines for ISO 7816 smart cards. Many of the routines return a status word. This will either be an error code as given in the include f... |
sectok_close(3) -- library for communicating with ISO 7816 smartcards
|
sectok provides initialization, input, output, and other basic routines for ISO 7816 smart cards. Many of the routines return a status word. This will either be an error code as given in the include f... |
sectok_dump_reply(3) -- library for communicating with ISO 7816 smartcards
|
sectok provides initialization, input, output, and other basic routines for ISO 7816 smart cards. Many of the routines return a status word. This will either be an error code as given in the include f... |
sectok_fdump_reply(3) -- library for communicating with ISO 7816 smartcards
|
sectok provides initialization, input, output, and other basic routines for ISO 7816 smart cards. Many of the routines return a status word. This will either be an error code as given in the include f... |
sectok_fmt_fid(3) -- library for communicating with ISO 7816 smartcards
|
sectok provides initialization, input, output, and other basic routines for ISO 7816 smart cards. Many of the routines return a status word. This will either be an error code as given in the include f... |
sectok_friendly_open(3) -- library for communicating with ISO 7816 smartcards
|
sectok provides initialization, input, output, and other basic routines for ISO 7816 smart cards. Many of the routines return a status word. This will either be an error code as given in the include f... |
sectok_get_input(3) -- library for communicating with ISO 7816 smartcards
|
sectok provides initialization, input, output, and other basic routines for ISO 7816 smart cards. Many of the routines return a status word. This will either be an error code as given in the include f... |
sectok_get_ins(3) -- library for communicating with ISO 7816 smartcards
|
sectok provides initialization, input, output, and other basic routines for ISO 7816 smart cards. Many of the routines return a status word. This will either be an error code as given in the include f... |
sectok_get_sw(3) -- library for communicating with ISO 7816 smartcards
|
sectok provides initialization, input, output, and other basic routines for ISO 7816 smart cards. Many of the routines return a status word. This will either be an error code as given in the include f... |
sectok_open(3) -- library for communicating with ISO 7816 smartcards
|
sectok provides initialization, input, output, and other basic routines for ISO 7816 smart cards. Many of the routines return a status word. This will either be an error code as given in the include f... |
sectok_parse_atr(3) -- library for communicating with ISO 7816 smartcards
|
sectok provides initialization, input, output, and other basic routines for ISO 7816 smart cards. Many of the routines return a status word. This will either be an error code as given in the include f... |
sectok_parse_fname(3) -- library for communicating with ISO 7816 smartcards
|
sectok provides initialization, input, output, and other basic routines for ISO 7816 smart cards. Many of the routines return a status word. This will either be an error code as given in the include f... |
sectok_parse_input(3) -- library for communicating with ISO 7816 smartcards
|
sectok provides initialization, input, output, and other basic routines for ISO 7816 smart cards. Many of the routines return a status word. This will either be an error code as given in the include f... |
sectok_print_sw(3) -- library for communicating with ISO 7816 smartcards
|
sectok provides initialization, input, output, and other basic routines for ISO 7816 smart cards. Many of the routines return a status word. This will either be an error code as given in the include f... |
sectok_reset(3) -- library for communicating with ISO 7816 smartcards
|
sectok provides initialization, input, output, and other basic routines for ISO 7816 smart cards. Many of the routines return a status word. This will either be an error code as given in the include f... |
sectok_selectfile(3) -- library for communicating with ISO 7816 smartcards
|
sectok provides initialization, input, output, and other basic routines for ISO 7816 smart cards. Many of the routines return a status word. This will either be an error code as given in the include f... |
sectok_swOK(3) -- library for communicating with ISO 7816 smartcards
|
sectok provides initialization, input, output, and other basic routines for ISO 7816 smart cards. Many of the routines return a status word. This will either be an error code as given in the include f... |
sectok_xopen(3) -- library for communicating with ISO 7816 smartcards
|
sectok provides initialization, input, output, and other basic routines for ISO 7816 smart cards. Many of the routines return a status word. This will either be an error code as given in the include f... |
secure_path(3) -- query login.conf database about a user class
|
The login_getclass() function extracts the entry specified by class (or default if class is NULL or the empty string) from /etc/login.conf (see login.conf(5)). If the entry is found, a login_cap_t poi... |
seed48(3) -- pseudo-random number generators and initialization routines
|
The rand48() family of functions generates pseudo-random numbers using a linear congruential algorithm working on integers 48 bits in size. The particular formula employed is r(n+1) = (a * r(n) + c) m... |
seekdir(3) -- directory operations
|
The opendir() function opens the directory named by filename, associates a directory stream with it, and returns a pointer to be used to identify the directory stream in subsequent operations. A null ... |
sem_close(3) -- named semaphore operations
|
The sem_open(), sem_close(), and sem_unlink() functions are not supported by this implementation. |
sem_destroy(3) -- destroy an unnamed semaphore
|
The sem_destroy() function destroys the unnamed semaphore pointed to by sem. After a successful call to sem_destroy(), sem is unusable until reinitialized by another call to sem_init(). |
sem_getvalue(3) -- get the value of a semaphore
|
The sem_getvalue() function sets the variable pointed to by sval to the current value of the semaphore pointed to by sem, as of the time that the call to sem_getvalue() is actually run. |
sem_init(3) -- initialize an unnamed semaphore
|
The sem_init() function initializes the unnamed semaphore pointed to by sem to have the value value. A non-zero value for pshared specifies a shared semaphore that can be used by multiple processes, w... |
sem_open(3) -- named semaphore operations
|
The sem_open(), sem_close(), and sem_unlink() functions are not supported by this implementation. |
sem_post(3) -- increment (unlock) a semaphore
|
The sem_post() function increments (unlocks) the semaphore pointed to by sem. If there are threads blocked on the semaphore when sem_post() is called, then the highest priority thread that has been bl... |
sem_trywait(3) -- decrement (lock) a semaphore
|
The sem_wait() function decrements (locks) the semaphore pointed to by sem, but blocks if the value of sem is zero, until the value is non-zero and the value can be decremented. The sem_trywait() func... |
sem_unlink(3) -- named semaphore operations
|
The sem_open(), sem_close(), and sem_unlink() functions are not supported by this implementation. |
sem_wait(3) -- decrement (lock) a semaphore
|
The sem_wait() function decrements (locks) the semaphore pointed to by sem, but blocks if the value of sem is zero, until the value is non-zero and the value can be decremented. The sem_trywait() func... |
setbuf(3) -- stream buffering operations
|
The three types of stream buffering available are unbuffered, block buffered, and line buffered. When an output stream is unbuffered, information appears on the destination file or terminal as soon as... |
setbuffer(3) -- stream buffering operations
|
The three types of stream buffering available are unbuffered, block buffered, and line buffered. When an output stream is unbuffered, information appears on the destination file or terminal as soon as... |
setclasscontext(3) -- query login.conf database about a user class
|
The login_getclass() function extracts the entry specified by class (or default if class is NULL or the empty string) from /etc/login.conf (see login.conf(5)). If the entry is found, a login_cap_t poi... |
setdomainname(3) -- get/set YP domain name of current host
|
The getdomainname() function returns the YP domain name for the current processor, as previously set by setdomainname(). The parameter namelen specifies the size of the name array. If insufficient spa... |
setenv(3) -- environment variable functions
|
These functions set, unset, and fetch environment variables from the host environment list. For compatibility with differing environment conventions, the given arguments name and value may be appended... |
setfsent(3) -- get file system descriptor file entry
|
The getfsent(), getfsspec(), and getfsfile() functions each return a pointer to an object with the following structure containing the brokenout fields of a line in the file system description file, |
setgrent(3) -- group database operations
|
These functions operate on the group database file /etc/group which is described in group(5). Each line of the database is defined by the structure struct group found in the include file : stru... |
setgrfile(3) -- group database operations
|
These functions operate on the group database file /etc/group which is described in group(5). Each line of the database is defined by the structure struct group found in the include file : stru... |
setgroupent(3) -- group database operations
|
These functions operate on the group database file /etc/group which is described in group(5). Each line of the database is defined by the structure struct group found in the include file : stru... |
sethostent(3) -- get network host entry
|
The gethostbyname(), gethostbyname2() and gethostbyaddr() functions each return a pointer to an object with the following structure describing an internet host referenced by name or by address, respec... |
sethostid(3) -- get/set unique identifier of current host
|
The sethostid() function establishes a 32-bit identifier for the current processor that is intended to be unique among all UNIX systems in existence. This is normally a DARPA Internet address for the ... |
sethostname(3) -- get/set name of current host
|
The gethostname() function returns the standard host name for the current processor, as previously set by sethostname(). The parameter namelen specifies the size of the name array. If insufficient spa... |
setjmp(3) -- non-local jumps
|
The sigsetjmp(), setjmp(), and _setjmp() functions save their calling environment in env. Each of these functions returns 0. The corresponding longjmp() functions restore the environment saved by the ... |
setkey(3) -- DES encryption
|
The crypt() function performs password encryption based on the NBS Data Encryption Standard (DES). Additional code has been added to deter key search attempts and to use stronger hashing algorithms. T... |
setlinebuf(3) -- stream buffering operations
|
The three types of stream buffering available are unbuffered, block buffered, and line buffered. When an output stream is unbuffered, information appears on the destination file or terminal as soon as... |
setlocale(3) -- natural language formatting for C
|
The setlocale() function sets the C library's notion of natural language formatting style for particular sets of routines. Each such style is called a ``locale'' and is invoked using an appropriate... |
setlogmask(3) -- control system log
|
The syslog() function writes message to the system message logger. The message is then written to the system console, log files, logged-in users, or forwarded to other machines as appropriate (see sys... |
setlogmask_r(3) -- control system log
|
The syslog() function writes message to the system message logger. The message is then written to the system console, log files, logged-in users, or forwarded to other machines as appropriate (see sys... |
setmode(3) -- modify mode bits
|
The getmode() function returns a copy of the file permission bits mode as altered by the values pointed to by set. While only the mode bits are altered, other parts of the file mode may be examined. T... |
setnetent(3) -- get network entry
|
The getnetent(), getnetbyname(), and getnetbyaddr() functions each return a pointer to an object with the following structure containing the broken-out fields of a line in the network database, /etc/n... |
setnetgrent(3) -- netgroup database operations
|
These functions operate on the netgroup database file /etc/netgroup.db which is described in netgroup(5). If that file does not exist, and the system supports YP, then the netgroup YP databases are us... |
setpassent(3) -- password database operations
|
These functions operate on the password database file which is described in passwd(5). Each entry in the database is defined by the structure struct passwd found in the include file : struct pa... |
setproctitle(3) -- set process title
|
The setproctitle() function sets the invoking process's title. The process title is set to the last component of the program name, followed by a colon, a single space, and the formatted string specif... |
setprotoent(3) -- get protocol entry
|
The getprotoent(), getprotobyname(), and getprotobynumber() functions each return a pointer to an object with the following structure containing the broken-out fields of a line in the network protocol... |
setpwent(3) -- password database operations
|
These functions operate on the password database file which is described in passwd(5). Each entry in the database is defined by the structure struct passwd found in the include file : struct pa... |
setpwfile(3) -- password database operations
|
These functions operate on the password database file which is described in passwd(5). Each entry in the database is defined by the structure struct passwd found in the include file : struct pa... |
setrgid(3) -- set user and group ID
|
This interface is made obsolete by setreuid(2). It is available from the compatibility library, libcompat. The setruid() function (setrgid()) sets the real user ID (group ID) of the current process to... |
setrpcent(3) -- get RPC entry
|
getrpcent(), getrpcbyname(), and getrpcbynumber(), each return a pointer to an object with the following structure containing the broken-out fields of a line in the rpc program number database, /etc/r... |
setruid(3) -- set user and group ID
|
This interface is made obsolete by setreuid(2). It is available from the compatibility library, libcompat. The setruid() function (setrgid()) sets the real user ID (group ID) of the current process to... |
setscrreg(3) -- curses output options
|
These routines set options that change the style of output within curses. All options are initially FALSE, unless otherwise stated. It is not necessary to turn these options off before calling endwin.... |
setservent(3) -- get service entry
|
The getservent(), getservbyname(), and getservbyport() functions each return a pointer to an object with the following structure containing the broken-out fields of a line in the network services data... |
setstate(3) -- better random number generator; routines for changing generators
|
The random() function uses a non-linear additive feedback random number generator employing a default table of size 31 long integers to return successive pseudo-random numbers in the range from 0 to (... |
setsyx(3) -- low-level curses routines
|
The following routines give low-level access to various curses capabilities. Theses routines typically are used inside library routines. The def_prog_mode and def_shell_mode routines save the current ... |
setterm(3) -- curses interfaces to terminfo database
|
These low-level routines must be called by programs that have to deal directly with the terminfo database to handle certain terminal capabilities, such as programming function keys. For all other func... |
setttyent(3) -- get ttys file entry
|
The getttyent() and getttynam() functions each return a pointer to an object, with the following structure, containing the brokenout fields of a line from the tty description file. struct ttyent { cha... |
setupterm(3) -- curses interfaces to terminfo database
|
These low-level routines must be called by programs that have to deal directly with the terminfo database to handle certain terminal capabilities, such as programming function keys. For all other func... |
setusercontext(3) -- query login.conf database about a user class
|
The login_getclass() function extracts the entry specified by class (or default if class is NULL or the empty string) from /etc/login.conf (see login.conf(5)). If the entry is found, a login_cap_t poi... |
setusershell(3) -- get legal user shells
|
The getusershell() function returns a pointer to a legal user shell as defined by the system manager in the file /etc/shells. If /etc/shells is unreadable or does not exist, getusershell() behaves as ... |
setvbuf(3) -- stream buffering operations
|
The three types of stream buffering available are unbuffered, block buffered, and line buffered. When an output stream is unbuffered, information appears on the destination file or terminal as soon as... |
set_current_field(3) -- set and get form page number
|
The function set_current field sets the current field of the given form; current_field returns the current field of the given form. The function set_form_page sets the form's page number (goes to pag... |
set_current_item(3) -- set and get current_menu_item
|
The function set_current_item sets the current item (the item on which the menu cursor is positioned). cur- rent_item returns a pointer to the current item in the given menu. The function set_top_row ... |
set_curterm(3) -- curses interfaces to terminfo database
|
These low-level routines must be called by programs that have to deal directly with the terminfo database to handle certain terminal capabilities, such as programming function keys. For all other func... |
set_fieldtype_arg(3) -- define validation-field types
|
The function new_fieldtype creates a new field type usable for data validation. You supply it with field_check, a predicate to check the validity of an entered data string whenever the user attempts t... |
set_fieldtype_choice(3) -- define validation-field types
|
The function new_fieldtype creates a new field type usable for data validation. You supply it with field_check, a predicate to check the validity of an entered data string whenever the user attempts t... |
set_field_back(3) -- color and attribute control for form fields
|
The function set_field_fore sets the foreground attribute of field. This is the highlight used to display the field contents. The function field_fore returns the foreground attribute. The default is A... |
set_field_buffer(3) -- field buffer control
|
The function set_field_buffer sets the numbered buffer of the given field to contain a given string. Buffer 0 is the displayed value of the field; other numbered buffers may be allocated by applicatio... |
set_field_fore(3) -- color and attribute control for form fields
|
The function set_field_fore sets the foreground attribute of field. This is the highlight used to display the field contents. The function field_fore returns the foreground attribute. The default is A... |
set_field_init(3) -- set hooks for automatic invocation by applications
|
These functions make it possible to set hook functions to be called at various points in the automatic processing of input event codes by form_driver. The function set_field_init sets a hook to be cal... |
set_field_just(3) -- retrieve field characteristics
|
The function set_field_just sets the justification attribute of a field; field_just returns a field's justification attribute. The attribute may be one of NO_JUSTIFICATION, JUSTIFY_RIGHT, JUSTIFY_LEF... |
set_field_opts(3) -- set and get field options
|
The function set_field_opts sets all the given field's option bits (field option bits may be logically OR'ed together). The function field_opts_on turns on the given option bits, and leaves others a... |
set_field_pad(3) -- color and attribute control for form fields
|
The function set_field_fore sets the foreground attribute of field. This is the highlight used to display the field contents. The function field_fore returns the foreground attribute. The default is A... |
set_field_status(3) -- field buffer control
|
The function set_field_buffer sets the numbered buffer of the given field to contain a given string. Buffer 0 is the displayed value of the field; other numbered buffers may be allocated by applicatio... |
set_field_term(3) -- set hooks for automatic invocation by applications
|
These functions make it possible to set hook functions to be called at various points in the automatic processing of input event codes by form_driver. The function set_field_init sets a hook to be cal... |
set_field_type(3) -- data type validation for fields
|
The function set_field_type declares a data type for a given form field. This is the type checked by validation functions. The types are as follows: TYPE_ALNUM Alphanumeric data. Requires a third int ... |
set_field_userptr(3) -- associate application data with a form field
|
Every form field has a field that can be used to hold application-specific data (that is, the form-driver code leaves it alone). These functions get and set that field. |
set_form_fields(3) -- make and break connections between fields and forms
|
The function set_form_fields changes the field pointer array of the given form. The array must be terminated by a NULL. The function form_fields returns the field array of the given form. The function... |
set_form_init(3) -- set hooks for automatic invocation by applications
|
These functions make it possible to set hook functions to be called at various points in the automatic processing of input event codes by form_driver. The function set_field_init sets a hook to be cal... |
set_form_opts(3) -- set and get form options
|
The function set_form_opts sets all the given form's option bits (form option bits may be logically OR'ed together). The function form_opts_on turns on the given option bits, and leaves others alone... |
set_form_page(3) -- set and get form page number
|
The function set_current field sets the current field of the given form; current_field returns the current field of the given form. The function set_form_page sets the form's page number (goes to pag... |
set_form_sub(3) -- make and break form window and subwindow associations
|
Every form has an associated pair of curses windows. The form window displays any title and border associated with the window; the form subwindow displays the items of the form that are currently avai... |
set_form_term(3) -- set hooks for automatic invocation by applications
|
These functions make it possible to set hook functions to be called at various points in the automatic processing of input event codes by form_driver. The function set_field_init sets a hook to be cal... |
set_form_userptr(3) -- associate application data with a form item
|
Every form and every form item has a field that can be used to hold application-specific data (that is, the formdriver code leaves it alone). These functions get and set the form user pointer field. |
set_form_win(3) -- make and break form window and subwindow associations
|
Every form has an associated pair of curses windows. The form window displays any title and border associated with the window; the form subwindow displays the items of the form that are currently avai... |
set_item_init(3) -- set hooks for automatic invocation by applications
|
These functions make it possible to set hook functions to be called at various points in the automatic processing of input event codes by menu_driver. The function set_item_init sets a hook to be call... |
set_item_opts(3) -- set and get menu item options
|
The function set_item_opts sets all the given item's option bits (menu option bits may be logically OR'ed together). The function item_opts_on turns on the given option bits, and leaves others alone... |
set_item_term(3) -- set hooks for automatic invocation by applications
|
These functions make it possible to set hook functions to be called at various points in the automatic processing of input event codes by menu_driver. The function set_item_init sets a hook to be call... |
set_item_userptr(3) -- associate application data with a menu item
|
Every menu item has a field that can be used to hold application-specific data (that is, the menu-driver code leaves it alone). These functions get and set that field. |
set_item_value(3) -- set and get menu item values
|
If you turn off the menu option O_ONEVALUE (e.g., with set_menu_opts or menu_opts_off; see menu_opts(3)), the menu becomes multi-valued; that is, more than one item may simultaneously be selected. In ... |
set_max_field(3) -- field buffer control
|
The function set_field_buffer sets the numbered buffer of the given field to contain a given string. Buffer 0 is the displayed value of the field; other numbered buffers may be allocated by applicatio... |
set_menu_back(3) -- color and attribute control for menus
|
The function set_menu_fore sets the foreground attribute of menu. This is the highlight used for selected menu items. menu_fore returns the foreground attribute. The default is A_STANDOUT. The functio... |
set_menu_fore(3) -- color and attribute control for menus
|
The function set_menu_fore sets the foreground attribute of menu. This is the highlight used for selected menu items. menu_fore returns the foreground attribute. The default is A_STANDOUT. The functio... |
set_menu_format(3) -- set and get menu sizes
|
The function set_menu_format sets the maximum display size of the given menu. If this size is too small to display all menu items, the menu will be made scrollable. If this size is larger than the men... |
set_menu_grey(3) -- color and attribute control for menus
|
The function set_menu_fore sets the foreground attribute of menu. This is the highlight used for selected menu items. menu_fore returns the foreground attribute. The default is A_STANDOUT. The functio... |
set_menu_init(3) -- set hooks for automatic invocation by applications
|
These functions make it possible to set hook functions to be called at various points in the automatic processing of input event codes by menu_driver. The function set_item_init sets a hook to be call... |
set_menu_items(3) -- make and break connections between items and menus
|
The function set_menu_items changes the item pointer array of the given menu. The array must be terminated by a NULL. The function menu_items returns the item array of the given menu. The function ite... |
set_menu_mark(3) -- get and set the menu mark string
|
In order to make menu selections visible on older terminals without highlighting or color capability, the menu library marks selected items in a menu with a prefix string. The function set_menu_mark s... |
set_menu_opts(3) -- set and get menu options
|
The function set_menu_opts sets all the given menu's option bits (menu option bits may be logically OR'ed together). The function menu_opts_on turns on the given option bits, and leaves others alone... |
set_menu_pad(3) -- color and attribute control for menus
|
The function set_menu_fore sets the foreground attribute of menu. This is the highlight used for selected menu items. menu_fore returns the foreground attribute. The default is A_STANDOUT. The functio... |
set_menu_pattern(3) -- get and set a menu's pattern buffer
|
Every menu has an associated pattern match buffer. As input events that are printable ASCII characters come in, they are appended to this match buffer and tested for a match, as described in menu_driv... |
set_menu_spacing(3) -- Control spacing between menu items.
|
The function set_menu_spacing sets the spacing informations for the menu. spc_description controls the number of spaces between an item name and an item description. It must not be larger than TABSIZE... |
set_menu_sub(3) -- make and break menu window and subwindow associations
|
Every menu has an associated pair of curses windows. The menu window displays any title and border associated with the window; the menu subwindow displays the items of the menu that are currently avai... |
set_menu_term(3) -- set hooks for automatic invocation by applications
|
These functions make it possible to set hook functions to be called at various points in the automatic processing of input event codes by menu_driver. The function set_item_init sets a hook to be call... |
set_menu_userptr(3) -- associate application data with a menu item
|
Every menu and every menu item has a field that can be used to hold application-specific data (that is, the menudriver code leaves it alone). These functions get and set the menu user pointer field. |
set_menu_win(3) -- make and break menu window and subwindow associations
|
Every menu has an associated pair of curses windows. The menu window displays any title and border associated with the window; the menu subwindow displays the items of the menu that are currently avai... |
set_new_page(3) -- form pagination functions
|
The function set_new_page sets or resets a flag marking the given field as the beginning of a new page on its form. The function new_page is a predicate which tests if a given field marks a page begin... |
set_panel_userptr(3) -- panel stack extension for curses
|
Panels are curses(3) windows with the added feature of depth. Panel functions allow the use of stacked windows and ensure the proper portions of each window and the curses stdscr window are hidden or ... |
set_term(3) -- curses screen initialization and manipulation routines
|
initscr is normally the first curses routine to call when initializing a program. A few special routines sometimes need to be called before it; these are slk_init, filter, ripoffline, use_env. For mul... |
set_top_row(3) -- set and get current_menu_item
|
The function set_current_item sets the current item (the item on which the menu cursor is positioned). cur- rent_item returns a pointer to the current item in the given menu. The function set_top_row ... |
sevenbit(3) -- S/Key library functions
|
These functions implement the S/Key one time password authentication mechanism. The atob8() function converts the 16-byte hex string in to an 8-byte binary array stored in out. The atob8() function re... |
SHA1(3) -- Secure Hash Algorithm
|
SHA-1 (Secure Hash Algorithm) is a cryptographic hash function with a 160 bit output. SHA1() computes the SHA-1 message digest of the n bytes at d and places it in md (which must have space for SHA_DI... |
sha1(3) -- calculate the NIST Secure Hash Algorithm
|
The SHA1 functions implement the NIST Secure Hash Algorithm (SHA-1), FIPS PUB 180-1. SHA-1 is used to generate a condensed representation of a message called a message digest. The algorithm takes a me... |
SHA1Data(3) -- calculate the NIST Secure Hash Algorithm
|
The SHA1 functions implement the NIST Secure Hash Algorithm (SHA-1), FIPS PUB 180-1. SHA-1 is used to generate a condensed representation of a message called a message digest. The algorithm takes a me... |
SHA1End(3) -- calculate the NIST Secure Hash Algorithm
|
The SHA1 functions implement the NIST Secure Hash Algorithm (SHA-1), FIPS PUB 180-1. SHA-1 is used to generate a condensed representation of a message called a message digest. The algorithm takes a me... |
SHA1File(3) -- calculate the NIST Secure Hash Algorithm
|
The SHA1 functions implement the NIST Secure Hash Algorithm (SHA-1), FIPS PUB 180-1. SHA-1 is used to generate a condensed representation of a message called a message digest. The algorithm takes a me... |
SHA1FileChunk(3) -- calculate the NIST Secure Hash Algorithm
|
The SHA1 functions implement the NIST Secure Hash Algorithm (SHA-1), FIPS PUB 180-1. SHA-1 is used to generate a condensed representation of a message called a message digest. The algorithm takes a me... |
SHA1Final(3) -- calculate the NIST Secure Hash Algorithm
|
The SHA1 functions implement the NIST Secure Hash Algorithm (SHA-1), FIPS PUB 180-1. SHA-1 is used to generate a condensed representation of a message called a message digest. The algorithm takes a me... |
SHA1Init(3) -- calculate the NIST Secure Hash Algorithm
|
The SHA1 functions implement the NIST Secure Hash Algorithm (SHA-1), FIPS PUB 180-1. SHA-1 is used to generate a condensed representation of a message called a message digest. The algorithm takes a me... |
SHA1Pad(3) -- calculate the NIST Secure Hash Algorithm
|
The SHA1 functions implement the NIST Secure Hash Algorithm (SHA-1), FIPS PUB 180-1. SHA-1 is used to generate a condensed representation of a message called a message digest. The algorithm takes a me... |
SHA1Transform(3) -- calculate the NIST Secure Hash Algorithm
|
The SHA1 functions implement the NIST Secure Hash Algorithm (SHA-1), FIPS PUB 180-1. SHA-1 is used to generate a condensed representation of a message called a message digest. The algorithm takes a me... |
SHA1Update(3) -- calculate the NIST Secure Hash Algorithm
|
The SHA1 functions implement the NIST Secure Hash Algorithm (SHA-1), FIPS PUB 180-1. SHA-1 is used to generate a condensed representation of a message called a message digest. The algorithm takes a me... |
SHA1_Final(3) -- Secure Hash Algorithm
|
SHA-1 (Secure Hash Algorithm) is a cryptographic hash function with a 160 bit output. SHA1() computes the SHA-1 message digest of the n bytes at d and places it in md (which must have space for SHA_DI... |
SHA1_Init(3) -- Secure Hash Algorithm
|
SHA-1 (Secure Hash Algorithm) is a cryptographic hash function with a 160 bit output. SHA1() computes the SHA-1 message digest of the n bytes at d and places it in md (which must have space for SHA_DI... |
SHA1_Update(3) -- Secure Hash Algorithm
|
SHA-1 (Secure Hash Algorithm) is a cryptographic hash function with a 160 bit output. SHA1() computes the SHA-1 message digest of the n bytes at d and places it in md (which must have space for SHA_DI... |
sha2(3) -- calculate the NIST Secure Hash Standard (version 2)
|
The SHA2 functions implement the NIST Secure Hash Standard, FIPS PUB 180-2. The SHA2 functions are used to generate a condensed representation of a message called a message digest, suitable for use as... |
SHA256_Data(3) -- calculate the NIST Secure Hash Standard (version 2)
|
The SHA2 functions implement the NIST Secure Hash Standard, FIPS PUB 180-2. The SHA2 functions are used to generate a condensed representation of a message called a message digest, suitable for use as... |
SHA256_End(3) -- calculate the NIST Secure Hash Standard (version 2)
|
The SHA2 functions implement the NIST Secure Hash Standard, FIPS PUB 180-2. The SHA2 functions are used to generate a condensed representation of a message called a message digest, suitable for use as... |
SHA256_File(3) -- calculate the NIST Secure Hash Standard (version 2)
|
The SHA2 functions implement the NIST Secure Hash Standard, FIPS PUB 180-2. The SHA2 functions are used to generate a condensed representation of a message called a message digest, suitable for use as... |
SHA256_FileChunk(3) -- calculate the NIST Secure Hash Standard (version 2)
|
The SHA2 functions implement the NIST Secure Hash Standard, FIPS PUB 180-2. The SHA2 functions are used to generate a condensed representation of a message called a message digest, suitable for use as... |
SHA256_Final(3) -- calculate the NIST Secure Hash Standard (version 2)
|
The SHA2 functions implement the NIST Secure Hash Standard, FIPS PUB 180-2. The SHA2 functions are used to generate a condensed representation of a message called a message digest, suitable for use as... |
SHA256_Init(3) -- calculate the NIST Secure Hash Standard (version 2)
|
The SHA2 functions implement the NIST Secure Hash Standard, FIPS PUB 180-2. The SHA2 functions are used to generate a condensed representation of a message called a message digest, suitable for use as... |
SHA256_Pad(3) -- calculate the NIST Secure Hash Standard (version 2)
|
The SHA2 functions implement the NIST Secure Hash Standard, FIPS PUB 180-2. The SHA2 functions are used to generate a condensed representation of a message called a message digest, suitable for use as... |
SHA256_Update(3) -- calculate the NIST Secure Hash Standard (version 2)
|
The SHA2 functions implement the NIST Secure Hash Standard, FIPS PUB 180-2. The SHA2 functions are used to generate a condensed representation of a message called a message digest, suitable for use as... |
SHA384_Data(3) -- calculate the NIST Secure Hash Standard (version 2)
|
The SHA2 functions implement the NIST Secure Hash Standard, FIPS PUB 180-2. The SHA2 functions are used to generate a condensed representation of a message called a message digest, suitable for use as... |
SHA384_End(3) -- calculate the NIST Secure Hash Standard (version 2)
|
The SHA2 functions implement the NIST Secure Hash Standard, FIPS PUB 180-2. The SHA2 functions are used to generate a condensed representation of a message called a message digest, suitable for use as... |
SHA384_File(3) -- calculate the NIST Secure Hash Standard (version 2)
|
The SHA2 functions implement the NIST Secure Hash Standard, FIPS PUB 180-2. The SHA2 functions are used to generate a condensed representation of a message called a message digest, suitable for use as... |
SHA384_FileChunk(3) -- calculate the NIST Secure Hash Standard (version 2)
|
The SHA2 functions implement the NIST Secure Hash Standard, FIPS PUB 180-2. The SHA2 functions are used to generate a condensed representation of a message called a message digest, suitable for use as... |
SHA384_Final(3) -- calculate the NIST Secure Hash Standard (version 2)
|
The SHA2 functions implement the NIST Secure Hash Standard, FIPS PUB 180-2. The SHA2 functions are used to generate a condensed representation of a message called a message digest, suitable for use as... |
SHA384_Init(3) -- calculate the NIST Secure Hash Standard (version 2)
|
The SHA2 functions implement the NIST Secure Hash Standard, FIPS PUB 180-2. The SHA2 functions are used to generate a condensed representation of a message called a message digest, suitable for use as... |
SHA384_Pad(3) -- calculate the NIST Secure Hash Standard (version 2)
|
The SHA2 functions implement the NIST Secure Hash Standard, FIPS PUB 180-2. The SHA2 functions are used to generate a condensed representation of a message called a message digest, suitable for use as... |
SHA384_Update(3) -- calculate the NIST Secure Hash Standard (version 2)
|
The SHA2 functions implement the NIST Secure Hash Standard, FIPS PUB 180-2. The SHA2 functions are used to generate a condensed representation of a message called a message digest, suitable for use as... |
SHA512_Data(3) -- calculate the NIST Secure Hash Standard (version 2)
|
The SHA2 functions implement the NIST Secure Hash Standard, FIPS PUB 180-2. The SHA2 functions are used to generate a condensed representation of a message called a message digest, suitable for use as... |
SHA512_End(3) -- calculate the NIST Secure Hash Standard (version 2)
|
The SHA2 functions implement the NIST Secure Hash Standard, FIPS PUB 180-2. The SHA2 functions are used to generate a condensed representation of a message called a message digest, suitable for use as... |
SHA512_File(3) -- calculate the NIST Secure Hash Standard (version 2)
|
The SHA2 functions implement the NIST Secure Hash Standard, FIPS PUB 180-2. The SHA2 functions are used to generate a condensed representation of a message called a message digest, suitable for use as... |
SHA512_FileChunk(3) -- calculate the NIST Secure Hash Standard (version 2)
|
The SHA2 functions implement the NIST Secure Hash Standard, FIPS PUB 180-2. The SHA2 functions are used to generate a condensed representation of a message called a message digest, suitable for use as... |
SHA512_Final(3) -- calculate the NIST Secure Hash Standard (version 2)
|
The SHA2 functions implement the NIST Secure Hash Standard, FIPS PUB 180-2. The SHA2 functions are used to generate a condensed representation of a message called a message digest, suitable for use as... |
SHA512_Init(3) -- calculate the NIST Secure Hash Standard (version 2)
|
The SHA2 functions implement the NIST Secure Hash Standard, FIPS PUB 180-2. The SHA2 functions are used to generate a condensed representation of a message called a message digest, suitable for use as... |
SHA512_Pad(3) -- calculate the NIST Secure Hash Standard (version 2)
|
The SHA2 functions implement the NIST Secure Hash Standard, FIPS PUB 180-2. The SHA2 functions are used to generate a condensed representation of a message called a message digest, suitable for use as... |
SHA512_Update(3) -- calculate the NIST Secure Hash Standard (version 2)
|
The SHA2 functions implement the NIST Secure Hash Standard, FIPS PUB 180-2. The SHA2 functions are used to generate a condensed representation of a message called a message digest, suitable for use as... |
show_panel(3) -- panel stack extension for curses
|
Panels are curses(3) windows with the added feature of depth. Panel functions allow the use of stacked windows and ensure the proper portions of each window and the curses stdscr window are hidden or ... |
sigaddset(3) -- manipulate signal sets
|
These functions manipulate signal sets stored in a sigset_t. Either sigemptyset() or sigfillset() must be called for every object of type sigset_t before any other use of the object. sigemptyset() and... |
sigblock(3) -- block signals
|
This interface is made obsolete by: sigprocmask(2). sigblock() adds the signals specified in mask to the set of signals currently being blocked from delivery. Signals are blocked if the corresponding ... |
sigdelset(3) -- manipulate signal sets
|
These functions manipulate signal sets stored in a sigset_t. Either sigemptyset() or sigfillset() must be called for every object of type sigset_t before any other use of the object. sigemptyset() and... |
sigemptyset(3) -- manipulate signal sets
|
These functions manipulate signal sets stored in a sigset_t. Either sigemptyset() or sigfillset() must be called for every object of type sigset_t before any other use of the object. sigemptyset() and... |
sigfillset(3) -- manipulate signal sets
|
These functions manipulate signal sets stored in a sigset_t. Either sigemptyset() or sigfillset() must be called for every object of type sigset_t before any other use of the object. sigemptyset() and... |
siginterrupt(3) -- allow signals to interrupt system calls
|
The siginterrupt() function is used to change the system call restart behavior when a system call is interrupted by the specified signal. If flag is false (0), system calls will be restarted if they a... |
sigismember(3) -- manipulate signal sets
|
These functions manipulate signal sets stored in a sigset_t. Either sigemptyset() or sigfillset() must be called for every object of type sigset_t before any other use of the object. sigemptyset() and... |
siglongjmp(3) -- non-local jumps
|
The sigsetjmp(), setjmp(), and _setjmp() functions save their calling environment in env. Each of these functions returns 0. The corresponding longjmp() functions restore the environment saved by the ... |
sigmask(3) -- block signals
|
This interface is made obsolete by: sigprocmask(2). sigblock() adds the signals specified in mask to the set of signals currently being blocked from delivery. Signals are blocked if the corresponding ... |
signal(3) -- simplified software signal facilities
|
The signal() and bsd_signal() facilities are simplified interfaces to the more general sigaction(2) facility. The bsd_signal() interface is provided for source compatibility only. It is mainly used on... |
signal_add(3) -- execute a function when a specific event occurs
|
The event API provides a mechanism to execute a function when a specific event on a file descriptor occurs or after a given time has passed. The event API needs to be initialized with event_init() bef... |
signal_del(3) -- execute a function when a specific event occurs
|
The event API provides a mechanism to execute a function when a specific event on a file descriptor occurs or after a given time has passed. The event API needs to be initialized with event_init() bef... |
signal_initialized(3) -- execute a function when a specific event occurs
|
The event API provides a mechanism to execute a function when a specific event on a file descriptor occurs or after a given time has passed. The event API needs to be initialized with event_init() bef... |
signal_pending(3) -- execute a function when a specific event occurs
|
The event API provides a mechanism to execute a function when a specific event on a file descriptor occurs or after a given time has passed. The event API needs to be initialized with event_init() bef... |
signal_set(3) -- execute a function when a specific event occurs
|
The event API provides a mechanism to execute a function when a specific event on a file descriptor occurs or after a given time has passed. The event API needs to be initialized with event_init() bef... |
significand(3) -- IEEE test functions
|
These functions allow users to test conformance to IEEE Std 754-1985. Their use is not otherwise recommended. logb(x) returns x's exponent n, a signed integer converted to double-precision floating-p... |
significandf(3) -- IEEE test functions
|
These functions allow users to test conformance to IEEE Std 754-1985. Their use is not otherwise recommended. logb(x) returns x's exponent n, a signed integer converted to double-precision floating-p... |
sigpause(3) -- atomically release blocked signals and wait for interrupt
|
This interface is made obsolete by sigsuspend(2). sigpause() assigns sigmask to the set of masked signals and then waits for a signal to arrive; on return the set of masked signals is restored. sigmas... |
sigsetjmp(3) -- non-local jumps
|
The sigsetjmp(), setjmp(), and _setjmp() functions save their calling environment in env. Each of these functions returns 0. The corresponding longjmp() functions restore the environment saved by the ... |
sigsetmask(3) -- set current signal mask
|
This interface is made obsoleted by: sigprocmask(2). sigsetmask() sets the current signal mask. Signals are blocked from delivery if the corresponding bit in mask is a 1; the macro sigmask() is provid... |
sigsetops(3) -- manipulate signal sets
|
These functions manipulate signal sets stored in a sigset_t. Either sigemptyset() or sigfillset() must be called for every object of type sigset_t before any other use of the object. sigemptyset() and... |
sigvec(3) -- software signal facilities
|
This interface is made obsolete by sigaction(2). The system defines a set of signals that may be delivered to a process. Signal delivery resembles the occurrence of a hardware interrupt: the signal is... |
sigwait(3) -- synchronously accept a signal
|
The sigwait() function selects a pending signal from set, atomically clears it from the system's set of pending signals, and returns that signal number in the location referenced by sig. If prior to ... |
SIMPLEQ_EMPTY(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
SIMPLEQ_END(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
SIMPLEQ_ENTRY(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
SIMPLEQ_FIRST(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
SIMPLEQ_FOREACH(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
SIMPLEQ_HEAD(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
SIMPLEQ_HEAD_INITIALIZER(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
SIMPLEQ_INIT(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
SIMPLEQ_INSERT_AFTER(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
SIMPLEQ_INSERT_HEAD(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
SIMPLEQ_INSERT_TAIL(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
SIMPLEQ_NEXT(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
SIMPLEQ_REMOVE_HEAD(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
sin(3) -- sine functions
|
The sin() function computes the sine of x (measured in radians). The sinf() function is a single precision version of sin(). A large magnitude argument may yield a result with little or no significanc... |
sinf(3) -- sine functions
|
The sin() function computes the sine of x (measured in radians). The sinf() function is a single precision version of sin(). A large magnitude argument may yield a result with little or no significanc... |
sinh(3) -- hyperbolic sine functions
|
The sinh() function computes the hyperbolic sine of x. The sinhf() function is a single precision version of sinh(). |
sinhf(3) -- hyperbolic sine functions
|
The sinh() function computes the hyperbolic sine of x. The sinhf() function is a single precision version of sinh(). |
skey(3) -- S/Key library functions
|
These functions implement the S/Key one time password authentication mechanism. The atob8() function converts the 16-byte hex string in to an 8-byte binary array stored in out. The atob8() function re... |
skeychallenge(3) -- S/Key library functions
|
These functions implement the S/Key one time password authentication mechanism. The atob8() function converts the 16-byte hex string in to an 8-byte binary array stored in out. The atob8() function re... |
skeychallenge2(3) -- S/Key library functions
|
These functions implement the S/Key one time password authentication mechanism. The atob8() function converts the 16-byte hex string in to an 8-byte binary array stored in out. The atob8() function re... |
skeygetnext(3) -- S/Key library functions
|
These functions implement the S/Key one time password authentication mechanism. The atob8() function converts the 16-byte hex string in to an 8-byte binary array stored in out. The atob8() function re... |
skeylookup(3) -- S/Key library functions
|
These functions implement the S/Key one time password authentication mechanism. The atob8() function converts the 16-byte hex string in to an 8-byte binary array stored in out. The atob8() function re... |
skeyverify(3) -- S/Key library functions
|
These functions implement the S/Key one time password authentication mechanism. The atob8() function converts the 16-byte hex string in to an 8-byte binary array stored in out. The atob8() function re... |
skeyzero(3) -- S/Key library functions
|
These functions implement the S/Key one time password authentication mechanism. The atob8() function converts the 16-byte hex string in to an 8-byte binary array stored in out. The atob8() function re... |
skey_authenticate(3) -- S/Key library functions
|
These functions implement the S/Key one time password authentication mechanism. The atob8() function converts the 16-byte hex string in to an 8-byte binary array stored in out. The atob8() function re... |
skey_get_algorithm(3) -- S/Key library functions
|
These functions implement the S/Key one time password authentication mechanism. The atob8() function converts the 16-byte hex string in to an 8-byte binary array stored in out. The atob8() function re... |
skey_haskey(3) -- S/Key library functions
|
These functions implement the S/Key one time password authentication mechanism. The atob8() function converts the 16-byte hex string in to an 8-byte binary array stored in out. The atob8() function re... |
skey_keyinfo(3) -- S/Key library functions
|
These functions implement the S/Key one time password authentication mechanism. The atob8() function converts the 16-byte hex string in to an 8-byte binary array stored in out. The atob8() function re... |
skey_passcheck(3) -- S/Key library functions
|
These functions implement the S/Key one time password authentication mechanism. The atob8() function converts the 16-byte hex string in to an 8-byte binary array stored in out. The atob8() function re... |
skey_set_algorithm(3) -- S/Key library functions
|
These functions implement the S/Key one time password authentication mechanism. The atob8() function converts the 16-byte hex string in to an 8-byte binary array stored in out. The atob8() function re... |
skey_unlock(3) -- S/Key library functions
|
These functions implement the S/Key one time password authentication mechanism. The atob8() function converts the 16-byte hex string in to an 8-byte binary array stored in out. The atob8() function re... |
skipspace(3) -- S/Key library functions
|
These functions implement the S/Key one time password authentication mechanism. The atob8() function converts the 16-byte hex string in to an 8-byte binary array stored in out. The atob8() function re... |
sleep(3) -- suspend process execution for interval of seconds
|
The sleep() function suspends execution of the calling process until either the number of seconds specified by seconds have elapsed or a signal is delivered to the calling process and its action is to... |
SLIST_EMPTY(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
SLIST_END(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
SLIST_ENTRY(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
SLIST_FIRST(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
SLIST_FOREACH(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
SLIST_FOREACH_PREVPTR(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
SLIST_HEAD(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
SLIST_HEAD_INITIALIZER(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
SLIST_INIT(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
SLIST_INSERT_AFTER(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
SLIST_INSERT_HEAD(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
SLIST_NEXT(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
SLIST_REMOVE(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
SLIST_REMOVE_HEAD(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
SLIST_REMOVE_NEXT(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
slk_attr(3) -- curses soft label routines
|
The slk* functions manipulate the set of soft function-key labels that exist on many terminals. For those terminals that do not have soft labels, curses takes over the bottom line of stdscr, reducing ... |
slk_attroff(3) -- curses soft label routines
|
The slk* functions manipulate the set of soft function-key labels that exist on many terminals. For those terminals that do not have soft labels, curses takes over the bottom line of stdscr, reducing ... |
slk_attron(3) -- curses soft label routines
|
The slk* functions manipulate the set of soft function-key labels that exist on many terminals. For those terminals that do not have soft labels, curses takes over the bottom line of stdscr, reducing ... |
slk_attrset(3) -- curses soft label routines
|
The slk* functions manipulate the set of soft function-key labels that exist on many terminals. For those terminals that do not have soft labels, curses takes over the bottom line of stdscr, reducing ... |
slk_attr_off(3) -- curses soft label routines
|
The slk* functions manipulate the set of soft function-key labels that exist on many terminals. For those terminals that do not have soft labels, curses takes over the bottom line of stdscr, reducing ... |
slk_attr_on(3) -- curses soft label routines
|
The slk* functions manipulate the set of soft function-key labels that exist on many terminals. For those terminals that do not have soft labels, curses takes over the bottom line of stdscr, reducing ... |
slk_attr_set(3) -- curses soft label routines
|
The slk* functions manipulate the set of soft function-key labels that exist on many terminals. For those terminals that do not have soft labels, curses takes over the bottom line of stdscr, reducing ... |
slk_clear(3) -- curses soft label routines
|
The slk* functions manipulate the set of soft function-key labels that exist on many terminals. For those terminals that do not have soft labels, curses takes over the bottom line of stdscr, reducing ... |
slk_color(3) -- curses soft label routines
|
The slk* functions manipulate the set of soft function-key labels that exist on many terminals. For those terminals that do not have soft labels, curses takes over the bottom line of stdscr, reducing ... |
slk_init(3) -- curses soft label routines
|
The slk* functions manipulate the set of soft function-key labels that exist on many terminals. For those terminals that do not have soft labels, curses takes over the bottom line of stdscr, reducing ... |
slk_label(3) -- curses soft label routines
|
The slk* functions manipulate the set of soft function-key labels that exist on many terminals. For those terminals that do not have soft labels, curses takes over the bottom line of stdscr, reducing ... |
slk_noutrefresh(3) -- curses soft label routines
|
The slk* functions manipulate the set of soft function-key labels that exist on many terminals. For those terminals that do not have soft labels, curses takes over the bottom line of stdscr, reducing ... |
slk_refresh(3) -- curses soft label routines
|
The slk* functions manipulate the set of soft function-key labels that exist on many terminals. For those terminals that do not have soft labels, curses takes over the bottom line of stdscr, reducing ... |
slk_restore(3) -- curses soft label routines
|
The slk* functions manipulate the set of soft function-key labels that exist on many terminals. For those terminals that do not have soft labels, curses takes over the bottom line of stdscr, reducing ... |
slk_set(3) -- curses soft label routines
|
The slk* functions manipulate the set of soft function-key labels that exist on many terminals. For those terminals that do not have soft labels, curses takes over the bottom line of stdscr, reducing ... |
slk_touch(3) -- curses soft label routines
|
The slk* functions manipulate the set of soft function-key labels that exist on many terminals. For those terminals that do not have soft labels, curses takes over the bottom line of stdscr, reducing ... |
snprintf(3) -- formatted output conversion
|
The printf() family of functions produce output according to the given format as described below. This format may contain ``conversion specifiers''; the results of such conversions, if any, depend o... |
SPLAY_EMPTY(3) -- implementations of splay and redblack trees
|
These macros define data structures for different types of trees: splay trees and red-black trees. In the macro definitions, TYPE is the name tag of a user defined structure that must contain a field ... |
SPLAY_ENTRY(3) -- implementations of splay and redblack trees
|
These macros define data structures for different types of trees: splay trees and red-black trees. In the macro definitions, TYPE is the name tag of a user defined structure that must contain a field ... |
SPLAY_FIND(3) -- implementations of splay and redblack trees
|
These macros define data structures for different types of trees: splay trees and red-black trees. In the macro definitions, TYPE is the name tag of a user defined structure that must contain a field ... |
SPLAY_FOREACH(3) -- implementations of splay and redblack trees
|
These macros define data structures for different types of trees: splay trees and red-black trees. In the macro definitions, TYPE is the name tag of a user defined structure that must contain a field ... |
SPLAY_GENERATE(3) -- implementations of splay and redblack trees
|
These macros define data structures for different types of trees: splay trees and red-black trees. In the macro definitions, TYPE is the name tag of a user defined structure that must contain a field ... |
SPLAY_HEAD(3) -- implementations of splay and redblack trees
|
These macros define data structures for different types of trees: splay trees and red-black trees. In the macro definitions, TYPE is the name tag of a user defined structure that must contain a field ... |
SPLAY_INIT(3) -- implementations of splay and redblack trees
|
These macros define data structures for different types of trees: splay trees and red-black trees. In the macro definitions, TYPE is the name tag of a user defined structure that must contain a field ... |
SPLAY_INITIALIZER(3) -- implementations of splay and redblack trees
|
These macros define data structures for different types of trees: splay trees and red-black trees. In the macro definitions, TYPE is the name tag of a user defined structure that must contain a field ... |
SPLAY_INSERT(3) -- implementations of splay and redblack trees
|
These macros define data structures for different types of trees: splay trees and red-black trees. In the macro definitions, TYPE is the name tag of a user defined structure that must contain a field ... |
SPLAY_LEFT(3) -- implementations of splay and redblack trees
|
These macros define data structures for different types of trees: splay trees and red-black trees. In the macro definitions, TYPE is the name tag of a user defined structure that must contain a field ... |
SPLAY_MAX(3) -- implementations of splay and redblack trees
|
These macros define data structures for different types of trees: splay trees and red-black trees. In the macro definitions, TYPE is the name tag of a user defined structure that must contain a field ... |
SPLAY_MIN(3) -- implementations of splay and redblack trees
|
These macros define data structures for different types of trees: splay trees and red-black trees. In the macro definitions, TYPE is the name tag of a user defined structure that must contain a field ... |
SPLAY_NEXT(3) -- implementations of splay and redblack trees
|
These macros define data structures for different types of trees: splay trees and red-black trees. In the macro definitions, TYPE is the name tag of a user defined structure that must contain a field ... |
SPLAY_PROTOTYPE(3) -- implementations of splay and redblack trees
|
These macros define data structures for different types of trees: splay trees and red-black trees. In the macro definitions, TYPE is the name tag of a user defined structure that must contain a field ... |
SPLAY_REMOVE(3) -- implementations of splay and redblack trees
|
These macros define data structures for different types of trees: splay trees and red-black trees. In the macro definitions, TYPE is the name tag of a user defined structure that must contain a field ... |
SPLAY_RIGHT(3) -- implementations of splay and redblack trees
|
These macros define data structures for different types of trees: splay trees and red-black trees. In the macro definitions, TYPE is the name tag of a user defined structure that must contain a field ... |
SPLAY_ROOT(3) -- implementations of splay and redblack trees
|
These macros define data structures for different types of trees: splay trees and red-black trees. In the macro definitions, TYPE is the name tag of a user defined structure that must contain a field ... |
sprintf(3) -- formatted output conversion
|
The printf() family of functions produce output according to the given format as described below. This format may contain ``conversion specifiers''; the results of such conversions, if any, depend o... |
sqr(3) -- BIGNUM library internal functions
|
This page documents the internal functions used by the OpenSSL BIGNUM implementation. They are described here to facilitate debugging and extending the library. They are not to be used by applications... |
sqrt(3) -- cube root and square root functions
|
The cbrt() function computes the cube root of x. The cbrtf() function is a single precision version of cbrt(). The sqrt() function computes the non-negative square root of x. The sqrtf() function is a... |
sqrtf(3) -- cube root and square root functions
|
The cbrt() function computes the cube root of x. The cbrtf() function is a single precision version of cbrt(). The sqrt() function computes the non-negative square root of x. The sqrtf() function is a... |
sradixsort(3) -- radix sort
|
The radixsort() and sradixsort() functions are implementations of radix sort. These functions sort an array of nmemb pointers to byte strings. The initial member is referenced by base. The byte string... |
srand(3) -- bad random number generator
|
These interfaces are obsoleted by random(3). The rand() function computes a sequence of pseudo-random integers in the range of 0 to RAND_MAX (as defined by the header file ). The srand() fun... |
srand48(3) -- pseudo-random number generators and initialization routines
|
The rand48() family of functions generates pseudo-random numbers using a linear congruential algorithm working on integers 48 bits in size. The particular formula employed is r(n+1) = (a * r(n) + c) m... |
srandom(3) -- better random number generator; routines for changing generators
|
The random() function uses a non-linear additive feedback random number generator employing a default table of size 31 long integers to return successive pseudo-random numbers in the range from 0 to (... |
srandomdev(3) -- better random number generator; routines for changing generators
|
The random() function uses a non-linear additive feedback random number generator employing a default table of size 31 long integers to return successive pseudo-random numbers in the range from 0 to (... |
sscanf(3) -- input format conversion
|
The scanf() family of functions read input according to the given format as described below. This format may contain ``conversion specifiers''; the results of such conversions, if any, are stored th... |
ssl(3) -- OpenSSL SSL/TLS library
|
|
SSLeay(3) -- get OpenSSL version number
|
OPENSSL_VERSION_NUMBER is a numeric release version identifier: MMNNFFPPS: major minor fix patch status The status nibble has one of the values 0 for development, 1 to e for betas 1 to 14, and f for r... |
SSLeay_add_ssl_algorithms(3) -- initialize SSL library by registering algorithms
|
SSL_library_init() registers the available ciphers and digests. OpenSSL_add_ssl_algorithms() and SSLeay_add_ssl_algo- rithms() are synonyms for SSL_library_init(). |
SSLeay_version(3) -- get OpenSSL version number
|
OPENSSL_VERSION_NUMBER is a numeric release version identifier: MMNNFFPPS: major minor fix patch status The status nibble has one of the values 0 for development, 1 to e for betas 1 to 14, and f for r... |
SSL_accept(3) -- wait for a TLS/SSL client to initiate a TLS/SSL handshake
|
SSL_accept() waits for a TLS/SSL client to initiate the TLS/SSL handshake. The communication channel must already have been set and assigned to the ssl by setting an underlying BIO. |
SSL_add_client_CA(3) -- set list of CAs sent to the client when requesting a client certificate
|
SSL_CTX_set_client_CA_list() sets the list of CAs sent to the client when requesting a client certificate for ctx. SSL_set_client_CA_list() sets the list of CAs sent to the client when requesting a cl... |
SSL_add_session(3) -- manipulate session cache
|
SSL_CTX_add_session() adds the session c to the context ctx. The reference count for session c is incremented by 1. If a session with the same session id already exists, the old session is removed by ... |
SSL_alert_desc_string(3) -- get textual description of alert information
|
SSL_alert_type_string() returns a one letter string indicating the type of the alert specified by value. SSL_alert_type_string_long() returns a string indicating the type of the alert specified by val... |
SSL_alert_desc_string_long(3) -- get textual description of alert information
|
SSL_alert_type_string() returns a one letter string indicating the type of the alert specified by value. SSL_alert_type_string_long() returns a string indicating the type of the alert specified by val... |
SSL_alert_type_string(3) -- get textual description of alert information
|
SSL_alert_type_string() returns a one letter string indicating the type of the alert specified by value. SSL_alert_type_string_long() returns a string indicating the type of the alert specified by val... |
SSL_alert_type_string_long(3) -- get textual description of alert information
|
SSL_alert_type_string() returns a one letter string indicating the type of the alert specified by value. SSL_alert_type_string_long() returns a string indicating the type of the alert specified by val... |
SSL_callback_ctrl(3) -- internal handling functions for SSL_CTX and SSL objects
|
The SSL_*_ctrl() family of functions is used to manipulate settings of the SSL_CTX and SSL objects. Depending on the command cmd the arguments larg, parg, or fp are evaluated. These functions should n... |
SSL_check_private_key(3) -- load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_CIPHER_description(3) -- get SSL_CIPHER properties
|
SSL_CIPHER_get_name() returns a pointer to the name of cipher. If the argument is the NULL pointer, a pointer to the constant value "NONE" is returned. SSL_CIPHER_get_bits() returns the number of se... |
SSL_CIPHER_get_bits(3) -- get SSL_CIPHER properties
|
SSL_CIPHER_get_name() returns a pointer to the name of cipher. If the argument is the NULL pointer, a pointer to the constant value "NONE" is returned. SSL_CIPHER_get_bits() returns the number of se... |
SSL_CIPHER_get_name(3) -- get SSL_CIPHER properties
|
SSL_CIPHER_get_name() returns a pointer to the name of cipher. If the argument is the NULL pointer, a pointer to the constant value "NONE" is returned. SSL_CIPHER_get_bits() returns the number of se... |
SSL_CIPHER_get_version(3) -- get SSL_CIPHER properties
|
SSL_CIPHER_get_name() returns a pointer to the name of cipher. If the argument is the NULL pointer, a pointer to the constant value "NONE" is returned. SSL_CIPHER_get_bits() returns the number of se... |
SSL_clear(3) -- reset SSL object to allow another connection
|
Reset ssl to allow another connection. All settings (method, ciphers, BIOs) are kept. |
SSL_COMP_add_compression_method(3) -- handle SSL/TLS integrated compression methods
|
SSL_COMP_add_compression_method() adds the compression method cm with the identifier id to the list of available compression methods. This list is globally maintained for all SSL operations within thi... |
SSL_connect(3) -- initiate the TLS/SSL handshake with an TLS/SSL server
|
SSL_connect() initiates the TLS/SSL handshake with a server. The communication channel must already have been set and assigned to the ssl by setting an underlying BIO. |
SSL_ctrl(3) -- internal handling functions for SSL_CTX and SSL objects
|
The SSL_*_ctrl() family of functions is used to manipulate settings of the SSL_CTX and SSL objects. Depending on the command cmd the arguments larg, parg, or fp are evaluated. These functions should n... |
SSL_CTX_add_client_CA(3) -- set list of CAs sent to the client when requesting a client certificate
|
SSL_CTX_set_client_CA_list() sets the list of CAs sent to the client when requesting a client certificate for ctx. SSL_set_client_CA_list() sets the list of CAs sent to the client when requesting a cl... |
SSL_CTX_add_extra_chain_cert(3) -- add certificate to chain
|
SSL_CTX_add_extra_chain_cert() adds the certificate x509 to the certificate chain presented together with the certificate. Several certificates can be added one after the other. |
SSL_CTX_add_session(3) -- manipulate session cache
|
SSL_CTX_add_session() adds the session c to the context ctx. The reference count for session c is incremented by 1. If a session with the same session id already exists, the old session is removed by ... |
SSL_CTX_callback_ctrl(3) -- internal handling functions for SSL_CTX and SSL objects
|
The SSL_*_ctrl() family of functions is used to manipulate settings of the SSL_CTX and SSL objects. Depending on the command cmd the arguments larg, parg, or fp are evaluated. These functions should n... |
SSL_CTX_check_private_key(3) -- load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_CTX_ctrl(3) -- internal handling functions for SSL_CTX and SSL objects
|
The SSL_*_ctrl() family of functions is used to manipulate settings of the SSL_CTX and SSL objects. Depending on the command cmd the arguments larg, parg, or fp are evaluated. These functions should n... |
SSL_CTX_flush_sessions(3) -- remove expired sessions
|
SSL_CTX_flush_sessions() causes a run through the session cache of ctx to remove sessions expired at time tm. SSL_flush_sessions() is a synonym for SSL_CTX_flush_ses- sions(). |
SSL_CTX_free(3) -- free an allocated SSL_CTX object
|
SSL_CTX_free() decrements the reference count of ctx, and removes the SSL_CTX object pointed to by ctx and frees up the allocated memory if the the reference count has reached 0. It also calls the fre... |
SSL_CTX_get_cert_store(3) -- manipulate X509 certificate verification storage
|
SSL_CTX_set_cert_store() sets/replaces the certificate verification storage of ctx to/with store. If another X509_STORE object is currently set in ctx, it will be X509_STORE_free()ed. SSL_CTX_get_cert... |
SSL_CTX_get_client_CA_list(3) -- get list of client CAs
|
SSL_CTX_get_client_CA_list() returns the list of client CAs explicitly set for ctx using SSL_CTX_set_client_CA_list(3). SSL_get_client_CA_list() returns the list of client CAs explicitly set for ssl u... |
SSL_CTX_get_ex_data(3) -- internal application specific data functions
|
Several OpenSSL structures can have application specific data attached to them. These functions are used internally by OpenSSL to manipulate application specific data attached to a specific structure.... |
SSL_CTX_get_ex_new_index(3) -- internal application specific data functions
|
Several OpenSSL structures can have application specific data attached to them. These functions are used internally by OpenSSL to manipulate application specific data attached to a specific structure.... |
SSL_CTX_get_max_cert_list(3) -- manipulate allowed for the peer's certificate chain
|
SSL_CTX_set_max_cert_list() sets the maximum size allowed for the peer's certificate chain for all SSL objects created from ctx to be bytes. The SSL objects inherit the setting valid for ctx a... |
SSL_CTX_get_mode(3) -- manipulate SSL engine mode
|
SSL_CTX_set_mode() adds the mode set via bitmask in mode to ctx. Options already set before are not cleared. SSL_set_mode() adds the mode set via bitmask in mode to ssl. Options already set before are... |
SSL_CTX_get_options(3) -- manipulate SSL engine options
|
SSL_CTX_set_options() adds the options set via bitmask in options to ctx. Options already set before are not cleared! SSL_set_options() adds the options set via bitmask in options to ssl. Options alre... |
SSL_CTX_get_quiet_shutdown(3) -- manipulate shutdown behaviour
|
SSL_CTX_set_quiet_shutdown() sets the "quiet shutdown" flag for ctx to be mode. SSL objects created from ctx inherit the mode valid at the time SSL_new(3) is called. mode may be 0 or 1. SSL_CTX_get_... |
SSL_CTX_get_session_cache_mode(3) -- enable/disable session caching
|
SSL_CTX_set_session_cache_mode() enables/disables session caching by setting the operational mode for ctx to . SSL_CTX_get_session_cache_mode() returns the currently used cache mode. |
SSL_CTX_get_timeout(3) -- manipulate timeout values for session caching
|
SSL_CTX_set_timeout() sets the timeout for newly created sessions for ctx to t. The timeout value t must be given in seconds. SSL_CTX_get_timeout() returns the currently set timeout value for ctx. |
SSL_CTX_get_verify_callback(3) -- get currently set verification parameters
|
SSL_CTX_get_verify_mode() returns the verification mode currently set in ctx. SSL_get_verify_mode() returns the verification mode currently set in ssl. SSL_CTX_get_verify_depth() returns the verificat... |
SSL_CTX_get_verify_depth(3) -- get currently set verification parameters
|
SSL_CTX_get_verify_mode() returns the verification mode currently set in ctx. SSL_get_verify_mode() returns the verification mode currently set in ssl. SSL_CTX_get_verify_depth() returns the verificat... |
SSL_CTX_get_verify_mode(3) -- get currently set verification parameters
|
SSL_CTX_get_verify_mode() returns the verification mode currently set in ctx. SSL_get_verify_mode() returns the verification mode currently set in ssl. SSL_CTX_get_verify_depth() returns the verificat... |
SSL_CTX_load_verify_locations(3) -- set default locations for trusted CA certificates
|
SSL_CTX_load_verify_locations() specifies the locations for ctx, at which CA certificates for verification purposes are located. The certificates available via CAfile and CApath are trusted. |
SSL_CTX_need_tmp_rsa(3) -- handle RSA keys for ephemeral key exchange
|
SSL_CTX_set_tmp_rsa_callback() sets the callback function for ctx to be used when a temporary/ephemeral RSA key is required to tmp_rsa_callback. The callback is inherited by all SSL objects newly crea... |
SSL_CTX_new(3) -- create a new SSL_CTX object as framework for TLS/SSL enabled functions
|
SSL_CTX_new() creates a new SSL_CTX object as framework to establish TLS/SSL enabled connections. |
SSL_CTX_remove_session(3) -- manipulate session cache
|
SSL_CTX_add_session() adds the session c to the context ctx. The reference count for session c is incremented by 1. If a session with the same session id already exists, the old session is removed by ... |
SSL_CTX_sessions(3) -- access internal session cache
|
SSL_CTX_sessions() returns a pointer to the lhash databases containing the internal session cache for ctx. |
SSL_CTX_sess_accept(3) -- obtain session cache statistics
|
SSL_CTX_sess_number() returns the current number of sessions in the internal session cache. SSL_CTX_sess_connect() returns the number of started SSL/TLS handshakes in client mode. SSL_CTX_sess_connect... |
SSL_CTX_sess_accept_good(3) -- obtain session cache statistics
|
SSL_CTX_sess_number() returns the current number of sessions in the internal session cache. SSL_CTX_sess_connect() returns the number of started SSL/TLS handshakes in client mode. SSL_CTX_sess_connect... |
SSL_CTX_sess_accept_renegotiate(3) -- obtain session cache statistics
|
SSL_CTX_sess_number() returns the current number of sessions in the internal session cache. SSL_CTX_sess_connect() returns the number of started SSL/TLS handshakes in client mode. SSL_CTX_sess_connect... |
SSL_CTX_sess_cache_full(3) -- obtain session cache statistics
|
SSL_CTX_sess_number() returns the current number of sessions in the internal session cache. SSL_CTX_sess_connect() returns the number of started SSL/TLS handshakes in client mode. SSL_CTX_sess_connect... |
SSL_CTX_sess_cb_hits(3) -- obtain session cache statistics
|
SSL_CTX_sess_number() returns the current number of sessions in the internal session cache. SSL_CTX_sess_connect() returns the number of started SSL/TLS handshakes in client mode. SSL_CTX_sess_connect... |
SSL_CTX_sess_connect(3) -- obtain session cache statistics
|
SSL_CTX_sess_number() returns the current number of sessions in the internal session cache. SSL_CTX_sess_connect() returns the number of started SSL/TLS handshakes in client mode. SSL_CTX_sess_connect... |
SSL_CTX_sess_connect_good(3) -- obtain session cache statistics
|
SSL_CTX_sess_number() returns the current number of sessions in the internal session cache. SSL_CTX_sess_connect() returns the number of started SSL/TLS handshakes in client mode. SSL_CTX_sess_connect... |
SSL_CTX_sess_connect_renegotiate(3) -- obtain session cache statistics
|
SSL_CTX_sess_number() returns the current number of sessions in the internal session cache. SSL_CTX_sess_connect() returns the number of started SSL/TLS handshakes in client mode. SSL_CTX_sess_connect... |
SSL_CTX_sess_get_cache_size(3) -- manipulate session cache size
|
SSL_CTX_sess_set_cache_size() sets the size of the internal session cache of context ctx to t. SSL_CTX_sess_get_cache_size() returns the currently valid session cache size. |
SSL_CTX_sess_get_get_cb(3) -- provide callback functions for server side external session caching
|
SSL_CTX_sess_set_new_cb() sets the callback function, which is automatically called whenever a new session was negotiated. SSL_CTX_sess_set_remove_cb() sets the callback function, which is automatical... |
SSL_CTX_sess_get_new_cb(3) -- provide callback functions for server side external session caching
|
SSL_CTX_sess_set_new_cb() sets the callback function, which is automatically called whenever a new session was negotiated. SSL_CTX_sess_set_remove_cb() sets the callback function, which is automatical... |
SSL_CTX_sess_get_remove_cb(3) -- provide callback functions for server side external session caching
|
SSL_CTX_sess_set_new_cb() sets the callback function, which is automatically called whenever a new session was negotiated. SSL_CTX_sess_set_remove_cb() sets the callback function, which is automatical... |
SSL_CTX_sess_hits(3) -- obtain session cache statistics
|
SSL_CTX_sess_number() returns the current number of sessions in the internal session cache. SSL_CTX_sess_connect() returns the number of started SSL/TLS handshakes in client mode. SSL_CTX_sess_connect... |
SSL_CTX_sess_misses(3) -- obtain session cache statistics
|
SSL_CTX_sess_number() returns the current number of sessions in the internal session cache. SSL_CTX_sess_connect() returns the number of started SSL/TLS handshakes in client mode. SSL_CTX_sess_connect... |
SSL_CTX_sess_number(3) -- obtain session cache statistics
|
SSL_CTX_sess_number() returns the current number of sessions in the internal session cache. SSL_CTX_sess_connect() returns the number of started SSL/TLS handshakes in client mode. SSL_CTX_sess_connect... |
SSL_CTX_sess_set_cache_size(3) -- manipulate session cache size
|
SSL_CTX_sess_set_cache_size() sets the size of the internal session cache of context ctx to t. SSL_CTX_sess_get_cache_size() returns the currently valid session cache size. |
SSL_CTX_sess_set_get_cb(3) -- provide callback functions for server side external session caching
|
SSL_CTX_sess_set_new_cb() sets the callback function, which is automatically called whenever a new session was negotiated. SSL_CTX_sess_set_remove_cb() sets the callback function, which is automatical... |
SSL_CTX_sess_set_new_cb(3) -- provide callback functions for server side external session caching
|
SSL_CTX_sess_set_new_cb() sets the callback function, which is automatically called whenever a new session was negotiated. SSL_CTX_sess_set_remove_cb() sets the callback function, which is automatical... |
SSL_CTX_sess_set_remove(3) -- provide callback functions for server side external session caching
|
SSL_CTX_sess_set_new_cb() sets the callback function, which is automatically called whenever a new session was negotiated. SSL_CTX_sess_set_remove_cb() sets the callback function, which is automatical... |
SSL_CTX_sess_timeouts(3) -- obtain session cache statistics
|
SSL_CTX_sess_number() returns the current number of sessions in the internal session cache. SSL_CTX_sess_connect() returns the number of started SSL/TLS handshakes in client mode. SSL_CTX_sess_connect... |
SSL_CTX_set_cert_store(3) -- manipulate X509 certificate verification storage
|
SSL_CTX_set_cert_store() sets/replaces the certificate verification storage of ctx to/with store. If another X509_STORE object is currently set in ctx, it will be X509_STORE_free()ed. SSL_CTX_get_cert... |
SSL_CTX_set_cert_verify_callback(3) -- set peer certificate verification procedure
|
SSL_CTX_set_cert_verify_callback() sets the verification callback function for ctx. SSL objects that are created from ctx inherit the setting valid at the time when SSL_new(3) is called. |
SSL_CTX_set_cipher_list(3) -- choose list of available SSL_CIPHERs
|
SSL_CTX_set_cipher_list() sets the list of available ciphers for ctx using the control string str. The format of the string is described in ciphers(1). The list of ciphers is inherited by all ssl obje... |
SSL_CTX_set_client_CA_list(3) -- set list of CAs sent to the client when requesting a client certificate
|
SSL_CTX_set_client_CA_list() sets the list of CAs sent to the client when requesting a client certificate for ctx. SSL_set_client_CA_list() sets the list of CAs sent to the client when requesting a cl... |
SSL_CTX_set_client_cert_cb(3) -- handle client certificate callback function
|
SSL_CTX_set_client_cert_cb() sets the client_cert_cb() callback, that is called when a client certificate is requested by a server and no certificate was yet ... |
SSL_CTX_set_default_passwd_cb(3) -- set passwd callback for encrypted PEM file handling
|
SSL_CTX_set_default_passwd_cb() sets the default password callback called when loading/storing a PEM certificate with encryption. SSL_CTX_set_default_passwd_cb_userdata() sets a pointer to userdata wh... |
SSL_CTX_set_default_passwd_cb_userdata(3) -- set passwd callback for encrypted PEM file handling
|
SSL_CTX_set_default_passwd_cb() sets the default password callback called when loading/storing a PEM certificate with encryption. SSL_CTX_set_default_passwd_cb_userdata() sets a pointer to userdata wh... |
SSL_CTX_set_ex_data(3) -- internal application specific data functions
|
Several OpenSSL structures can have application specific data attached to them. These functions are used internally by OpenSSL to manipulate application specific data attached to a specific structure.... |
SSL_CTX_set_generate_session_id(3) -- manipulate generation of SSL session IDs (server only)
|
SSL_CTX_set_generate_session_id() sets the callback function for generating new session ids for SSL/TLS sessions for ctx to be cb. SSL_set_generate_session_id() sets the callback function for generati... |
SSL_CTX_set_info_callback(3) -- handle information callback for SSL connections
|
SSL_CTX_set_info_callback() sets the callback function, that can be used to obtain state information for SSL objects created from ctx during connection setup and use. The setting for ctx is overridden... |
SSL_CTX_set_max_cert_list(3) -- manipulate allowed for the peer's certificate chain
|
SSL_CTX_set_max_cert_list() sets the maximum size allowed for the peer's certificate chain for all SSL objects created from ctx to be bytes. The SSL objects inherit the setting valid for ctx a... |
SSL_CTX_set_mode(3) -- manipulate SSL engine mode
|
SSL_CTX_set_mode() adds the mode set via bitmask in mode to ctx. Options already set before are not cleared. SSL_set_mode() adds the mode set via bitmask in mode to ssl. Options already set before are... |
SSL_CTX_set_msg_callback(3) -- install callback for observing protocol messages
|
SSL_CTX_set_msg_callback() or SSL_set_msg_callback() can be used to define a message callback function cb for observing all SSL/TLS protocol messages (such as handshake messages) that are received or ... |
SSL_CTX_set_msg_callback_arg(3) -- install callback for observing protocol messages
|
SSL_CTX_set_msg_callback() or SSL_set_msg_callback() can be used to define a message callback function cb for observing all SSL/TLS protocol messages (such as handshake messages) that are received or ... |
SSL_CTX_set_options(3) -- manipulate SSL engine options
|
SSL_CTX_set_options() adds the options set via bitmask in options to ctx. Options already set before are not cleared! SSL_set_options() adds the options set via bitmask in options to ssl. Options alre... |
SSL_CTX_set_quiet_shutdown(3) -- manipulate shutdown behaviour
|
SSL_CTX_set_quiet_shutdown() sets the "quiet shutdown" flag for ctx to be mode. SSL objects created from ctx inherit the mode valid at the time SSL_new(3) is called. mode may be 0 or 1. SSL_CTX_get_... |
SSL_CTX_set_session_cache_mode(3) -- enable/disable session caching
|
SSL_CTX_set_session_cache_mode() enables/disables session caching by setting the operational mode for ctx to . SSL_CTX_get_session_cache_mode() returns the currently used cache mode. |
SSL_CTX_set_session_id_context(3) -- set context within which session can be reused (server side only)
|
SSL_CTX_set_session_id_context() sets the context sid_ctx of length sid_ctx_len within which a session can be reused for the ctx object. SSL_set_session_id_context() sets the context sid_ctx of length... |
SSL_CTX_set_ssl_version(3) -- choose a new TLS/SSL method
|
SSL_CTX_set_ssl_version() sets a new default TLS/SSL method for SSL objects newly created from this ctx. SSL objects already created with SSL_new(3) are not affected, except when SSL_clear(3) is being... |
SSL_CTX_set_timeout(3) -- manipulate timeout values for session caching
|
SSL_CTX_set_timeout() sets the timeout for newly created sessions for ctx to t. The timeout value t must be given in seconds. SSL_CTX_get_timeout() returns the currently set timeout value for ctx. |
SSL_CTX_set_tmp_dh(3) -- handle DH keys for ephemeral key exchange
|
SSL_CTX_set_tmp_dh_callback() sets the callback function for ctx to be used when a DH parameters are required to tmp_dh_callback. The callback is inherited by all ssl objects created from ctx. SSL_CTX... |
SSL_CTX_set_tmp_dh_callback(3) -- handle DH keys for ephemeral key exchange
|
SSL_CTX_set_tmp_dh_callback() sets the callback function for ctx to be used when a DH parameters are required to tmp_dh_callback. The callback is inherited by all ssl objects created from ctx. SSL_CTX... |
SSL_CTX_set_tmp_rsa(3) -- handle RSA keys for ephemeral key exchange
|
SSL_CTX_set_tmp_rsa_callback() sets the callback function for ctx to be used when a temporary/ephemeral RSA key is required to tmp_rsa_callback. The callback is inherited by all SSL objects newly crea... |
SSL_CTX_set_tmp_rsa_callback(3) -- handle RSA keys for ephemeral key exchange
|
SSL_CTX_set_tmp_rsa_callback() sets the callback function for ctx to be used when a temporary/ephemeral RSA key is required to tmp_rsa_callback. The callback is inherited by all SSL objects newly crea... |
SSL_CTX_set_verify(3) -- set peer certificate verification parameters
|
SSL_CTX_set_verify() sets the verification flags for ctx to be mode and specifies the verify_callback function to be used. If no callback function shall be specified, the NULL pointer can be used for ... |
SSL_CTX_set_verify_depth(3) -- set peer certificate verification parameters
|
SSL_CTX_set_verify() sets the verification flags for ctx to be mode and specifies the verify_callback function to be used. If no callback function shall be specified, the NULL pointer can be used for ... |
SSL_CTX_use_certificate(3) -- load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_CTX_use_certificate_ASN1(3) -- load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_CTX_use_certificate_chain_file(3) -- load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_CTX_use_certificate_file(3) -- load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_CTX_use_PrivateKey(3) -- load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_CTX_use_PrivateKey_ASN1(3) -- load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_CTX_use_PrivateKey_file(3) -- load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_CTX_use_RSAPrivateKey(3) -- load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_CTX_use_RSAPrivateKey_ASN1(3) -- load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_CTX_use_RSAPrivateKey_file(3) -- load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_do_handshake(3) -- perform a TLS/SSL handshake
|
SSL_do_handshake() will wait for a SSL/TLS handshake to take place. If the connection is in client mode, the handshake will be started. The handshake routines may have to be explicitly set in advance ... |
SSL_flush_sessions(3) -- remove expired sessions
|
SSL_CTX_flush_sessions() causes a run through the session cache of ctx to remove sessions expired at time tm. SSL_flush_sessions() is a synonym for SSL_CTX_flush_ses- sions(). |
SSL_free(3) -- free an allocated SSL structure
|
SSL_free() decrements the reference count of ssl, and removes the SSL structure pointed to by ssl and frees up the allocated memory if the reference count has reached 0. |
SSL_get0_session(3) -- retrieve TLS/SSL session data
|
SSL_get_session() returns a pointer to the SSL_SESSION actually used in ssl. The reference count of the SSL_SES- SION is not incremented, so that the pointer can become invalid by other operations. SS... |
SSL_get1_session(3) -- retrieve TLS/SSL session data
|
SSL_get_session() returns a pointer to the SSL_SESSION actually used in ssl. The reference count of the SSL_SES- SION is not incremented, so that the pointer can become invalid by other operations. SS... |
SSL_get_cipher(3) -- get SSL_CIPHER of a connection
|
SSL_get_current_cipher() returns a pointer to an SSL_CIPHER object containing the description of the actually used cipher of a connection established with the ssl object. SSL_get_cipher() and SSL_get_... |
SSL_get_ciphers(3) -- get list of available SSL_CIPHERs
|
SSL_get_ciphers() returns the stack of available SSL_CIPHERs for ssl, sorted by preference. If ssl is NULL or no ciphers are available, NULL is returned. SSL_get_cipher_list() returns a pointer to the... |
SSL_get_cipher_bits(3) -- get SSL_CIPHER of a connection
|
SSL_get_current_cipher() returns a pointer to an SSL_CIPHER object containing the description of the actually used cipher of a connection established with the ssl object. SSL_get_cipher() and SSL_get_... |
SSL_get_cipher_list(3) -- get list of available SSL_CIPHERs
|
SSL_get_ciphers() returns the stack of available SSL_CIPHERs for ssl, sorted by preference. If ssl is NULL or no ciphers are available, NULL is returned. SSL_get_cipher_list() returns a pointer to the... |
SSL_get_cipher_name(3) -- get SSL_CIPHER of a connection
|
SSL_get_current_cipher() returns a pointer to an SSL_CIPHER object containing the description of the actually used cipher of a connection established with the ssl object. SSL_get_cipher() and SSL_get_... |
SSL_get_cipher_version(3) -- get SSL_CIPHER of a connection
|
SSL_get_current_cipher() returns a pointer to an SSL_CIPHER object containing the description of the actually used cipher of a connection established with the ssl object. SSL_get_cipher() and SSL_get_... |
SSL_get_client_CA_list(3) -- get list of client CAs
|
SSL_CTX_get_client_CA_list() returns the list of client CAs explicitly set for ctx using SSL_CTX_set_client_CA_list(3). SSL_get_client_CA_list() returns the list of client CAs explicitly set for ssl u... |
SSL_get_current_cipher(3) -- get SSL_CIPHER of a connection
|
SSL_get_current_cipher() returns a pointer to an SSL_CIPHER object containing the description of the actually used cipher of a connection established with the ssl object. SSL_get_cipher() and SSL_get_... |
SSL_get_default_timeout(3) -- get default session timeout value
|
SSL_get_default_timeout() returns the default timeout value assigned to SSL_SESSION objects negotiated for the protocol valid for ssl. |
SSL_get_error(3) -- obtain result code for TLS/SSL I/O operation
|
SSL_get_error() returns a result code (suitable for the C "switch" statement) for a preceding call to SSL_connect(), SSL_accept(), SSL_do_handshake(), SSL_read(), SSL_peek(), or SSL_write() on ssl. ... |
SSL_get_ex_data(3) -- internal application specific data functions
|
Several OpenSSL structures can have application specific data attached to them. These functions are used internally by OpenSSL to manipulate application specific data attached to a specific structure.... |
SSL_get_ex_data_X509_STORE_CTX_idx(3) -- get ex_data index to access SSL structure from X509_STORE_CTX
|
SSL_get_ex_data_X509_STORE_CTX_idx() returns the index number under which the pointer to the SSL object is stored into the X509_STORE_CTX object. |
SSL_get_ex_new_index(3) -- internal application specific data functions
|
Several OpenSSL structures can have application specific data attached to them. These functions are used internally by OpenSSL to manipulate application specific data attached to a specific structure.... |
SSL_get_fd(3) -- get file descriptor linked to an SSL object
|
SSL_get_fd() returns the file descriptor which is linked to ssl. SSL_get_rfd() and SSL_get_wfd() return the file descriptors for the read or the write channel, which can be different. If the read and ... |
SSL_get_max_cert_list(3) -- manipulate allowed for the peer's certificate chain
|
SSL_CTX_set_max_cert_list() sets the maximum size allowed for the peer's certificate chain for all SSL objects created from ctx to be bytes. The SSL objects inherit the setting valid for ctx a... |
SSL_get_mode(3) -- manipulate SSL engine mode
|
SSL_CTX_set_mode() adds the mode set via bitmask in mode to ctx. Options already set before are not cleared. SSL_set_mode() adds the mode set via bitmask in mode to ssl. Options already set before are... |
SSL_get_options(3) -- manipulate SSL engine options
|
SSL_CTX_set_options() adds the options set via bitmask in options to ctx. Options already set before are not cleared! SSL_set_options() adds the options set via bitmask in options to ssl. Options alre... |
SSL_get_peer_certificate(3) -- get the X509 certificate of the peer
|
SSL_get_peer_certificate() returns a pointer to the X509 certificate the peer presented. If the peer did not present a certificate, NULL is returned. |
SSL_get_peer_cert_chain(3) -- get the X509 certificate chain of the peer
|
SSL_get_peer_cert_chain() returns a pointer to STACKOF(X509) certificates forming the certificate chain of the peer. If called on the client side, the stack also contains the peer's certificate; if c... |
SSL_get_quiet_shutdown(3) -- manipulate shutdown behaviour
|
SSL_CTX_set_quiet_shutdown() sets the "quiet shutdown" flag for ctx to be mode. SSL objects created from ctx inherit the mode valid at the time SSL_new(3) is called. mode may be 0 or 1. SSL_CTX_get_... |
SSL_get_rbio(3) -- get BIO linked to an SSL object
|
SSL_get_rbio() and SSL_get_wbio() return pointers to the BIOs for the read or the write channel, which can be different. The reference count of the BIO is not incremented. |
SSL_get_rfd(3) -- get file descriptor linked to an SSL object
|
SSL_get_fd() returns the file descriptor which is linked to ssl. SSL_get_rfd() and SSL_get_wfd() return the file descriptors for the read or the write channel, which can be different. If the read and ... |
SSL_get_session(3) -- retrieve TLS/SSL session data
|
SSL_get_session() returns a pointer to the SSL_SESSION actually used in ssl. The reference count of the SSL_SES- SION is not incremented, so that the pointer can become invalid by other operations. SS... |
SSL_get_shutdown(3) -- manipulate shutdown state of an SSL connection
|
SSL_set_shutdown() sets the shutdown state of ssl to mode. SSL_get_shutdown() returns the shutdown mode of ssl. |
SSL_get_SSL_CTX(3) -- get the SSL_CTX from which an SSL is created
|
SSL_get_SSL_CTX() returns a pointer to the SSL_CTX object, from which ssl was created with SSL_new(3). |
SSL_get_ssl_method(3) -- choose a new TLS/SSL method
|
SSL_CTX_set_ssl_version() sets a new default TLS/SSL method for SSL objects newly created from this ctx. SSL objects already created with SSL_new(3) are not affected, except when SSL_clear(3) is being... |
SSL_get_time(3) -- retrieve and manipulate session time and timeout settings
|
SSL_SESSION_get_time() returns the time at which the session s was established. The time is given in seconds since the Epoch and therefore compatible to the time delivered by the time() call. SSL_SESS... |
SSL_get_timeout(3) -- retrieve and manipulate session time and timeout settings
|
SSL_SESSION_get_time() returns the time at which the session s was established. The time is given in seconds since the Epoch and therefore compatible to the time delivered by the time() call. SSL_SESS... |
SSL_get_verify_callback(3) -- get currently set verification parameters
|
SSL_CTX_get_verify_mode() returns the verification mode currently set in ctx. SSL_get_verify_mode() returns the verification mode currently set in ssl. SSL_CTX_get_verify_depth() returns the verificat... |
SSL_get_verify_depth(3) -- get currently set verification parameters
|
SSL_CTX_get_verify_mode() returns the verification mode currently set in ctx. SSL_get_verify_mode() returns the verification mode currently set in ssl. SSL_CTX_get_verify_depth() returns the verificat... |
SSL_get_verify_mode(3) -- get currently set verification parameters
|
SSL_CTX_get_verify_mode() returns the verification mode currently set in ctx. SSL_get_verify_mode() returns the verification mode currently set in ssl. SSL_CTX_get_verify_depth() returns the verificat... |
SSL_get_verify_result(3) -- get result of peer certificate verification
|
SSL_get_verify_result() returns the result of the verification of the X509 certificate presented by the peer, if any. |
SSL_get_version(3) -- get the protocol version of a connection.
|
SSL_get_cipher_version() returns the name of the protocol used for the connection ssl. |
SSL_get_wbio(3) -- get BIO linked to an SSL object
|
SSL_get_rbio() and SSL_get_wbio() return pointers to the BIOs for the read or the write channel, which can be different. The reference count of the BIO is not incremented. |
SSL_get_wfd(3) -- get file descriptor linked to an SSL object
|
SSL_get_fd() returns the file descriptor which is linked to ssl. SSL_get_rfd() and SSL_get_wfd() return the file descriptors for the read or the write channel, which can be different. If the read and ... |
SSL_library_init(3) -- initialize SSL library by registering algorithms
|
SSL_library_init() registers the available ciphers and digests. OpenSSL_add_ssl_algorithms() and SSLeay_add_ssl_algo- rithms() are synonyms for SSL_library_init(). |
SSL_load_client_CA_file(3) -- load certificate names from file
|
SSL_load_client_CA_file() reads certificates from file and returns a STACK_OF(X509_NAME) with the subject names found. |
SSL_load_error_strings(3) -- load and free error strings
|
ERR_load_crypto_strings() registers the error strings for all libcrypto functions. SSL_load_error_strings() does the same, but also registers the libssl error strings. One of these functions should be... |
SSL_need_tmp_rsa(3) -- handle RSA keys for ephemeral key exchange
|
SSL_CTX_set_tmp_rsa_callback() sets the callback function for ctx to be used when a temporary/ephemeral RSA key is required to tmp_rsa_callback. The callback is inherited by all SSL objects newly crea... |
SSL_new(3) -- create a new SSL structure for a connection
|
SSL_new() creates a new SSL structure which is needed to hold the data for a TLS/SSL connection. The new structure inherits the settings of the underlying context ctx: connection method (SSLv2/v3/TLSv... |
SSL_pending(3) -- obtain number of readable bytes buffered in an SSL object
|
SSL_pending() returns the number of bytes which are available inside ssl for immediate read. |
SSL_read(3) -- read bytes from a TLS/SSL connection.
|
SSL_read() tries to read num bytes from the specified ssl into the buffer buf. |
SSL_remove_session(3) -- manipulate session cache
|
SSL_CTX_add_session() adds the session c to the context ctx. The reference count for session c is incremented by 1. If a session with the same session id already exists, the old session is removed by ... |
SSL_rstate_string(3) -- get textual description of state of an SSL object during read operation
|
SSL_rstate_string() returns a 2 letter string indicating the current read state of the SSL object ssl. SSL_rstate_string_long() returns a string indicating the current read state of the SSL object ssl... |
SSL_rstate_string_long(3) -- get textual description of state of an SSL object during read operation
|
SSL_rstate_string() returns a 2 letter string indicating the current read state of the SSL object ssl. SSL_rstate_string_long() returns a string indicating the current read state of the SSL object ssl... |
SSL_SESSION_free(3) -- free an allocated SSL_SESSION structure
|
SSL_SESSION_free() decrements the reference count of ses- sion and removes the SSL_SESSION structure pointed to by session and frees up the allocated memory, if the reference count has reached 0. |
SSL_SESSION_get_ex_data(3) -- internal application specific data functions
|
Several OpenSSL structures can have application specific data attached to them. These functions are used internally by OpenSSL to manipulate application specific data attached to a specific structure.... |
SSL_SESSION_get_ex_new_index(3) -- internal application specific data functions
|
Several OpenSSL structures can have application specific data attached to them. These functions are used internally by OpenSSL to manipulate application specific data attached to a specific structure.... |
SSL_SESSION_get_time(3) -- retrieve and manipulate session time and timeout settings
|
SSL_SESSION_get_time() returns the time at which the session s was established. The time is given in seconds since the Epoch and therefore compatible to the time delivered by the time() call. SSL_SESS... |
SSL_SESSION_get_timeout(3) -- retrieve and manipulate session time and timeout settings
|
SSL_SESSION_get_time() returns the time at which the session s was established. The time is given in seconds since the Epoch and therefore compatible to the time delivered by the time() call. SSL_SESS... |
SSL_session_reused(3) -- query whether a reused session was negotiated during handshake
|
Query, whether a reused session was negotiated during the handshake. |
SSL_SESSION_set_ex_data(3) -- internal application specific data functions
|
Several OpenSSL structures can have application specific data attached to them. These functions are used internally by OpenSSL to manipulate application specific data attached to a specific structure.... |
SSL_SESSION_set_time(3) -- retrieve and manipulate session time and timeout settings
|
SSL_SESSION_get_time() returns the time at which the session s was established. The time is given in seconds since the Epoch and therefore compatible to the time delivered by the time() call. SSL_SESS... |
SSL_SESSION_set_timeout(3) -- retrieve and manipulate session time and timeout settings
|
SSL_SESSION_get_time() returns the time at which the session s was established. The time is given in seconds since the Epoch and therefore compatible to the time delivered by the time() call. SSL_SESS... |
SSL_set_accept_state(3) -- prepare SSL object to work in client or server mode
|
SSL_set_connect_state() sets ssl to work in client mode. SSL_set_accept_state() sets ssl to work in server mode. |
SSL_set_bio(3) -- connect the SSL object with a BIO
|
SSL_set_bio() connects the BIOs rbio and wbio for the read and write operations of the TLS/SSL (encrypted) side of ssl. The SSL engine inherits the behaviour of rbio and wbio, respectively. If a BIO i... |
SSL_set_cipher_list(3) -- choose list of available SSL_CIPHERs
|
SSL_CTX_set_cipher_list() sets the list of available ciphers for ctx using the control string str. The format of the string is described in ciphers(1). The list of ciphers is inherited by all ssl obje... |
SSL_set_client_CA_list(3) -- set list of CAs sent to the client when requesting a client certificate
|
SSL_CTX_set_client_CA_list() sets the list of CAs sent to the client when requesting a client certificate for ctx. SSL_set_client_CA_list() sets the list of CAs sent to the client when requesting a cl... |
SSL_set_connect_state(3) -- prepare SSL object to work in client or server mode
|
SSL_set_connect_state() sets ssl to work in client mode. SSL_set_accept_state() sets ssl to work in server mode. |
SSL_set_ex_data(3) -- internal application specific data functions
|
Several OpenSSL structures can have application specific data attached to them. These functions are used internally by OpenSSL to manipulate application specific data attached to a specific structure.... |
SSL_set_fd(3) -- connect the SSL object with a file descriptor
|
SSL_set_fd() sets the file descriptor fd as the input/output facility for the TLS/SSL (encrypted) side of ssl. fd will typically be the socket file descriptor of a network connection. When performing ... |
SSL_set_max_cert_list(3) -- manipulate allowed for the peer's certificate chain
|
SSL_CTX_set_max_cert_list() sets the maximum size allowed for the peer's certificate chain for all SSL objects created from ctx to be bytes. The SSL objects inherit the setting valid for ctx a... |
SSL_set_mode(3) -- manipulate SSL engine mode
|
SSL_CTX_set_mode() adds the mode set via bitmask in mode to ctx. Options already set before are not cleared. SSL_set_mode() adds the mode set via bitmask in mode to ssl. Options already set before are... |
SSL_set_msg_callback(3) -- install callback for observing protocol messages
|
SSL_CTX_set_msg_callback() or SSL_set_msg_callback() can be used to define a message callback function cb for observing all SSL/TLS protocol messages (such as handshake messages) that are received or ... |
SSL_set_msg_callback_arg(3) -- install callback for observing protocol messages
|
SSL_CTX_set_msg_callback() or SSL_set_msg_callback() can be used to define a message callback function cb for observing all SSL/TLS protocol messages (such as handshake messages) that are received or ... |
SSL_set_options(3) -- manipulate SSL engine options
|
SSL_CTX_set_options() adds the options set via bitmask in options to ctx. Options already set before are not cleared! SSL_set_options() adds the options set via bitmask in options to ssl. Options alre... |
SSL_set_quiet_shutdown(3) -- manipulate shutdown behaviour
|
SSL_CTX_set_quiet_shutdown() sets the "quiet shutdown" flag for ctx to be mode. SSL objects created from ctx inherit the mode valid at the time SSL_new(3) is called. mode may be 0 or 1. SSL_CTX_get_... |
SSL_set_rfd(3) -- connect the SSL object with a file descriptor
|
SSL_set_fd() sets the file descriptor fd as the input/output facility for the TLS/SSL (encrypted) side of ssl. fd will typically be the socket file descriptor of a network connection. When performing ... |
SSL_set_session(3) -- set a TLS/SSL session to be used during TLS/SSL connect
|
SSL_set_session() sets session to be used when the TLS/SSL connection is to be established. SSL_set_session() is only useful for TLS/SSL clients. When the session is set, the reference count of sessio... |
SSL_set_session_id_context(3) -- set context within which session can be reused (server side only)
|
SSL_CTX_set_session_id_context() sets the context sid_ctx of length sid_ctx_len within which a session can be reused for the ctx object. SSL_set_session_id_context() sets the context sid_ctx of length... |
SSL_set_shutdown(3) -- manipulate shutdown state of an SSL connection
|
SSL_set_shutdown() sets the shutdown state of ssl to mode. SSL_get_shutdown() returns the shutdown mode of ssl. |
SSL_set_ssl_method(3) -- choose a new TLS/SSL method
|
SSL_CTX_set_ssl_version() sets a new default TLS/SSL method for SSL objects newly created from this ctx. SSL objects already created with SSL_new(3) are not affected, except when SSL_clear(3) is being... |
SSL_set_time(3) -- retrieve and manipulate session time and timeout settings
|
SSL_SESSION_get_time() returns the time at which the session s was established. The time is given in seconds since the Epoch and therefore compatible to the time delivered by the time() call. SSL_SESS... |
SSL_set_timeout(3) -- retrieve and manipulate session time and timeout settings
|
SSL_SESSION_get_time() returns the time at which the session s was established. The time is given in seconds since the Epoch and therefore compatible to the time delivered by the time() call. SSL_SESS... |
SSL_set_tmp_dh(3) -- handle DH keys for ephemeral key exchange
|
SSL_CTX_set_tmp_dh_callback() sets the callback function for ctx to be used when a DH parameters are required to tmp_dh_callback. The callback is inherited by all ssl objects created from ctx. SSL_CTX... |
SSL_set_tmp_dh_callback(3) -- handle DH keys for ephemeral key exchange
|
SSL_CTX_set_tmp_dh_callback() sets the callback function for ctx to be used when a DH parameters are required to tmp_dh_callback. The callback is inherited by all ssl objects created from ctx. SSL_CTX... |
SSL_set_tmp_rsa(3) -- handle RSA keys for ephemeral key exchange
|
SSL_CTX_set_tmp_rsa_callback() sets the callback function for ctx to be used when a temporary/ephemeral RSA key is required to tmp_rsa_callback. The callback is inherited by all SSL objects newly crea... |
SSL_set_tmp_rsa_callback(3) -- handle RSA keys for ephemeral key exchange
|
SSL_CTX_set_tmp_rsa_callback() sets the callback function for ctx to be used when a temporary/ephemeral RSA key is required to tmp_rsa_callback. The callback is inherited by all SSL objects newly crea... |
SSL_set_verify(3) -- set peer certificate verification parameters
|
SSL_CTX_set_verify() sets the verification flags for ctx to be mode and specifies the verify_callback function to be used. If no callback function shall be specified, the NULL pointer can be used for ... |
SSL_set_verify_depth(3) -- set peer certificate verification parameters
|
SSL_CTX_set_verify() sets the verification flags for ctx to be mode and specifies the verify_callback function to be used. If no callback function shall be specified, the NULL pointer can be used for ... |
SSL_set_verify_result(3) -- override result of peer certificate verification
|
SSL_set_verify_result() sets verify_result of the object ssl to be the result of the verification of the X509 certificate presented by the peer, if any. |
SSL_set_wfd(3) -- connect the SSL object with a file descriptor
|
SSL_set_fd() sets the file descriptor fd as the input/output facility for the TLS/SSL (encrypted) side of ssl. fd will typically be the socket file descriptor of a network connection. When performing ... |
SSL_shutdown(3) -- shut down a TLS/SSL connection
|
SSL_shutdown() shuts down an active TLS/SSL connection. It sends the "close notify" shutdown alert to the peer. |
SSL_state_string(3) -- get textual description of state of an SSL object
|
SSL_state_string() returns a 6 letter string indicating the current state of the SSL object ssl. SSL_state_string_long() returns a string indicating the current state of the SSL object ssl. |
SSL_state_string_long(3) -- get textual description of state of an SSL object
|
SSL_state_string() returns a 6 letter string indicating the current state of the SSL object ssl. SSL_state_string_long() returns a string indicating the current state of the SSL object ssl. |
SSL_use_certificate(3) -- load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_use_certificate_ASN1(3) -- load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_use_certificate_file(3) -- load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_use_PrivateKey(3) -- load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_use_PrivateKey_ASN1(3) -- load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_use_PrivateKey_file(3) -- load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_use_RSAPrivateKey(3) -- load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_use_RSAPrivateKey_ASN1(3) -- load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_use_RSAPrivateKey_file(3) -- load certificate and key data
|
These functions load the certificates and private keys into the SSL_CTX or SSL object, respectively. The SSL_CTX_* class of functions loads the certificates and keys into the SSL_CTX object ctx. The i... |
SSL_want(3) -- obtain state information TLS/SSL I/O operation
|
SSL_want() returns state information for the SSL object ssl. The other SSL_want_*() calls are shortcuts for the possible states returned by SSL_want(). |
SSL_want_nothing(3) -- obtain state information TLS/SSL I/O operation
|
SSL_want() returns state information for the SSL object ssl. The other SSL_want_*() calls are shortcuts for the possible states returned by SSL_want(). |
SSL_want_read(3) -- obtain state information TLS/SSL I/O operation
|
SSL_want() returns state information for the SSL object ssl. The other SSL_want_*() calls are shortcuts for the possible states returned by SSL_want(). |
SSL_want_write(3) -- obtain state information TLS/SSL I/O operation
|
SSL_want() returns state information for the SSL object ssl. The other SSL_want_*() calls are shortcuts for the possible states returned by SSL_want(). |
SSL_want_x509_lookup(3) -- obtain state information TLS/SSL I/O operation
|
SSL_want() returns state information for the SSL object ssl. The other SSL_want_*() calls are shortcuts for the possible states returned by SSL_want(). |
SSL_write(3) -- write bytes to a TLS/SSL connection.
|
SSL_write() writes num bytes from the buffer buf into the specified ssl connection. |
standend(3) -- curses character and window attribute control routines
|
These routines manipulate the current attributes of the named window. The current attributes of a window apply to all characters that are written into the window with wad- dch, waddstr and wprintw. At... |
standout(3) -- curses character and window attribute control routines
|
These routines manipulate the current attributes of the named window. The current attributes of a window apply to all characters that are written into the window with wad- dch, waddstr and wprintw. At... |
start_color(3) -- curses color manipulation routines
|
Overview curses support color attributes on terminals with that capability. To use these routines start_color must be called, usually right after initscr. Colors are always used in pairs (referred to ... |
stdarg(3) -- variable argument lists
|
A function may be called with a varying number of arguments of varying types. The include file declares a type (va_list) and defines three macros for stepping through a list of arguments wh... |
stdio(3) -- standard input/output library functions
|
The standard I/O library provides a simple and efficient buffered stream I/O interface. Input and output is mapped into logical data streams and the physical I/O characteristics are concealed. The fun... |
store(3) -- database subroutines
|
These functions provide a dbm-compatible interface to the database access methods described in db(3). Each unique record in the database is a key/content pair, the components of which may be any arbit... |
strcasecmp(3) -- compare strings, ignoring case
|
The strcasecmp() and strncasecmp() functions compare the null-terminated strings s1 and s2 and return an integer greater than, equal to, or less than 0, according to whether s1 is lexicographically gr... |
strcat(3) -- concatenate strings
|
The strcat() and strncat() functions append a copy of the null-terminated string append to the end of the null-terminated string s, then add a terminating ` '. The string s must have sufficient space... |
strchr(3) -- locate first occurrence of a character in a string
|
The strchr() function locates the first occurrence of the character c in the string s. The terminating NUL character is considered part of the string. If c is ` ', strchr() locates the terminating ` ... |
strcmp(3) -- compare strings
|
The strcmp() and strncmp() functions lexicographically compare the nullterminated strings s1 and s2. |
strcoll(3) -- compare strings according to current collation
|
The strcoll() function lexicographically compares the nullterminated strings s1 and s2 according to the current locale collation and returns an integer greater than, equal to, or less than 0, accordin... |
strcpy(3) -- copy strings
|
The strcpy() and strncpy() functions copy the string src to dst (including the terminating ` ' character). strncpy() copies not more than len characters into dst, appending ` ' characters if src is ... |
strcspn(3) -- span the complement of a string
|
The strcspn() function spans the initial part of the nullterminated string s as long as the characters from s do not occur in string charset (it spans the complement of charset). |
strdup(3) -- save a copy of a string
|
The strdup() function allocates sufficient memory for a copy of the string s, does the copy, and returns a pointer to it. The pointer may subsequently be used as an argument to the function free(3). I... |
strerror(3) -- get error message string
|
The strerror() and strerror_r() functions map the error number errnum to a language-dependent error message string. strerror() returns a string containing a maximum of NL_TEXTMAX characters, including... |
strerror_r(3) -- get error message string
|
The strerror() and strerror_r() functions map the error number errnum to a language-dependent error message string. strerror() returns a string containing a maximum of NL_TEXTMAX characters, including... |
strftime(3) -- format date and time
|
The strftime() function formats the information from timeptr into the buffer buf according to the string pointed to by format. The format string consists of zero or more conversion specifications and ... |
string(3) -- string specific functions
|
The string functions manipulate strings terminated by a null byte. See the specific manual pages for more information. For manipulating variable length generic objects as byte strings (without the nul... |
strlcat(3) -- size-bounded string copying and concatenation
|
The strlcpy() and strlcat() functions copy and concatenate strings respectively. They are designed to be safer, more consistent, and less error prone replacements for strncpy(3) and strncat(3). Unlike... |
strlcpy(3) -- size-bounded string copying and concatenation
|
The strlcpy() and strlcat() functions copy and concatenate strings respectively. They are designed to be safer, more consistent, and less error prone replacements for strncpy(3) and strncat(3). Unlike... |
strlen(3) -- find length of a string
|
The strlen() function computes the length of the string s. |
strmode(3) -- convert inode status information into a symbolic string
|
The strmode() function converts a file mode (the type and permission information associated with an inode, see stat(2)) into a symbolic string which is stored in the location referenced by bp. This st... |
strncasecmp(3) -- compare strings, ignoring case
|
The strcasecmp() and strncasecmp() functions compare the null-terminated strings s1 and s2 and return an integer greater than, equal to, or less than 0, according to whether s1 is lexicographically gr... |
strncat(3) -- concatenate strings
|
The strcat() and strncat() functions append a copy of the null-terminated string append to the end of the null-terminated string s, then add a terminating ` '. The string s must have sufficient space... |
strncmp(3) -- compare strings
|
The strcmp() and strncmp() functions lexicographically compare the nullterminated strings s1 and s2. |
strncpy(3) -- copy strings
|
The strcpy() and strncpy() functions copy the string src to dst (including the terminating ` ' character). strncpy() copies not more than len characters into dst, appending ` ' characters if src is ... |
strnvis(3) -- visually encode characters
|
The vis() function copies into dst a string which represents the character c. If c needs no encoding, it is copied in unaltered. The string is null terminated and a pointer to the end of the string is... |
strpbrk(3) -- locate multiple characters in string
|
The strpbrk() function locates in the null-terminated string s the first occurrence of any character in the string charset and returns a pointer to this character. If no characters from charset occur ... |
strptime(3) -- converts a character string to a time value
|
The strptime function converts the character string pointed to by buf to values which are stored in the ``tm'' structure pointed to by tm, using the format specified by format. The format string con... |
strrchr(3) -- locate last occurrence of a character in a string
|
The strrchr() function locates the last occurrence of the character c in the string s. The terminating NUL character is considered part of the string. If c is ` ', strrchr() locates the terminating `... |
strsep(3) -- separate strings
|
The strsep() function locates, in the string referenced by *stringp, the first occurrence of any character in the string delim (or the terminating ` ' character) and replaces it with a ` '. The loca... |
strsignal(3) -- get signal description string
|
The strsignal() function returns a pointer to the languagedependent string describing a signal. The array pointed to is not to be modified by the program, but may be overwritten by subsequent calls to... |
strspn(3) -- span a string
|
The strspn() function spans the initial part of the nullterminated string s as long as the characters from s occur in string charset. |
strstr(3) -- locate a substring in a string
|
The strstr() function locates the first occurrence of the null-terminated string little in the null-terminated string big. If little is the empty string, strstr() returns big; if little occurs nowhere... |
strtod(3) -- convert ASCII string to double
|
The strtod() function converts the initial portion of the string pointed to by nptr to double representation. The expected form of the string is an optional plus (`+') or minus sign (`-') followed b... |
strtofflags(3) -- convert between file flag bits and their string names
|
The fflagstostr() function returns a comma separated string of the file flags represented by flags. If no flags are set a zero length string is returned. If memory cannot be allocated for the return v... |
strtok(3) -- string token operations
|
This interface is obsoleted by strsep(3). The strtok() function is used to isolate sequential tokens in a null-terminated string, str. These tokens are separated in the string by at least one of the c... |
strtok_r(3) -- string token operations
|
This interface is obsoleted by strsep(3). The strtok() function is used to isolate sequential tokens in a null-terminated string, str. These tokens are separated in the string by at least one of the c... |
strtol(3) -- convert string value to a long or long long integer
|
The strtol() function converts the string in nptr to a long value. The strtoll() function converts the string in nptr to a long long value. The strtoq() function is a deprecated equivalent of strtoll(... |
strtoll(3) -- convert string value to a long or long long integer
|
The strtol() function converts the string in nptr to a long value. The strtoll() function converts the string in nptr to a long long value. The strtoq() function is a deprecated equivalent of strtoll(... |
strtonum(3) -- reliably convert string value to an integer
|
The strtonum() function converts the string in nptr to a long long value. The strtonum() function was designed to facilitate safe, robust programming and overcome the shortcomings of the atoi(3) and s... |
strtoq(3) -- convert string value to a long or long long integer
|
The strtol() function converts the string in nptr to a long value. The strtoll() function converts the string in nptr to a long long value. The strtoq() function is a deprecated equivalent of strtoll(... |
strtoul(3) -- convert a string to an unsigned long or unsigned long long integer
|
The strtoul() function converts the string in nptr to an unsigned long value. The strtoull() function converts the string in nptr to an unsigned long long value. The strtouq() function is a deprecated... |
strtoull(3) -- convert a string to an unsigned long or unsigned long long integer
|
The strtoul() function converts the string in nptr to an unsigned long value. The strtoull() function converts the string in nptr to an unsigned long long value. The strtouq() function is a deprecated... |
strtouq(3) -- convert a string to an unsigned long or unsigned long long integer
|
The strtoul() function converts the string in nptr to an unsigned long value. The strtoull() function converts the string in nptr to an unsigned long long value. The strtouq() function is a deprecated... |
strunvis(3) -- decode a visual representation of characters
|
The unvis() and strunvis() functions are used to decode a visual representation of characters, as produced by the vis(3) function, back into the original form. unvis() is called with successive charac... |
strvis(3) -- visually encode characters
|
The vis() function copies into dst a string which represents the character c. If c needs no encoding, it is copied in unaltered. The string is null terminated and a pointer to the end of the string is... |
strvisx(3) -- visually encode characters
|
The vis() function copies into dst a string which represents the character c. If c needs no encoding, it is copied in unaltered. The string is null terminated and a pointer to the end of the string is... |
strxfrm(3) -- transform a string under locale
|
The strxfrm() function does something horrible (see ANSI standard). In this implementation it just copies. |
stty(3) -- set and get terminal state (defunct)
|
These interfaces are obsoleted by ioctl(2). They are available from the compatibility library, libcompat. The stty() function sets the state of the terminal associated with fd. The gtty() function ret... |
subpad(3) -- create and display curses pads
|
The newpad routine creates and returns a pointer to a new pad data structure with the given number of lines, nlines, and columns, ncols. A pad is like a window, except that it is not restricted by the... |
subwin(3) -- create curses windows
|
Calling newwin creates and returns a pointer to a new window with the given number of lines and columns. The upper left-hand corner of the window is at line begin_y, column begin_x. If either nlines o... |
svcerr_auth(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svcerr_decode(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svcerr_noproc(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svcerr_noprog(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svcerr_progvers(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svcerr_systemerr(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svcerr_weakauth(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svcfd_create(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svcraw_create(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svctcp_create(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svcudp_bufcreate(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svc_destroy(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svc_fds(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svc_fdset(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svc_freeargs(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svc_getargs(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svc_getcaller(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svc_getreq(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svc_getreqset(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svc_getreqset2(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svc_getreq_common(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svc_getreq_poll(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svc_max_pollfd(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svc_pollfd(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svc_register(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svc_run(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svc_sendreply(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
svc_unregister(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
swab(3) -- swap adjacent bytes
|
The function swab() copies len bytes from the location referenced by src to the location referenced by dst, swapping adjacent bytes. The argument len must be an even number. |
swap16(3) -- convert values between different byte orderings
|
These routines convert 16, 32 and 64-bit quantities between different byte orderings. The ``swap'' functions reverse the byte ordering of the given quantity, the others converts either from/to the n... |
swap32(3) -- convert values between different byte orderings
|
These routines convert 16, 32 and 64-bit quantities between different byte orderings. The ``swap'' functions reverse the byte ordering of the given quantity, the others converts either from/to the n... |
swap64(3) -- convert values between different byte orderings
|
These routines convert 16, 32 and 64-bit quantities between different byte orderings. The ``swap'' functions reverse the byte ordering of the given quantity, the others converts either from/to the n... |
syncok(3) -- create curses windows
|
Calling newwin creates and returns a pointer to a new window with the given number of lines and columns. The upper left-hand corner of the window is at line begin_y, column begin_x. If either nlines o... |
sysconf(3) -- get configurable system variables
|
This interface is defined by IEEE Std 1003.1-1988 (``POSIX''). A far more complete interface is available using sysctl(3). The sysconf() function provides a method for applications to determine the ... |
sysctl(3) -- get or set system information
|
The sysctl() function retrieves system information and allows processes with appropriate privileges to set system information. The information available from sysctl() consists of integers, strings, an... |
sysexits(3) -- preferable exit codes for programs
|
According to style(9), it is not good practice to call exit(3) with arbitrary values to indicate a failure condition when ending a program. Instead, the pre-defined exit codes from sysexits should be ... |
syslog(3) -- control system log
|
The syslog() function writes message to the system message logger. The message is then written to the system console, log files, logged-in users, or forwarded to other machines as appropriate (see sys... |
syslog_r(3) -- control system log
|
The syslog() function writes message to the system message logger. The message is then written to the system console, log files, logged-in users, or forwarded to other machines as appropriate (see sys... |
system(3) -- pass a command to the shell
|
The system() function hands the argument string to the command interpreter sh(1). The calling process waits for the shell to finish executing the command, ignoring SIGINT and SIGQUIT, and blocking SIG... |
sys_siglist(3) -- system signal messages
|
The psignal() function locates the descriptive message string for the given signal number sig and writes it to the standard error. If the argument s is not NULL it is written to the standard error fil... |
sys_signame(3) -- system signal messages
|
The psignal() function locates the descriptive message string for the given signal number sig and writes it to the standard error. If the argument s is not NULL it is written to the standard error fil... |
TAILQ_EMPTY(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
TAILQ_END(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
TAILQ_ENTRY(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
TAILQ_FIRST(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
TAILQ_FOREACH(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
TAILQ_FOREACH_REVERSE(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
TAILQ_HEAD(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
TAILQ_HEAD_INITIALIZER(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
TAILQ_INIT(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
TAILQ_INSERT_AFTER(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
TAILQ_INSERT_BEFORE(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
TAILQ_INSERT_HEAD(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
TAILQ_INSERT_TAIL(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
TAILQ_LAST(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
TAILQ_NEXT(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
TAILQ_PREV(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
TAILQ_REMOVE(3) -- implementations of
|
These macros define and operate on five types of data structures: singlylinked lists, simple queues, lists, tail queues, and circular queues. All five structures support the following functionality: 1... |
tan(3) -- tangent functions
|
The tan() function computes the tangent of x (measured in radians). The tanf() function is a single precision version of tan(). A large magnitude argument may yield a result with little or no signific... |
tanf(3) -- tangent functions
|
The tan() function computes the tangent of x (measured in radians). The tanf() function is a single precision version of tan(). A large magnitude argument may yield a result with little or no signific... |
tanh(3) -- hyperbolic tangent functions
|
The tanh() function computes the hyperbolic tangent of x. The tanhf() function is a single precision version of tanh(). For a discussion of error due to roundoff, see math(3). |
tanhf(3) -- hyperbolic tangent functions
|
The tanh() function computes the hyperbolic tangent of x. The tanhf() function is a single precision version of tanh(). For a discussion of error due to roundoff, see math(3). |
tcdrain(3) -- line control functions
|
The tcdrain() function waits until all output written to the terminal referenced by fd has been transmitted to the terminal. The tcflow() function suspends transmission of data to or the reception of ... |
tcflow(3) -- line control functions
|
The tcdrain() function waits until all output written to the terminal referenced by fd has been transmitted to the terminal. The tcflow() function suspends transmission of data to or the reception of ... |
tcflush(3) -- line control functions
|
The tcdrain() function waits until all output written to the terminal referenced by fd has been transmitted to the terminal. The tcflow() function suspends transmission of data to or the reception of ... |
tcgetattr(3) -- manipulating the termios structure
|
The cfmakeraw(), tcgetattr(), and tcsetattr() functions are provided for getting and setting the termios structure. The cfgetispeed(), cfsetispeed(), cfgetospeed(), cfsetospeed(), and cfsetspeed() fun... |
tcgetpgrp(3) -- get foreground process group ID
|
The tcgetpgrp() function returns the value of the process group ID of the foreground process group associated with the terminal device. If there is no foreground process group, tcgetpgrp() returns an ... |
tcsendbreak(3) -- line control functions
|
The tcdrain() function waits until all output written to the terminal referenced by fd has been transmitted to the terminal. The tcflow() function suspends transmission of data to or the reception of ... |
tcsetattr(3) -- manipulating the termios structure
|
The cfmakeraw(), tcgetattr(), and tcsetattr() functions are provided for getting and setting the termios structure. The cfgetispeed(), cfsetispeed(), cfgetospeed(), cfsetospeed(), and cfsetspeed() fun... |
tcsetpgrp(3) -- set foreground process group ID
|
If the process has a controlling terminal, the tcsetpgrp() function sets the foreground process group ID associated with the terminal device to pgrp_id. The terminal device associated with fd must be ... |
tdelete(3) -- manipulate binary search trees
|
The tdelete(), tfind(), tsearch(), and twalk() functions manage binary search trees based on algorithms T and D from Knuth (6.2.2). The comparison function passed in by the user has the same style of ... |
telldir(3) -- directory operations
|
The opendir() function opens the directory named by filename, associates a directory stream with it, and returns a pointer to be used to identify the directory stream in subsequent operations. A null ... |
tempnam(3) -- temporary file routines
|
The tmpfile() function returns a pointer to a stream associated with a file descriptor returned by the routine mkstemp(3). The created file is unlinked before tmpfile() returns, causing the file to be... |
termattrs(3) -- curses environment query routines
|
The baudrate routine returns the output speed of the terminal. The number returned is in bits per second, for example 9600, and is an integer. The erasechar routine returns the user's current erase c... |
termcap(3) -- direct curses interface to the terminfo capability database
|
These routines are included as a conversion aid for programs that use the termcap library. Their parameters are the same and the routines are emulated using the terminfo database. Thus, they can only ... |
terminfo(3) -- curses interfaces to terminfo database
|
These low-level routines must be called by programs that have to deal directly with the terminfo database to handle certain terminal capabilities, such as programming function keys. For all other func... |
termname(3) -- curses environment query routines
|
The baudrate routine returns the output speed of the terminal. The number returned is in bits per second, for example 9600, and is an integer. The erasechar routine returns the user's current erase c... |
tfind(3) -- manipulate binary search trees
|
The tdelete(), tfind(), tsearch(), and twalk() functions manage binary search trees based on algorithms T and D from Knuth (6.2.2). The comparison function passed in by the user has the same style of ... |
tgetent(3) -- direct curses interface to the terminfo capability database
|
These routines are included as a conversion aid for programs that use the termcap library. Their parameters are the same and the routines are emulated using the terminfo database. Thus, they can only ... |
tgetflag(3) -- direct curses interface to the terminfo capability database
|
These routines are included as a conversion aid for programs that use the termcap library. Their parameters are the same and the routines are emulated using the terminfo database. Thus, they can only ... |
tgetnum(3) -- direct curses interface to the terminfo capability database
|
These routines are included as a conversion aid for programs that use the termcap library. Their parameters are the same and the routines are emulated using the terminfo database. Thus, they can only ... |
tgetstr(3) -- direct curses interface to the terminfo capability database
|
These routines are included as a conversion aid for programs that use the termcap library. Their parameters are the same and the routines are emulated using the terminfo database. Thus, they can only ... |
tgoto(3) -- direct curses interface to the terminfo capability database
|
These routines are included as a conversion aid for programs that use the termcap library. Their parameters are the same and the routines are emulated using the terminfo database. Thus, they can only ... |
tigetflag(3) -- curses interfaces to terminfo database
|
These low-level routines must be called by programs that have to deal directly with the terminfo database to handle certain terminal capabilities, such as programming function keys. For all other func... |
tigetnum(3) -- curses interfaces to terminfo database
|
These low-level routines must be called by programs that have to deal directly with the terminfo database to handle certain terminal capabilities, such as programming function keys. For all other func... |
tigetstr(3) -- curses interfaces to terminfo database
|
These low-level routines must be called by programs that have to deal directly with the terminfo database to handle certain terminal capabilities, such as programming function keys. For all other func... |
time(3) -- get time of day
|
The time() function returns the value of time in seconds since 0 hours, 0 minutes, 0 seconds, January 1, 1970, Coordinated Universal Time (UTC). A copy of the time value may be saved to the area indic... |
time2posix(3) -- convert seconds since the Epoch
|
IEEE Standard 1003.1 (POSIX) legislates that a time_t value of 536457599 shall correspond to "Wed Dec 31 23:59:59 UTC 1986." This effectively implies that a POSIX time_t cannot include leap seconds ... |
timegm(3) -- convert date and time to ASCII
|
The ctime() function converts a time_t, pointed to by clock, representing the time in seconds since 00:00:00 UTC, 1970-01-01, and returns a pointer to a 26-character string of the form Thu Nov 24 18:2... |
timelocal(3) -- convert date and time to ASCII
|
The ctime() function converts a time_t, pointed to by clock, representing the time in seconds since 00:00:00 UTC, 1970-01-01, and returns a pointer to a 26-character string of the form Thu Nov 24 18:2... |
timeout(3) -- curses input options
|
Normally, the tty driver buffers typed characters until a newline or carriage return is typed. The cbreak routine disables line buffering and erase/kill character-processing (interrupt and flow contro... |
timeradd(3) -- get/set value of interval timer
|
The system provides each process with three interval timers, defined in . The getitimer() call returns the current value for the timer specified in which in the structure at value. The set... |
timerclear(3) -- get/set value of interval timer
|
The system provides each process with three interval timers, defined in . The getitimer() call returns the current value for the timer specified in which in the structure at value. The set... |
timercmp(3) -- get/set value of interval timer
|
The system provides each process with three interval timers, defined in . The getitimer() call returns the current value for the timer specified in which in the structure at value. The set... |
timerisset(3) -- get/set value of interval timer
|
The system provides each process with three interval timers, defined in . The getitimer() call returns the current value for the timer specified in which in the structure at value. The set... |
timersub(3) -- get/set value of interval timer
|
The system provides each process with three interval timers, defined in . The getitimer() call returns the current value for the timer specified in which in the structure at value. The set... |
times(3) -- process times
|
This interface is obsoleted by getrusage(2) and gettimeofday(2). The times() function returns the value of time in CLK_TCKs of a second since 0 hours, 0 minutes, 0 seconds, January 1, 1970, Coordinate... |
timezone(3) -- return the timezone abbreviation
|
This interface is for compatibility only; it is impossible to reliably map timezone()'s arguments to a time zone abbreviation (see ctime(3)). The timezone() function returns a pointer to a time zone ... |
tmpfile(3) -- temporary file routines
|
The tmpfile() function returns a pointer to a stream associated with a file descriptor returned by the routine mkstemp(3). The created file is unlinked before tmpfile() returns, causing the file to be... |
tmpnam(3) -- temporary file routines
|
The tmpfile() function returns a pointer to a stream associated with a file descriptor returned by the routine mkstemp(3). The created file is unlinked before tmpfile() returns, causing the file to be... |
toascii(3) -- convert a byte to 7-bit ASCII
|
The toascii() function strips all but the low 7 bits from a letter, including parity or other marker bits. |
tolower(3) -- upper case to lower case letter conversion
|
The tolower() function converts an upper-case letter to the corresponding lower-case letter. The _tolower() function is identical to tolower() except that c must be an upper-case letter. |
top_panel(3) -- panel stack extension for curses
|
Panels are curses(3) windows with the added feature of depth. Panel functions allow the use of stacked windows and ensure the proper portions of each window and the curses stdscr window are hidden or ... |
top_row(3) -- set and get current_menu_item
|
The function set_current_item sets the current item (the item on which the menu cursor is positioned). cur- rent_item returns a pointer to the current item in the given menu. The function set_top_row ... |
touchline(3) -- curses refresh control routines
|
The touchwin and touchline routines throw away all optimization information about which parts of the window have been touched, by pretending that the entire window has been drawn on. This is sometimes... |
touchwin(3) -- curses refresh control routines
|
The touchwin and touchline routines throw away all optimization information about which parts of the window have been touched, by pretending that the entire window has been drawn on. This is sometimes... |
toupper(3) -- lower case to upper case letter conversion
|
The toupper() function converts a lower-case letter to the corresponding upper-case letter. The _toupper() function is identical to toupper() except that c must be a lower-case letter. |
tparam(3) -- curses interfaces to terminfo database
|
These low-level routines must be called by programs that have to deal directly with the terminfo database to handle certain terminal capabilities, such as programming function keys. For all other func... |
tparm(3) -- curses interfaces to terminfo database
|
These low-level routines must be called by programs that have to deal directly with the terminfo database to handle certain terminal capabilities, such as programming function keys. For all other func... |
tputs(3) -- direct curses interface to the terminfo capability database
|
These routines are included as a conversion aid for programs that use the termcap library. Their parameters are the same and the routines are emulated using the terminfo database. Thus, they can only ... |
tree(3) -- implementations of splay and redblack trees
|
These macros define data structures for different types of trees: splay trees and red-black trees. In the macro definitions, TYPE is the name tag of a user defined structure that must contain a field ... |
tsearch(3) -- manipulate binary search trees
|
The tdelete(), tfind(), tsearch(), and twalk() functions manage binary search trees based on algorithms T and D from Knuth (6.2.2). The comparison function passed in by the user has the same style of ... |
ttyname(3) -- get name of associated terminal (tty) from file descriptor
|
These functions operate on the system file descriptors for terminal type devices. These descriptors are not related to the standard I/O FILE typedef, but refer to the special device files found in /de... |
ttyname_r(3) -- get name of associated terminal (tty) from file descriptor
|
These functions operate on the system file descriptors for terminal type devices. These descriptors are not related to the standard I/O FILE typedef, but refer to the special device files found in /de... |
ttyslot(3) -- get name of associated terminal (tty) from file descriptor
|
These functions operate on the system file descriptors for terminal type devices. These descriptors are not related to the standard I/O FILE typedef, but refer to the special device files found in /de... |
twalk(3) -- manipulate binary search trees
|
The tdelete(), tfind(), tsearch(), and twalk() functions manage binary search trees based on algorithms T and D from Knuth (6.2.2). The comparison function passed in by the user has the same style of ... |
typeahead(3) -- curses input options
|
Normally, the tty driver buffers typed characters until a newline or carriage return is typed. The cbreak routine disables line buffering and erase/kill character-processing (interrupt and flow contro... |
tzset(3) -- initialize time conversion information
|
tzset() uses the value of the environment variable TZ to set time conversion information used by localtime(3). If TZ does not appear in the environment, the best available approximation to local wall ... |
tzsetwall(3) -- initialize time conversion information
|
tzset() uses the value of the environment variable TZ to set time conversion information used by localtime(3). If TZ does not appear in the environment, the best available approximation to local wall ... |
ualarm(3) -- schedule signal after specified time
|
This is a simplified interface to setitimer(2). The ualarm() function waits a count of microseconds before asserting the terminating signal SIGALRM. System activity or time used in processing the call... |
uname(3) -- get system identification
|
The uname() function stores null-terminated strings of information identifying the current system into the structure referenced by name. The utsname structure is defined in the header ... |
uncompress(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
unctrl(3) -- miscellaneous curses utility routines
|
The unctrl macro expands to a character string which is a printable representation of the character c. Control characters are displayed in the ^X notation. Printing characters are displayed as is. The... |
ungetc(3) -- un-get character from input stream
|
The ungetc() function pushes the character c (converted to an unsigned char) back onto the input stream pointed to by stream. The pushed-backed characters will be returned by subsequent reads on the s... |
ungetch(3) -- get (or push back) characters from curses terminal keyboard
|
The getch, wgetch, mvgetch and mvwgetch, routines read a character from the window. In no-delay mode, if no input is waiting, the value ERR is returned. In delay mode, the program waits until the syst... |
ungetmouse(3) -- mouse interface through curses
|
These functions provide an interface to mouse events from curses(3). Mouse events are represented by KEY_MOUSE pseudo-key values in the wgetch input stream. To make mouse events visible, use the mouse... |
unpost_form(3) -- write or erase forms from associated subwindows
|
The function post_form displays a form to its associated subwindow. To trigger physical display of the subwindow, use refresh or some equivalent curses routine (the implicit doupdate triggered by an c... |
unpost_menu(3) -- write or erase menus from associated subwindows
|
The function post_menu displays a menu to its associated subwindow. To trigger physical display of the subwindow, use refresh or some equivalent curses routine (the implicit doupdate triggered by an c... |
unsetenv(3) -- environment variable functions
|
These functions set, unset, and fetch environment variables from the host environment list. For compatibility with differing environment conventions, the given arguments name and value may be appended... |
untouchwin(3) -- curses refresh control routines
|
The touchwin and touchline routines throw away all optimization information about which parts of the window have been touched, by pretending that the entire window has been drawn on. This is sometimes... |
unvis(3) -- decode a visual representation of characters
|
The unvis() and strunvis() functions are used to decode a visual representation of characters, as produced by the vis(3) function, back into the original form. unvis() is called with successive charac... |
update_panels(3) -- panel stack extension for curses
|
Panels are curses(3) windows with the added feature of depth. Panel functions allow the use of stacked windows and ensure the proper portions of each window and the curses stdscr window are hidden or ... |
usbhid(3) -- USB HID access routines
|
The usbhid library provides routines to extract data from USB Human Interface Devices. INTRODUCTIONÂ Â Â Â [Toc]Â Â Â Â [Back] USB HID devices send and receive data laid out in a device dependent way. The usb... |
user_from_uid(3) -- cache password and group entries
|
The user_from_uid() function returns the user name associated with the argument uid. The user name is cached so that multiple calls with the same uid do not require additional calls to getpwuid(3). If... |
use_default_colors(3) -- use terminal's default colors
|
The use_default_colors() and assume_default_colors() functions are extensions to the curses library. They are used with terminals that support ISO 6429 color, or equivalent. These terminals allow the ... |
use_env(3) -- miscellaneous curses utility routines
|
The unctrl macro expands to a character string which is a printable representation of the character c. Control characters are displayed in the ^X notation. Printing characters are displayed as is. The... |
use_extended_names(3) -- miscellaneous curses extensions
|
These functions are extensions to the curses library which do not fit easily into other categories. Use curses_version() to get the version number, including patch level of the library, e.g., 5.0.1999... |
usleep(3) -- suspend execution for interval of microseconds
|
The usleep() function suspends execution of the calling process for microseconds microseconds of time. System activity or time spent in processing the call may lengthen the sleep slightly. This routin... |
utime(3) -- set file times
|
This interface is obsoleted by utimes(2). The utime() function sets the access and modification times of the named file. If timep is NULL, the access and modification times are set to the current time... |
uucplock(3) -- acquire and release control of a serial device
|
The uu_lock() function attempts to create a lock file called /var/spool/lock/LCK.. with a suffix given by the passed ttyname. If the file already exists, it is expected to contain the process ID of th... |
uu_lock(3) -- acquire and release control of a serial device
|
The uu_lock() function attempts to create a lock file called /var/spool/lock/LCK.. with a suffix given by the passed ttyname. If the file already exists, it is expected to contain the process ID of th... |
uu_lockerr(3) -- acquire and release control of a serial device
|
The uu_lock() function attempts to create a lock file called /var/spool/lock/LCK.. with a suffix given by the passed ttyname. If the file already exists, it is expected to contain the process ID of th... |
uu_lock_txfr(3) -- acquire and release control of a serial device
|
The uu_lock() function attempts to create a lock file called /var/spool/lock/LCK.. with a suffix given by the passed ttyname. If the file already exists, it is expected to contain the process ID of th... |
uu_unlock(3) -- acquire and release control of a serial device
|
The uu_lock() function attempts to create a lock file called /var/spool/lock/LCK.. with a suffix given by the passed ttyname. If the file already exists, it is expected to contain the process ID of th... |
valloc(3) -- aligned memory allocation function
|
The valloc() function is obsoleted by the current version of malloc(3), which aligns page-sized and larger allocations. The valloc() function allocates size bytes aligned on a page boundary. It is imp... |
varargs(3) -- variable argument lists
|
A function may be called with a varying number of arguments of varying types. The include file declares a type (va_list) and defines three macros for stepping through a list of arguments wh... |
vasprintf(3) -- formatted output conversion
|
The printf() family of functions produce output according to the given format as described below. This format may contain ``conversion specifiers''; the results of such conversions, if any, depend o... |
va_arg(3) -- variable argument lists
|
A function may be called with a varying number of arguments of varying types. The include file declares a type (va_list) and defines three macros for stepping through a list of arguments wh... |
va_copy(3) -- variable argument lists
|
A function may be called with a varying number of arguments of varying types. The include file declares a type (va_list) and defines three macros for stepping through a list of arguments wh... |
va_end(3) -- variable argument lists
|
A function may be called with a varying number of arguments of varying types. The include file declares a type (va_list) and defines three macros for stepping through a list of arguments wh... |
va_start(3) -- variable argument lists
|
A function may be called with a varying number of arguments of varying types. The include file declares a type (va_list) and defines three macros for stepping through a list of arguments wh... |
verr(3) -- formatted error messages
|
The err() and warn() family of functions display a formatted error message on the standard error output. In all cases, the last component of the program name, followed by a colon (`:') character and ... |
verrx(3) -- formatted error messages
|
The err() and warn() family of functions display a formatted error message on the standard error output. In all cases, the last component of the program name, followed by a colon (`:') character and ... |
vfprintf(3) -- formatted output conversion
|
The printf() family of functions produce output according to the given format as described below. This format may contain ``conversion specifiers''; the results of such conversions, if any, depend o... |
vfscanf(3) -- input format conversion
|
The scanf() family of functions read input according to the given format as described below. This format may contain ``conversion specifiers''; the results of such conversions, if any, are stored th... |
vidattr(3) -- curses interfaces to terminfo database
|
These low-level routines must be called by programs that have to deal directly with the terminfo database to handle certain terminal capabilities, such as programming function keys. For all other func... |
vidputs(3) -- curses interfaces to terminfo database
|
These low-level routines must be called by programs that have to deal directly with the terminfo database to handle certain terminal capabilities, such as programming function keys. For all other func... |
vis(3) -- visually encode characters
|
The vis() function copies into dst a string which represents the character c. If c needs no encoding, it is copied in unaltered. The string is null terminated and a pointer to the end of the string is... |
vline(3) -- create curses borders, horizontal and vertical lines
|
The border, wborder and box routines draw a box around the edges of a window. The argument ls is a character and attributes used for the left side of the border, rs - right side, ts - top side, bs - b... |
vprintf(3) -- formatted output conversion
|
The printf() family of functions produce output according to the given format as described below. This format may contain ``conversion specifiers''; the results of such conversions, if any, depend o... |
vscanf(3) -- input format conversion
|
The scanf() family of functions read input according to the given format as described below. This format may contain ``conversion specifiers''; the results of such conversions, if any, are stored th... |
vsnprintf(3) -- formatted output conversion
|
The printf() family of functions produce output according to the given format as described below. This format may contain ``conversion specifiers''; the results of such conversions, if any, depend o... |
vsprintf(3) -- formatted output conversion
|
The printf() family of functions produce output according to the given format as described below. This format may contain ``conversion specifiers''; the results of such conversions, if any, depend o... |
vsscanf(3) -- input format conversion
|
The scanf() family of functions read input according to the given format as described below. This format may contain ``conversion specifiers''; the results of such conversions, if any, are stored th... |
vsyslog(3) -- control system log
|
The syslog() function writes message to the system message logger. The message is then written to the system console, log files, logged-in users, or forwarded to other machines as appropriate (see sys... |
vsyslog_r(3) -- control system log
|
The syslog() function writes message to the system message logger. The message is then written to the system console, log files, logged-in users, or forwarded to other machines as appropriate (see sys... |
vwarn(3) -- formatted error messages
|
The err() and warn() family of functions display a formatted error message on the standard error output. In all cases, the last component of the program name, followed by a colon (`:') character and ... |
vwarnx(3) -- formatted error messages
|
The err() and warn() family of functions display a formatted error message on the standard error output. In all cases, the last component of the program name, followed by a colon (`:') character and ... |
vwprintw(3) -- print formatted output in curses windows
|
The printw, wprintw, mvprintw and mvwprintw routines are analogous to printf [see printf(3)]. In effect, the string that would be output by printf is output instead as though waddstr were used on the ... |
vwscanw(3) -- convert formatted input from a curses window
|
The scanw, wscanw and mvscanw routines are analogous to scanf [see scanf(3)]. The effect of these routines is as though wgetstr were called on the window, and the resulting line used as input for ssca... |
vw_printw(3) -- print formatted output in curses windows
|
The printw, wprintw, mvprintw and mvwprintw routines are analogous to printf [see printf(3)]. In effect, the string that would be output by printf is output instead as though waddstr were used on the ... |
vw_scanw(3) -- convert formatted input from a curses window
|
The scanw, wscanw and mvscanw routines are analogous to scanf [see scanf(3)]. The effect of these routines is as though wgetstr were called on the window, and the resulting line used as input for ssca... |
waddch(3) -- add a character (with attributes) to a curses window, then advance the cursor
|
The addch, waddch, mvaddch and mvwaddch routines put the character ch into the given window at its current window position, which is then advanced. They are analogous to putchar in stdio(3). If the ad... |
waddchnstr(3) -- add a string of characters (and attributes) to a curses window
|
These routines copy chstr into the window image structure at and after the current cursor position. The four routines with n as the last argument copy at most n elements, but no more than will fit on ... |
waddchstr(3) -- add a string of characters (and attributes) to a curses window
|
These routines copy chstr into the window image structure at and after the current cursor position. The four routines with n as the last argument copy at most n elements, but no more than will fit on ... |
waddnstr(3) -- add a string of characters to a curses window and advance cursor
|
These routines write the characters of the (null-terminated) character string str on the given window. It is similar to calling waddch once for each character in the string. The four routines with n a... |
waddstr(3) -- add a string of characters to a curses window and advance cursor
|
These routines write the characters of the (null-terminated) character string str on the given window. It is similar to calling waddch once for each character in the string. The four routines with n a... |
warn(3) -- formatted error messages
|
The err() and warn() family of functions display a formatted error message on the standard error output. In all cases, the last component of the program name, followed by a colon (`:') character and ... |
warnx(3) -- formatted error messages
|
The err() and warn() family of functions display a formatted error message on the standard error output. In all cases, the last component of the program name, followed by a colon (`:') character and ... |
wattroff(3) -- curses character and window attribute control routines
|
These routines manipulate the current attributes of the named window. The current attributes of a window apply to all characters that are written into the window with wad- dch, waddstr and wprintw. At... |
wattron(3) -- curses character and window attribute control routines
|
These routines manipulate the current attributes of the named window. The current attributes of a window apply to all characters that are written into the window with wad- dch, waddstr and wprintw. At... |
wattrset(3) -- curses character and window attribute control routines
|
These routines manipulate the current attributes of the named window. The current attributes of a window apply to all characters that are written into the window with wad- dch, waddstr and wprintw. At... |
wattr_get(3) -- curses character and window attribute control routines
|
These routines manipulate the current attributes of the named window. The current attributes of a window apply to all characters that are written into the window with wad- dch, waddstr and wprintw. At... |
wattr_off(3) -- curses character and window attribute control routines
|
These routines manipulate the current attributes of the named window. The current attributes of a window apply to all characters that are written into the window with wad- dch, waddstr and wprintw. At... |
wattr_on(3) -- curses character and window attribute control routines
|
These routines manipulate the current attributes of the named window. The current attributes of a window apply to all characters that are written into the window with wad- dch, waddstr and wprintw. At... |
wattr_set(3) -- curses character and window attribute control routines
|
These routines manipulate the current attributes of the named window. The current attributes of a window apply to all characters that are written into the window with wad- dch, waddstr and wprintw. At... |
wbkgd(3) -- curses window background manipulation routines
|
The bkgdset and wbkgdset routines manipulate the background of the named window. The window background is a chtype consisting of any combination of attributes (i.e., rendition) and a character. The at... |
wbkgdset(3) -- curses window background manipulation routines
|
The bkgdset and wbkgdset routines manipulate the background of the named window. The window background is a chtype consisting of any combination of attributes (i.e., rendition) and a character. The at... |
wborder(3) -- create curses borders, horizontal and vertical lines
|
The border, wborder and box routines draw a box around the edges of a window. The argument ls is a character and attributes used for the left side of the border, rs - right side, ts - top side, bs - b... |
wchgat(3) -- curses character and window attribute control routines
|
These routines manipulate the current attributes of the named window. The current attributes of a window apply to all characters that are written into the window with wad- dch, waddstr and wprintw. At... |
wclear(3) -- clear all or part of a curses window
|
The erase and werase routines copy blanks to every position in the window, clearing the screen. The clear and wclear routines are like erase and werase, but they also call clearok, so that the screen ... |
wclrtobot(3) -- clear all or part of a curses window
|
The erase and werase routines copy blanks to every position in the window, clearing the screen. The clear and wclear routines are like erase and werase, but they also call clearok, so that the screen ... |
wclrtoeol(3) -- clear all or part of a curses window
|
The erase and werase routines copy blanks to every position in the window, clearing the screen. The clear and wclear routines are like erase and werase, but they also call clearok, so that the screen ... |
wcolor_set(3) -- curses character and window attribute control routines
|
These routines manipulate the current attributes of the named window. The current attributes of a window apply to all characters that are written into the window with wad- dch, waddstr and wprintw. At... |
wcursyncup(3) -- create curses windows
|
Calling newwin creates and returns a pointer to a new window with the given number of lines and columns. The upper left-hand corner of the window is at line begin_y, column begin_x. If either nlines o... |
wdelch(3) -- delete character under the cursor in a curses window
|
These routines delete the character under the cursor; all characters to the right of the cursor on the same line are moved to the left one position and the last character on the line is filled with a ... |
wdeleteln(3) -- delete and insert lines in a curses window
|
The deleteln and wdeleteln routines delete the line under the cursor in the window; all lines below the current line are moved up one line. The bottom line of the window is cleared. The cursor positio... |
wechochar(3) -- add a character (with attributes) to a curses window, then advance the cursor
|
The addch, waddch, mvaddch and mvwaddch routines put the character ch into the given window at its current window position, which is then advanced. They are analogous to putchar in stdio(3). If the ad... |
wenclose(3) -- mouse interface through curses
|
These functions provide an interface to mouse events from curses(3). Mouse events are represented by KEY_MOUSE pseudo-key values in the wgetch input stream. To make mouse events visible, use the mouse... |
werase(3) -- clear all or part of a curses window
|
The erase and werase routines copy blanks to every position in the window, clearing the screen. The clear and wclear routines are like erase and werase, but they also call clearok, so that the screen ... |
wgetch(3) -- get (or push back) characters from curses terminal keyboard
|
The getch, wgetch, mvgetch and mvwgetch, routines read a character from the window. In no-delay mode, if no input is waiting, the value ERR is returned. In delay mode, the program waits until the syst... |
wgetnstr(3) -- accept character strings from curses terminal keyboard
|
The function getstr is equivalent to a series of calls to getch, until a newline or carriage return is received (the terminating character is not included in the returned string). The resulting value ... |
wgetstr(3) -- accept character strings from curses terminal keyboard
|
The function getstr is equivalent to a series of calls to getch, until a newline or carriage return is received (the terminating character is not included in the returned string). The resulting value ... |
whline(3) -- create curses borders, horizontal and vertical lines
|
The border, wborder and box routines draw a box around the edges of a window. The argument ls is a character and attributes used for the left side of the border, rs - right side, ts - top side, bs - b... |
winch(3) -- get a character and attributes from a curses window
|
These routines return the character, of type chtype, at the current position in the named window. If any attributes are set for that position, their values are OR'ed into the value returned. Constant... |
winchnstr(3) -- get a string of characters (and attributes) from a curses window
|
These routines return a NULL-terminated array of chtype quantities, starting at the current cursor position in the named window and ending at the right margin of the window. The four functions with n ... |
winchstr(3) -- get a string of characters (and attributes) from a curses window
|
These routines return a NULL-terminated array of chtype quantities, starting at the current cursor position in the named window and ending at the right margin of the window. The four functions with n ... |
winnstr(3) -- get a string of characters from a curses window
|
These routines return a string of characters in str, extracted starting at the current cursor position in the named window. Attributes are stripped from the characters. The four functions with n as th... |
winsch(3) -- insert a character before cursor in a curses window
|
These routines insert the character ch before the character under the cursor. All characters to the right of the cursor are moved one space to the right, with the possibility of the rightmost characte... |
winsdelln(3) -- delete and insert lines in a curses window
|
The deleteln and wdeleteln routines delete the line under the cursor in the window; all lines below the current line are moved up one line. The bottom line of the window is cleared. The cursor positio... |
winsertln(3) -- delete and insert lines in a curses window
|
The deleteln and wdeleteln routines delete the line under the cursor in the window; all lines below the current line are moved up one line. The bottom line of the window is cleared. The cursor positio... |
winsnstr(3) -- insert string before cursor in a curses window
|
These routines insert a character string (as many characters as will fit on the line) before the character under the cursor. All characters to the right of the cursor are shifted right, with the possi... |
winsstr(3) -- insert string before cursor in a curses window
|
These routines insert a character string (as many characters as will fit on the line) before the character under the cursor. All characters to the right of the cursor are shifted right, with the possi... |
winstr(3) -- get a string of characters from a curses window
|
These routines return a string of characters in str, extracted starting at the current cursor position in the named window. Attributes are stripped from the characters. The four functions with n as th... |
wmouse_trafo(3) -- mouse interface through curses
|
These functions provide an interface to mouse events from curses(3). Mouse events are represented by KEY_MOUSE pseudo-key values in the wgetch input stream. To make mouse events visible, use the mouse... |
wmove(3) -- move curses window cursor
|
These routines move the cursor associated with the window to line y and column x. This routine does not move the physical cursor of the terminal until refresh is called. The position specified is rela... |
wnoutrefresh(3) -- refresh curses windows and lines
|
The refresh and wrefresh routines (or wnoutrefresh and doupdate) must be called to get actual output to the terminal, as other routines merely manipulate data structures. The routine wrefresh copies t... |
wprintw(3) -- print formatted output in curses windows
|
The printw, wprintw, mvprintw and mvwprintw routines are analogous to printf [see printf(3)]. In effect, the string that would be output by printf is output instead as though waddstr were used on the ... |
wredrawln(3) -- refresh curses windows and lines
|
The refresh and wrefresh routines (or wnoutrefresh and doupdate) must be called to get actual output to the terminal, as other routines merely manipulate data structures. The routine wrefresh copies t... |
wrefresh(3) -- refresh curses windows and lines
|
The refresh and wrefresh routines (or wnoutrefresh and doupdate) must be called to get actual output to the terminal, as other routines merely manipulate data structures. The routine wrefresh copies t... |
wresize(3) -- resize a curses window
|
The wresize function reallocates storage for a curses window to adjust its dimensions to the specified values. If either dimension is larger than the current values, the window's data is filled with ... |
wscanw(3) -- convert formatted input from a curses window
|
The scanw, wscanw and mvscanw routines are analogous to scanf [see scanf(3)]. The effect of these routines is as though wgetstr were called on the window, and the resulting line used as input for ssca... |
wscrl(3) -- scroll a curses window
|
The scroll routine scrolls the window up one line. This involves moving the lines in the window data structure. As an optimization, if the scrolling region of the window is the entire screen, the phys... |
wsetscrreg(3) -- curses output options
|
These routines set options that change the style of output within curses. All options are initially FALSE, unless otherwise stated. It is not necessary to turn these options off before calling endwin.... |
wstandend(3) -- curses character and window attribute control routines
|
These routines manipulate the current attributes of the named window. The current attributes of a window apply to all characters that are written into the window with wad- dch, waddstr and wprintw. At... |
wstandout(3) -- curses character and window attribute control routines
|
These routines manipulate the current attributes of the named window. The current attributes of a window apply to all characters that are written into the window with wad- dch, waddstr and wprintw. At... |
wsyncdown(3) -- create curses windows
|
Calling newwin creates and returns a pointer to a new window with the given number of lines and columns. The upper left-hand corner of the window is at line begin_y, column begin_x. If either nlines o... |
wsyncup(3) -- create curses windows
|
Calling newwin creates and returns a pointer to a new window with the given number of lines and columns. The upper left-hand corner of the window is at line begin_y, column begin_x. If either nlines o... |
wtimeout(3) -- curses input options
|
Normally, the tty driver buffers typed characters until a newline or carriage return is typed. The cbreak routine disables line buffering and erase/kill character-processing (interrupt and flow contro... |
wtouchln(3) -- curses refresh control routines
|
The touchwin and touchline routines throw away all optimization information about which parts of the window have been touched, by pretending that the entire window has been drawn on. This is sometimes... |
wvline(3) -- create curses borders, horizontal and vertical lines
|
The border, wborder and box routines draw a box around the edges of a window. The argument ls is a character and attributes used for the left side of the border, rs - right side, ts - top side, bs - b... |
xdr(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for remote procedure calls are transmitted using these routines. xdr_array() is a filter... |
xdrmem_create(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for remote procedure calls are transmitted using these routines. xdr_array() is a filter... |
xdrrec_create(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for remote procedure calls are transmitted using these routines. xdr_array() is a filter... |
xdrrec_endofrecord(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for remote procedure calls are transmitted using these routines. xdr_array() is a filter... |
xdrrec_eof(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for remote procedure calls are transmitted using these routines. xdr_array() is a filter... |
xdrrec_skiprecord(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for remote procedure calls are transmitted using these routines. xdr_array() is a filter... |
xdrstdio_create(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for remote procedure calls are transmitted using these routines. xdr_array() is a filter... |
xdr_accepted_reply(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
xdr_array(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for remote procedure calls are transmitted using these routines. xdr_array() is a filter... |
xdr_authunix_parms(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
xdr_bool(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for remote procedure calls are transmitted using these routines. xdr_array() is a filter... |
xdr_bytes(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for remote procedure calls are transmitted using these routines. xdr_array() is a filter... |
xdr_callhdr(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
xdr_callmsg(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
xdr_char(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for remote procedure calls are transmitted using these routines. xdr_array() is a filter... |
xdr_destroy(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for remote procedure calls are transmitted using these routines. xdr_array() is a filter... |
xdr_double(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for remote procedure calls are transmitted using these routines. xdr_array() is a filter... |
xdr_enum(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for remote procedure calls are transmitted using these routines. xdr_array() is a filter... |
xdr_float(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for remote procedure calls are transmitted using these routines. xdr_array() is a filter... |
xdr_free(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for remote procedure calls are transmitted using these routines. xdr_array() is a filter... |
xdr_getpos(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for remote procedure calls are transmitted using these routines. xdr_array() is a filter... |
xdr_inline(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for remote procedure calls are transmitted using these routines. xdr_array() is a filter... |
xdr_int(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for remote procedure calls are transmitted using these routines. xdr_array() is a filter... |
xdr_long(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for remote procedure calls are transmitted using these routines. xdr_array() is a filter... |
xdr_opaque(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for remote procedure calls are transmitted using these routines. xdr_array() is a filter... |
xdr_opaque_auth(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
xdr_pmap(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
xdr_pmaplist(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
xdr_pointer(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for remote procedure calls are transmitted using these routines. xdr_array() is a filter... |
xdr_reference(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for remote procedure calls are transmitted using these routines. xdr_array() is a filter... |
xdr_rejected_reply(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
xdr_replymsg(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
xdr_setpos(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for remote procedure calls are transmitted using these routines. xdr_array() is a filter... |
xdr_short(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for remote procedure calls are transmitted using these routines. xdr_array() is a filter... |
xdr_string(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for remote procedure calls are transmitted using these routines. xdr_array() is a filter... |
xdr_union(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for remote procedure calls are transmitted using these routines. xdr_array() is a filter... |
xdr_u_char(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for remote procedure calls are transmitted using these routines. xdr_array() is a filter... |
xdr_u_int(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for remote procedure calls are transmitted using these routines. xdr_array() is a filter... |
xdr_u_long(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for remote procedure calls are transmitted using these routines. xdr_array() is a filter... |
xdr_u_short(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for remote procedure calls are transmitted using these routines. xdr_array() is a filter... |
xdr_vector(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for remote procedure calls are transmitted using these routines. xdr_array() is a filter... |
xdr_void(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for remote procedure calls are transmitted using these routines. xdr_array() is a filter... |
xdr_wrapstring(3) -- library routines for external data representation
|
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for remote procedure calls are transmitted using these routines. xdr_array() is a filter... |
xprt_register(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
xprt_unregister(3) -- library routines for remote procedure calls
|
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the s... |
y0(3) -- Bessel functions of first and second kind
|
The functions j0() and j1() compute the Bessel function of the first kind of the order 0 and the order 1, respectively, for the real value x; the function jn() computes the Bessel function of the firs... |
y0f(3) -- Bessel functions of first and second kind
|
The functions j0() and j1() compute the Bessel function of the first kind of the order 0 and the order 1, respectively, for the real value x; the function jn() computes the Bessel function of the firs... |
y1(3) -- Bessel functions of first and second kind
|
The functions j0() and j1() compute the Bessel function of the first kind of the order 0 and the order 1, respectively, for the real value x; the function jn() computes the Bessel function of the firs... |
y1f(3) -- Bessel functions of first and second kind
|
The functions j0() and j1() compute the Bessel function of the first kind of the order 0 and the order 1, respectively, for the real value x; the function jn() computes the Bessel function of the firs... |
yn(3) -- Bessel functions of first and second kind
|
The functions j0() and j1() compute the Bessel function of the first kind of the order 0 and the order 1, respectively, for the real value x; the function jn() computes the Bessel function of the firs... |
ynf(3) -- Bessel functions of first and second kind
|
The functions j0() and j1() compute the Bessel function of the first kind of the order 0 and the order 1, respectively, for the real value x; the function jn() computes the Bessel function of the firs... |
ypclnt(3) -- Interface to the YP subsystem
|
The ypclnt suite provides an interface to the YP subsystem. For a general description of the YP subsystem, see yp(8). For all functions, input values begin with in and output values begin with out. An... |
yperr_string(3) -- Interface to the YP subsystem
|
The ypclnt suite provides an interface to the YP subsystem. For a general description of the YP subsystem, see yp(8). For all functions, input values begin with in and output values begin with out. An... |
ypprot_err(3) -- Interface to the YP subsystem
|
The ypclnt suite provides an interface to the YP subsystem. For a general description of the YP subsystem, see yp(8). For all functions, input values begin with in and output values begin with out. An... |
yp_all(3) -- Interface to the YP subsystem
|
The ypclnt suite provides an interface to the YP subsystem. For a general description of the YP subsystem, see yp(8). For all functions, input values begin with in and output values begin with out. An... |
yp_bind(3) -- Interface to the YP subsystem
|
The ypclnt suite provides an interface to the YP subsystem. For a general description of the YP subsystem, see yp(8). For all functions, input values begin with in and output values begin with out. An... |
yp_first(3) -- Interface to the YP subsystem
|
The ypclnt suite provides an interface to the YP subsystem. For a general description of the YP subsystem, see yp(8). For all functions, input values begin with in and output values begin with out. An... |
yp_get_default_domain(3) -- Interface to the YP subsystem
|
The ypclnt suite provides an interface to the YP subsystem. For a general description of the YP subsystem, see yp(8). For all functions, input values begin with in and output values begin with out. An... |
yp_master(3) -- Interface to the YP subsystem
|
The ypclnt suite provides an interface to the YP subsystem. For a general description of the YP subsystem, see yp(8). For all functions, input values begin with in and output values begin with out. An... |
yp_match(3) -- Interface to the YP subsystem
|
The ypclnt suite provides an interface to the YP subsystem. For a general description of the YP subsystem, see yp(8). For all functions, input values begin with in and output values begin with out. An... |
yp_next(3) -- Interface to the YP subsystem
|
The ypclnt suite provides an interface to the YP subsystem. For a general description of the YP subsystem, see yp(8). For all functions, input values begin with in and output values begin with out. An... |
yp_order(3) -- Interface to the YP subsystem
|
The ypclnt suite provides an interface to the YP subsystem. For a general description of the YP subsystem, see yp(8). For all functions, input values begin with in and output values begin with out. An... |
yp_unbind(3) -- Interface to the YP subsystem
|
The ypclnt suite provides an interface to the YP subsystem. For a general description of the YP subsystem, see yp(8). For all functions, input values begin with in and output values begin with out. An... |
zlibCompileFlags(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
zlibVersion(3) -- zlib general purpose compression library
|
This manual page describes the zlib general purpose compression library, version 1.1.4. The zlib compression library provides in-memory compression and decompression functions, including integrity che... |
_Exit(3) -- perform normal program termination
|
The exit() and _Exit() functions terminate a process. Before termination, exit() performs the following operations in the order listed: 1. Call the functions registered with the atexit(3) function, in... |
_longjmp(3) -- non-local jumps
|
The sigsetjmp(), setjmp(), and _setjmp() functions save their calling environment in env. Each of these functions returns 0. The corresponding longjmp() functions restore the environment saved by the ... |
_setjmp(3) -- non-local jumps
|
The sigsetjmp(), setjmp(), and _setjmp() functions save their calling environment in env. Each of these functions returns 0. The corresponding longjmp() functions restore the environment saved by the ... |
_tolower(3) -- upper case to lower case letter conversion
|
The tolower() function converts an upper-case letter to the corresponding lower-case letter. The _tolower() function is identical to tolower() except that c must be an upper-case letter. |
_toupper(3) -- lower case to upper case letter conversion
|
The toupper() function converts a lower-case letter to the corresponding upper-case letter. The _toupper() function is identical to toupper() except that c must be a lower-case letter. |
aac(4) -- Adaptec RAID driver
|
The aac driver provides support for Adaptec's "FSA" family of RAID controllers, including: Adaptec AAC-2622, AAC-364, AAC-3642 Adaptec 2410SA, 2610SA, 2810SA, 21610SA Dell CERC-SATA, PERC 320/DC De... |
macppc/abtn(4) -- Apple brightness/volume button control
|
The abtn driver allows you to dim the brightness of your display. This driver only currently recognizes the dim and brightness button. Sound, numlock and eject buttons are also handled by this driver ... |
ac97(4) -- generic AC97 codec driver
|
AC97 codecs contain the analog-to-digital (A/D), digital-toanalog (D/A), and mixing circuitry of many modern sound cards. AC97 codecs, for the most part, do not talk to host busses like the PCI bus di... |
acphy(4) -- Driver for Altima AC101 and AC101L 10/100 Ethernet PHYs
|
The acphy driver supports the Altima AC101 and AC101L 10/100 Ethernet PHYs. These PHYs are often found on low-power Ethernet interfaces, such as MiniPCI interfaces found in laptops and embedded system... |
mac68k/adb(4) -- Apple Desktop Bus event interface
|
The Apple Desktop Bus (ADB) is the single-master, multipleslave, lowspeed serial bus interface used by Macintosh computers to connect input devices such as keyboards, mice, trackballs, and graphics ta... |
macppc/adb(4) -- Apple Desktop Bus driver
|
The Apple Desktop Bus (ADB) is the single-master, multipleslave, lowspeed serial bus interface used by Macintosh computers to connect input devices such as keyboards, mice, trackballs, and graphics ta... |
addcom(4) -- multiplexing serial communications interface
|
The addcom driver provides support for Addonics FlexPort 8/S (and probably FlexPort 4/S) boards that multiplex together up to eight (or four) EIA RS-232C (CCITT V.28) communications interfaces. Each a... |
adv(4) -- AdvanSys PCI SCSI Host Adapters
|
The advansys drivers support most AdvanSys PCI SCSI host adapters, as shown in this table: adv adw ABP-920 ABP-940UW ABP-930 (1) ABP-940UWD ABP-930U ABP-970UW ABP-930UA ASB-3940UW-00 ABP-940 ASB-3940U... |
advansys(4) -- AdvanSys PCI SCSI Host Adapters
|
The advansys drivers support most AdvanSys PCI SCSI host adapters, as shown in this table: adv adw ABP-920 ABP-940UW ABP-930 (1) ABP-940UWD ABP-930U ABP-970UW ABP-930UA ASB-3940UW-00 ABP-940 ASB-3940U... |
adw(4) -- AdvanSys PCI SCSI Host Adapters
|
The advansys drivers support most AdvanSys PCI SCSI host adapters, as shown in this table: adv adw ABP-920 ABP-940UW ABP-930 (1) ABP-940UWD ABP-930U ABP-970UW ABP-930UA ASB-3940UW-00 ABP-940 ASB-3940U... |
mac68k/ae(4) -- Ethernet driver for DP8390-based NuBus Ethernet boards
|
The ae interface provides access to a 10 Mb/s Ethernet network via the National Semiconductor DP8390 Ethernet chip set. This set includes the DP83902. Each of the host's network addresses is specifie... |
macppc/aed(4) -- Apple Event Device
|
The aed driver handles events on the adb(4) Desktop Bus. |
sparc64/agten(4) -- Fujitsu AG-10e accelerated 24-bit color frame buffer
|
The Fujitsu AG-10e is a two-slot SBus color frame buffer, with graphics acceleration and overlay capabilities, including hardware OpenGL processing. The agten driver interfaces the frame buffer with t... |
sparc/agten(4) -- Fujitsu AG-10e accelerated 24-bit color frame buffer
|
The Fujitsu AG-10e is a two-slot SBus color frame buffer, with graphics acceleration and overlay capabilities, including hardware OpenGL processing. The agten driver interfaces the frame buffer with t... |
aha(4) -- Adaptec 154x SCSI adapter driver
|
The aha driver provides support for the following SCSI adapters: Adaptec AHA-1540 Adaptec AHA-154xA Adaptec AHA-154xB Adaptec AHA-1542C Adaptec AHA-1542CF Adaptec AHA-1542CP Adaptec AHA-1640 Buslogic ... |
ahb(4) -- Adaptec 1742 SCSI adapter driver
|
The ahb driver provides support for the Adaptec AHA-1742 EISA SCSI adapter. |
ahc(4) -- Adaptec VL/EISA/PCI SCSI host adapter driver
|
This driver provides access to the SCSI bus(es) connected to Adaptec AIC7770, AIC7850, AIC7860, AIC7870, AIC7880, AIC7890, AIC7891, AIC7892, AIC7895, AIC7896, AIC7897 and AIC7899 host adapter chips. T... |
ahd(4) -- Adaptec PCI/PCI-X AIC79xx-based Ultra320 SCSI host adapter driver
|
This driver provides access to the SCSI bus(es) connected to Adaptec AIC79xx host adapter chips. Driver features include support for narrow and wide buses, fast, ultra, ultra2, ultra160, and ultra320 ... |
aic(4) -- Adaptec AIC-6260 and AIC-6360 SCSI driver
|
The aic driver provides support for the Adaptec AIC-6260 and AIC-6360 SCSI controller chips. The ISA attachment of the aic driver supports the Adaptec 152x, the Creative Labs SoundBlaster SCSI host ad... |
macppc/akbd(4) -- Apple Keyboard Device
|
This driver supports ADB keyboards within the wscons(4) console framework. It doesn't provide direct device driver entry points but makes its functions available via the internal wskbd(4) interface. ... |
amdpm(4) -- AMD768 Power Management
|
The amdpm driver provides support for the AMD 768 Power Management controller, in particular, only the RNG function is supported at this time. The data generated get fed into the pool of the random(4)... |
ami(4) -- American Megatrends Inc. MegaRAID Controllers
|
The ami driver provides support for the MegaRAID family of RAID controllers, including: Dell PERC2/DC, PERC3/DC, PERC3/DCL, PERC3/QC, PERC3/SC, Dell PERC4/DC, PERC4/SC, PERC4/Di, PERC4/Si, and CERC He... |
amphy(4) -- AMD AM79c873 Ethernet PHY driver
|
The amphy driver supports AMD AM79c873 Ethernet PHYs, and the Davicom DM9101 and DM9102 Ethernet PHY. These PHYs are found on a variety of Ethernet interfaces. |
macppc/ams(4) -- Apple Mouse Support
|
The ams driver supports a series of adb(4) mice, trackballs, trackpads and tablets. +o Extended Mouse Protocol +o Mouse Systems A^3 Mouse +o MicroSpeed Mouse Deluxe +o Contour mouse +o Kensington Turb... |
an(4) -- Aironet Communications 4500/4800 IEEE 802.11DS wireless network adapter
|
The an driver provides support for the Aironet Communications 4500, 4800 (aka Cisco 340), and Cisco 350 IEEE 802.11 Direct Sequence wireless network adapters. This includes the ISA, PCI, and PCMCIA va... |
hp300/apci(4) -- Apollo utility chip serial communications interface
|
The Apollo utility chip contains four 8250-like UARTs and is found on all series 400 machines. The first UART is used to communicate with the Domain keyboard. The second is the serial console port whe... |
alpha/apecs(4) -- DECchip 21072/21071 Core Logic chipset
|
The apecs driver provides support for the DECchip 21072/21071 Core Logic chipset (PCI controller) found on the AlphaStation 200/250/255/400 systems, EB64+-family systems, AlphaServer 800/1000A systems... |
sparc64/apio(4) -- SBus Aurora pio1 driver
|
The apio driver provides support for the Aurora Technologies pio1 parallel port interface, which is basically an lpt(4) port with sbus(4) glue logic. |
macppc/apm(4) -- advanced power management device interface
|
The apm driver provides an interface which simulates the Advanced Power Management (APM) BIOS functions. The BIOS functions are translated into the appropriate PowerManager requests. Currently only ba... |
i386/apm(4) -- advanced power management device interface
|
The apm driver provides an interface to the Advanced Power Management (APM) BIOS functions. The driver supports versions 1.0, 1.1, and 1.2 interface specifications. The low two bytes of the flags spec... |
arandom(4) -- random data source devices
|
The various random devices produce random output data with different random qualities. Entropy data is collected from system activity (like disk and network device interrupts and such), and then run t... |
aria(4) -- Aria 16 audio device driver
|
The aria driver provides support for sound cards based on Sierra Semiconductor's Aria chipset. Cards based on this chipset are capable of recording and playing 8- or 16-bit samples in mono or stereo ... |
arp(4) -- Address Resolution Protocol
|
The Address Resolution Protocol (ARP) is used to dynamically map between Internet host addresses and Ethernet addresses. It is used by all of the Ethernet interface drivers. It is not specific to Inte... |
alpha/asc(4) -- NCR 53c[f]94 on-board or TURBOchannel SCSI controller
|
The asc is an on-board or TURBOchannel SCSI controller based on the NCR 53c[f]94 chips, found on DEC 3000/[3456789]00 series Alpha workstations. |
vax/asc(4) -- VAXstation 4000 SCSI controller
|
The asc driver provides support for the NCR 53c94-based SCSI host adapter on the VAXstation 4000 series, and for the PMAZ-AA and related TURBOchannel SCSI adapter option boards (also on the VAXstation... |
sparc64/asio(4) -- SBus Aurora sio2 driver
|
The asio driver provides support for the Aurora Technologies sio2 serial interface, which is basically a pair of com(4) ports with sbus(4) glue logic. |
hppa/asp(4) -- core bus controller as present on older HP 9000/700 machines
|
The supported Core bus controllers are those present on older PA-RISC workstations, and include: +o Core bus controller +o System Clock +o Interrupt Controller +o DMA Controller +o Real Time Clock Int... |
ast(4) -- multiplexing serial communications interface
|
The ast driver provides support for boards that multiplex together up to four EIA RS-232C (CCITT V.28) communications interfaces. Apparently the original master of hardware using this multiplexing pro... |
atalk(4) -- AppleTalk Protocol Family
|
The AppleTalk Protocol Family provides presentation layer support for the AppleTalk Datagram Delivery Protocol (DDP), using the SOCK_DGRAM socket type. In addition, access to in-kernel AppleTalk routi... |
atapiscsi(4) -- ATAPI<->SCSI adapter
|
The atapiscsi driver supports ATAPI (also called IDE) devices such as CDROMs, ZIP drives, LS-120 floppy drives, and tape drives. All ATAPI devices talk a subset of the SCSI protocol. The atapiscsi dri... |
atw(4) -- ADMtek ADM8211 802.11 wireless network driver
|
The atw driver supports PCI/Cardbus 802.11b wireless adapters based on the ADMtek ADM8211. The ADM8211 is a bus-mastering 802.11 Media Access Controller (MAC) which is derived from ADMtek's DEC/Intel... |
audio(4) -- device-independent audio driver layer
|
The audio driver provides support for various audio peripherals. It provides a uniform programming interface layer above different underlying audio hardware drivers. The audio layer provides full-dupl... |
sparc/audioamd(4) -- SPARC telephone quality audio device
|
The audioamd device uses the AMD AM79C30A Digital Subscriber Controller chip to implement the audio device interface described in audio(4). This device is found onboard on several sun4c and sun4m mode... |
sparc64/audioce(4) -- SPARC64 EBus CS4231 audio interface
|
The audioce device uses the Crystal Semiconductor CS4231A Parallel Interface, Multimedia Audio Codec chip to implement the audio device interface described in audio(4). This device is found onboard on... |
sparc64/audiocs(4) -- SPARC64 SBus CS4231 audio interface
|
The audiocs device uses the Crystal Semiconductor CS4231A Parallel Interface, Multimedia Audio Codec chip to implement the audio device interface described in audio(4). This device is found onboard on... |
sparc/audiocs(4) -- SPARC CS4231 audio interface
|
The audiocs device uses the Crystal Semiconductor CS4231A Parallel Interface, Multimedia Audio Codec chip to implement the audio device interface described in audio(4). This device is found onboard on... |
aue(4) -- ADMtek AN986 / ADM8511 Pegasus family USB Ethernet driver
|
The aue driver provides support for USB Ethernet adapters based on the ADMtek AN986 ("Pegasus") and ADM8511 ("Pegasus II") chipsets. This includes the following adapters: 3Com 3c460b Abocom UFE100... |
auich(4) -- Intel 82801AA/AB/BA/CA/DB/EB, 82440MX, and compatibles PCI audio driver
|
The auich driver provides support for the AC97-based audio present on the Intel 82801AA/AB/BA/CA/DB/EB I/O controller hub (ICH/ICH0/ICH2/ICH3/ICH4/ICH5), 82440MX chipset, SiS 7012, AMD 768, AMD 8111, ... |
sparc64/autoconf(4) -- diagnostics from the autoconfiguration code
|
When OpenBSD bootstraps it probes the innards of the machine on which it is running and locates controllers, drives, and other devices, printing out what it finds on the console. This procedure is dri... |
mac68k/autoconf(4) -- diagnostics from the autoconfiguration code
|
When OpenBSD bootstraps it probes the innards of the machine on which it is running and locates controllers, drives, and other devices, printing out what it finds on the console. This procedure is dri... |
macppc/autoconf(4) -- diagnostics from the autoconfiguration code
|
When OpenBSD bootstraps it probes the innards of the machine on which it is running and locates controllers, drives, and other devices, printing out what it finds on the console. This procedure is dri... |
i386/autoconf(4) -- diagnostics from the autoconfiguration code
|
When OpenBSD bootstraps it probes the innards of the machine on which it is running and locates controllers, drives, and other devices, printing out what it finds on the console. This procedure is dri... |
alpha/autoconf(4) -- diagnostics from the autoconfiguration code
|
When OpenBSD bootstraps it probes the innards of the machine on which it is running and locates controllers, drives, and other devices, printing out what it finds on the console. This procedure is dri... |
sparc/autoconf(4) -- diagnostics from the autoconfiguration code
|
When OpenBSD bootstraps it probes the innards of the machine on which it is running and locates controllers, drives, and other devices, printing out what it finds on the console. This procedure is dri... |
mvme88k/autoconf(4) -- diagnostics from the autoconfiguration code
|
When OpenBSD bootstraps it probes the innards of the machine on which it is running and locates controllers, drives, and other devices, printing out what it finds on the console. This procedure is dri... |
amd64/autoconf(4) -- diagnostics from the autoconfiguration code
|
When OpenBSD bootstraps it probes the innards of the machine on which it is running and locates controllers, drives, and other devices, printing out what it finds on the console. This procedure is dri... |
cats/autoconf(4) -- diagnostics from the autoconfiguration code
|
When OpenBSD bootstraps it probes the innards of the machine on which it is running and locates controllers, drives, and other devices, printing out what it finds on the console. This procedure is dri... |
hp300/autoconf(4) -- diagnostics from the autoconfiguration code
|
When OpenBSD bootstraps it probes the innards of the machine on which it is running and locates controllers, drives, and other devices, printing out what it finds on the console. This procedure is dri... |
vax/autoconf(4) -- diagnostics from the autoconfiguration code
|
When OpenBSD bootstraps it probes the innards of the machine on which it is running and locates controllers, drives, and other devices, printing out what it finds on the console. This procedure is dri... |
luna88k/autoconf(4) -- diagnostics from the autoconfiguration code
|
When OpenBSD bootstraps it probes the innards of the machine on which it is running and locates controllers, drives, and other devices, printing out what it finds on the console. This procedure is dri... |
mvme68k/autoconf(4) -- diagnostics from the autoconfiguration code
|
When OpenBSD bootstraps it probes the innards of the machine on which it is running and locates controllers, drives, and other devices, printing out what it finds on the console. This procedure is dri... |
autri(4) -- Trident 4DWAVE-DX/NX, SiS 7018, ALi M5451 audio device driver
|
The autri device driver supports the AC97 audio controller found in Trident 4DWAVE-DX/NX, SiS 7018 and ALi M5451. autri typically has reversed stereo channels. The driver compensates for this, but the... |
auvia(4) -- VIA VT82C686A, VT8233, VT8235, VT8237 integrated AC97 audio device
|
The auvia device driver supports the integrated AC97 audio controller of the VIA Technologies VT82C686A Southbridge, VIA Technologies VT8233, VT8235, VT8237 chips found on some motherboards. |
sparc64/auxio(4) -- SPARC64 auxiliary I/O
|
The auxio device contains miscellaneous system controls, including the front panel LED. This LED can be made to blink based on the load average on most systems by setting the sysctl(3) variable machde... |
sparc/auxreg(4) -- SPARC auxiliary register
|
The auxreg device contains miscellaneous system controls, including the front panel LED. This LED can be made to blink based on the load average by setting the sysctl(3) variable machdep.led_blink to ... |
macppc/awacs(4) -- Apple audio device driver
|
The awacs (audio waveform amplifier and converter for sound) driver provides support for the audio hardware found in many Apple PowerMacs. |
awi(4) -- BayStack 650 IEEE 802.11FH PCMCIA wireless network driver
|
The awi driver provides support for wireless adapters based upon the AMD 802.11 PCnet Mobile firmware. This includes the following adapters: Bay Networks BayStack 650 Bay Networks BayStack 660 Bay Net... |
axe(4) -- ASIX Electronics AX88172 USB Ethernet driver
|
The axe driver provides support for USB Ethernet adapters based on the ASIX Electronics AX88172 USB 2.0 chipset, including the following: +o D-Link DUBE100 +o LinkSys USB200M +o Netgear FA120 +o Buffa... |
az(4) -- Aztech/PackardBell radio card device driver
|
The az driver provides support for the Aztech/PackardBell radio cards. The Aztech/PackardBell cards are stereo FM tuners that can tune in the 87.5-108.0 MHz range. They are capable of reporting signal... |
bce(4) -- Broadcom BCM4401 Ethernet device driver
|
The bce provides support for the Broadcom BCM4401 10/100 Ethernet card. Other cards from the 440x series may also be supported. The following media types and options (as given to ifconfig(8)) are supp... |
sparc64/be(4) -- SPARC64 Fast Ethernet interface
|
The be interface provides access to the 10Mb/s and 100Mb/s (half duplex only) Ethernet networks. The be is found on the Sun 10/100 Mbit Ethernet boards (Sun part number SUNW,501-2655). Each of the hos... |
sparc/be(4) -- SPARC Fast Ethernet interface
|
The be interface provides access to the 10Mb/s and 100Mb/s (half duplex only) Ethernet networks. The be is found on the Sun 10/100 Mbit Ethernet boards (Sun part number SUNW,501-2450). Each of the hos... |
sparc64/beeper(4) -- console annunciator
|
The beeper device does exactly what it sounds like: it beeps. In particular, this device registers itself to handle beeping for pckbd(4) devices. |
bge(4) -- Broadcom BCM570x PCI Gigabit Ethernet adapter driver
|
The bge driver provides support for various NICs based on the Broadcom BCM570x family of Gigabit Ethernet controller chips, including the following: +o 3Com 3c996-T +o 3Com 3c996-SX +o 3Com 3c996B-T +... |
bha(4) -- Buslogic SCSI adapter driver
|
|
bio(4) -- ioctl tunnel pseudo-device
|
The bio driver provides userland applications ioctl access to devices otherwise not found as /dev nodes. The /dev/bio device node operates by delegating ioctl(2) calls to a requested device driver. On... |
i386/bios(4) -- a driver for PC Firmware, aka BIOS
|
OpenBSD provides support for PC firmware, aka BIOS and some of its functions, currently: APM subsystem, BIOS 32 extensions, PCI BIOS subsystem. The bios driver also identifies BIOS type (such as "AT/... |
bktr(4) -- video capture driver
|
The bktr driver provides support for PCI video capture and VBI capture on low cost, high performance boards. This should support most video cards based on the Brooktree Bt848/849/878/879 Video Capture... |
macppc/bm(4) -- Apple BMAC Ethernet driver
|
The bm device driver supports Apple BMAC and compatible Ethernet devices. |
bmtphy(4) -- Broadcom Mini-Theta Ethernet PHY driver
|
The bmtphy driver supports the Broadcom Mini-Theta BCM5201 and BCM5202 10/100 Ethernet PHYs, as well as the BCM5221 100baseTX Ethernet PHY. These PHYs are found on a variety of high-performance Ethern... |
boca(4) -- multiplexing serial communications interface
|
The boca driver provides support for BOCA Research BB1004, BB1008, and BB2016 boards that multiplex together up to four, eight, or sixteen EIA RS-232C (CCITT V.28) communications interfaces. Each boca... |
bpf(4) -- Berkeley Packet Filter
|
The Berkeley Packet Filter provides a raw interface to data link layers in a protocol-independent fashion. All packets on the network, even those destined for other hosts, are accessible through this ... |
sparc/bpp(4) -- SPARC bi-directional parallel port
|
The bpp driver provides support for the parallel port found on some workstations. It only supports writing data to the device. |
brgphy(4) -- Broadcom BCM54xx/BCM57xx Gigabit Ethernet PHY driver
|
The brgphy driver supports Broadcom BCM5400 100/1000TX Ethernet PHY interfaces, as well as the BCM5401, BCM5411, BCM5421S, BCM5701, BCM5703, BCM5704 and BCM5705 10/100/1000baseTX Ethernet PHY interfac... |
bridge(4) -- Ethernet bridge interface
|
The bridge device creates a logical link between two or more Ethernet interfaces or encapsulation interfaces (see gif(4)). This link between the interfaces selectively forwards frames from each interf... |
sparc/btcham(4) -- Weitek Power9000 accelerated frame buffer
|
The pninek is a color frame buffer with graphics acceleration, embedded in the Tadpole SPARCbook 3 laptop. It is based on the Weitek Power9000 video processor and a Brooktree Bt445 `Chameleon' RAMDAC... |
mvme88k/bussw(4) -- BusSwitch local peripheral bus interface
|
The bussw BusSwitch ASIC provides an interface from the MVME197's 64-bit wide system bus to the MC68040 compatible 32-bit wide local bus, to which the system's I/O devices, e.g. SCSI and Ethernet, a... |
sparc64/bwtwo(4) -- monochromatic frame buffer
|
The bwtwo is an SBus monochrome frame buffer. The bwtwo driver interfaces the frame buffer with the wscons(4) console framework. It does not provide direct device driver entry points but makes its fun... |
sparc/bwtwo(4) -- monochromatic frame buffer
|
The bwtwo is a black and white frame buffer commonly encountered as the on-board frame buffer on sun4 and some sun4c class workstations. It is also available as an SBus card for sun4c and sun4m, or as... |
cac(4) -- Compaq Smart ARRAY RAID controllers
|
The cac driver provides support for the following RAID controllers: Compaq Integrated Array, Compaq IAES, Compaq IDA, Compaq IDA-2, Compaq RAID LC2, Compaq Smart Array 221, Compaq Smart Array 3100ES, ... |
cardbus(4) -- introduction to CardBus support
|
OpenBSD provides machine-independent bus support and drivers for CardBus devices. It includes the following machine-independent CardBus drivers, sorted by function and driver name: Network interfaces ... |
carp(4) -- Common Address Redundancy Protocol
|
The carp interface is a pseudo-device which implements and controls the CARP protocol. carp allows multiple hosts on the same local network to share a set of IP addresses. Its primary purpose is to en... |
cbb(4) -- introduction to CardBus support
|
OpenBSD provides machine-independent bus support and drivers for CardBus devices. It includes the following machine-independent CardBus drivers, sorted by function and driver name: Network interfaces ... |
ccd(4) -- concatenated disk driver
|
The ccd driver provides the capability of combining one or more disks/partitions into one virtual disk. This document assumes that you're familiar with how to generate kernels, how to properly config... |
cd(4) -- ATAPI and SCSI CD-ROM driver
|
The cd driver provides support for ATAPI and SCSI CD-ROM (Compact Disc Read-Only Memory) drives, via scsibus(4). In an attempt to look like a regular disk, the cd driver synthesizes a partition table,... |
cdce(4) -- USB Communication Device Class Ethernet driver
|
The cdce driver provides support for USB Host-to-Host (aka USB-to-USB) bridges based on the USB Communication Device Class (CDC) and Ethernet subclass, including the following: +o Prolific PL-2501 +o ... |
sparc/cgeight(4) -- 24-bit color frame buffer
|
The cgeight is a color frame buffer for the P4 bus of sun4 class workstations. The cgeight driver interfaces the frame buffer with the wscons(4) console framework. It does not provide direct device dr... |
sparc/cgfour(4) -- 8-bit color frame buffer
|
The cgfour is a color frame buffer with overlay plane for the P4 bus of sun4 class workstations. The cgfour driver interfaces the frame buffer with the wscons(4) console framework. It does not provide... |
sparc/cgfourteen(4) -- accelerated 8/24-bit color frame buffer
|
The cgfourteen is the on-board color frame buffer, with graphics acceleration and overlay capabilities, found on the SPARCstation 10SX and SPARCstation 20 workstations. The frame buffer will not be en... |
sparc64/cgsix(4) -- accelerated 8-bit color frame buffer
|
The cgsix is an SBus color frame buffer with graphics acceleration, commonly found in the non `creator' SBus UltraSPARC workstations. The cgsix driver interfaces the frame buffer with the wscons(4) c... |
sparc/cgsix(4) -- accelerated 8-bit color frame buffer
|
The cgsix is a color frame buffer with graphics acceleration, available as an SBus card for sun4c and sun4m, or as a P4 bus card for sun4 workstations. The cgsix driver interfaces the frame buffer wit... |
sparc64/cgthree(4) -- 8-bit color frame buffer
|
The cgthree is an SBus color frame buffer. The cgthree driver interfaces the frame buffer with the wscons(4) console framework. It does not provide direct device driver entry points but makes its func... |
sparc/cgthree(4) -- 8-bit color frame buffer
|
The cgthree is a color frame buffer, available as an SBus card or onboard on some sun4c and sun4m workstations. A small number of frame buffer SBus cards, not manufactured by Sun, are cgthree-compatib... |
sparc/cgtwelve(4) -- accelerated 24-bit color frame buffer
|
The cgtwelve is a triple-slot SBus color frame buffer, with graphics acceleration and overlay capabilities. The cgtwelve driver interfaces the frame buffer with the wscons(4) console framework. It doe... |
sparc/cgtwo(4) -- 8-bit color frame buffer
|
The cgtwo is a VME color frame buffer for the sun4 class workstations. The cgtwo driver interfaces the frame buffer with the wscons(4) console framework. It does not provide direct device driver entry... |
ch(4) -- scsi media-changer (juke box) driver
|
The ch driver provides support for SCSI juke boxes. It allows many slots of media to be multiplexed between a number of drives. A SCSI adapter and a logical scsibus must also be separately configured ... |
alpha/cia(4) -- DECchip 2117x Core Logic chipset
|
The cia driver provides support for the DECchip 2117x Core Logic chipset (PCI controller) found on the AlphaStation 500/600, AlphaServer 1000 and AlphaServer 800/1000A systems. |
clcs(4) -- Cirrus Logic CS4280/CS4610/CS4615 audio device driver
|
The clcs driver provides support for the Cirrus Logic CS4280 chip, as well as for CS461x. |
clct(4) -- Cirrus Logic CS4281 audio device driver
|
The clct driver provides support for the Cirrus Logic CS4281 chip. |
cmpci(4) -- C-Media CMI8x38 audio PCI device driver
|
The cmpci driver supports the C-Media CMI8338A, CMI8338B, and CMI8738 sound chips present in some PCI sound cards and some integrated PC motherboard chipsets (such as the SiS 530). |
cnw(4) -- Xircom CreditCard Netwave device driver
|
The cnw device driver provides support for Xircom CreditCard Netwave (also known as Netwave Airsurfer) PCMCIA wireless network adapters. The wireless domain number and scrambling key can be specified ... |
com(4) -- serial communications interface
|
The com and pccom drivers provide support for NS8250-, NS16450-, NS16550-, ST16650-, and TI16750-based EIA RS-232C (CCITT V.28) communications interfaces. The pccom driver (i386-only) also supports th... |
sparc64/comkbd(4) -- serial keyboard driver
|
The comkbd driver provides support for Sun serial keyboards such as the Type 4, Type 5, and Type 6 attached to a clone of the NS16550 UART (normally supported by the com(4) driver). |
hp300/cons(4) -- HP300 console interface
|
This release supports a ``virtual'' console device used for kernel printf messages and accessed in user mode via /dev/console. It is virtual in the sense that it is attached to a hardware interface ... |
vax/cons(4) -- VAX console interface
|
The console is available to the processor through the console registers. It acts like a normal terminal, except that when the local functions are not disabled, a special command character puts the con... |
i386/cpu(4) -- Central Processing Unit
|
Several processor models have additional features that extend their base functionality, such as power and frequency control or additional instructions. |
hppa/cpu(4) -- HP PA-RISC CPU
|
The following table lists the PA-RISC CPU types and their characteristics, such as TLB, maximum cache sizes (where * character means on-chip) and HP 9000/700 machines they were used in (see also intro... |
sparc64/creator(4) -- accelerated color frame buffer
|
The Creator, Creator 3D and Elite 3D UPA are color frame buffers, with graphics acceleration, available for most of the UltraSPARC workstations with UPA or PCI slots. The creator driver interfaces tho... |
crypto(4) -- hardware crypto access driver
|
The crypto driver provides userland applications access to hardware crypto support via the kernel. The /dev/crypto device node primarily operates in an ioctl(2) based model, permitting a variety of ap... |
hp300/ct(4) -- CS/80 cartridge tape interface
|
The cartridge tape interface as found in the 7912, 7914, 7946, 9144, 9145, and 88140 products provides a standard tape drive interface as described in mtio(4) with the following exceptions: 1. There i... |
cua(4) -- general terminal interface
|
This section describes the interface to the terminal drivers in the system. Terminal Special Files    [Toc]    [Back] Each hardware terminal port on the system usually has a terminal special device fi... |
cue(4) -- CATC USB-EL1201A USB Ethernet driver
|
The cue driver provides support for USB Ethernet adapters based on the Computer Access Technology Corporation's USB-EL1202A chipset. This includes the following adapters: Belkin F5U111 CATC Netmate C... |
cy(4) -- Cyclades Cyclom-{4, 8, 16}Y asynchronous comms board device driver
|
This driver provides an interface to Cyclades Cyclom-4Y, Cyclom-8Y and Cyclom-16Y asynchronous multiport serial boards. These boards are based around Cirrus Logic CD1400 communication controllers. The... |
cz(4) -- Cyclades-Z series multi-port serial adapter device driver
|
The cz device driver supports the Cyclades-Z series of multi-port serial adapters. The Cyclades-Z is an intelligent serial controller comprising: +o PLX9060ES PCI bus interface +o Xilinx XC5204 FPGA +... |
sparc/daadio(4) -- MATRIX MD-DAADIO digital/analog, analog/digital, parallel i/o board
|
The daadio driver provides ioctl(2) entry points to read and write analog/digital, digital/analog, and parallel input/output registers. A typical daadio has 6 8bit parallel ports, 8 12bit DAC ports, a... |
dc(4) -- DEC/Intel 21140, 21142, 21143, 21145 and clones 10/100 Ethernet
|
The dc driver provides support for several PCI, MiniPCI, and CardBus Fast Ethernet adapters and embedded controllers based on the following chipsets: +o DEC 21140 PCI +o DEC/Intel 21143 PCI and CardBu... |
hp300/dca(4) -- HP 98644A serial communications interface
|
The 98644A is a single port EIA RS-232C (CCITT V.28) communications interface with a single character buffer. Such an interface is built-in to all series 300 machines. Input and output for each line m... |
hp300/dcm(4) -- HP 98642A serial communications multiplexer
|
The 98642A is a four port EIA RS-232C (CCITT V.28) communications multiplexer. The 98642A has three direct-connect ports and one port with full modem control. Input and output for each line may be set... |
dcphy(4) -- Pseudo-driver for media support on DEC 21143 controllers
|
The dcphy driver handles media selection on the DEC 21143 chip as it has no real MII interface. |
ddb(4) -- kernel debugger
|
The ddb debugger provides a means for debugging the kernel, and analysing the kernel after a system crash ("panic"), with a gdb(1)-like syntax. ddb is only available if the kernel was configured wit... |
vax/de(4) -- DEC DEUNA/DELUA 10 Mb/s Ethernet interface
|
The de interface provides access to a 10 Mb/s Ethernet network through a Digital Equipment UNIBUS Network Adapter (DEUNA). Each of the host's network addresses is specified at boot time with an SIOCS... |
de(4) -- DEC DC21x4x (Tulip) Ethernet driver
|
The de device driver supports Ethernet adapters based on the Digital Equipment DC21x4x based self-contained Ethernet chips. This includes, among others, the following models: Asante Cogent EM100FX and... |
vax/dhu(4) -- DHU-11/DHV-11 communications multiplexer
|
A DHU-11 provides 16 communication lines. Normal I/O control parameters for individual lines are managed by ioctl(2) calls. Individual DHU-11 lines may be configured to run at any of 13 speeds (50, 20... |
hppa/dino(4) -- Dino and Cujo Host/PCI bridges
|
This driver supports Dino and Cujo Host/PCI bridges found on the A, B, and C models of workstations. Cujo is a 64 bit datapath version of Dino. On some machines it may also provide an additional seria... |
hp300/dio(4) -- DIO/DIO-II bus
|
This driver is for the DIO/DIO-II bus on HP 9000/3xx and 9000/4xx series workstations. |
dpt(4) -- DPT EATA SCSI RAID adapter driver
|
The dpt driver provides support for the following SCSI adapters: DPT SmartCache III DPT SmartCache IV DPT SmartRAID III DPT SmartRAID IV |
drum(4) -- paging device
|
This file refers to the paging device in use by the system. This may actually be a subdevice of one of the disk drivers, but in a system with paging interleaved across multiple disk drives it provides... |
hp300/dvbox(4) -- HP98730 ``DaVinci'' frame buffer
|
The HP98730 and HP98731 are stackable 4-bit color frame buffers, also known as the DaVinci. By adding up to 7 HP98732A frame buffer extensions, it is possible to add overlay planes. The dvbox driver p... |
vax/dz(4) -- DZ-11 multiplexer device interface
|
A DZ-11 provides 4 or 8 communication lines with partial modem control, adequate for OpenBSD dialup use. An optional argument flags may be supplied with the device specification in the config file ind... |
eap(4) -- Ensoniq AudioPCI device driver
|
The eap driver supports the older Ensoniq AudioPCI and other ES1370 based sound cards, such as the Creative Labs SoundBlaster PCI64 and PCI128. The driver also supports many revisions of the more mode... |
sparc64/ebus(4) -- introduction to SPARC EBus bus support and drivers
|
The EBus bus is designed to provide the ability to put ISA and traditional Intel-style peripherals in a SPARC based system with a minimal amount of glue logic. Typically, it is implemented in the PCIO... |
ec(4) -- 3Com EtherLink II Ethernet (3c503) driver
|
The ec device driver supports 3Com EtherLink II (3C503) Ethernet cards. Other models of 3Com network cards are supported by the ef(4), eg(4), el(4), ep(4), ie(4), and xl(4) drivers. The EtherLink II s... |
eephy(4) -- Marvell 88E1000/88E1011 ``Alaska'' Ethernet PHY driver
|
The eephy driver supports Marvell 88E1000 and 88E1011 10/100/1000 Ethernet PHYs. |
ef(4) -- 3Com Fast EtherLink ISA (3c515) driver
|
The ef device driver supports the 3Com Fast EtherLink ISA family of Ethernet cards, and embedded controllers based on the 3Com ``corkscrew'' EtherLink chips. This includes the 3C515 adapter(s) with ... |
eg(4) -- 3Com EtherLink Plus Ethernet (3c505) driver
|
The eg device driver supports 3Com EtherLink Plus (3c505) Ethernet cards. Other models of 3Com network cards are supported by the ec(4), ef(4), el(4), ep(4), ie(4), and xl(4) drivers. For more informa... |
ehci(4) -- USB Enhanced Host Controller driver
|
The ehci driver provides support for the USB Enhanced Host Controller Interface, which is used by USB 2.0 controllers. EHCI controllers are peculiar in that they can only handle the USB 2.0 protocol. ... |
eisa(4) -- introduction to EISA bus machine-independent drivers and support
|
OpenBSD includes a machine-independent EISA bus subsystem and several machine-independent EISA device drivers. Your system may support additional EISA devices. Drivers for EISA devices not listed here... |
el(4) -- 3Com EtherLink (3C501) Ethernet driver
|
The el device driver supports 3Com EtherLink (3C501) Ethernet cards. Other models of 3Com network cards are supported by the ec(4), ef(4), eg(4), ep(4), ie(4), and xl(4) drivers. For more information ... |
i386/elansc(4) -- AMD Elan SC520 System Controller driver
|
The elansc driver supports the system controller of the AMD Elan SC520 microcontroller. The SC520 consists of an AMD Am5x86 processor core, integrated PCI host controller, and several standard on-chip... |
em(4) -- Intel(R) PRO/1000 Gigabit Ethernet driver
|
The em driver provides support for PCI Gigabit Ethernet adapters based on the Intel 82540, 82541, 82542, 82543, 82544, 82545, 82546 and 82547 Ethernet controller chips. This includes the following mod... |
emu(4) -- Creative Labs SBLive! and PCI 512 audio device driver
|
The emu device driver supports Creative Sound Blaster Live! cards as well as the Sound Blaster PCI 512. These Environmental Audio cards are based upon the programmable EMU10K1 digital-processing chip.... |
enc(4) -- Encapsulating Interface
|
The enc interface is a software loopback mechanism that allows hosts or firewalls to filter ipsec(4) traffic using pf(4). The vpn(8) manpage shows an example of such a setup. The enc interface is a so... |
ep(4) -- 3Com EtherLink III and Fast EtherLink III Ethernet driver
|
The ep device driver supports the 3Com EtherLink III and Fast EtherLink III family of Ethernet cards. This includes, among others, the following models: 3C509 EtherLink III ISA 3C509B EtherLink III IS... |
esa(4) -- ESS Technology Allegro-1 / Maestro-3 family audio device driver
|
The esa driver provides support for the ESS Allegro-1 and Maestro-3 audio devices on the PCI bus. These devices are popular in laptop systems. The Allegro-1 and the Maestro-3 are full-duplex devices t... |
eso(4) -- ESS Technology Solo-1 PCI AudioDrive device driver
|
The eso device driver supports sound cards based on ESS Technology Solo-1 PCI AudioDrive chips (ES1938 and ES1946), e.g. the TerraTec 128i PCI card. |
sparc64/esp(4) -- ESP NCR 53c94 on-board or SBus SCSI controller
|
The esp is an on-board or SBus SCSI controller based on the NCR 53c94 chip, found on some Sun UltraSPARC workstations. |
sparc/esp(4) -- ESP NCR 53c94 on-board or SBus SCSI controller
|
The esp is an on-board or SBus SCSI controller based on the NCR 53c94 chip, found on Sun 4/300, sun4c and sun4m workstations. |
ess(4) -- ESS Technology AudioDrive family audio device driver
|
The ess driver provides support for the ESS 1788, 1888, 1887, and 888 AudioDrive audio devices. The AudioDrive 1788 is a half-duplex device, while the 1888, 1887, and 888 are full-duplex. All are capa... |
exphy(4) -- 3Com 3C905B-TX and 3C905C-TX internal Ethernet PHY driver
|
The exphy driver supports the internal PHY on 3Com 3C905B-TX and 3C905CTX 10/100 Ethernet interfaces. |
faith(4) -- IPv6-to-IPv4 TCP relay capturing interface
|
The faith interface captures IPv6 TCP traffic, for implementing userland IPv6-to-IPv4 TCP relay similar to faithd(8). A faith interface can be created at runtime using the ifconfig faithN create comma... |
cats/fcom(4) -- Footbridge serial communications driver
|
The fcom device handles the UART found on the footbridge(4) device, which provides an RS-232 serial port. The fcom driver supports all of the standard tty(4) ioctl calls. |
sparc/fd(4) -- SPARCstation floppy drive
|
This is the driver for the built-in diskette drive found on the SPARCstation 1, and (optionally) other desktop SPARC systems. |
fd(4) -- file descriptor files
|
The files /dev/fd/0 through /dev/fd/# refer to file descriptors which can be accessed through the file system. If the file descriptor is open and the mode the file is being opened with is a subset of ... |
sparc/fdc(4) -- SPARCstation floppy drive
|
This is the driver for the built-in diskette drive found on the SPARCstation 1, and (optionally) other desktop SPARC systems. |
fdc(4) -- NEC765 compatible floppy disk driver
|
The fdc driver supports the standard AT floppy disk controllers. These include standard IDE, MFM, RLL, EIDE, ESDI, and SCSI controllers with floppy attachment. The standard names of a floppy drive wil... |
fea(4) -- DEC FDDI controller device driver
|
The fpa and fea device drivers provide support for the DEC DEFPA PCI FDDI Controller and the DEC DEFEA EISA FDDI Controller, respectively. All variants of either controller are supported including the... |
sparc/fga(4) -- SPARC Force FGA5000 VME/SBus bridge driver
|
The fga driver provides a bridge between SBus and VME interfaces. It has support for accessing VME address and data spaces as if they were SBus address ranges, and mapping of VME interrupt levels to S... |
hp300/fhpib(4) -- built-in and 98625 HP-IB interfaces
|
The nhpib driver supports the built-in and 98625 HP-IB interfaces. |
fms(4) -- Forte Media FM801 audio device driver
|
The fms device driver supports the Forte Media FM801 sound card and various FM tuners attached to the sound card. |
cats/footbridge(4) -- DC21285 PCI bridge
|
The footbridge device provides support for the pci(4) bus on cats systems, and also features an uart and a clock device. |
fpa(4) -- DEC FDDI controller device driver
|
The fpa and fea device drivers provide support for the DEC DEFPA PCI FDDI Controller and the DEC DEFEA EISA FDDI Controller, respectively. All variants of either controller are supported including the... |
hp300/frodo(4) -- HP 9000/4xx Frodo ASIC
|
The FRODO ASIC (or ``Apollo Utility chip'') is found on HP 9000/4xx series workstations. It provides three apci(4) serial ports, the first one being used to connect the Domain keyboard. |
sparc/fvme(4) -- SPARC Force FGA5000 VME/SBus bridge driver
|
The fga driver provides a bridge between SBus and VME interfaces. It has support for accessing VME address and data spaces as if they were SBus address ranges, and mapping of VME interrupt levels to S... |
fxp(4) -- Intel EtherExpress PRO/100 Ethernet driver
|
The fxp device driver supports the Intel EtherExpress 100 family of Ethernet cards based on various revisions of the i82557, i82558, i82559, i82550, i82551, and i82562 chipsets. These come in several ... |
hp300/gbox(4) -- HP98700 ``Gatorbox'' frame buffer
|
The HP98700 and HP98710 are 4-bit color frame buffers, also known as the Gatorbox. They can be extended to 8-bit color with an HP98701 frame buffer extension. The 98710 also has some acceleration feat... |
gdt(4) -- Intel and ICP-Vortex GDT RAID driver
|
The gdt driver provides support for all currently known ICP Vortex adapters: GDT4x13RZ, GDT4x23RZ, GDT6000/6020/6050, GDT6000B/6010, GDT6110/6510, GDT6120/6520, GDT6513RS, GDT6518RS, GDT6523RS, GDT653... |
gem(4) -- GEM Gigabit Ethernet interface
|
The gem interface provides access to the 10Mb/s, 100Mb/s and 1Gb/s Ethernet networks. The gem is found on the Sun GEM and ERI 10/100 boards, as well as the Apple internal GMAC Ethernet. Each of the ho... |
i386/geodesc(4) -- Geode SC1100/SCx200 IAOC driver
|
The geodesc driver supports the watchdog timer of the Geode SC1100. The Geode SC1100/SCx200 is a member of the AMD Information Appliance On a Chip (IAOC) family of fully integrated x86 system chips. T... |
gif(4) -- generic tunnel interface
|
The gif interface is a generic tunnelling pseudo-device for IPv4 and IPv6. It can tunnel IPv[46] traffic over IPv[46], for a total of four possible combinations. The behavior of gif is mainly based on... |
gpio(4) -- General Purpose Input/Output
|
The gpio device attaches to the GPIO controller and provides a uniform programming interface to its pins. Each GPIO controller with an attached gpio device has an associated device file under the /dev... |
gpr(4) -- GemPlus GPR400 PCMCIA smartcard reader
|
The gpr driver provides support for the GemPlus GPR400 PCMCIA smartcard reader. The driver provides a number of ioctl functions to send and received information from the smartcard reader and/or the sm... |
gre(4) -- encapsulating network device
|
The gre network interface allows tunnel construction using the Cisco GRE or the Mobile-IP (RFC 2004) encapsulation protocols. A gre interface can be created at runtime using the ifconfig greN create c... |
hp300/grf(4) -- HP graphics frame buffer device interface
|
This is a generic description of the frame buffer device interface. The devices to which this applies are the 98544, 98545 and 98547 Topcat graphics cards (also known as HP300H devices), the 98548, 98... |
hppa/gsc(4) -- General System Connect bus on HP 9000/700 machines
|
This is the core I/O bus for all HP 9000/700 workstations. All I/O subsystems connect to this bus. The devices can be either on separate chips, expansion cards or on an integrated megacell, like the L... |
hppa/gsckbc(4) -- PS/2-like controller driver
|
The gsckbc driver handles resource allocation and device attachment for the PS/2 input device ports. Each gsckbc driver provides the logical connection for one child device, either the ``keyboard'' ... |
hppa/gsckbd(4) -- PS/2-like keyboard driver for wscons
|
This driver supports the HP-specific PS/2-like keyboards within the wscons(4) console framework. It doesn't provide direct device driver entry points but makes its functions available via the interna... |
i386/gscpcib(4) -- National Semiconductor Geode SC1100 PCI-ISA bridge
|
The gscpcib driver provides support for the National Semiconductor Geode SC1100 System-on-Chip PCI-ISA bridge. This device is mostly usual PCIISA bridge but with some additional sub-devices. Besides t... |
gscsio(4) -- National Semiconductor Geode SC1100 Super I/O
|
The gscsio driver provides support for the National Semiconductor Geode SC1100 System-on-Chip Super I/O module. The Super I/O (SIO) module incorporates one serial port, an infrared communication port,... |
gtp(4) -- Gemtek PCI FM radio device driver
|
The gtp driver provides support for the Gemtek PCI and Guillemot MaxiRadio FM2000 FM radio tuners. The Gemtek PCI cards are stereo FM tuners that can tune in the range 87.5 - 108.0 MHz, report signal ... |
i386/gus(4) -- Gravis UltraSound/UltraSound MAX device driver
|
The gus driver provides support for the Gravis UltraSound (GUS) and GUS MAX audio cards. Both cards have on-board memory which is used for seamless playback of samples. They can play back 8- or 16-bit... |
hppa/harmony(4) -- CS4215/AD1849 audio interface
|
The harmony device uses the Crystal Semiconductor CS4215 16-Bit Multimedia Audio Codec or Analog Devices AD1849 SoundPort(R) Stereo Codec chip to implement the audio device interface described in audi... |
hp300/hd(4) -- CS/80 disk interface
|
This is a generic CS/80 disk driver. Only a small number of possible CS/80 drives are supported, but others can easily be added by adding tables to the driver. It is a typical block-device driver; see... |
hifn(4) -- Hifn 7751/7811/7951/7955/7956/9751 crypto accelerator
|
The hifn driver supports various cards containing the Hifn 7751, Hifn 7811, Hifn 7951, Hifn 7955, Hifn 7956, or Hifn 9751 chipsets, such as Invertex AEON No longer being made. Came as 128KB SRAM model... |
hp300/hil(4) -- Human Interface Link device driver
|
The Human Interface Link (HIL) is the interface used by the Series 300 computers to connect devices such as keyboards, mice, control knobs, and ID modules to the machine. Special files /dev/hil[1-7] r... |
hil(4) -- HP-HIL driver
|
The hil interface provides access to the ``Human Interface Loop'' controller found on many HP workstations. It provides generic HIL management and interfaces for child devices, such as keyboards, bu... |
hilid(4) -- HIL ID module driver
|
This driver recognizes the HIL ``ID module'' device. The only purpose of this device is to provide a small, unique, bitstring. |
hilkbd(4) -- HIL keyboard driver
|
This driver supports HIL keyboards within the wscons(4) framework. It doesn't provide direct device driver entry points, but makes its functions available through the internal wskbd(4) interface. The... |
hilms(4) -- HIL mouse and graphics tablet driver
|
This driver supports HIL mice and graphics tablet within the wscons(4) framework. It doesn't provide direct device driver entry points, but makes its functions available through the internal wsmouse(... |
hme(4) -- Sun Happy Meal Ethernet
|
The hme interface provides access to the 10Mb/s and 100Mb/s Ethernet networks via the National DP83840 Ethernet 10/100 Mb/s Physical Layer or the Quality QS6612 Ethernet MII Transceiver for Category 5... |
hotplug(4) -- devices hot plugging
|
The hotplug pseudo-device passes device attachment and detachment events to userland. When a device attaches or detaches, the corresponding event is queued. The events can then be obtained from the qu... |
vax/hp(4) -- MASSBUS disk interface
|
The hp driver is a generic MASSBUS disk driver which handles the standard DEC controllers. It is typical of a block-device disk driver; block I/O is described in physio(9). The script MAKEDEV(8) shoul... |
hp300/hpibbus(4) -- built-in and 98625 HP-IB interfaces
|
The nhpib driver supports the built-in and 98625 HP-IB interfaces. |
hsq(4) -- multiplexing serial communications interface
|
The hsq driver provides support for Hostess (Comtrol Corporation, www.comtrol.com) and compatible boards that multiplex together up to four EIA RS-232C (CCITT V.28) communications interfaces. Each hsq... |
hp300/hyper(4) -- HP A1096A ``Hyperion'' frame buffer
|
The ``Hyperion'' is a monochrome frame buffer. The hyper driver provides a frame buffer abstraction to the grf(4) driver, and the associated ite(4) console framework. |
vax/ibus(4) -- VAX internal bus
|
The ibus driver supports the internal I/O bus found on Q-bus based or Qbus capable VAXstation, MicroVAX, and VAX 4000 systems. It is combined with a vsbus(4) on the VAX 4000 100 class and certain late... |
i386/ichpcib(4) -- Intel ICHx/ICHx-M LPC bridges
|
The ichpcib driver supports Intel ICH, ICH0, ICH2, ICH2-M, ICH3-S, ICH3-M, ICH4, ICH4-M, and ICH-5 LPC bridges. These devices are mostly usual PCI-ISA bridges but with some additional power management... |
icmp(4) -- Internet Control Message Protocol
|
ICMP is the error and control message protocol used by IP and the Internet protocol family. It may be accessed through a ``raw socket'' for network monitoring and diagnostic functions. The proto par... |
icmp6(4) -- Internet Control Message Protocol for IPv6
|
ICMPv6 is the error and control message protocol used by IPv6 and the Internet protocol family. It may be accessed through a ``raw socket'' for network monitoring and diagnostic functions. The proto... |
icsphy(4) -- Integrated Circuit Systems ICS189x 10/100 Ethernet PHY driver
|
The icsphy driver supports the Integrated Circuit Systems ICS1890 10/100 Ethernet PHYs and its successors ICS1892 and ICS1893. These PHYs are found on a variety of high-performance Ethernet interfaces... |
idp(4) -- Xerox Internet Datagram Protocol
|
IDP is a simple, unreliable datagram protocol which is used to support the SOCK_DGRAM abstraction for the Internet protocol family. IDP sockets are connectionless, and are normally used with the sendt... |
i386/ie(4) -- Intel i82586 Ethernet driver
|
The ie device driver supports Intel 82586-based Ethernet cards. This includes the following network adapters: 3Com 3C507 AT&T StarLAN 10 AT&T EN100 AT&T StarLan Fiber Intel EtherExpress 16 Other model... |
sparc/ie(4) -- SPARC Intel 82586 Ethernet interface
|
The ie interface provides access to the 10 Mb/s Ethernet network via the Intel 82586 Ethernet chip set. The ie is found as an onboard interface on Sun 4/100 and 4/200 workstations. The ie also exists ... |
mvme88k/ie(4) -- Intel i82596CA LAN coprocessor
|
The ie interface provides access to the 10 Mb/s Ethernet network via the Intel i82596CA 32-bit Local Area Network Coprocessor for Ethernet. Each of the host's network addresses is specified at boot t... |
hppa/ie(4) -- Intel i82596 DX/CA LAN coprocessor as found in HP 9000/700 machines
|
The ie interface provides access to the 10 Mb/s Ethernet network via the Intel i82596 DX/CA 32-bit Local Area Network Coprocessor for Ethernet. Each of the host's network addresses is specified at bo... |
mvme68k/ie(4) -- Intel 82586 Ethernet driver
|
The ie interface provides access to the 10 Mb/s Ethernet network via the Intel 82586 Ethernet chip set. Each of the host's network addresses is specified at boot time with an SIOCSIFADDR ioctl(2). Th... |
ifmedia(4) -- network interface media settings
|
The ifmedia interface provides a consistent method for querying and setting network interface media and media options. The media is typically set using the ifconfig(8) command. There are currently fou... |
iha(4) -- Initio INIC-940/950 based PCI SCSI Host Adapters
|
The iha driver supports PCI SCSI host adapters based on the Initio INIC-940 and INIC-950 chips, including the following: +o DTC Domex 3194U Plus +o INI-9090U +o INI-9100U/UW +o Iwill 2935UW |
iic(4) -- Inter IC (I2C) bus
|
I2C is a two-wire bus developed by Philips used for connecting integrated circuits. It is commonly used for connecting devices such as EEPROMs, temperature sensors, fan controllers, real-time clocks, ... |
inet(4) -- Internet protocol family
|
The Internet protocol family is a collection of protocols layered atop the Internet Protocol (IP) transport layer, and utilizing the Internet address format. The Internet family provides protocol supp... |
inet6(4) -- Internet protocol version 6 family
|
The inet6 family is an updated version of the inet(4) family. While inet(4) implements Internet Protocol version 4, inet6 implements Internet Protocol version 6. inet6 is a collection of protocols lay... |
inphy(4) -- Intel i82555/i82562 10/100 Ethernet PHY driver
|
The inphy driver supports the Intel i82555, i82562EM and i82562ET 10/100 Ethernet PHYs. These PHYs are found on a variety of highperformance Ethernet interfaces. |
sparc64/intro(4) -- introduction to special files and hardware support
|
The manual pages in section 4 describe the special files, related driver functions, and networking support available in the system. In this part of the manual, the SYNOPSIS section of each configurabl... |
mac68k/intro(4) -- introduction to special files and hardware support
|
The manual pages in section 4 describe the special files, related driver functions, and networking support available in the system. In this part of the manual, the SYNOPSIS section of each configurabl... |
macppc/intro(4) -- introduction to special files and hardware support
|
The manual pages in section 4 describe the special files, related driver functions, and networking support available in the system. In this part of the manual, the SYNOPSIS section of each configurabl... |
sgi/intro(4) -- introduction to special files and hardware support
|
The manual pages in section 4 describe the special files, related driver functions, and networking support available in the system. In this part of the manual, the SYNOPSIS section of each configurabl... |
i386/intro(4) -- introduction to special files and hardware support
|
The manual pages in section 4 describe the special files, related driver functions, and networking support available in the system. In this part of the manual, the SYNOPSIS section of each configurabl... |
alpha/intro(4) -- introduction to special files and hardware support
|
The manual pages in section 4 describe the special files, related driver functions, and networking support available in the system. In this part of the manual, the SYNOPSIS section of each configurabl... |
sparc/intro(4) -- introduction to special files and hardware support
|
The manual pages in section 4 describe the special files, related driver functions, and networking support available in the system. In this part of the manual, the SYNOPSIS section of each configurabl... |
mvme88k/intro(4) -- introduction to special files and hardware support
|
The manual pages in section 4 describe the special files, related driver functions, and networking support available in the system. In this part of the manual, the SYNOPSIS section of each configurabl... |
amd64/intro(4) -- introduction to special files and hardware support
|
The manual pages in section 4 describe the special files, related driver functions, and networking support available in the system. In this part of the manual, the SYNOPSIS section of each configurabl... |
cats/intro(4) -- introduction to special files and hardware support
|
The manual pages in section 4 describe the special files, related driver functions, and networking support available in the system. In this part of the manual, the SYNOPSIS section of each configurabl... |
hp300/intro(4) -- introduction to special files and hardware support
|
The manual pages in section 4 describe the special files, related driver functions, and networking support available in the system. In this part of the manual, the SYNOPSIS section of each configurabl... |
vax/intro(4) -- introduction to special files and hardware support
|
The manual pages in section 4 describe the special files, related driver functions, and networking support available in the system. In this part of the manual, the SYNOPSIS section of each configurabl... |
luna88k/intro(4) -- introduction to special files and hardware support
|
The manual pages in section 4 describe the special files, related driver functions, and networking support available in the system. In this part of the manual, the SYNOPSIS section of each configurabl... |
hppa/intro(4) -- introduction to special files and hardware support
|
This section describes the special files, related driver functions, and networking support available in the system. In this part of the manual, the SYNOPSIS section of each configurable device gives a... |
mvme68k/intro(4) -- introduction to special files and hardware support
|
The manual pages in section 4 describe the special files, related driver functions, and networking support available in the system. In this part of the manual, the SYNOPSIS section of each configurabl... |
hppa/io(4) -- HP PA-RISC I/O subsystem reference
|
The following table lists the PA-RISC I/O subsystems and connected devices found in the supported HP 9000/700 machines. Model MBA SCSI Network Video Misc 705 A SE DX Timber 710 A SE DX Timber 712 LW S... |
iop(4) -- I2O (RAID) adapter driver
|
The iop driver provides support for PCI I/O processors conforming to the I2O specification, revision 1.5 and above. |
iophy(4) -- Intel i82553 10/100 Ethernet PHY driver
|
The iophy driver supports the Intel i82553 10/100 Ethernet PHYs found on some Intel i82557-based Ethernet cards. |
ioprbs(4) -- I2O random block storage
|
The ioprbs driver provides support for I2O random block storages, like RAID-sets. So far only the following adapters have been tested: Adaptec 2100S Adaptec 2110S Adaptec 3200S Although only these ada... |
iopsp(4) -- I2O SCSI port driver
|
The iopsp driver provides support for I2O SCSI bus adapter ports and child peripherals. IOPs present each child peripheral attached to a bus adapter port as an individual device. In order to present t... |
ip(4) -- Internet Protocol
|
IP is the network layer protocol used by the Internet protocol family. Options may be set at the IP level when using higher-level protocols that are based on IP (such as TCP and UDP). It may also be a... |
ip6(4) -- Internet Protocol version 6 (IPv6)
|
IPv6 is the network layer protocol used by the Internet protocol version 6 family (AF_INET6). Options may be set at the IPv6 level when using higher-level protocols that are based on IPv6 (such as TCP... |
ipcomp(4) -- IP Payload Compression Protocol
|
IPComp is a protocol used to reduce the size of IP datagrams. It can be used to enhance the communication performance between a pair of hosts/gateways, especially on slow links, by compressing the dat... |
ipsec(4) -- IP Security Protocol
|
IPsec is a pair of protocols, ESP (for Encapsulating Security Payload) and AH (for Authentication Header), which provide security services for IP datagrams. The original Internet Protocol - IPv4 - doe... |
alpha/irongate(4) -- API UP1000 AMD751 Core Logic + AGP Chipset
|
The irongate driver provides support for the AMD751 Core Logic + AGP Chipset found on Alpha Processor, Inc.'s UP1000 systems. |
isa(4) -- introduction to ISA bus support
|
The system includes a machine-independent ISA bus subsystem and several machine-independent ISA device drivers. Your system may support additional ISA devices. Drivers for ISA devices not listed here ... |
isapnp(4) -- introduction to ISA Plug-and-Play support
|
An isapnp bus can be configured for each supported ISA bus. OpenBSD provides machine-independent bus support and drivers for ISA Plug-and-Play (isapnp) autoconfiguration of PnP-compatible devices on a... |
ises(4) -- Securealink PCC-ISES hardware crypto accelerator
|
The ises driver supports cards containing the Securealink PCC-ISES chipset. The ises driver at the moment only provides strong random data to the random(4) subsystem. |
isp(4) -- Qlogic based SCSI or FibreChannel SCSI Host Adapters
|
This driver provides access to a SCSI bus or a FibreChannel connected to Qlogic ISP1000 (SBus), ISP1020 (PCI), ISP1040(PCI), ISP1080(PCI), ISP12160(PCI) SCSI host adapters or ISP2100(PCI), ISP2200(PCI... |
it(4) -- ITE IT8705F, IT8712F and SiS SiS950 hardware monitors
|
The it driver provides support for the IT8705F, IT8712F and SiS950 hardware monitors to be used with the sysctl(8) interface. Most supported devices possess 15 sensors: Sensor Units Typical Use Fan0 R... |
hp300/ite(4) -- HP Internal Terminal Emulator
|
TTY special files of the form /dev/ttye? are interfaces to the HP ITE for bit-mapped displays as implemented under OpenBSD. An ITE is the main system console on most HP300 workstations and is the mech... |
i386/iy(4) -- Intel i82595 Ethernet driver
|
The iy device driver supports the Ether-Express PRO/10 card, and might support other ISA cards using the same chip. Other models of Intel network cards are supported by the fxp(4) and ie(4) drivers. V... |
i386/joy(4) -- Games adapter driver
|
This driver provides access to the games adapter. The lower bit in the minor device number selects the joystick: 0 is the first joystick and 1 is the second. The game control adapter allows up to two ... |
macppc/kauaiata(4) -- ATA100 HD controller on PCI bus
|
The kauaiata device serves as a bridge to wdc_obio. The DBDMA based controller logic which was on the macobio(4) was copied and placed on the PCI bus. This driver adapts the PCI configuration data int... |
keynote(4) -- a trust-management system
|
For more details on keynote, see RFC 2704. Details on the API, assertion syntax, and command-line tool are given in the man pages listed at the end of this manual. Trust management, introduced in the ... |
macppc/ki2c(4) -- kauai i2c interface stub
|
The ki2c device is an interface stub which controls the i2c audio mixer. |
sparc64/kmem(4) -- memory files
|
The file /dev/mem is an interface to the physical memory of the computer. Byte offsets in this file are interpreted as physical memory addresses. Reading and writing this file is equivalent to reading... |
mac68k/kmem(4) -- memory files
|
The file /dev/mem is an interface to the physical memory of the computer. Byte offsets in this file are interpreted as physical memory addresses. Reading and writing this file is equivalent to reading... |
macppc/kmem(4) -- memory files
|
The file /dev/mem is an interface to the physical memory of the computer. Byte offsets in this file are interpreted as physical memory addresses. Reading and writing this file is equivalent to reading... |
i386/kmem(4) -- memory files
|
The special file /dev/mem is an interface to the physical memory of the computer. Byte offsets in this file are interpreted as physical memory addresses. Reading and writing this file is equivalent to... |
alpha/kmem(4) -- memory files
|
The file /dev/mem is an interface to the physical memory of the computer. Byte offsets in this file are interpreted as physical memory addresses. Reading and writing this file is equivalent to reading... |
sparc/kmem(4) -- memory files
|
The file /dev/mem is an interface to the physical memory of the computer. Byte offsets in this file are interpreted as physical memory addresses. Reading and writing this file is equivalent to reading... |
mvme88k/kmem(4) -- memory files
|
The file /dev/mem is an interface to the physical memory of the computer. Byte offsets in this file are interpreted as physical memory addresses. Reading and writing this file is equivalent to reading... |
amd64/kmem(4) -- memory files
|
The special file /dev/mem is an interface to the physical memory of the computer. Byte offsets in this file are interpreted as physical memory addresses. Reading and writing this file is equivalent to... |
cats/kmem(4) -- memory files
|
The special file /dev/mem is an interface to the physical memory of the computer. Byte offsets in this file are interpreted as physical memory addresses. Reading and writing this file is equivalent to... |
hp300/kmem(4) -- memory files
|
The file /dev/mem is an interface to the physical memory of the computer. Byte offsets in this file are interpreted as physical memory addresses. Reading and writing this file is equivalent to reading... |
vax/kmem(4) -- memory files
|
The special file /dev/mem is an interface to the physical memory of the computer. Byte offsets in this file are interpreted as physical memory addresses. Reading and writing this file is equivalent to... |
luna88k/kmem(4) -- memory files
|
The file /dev/mem is an interface to the physical memory of the computer. Byte offsets in this file are interpreted as physical memory addresses. Reading and writing this file is equivalent to reading... |
hppa/kmem(4) -- memory files and memory controller
|
The mem driver controls and restricts access to the systems memory by the hardware buses and the processor. It also provides an interface to userland through the special files /dev/mem and /dev/kmem. ... |
mvme68k/kmem(4) -- memory files
|
The file /dev/mem is an interface to the physical memory of the computer. Byte offsets in this file are interpreted as physical memory addresses. Reading and writing this file is equivalent to reading... |
ksyms(4) -- kernel symbol table device
|
The /dev/ksyms device masquerades as an OpenBSD native executable (a.out or ELF, depending on the platform) with the symbols from the running kernel as its symbol segment. Use of /dev/ksyms requires t... |
kue(4) -- Kawasaki LSI KL5KUSB101B USB Ethernet driver
|
The kue driver provides support for USB Ethernet adapters based on the Kawasaki LSI KL5KLUSB101B chipset. This includes the following adapters: 3Com 3c19250 3Com 3c460 HomeConnect AboCom Systems URE45... |
hppa/lasi(4) -- core bus controller and I/O subsystem as present on newer HP 9000/700 workstations and single-board ...
|
The supported Core bus controllers are those used in conjunction with PA7100LC and PA7300LC CPUs and based upon LSI's macrochip that includes: +o Core bus controller +o System Clock +o Interrupt Cont... |
lc(4) -- DEC EtherWORKS III Ethernet interfaces device driver
|
The lc device driver supports DEC EtherWORKS III Ethernet interfaces, which are based on the LEMAC Ethernet chip. This includes the DE203, DE204, and DE205. |
alpha/lca(4) -- DECchip 21066 Core Logic chipset
|
The lca driver provides support for the DECchip 21066 Core Logic chipset. |
sparc64/le(4) -- AMD LANCE Ethernet interface
|
The le interface provides access to the 10 Mb/s Ethernet network via the AMD Am7990 Local Area Network Controller for Ethernet (LANCE) chip set. Each of the host's network addresses is specified at b... |
i386/le(4) -- AMD LANCE Ethernet interface
|
The le interface provides access to a 10 Mb/s Ethernet network via the AMD LANCE Ethernet chips. This includes the following models: AT&T StarLAN 10, EN100, and StarLAN Fiber BICC Isolan BOCALANcard/P... |
alpha/le(4) -- Alpha on-board or PCI AMD LANCE Ethernet interface
|
The le interface provides access to the Ethernet network via the AMD LANCE Ethernet chip set. Each of the host's network addresses is specified at boot time with an SIOCSIFADDR ioctl(2). The le inter... |
sparc/le(4) -- AMD LANCE Ethernet interface
|
The le interface provides access to the 10 Mb/s Ethernet network via the AMD Am7990 Local Area Network Controller for Ethernet (LANCE) chip set. Each of the host's network addresses is specified at b... |
mvme88k/le(4) -- MVME376 AMD LANCE Ethernet interface
|
The le driver provides access to the AMD 7990/LANCE-based MVME376 VME board. This in turn provides an interface to the Ethernet network. Each of the host's network addresses is specified at boot time... |
hp300/le(4) -- AMD LANCE Ethernet interface
|
The le interface provides access to a 10 Mb/s Ethernet network via the AMD 7990 LANCE Ethernet chip set. Each of the host's network addresses is specified at boot time with an SIOCSIFADDR ioctl(2). T... |
vax/le(4) -- AMD LANCE Ethernet interface
|
The le interface provides access to the 10 Mb/s Ethernet network through the AMD Am7990 Local Area Network Controller for Ethernet (LANCE) chipset. Different machine configurations have varying types ... |
luna88k/le(4) -- AMD LANCE Ethernet interface
|
The le interface provides access to a 10 Mb/s Ethernet network via the AMD 7990 LANCE Ethernet chip set. Each of the host's network addresses is specified at boot time with an SIOCSIFADDR ioctl(2). T... |
mvme68k/le(4) -- AMD LANCE Ethernet interface
|
The le interface provides access to the 10 Mb/s Ethernet network via the AMD 7990 LANCE Ethernet chip set. Each of the host's network addresses is specified at boot time with an SIOCSIFADDR ioctl(2).... |
sparc64/lebuffer(4) -- AMD LANCE Ethernet interface
|
The le interface provides access to the 10 Mb/s Ethernet network via the AMD Am7990 Local Area Network Controller for Ethernet (LANCE) chip set. Each of the host's network addresses is specified at b... |
sparc/lebuffer(4) -- AMD LANCE Ethernet interface
|
The le interface provides access to the 10 Mb/s Ethernet network via the AMD Am7990 Local Area Network Controller for Ethernet (LANCE) chip set. Each of the host's network addresses is specified at b... |
sparc/led(4) -- SPARC LED driver
|
The led driver provides an indicator of load average based on blinking of the LEDs on some systems. The pattern takes one second per whole number of load average to repeat. The LED must be explicitly ... |
sparc64/ledma(4) -- AMD LANCE Ethernet interface
|
The le interface provides access to the 10 Mb/s Ethernet network via the AMD Am7990 Local Area Network Controller for Ethernet (LANCE) chip set. Each of the host's network addresses is specified at b... |
sparc/ledma(4) -- AMD LANCE Ethernet interface
|
The le interface provides access to the 10 Mb/s Ethernet network via the AMD Am7990 Local Area Network Controller for Ethernet (LANCE) chip set. Each of the host's network addresses is specified at b... |
lge(4) -- Level 1 LXT1001 NetCellerator PCI Gigabit Ethernet adapter driver
|
The lge driver provides support for various NICs based on the Level 1 LXT1001 NetCellerator Gigabit Ethernet controller chip, including the following: +o SMC TigerCard 1000 (SMC9462SX) +o D-Link DGE-5... |
vax/lkkbd(4) -- LK200/LK400 keyboard driver
|
The lkkbd driver provides support for DEC LK200 and LK400 keyboards hooked up to dz(4) serial controllers within the wscons(4) framework. |
lkm(4) -- Loadable Kernel Modules interface
|
Loadable kernel modules allow the system administrator to dynamically add and remove functionality from a running system. This ability also helps software developers to develop new parts of the kernel... |
vax/lkms(4) -- serial mouse driver
|
The lkms driver provides support for DEC mice hooked up to dz(4) serial controllers within the wscons(4) framework. |
lm(4) -- National Semiconductor LM78, LM79 and compatible hardware monitors
|
The lm driver provides support for the National Semiconductor LM series hardware monitors and register compatible chips to be used with the sysctl(8) interface. Most supported devices possess 11 senso... |
lmc(4) -- Lan Media Corporation SSI/DS1/HSSI/DS3 card device driver
|
The lmc driver provides support for the Lan Media Corporation SSI, DS1, HSSI, and DS3 PCI WAN adapters based on the DEC 21140 Ethernet chip. The adapters use a DEC 21140 Ethernet chip for the PCI bus ... |
i386/lms(4) -- Logitech-style bus mouse driver
|
This driver provides an interface to a Logitech-style bus mouse. Mouse related data are accessed by wsmouse(4) devices. |
lmtemp(4) -- National Semiconductor LM75/LM77 temperature sensor
|
The lmtemp driver provides support for the National Semiconductor LM75 and LM77 temperature sensors. The sensor possesses single temperature value that can be accessed through the sysctl(8) interface. |
lo(4) -- software loopback network interface
|
The loop interface is a software loopback mechanism which may be used for performance analysis, software testing, and/or local communication. A loop interface can be created at runtime using the ifcon... |
lofn(4) -- Hifn 6500 crypto accelerator driver
|
The lofn driver supports cards using the Hifn 6500 public key processor. This chip has both a random number generator and a large number processor. The random number generator provides random bits to ... |
lpt(4) -- parallel port driver
|
This driver provides access to parallel ports. The highest bit in the minor (bit 7, or add 128) number selects whether to do polling or wait for interrupts. If no IRQ is specified in the kernel config... |
lxtphy(4) -- Level One LXT-970/971 10/100 Ethernet PHY driver
|
The lxtphy driver supports the Level One LXT-970, LXT-970A and LXT-971 10/100 Ethernet PHYs. These PHYs are found on a variety of high-performance Ethernet interfaces. |
sgi/macebus(4) -- Multimedia, Audio and Communications Engine I/O ASIC
|
The macebus driver provides access to the MACE I/O ASIC, which manages all the on-board devices on the O2. The macebus also provides a PCI bridge. |
sgi/macepcibr(4) -- Multimedia, Audio and Communications Engine I/O ASIC
|
The macebus driver provides access to the MACE I/O ASIC, which manages all the on-board devices on the O2. The macebus also provides a PCI bridge. |
macppc/macobio(4) -- Apple PowerPC onboard I/O bus bridge
|
The macobio device serves as a bridge to many of the onboard devices; it supports the Heathrow, Intrepid, Keylargo, OHare, Paddington, and Pangea modules. |
maestro(4) -- ESS Maestro 1 and 2 audio driver
|
The maestro driver supports ESS maestro 1, 2 and 2E, including OEM products that identify as NEC Versa, or NEC VersaProNX VA26D, as long as they use an AC97 compliant codec, which is always the case, ... |
sparc64/magma(4) -- Magma Sp Serial/Parallel board device driver
|
This driver provides an interface to Magma LC2+1Sp, 2+1Sp, 4+1Sp, 8+2Sp, 4Sp, 8Sp, 12Sp, 16Sp, 1P, 2P, and 2+1HS boards. These boards are based around the Cirrus Logic CD1400 serial/parallel communica... |
sparc/magma(4) -- Magma Sp Serial/Parallel board device driver
|
This driver provides an interface to Magma LC2+1Sp, 2+1Sp, 4+1Sp, 8+2Sp, 4Sp, 8Sp, 12Sp, 16Sp, 1P, 2P, and 2+1HS boards. These boards are based around the Cirrus Logic CD1400 serial/parallel communica... |
mac68k/mainbus(4) -- Mac68k main processor bus device
|
The mainbus interface serves as an abstraction used by the autoconfiguration system to help find and attach busses (e.g. the NuBus expansion bus) or devices connected to the Macintosh main processor b... |
mac68k/mc(4) -- Ethernet driver for Am79C940 (MACE) on-board Ethernet
|
The mc interface provides access to a 10 Mb/s Ethernet network via the AMD Am79C940 (MACE) Ethernet chip set. Each of the host's network addresses is specified at boot time with an SIOCSIFADDR ioctl(... |
i386/mcd(4) -- Mitsumi CD-ROM driver
|
The mcd driver provides support for Mitsumi CD-ROM drives and controllers. |
sgi/mec(4) -- MAC-110 Ethernet controller
|
The mec driver provides support for the MAC-110 Fast Ethernet controller found on the O2 machines. |
macppc/mediabay(4) -- ATA33 HD controller on macobio
|
The mediabay device allows attachment of wdc(4) to the removeable CD on the pismo powerbook machines. |
sparc64/mem(4) -- memory files
|
The file /dev/mem is an interface to the physical memory of the computer. Byte offsets in this file are interpreted as physical memory addresses. Reading and writing this file is equivalent to reading... |
mac68k/mem(4) -- memory files
|
The file /dev/mem is an interface to the physical memory of the computer. Byte offsets in this file are interpreted as physical memory addresses. Reading and writing this file is equivalent to reading... |
macppc/mem(4) -- memory files
|
The file /dev/mem is an interface to the physical memory of the computer. Byte offsets in this file are interpreted as physical memory addresses. Reading and writing this file is equivalent to reading... |
i386/mem(4) -- memory files
|
The special file /dev/mem is an interface to the physical memory of the computer. Byte offsets in this file are interpreted as physical memory addresses. Reading and writing this file is equivalent to... |
alpha/mem(4) -- memory files
|
The file /dev/mem is an interface to the physical memory of the computer. Byte offsets in this file are interpreted as physical memory addresses. Reading and writing this file is equivalent to reading... |
sparc/mem(4) -- memory files
|
The file /dev/mem is an interface to the physical memory of the computer. Byte offsets in this file are interpreted as physical memory addresses. Reading and writing this file is equivalent to reading... |
mvme88k/mem(4) -- memory files
|
The file /dev/mem is an interface to the physical memory of the computer. Byte offsets in this file are interpreted as physical memory addresses. Reading and writing this file is equivalent to reading... |
amd64/mem(4) -- memory files
|
The special file /dev/mem is an interface to the physical memory of the computer. Byte offsets in this file are interpreted as physical memory addresses. Reading and writing this file is equivalent to... |
cats/mem(4) -- memory files
|
The special file /dev/mem is an interface to the physical memory of the computer. Byte offsets in this file are interpreted as physical memory addresses. Reading and writing this file is equivalent to... |
hp300/mem(4) -- memory files
|
The file /dev/mem is an interface to the physical memory of the computer. Byte offsets in this file are interpreted as physical memory addresses. Reading and writing this file is equivalent to reading... |
vax/mem(4) -- memory files
|
The special file /dev/mem is an interface to the physical memory of the computer. Byte offsets in this file are interpreted as physical memory addresses. Reading and writing this file is equivalent to... |
luna88k/mem(4) -- memory files
|
The file /dev/mem is an interface to the physical memory of the computer. Byte offsets in this file are interpreted as physical memory addresses. Reading and writing this file is equivalent to reading... |
hppa/mem(4) -- memory files and memory controller
|
The mem driver controls and restricts access to the systems memory by the hardware buses and the processor. It also provides an interface to userland through the special files /dev/mem and /dev/kmem. ... |
mvme68k/mem(4) -- memory files
|
The file /dev/mem is an interface to the physical memory of the computer. Byte offsets in this file are interpreted as physical memory addresses. Reading and writing this file is equivalent to reading... |
sparc64/mgx(4) -- SMS MGX and MGXPlus accelerated 24-bit color frame buffers
|
The Southland Media Systems (now Quantum 3D) MGX and MGXPlus are SBus color frame buffers, with graphics acceleration capabilities. The mgx driver interfaces the frame buffer with the wscons(4) consol... |
sparc/mgx(4) -- SMS MGX and MGXPlus accelerated 24-bit color frame buffers
|
The Southland Media Systems (now Quantum 3D) MGX and MGXPlus are SBus color frame buffers, with graphics acceleration capabilities. The mgx driver interfaces the frame buffer with the wscons(4) consol... |
midi(4) -- device-independent MIDI driver layer
|
The midi driver provides support for various MIDI peripherals. It provides a uniform programming interface layer above different underlying MIDI hardware drivers. The MIDI hardware can be of many diff... |
mii(4) -- IEEE 802.3 Media Independent Interface
|
Media Independent Interface is an IEEE standard serial bus for connecting MACs (network controllers) to PHYs (physical media interfaces). The mii layer allows network device drivers to share support c... |
mixer(4) -- device-independent audio driver layer
|
The audio driver provides support for various audio peripherals. It provides a uniform programming interface layer above different underlying audio hardware drivers. The audio layer provides full-dupl... |
i386/mms(4) -- Microsoft-style bus mouse driver
|
This driver provides an interface to a Microsoft-style bus mouse. Mouse related data are accessed by wsmouse(4) devices. |
hppa/mongoose(4) -- EISA Bus adapter
|
Provides an interface from the CPU-memory bus to EISA and ISA devices. Two variations exist providing the same functionality based on Intel i82350 or Texas Instruments chips. Depending on the model th... |
mpt(4) -- LSI Fusion-MPT SCSI and FibreChannel host adapter driver
|
The mpt driver provides support for the LSI Logic Fusion-MPT family of SCSI and Fibre Channel controllers: +o 53c1020 (Single Ultra320 SCSI) +o 53c1030 (Dual Ultra320 SCSI) +o FC909 (1Gb/s Fibre Chann... |
mpu(4) -- Roland/Yamaha MPU401 (and compatible) MIDI UART driver
|
The mpu driver provides support for the Roland/Yamaha MPU401 (and compatible) MIDI UART cards. Access to the device is through the MIDI driver. |
vax/mscpbus(4) -- MSCP device bus
|
The mscpbus system provides a uniform and modular system for the implementation of drivers to control various MSCP devices. When the system probes the MSCP bus, it attaches any devices it finds to the... |
vax/mt(4) -- TM78/ TU-78 MASSBUS magtape interface
|
The TM78/ TU-78 combination provides a standard tape drive interface as described in mtio(4). Only 1600 and 6250 BPI are supported; the TU-78 runs at 125 IPS and autoloads tapes. |
vax/mtc(4) -- UNIBUS MSCP tape controller driver
|
The mtc driver is for UNIBUS tape controllers that use MSCP. Among these controllers are: DEC KLESI-U UNIBUS ctlr DEC TK50 Q22 bus ctlr The mtc communicates with the host through a packet protocol kno... |
mtd(4) -- Myson Technology MTD800/MTD803/MTD891 Ethernet driver
|
The mtd driver provides support for Myson MTD800/MTD803 Fast Ethernet and MTD891 Gigabit Ethernet chips. Supported models include: +o Safeway Lancard SW-10/100 PCI (model 117204) +o Surecom EP-320X-S |
mtdphy(4) -- Myson MTD972 10/100 Ethernet PHY driver
|
The mtdphy driver supports the Myson MTD972 10/100 Ethernet PHYs. These PHYs are found on a variety of Ethernet interfaces. |
mtio(4) -- magtape interface
|
This interface concerns devices which are typical tape block devices, see physio(9). The conventional device letters/numbers is applicable to any of the transport/controller pairs. (But note that only... |
i386/mtrr(4) -- driver for CPU memory range attributes
|
The mtrr device provides access to the memory range attributes supported by the MTRRs on Pentiums. IOCTL INTERFACEÂ Â Â Â [Toc]Â Â Â Â [Back] Several architectures allow attributes to be associated with range... |
vax/ncr(4) -- VAXstation 2000/3100 SCSI controller
|
The ncr driver provides support for the NCR 5380-based SCSI host adapter on the VAXstation 2000 and VAXstation 3100 series machines. |
ncr(4) -- NCR/Symbios 53C8xx SCSI driver
|
The ncr driver provides support for the NCR (now Symbios) 53C810, 53C815, 53C820, 53C825, 53C860, 53C875, 53C876, 53C885, 53C895, 53C896, 53C1510, and 53C1510D SCSI controller chips. ncr is deprecated... |
ne(4) -- NE2000 and compatible Ethernet driver
|
The ne device driver supports NE2000 and compatible (including NE1000) Ethernet cards, including: Name Bus Accton EN2212, EN2216 PCMCIA Addtron W89C926 Ethernet PCMCIA Allied Telesis LA-PCM PCMCIA Amb... |
neo(4) -- NeoMagic 256AV/ZX audio driver
|
The neo driver provides support for NeoMagic MagicMedia 256AV and 256ZX audio chips found in many laptops, and perhaps on some PCI cards. |
netintro(4) -- introduction to networking facilities
|
This section is a general introduction to the networking facilities available in the system. Documentation in this part of section 4 is broken up into three areas: protocol families (domains), protoco... |
networking(4) -- introduction to networking facilities
|
This section is a general introduction to the networking facilities available in the system. Documentation in this part of section 4 is broken up into three areas: protocol families (domains), protoco... |
nge(4) -- National Semiconductor PCI Gigabit Ethernet adapter driver
|
The nge driver provides support for various NICs based on the National Semiconductor DP83820 and DP83821 Gigabit Ethernet controller chips, including the following: +o Addtron AEG320T +o Ark PC SOHO-G... |
hp300/nhpib(4) -- built-in and 98625 HP-IB interfaces
|
The nhpib driver supports the built-in and 98625 HP-IB interfaces. |
noct(4) -- NetOctave NSP2000 crypto accelerator
|
The noct driver supports cards based on the NetOctave NSP2000 packet processor. The NSP2000 contains a public key processor, random number generator, and packet processor. The random number generator ... |
nofn(4) -- Hifn 7814/7851/7854 HIPP1 crypto processor
|
The nofn driver supports cards based on the Hifn 7814, 7851, and 7854 HIPP1 packet processors. The 7814 and 7854 both contain a public key processor and a random number generator. The public key proce... |
i386/npx(4) -- Numeric Processing Extension coprocessor and emulator
|
The npx driver enables the use of the system's Numeric Processing Extension coprocessor, if one is present. Numeric processing extensions are present in systems with 486DX CPUs and in systems with 38... |
ns(4) -- Xerox Network Systems(tm) protocol family
|
The NS protocol family is a collection of protocols layered atop the Internet Datagram Protocol (IDP) transport layer, and using the Xerox NS address formats. The NS family provides protocol support f... |
nsclpcsio(4) -- National Semiconductor PC87366 LPC Super I/O
|
The nsclpcsio driver provides support for the National Semiconductor PC87366 LPC Super I/O. The Super I/O module incorporates several logical devices, the following ones are supported: GPIO, VLM and T... |
nsgphy(4) -- Driver for National Semiconductor DP83891 and DP83861 10/100/1000 PHYs
|
The nsgphy driver supports the National Semiconductor DP83891 and DP83861 10/100/1000 Ethernet PHYs. |
nsip(4) -- software network interface encapsulating NS packets in IP packets
|
The nsip interface is a software mechanism which may be used to transmit Xerox NS(tm) packets through otherwise uncooperative networks. It functions by prepending an IP header, and resubmitting the pa... |
nsphy(4) -- National Semiconductor DP83840 10/100 Ethernet PHY driver
|
The nsphy driver supports the National Semiconductor DP83840 and DP83840A 10/100 Ethernet PHYs. These PHYs are found on a variety of high-performance Ethernet interfaces. |
nsphyter(4) -- National Semiconductor DP83843/DP83815 10/100 Ethernet PHY driver
|
The nsphyter driver supports the National Semiconductor PHYTER DP83843 Ethernet PHYs. This driver also supports the integrated PHY on the MACPHYTER DP83815. These PHYs are found on a variety of high-p... |
null(4) -- the null device
|
The null device accepts and reads data as any ordinary (and willing) file, but throws it away. The length of the null device is always zero. |
mac68k/obio(4) -- Mac68k onboard I/O bus device
|
The obio interface serves as an abstraction used by the autoconfiguration system to help find and attach devices (e.g. the Ethernet or SCSI controllers) connected to the Macintosh onboard I/O bus. |
ohci(4) -- USB Open Host Controller driver
|
The ohci driver provides support for USB Open Host Controller Interface. |
oosiop(4) -- Symbios/NCR 53C700 SCSI driver
|
The oosiop driver provides support for the Symbios/NCR 53C700 SCSI controller chip. The Symbios/NCR 53C710 SCSI controller is handled by the osiop(4) driver, while the Symbios/NCR 53C8xx PCI SCSI host... |
sparc64/openprom(4) -- OPENPROM interface
|
The file /dev/openprom is an interface to the UltraSPARC OPENPROM. This interface is highly stylized; ioctls are used for all operations. These ioctls refer to ``nodes'', which are simply ``magic'... |
sparc/openprom(4) -- OPENPROM and EEPROM interface
|
The file /dev/openprom is an interface to the SPARC OPENPROM, including the EEPROM area. This interface is highly stylized; ioctls are used for all operations. These ioctls refer to ``nodes'', which... |
opl(4) -- Yamaha OPL2 and OPL3 FM synthesizer driver
|
The opl driver provides support for the Yamaha OPL2 (YM3812) and OPL3 (YMF262) chips. The chips are FM synthesizer and are capable of producing a wide range of (mostly awful) sounds. Access to the dev... |
options(4) -- miscellaneous kernel configuration options
|
This manual page describes a number of miscellaneous kernel configuration options that may be specified in a kernel config file. See config(8) for information on how to configure and build kernels. No... |
osiop(4) -- Symbios/NCR 53C710 SCSI driver
|
The osiop driver provides support for the Symbios/NCR 53C710 SCSI controller chip. The Symbios/NCR 53C700 SCSI controller is handled by the oosiop(4) driver, while the Symbios/NCR 53C8xx PCI SCSI host... |
pccom(4) -- serial communications interface
|
The com and pccom drivers provide support for NS8250-, NS16450-, NS16550-, ST16650-, and TI16750-based EIA RS-232C (CCITT V.28) communications interfaces. The pccom driver (i386-only) also supports th... |
mvme88k/pcctwo(4) -- PCCchip2 local bus controller
|
The pcctwo PCCchip2 ASIC provides an interface to the different local bus-attached I/O devices as found on some of the MVME88k Single-Board Computers. On MVME187 boards it is attached directly to the ... |
pcdisplay(4) -- PC display adapter driver for wscons
|
This driver supports PC display adapter hardware within the wscons(4) console framework. It doesn't provide direct device driver entry points but makes its functions available via the internal wsdisp... |
pchb(4) -- PCI-Host Bridge
|
The pchb driver provides support for PCI-Host adapter-specific functions for the following devices: i450 PCIset (Orion) Supports additional PCI busses. Reliance Computer ROSB4, CNB20HE, CNB20LE Suppor... |
pci(4) -- introduction to PCI bus support
|
The system includes a machine-independent PCI bus subsystem and several machine-independent PCI device drivers. Your system may support additional PCI devices. Drivers for PCI devices not listed here ... |
pcib(4) -- PCI-ISA bridge
|
The pcib driver supports generic PCI-ISA bridges. These devices are largely transparent and provide no user accessible entry points. |
i386/pcibios(4) -- introduction to PCI BIOS support
|
OpenBSD provides support for setting up PCI controllers, bridges, and devices using information extracted from the BIOS. Ideally, the boot firmware of a machine (a.k.a. BIOS) should set up all PCI dev... |
pcic(4) -- introduction to PCMCIA (PC Card) support
|
The pcmcia subsystem provides machine-independent bus support and drivers for PCMCIA (PC Card) devices. |
pciide(4) -- PCI IDE controller driver
|
The pciide driver supports the PCI IDE controllers as specified in the "PCI IDE controller specification, revision 1.0" draft, as well as the Serial ATA controllers working either in parallel ATA co... |
pckbc(4) -- PC (ISA) keyboard controller driver
|
The pckbc driver handles resource allocation and device attachment for the traditional PC/AT keyboard controller. It provides two logical connections for child devices, the ``keyboard'' slot for a k... |
pckbd(4) -- PC keyboard driver for wscons
|
This driver supports PC/AT keyboards within the wscons(4) console framework. It doesn't provide direct device driver entry points but makes its functions available via the internal wskbd(4) interface... |
pcmcia(4) -- introduction to PCMCIA (PC Card) support
|
The pcmcia subsystem provides machine-independent bus support and drivers for PCMCIA (PC Card) devices. |
sparc64/pcons(4) -- SPARC64 PROM console interface
|
The pcons device provides a simple text console, using the PROM services for input and output. It will use the PROM console devices set via the ``input-device'' and ``output-device'' variables. Th... |
pcppi(4) -- PC (ISA) control and timer port driver
|
The pcppi driver handles resource allocation and device attachment for the ports related to the ISA speaker in the traditional PC/AT ``design''. These are the ``system control port'' (which was im... |
pcscp(4) -- Advanced Micro Devices Am53c974 PCscsi-PCI SCSI driver
|
The pcscp driver provides support for the Advanced Micro Devices Am53c974 PCscsi-PCI SCSI controller and boards using this chip, including the Tekram DC-390 PCI SCSI host adapter. For Tekram DC-390U/F... |
i386/pctr(4) -- driver for CPU performance counters
|
The pctr device provides access to the performance counters on Intel brand processors, and to the TSC on others. Intel processors have two 40-bit performance counters which can be programmed to count ... |
pf(4) -- packet filter
|
Packet filtering takes place in the kernel. A pseudo-device, /dev/pf, allows userland processes to control the behavior of the packet filter through an ioctl(2) interface. There are commands to enable... |
pflog(4) -- packet filter logging interface
|
The pflog interface is a pseudo-device which makes visible all packets logged by the packet filter, pf(4). Logged packets can easily be monitored in real time by invoking tcpdump(8) on the pflog inter... |
pfsync(4) -- packet filter state table logging interface
|
The pfsync interface is a pseudo-device which exposes certain changes to the state table used by pf(4). State changes can be viewed by invoking tcpdump(8) on the pfsync interface. If configured with a... |
hppa/phantomas(4) -- Phantom PseudoBC GSC+ Port
|
Phantom bus convertor used to connect an sti(4) graphics, a lasi(4) bus host adapter for gsc(4) and a PCI bridge dino(4) to the system bus, where cpu(4) and memory are located. |
pms(4) -- PS/2 auxiliary port mouse driver
|
The pms drivers provide an interface to PS/2 auxiliary port mice within the wscons(4) framework. Parent device in terms of the autoconfiguration framework can be either gsckbc(4), the PS/2 input port ... |
pmsi(4) -- PS/2 auxiliary port mouse driver
|
The pms drivers provide an interface to PS/2 auxiliary port mice within the wscons(4) framework. Parent device in terms of the autoconfiguration framework can be either gsckbc(4), the PS/2 input port ... |
sparc/pninek(4) -- Weitek Power9000 accelerated frame buffer
|
The pninek is a color frame buffer with graphics acceleration, embedded in the Tadpole SPARCbook 3 laptop. It is based on the Weitek Power9000 video processor and a Brooktree Bt445 `Chameleon' RAMDAC... |
sparc/pnozz(4) -- Weitek Power9100 accelerated frame buffer
|
The pnozz is a color frame buffer with graphics acceleration, embedded in the Tadpole SPARCbook 3GS, 3GX, 3TX and 3XP laptops. It is based on the Weitek Power9100 video processor and an IBM RGB525 RAM... |
pnp(4) -- introduction to ISA Plug-and-Play support
|
An isapnp bus can be configured for each supported ISA bus. OpenBSD provides machine-independent bus support and drivers for ISA Plug-and-Play (isapnp) autoconfiguration of PnP-compatible devices on a... |
hppa/power(4) -- power button and power fail support
|
HP PA-RISC machines support power failure detection in different forms: +o ``soft'' power button +o power failure interrupt The power driver tries its best to determine the power failure condition t... |
ppb(4) -- PCI/PCI bridge driver
|
The ppb driver supports generic PCI-PCI bridges, includes Generic PCI-PCI bridges, including PCI expansion backplanes. These devices are largely transparent and provide no user accessible entry points... |
hp300/ppi(4) -- HP-IB printer/plotter interface
|
The ppi interface provides a means of communication with HPIB printers and plotters. Special files ppi0 through ppi3 are used to access the devices, with the digit at the end of the filename referring... |
ppp(4) -- point to point protocol network interface
|
The ppp interface allows serial lines to be used as network interfaces using the Point-to-Point Protocol (PPP). A ppp interface can be created at runtime using the ifconfig pppN create command or by s... |
prandom(4) -- random data source devices
|
The various random devices produce random output data with different random qualities. Entropy data is collected from system activity (like disk and network device interrupts and such), and then run t... |
sparc/presto(4) -- Prestoserve battery-backed memory
|
The Legato Prestoserve NVRAM cards used to be part of the ``NFS accelerator'' product, which used the cards memory as an NFS-dedicated cache, increasing performance of NFS servers exporting filesyst... |
i386/pss(4) -- Personal Sound System hardware driver
|
The pss driver supports sound cards based on ESC614 or ESC614A ASICs and AD1848 or CS4231 series codecs. Known examples are: Cardinal Digital Sound Pro 16 Orchid SoundWave 32 The Orchid GameWave 32 is... |
sparc64/psycho(4) -- SPARC64 Host/PCI bridge
|
The psycho device provides support for the pci(4) bus on sparc64 systems, most often found on UltraSPARC I and UltraSPARC II based systems. It supports the ioctl(2) interface in pci(4). |
ptm(4) -- pseudo terminal driver
|
The pty driver provides support for a device-pair termed a pseudo terminal. A pseudo terminal is a pair of character devices, a master device and a slave device. The slave device provides to a process... |
pty(4) -- pseudo terminal driver
|
The pty driver provides support for a device-pair termed a pseudo terminal. A pseudo terminal is a pair of character devices, a master device and a slave device. The slave device provides to a process... |
puc(4) -- PCI ``universal'' communications card driver
|
The puc driver provides support for PCI communications cards containing simple communications ports, such as NS16550-family (com) serial ports and standard PC-like (lpt) parallel ports. The driver is ... |
sparc64/qe(4) -- SPARC64 Fast Ethernet interface
|
The qe interface provides access to 10Mb/s Ethernet networks via the AMD Am79C940 (MACE) Ethernet controller. The qe is found on the Sun QuadEthernet boards (Sun part number SUNW,501-2062). Each of th... |
sparc/qe(4) -- SPARC Fast Ethernet interface
|
The qe interface provides access to 10Mb/s Ethernet networks via the AMD Am79C940 (MACE) Ethernet controller. The qe is found on the Sun QuadEthernet boards (Sun part number SUNW,501-2062). Each of th... |
vax/qe(4) -- DEC DEQNA Q-bus 10 Mb/s Ethernet interface
|
The qe interface provides access to a 10 Mb/s Ethernet network through the DEC DEQNA Q-bus controller. Each of the host's network addresses is specified at boot time with an SIOCSIFADDR ioctl(2). The... |
sparc64/qec(4) -- SPARC64 Quad Ethernet Controller
|
The qec driver is an sbus controller that can contain either one be(4) Ethernet controller (Sun part number SUNW,501-2655) or four qe(4) Ethernet controllers (Sun part number SUNW,501-2062). This driv... |
sparc/qec(4) -- SPARC Quad Ethernet Controller
|
The qec driver is an sbus controller that can contain either one be(4) Ethernet controller (Sun part number SUNW,501-2655) or four qe(4) Ethernet controllers (Sun part number SUNW,501-2062). This driv... |
qsphy(4) -- Quality Semiconductor QS6612 10/100 Ethernet PHY driver
|
The qsphy driver supports the Quality Semiconductor QS6612 10/100 Ethernet PHYs. These PHYs are found on a variety of high-performance Ethernet interfaces. |
vax/ra(4) -- MSCP disk controller interface
|
The ra device provides access to MSCP disks such as: RC25, RX50, RD51, RD52, RD53, RA60, RA80, and RA81. |
radio(4) -- device-independent radio driver layer
|
The radio driver provides support for various FM radio cards. It provides an uniform programming interface layer above different underlying radio hardware drivers. For radio tuner controlling there is... |
raid(4) -- RAIDframe disk driver
|
The raid driver provides RAID 0, 1, 4, and 5 (and more!) capabilities to OpenBSD. This document assumes that the reader has at least some familiarity with RAID and RAID concepts. The reader is also as... |
random(4) -- random data source devices
|
The various random devices produce random output data with different random qualities. Entropy data is collected from system activity (like disk and network device interrupts and such), and then run t... |
ray(4) -- Raytheon Raylink / WebGear Aviator IEEE 802.11FH 2Mbps Wireless
|
The ray device driver supports the Raytheon Raylink and Aviator 2.4/PRO 802.11 Frequency Hopping 2Mbps wireless PCMCIA cards. The cards can be operated in either adhoc or infrastructure modes. The ope... |
hp300/rbox(4) -- HP98720 ``Renaissance'' frame buffer
|
The HP98720 and HP98721 are stackable 4-bit color frame buffers, also known as the Renaissance. By adding up to 7 HP98722A frame buffer extensions, it is possible to add overlay planes. The rbox drive... |
rd(4) -- ramdisk driver
|
The rd driver enables use of system or user memory as a disk. Memory for the disk must be allocated and initialized inside the kernel image at build-time using the rdsetroot tool. |
re(4) -- Realtek 8169/8169S/8110S PCI Ethernet adapter driver
|
The re driver provides support for various NICs based on the RTL8169, RTL8169S, and RTL8110S PCI Ethernet controllers, including the following: +o Gigabyte 7N400 Pro2 Integrated Gigabit Ethernet (8110... |
sparc64/rfx(4) -- Vitec/Connectware/AP&D RasterFlex framebuffer series
|
The RasterFlex series, originally manufactured by Vitec, later bought by Connectware, then by Advanced Products & Design, are highperformance frame buffers and frame grabber devices. The rfx driver on... |
sparc/rfx(4) -- Vitec/Connectware/AP&D RasterFlex framebuffer series
|
The RasterFlex series, originally manufactured by Vitec, later bought by Connectware, then by Advanced Products & Design, are highperformance frame buffers and frame grabber devices. The rfx driver on... |
rgephy(4) -- Realtek 8169S/8110S internal 10/100/1000 PHY driver
|
The rgephy driver supports the internal PHY found on Realtek 8169S/8110S Ethernet adapters. |
rl(4) -- Realtek 8129/8139 Fast Ethernet driver
|
The rl driver provides support for PCI Ethernet adapters and embedded controllers based on the Realtek 8129 and 8139 Fast Ethernet controller chips. This includes, among others, the following cards: A... |
rln(4) -- device driver for RangeLAN2-based wireless network cards
|
The rln device driver supports at least the following cards: +o Proxim RangeLAN2 7100 ISA Card +o Symphony PC Cards +o Proxim RangeLAN2 7200 Two Piece PC Card +o Proxim RangeLAN2 7400 One Piece PC Car... |
rlphy(4) -- Realtek 8139 internal Ethernet PHY driver
|
The rlphy driver supports the internal physical layer interface (PHY) found on Realtek Semiconductor RTL8139 based Ethernet adapters. |
route(4) -- kernel packet forwarding database
|
OpenBSD provides some packet routing facilities. The kernel maintains a routing information database, which is used in selecting the appropriate network interface when transmitting packets. A user pro... |
rt(4) -- AIMS Lab Radiotrack FM radio device driver
|
The rt driver provides support for the AIMS Lab Radiotrack FM radio tuners and compatible - RadioReveal RA300 FM radio tuners and tuners at SoundForte RadioX SF16-FMI (Creative ViBRA16C PnP). The Radi... |
rtfps(4) -- multiplexing serial communications interface
|
The rtfps driver provides support for IBM RT PC boards that multiplex together up to four RS-232C (CCITT V.28) or RS-422A communications interfaces. Each rtfps device is the master device for up to fo... |
rtii(4) -- AIMS Lab Radiotrack II FM radio device driver
|
The rtii driver provides support for the AIMS Lab Radiotrack II FM radio tuners. The Radiotrack II is a stereo FM tuner that can tune in the range 87.5 - 108.0 MHz, report signal status on the current... |
vax/rx(4) -- DEC RX02 floppy disk interface
|
The rx device provides access to a DEC RX02 floppy disk unit with M8256 interface module (RX211 configuration). The RX02 uses 8-inch, singlesided, soft-sectored floppy disks (with pre-formatted indust... |
sparc64/sab(4) -- Infineon SAB82532 (ESCC2) serial communications driver
|
The sab is a Infineon (formerly Siemens) SAB82532 (ESCC2) serial interface chip used in PCI-based UltraSPARC Sun workstations. The ESCC2 provides two independent input/output channels per instance. Th... |
sparc64/sabtty(4) -- Infineon SAB82532 (ESCC2) serial communications driver
|
The sab is a Infineon (formerly Siemens) SAB82532 (ESCC2) serial interface chip used in PCI-based UltraSPARC Sun workstations. The ESCC2 provides two independent input/output channels per instance. Th... |
safe(4) -- SafeNet crypto accelerator
|
The safe driver supports cards containing any of the following chips: SafeNet 1141 The original chipset. Supports DES, Triple-DES, AES, MD5, and SHA-1 symmetric crypto operations, RNG, public key oper... |
san(4) -- Sangoma Technologies AFT T1/E1 Network driver
|
The san device driver supports the Sangoma Technologies Inc AFT Series Network cards. This includes the following models: Sangoma AFT A101 PCI Sangoma AFT A102 PCI The following media types and option... |
i386/sb(4) -- SoundBlaster family (and compatibles) audio device driver
|
The sb driver supports the SoundBlaster 16, Jazz 16, SoundBlaster AWE 32, SoundBlaster AWE 64, and hardware register-level compatible audio cards. The SoundBlaster series are half-duplex cards, capabl... |
sbus(4) -- introduction to sbus bus support and drivers
|
These sbus attachments are specific to the sparc and sparc64 ports. sbus is an I/O interconnect bus mostly found in SPARC workstations and small to medium server class systems. It supports both onboar... |
alpha/scc(4) -- Zilog serial communications interface
|
The scc driver provides support for the Zilog 8530 Serial Communications Controller (SCC) via the IOCTL asic on TURBOchannel-based alphas (the DEC 3000 series). Each scc device has two serial ports. I... |
sparc/scf(4) -- SPARC Force sysconfig driver
|
The scf driver provides access to the system configuration registers on the Force CPU-5. The system configuration registers control the LED display on the front panel, the status of the rotary switch,... |
sparc64/schizo(4) -- SPARC64 Host/PCI bridge
|
The schizo device provides support for the pci(4) bus on sparc64 systems, most often found on UltraSPARC III based systems. It supports the ioctl(2) interface in pci(4). |
scsi(4) -- scsi system
|
The SCSI system provides a uniform and modular system for the implementation of drivers to control various scsi devices, and to utilize different scsi host adapters through host adapter drivers. When ... |
scsibus(4) -- scsi system
|
The SCSI system provides a uniform and modular system for the implementation of drivers to control various scsi devices, and to utilize different scsi host adapters through host adapter drivers. When ... |
sd(4) -- SCSI disk driver
|
The sd driver provides support for a SCSI disk. It allows the disk to be divided up into a set of pseudo devices called partitions. In general the interfaces are similar to those described by wd(4). S... |
i386/sea(4) -- Seagate/Future Domain ISA SCSI adapter card
|
The sea driver provides support for the following boards: ST01/02 Future Domain TMC-885 Future Domain TMC-950 |
ses(4) -- SCSI Environmental Services Driver
|
The ses driver provides support for all SCSI devices of the environmental services class that are attached to the system through a supported SCSI Host Adapter, as well as emulated support for SAF-TE (... |
sf(4) -- Adaptec AIC-6915 Starfire PCI Fast Ethernet driver
|
The sf driver provides support for Adaptec Duralink Fast Ethernet adapters based on the Adaptec AIC-6915 "Starfire" chipset. This includes the following: +o ANA-62011 64-bit single port 10/100baseTX... |
sf2r(4) -- SoundForte RadioLink SF16-FMR2 FM radio device driver
|
The sf2r driver provides support for the SF16-FMR2 FM radio tuners. The SF16-FMR2 is a stereo FM tuner that can tune in the range 87.5 - 108.0 MHz, report signal status on the current frequency, force... |
sfr(4) -- SoundForte RadioLink SF16-FMR FM radio device driver
|
The sfr driver provides support for the SF16-FMR FM radio tuners. The SF16-FMR is a stereo FM tuner that can tune in the range 87.5 - 108.0 MHz. The sfr cards are based upon the TC9216P chip. See radi... |
sparc/si(4) -- NCR 5380 Sun SCSI 3 VME SCSI controller
|
The si is a VME SCSI controller based on the NCR 5380 chip, found in sun3 and sun4 systems with the VME bus. |
siop(4) -- LSI/Symbios Logic/NCR 53c8xx SCSI driver
|
The siop driver provides support for following LSI/Symbios Logic/NCR 53c8xx and related SCSI controller chips: - 53c810, 53c810a and 53c815 (Fast SCSI) - 53c820, 53c825 and 53c825a (Fast-Wide SCSI) - ... |
sis(4) -- SiS 900, SiS 7016, and NS DP83815 Fast Ethernet driver
|
The sis driver provides support for PCI Ethernet adapters and embedded controllers based on the Silicon Integrated Systems SiS 900 and SiS 7016 Fast Ethernet controller chips, as well as support for a... |
sk(4) -- SysKonnect XMAC II and Marvell GMAC based Gigabit Ethernet
|
The sk driver provides support for SysKonnect based Gigabit Ethernet adapters and Marvell based Gigabit Ethernet adapters, including the following: +o SK-9821 SK-NET GE-T single port, copper adapter +... |
skc(4) -- SysKonnect XMAC II and Marvell GMAC based Gigabit Ethernet
|
The sk driver provides support for SysKonnect based Gigabit Ethernet adapters and Marvell based Gigabit Ethernet adapters, including the following: +o SK-9821 SK-NET GE-T single port, copper adapter +... |
sl(4) -- slip network interface
|
The sl interface allows serial lines to be used as network interfaces using the slip protocol. An sl interface can be created at runtime using the ifconfig slN create command or by setting up a hostna... |
sm(4) -- SMC91C9x-based Ethernet driver
|
The sm device driver supports SMC91C9x-based Ethernet interfaces. The ISA attachment of the sm driver supports any SMC91C9xbased Ethernet interface on the ISA bus, including the EFA Info*Express SVC V... |
vax/smg(4) -- small monochrome graphics adapter
|
The smg is a memory based monochrome frame buffer driver for the wscons(4) console framework. It does not provide direct device driver entry points but makes its functions available via the internal w... |
mac68k/sn(4) -- Ethernet driver for SONIC-based Ethernet adapters
|
The sn interface provides access to a 10 Mb/s Ethernet network via the National Semiconductor DP83932 (SONIC) Ethernet chip set. Each of the host's network addresses is specified at boot time with an... |
macppc/snapper(4) -- Apple snapper audio device driver
|
The snapper driver provides support for the audio hardware found in recent Apple iBook (since May 02) and PowerBook (since Apr 02) models (need to verify iMac (Jan 02) and Power Mac G4 (Sep 02)). |
hp300/spc(4) -- HP 98658 SCSI host adaptor driver
|
The spc driver provides support for the Fujitsu MB87030/MB89352 SCSI Protocol Controller (SPC) chips, used as part of the HP 98658 SCSI interface. If the device flags are specified with a value of 1, ... |
luna88k/spc(4) -- Fujitsu MB87030/MB89352 SCSI driver
|
The spc driver provides support for the Fujitsu MB87030/MB89352 SCSI Protocol Controller (SPC) chips. |
i386/speaker(4) -- console speaker device driver
|
The speaker device driver allows applications to control the PC console speaker on an IBM-PC-compatible machine running UNIX. Only one process may have this device open at any given time; open(2) and ... |
sparc64/spif(4) -- SBus (spiffy) Serial/Parallel Interface
|
The spif driver provides support for the Sun Serial/Parallel Interface card (Sun part number 501-1931) based around the Cirrus Logic CD180 octal serial controller and the Cirrus Logic PPC2 parallel po... |
sparc/spif(4) -- SBus (spiffy) Serial/Parallel Interface
|
The spif driver provides support for the Sun Serial/Parallel Interface card (Sun part number 501-1931) based around the Cirrus Logic CD180 octal serial controller and the Cirrus Logic PPC2 parallel po... |
i386/spkr(4) -- console speaker device driver
|
The speaker device driver allows applications to control the PC console speaker on an IBM-PC-compatible machine running UNIX. Only one process may have this device open at any given time; open(2) and ... |
spp(4) -- Xerox Sequenced Packet Protocol
|
The SPP protocol provides a reliable, flow-controlled, twoway transmission of data. It is a byte-stream protocol used to support the SOCK_STREAM abstraction. SPP uses the standard NS(tm) address forma... |
sppp(4) -- point to point protocol network layer for synchronous lines
|
The sppp network layer implements the state machine and the Link Control Protocol (LCP) of the point to point protocol (PPP) as described in RFC 1661. Note that this layer does not provide network int... |
sqphy(4) -- Seeq 80220/80221, 80223 and 84220 10/100 Ethernet PHY driver
|
The sqphy driver supports the Seeq 80220/80221, 80223 and 84220 10/100 Ethernet PHYs. The 80223 is a 3.3 volt version of the 80221. These PHYs are found on a variety of high-performance Ethernet inter... |
srandom(4) -- random data source devices
|
The various random devices produce random output data with different random qualities. Entropy data is collected from system activity (like disk and network device interrupts and such), and then run t... |
ss(4) -- SCSI Scanner device
|
The ss device allows an application to set scanner parameters and retrieve image data from any of the supported scanners without having to be concerned with details of its particular command set. The ... |
mvme68k/ssh(4) -- NCR 53c7xx SCSI driver
|
The ssh driver provides support for NCR 53c7xx and related SCSI controller chips. |
st(4) -- SCSI tape driver
|
The st driver provides support for SCSI tape drives. It allows a tape drive to be run in several different modes depending on minor numbers and supports several different ``sub-modes''. The device c... |
stderr(4) -- file descriptor files
|
The files /dev/fd/0 through /dev/fd/# refer to file descriptors which can be accessed through the file system. If the file descriptor is open and the mode the file is being opened with is a subset of ... |
stdin(4) -- file descriptor files
|
The files /dev/fd/0 through /dev/fd/# refer to file descriptors which can be accessed through the file system. If the file descriptor is open and the mode the file is being opened with is a subset of ... |
stdout(4) -- file descriptor files
|
The files /dev/fd/0 through /dev/fd/# refer to file descriptors which can be accessed through the file system. If the file descriptor is open and the mode the file is being opened with is a subset of ... |
ste(4) -- Sundance Technologies ST201 Fast Ethernet driver
|
The ste driver provides support for PCI Ethernet adapters and embedded controllers based on the Sundance Technologies ST201 PCI fast Ethernet controller chip. This includes the D-Link DFE-550TX. The S... |
stge(4) -- Sundance/Tamarack TC9021 Gigabit Ethernet driver
|
The stge device driver supports the Sundance/Tamarack TC9021 Gigabit Ethernet chip. The Sundance/Tamarack TC9021 is found on the D-Link DGE-550T, and the Antares Microsystems Gigabit Ethernet board. I... |
sti(4) -- HP Standard Text Interface
|
The sti was created by HP to provide uniform frame-buffer access operations for their 9000/300 and 9000/700 series of workstations. The following models are supported (though not all features or frame... |
stp(4) -- sbus PCMCIA bridge
|
The stp is a pcmcia(4) bridge for sbus(4). It uses the STP4020 chipset and it is SUN part number 501-2367. |
sv(4) -- S3 SonicVibes audio device driver
|
The sv driver provides support for S3 SonicVibes (S3-617) chipset-based cards. Disabling the SRS 3-D spatial feature of the chip is recommended for higher quality audio. This can be done in software b... |
svnd(4) -- Vnode Disk Driver
|
The vnd driver provides a disk-like interface to a file. This is useful for a variety of applications, including swap files and building miniroot or floppy disk images. There are two variants, the tra... |
sparc/sw(4) -- NCR 5380 SCSI Weird Sun 4/100 on-board SCSI controller
|
The sw is the Sun 4/100 on-board SCSI controller based on the NCR 5380 chip, found only on Sun 4/100 workstations. The sw driver is actually implemented as part of the si(4) driver. |
systrace(4) -- enforce and generate policies for system calls
|
systrace attaches to processes and enforces policies for system calls. A pseudo-device, /dev/systrace, allows userland processes to control the behavior of systrace through an ioctl(2) interface. |
tb(4) -- line discipline for digitizing devices
|
This line discipline provides a polled interface to many common digitizing devices which are connected to a host through a serial line. When these devices stream data at high speed, the use of the lin... |
alpha/tcasic(4) -- TURBOchannel host bus support
|
The tcasic driver provides support for the TURBOchannel host bus on the baseboard of the DEC 3000/300 and 3000/500 systems. |
tcic(4) -- Databook PCMCIA controller driver
|
The tcic driver provides support for the Databook DB86082, DB86084, DB86184, and DB86072 PCMCIA controllers. |
tcp(4) -- Internet Transmission Control Protocol
|
The TCP protocol provides a reliable, flow-controlled, twoway transmission of data. It is a byte-stream protocol used to support the SOCK_STREAM abstraction. TCP uses the standard Internet address for... |
sparc/tctrl(4) -- Tadpole Microcontroller Interface
|
The tctrl driver provides control over many functions on the Tadpole SPARCbook 3 series laptops, via their TS102 chip. The microcontroller is used to power the TFT display down when the laptop lid is ... |
sparc/tcx(4) -- accelerated 8/24-bit color frame buffer
|
The tcx is an 8 bit color frame buffer, with graphics acceleration, found on-board the SPARCstation 4, and also available in a 24 bit version as an AFX board for the SPARCstation 5. The tcx driver int... |
termios(4) -- general terminal line discipline
|
This describes a general terminal line discipline that is supported on tty asynchronous communication ports. Opening a Terminal Device File    [Toc]    [Back] When a terminal file is opened, it normal... |
alpha/tga(4) -- TGA graphics driver
|
This driver handles TGA graphics hardware within the wscons(4) console framework. On TGA adapters, the resolution is set on the card and is not changed at runtime. On some TGA models, there are four d... |
ti(4) -- Alteon Networks Tigon I and II Gigabit Ethernet driver
|
The ti driver provides support for PCI Gigabit Ethernet adapters based on the Alteon Networks Tigon Gigabit Ethernet controller chip. The Tigon contains an embedded R4000 CPU, Gigabit MAC, dual DMA ch... |
tl(4) -- Texas Instruments ThunderLAN Ethernet driver
|
The tl driver provides support for PCI Ethernet adapters based on the Texas Instruments ThunderLAN Ethernet controller chip. This includes a large number of Compaq PCI-bus Ethernet adapters as well as... |
tlphy(4) -- Texas Instruments ThunderLAN internal Ethernet PHY driver
|
The tlphy driver supports the internal PHY on TI ThunderLAN Ethernet interfaces. The ThunderLAN PHY supports 10base5 (AUI) and 10base2 (BNC) on some ThunderLAN implementations. |
hp300/topcat(4) -- HP98544 ``Topcat'', HP98550 ``Catseye'' and A1416A ``Kathmandu'' frame buffers
|
The HP98544, HP98545 and HP98547 ``Topcat'', as well as the HP98548, HP98549 and HP98550 ``Catseye'' and the A1416A ``Kathmandu'' are accelerated frame buffers, with the following resolution and... |
tqphy(4) -- TDK Semiconductor 78Q2120 10/100 Ethernet PHY driver
|
The tqphy driver supports the TDK Semiconductor 78Q2120 PHY found in at least some CardBus Ethernet cards and the 3Com 574 PCMCIA card. |
trm(4) -- TRM-S1040 based PCI SCSI Host Adapters
|
The trm driver supports PCI SCSI host adapters based on Tekram's TRMS1040 chip, including the following: +o Tekram DC395U/UW/F +o Tekram DC315/U |
vax/ts(4) -- TS11/TSV05 magtape interface
|
The TS11/TSV05 combination provides a standard tape drive interface as described in mtio(4). The TS11 operates only at 1600 BPI, and only one transport is possible per controller. The TS11 is attached... |
alpha/tsc(4) -- DECchip 21272 Core Logic chipset
|
The tsc driver provides support for the DECchip 21272 Core Logic chipset (Tsunami) found on the 264DP OEM Board. The tsp driver attaches to it and provides support for the DECchip 21272 built-in PCI c... |
sparc/tslot(4) -- Tadpole PCMCIA Controller
|
The tslot driver manages the pcmcia(4) controller part of the tctrl(4) Tadpole TS102 controller found on the Tadpole SPARCbook 3 series laptops. It provides two PCMCIA slots and can receive up to two ... |
alpha/tsp(4) -- DECchip 21272 Core Logic chipset
|
The tsc driver provides support for the DECchip 21272 Core Logic chipset (Tsunami) found on the 264DP OEM Board. The tsp driver attaches to it and provides support for the DECchip 21272 built-in PCI c... |
tty(4) -- general terminal interface
|
This section describes the interface to the terminal drivers in the system. Terminal Special Files    [Toc]    [Back] Each hardware terminal port on the system usually has a terminal special device fi... |
tun(4) -- network tunnel pseudo-device
|
The tun driver provides a network interface pseudo-device. Packets sent to this interface can be read by a userland process and processed as desired. Packets written by the userland process are inject... |
sparc/tvtwo(4) -- accelerated 24-bit color frame buffer
|
The tvtwo is a memory based color frame buffer, with graphics acceleration and overlay capabilities, and hardware MPEG decoding. The tvtwo driver interfaces the frame buffer to the wscons(4) console f... |
twe(4) -- 3ware Escalade RAID driver
|
The twe driver provides support for Escalade family of RAID controllers, including the 3W-5x00 and 3W-6x00 models. These controllers support RAID 0, RAID 1, RAID 10 and JBOD configurations. All the RA... |
tx(4) -- SMC 9432 10/100 Mbps Ethernet driver
|
The tx interface provides access to the 10Mb/s and 100Mb/s Ethernet networks via the SMC EPIC chipset. This driver provides support for the SMC EtherPower II 10/100 Ethernet cards. Each of the host's... |
txp(4) -- 3Com 3XP Typhoon/Sidewinder (3CR990) Ethernet interface
|
The txp interface provides access to the 10Mb/s and 100Mb/s Ethernet networks via the 3Com Typhoon/Sidewinder chipset. This driver supports the following cards: +o 3Com 3CR990-TX-95 +o 3Com 3CR990-TX-... |
txphy(4) -- Texas Instruments TNETE2101 10/100 Ethernet PHY driver
|
The txphy driver supports the Texas Instruments TNETE2101 10/100 Ethernet PHYs. These PHYs are found on a variety of Ethernet interfaces. |
uaudio(4) -- USB audio device driver
|
The uaudio driver provides support for USB audio class devices. |
vax/uba(4) -- UNIBUS/Q-bus controller
|
The uba driver supports UNIBUS and Q-bus controllers found on many VAX systems. |
ubsa(4) -- USB support for Belkin serial adapters
|
The ubsa driver provides support for USB-to-RS232 Bridge chip used by a variety of serial adapters from Belkin and other vendors. The device is accessed through the ucom(4) driver which makes it behav... |
ubsec(4) -- Broadcom and BlueSteel uBsec 5x0x crypto accelerator
|
The ubsec driver supports cards containing any of the following chips: Bluesteel 5501 The original chipset, no longer made. This extremely rare unit was not very fast, lacked an RNG, and had a number ... |
ucom(4) -- USB tty support
|
The ucom driver attaches to USB modems, serial ports, and other devices that need to look like a tty. The ucom driver shows a behaviour like a tty(4). This means that normal programs such as tip(1) or... |
vax/uda(4) -- UDA50 disk controller interface
|
This is a driver for the DEC UDA50 disk controller and other compatible controllers. The UDA50 communicates with the host through a packet protocol known as the Mass Storage Control Protocol (MSCP). C... |
udp(4) -- Internet User Datagram Protocol
|
UDP is a simple, unreliable datagram protocol which is used to support the SOCK_DGRAM abstraction for the Internet protocol family. UDP sockets are connectionless, and are normally used with the sendt... |
udsbr(4) -- D-Link DSB-R100 USB radio devices driver
|
The udsbr driver provides support for the D-Link DSB-R100 USB radio. The device is accessed through the radio(4) driver. The DSB-R100 is a rather poor radio and the only feedback that you can get from... |
uftdi(4) -- USB support for serial adapters based on the FT8U100AX
|
The uftdi driver provides support for various serial adapters based on the FTDI chip FT8U100AX. The device is accessed through the ucom(4) driver which makes it behave like a tty(4). The uftdi driver ... |
ugen(4) -- USB generic device support
|
The ugen driver provides support for all USB devices that do not have a special driver. It supports access to all parts of the device, but not in a way that is as convenient as a special purpose drive... |
i386/uha(4) -- Ultrastor SCSI adapter driver
|
The uha driver provides support for the following SCSI adapters: Ultrastor 14f Ultrastor 24f Ultrastor 34f |
uhci(4) -- USB Universal Host Controller driver
|
The uhci driver provides support for USB Universal Host Controller Interface. |
uhid(4) -- USB generic HID support
|
The uhid driver provides support for all HID (Human Interface Device) interfaces in USB devices that do not have a special driver. The device handles the following ioctl(2) calls: USB_GET_REPORT_ID (i... |
uhidev(4) -- USB Human Interface Device support
|
The uhidev driver handles all Human Interface Devices. Each HID device can have several components, e.g., a keyboard and a mouse. These components use different report identifiers (a byte) to distingu... |
uhub(4) -- introduction to Universal Serial Bus support
|
OpenBSD provides machine-independent bus support and drivers for Universal Serial Bus (USB) devices. The OpenBSD usb driver has three layers (like scsi(4) and pcmcia(4)): the controller, the bus, and ... |
uk(4) -- SCSI user-level driver
|
The uk driver provides support for a process to address devices on the SCSI bus for which there is no configured driver. A SCSI adapter must also be separately configured into the system before this d... |
ukbd(4) -- USB keyboard support
|
The ukbd driver provides support for USB keyboards (i.e., HID devices with reports in usage page 7). Access to the keyboard is through the wskbd(4) driver. |
ukphy(4) -- generic/unknown IEEE 802.3u Ethernet PHY driver
|
The ukphy driver supports the basic functionality of most Ethernet PHYs. |
ulpt(4) -- USB printer support
|
The ulpt driver provides support for USB printers that follow the printer bi- or uni-directional protocol. The bits in the minor number select various features of the driver. Minor Bit Function 64 Do ... |
umass(4) -- USB mass storage support
|
The umass driver provides support for USB mass storage class devices. |
umct(4) -- USB support for MCT USB-RS232 serial adapters driver
|
The umct driver provides support for MCT USB-to-RS232 Converter and their family products. The device is accessed through the ucom(4) driver which makes it behave like a tty(4). |
umidi(4) -- USB support for MIDI devices
|
The umidi driver supports USB MIDI devices that follow the USB MIDI standard. It also supports the following vendor specific devices: Roland UM1 Yamaha UX256 Yamaha UX96 other Yamaha MIDI devices (hop... |
umodem(4) -- USB modem support
|
The umodem driver provides support for USB modems in the Communication Device Class using the Abstract Control Model. These modems are basically standard serial line modems, but they are accessed via ... |
ums(4) -- USB mouse support
|
The ums driver provides support for USB mice. Access to the mouse is through the wscons(4) driver. |
unix(4) -- UNIX-domain protocol family
|
The UNIX-domain protocol family is a collection of protocols that provides local (on-machine) interprocess communication through the normal socket(2) mechanisms. The UNIX-domain family supports the SO... |
sparc64/upa(4) -- SPARC64 Host/UPA bridge
|
The upa device provides support for the upa bus on sparc64 systems, most often found on UltraSPARC III based systems. |
sparc64/uperf(4) -- performance counters driver
|
Some UltraSPARC host bridges provide performance counters on their host bridges. The counters are a part of the system controller chip (usc, dsc, or qsc). On PCI machines the system controller shows u... |
upl(4) -- USB support for Prolific based host-to-host adapters
|
The upl driver provides support for Prolific PL2301/PL2302 based host-tohost USB connectors. The upl driver appears as a point-to-point network interface and should be configured with ifconfig(8) in t... |
uplcom(4) -- USB support for Prolific PL-2303 serial adapters driver
|
The uplcom driver provides support for Prolific PL-2303 USBto-RS232 Bridge chip. The device is accessed through the ucom(4) driver which makes it behave like a tty(4). |
urandom(4) -- random data source devices
|
The various random devices produce random output data with different random qualities. Entropy data is collected from system activity (like disk and network device interrupts and such), and then run t... |
urio(4) -- USB driver for Diamond Multimedia Rio MP3 players
|
The urio driver provides support for Rio500 and Rio600 MP3 players from Diamond MultiMedia. The driver implements minimal support to access the device and requires a user application for up and downlo... |
url(4) -- Realtek RTL8150L USB Ethernet driver
|
The url driver provides support for USB Ethernet adapters based on the Realtek RTL8150L USB-ether bridge chip. The url driver supports the following adapters: Melco Inc. LUA-KTX GreenHouse GH-USB100B ... |
urlphy(4) -- Realtek RTL8150L Internal PHY driver
|
The urlphy driver supports the internal PHY found on Realtek RTL8150L USB Ethernet devices (see url(4)). |
usb(4) -- introduction to Universal Serial Bus support
|
OpenBSD provides machine-independent bus support and drivers for Universal Serial Bus (USB) devices. The OpenBSD usb driver has three layers (like scsi(4) and pcmcia(4)): the controller, the bus, and ... |
uscanner(4) -- minimal USB support for scanners
|
The uscanner driver provides minimal support for USB scanners. The driver recognizes a number of USB scanners, but to actually scan anything there needs to be software that knows about the particular ... |
usscanner(4) -- driver for some SCSI-over-USB scanners
|
The usscanner provides support for some scanners based on non-standard SCSI-over-USB, e.g., HP5300C. |
uvisor(4) -- USB support for the Handspring Visor
|
The uvisor driver provides support for the Handspring Visor, a Palmpilot compatible PDA. The device is accessed through the ucom(4) driver which makes it behave like a tty(4). The usual Pilot tools ca... |
uvscom(4) -- USB support for SUNTAC Slipper U VS-10U serial adapters driver
|
The uvscom driver provides support for SUNTAC Slipper U VS-10U. Slipper U is a PC card to USB converter for data communication card adapter. It supports DDI Pocket's Air H" C@rd, C@rd H" 64, NTT's... |
uyap(4) -- USB YAP phone firmware loader
|
The uyap driver downloads firmware into a YAP phone. The device will then disconnect and reappear as a composite device with two audio pipes (handled by uaudio(4)) and an HID device (handled by uhid(4... |
vga(4) -- VGA graphics driver for wscons
|
This driver handles VGA graphics hardware within the wscons(4) console framework. It doesn't provide direct device driver entry points but makes its functions available via the internal wsdisplay(4) ... |
sparc64/vgafb(4) -- VGA frame buffer
|
The vgafb is a memory based color frame buffer driver for the wscons(4) console framework. It does not provide direct device driver entry points but makes its functions available via the internal wsdi... |
viaenv(4) -- VIA VT82C686A hardware monitor
|
The viaenv driver provides support for the hardware monitor in the VIA VT82C686A and VT8231 South Bridge to be used with the sysctl(8) interface. The device has 10 sensors: Sensor Units Typical Use TS... |
sparc/vigra(4) -- 8-bit SBus color frame buffer with VGA-compatible modes
|
The Vigra VS10, VS11 and VS12 are 8 bit color frame buffers with user-selectable video modes, and a VGA-compatible connector. The vigra driver interfaces the frame buffer with the wscons(4) console fr... |
vlan(4) -- IEEE 802.1Q encapsulation/decapsulation pseudo-device
|
The vlan Ethernet interface allows construction of virtual LANs when used in conjunction with IEEE 802.1Q-compliant Ethernet devices. A vlan interface can be created at runtime using the ifconfig vlan... |
mvme88k/vme(4) -- VMEchip2 VMEbus interface chip
|
The vme driver provides access to the VMEchip2 ASIC which interfaces from the MC68040-compatible local bus to the VMEbus. On MVME187 and MVME197 boards it is attached to the pcctwo(4) PCCchip2 local b... |
vnd(4) -- Vnode Disk Driver
|
The vnd driver provides a disk-like interface to a file. This is useful for a variety of applications, including swap files and building miniroot or floppy disk images. There are two variants, the tra... |
vr(4) -- VIA Technologies VT3043 and VT86C100A Ethernet driver
|
The vr driver provides support for PCI Ethernet adapters and embedded controllers based on the VIA Technologies VT3043 Rhine I, VT86C100A Rhine II, and VT6105/VT6105M Rhine III Fast Ethernet controlle... |
mvme88k/vs(4) -- MVME328S High Performance SCSI Controller
|
The vs provides access to the MVME328S family of SCSI VME I/O boards. Depending on the version, it provides a single or dual channel singleended SCSI interface. It is attached to the VME bus of the sy... |
vax/vsbus(4) -- VAXstation bus
|
The vsbus driver supports the internal I/O bus found on VAXstation 3100 and 4000 class systems, MicroVAX 3100 class systems, and VAX 4000 100 class systems. |
hppa/wax(4) -- GSC bus controller and I/O subsystem
|
The wax GSC bus controller is a version of lasi(4) with limited functionality and no additional devices on the crystal. It is mainly used as a GSC bus controller for additional onboard devices (e.g. 2... |
wb(4) -- Winbond W89C840F Fast Ethernet driver
|
The wb driver provides support for PCI Ethernet adapters and embedded controllers based on the Winbond W89C840F Fast Ethernet controller chip. This includes the Trendware TE100-PCIE and various other ... |
wd(4) -- WD100x compatible hard disk driver
|
The wd driver supports hard disks which emulate the Western Digital WD100x. This includes standard MFM, RLL, ESDI, IDE, and EIDE drives, as well as Serial ATA drives. The flags are used only with cont... |
wdc(4) -- WD100x compatible hard disk controller driver
|
The wdc driver provides the basic functions for the wd(4) and atapiscsi(4) drivers. It supports IDE and EIDE controllers, as well as MFM, RLL, and ESDI on the ISA bus. PCI IDE controllers in legacy mo... |
i386/wdt(4) -- ICS PCI-WDT500/501 watchdog timer device driver
|
The wdt driver provides support for the Industrial Computer Source PCIWDT500 and PCI-WDT501 boards. For PCI-WDT500 boards, basic watchdog timer functionality is supported. For PCI-WDT501 boards, addit... |
we(4) -- device driver for Western Digital/SMC WD80x3, SMC Elite Ultra, and SMC EtherEZ Ethernet cards
|
The we device driver supports Western Digital/SMC WD80x3, SMC Elite Ultra, and SMC EtherEZ Ethernet cards. |
wi(4) -- WaveLAN/IEEE, PRISM 2-3 and Spectrum24 802.11DS wireless network driver
|
The wi driver provides support for wireless network adapters based around the Lucent Hermes, Intersil PRISM-2, Intersil PRISM-2.5, Intersil PRISM-3 and Symbol Spectrum24 chipsets. All five chipsets pr... |
wscons(4) -- console access
|
The wscons driver provides support for machine-independent access to the console. wscons is made of a number of cooperating modules, in particular +o Hardware support for display adapters, keyboards a... |
wsdisplay(4) -- generic display device support in wscons
|
The wsdisplay driver is an abstraction layer for display devices within the wscons(4) framework. It attaches to the hardware specific display device driver and makes it available as text terminal or g... |
wskbd(4) -- generic keyboard support in wscons
|
The wskbd driver handles common tasks for keyboards within the wscons(4) framework. It is attached to the hardware specific keyboard drivers and provides their connection to ``wsdisplay'' devices an... |
wsmouse(4) -- generic mouse support in wscons
|
The wsmouse driver is an abstraction layer for mice within the wscons(4) framework. It is attached to the hardware specific keyboard drivers and provides a character device interface. For use with X s... |
wsmux(4) -- console keyboard/mouse multiplexor for wscons
|
The wsmux is a pseudo-device driver that allows several wscons(4) input devices to have their events multiplexed into one stream. The typical usage for this device is to have two multiplexors, one for... |
i386/wss(4) -- Windows Sound System hardware driver
|
The wss driver supports Microsoft's Windows Sound System, MAD16 chip based hardware and their clones. The Windows Sound System is a half-duplex device. The base I/O port is set by a jumper on the boa... |
i386/wt(4) -- Archive/Wangtek cartridge tape driver
|
The wt driver provides support for the following Archive and Wangtek boards: QIC-02 QIC-36 |
sparc/xbox(4) -- SPARC SBus Expansion Subsystem
|
The xbox driver provides support for the Sun SBus Expansion Subsystem. This device consists of an SBus card and a chassis which has three additional SBus slots. |
sparc/xd(4) -- Xylogics 753 or 7053 VME SMD disk controller driver
|
The xd is a Xylogics 753 or 7053 SMD disk controller found on sun4 systems with the VME bus. The Xylogics 753 and 7053 are programmed the same way, but are different sizes. The 753 is a 6U VME card, w... |
xe(4) -- Xircom-based 16-bit PCMCIA Ethernet driver
|
The xe interface provides access to a 10/100 Mb/s Ethernet network via a Xircom Ethernet card. The Ethernet cards known to be supported by the xe interface are: Xircom Realport Xircom CE3 However, mos... |
xf86(4) -- XFree86 aperture driver
|
On alpha, amd64, cats, i386, macppc, and sparc64 the /dev/xf86 driver provides access to the memory and I/O ports of a VGA board and to the PCI configuration registers for use by the XFree86 X servers... |
xl(4) -- 3Com EtherLink XL and Fast EtherLink XL Ethernet driver
|
The xl device driver supports the 3Com EtherLink XL and Fast EtherLink XL family of Ethernet cards, and embedded controllers based on the 3Com ``boomerang'' and ``cyclone'' bus master EtherLink XL... |
xmphy(4) -- XaQti XMAC-II Gigabit Ethernet PHY driver
|
The xmphy driver supports XaQti XMAC-II PHY interfaces found on SysKonnect Gigabit Ethernet cards (see sk(4)). |
sparc/xy(4) -- Xylogics 450 or 451 VME SMD disk controller driver
|
The xy is a Xylogics 450/451 SMD disk controller found on sun4 systems with the VME bus. |
yds(4) -- Yamaha DS-XG sound hardware driver
|
The yds driver supports Yamaha DS-XG based sound chips, as found in, e.g., many Sony Vaio notebooks. The flags can be used to pass additional information to the yds driver. A value of 0x1000 forces th... |
ym(4) -- Yamaha OPL3-SAx audio driver
|
The ym driver provides support for Yamaha OPL3-SAx chipsetbased cards. |
vax/ze(4) -- SGEC Ethernet device
|
The ze interface provides access to the 10 Mb/s Ethernet network through the DEC Second Generation Ethernet Chip (SGEC) chipset. Different machine configurations have varying types of connectors. The ... |
zero(4) -- the zero device
|
The zero device provides an infinite stream of null (zero) bytes. |
sparc64/zs(4) -- Zilog 8530 (ZSCC) serial communications driver
|
The zs is a Zilog 8530 serial interface chip used in SBusbased UltraSPARC Sun workstations. The Zilog 8530 provides two input/output channels per instance. Most Sun workstations include two of these i... |
macppc/zs(4) -- Zilog 8530 (ZSCC) serial communications driver
|
The zs is a Zilog 8530 serial interface chip used in Sun workstations and Apple Macintosh systems. On most newer Macintosh systems, the first port tty00 is connected to the internal modem. The second ... |
sparc/zs(4) -- Zilog 8530 (ZSCC) serial communications driver
|
The zs is a Zilog 8530 serial interface chip used in Sun workstations. The Zilog 8530 provides two input/output channels per instance. Most Sun workstations include two of these interfaces. One of the... |
mac68k/zsc(4) -- Zilog 8530 (ZSCC) serial communications driver
|
The zsc driver provides support for Z8530- and Z85230-compatible EIA RS-232C (CCITT V.28) Dual UART chips. The Z8530 has a 3 character buffer, while the Z85230 has a 8 character buffer. However, due t... |
macppc/zsc(4) -- Zilog 8530 (ZSCC) serial communications driver
|
The zs is a Zilog 8530 serial interface chip used in Sun workstations and Apple Macintosh systems. On most newer Macintosh systems, the first port tty00 is connected to the internal modem. The second ... |
sparc64/zskbd(4) -- Zilog 8530 (ZSCC) serial communications driver
|
The zs is a Zilog 8530 serial interface chip used in SBusbased UltraSPARC Sun workstations. The Zilog 8530 provides two input/output channels per instance. Most Sun workstations include two of these i... |
sparc/zskbd(4) -- Zilog 8530 (ZSCC) serial communications driver
|
The zs is a Zilog 8530 serial interface chip used in Sun workstations. The Zilog 8530 provides two input/output channels per instance. Most Sun workstations include two of these interfaces. One of the... |
sparc64/zstty(4) -- Zilog 8530 (ZSCC) serial communications driver
|
The zs is a Zilog 8530 serial interface chip used in SBusbased UltraSPARC Sun workstations. The Zilog 8530 provides two input/output channels per instance. Most Sun workstations include two of these i... |
mac68k/zstty(4) -- Zilog 8530 (ZSCC) serial communications driver
|
The zsc driver provides support for Z8530- and Z85230-compatible EIA RS-232C (CCITT V.28) Dual UART chips. The Z8530 has a 3 character buffer, while the Z85230 has a 8 character buffer. However, due t... |
macppc/zstty(4) -- Zilog 8530 (ZSCC) serial communications driver
|
The zs is a Zilog 8530 serial interface chip used in Sun workstations and Apple Macintosh systems. On most newer Macintosh systems, the first port tty00 is connected to the internal modem. The second ... |
sparc/zstty(4) -- Zilog 8530 (ZSCC) serial communications driver
|
The zs is a Zilog 8530 serial interface chip used in Sun workstations. The Zilog 8530 provides two input/output channels per instance. Most Sun workstations include two of these interfaces. One of the... |
sparc64/zx(4) -- accelerated 24-bit color frame buffer
|
The ZX and TurboZX are dual-slot SBus color frame buffers, with graphics acceleration and overlay capabilities. They are also known as the Sun ``Leo'' graphics card. The zx driver interfaces the fra... |
sparc/zx(4) -- accelerated 24-bit color frame buffer
|
The ZX and TurboZX are dual-slot SBus color frame buffers, with graphics acceleration and overlay capabilities. They are also known as the Sun ``Leo'' graphics card. The zx driver interfaces the fra... |
a.out(5) -- format of executable binary files
|
The include file declares three structures and several macros. The structures describe the format of executable machine code files (``binaries'') on the system. A binary file consists of u... |
acct(5) -- execution accounting file
|
The kernel maintains the following acct information structure for all processes. If a process terminates, and accounting is enabled, the kernel calls the acct(2) function call to prepare and append th... |
afsd.conf(5) -- configuration file for the arla AFS implementation.
|
Most flags can be overridden by command line arguments to afsd. Each option can be of the type integer, string or boolean. Integer values can be written with suffix `K' (kilo, 1000), `M' (mega, 1000... |
AliasDB(5) -- add alias for an afs cell in dynroot
|
The file AliasDB add aliases for afs cellnames in dynroot, useful to add readwrite mountpoints in dynroot. Each line in the file contains at least two elements with an optional third element. The firs... |
aliases(5) -- aliases file for sendmail
|
This file describes user ID aliases used by /usr/sbin/sendmail. The file resides in /etc/mail and is formatted as a series of lines of the form name: addr_1, addr_2, addr_3, . . . The name is the name... |
bgpd.conf(5) -- Border Gateway Protocol daemon configuration file
|
The bgpd(8) daemon implements the Border Gateway Protocol version 4 as described in RFC 1771. |
bootparams(5) -- boot parameter database
|
The bootparams file specifies the boot parameters that diskless(8) clients may request when booting over the network. Each client supported by this server must have an entry in the bootparams file con... |
bridgename.if(5) -- interface-specific configuration files
|
The hostname.* and bridgename.* files contain information regarding the configuration of each network interface. One file should exist for each interface that is to be configured, such as hostname.fxp... |
bsd.port.mk(5) -- ports tree master Makefile fragment
|
bsd.port.mk holds all the standard routines used by the ports tree. Some variables and targets are for its internal use only. The rest is documented here. Other BSD variants, as well as older versions... |
bsd.regress.mk(5) -- regression test master Makefile fragment
|
bsd.regress.mk holds the standard routines used by the source regression tests. Some variables and targets are for its internal use only. The rest are documented here. Since this file also includes bs... |
CellServDB(5) -- AFS cells and database servers
|
The file CellServDB lists AFS cells known to the local AFS cache manager. Each entry describes the name of an AFS cell and specifies the servers for that cell. Here is an example of the format of an e... |
changelist(5) -- list of backup files
|
The /etc/changelist file is a simple text file containing the names of files to be backed up and checked for modification by the system security script, security(8). It is checked daily by the /etc/da... |
core(5) -- memory image file format
|
A small number of signals which cause abnormal termination of a process also cause a record of the process's in-core state to be written to disk for later examination by one of the available debugger... |
crontab(5) -- tables for driving cron
|
A crontab file contains instructions to the cron(8) daemon of the general form: ``at these times on these dates run this command''. There may be a system crontab (/etc/crontab) and each user may hav... |
cvs(5) -- Concurrent Versions System support files
|
cvs is a system for providing source control to hierarchical collections of source directories. Commands and procedures for using cvs are described in cvs(1). cvs manages source repositories, the dire... |
defaultdomain(5) -- default YP domain name
|
The defaultdomain file is read by netstart(8) at system startup time. It is used to set the YP domain name of the host machine (see yp(8)). This file should contain one line consisting of the system d... |
dhclient.conf(5) -- DHCP client configuration file
|
The dhclient.conf file contains configuration information for dhclient(8), the Internet Software Consortium DHCP Client. The dhclient.conf file is a free-form ASCII text file. It is parsed by the recu... |
dhclient.leases(5) -- DHCP client lease database
|
The Internet Software Consortium DHCP client keeps a persistent database of leases that it has acquired that are still valid. The database is a free-form ASCII file containing one valid declaration pe... |
dhcp-options(5) -- Dynamic Host Configuration Protocol options
|
The Dynamic Host Configuration protocol allows the client to receive options from the DHCP server describing the network configuration and various services that are available on the network. When conf... |
dhcpd.conf(5) -- dhcpd configuration file
|
The dhcpd.conf file contains configuration information for dhcpd(8), the Internet Software Consortium DHCP Server. The dhcpd.conf file is a free-form ASCII text file. It is parsed by the recursive-des... |
dhcpd.leases(5) -- DHCP client lease database
|
The Internet Software Consortium DHCP Server keeps a persistent database of leases that it has assigned. This database is a freeform ASCII file containing a series of lease declarations. Every time a ... |
dir(5) -- directory file format
|
Directories provide a convenient hierarchical method of grouping files while obscuring the underlying details of the storage medium. A directory file is differentiated from a plain file by a flag in i... |
dirent(5) -- directory file format
|
Directories provide a convenient hierarchical method of grouping files while obscuring the underlying details of the storage medium. A directory file is differentiated from a plain file by a flag in i... |
disklabel(5) -- disk pack label
|
Each disk or disk pack on a system may contain a disk label which provides detailed information about the geometry of the disk and the partitions into which the disk is divided. It should be initializ... |
disktab(5) -- disk description file
|
disktab is a simple database which describes disk geometries and disk partition characteristics. It is used to initialize the disk label on the disk. The format is patterned after the termcap(5) termi... |
DynRootDB(5) -- AFS cells and database servers
|
The file DynRootDB specifies what AFS cells that should appear in the AFS root (/afs) when starting afsd. Each line in the file should contain one cell, for example: stacken.kth.se e.kth.se nada.kth.s... |
editrc(5) -- configuration file for editline library
|
The editrc file defines various settings to be used by the editline(3) library. The format of each line is: [prog:]command [arg [...]] command is one of the editline(3) builtin commands. Refer to BUIL... |
elf(5) -- format of ELF executable binary files
|
The header file defines the format of ELF executable binary files. Amongst these files are normal executable files, relocatable object files, core files and shared libraries. An executable... |
ethers(5) -- Ethernet host name database
|
The ethers file maps Ethernet addresses to host names. Lines consist of an address and a host name, separated by any number of blanks and/or tab characters. A `#' indicates the beginning of a comment... |
exports(5) -- define remote mount points for NFS mount requests
|
The exports file specifies remote mount points for the NFS mount protocol per the NFS server specification; see Network File System Protocol Specification RFC 1094, Appendix A and NFS: Network File Sy... |
fbtab(5) -- change device protection upon login
|
The fbtab file contains lines which specify how the permissions and ownership of various system files should be changed based on the user's login device name. Comments start with a `#' and extend to... |
files.conf(5) -- rules base for the config utility
|
The various files.* files located in the kernel source tree contain all the necessary information needed by config(8) to parse a kernel configuration file and determine the list of files to compile. |
forward(5) -- e-mail forwarding information file
|
Users may put a file named .forward in their home directory. If this file exists, sendmail(8) (and sendmail-like mailers) will redirect mail for the user to the list of addresses found in the .forward... |
fs(5) -- format of file system volume
|
The files and declare several structures and define variables and macros which are used to create and manage the underlying format of file system objects on random acc... |
fstab(5) -- static information about the filesystems
|
The fstab file contains descriptive information about the various file systems. fstab is only read by programs, and not written; it is the duty of the system administrator to properly create and maint... |
genassym.cf(5) -- assym.h definition file
|
The genassym.cf file is used by genassym.sh(8) to make constant C expressions known to assembler source files. Lines starting with '#' are discarded by genassym.sh(8). Lines starting with include, i... |
gettytab(5) -- terminal configuration database
|
The gettytab file is a simplified version of the termcap(5) database used to describe terminal lines. The initial terminal login process getty(8) accesses the gettytab file each time it starts, allowi... |
groff_font(5) -- format of groff device and font description files
|
The groff font format is roughly a superset of the ditroff font format. Unlike the ditroff font format, there is no associated binary format. The font files for device name are stored in a directory d... |
groff_out(5) -- groff intermediate output format
|
This manual page describes the format output by GNU troff. The output format used by GNU troff is very similar to that used by Unix device-independent troff. Only the differences are documented here. ... |
group(5) -- format of the group permissions file
|
The file /etc/group consists of newline separated ASCII records, one per group, containing four colon (`:') separated fields. These fields are as follows: group Name of the group. passwd Group's enc... |
hostname.if(5) -- interface-specific configuration files
|
The hostname.* and bridgename.* files contain information regarding the configuration of each network interface. One file should exist for each interface that is to be configured, such as hostname.fxp... |
hosts(5) -- host name database
|
The hosts file contains information regarding the known hosts on the network. For each host, a single line should be present with the following information: Internet address Official host name Aliases... |
hosts.allow(5) -- tcp wrapper format of host access control files
|
This manual page describes a simple access control language that is based on client (host name/address, user name), and server (process name, host name/address) patterns. Examples are given at the end... |
hosts.deny(5) -- tcp wrapper format of host access control files
|
This manual page describes a simple access control language that is based on client (host name/address, user name), and server (process name, host name/address) patterns. Examples are given at the end... |
hosts.equiv(5) -- trusted remote hosts and host-user pairs
|
The hosts.equiv and .rhosts files list hosts and users which are ``trusted'' by the local host when a connection is made via rshd(8), or any other server that uses ruserok(3). This mechanism bypasse... |
hosts_access(5) -- tcp wrapper format of host access control files
|
This manual page describes a simple access control language that is based on client (host name/address, user name), and server (process name, host name/address) patterns. Examples are given at the end... |
hosts_options(5) -- tcp wrapper host access control language extensions
|
This document describes optional extensions to the language described in the hosts_access(5) document. The extensible language uses the following format: daemon_list : client_list : option : option ..... |
inetd.conf(5) -- internet ``super-server''
|
inetd should be run at boot time by /etc/rc (see rc(8)). It then listens for connections on certain internet sockets. When a connection is found on one of its sockets, it decides what service the sock... |
info(5) -- readable online documentation
|
The Info file format is an easily-parsable representation for online documents. It can be read by emacs(1) and info(1) among other programs. Info files are usually created from texinfo(5) sources by m... |
inode(5) -- format of file system volume
|
The files and declare several structures and define variables and macros which are used to create and manage the underlying format of file system objects on random acc... |
intro(5) -- introduction to file formats
|
The manual pages in section 5 contain information related to file formats, including: +o ASCII configuration and resource files +o system binary file structures +o composition of database files |
isakmpd.conf(5) -- configuration file for isakmpd
|
isakmpd.conf is the configuration file for the isakmpd daemon managing security association and key management for the IPsec layer of the kernel's networking stack. The file is of a well known type o... |
isakmpd.policy(5) -- policy configuration file for isakmpd
|
isakmpd.policy is the policy configuration file for the isakmpd daemon managing security association and key management for the ipsec(4) layer of the kernel's networking stack. The isakmpd(8) daemon ... |
keynote(5) -- assertion format
|
For more details on keynote, see RFC 2704. KeyNote assertions are divided into sections, called `fields', that serve various semantic functions. Each field starts with an identifying label at the beg... |
krb5.conf(5) -- configuration file for Kerberos 5
|
The krb5.conf file specifies several configuration parameters for the Kerberos 5 library, as well as for some programs. The file consists of one or more sections, containing a number of bindings. The ... |
lastlog(5) -- login records
|
The file declares the structures used to record information about current users in the utmp file, logins and logouts in the wtmp file, and last logins in the lastlog file. The timestamps of d... |
link(5) -- dynamic loader and link editor interface
|
The include file declares several structures that are present in dynamically linked programs and libraries. The structures define the interface between several components of the link editor a... |
login.conf(5) -- login class capability database
|
The login.conf file describes the various attributes of login classes. A login class determines what styles of authentication are available as well as session resource limits and environment setup. Wh... |
magic(5) -- file command's magic number file
|
This manual page documents the format of the magic file as used by the file(1) command, version 3.22. The file command identifies the type of a file using, among other tests, a test for whether the fi... |
mailer.conf(5) -- configuration file for mailwrapper(8)
|
The file /etc/mailer.conf contains a series of pairs. The first member of each pair is the name of a program invoking mailwrapper(8) which is typically a symbolic link to /usr/sbin/sendmail. (On a typ... |
malloc.conf(5) -- memory allocation and deallocation
|
The malloc() function allocates uninitialized space for an object whose size is specified by size. The malloc() function maintains multiple lists of free blocks according to size, allocating space fro... |
man.conf(5) -- configuration file for man(1)
|
The man(1), apropos(1), and whatis(1) commands search for manual pages or their database files as specified by the man.conf file. Manual pages are normally expected to be preformatted (see nroff(1)) a... |
map3270(5) -- database for mapping ASCII keystrokes into IBM 3270 keys
|
When emulating IBM-style 3270 terminals under UNIX (see tn3270(1)), a mapping must be performed between sequences of keys hit on a user's (ASCII) keyboard, and the keys that are available on a 3270. ... |
master.passwd(5) -- format of the password file
|
The master.passwd file, readable only by root, consists of newline-separated records, one per user, containing ten colon (`:') separated fields. These fields are as follows: name User's login name. ... |
mk.conf(5) -- system-specific configuration parameters
|
To get system-specific configuration parameters, will try to include the file specified by the MAKECONF variable. If MAKECONF is not set, or no such file exists, the system make configura... |
moduli(5) -- system moduli file
|
The /etc/moduli file contains the system-wide Diffie-Hellman prime moduli for sshd(8). Each line in this file contains the following fields: Time, Type, Tests, Tries, Size, Generator, Modulus. The fie... |
motd(5) -- message of the day
|
The /etc/motd file is normally displayed by login(1) after a user has logged in but before the shell is run. It is generally used for important system-wide announcements. During system startup, a line... |
mygate(5) -- default hostname and gateway
|
The myname and mygate files are read by netstart(8) at system startup time. /etc/myname contains the symbolic name of the host machine. The file should contain a single line specifying the fully quali... |
myname(5) -- default hostname and gateway
|
The myname and mygate files are read by netstart(8) at system startup time. /etc/myname contains the symbolic name of the host machine. The file should contain a single line specifying the fully quali... |
netgroup(5) -- defines network groups
|
The netgroup file specifies ``netgroups'', which are sets of (host, user, domain) tuples that are to be given similar network access. Each line in the file consists of a netgroup name followed by a ... |
netid(5) -- YP network credential file
|
Files in netid format are rare. One lives in the YP map ``netid.byname''. The format is rather simple. Each row consists of two items: a key and a value. When created by mknetid(8) there are three t... |
networks(5) -- Internet Protocol network name database
|
The networks file is used as a local source to translate between Internet Protocol (IP) network addresses and network names (and vice versa). It can be used in conjunction with the Domain Name System ... |
newsyslog.conf(5) -- trim log files to manageable sizes
|
newsyslog is a program that should be scheduled to run periodically by cron(8). When it is executed it archives log files if necessary. If a log file is determined to require archiving, newsyslog rear... |
ntpd.conf(5) -- Network Time Protocol daemon configuration file
|
This manual page describes the format of the ntpd(8) configuration file. It has the following format: Empty lines and lines beginning with the `#' character are ignored. The possible keywords are as ... |
passwd(5) -- format of the password file
|
The master.passwd file, readable only by root, consists of newline-separated records, one per user, containing ten colon (`:') separated fields. These fields are as follows: name User's login name. ... |
pf.conf(5) -- packet filter configuration file
|
The pf(4) packet filter modifies, drops or passes packets according to rules or definitions specified in pf.conf. |
pf.os(5) -- format of the operating system fingerprints file
|
The pf(4) firewall and the tcpdump(8) program can both fingerprint the operating system of hosts that originate an IPv4 TCP connection. The file consists of newline-separated records, one per fingerpr... |
phones(5) -- remote host phone number file
|
phones files are used by tip(1) to find phone numbers not included in the remote(5) database(s) being used. The default file is /etc/phones, which is used unless the PHONES environment variable has be... |
portal.conf(5) -- mount the portal daemon
|
The mount_portal command attaches an instance of the portal daemon to the global filesystem namespace. The conventional mount point is /p. This command is normally executed by mount(8) at boot time. T... |
printcap(5) -- printer capability database
|
The printcap file is a simplified version of the termcap(5) database used to describe line printers. The spooling system accesses the printcap file every time it is used, allowing dynamic addition and... |
protocols(5) -- protocol name database
|
The protocols file contains information regarding the known protocols used in the DARPA Internet. For each protocol, a single line should be present with the following information: official protocol n... |
rcsfile(5) -- format of RCS file
|
An RCS file's contents are described by the grammar below. The text is free format: space, backspace, tab, newline, vertical tab, form feed, and carriage return (collectively, white space) have no si... |
remote(5) -- remote host description file
|
The systems known by tip(1) and their attributes are stored in an ASCII file which is structured somewhat like the termcap(5) file. Each line in the file provides a description for a single remote hos... |
resolv.conf(5) -- resolver configuration file
|
The resolv.conf file specifies how the resolver(3) routines in the C library (which provide access to the Internet Domain Name System) should operate. The resolver configuration file contains informat... |
resolver(5) -- resolver configuration file
|
The resolv.conf file specifies how the resolver(3) routines in the C library (which provide access to the Internet Domain Name System) should operate. The resolver configuration file contains informat... |
rndc.conf(5) -- rndc configuration file
|
rndc.conf is the configuration file for rndc, the BIND 9 name server control utility. This file has a similar structure and syntax to named.conf. Statements are enclosed in braces and terminated with ... |
rpc(5) -- rpc program number database
|
The rpc file contains user readable names that can be used in place of rpc program numbers. Each line has the following information: name of server for the rpc program rpc program number aliases Items... |
rtadvd.conf(5) -- config file for router advertisement daemon
|
This file describes how the router advertisement packets must be constructed for each of the interfaces. As described in rtadvd(8), you do not have to set this configuration file up at all, unless you... |
securenet(5) -- ypserv(8) configuration file for secure networks
|
The securenet file controls which hosts can connect to the YP server. The format is rather simple. Each row consists of two items. The first item is the network mask. The second item is the network. |
sensorsd.conf(5) -- configuration file for sensorsd(8)
|
The sensorsd.conf file is read by sensorsd(8) to configure hardware sensor monitoring. Each entry represents one sensor and may specify high and low limits. If the sensor data is out of range of the l... |
services(5) -- service name database
|
The services file contains information regarding the known services available in the DARPA Internet. For each service, a single line should be present with the following information: official service ... |
shells(5) -- shell database
|
The shells file contains a list of valid shells available on the system. A shell is a command line interpreter that reads user input and executes commands. For each shell a single line should be prese... |
skey(5) -- one-time password user database
|
The /etc/skey directory contains user records for the S/Key one-time password authentication system. Records take the form of files within /etc/skey where each file is named for the user whose record ... |
spamd.conf(5) -- configuration file read by spamd-setup(8) for spamd(8)
|
The spamd.conf file is read by spamd-setup(8) to configure blacklists and whitelists with corresponding pf(4) table entries for spamd(8). spamd.conf follows the syntax of configuration databases as do... |
sshd_config(5) -- OpenSSH SSH daemon configuration file
|
sshd reads configuration data from /etc/ssh/sshd_config (or the file specified with -f on the command line). The file contains keyword-argument pairs, one per line. Lines starting with `#' and empty ... |
ssh_config(5) -- OpenSSH SSH client configuration files
|
ssh obtains configuration data from the following sources in the following order: 1. command-line options 2. user's configuration file ($HOME/.ssh/config) 3. system-wide configuration file (/etc/ssh/... |
stab(5) -- symbol table types
|
The file defines some of the symbol table n_type field values for a.out(5) files. These are the types for permanent symbols (i.e., not local labels, etc.) used by the old debugger sdb and the... |
sudoers(5) -- list of which users may execute what
|
The sudoers file is composed of two types of entries: aliases (basically variables) and user specifications (which specify who may run what). The grammar of sudoers will be described below in Extended... |
SuidCells(5) -- lists AFS cells for which afsd will honor the setuid bit
|
The setuid bit on binaries executed from AFS are ignored for the cells that are not listed in SuidCells. The SuidCells file contain a list of cells separated by newlines. The cells need to exist in Ce... |
sysctl.conf(5) -- sysctl variables to set at system startup
|
sysctl.conf contains a list of sysctl(8) variable assignments that is read at system startup by rc(8) early on in the boot sequence. The file is made up of sysctl(8) variable assignments (variable=val... |
syslog.conf(5) -- syslogd(8) configuration file
|
The syslog.conf file is the configuration file for the syslogd(8) program. It consists of blocks of lines separated by program specifications, with each line containing two fields: the selector field ... |
term(5) -- format of compiled term file.
|
NOTE: OpenBSD uses a Berkeley DB-style terminfo database instead of the SVR4 method of one description per file described below. Compiled terminfo descriptions are placed under the directory /usr/shar... |
termcap(5) -- terminal capability database
|
The termcap file is a database describing terminals, used, for example, by vi(1) and curses(3). Terminals are described in termcap by giving a set of capabilities that they have and by describing how ... |
terminfo(5) -- terminal capability data base
|
Terminfo is a data base describing terminals, used by screen-oriented programs such as vi(1), rogue(1) and libraries such as curses(3). Terminfo describes terminals by giving a set of capabilities whi... |
texinfo(5) -- software documentation system
|
Texinfo is a documentation system that uses a single source file to produce both online information and printed output. It is primarily designed for writing software manuals. For a full description of... |
ThisCell(5) -- specify a host's home AFS cell
|
The file ThisCell specifies which cell the AFS client belongs to. This affects the default cell to use for commands such as pts(1), fs(1), vos(8), kauth(1), kinit(1), afslog(1), but other cells can st... |
ttys(5) -- terminal initialization information
|
The ttys file contains information that is used by various routines to initialize and control the use of terminal special files. This information is read with the getttyent(3) library routines. There ... |
types(5) -- system data types
|
The file contains the defined data types used in the kernel (most are used throughout the system). #ifndef _SYS_TYPES_H_ #define _SYS_TYPES_H_ /* Machine type dependent parameters. */ #i... |
tzfile(5) -- time zone information
|
The time zone information files used by tzset(3) begin with the magic characters "TZif" to identify themselves as time zone information files, followed by sixteen bytes reserved for future use, foll... |
usermgmt.conf(5) -- user management tools configuration file
|
The usermgmt.conf file defines the default values used by the user management tools, user(8). Options in this file can be set by manually editing /etc/usermgmt.conf or using the -D option to useradd(8... |
utmp(5) -- login records
|
The file declares the structures used to record information about current users in the utmp file, logins and logouts in the wtmp file, and last logins in the lastlog file. The timestamps of d... |
uuencode(5) -- format of an encoded uuencode file
|
Files output by uuencode(1) consist of a header line, followed by a number of body lines, and a trailer line. The uudecode(1) command will ignore any lines preceding the header or following the traile... |
vgrindefs(5) -- language definition database for vgrind(1)
|
The vgrindefs file contains all the language definitions for vgrind(1). The database is very similar to termcap(5). |
wsconsctl.conf(5) -- wsconsctl variables to set at system startup
|
wsconsctl.conf contains a list of wsconsctl(8) variable assignments that is read at system startup by rc(8) during the boot sequence. The file is made up of wsconsctl(8) variable assignments (variable... |
wtmp(5) -- login records
|
The file declares the structures used to record information about current users in the utmp file, logins and logouts in the wtmp file, and last logins in the lastlog file. The timestamps of d... |
ypserv.acl(5) -- ypserv(8) configuration file
|
The ypserv.acl file controls which hosts can connect to the YP server. The format is more complex than the format for securenet(5). The first two words on each line controls if the line will allow or ... |
adventure(6) -- an exploration game
|
The object of the game is to locate and explore Colossal Cave, find the treasures hidden there, and bring them back to the building with you. The program is self-descriptive to a point, but part of th... |
arithmetic(6) -- quiz on simple arithmetic
|
arithmetic asks you to solve problems in simple arithmetic. Each question must be answered correctly before going on to the next. After every 20 problems, it prints the score so far and the time taken... |
atc(6) -- air traffic controller game
|
atc lets you try your hand at the nerve-wracking duties of an air traffic controller without endangering the lives of millions of travelers each year. Your responsibilities require you to direct the f... |
backgammon(6) -- the game of backgammon
|
This program lets you play backgammon against the computer or against a `friend'. All commands are only one letter, so you don't need to type a carriage return, except at the end of a move. The prog... |
banner(6) -- print large banner on printer
|
banner prints a large, high quality banner on the standard output. If the message is omitted, it prompts for and reads one line of its standard input. If -w is given, the output is scrunched down from... |
battlestar(6) -- a tropical adventure game
|
battlestar is an adventure game in the classic style. However, it's slightly less of a puzzle and more a game of exploration. There are a few magical words in the game, but on the whole, simple Engli... |
bcd(6) -- reformat input as punch cards, paper tape or morse code
|
The bcd, ppt, and morse commands read the given input and reformat it in the form of punched cards, paper tape, or morse code, respectively. Acceptable input are command line arguments or the standard... |
boggle(6) -- word search game
|
The object of boggle is to find as many words as possible on the Boggle board within the three minute time limit. A Boggle board is a four by four arrangement of Boggle cubes, each side of each cube d... |
bs(6) -- battleships game
|
This program allows you to play the familiar Battleships game against the computer on a 10x10 board. The interface is visual and largely self-explanatory; you place your ships and pick your shots by m... |
caesar(6) -- decrypt caesar cyphers
|
The caesar utility attempts to decrypt caesar cyphers using English letter frequency statistics. caesar reads from the standard input and writes to the standard output. The optional numerical argument... |
canfield(6) -- the solitaire card game canfield
|
If you have never played solitaire before, it is recommended that you consult a solitaire instruction book. In Canfield, tableau cards may be built on each other downward in alternate colors. An entir... |
cfscores(6) -- the solitaire card game canfield
|
If you have never played solitaire before, it is recommended that you consult a solitaire instruction book. In Canfield, tableau cards may be built on each other downward in alternate colors. An entir... |
cribbage(6) -- the card game cribbage
|
cribbage plays the card game cribbage, with the program playing one hand and the user the other. The program will initially ask the user if the rules of the game are needed - if so, it will print out ... |
factor(6) -- factor a number, generate primes
|
The factor utility will factor 64-bit positive integers. When a number is factored, it is printed, followed by a ``:'', and the list of factors on a single line. Factors are listed in ascending orde... |
fish(6) -- play ``Go Fish''
|
fish is the game ``Go Fish'', a traditional children's card game. The computer deals the player and itself seven cards each, and places the rest of the deck face-down (figuratively), to be drawn fr... |
fortune(6) -- print a random, hopefully interesting, adage
|
When fortune is run with no arguments it prints out a random epigram. Epigrams are divided into several categories, where each category is subdivided into those which are potentially offensive and tho... |
gomoku(6) -- game of 5 in a row
|
gomoku is a two player game where the object is to get 5 in a row horizontally, vertically or diagonally on a 19 by 19 grid. By convention, black always moves first. With no arguments, gomoku will dis... |
grdc(6) -- grand digital clock (curses)
|
grdc runs a digital clock made of reverse-video blanks on a curses compatible VDU screen. With an optional numeric argument number it stops after number seconds (defaulting to never). The optional -s ... |
hack(6) -- Exploring The Dungeons of Doom
|
hack is a display oriented dungeons & dragons - like game. Both display and command structure resemble rogue. (For a game with the same structure but entirely different display - a real cave instead o... |
hangman(6) -- computer version of the game hangman
|
In hangman, the computer picks a word from the on-line word list and you must try to guess it. The computer keeps track of which letters have been guessed and how many wrong guesses you have made on t... |
hunt(6) -- a multi-player multi-terminal game
|
The object of the game hunt is to kill off the other players. There are no rooms, no treasures, and no monsters. Instead, you wander around a maze, find grenades, trip mines, and shoot down walls and ... |
huntd(6) -- hunt daemon, back-end for hunt game
|
huntd controls the multi-player hunt(6) game. The -s option is for running huntd forever (server mode). This is similar to running it under the control of inetd(8) (see below), but it consumes a proce... |
intro(6) -- introduction to the games
|
The manual pages in section 6 contain information about the various games and diversions optionally installed in /usr/games. Currently available games are: adventure An exploration game. See adventure... |
mille(6) -- play Mille Bornes
|
mille plays a two-handed game reminiscent of the Parker Brother's game of Mille Bornes with you. The rules are described below. If a file name is given on the command line, the game saved in that fil... |
monop(6) -- Monopoly game
|
monop is reminiscent of the Parker Brother's game Monopoly, and monitors a game between 1 to 9 users. It is assumed that the rules of Monopoly are known. The game follows the standard rules, with the... |
morse(6) -- reformat input as punch cards, paper tape or morse code
|
The bcd, ppt, and morse commands read the given input and reformat it in the form of punched cards, paper tape, or morse code, respectively. Acceptable input are command line arguments or the standard... |
number(6) -- convert Arabic numerals to English
|
The number utility prints the English equivalent of the number to the standard output, with each 10^3 magnitude displayed on a separate line. If no argument is specified, number reads lines from the s... |
phantasia(6) -- an interterminal fantasy game
|
phantasia is a role-playing game that allows players to roll up characters of various types to fight monsters and other players. Progression of characters is based upon gaining experience from fightin... |
pig(6) -- eformatray inputway asway Igpay Atinlay
|
Ethay igpay utilityway eadsray ethay andardstay inputway andway iteswray itway outway otay andardstay outputway inway Igpay Atinlay. Usefulway orfay eneratinggay onthlymay eportsray. OpenBSD 3.6 June ... |
pom(6) -- display the phase of the moon
|
The pom utility displays the current phase of the moon. Useful for selecting software completion target dates and predicting managerial behavior. [[[[[cc]yy]mm]dd]HH] Display the phase of the moon for... |
ppt(6) -- reformat input as punch cards, paper tape or morse code
|
The bcd, ppt, and morse commands read the given input and reformat it in the form of punched cards, paper tape, or morse code, respectively. Acceptable input are command line arguments or the standard... |
primes(6) -- factor a number, generate primes
|
The factor utility will factor 64-bit positive integers. When a number is factored, it is printed, followed by a ``:'', and the list of factors on a single line. Factors are listed in ascending orde... |
quiz(6) -- random knowledge tests
|
The quiz utility tests your knowledge of random facts. It has a database of subjects from which you can choose. With no arguments, quiz displays the list of available subjects. The options are as foll... |
rain(6) -- animated raindrops display
|
rain is modeled after the VAX/VMS program of the same name. To obtain the proper effect, either the terminal must be set for 9600 baud or the -d option must be used to specify a delay, in milliseconds... |
random(6) -- random lines from a file or random numbers
|
random reads lines from the standard input and copies them to the standard output with a probability of 1/denominator. The default value for denominator is 2. The options are as follows: -e If the -e ... |
robots(6) -- fight off villainous robots
|
robots pits you against evil robots, who are trying to kill you (which is why they are evil). Fortunately for you, even though they are evil, they are not very bright and have a habit of bumping into ... |
rot13(6) -- decrypt caesar cyphers
|
The caesar utility attempts to decrypt caesar cyphers using English letter frequency statistics. caesar reads from the standard input and writes to the standard output. The optional numerical argument... |
sail(6) -- multi-user wooden ships and iron men
|
sail is a computer version of Avalon Hill's game of fighting sail originally developed by S. Craig Taylor. Players of sail take command of an old-fashioned Man of War and fight other players or the c... |
snake(6) -- display chase game
|
snake is a display-based game. The object of the game is to make as much money as possible without getting eaten by the snake. The -l and -w options allow you to specify the length and width of the fi... |
snscore(6) -- display chase game
|
snake is a display-based game. The object of the game is to make as much money as possible without getting eaten by the snake. The -l and -w options allow you to specify the length and width of the fi... |
tetris(6) -- the game of tetris
|
The tetris command runs a display-based game. The object is to fit shapes together to form complete rows, which then vanish. When the shapes fill up to the top, the game ends. You can optionally selec... |
trek(6) -- trekkie game
|
trek is a game of space glory and war. Below is a summary of commands. For complete documentation, see Star Trek by Eric Allman. The game will ask you what length game you would like. Valid responses ... |
worm(6) -- Play the growing worm game
|
In worm, you are a little worm: your body is the "o"'s on the screen and your head is the "@". You move with the hjkl keys (as in the game snake(6)). If you don't press any keys, you continue in... |
worms(6) -- animate worms on a display terminal
|
A UNIX version of the DEC-2136 program ``worms''. The options are as follows: -d delay Specifies a delay, in milliseconds, between each update. This is useful for fast terminals. Reasonable values a... |
wump(6) -- hunt the wumpus in an underground cave
|
The game wump is based on a fantasy game first presented in the pages of People's Computer Company in 1973. In Hunt the Wumpus you are placed in a cave built of many different rooms, all interconnect... |
ascii(7) -- octal, hexadecimal and decimal ASCII character sets
|
The octal set: 000 nul 001 soh 002 stx 003 etx 004 eot 005 enq 006 ack 007 bel 010 bs 011 ht 012 nl 013 vt 014 np 015 cr 016 so 017 si 020 dle 021 dc1 022 dc2 023 dc3 024 dc4 025 nak 026 syn 027 etb 0... |
des_modes(7) -- the variants of DES and other crypto algorithms of OpenSSL
|
Several crypto algorithms for OpenSSL can be used in a number of modes. Those are used for using block ciphers in a way similar to stream ciphers, among other things. |
environ(7) -- user environment
|
An array of strings called the ``environment'' is made available by execve(2) when a process begins. By convention these strings have the form name=value. The following variables are recognized by v... |
groff_char(7) -- groff character names
|
This manual page lists the standard groff input characters. Only the characters that are available for the device that is being used to print this manual page will be displayed. The Input code column ... |
groff_man(7) -- groff `an' macros to support generation of man pages
|
The tmac.an macros used to generate man pages with groff were written by James Clark. This document provides a brief summary of the use of each macro in that package. .TP title section [extra1] [extra... |
groff_me(7) -- troff macros for formatting papers
|
This manual page describes the GNU version of the -me macros, which is part of the groff document formatting system. This version can be used with both GNU troff and Unix troff. This package of troff ... |
groff_mm(7) -- groff mm macros
|
The groff mm macros are intended to be compatible with the DWB mm macros with the following limitations: +o no Bell Labs localisms implemented. +o the macros OK and PM is not implemented. +o groff mm ... |
groff_mmse(7) --
|
|
groff_ms(7) -- groff ms macros
|
This manual page describes the GNU version of the ms macros, which is part of the groff document formatting system. The groff ms macros are intended to be compatible with the documented behaviour of t... |
groff_msafer(7) -- groff -msafer macros
|
The -msafer macros remove the open, opena, pso, sy, and pi requests. These macros should be used when processing input from an untrustworthy source. For maximum safety, they should be the first -m opt... |
hier(7) -- layout of filesystems
|
A sketch of the filesystem hierarchy. / Root directory. /altroot/ Alternate (backup) location for the root (`/') filesystem. /bin/ User utilities fundamental to both single and multi-user environment... |
hostname(7) -- host name resolution description
|
Hostnames are domains, where a domain is a hierarchical, dot-separated list of subdomains; for example, the machine monet, in the Berkeley subdomain of the EDU subdomain of the Internet would be repre... |
intro(7) -- miscellaneous information pages
|
The manual pages in section 7 section contain miscellaneous documentation. ascii Map of ASCII character set. des_modes Variants of the DES algorithm. environ User environment. groff_char Groff charact... |
kgdb(7) -- remote kernel debugging with gdb
|
Should a programmer be dissatisfied with the OpenBSD kernel's internal debugger ddb(4), and have appropriate hardware available, a kernel with option KGDB may be built to effect remote debugging with... |
library-specs(7) -- shared library name specifications
|
Each LIB_DEPENDS item in the port tree conforms to `lib_specs:[pkgspec]:directory[,-subpackage][,flavor ...][:target]', where `lib_specs' is a comma-separated list of `lib_spec' of the form: `libna... |
mailaddr(7) -- mail addressing description
|
Mail addresses are based on the Internet protocol listed at the end of this manual page. These addresses are in the general format user@domain where a domain is a hierarchical dot separated list of su... |
man(7) -- groff `an' macros to support generation of man pages
|
The tmac.an macros used to generate man pages with groff were written by James Clark. This document provides a brief summary of the use of each macro in that package. .TP title section [extra1] [extra... |
mandoc(7) -- quick reference guide for the -mdoc macro package
|
The -mdoc package is a set of content-based and domain-based macros used to format the BSD man pages. The macro names and their meanings are listed below for quick reference; for a detailed explanatio... |
mandoc.samples(7) -- with -mdoc
|
A tutorial sampler for writing OpenBSD manual pages with the -mdoc macro package, a content-based and domain-based formatting package for troff(1). Its predecessor, the -man package (see man(7)) addre... |
mdoc(7) -- quick reference guide for the -mdoc macro package
|
The -mdoc package is a set of content-based and domain-based macros used to format the BSD man pages. The macro names and their meanings are listed below for quick reference; for a detailed explanatio... |
mdoc.samples(7) -- tutorial sampler for writing OpenBSD manuals
|
A tutorial sampler for writing OpenBSD manual pages with the -mdoc macro package, a content-based and domain-based formatting package for troff(1). Its predecessor, the -man package (see man(7)) addre... |
me(7) -- troff macros for formatting papers
|
This manual page describes the GNU version of the -me macros, which is part of the groff document formatting system. This version can be used with both GNU troff and Unix troff. This package of troff ... |
mirror-maker(7) -- how to build a mirror for ports distfiles
|
The OpenBSD Ports Collection offers some powerful tools to mirror software sources. The ports infrastructure provides a mirror-maker target that can be used to build a Makefile to facilitate mirroring... |
mirroring-ports(7) -- how to build a mirror for ports distfiles
|
The OpenBSD Ports Collection offers some powerful tools to mirror software sources. The ports infrastructure provides a mirror-maker target that can be used to build a Makefile to facilitate mirroring... |
mm(7) -- groff mm macros
|
The groff mm macros are intended to be compatible with the DWB mm macros with the following limitations: +o no Bell Labs localisms implemented. +o the macros OK and PM is not implemented. +o groff mm ... |
ms(7) -- groff ms macros
|
This manual page describes the GNU version of the ms macros, which is part of the groff document formatting system. The groff ms macros are intended to be compatible with the documented behaviour of t... |
operator(7) -- C operator precedence and associativity
|
Operator Associativity -------- ------------- () [] -> . left to right ! ~ ++ -- - (type) * & sizeof right to left * / % left to right + - left to right << >> left to right < <= > >= left to right == ... |
packages(7) -- overview of the binary package system
|
The OpenBSD ports collection features a vast array of thirdparty software ready to be compiled and installed on a new machine. As an alternative, most of these ports are also available as binary packa... |
packages-specs(7) -- binary package names specifications
|
Each package has a name consisting of at most three parts: stem-version[-flavors] The stem part identifies the package. It may contain some dashes, but its form is mostly conventional. For instance, j... |
ports(7) -- contributed applications
|
The OpenBSD Ports Collection (shamelessly stolen from the FreeBSD Ports Collection) offers a simple way for users and administrators to install applications. Each port contains any patches necessary t... |
re_format(7) -- POSIX 1003.2 regular expressions
|
Regular expressions (``RE''s), as defined in POSIX 1003.2, come in two forms: modern REs (roughly those of egrep(1); 1003.2 calls these ``extended'' REs) and obsolete REs (roughly those of ed(1); ... |
securelevel(7) -- securelevel and its effects
|
Securelevel provides convenient means of ``locking down'' a system to a degree suited to its environment. It is normally set at boot via the rc.securelevel(8) script, or the superuser may raise secu... |
symlink(7) -- symbolic link handling
|
Symbolic links are files that act as pointers to other files. To understand their behavior, it is necessary to understand how hard links work. A hard link to a file is indistinguishable from the origi... |
term(7) -- conventions for naming terminal types
|
The environment variable TERM should normally contain the type name of the terminal, console or display-device type you are using. This information is critical for all screen-oriented programs, includ... |
ac(8) -- connect time accounting
|
If the file /var/log/wtmp exists, a record of individual login and logout times are written to it by login(1) and init(8), respectively. ac examines these records and writes the accumulated connect ti... |
accton(8) -- enable/disable system accounting
|
With an argument naming an existing file, accton causes system accounting information for every process executed to be placed at the end of the file. If no argument is given, accounting is turned off. |
activadm(8) -- manage the ActivCard, CRYPTOCard and
|
The tokenadm utility displays and edits user entries in the various token databases. It may also be invoked as one the following: activadm, cryptoadm, or snkadm. The options are as follows: -1 Display... |
activinit(8) -- modify or add user in ActivCard, CRYPTOCard,
|
The tokeninit utility may also be invoked by one of the following names: activinit, cryptoinit, or snkinit. Depending on the name it was invoked as, it will initialize the system information to allow ... |
adduser(8) -- add and delete users from the system
|
The adduser program adds new users to the system. The rmuser program removes users from the system. When not passed any arguments, both utilities operate in interactive mode and prompt for any require... |
afsd(8) -- AFS cache manager
|
afsd runs on AFS client machines. It is used to manage the file cache, fetch files from AFS servers, handle callbacks and manage the authentication information for users. In normal cases afsd will be ... |
afterboot(8) -- things to check after the first complete boot
|
Starting Out This document attempts to list items for the system administrator to check and set up after the installation and first complete boot of the system. The idea is to create a list of items t... |
amd(8) -- automatically mount file systems
|
amd is a daemon that automatically mounts filesystems whenever a file or directory within that filesystem is accessed. Filesystems are automatically unmounted when they appear to be quiescent. amd ope... |
amq(8) -- automounter query tool
|
amq provides a simple way of determining the current state of the amd(8) program. Communication is by RPC. Three modes of operation are supported by the current protocol. By default a list of mount po... |
ancontrol(8) -- configure Aironet 4500/4800 devices
|
The ancontrol command controls the operation of Aironet wireless networking devices via the an(4) driver. Most of the parameters that can be changed relate to the IEEE 802.11 protocol which the Airone... |
apachectl(8) -- Apache HTTP server control interface
|
apachectl is a front end to the Apache HyperText Transfer Protocol (HTTP) server. It is designed to help the administrator control the functioning of the Apache httpd daemon. NOTE: If your Apache inst... |
macppc/apm(8) -- Advanced Power Management control program
|
apm communicates with the Advanced Power Management daemon, apmd(8), making requests of it for current power status or to place the system into a suspend or stand-by state. With no flags, apm displays... |
i386/apm(8) -- Advanced Power Management control program
|
apm communicates with the Advanced Power Management daemon, apmd(8), making requests of it for current power status or to place the system into a suspend or stand-by state. With no flags, apm displays... |
macppc/apmd(8) -- Advanced Power Management monitor daemon
|
apmd monitors the advanced power management (APM) pseudo-device, acting on signaled events and upon user requests as sent by the apm(8) program. For suspend and standby request events delivered by the... |
i386/apmd(8) -- Advanced Power Management monitor daemon
|
apmd monitors the advanced power management (APM) pseudo-device, acting on signaled events and upon user requests as sent by the apm(8) program. For suspend and standby request events delivered by the... |
apxs(8) -- APache eXtenSion tool
|
apxs is a tool for building and installing extension modules for the Apache HyperText Transfer Protocol (HTTP) server. This is achieved by building a Dynamic Shared Object (DSO) from one or more sourc... |
arp(8) -- address resolution display and control
|
The arp program displays and modifies the Internet-to-Ethernet address translation tables used by the address resolution protocol (arp(4)). With no flags, the program displays the current ARP entry fo... |
atactl(8) -- a program to manipulate ATA (IDE) devices
|
atactl allows a user or system administrator to issue commands to and otherwise control devices which reside on standard IDE and ATA controllers. It is used by specifying a device to manipulate, the c... |
authpf(8) -- authenticating gateway user shell
|
authpf is a user shell for authenticating gateways. It is used to change pf(4) rules when a user authenticates and starts a session with sshd(8) and to undo these changes when the user's session exit... |
i386/bad144(8) -- read/write DEC standard 144 bad sector information
|
bad144 can be used to inspect the information stored on a disk that is used by the disk drivers to implement bad sector forwarding. The options are as follows: -a The argument list consists of new bad... |
badsect(8) -- create files to contain bad sectors
|
badsect makes a file to contain a bad sector. Normally, bad sectors are made inaccessible by the standard formatter, which provides a forwarding table for bad sectors to the driver; see bad144(8) for ... |
bgpctl(8) -- control the Border Gateway Protocol daemon
|
The bgpctl program controls the bgpd(8) daemon. Commands to switch between displays may be abbreviated to the minimum unambiguous prefix; for example, s s for show summary. The commands are as follows... |
bgpd(8) -- Border Gateway Protocol daemon
|
bgpd is a Border Gateway Protocol (BGP) daemon which manages the network routing tables. Its main purpose is to exchange information concerning "network reachability" with other BGP systems. bgpd us... |
i386/biosboot(8) -- i386-specific first-stage system bootstrap
|
This small program (roughly 512 bytes of code) is responsible for loading the second-stage boot(8) program (typically /boot), which in turn will load the kernel. biosboot must be installed by installb... |
amd64/biosboot(8) -- amd64-specific first-stage system bootstrap
|
This small program (roughly 512 bytes of code) is responsible for loading the second-stage boot(8) program (typically /boot), which in turn will load the kernel. biosboot must be installed by installb... |
i386/boot(8) -- i386-specific second-stage bootstrap
|
The main purpose of this program is to load the system kernel while dealing with the downfalls of the PC BIOS architecture. As described in boot_i386(8), this program is loaded by the biosboot(8) prim... |
amd64/boot(8) -- amd64-specific second-stage bootstrap
|
The main purpose of this program is to load the system kernel while dealing with the downfalls of the PC BIOS architecture. As described in boot_amd64(8), this program is loaded by the biosboot(8) pri... |
hppa/boot(8) -- hppa-specific bootstrap
|
The main purpose of this program is to load the system kernel while dealing with the various features of the PA-RISC hardware. As described in boot_hppa(8), this program is loaded by the PDC firmware ... |
i386/boot.conf(8) -- i386-specific second-stage bootstrap
|
The main purpose of this program is to load the system kernel while dealing with the downfalls of the PC BIOS architecture. As described in boot_i386(8), this program is loaded by the biosboot(8) prim... |
amd64/boot.conf(8) -- amd64-specific second-stage bootstrap
|
The main purpose of this program is to load the system kernel while dealing with the downfalls of the PC BIOS architecture. As described in boot_amd64(8), this program is loaded by the biosboot(8) pri... |
hppa/boot.conf(8) -- hppa-specific bootstrap
|
The main purpose of this program is to load the system kernel while dealing with the various features of the PA-RISC hardware. As described in boot_hppa(8), this program is loaded by the PDC firmware ... |
bootparamd(8) -- boot parameter server
|
bootparamd is a server process that provides information to diskless clients necessary for booting. It consults the file /etc/bootparams. It should normally be started from /etc/rc. This version will ... |
alpha/boot_alpha(8) -- Alpha system bootstrapping procedures
|
Cold starts When powered on, the SRM firmware will proceed to its initialization, and will boot an operating system if the auto_action variable is set to ``boot'' or ``restart'', or will wait for ... |
amd64/boot_amd64(8) -- amd64 system bootstrapping procedures
|
Cold starts The Athlon64 computers and clones will perform a POST (Power On Self Test) upon being booted cold. This test will find and initialize memory, keyboard, and other devices. It will search fo... |
cats/boot_cats(8) -- CATS system bootstrapping procedures
|
System startup When powered on, after a panic, or if the system is rebooted via reboot(8) or shutdown(8), the Cyclone or ABLE firmware will proceed to its initialization, and will try to boot an opera... |
boot_config(8) -- how to change kernel configuration at boot
|
BOOT_CONFIG is a kernel option that makes it possible to change the configuration at boot time. The same interface is available from userland, using the -e argument to config(8). The boot time configu... |
hp300/boot_hp300(8) -- hp300 system bootstrapping procedures
|
Cold starts When powered on, the hp300 firmware will proceed to its initialization, and will boot an operating system from the first bootable device found. By pressing the ``enter'' key during the i... |
hppa/boot_hppa(8) -- hppa system bootstrapping procedures
|
System starts When powered on, after a panic, or if the system is rebooted via reboot(8) or shutdown(8), the hppa firmware (``PDC'') will proceed to its initialization, and will boot an operating sy... |
i386/boot_i386(8) -- i386 system bootstrapping procedures
|
Cold starts The PC AT clones will perform a POST (Power On Self Test) upon being booted cold. This test will find and initialize memory, keyboard, and other devices. It will search for and initialize ... |
luna88k/boot_luna88k(8) -- luna88k system bootstrapping procedures
|
Boot process description When powered on, or after a system reboot, the luna88k ROM monitor will proceed to its initialization, and will boot the operating system configured in nvram if autoboot is en... |
mac68k/boot_mac68k(8) -- mac68k-specific system bootstrapping procedures
|
Power fail and crash recovery Normally, the OpenBSD kernel on the mac68k architecture is booted from the native operating system by means of an application program. When the kernel takes over, it init... |
macppc/boot_macppc(8) -- macppc system bootstrapping procedures
|
System startup When powered on, after a panic, or if the system is rebooted via reboot(8) or shutdown(8), the Open Firmware will proceed to its initialization, and will boot an operating system if the... |
mvme68k/boot_mvme68k(8) -- mvme68k system bootstrapping procedures
|
Cold starts When powered on, the mvme68k BUG firmware will proceed to its initialization, and will boot an operating system if autoboot is enabled. By sending a ``break'' to the serial line during t... |
mvme88k/boot_mvme88k(8) -- mvme88k system bootstrapping procedures
|
Cold starts When powered on, the mvme88k BUG firmware will proceed to its initialization, and will boot an operating system if autoboot is enabled. By sending a ``break'' to the serial line during t... |
sparc/boot_sparc(8) -- sparc system bootstrapping procedures
|
System starts When powered on, after a panic, or if the system is rebooted via reboot(8) or shutdown(8), the PROM will proceed to its initialization, and will boot an operating system if autoboot is e... |
sparc64/boot_sparc64(8) -- sparc64 system bootstrapping procedures
|
System starts When powered on, after a panic, or if the system is rebooted via reboot(8) or shutdown(8), the PROM will proceed to its initialization, and will boot an operating system if autoboot is e... |
vax/boot_vax(8) -- vax-specific system bootstrapping procedures
|
Power fail and crash recovery Normally, the system will reboot itself at power-up or after crashes. Provided the auto-restart is enabled on the machine's front panel, an automatic consistency check o... |
bos(8) -- is the client part of the Basic Overseer Daemon AFS server processes.
|
The bos utility is the client part of the Basic overseer daemon that manage AFS server processes. Most bos commands accept the following general arguments: [-cell cellname] Specifies which AFS cell to... |
brconfig(8) -- manipulate bridge interfaces
|
The brconfig utility retrieves kernel state of bridge interfaces and allows user control of these bridges. Bridge devices create a logical link between two or more Ethernet interfaces or encapsulation... |
ccdconfig(8) -- configuration utility for the concatenated disk driver
|
ccdconfig is used to dynamically configure and unconfigure concatenated disk devices, or ccds. For more information about the ccd, see ccd(4). The options are as follows: -c Configure a ccd. This is t... |
i386/cdboot(8) -- i386-specific second-stage CD-specific bootstrap
|
cdboot is a modified version of the i386 second-stage bootstrap program, boot(8), configured to be run by the OpenBSD El Torito CDROM boot sector cdbr. cdboot will look for an /etc/boot.conf configura... |
amd64/cdboot(8) -- amd64-specific second-stage CD-specific bootstrap
|
cdboot is a modified version of the amd64 second-stage bootstrap program, boot(8), configured to be run by the OpenBSD El Torito CDROM boot sector cdbr. cdboot will look for an /etc/boot.conf configur... |
certpatch(8) -- add subjectAltName identities to X.509 certificates
|
certpatch alters PEM-encoded X.509 certificates by adding a subjectAltName extension containing an identity used by the signaturebased authentication schemes of the ISAKMP protocol. After the addition... |
chat(8) -- automated conversational script with a modem
|
The chat program defines a conversational exchange between the computer and the modem. Its primary purpose is to establish a connection between the Point-to-Point Protocol Daemon (pppd(8)) and the rem... |
chown(8) -- change file owner and group
|
chown sets the user ID and/or the group ID of the specified files. The options are as follows: -H If the -R option is specified, symbolic links on the command line are followed. (Symbolic links encoun... |
chroot(8) -- change root directory
|
The chroot command changes its root directory to the supplied directory newroot and executes command, if supplied, or an interactive copy of the user's shell. The chroot command is restricted to the ... |
clri(8) -- clear inodes
|
clri is obsoleted for normal file system repair work by fsck(8). clri zeros out the inodes with the specified inode numbers on the filesystem residing on the given special_device. The fsck(8) utility ... |
compat_aout(8) -- setup for running a.out OpenBSD binaries on ELF systems
|
OpenBSD supports running legacy a.out binaries. This only applies to i386 systems for now. Most programs should work. The a.out compatibility feature is active for kernels compiled with the COMPAT_AOU... |
compat_bsdos(8) -- setup for running BSDI binaries under emulation
|
OpenBSD supports the execution of BSDI binaries; most binaries should work, at least from the BSDI 2.1 era. Some things that are not currently supported are proprietary extensions made to the BSDI ker... |
compat_freebsd(8) -- setup for running FreeBSD binaries under emulation
|
OpenBSD supports running FreeBSD binaries. Most binaries should work, except for programs that use FreeBSD-specific features. These include i386-specific calls, such as syscons utilities and audio dev... |
compat_hpux(8) -- setup for running HP-UX binaries under emulation
|
OpenBSD supports running HP-UX binaries. This applies only to m68k systems (such as hp300 systems). Most programs should work, such as Matlab 4.2c and the HP-UX X11R5 server. Programs that will not wo... |
compat_ibcs2(8) -- setup for running iBCS2 binaries under emulation
|
OpenBSD supports running Intel Binary Compatibility Standard 2 (iBCS2) binaries. This only applies to i386 systems for now. Binaries are supported from SCO UNIX and other systems derived from UNIX Sys... |
compat_linux(8) -- setup for running Linux binaries under emulation
|
OpenBSD supports running Linux binaries. This only applies to i386 systems for now. Both the a.out and ELF binary formats are supported. Most programs should work, including the ones that use the Linu... |
compat_osf1(8) -- setup for running OSF/1 binaries under emulation
|
OpenBSD supports running OSF/1 (a.k.a Digital UNIX, a.k.a. Tru64) binaries on alpha systems. Most programs should work, including the ones that use the shared object libraries. Programs that make dire... |
compat_sunos(8) -- setup for running SunOS binaries under emulation
|
OpenBSD/sparc and some of the OpenBSD/m68k architectures can run SunOS executables. Most executables will work. The SunOS compatibility feature is active for kernels compiled with the COMPAT_SUNOS opt... |
compat_svr4(8) -- setup for running SVR4/iBCS2 binaries under emulation
|
OpenBSD supports running SVR4/iBCS2 binaries. This code has been tested on i386 and sparc systems. Most programs should work, but not ones that use or depend on: kernel internal data structures the /p... |
compat_ultrix(8) -- setup for running Ultrix binaries under emulation
|
OpenBSD/mips and OpenBSD/vax architectures can run RISC ULTRIX and Vax ULTRIX executables, respectively. However, the user is responsible for the legal issues of ensuring that they have a right to use... |
comsat(8) -- biff server
|
comsat is the server process which receives reports of incoming mail and notifies users if they have requested this service. comsat receives messages on a datagram port associated with the ``biff'' ... |
config(8) -- build kernel compilation directories or modify a kernel
|
In the first synopsis form, the config program creates a kernel build directory from the kernel configuration file specified by config-file. In the second synopsis form, config allows editing of the k... |
crash(8) -- system failure and diagnosis
|
This section explains what happens when the system crashes and (very briefly) how to analyze crash dumps. When the system crashes voluntarily it prints a message of the form panic: why i gave up the g... |
cron(8) -- clock daemon
|
The cron daemon schedules commands to be run at specified dates and times. Commands that are to be run periodically are specified within crontab(5) files. Commands that are only to be run once are sch... |
cryptoadm(8) -- manage the ActivCard, CRYPTOCard and
|
The tokenadm utility displays and edits user entries in the various token databases. It may also be invoked as one the following: activadm, cryptoadm, or snkadm. The options are as follows: -1 Display... |
cryptoinit(8) -- modify or add user in ActivCard, CRYPTOCard,
|
The tokeninit utility may also be invoked by one of the following names: activinit, cryptoinit, or snkinit. Depending on the name it was invoked as, it will initialize the system information to allow ... |
cvsbug(8) -- send problem report (PR) about CVS to a central support site
|
cvsbug is a tool used to submit problem reports (PRs) to a central support site. In most cases the correct site will be the default. This argument indicates the support site which is responsible for t... |
daily(8) -- periodic system maintenance
|
The three files /etc/daily, /etc/weekly, and /etc/monthly are shell scripts run on a periodic basis by the clock daemon, cron(8). They take care of some basic administrative tasks. The results are mai... |
dev_mkdb(8) -- create /dev database
|
The dev_mkdb command creates a db(3) hash access method database in ``/var/run/dev.db'' which contains the names of all of the character and block special files in the ``/dev'' directory, using th... |
dhclient(8) -- Dynamic Host Configuration Protocol (DHCP) Client
|
The dhclient utility provides a means for configuring network interfaces using DHCP, BOOTP, or if these protocols fail, by statically assigning an address. The name of the network interface that dhcli... |
dhclient-script(8) -- DHCP client network configuration script
|
The DHCP client network configuration script is invoked from time to time by dhclient(8). This script is used by the DHCP client to set each interface's initial configuration prior to requesting an a... |
dhcp(8) -- configuring OpenBSD for DHCP
|
The Dynamic Host Configuration Protocol (DHCP) allows hosts on a TCP/IP network to configure one or more network interfaces based on information collected from a DHCP server in response to a DHCP requ... |
dhcpd(8) -- Dynamic Host Configuration Protocol Server
|
The Internet Software Consortium DHCP Server, dhcpd, implements the Dynamic Host Configuration Protocol (DHCP) and the Internet Bootstrap Protocol (BOOTP). DHCP allows hosts on a TCP/IP network to req... |
dhcrelay(8) -- Dynamic Host Configuration Protocol Relay Agent
|
The dhcrelay utility provides a means for relaying DHCP and BOOTP requests from a subnet to which no DHCP server is directly connected to one or more DHCP servers on other subnets. dhcrelay listens fo... |
disklabel(8) -- read and write disk pack label
|
The disklabel utility can be used to install, examine, or modify the label on a disk drive or pack. The disk label contains information about disk characteristics (size, type, etc.) and the partition ... |
diskless(8) -- booting a system over the network
|
The ability to boot a machine over the network is useful for diskless or dataless machines, or as a temporary measure while repairing or re-installing filesystems on a local disk. This file provides a... |
dmesg(8) -- display the system message buffer
|
dmesg displays the contents of the system message buffer. It is most commonly used to review system startup messages. The options are as follows: -M core Extract values associated with the name list f... |
dump(8) -- filesystem backup
|
dump examines files on a filesystem and determines which files need to be backed up. These files are copied to the given disk, tape or other storage medium for safe keeping (see the -f option below fo... |
dumpfs(8) -- dump file system information
|
dumpfs prints out the super block and cylinder group information for the file system or special device specified. The listing is very long and detailed. dumpfs is useful mostly for finding out certain... |
editmap(8) -- query and edit records in database maps for sendmail
|
editmap queries or edits one record in database maps used by the keyed map lookups in sendmail(8). Arguments are passed on the command line and output (for queries) is directed to standard output. Dep... |
edquota(8) -- edit user quotas
|
edquota is a quota editor. By default, or if the -u flag is specified, one or more users may be specified on the command line. If a numeric ID is given instead of a name, that UID/GID will be used eve... |
sparc/eeprom(8) -- display or modify contents of the EEPROM or OpenPROM
|
eeprom provides an interface for displaying and changing the contents of the EEPROM or OpenPROM. Without any arguments, eeprom will list all of the known fields and their corresponding values. When gi... |
sparc64/eeprom(8) -- display or modify contents of the EEPROM or OpenPROM
|
eeprom provides an interface for displaying and changing the contents of the EEPROM or OpenPROM. Without any arguments, eeprom will list all of the known fields and their corresponding values. When gi... |
extattrctl(8) -- manage FFS extended attributes
|
extattrctl is the management utility for extended attributes over the FFS file system. extattrctl allows the starting and stopping of extended attributes on a file system, as well as initialization of... |
faithd(8) -- FAITH IPv6/v4 translator daemon
|
faithd provides an IPv6-to-IPv4 TCP relay. faithd must be used on an IPv4/v6 dual stack router. When faithd receives TCPv6 traffic, faithd will relay the TCPv6 traffic to TCPv4. The destination for th... |
faq(8) -- things to check after the first complete boot
|
Starting Out This document attempts to list items for the system administrator to check and set up after the installation and first complete boot of the system. The idea is to create a list of items t... |
macppc/fdisk(8) -- DOS partition maintenance program
|
In order for the BIOS to boot the kernel, certain conventions must be adhered to. Sector 0 of a bootable hard disk must contain boot code, an MBR partition table, and a magic number (0xAA55). These MB... |
alpha/fdisk(8) -- DOS partition maintenance program
|
In order for the BIOS to boot the kernel, certain conventions must be adhered to. Sector 0 of a bootable hard disk must contain boot code, an MBR partition table, and a magic number (0xAA55). These MB... |
cats/fdisk(8) -- DOS partition maintenance program
|
In order for the BIOS to boot the kernel, certain conventions must be adhered to. Sector 0 of a bootable hard disk must contain boot code, an MBR partition table, and a magic number (0xAA55). These MB... |
i386/fdisk(8) -- DOS partition maintenance program
|
In order for the BIOS to boot the kernel, certain conventions must be adhered to. Sector 0 of a bootable hard disk must contain boot code, an MBR partition table, and a magic number (0xAA55). These MB... |
amd64/fdisk(8) -- DOS partition maintenance program
|
In order for the BIOS to boot the kernel, certain conventions must be adhered to. Sector 0 of a bootable hard disk must contain boot code, an MBR partition table, and a magic number (0xAA55). These MB... |
fingerd(8) -- remote user information server
|
fingerd is a simple protocol based on RFC 1288 that provides an interface to the Name and Finger programs at several network sites. The program is supposed to return a friendly, human-oriented status ... |
vax/format(8) -- how to format disk packs
|
There are two ways to format disk packs. The simplest is to use the format program. The alternative is to use the DEC standard formatting software which operates under the DEC diagnostic supervisor. T... |
fsck(8) -- filesystem consistency check and interactive repair
|
The fsck command invokes filesystem-specific programs to check the special devices listed in the fstab(5) file or on the command line for consistency. The options are as follows: -d Debugging mode. Ju... |
fsck_ext2fs(8) -- Second Extended File System consistency check and interactive repair
|
fsck_ext2fs performs interactive filesystem consistency checks and repair for each of the filesystems specified on the command line. It is normally invoked from fsck(8). The kernel takes care that onl... |
fsck_ffs(8) -- Fast File System consistency check and interactive repair
|
The first form of fsck_ffs preens a standard set of filesystems or the specified filesystems. It is normally used in the script /etc/rc during automatic reboot. Here fsck_ffs reads the table /etc/fsta... |
fsck_msdos(8) -- DOS/Windows (FAT) filesystem consistency checker
|
The fsck_msdos utility verifies and repairs FAT filesystems (more commonly known as DOS filesystems). The first form of fsck_msdos preens the specified filesystems. It is normally started by fsck(8) r... |
fsdb(8) -- FFS debugging/editing tool
|
fsdb opens fsname (usually a raw disk partition) and runs a command loop allowing manipulation of the file system's inode data. You are prompted to enter a command with fsdb (inum X)> where X is the ... |
fsirand(8) -- randomize inode generation numbers
|
The fsirand command installs random generation numbers on all the inodes for each filesystem specified on the command line by special. This increases the security of NFS-exported filesystems by making... |
ftp-proxy(8) -- Internet File Transfer Protocol proxy server
|
ftp-proxy is a proxy for the Internet File Transfer Protocol. The proxy uses pf(4) and expects to have the FTP control connection as described in services(5) redirected to it via a pf(4) rdr command. ... |
ftpd(8) -- Internet File Transfer Protocol server
|
ftpd is the Internet File Transfer Protocol server process. The server uses the TCP protocol and listens at the port specified in the ``ftp'' service specification; see services(5). The options are ... |
genassym.sh(8) -- emit an assym.h file
|
genassym.sh is a shell script normally used during the kernel build process to create an assym.h file. This file defines a number of cpp constants derived from the configuration information genassym.s... |
getencstat(8) -- get SCSI Environmental Services Device enclosure status
|
getencstat gets summary and detailed SCSI Environmental Services (or SAFTE) device enclosure status. The overall status is printed out. If the overall status is considered okay, nothing else is printe... |
getextattr(8) -- retrieve a named extended attribute
|
getextattr is a user tool to retrieve a named extended attribute on a file or directory. The attrnamespace argument should be the namespace of the attribute to retrieve: legal values are "user" and ... |
getNAME(8) -- get NAME sections from manual source for whatis/apropos data base
|
The getNAME program looks inside manual sources to retrieve the NAME section of the manual page. It can be used to create a table of contents, report the style of manual, or to create an introduction ... |
getty(8) -- set terminal mode
|
The getty program is called by init(8) to open and initialize the tty line, read a login name, and invoke login(1). The argument tty is the special device file in /dev to open for the terminal (for ex... |
i386/gpioctl(8) -- control GPIO devices
|
The gpioctl program allows manipulation of GPIO (General Purpose Input/Output) device pins. Such devices can be either part of the chipset or embedded CPU, or a separate chip. The usual way of using G... |
group(8) -- manage group information on the system
|
The group utility acts as a frontend to the groupadd(8), groupmod(8), groupinfo(8), and groupdel(8) commands. For a full explanation of the options, please see the relevant manual page. The group util... |
groupadd(8) -- add a group to the system
|
The groupadd utility adds a group to the system. The options are as follows: -g gid gives the numeric group identifier to be used for the new group. -o allow the new group to have a GID which is alrea... |
groupdel(8) -- remove a group from the system
|
The groupdel utility removes a group from the system. The options are as follows: -v enables verbose mode - explain the commands as they are executed. The groupdel utility exits 0 on success, and >0 i... |
groupinfo(8) -- displays group information
|
The groupinfo utility retrieves the group information from the system. The following command line options are recognised: -e return 0 if the group exists, and non-zero if the group does not exist, on ... |
groupmod(8) -- modify an existing group on the system
|
The groupmod utility modifies an existing group. The options are as follows: -g gid gives the numeric group identifier to be used for the new group. -n newname gives the new name which the group shall... |
growfs(8) -- grow size of an existing ffs file system
|
The growfs utility extends the newfs(8) program. Before starting growfs, the partition must be set to a larger size using disklabel(8). The growfs utility extends the size of the file system on the sp... |
halt(8) -- stopping and restarting the system
|
The halt and reboot utilities flush the file system cache to disk, run the system shutdown script, send all running processes a SIGTERM (and subsequently a SIGKILL), and, respectively, halt or restart... |
hp300/hilinfo(8) -- provides information on HIL devices
|
hilinfo prints information about the device list. The options are as follows: -a For each device, display the type and the complete hil information bitstring. -t For each device, display the type. If ... |
macppc/hotplugd(8) -- devices hot plugging monitor daemon
|
The hotplugd daemon monitors the hotplug(4) pseudo-device, acting on signaled events by executing the scripts in the /etc/hotplug directory. By default it uses the /dev/hotplug device for reading even... |
alpha/hotplugd(8) -- devices hot plugging monitor daemon
|
The hotplugd daemon monitors the hotplug(4) pseudo-device, acting on signaled events by executing the scripts in the /etc/hotplug directory. By default it uses the /dev/hotplug device for reading even... |
i386/hotplugd(8) -- devices hot plugging monitor daemon
|
The hotplugd daemon monitors the hotplug(4) pseudo-device, acting on signaled events by executing the scripts in the /etc/hotplug directory. By default it uses the /dev/hotplug device for reading even... |
amd64/hotplugd(8) -- devices hot plugging monitor daemon
|
The hotplugd daemon monitors the hotplug(4) pseudo-device, acting on signaled events by executing the scripts in the /etc/hotplug directory. By default it uses the /dev/hotplug device for reading even... |
sparc64/hotplugd(8) -- devices hot plugging monitor daemon
|
The hotplugd daemon monitors the hotplug(4) pseudo-device, acting on signaled events by executing the scripts in the /etc/hotplug directory. By default it uses the /dev/hotplug device for reading even... |
hprop(8) -- propagate the KDC database
|
hprop takes a principal database in a specified format and converts it into a stream of Heimdal database records. This stream can either be written to standard out, or (more commonly) be propagated to... |
hpropd(8) -- receive a propagated database
|
hpropd receives a database sent by hprop. and writes it as a local database. By default, hpropd expects to be started from inetd if stdin is a socket and expects to receive the dumped database over st... |
httpd(8) -- Apache Hypertext Transfer Protocol Server
|
httpd is the Apache HyperText Transfer Protocol (HTTP) server program. It is designed to be run as a stand-alone daemon process. When used like this it will create a pool of child processes to handle ... |
identd(8) -- TCP/IP IDENT protocol server
|
identd is a server which implements the TCP/IP proposed standard IDENT user identification protocol as specified in the RFC 1413 document. identd operates by looking up specific TCP/IP connections and... |
ifconfig(8) -- configure network interface parameters
|
The ifconfig utility is used to assign an address to a network interface and/or configure network interface parameters. ifconfig must be used at boot-time to define the network address of each interfa... |
inetd(8) -- internet ``super-server''
|
inetd should be run at boot time by /etc/rc (see rc(8)). It then listens for connections on certain internet sockets. When a connection is found on one of its sockets, it decides what service the sock... |
init(8) -- process control initialization
|
The init program is the last stage of the boot process. It normally runs the automatic reboot sequence as described in reboot(8), and if this succeeds, begins multi-user operation. If the reboot scrip... |
alpha/installboot(8) -- install disk bootstrap software
|
The installboot utility prepares a disk for bootstrapping. The OpenBSD/alpha disk bootstrap software is split into two parts: a small first-stage boot program that is written into the disklabel area o... |
i386/installboot(8) -- installs a bootstrap on an FFS disk or partition
|
installboot is used to install a ``first-stage'' boot program into the boot area of an FFS disk partition. It inserts the block number and offset of the inode of the second-stage boot program boot(8... |
amd64/installboot(8) -- installs a bootstrap on an FFS disk or partition
|
installboot is used to install a ``first-stage'' boot program into the boot area of an FFS disk partition. It inserts the block number and offset of the inode of the second-stage boot program boot(8... |
sparc/installboot(8) -- install a bootstrap on an FFS filesystem partition
|
installboot prepares an FFS filesystem partition for bootstrapping from the PROM. The sparc bootblocks are split into two parts: a small firststage program that is written into the superblock area in ... |
sparc64/installboot(8) -- install a bootstrap on an FFS filesystem partition
|
installboot prepares an FFS filesystem partition for bootstrapping from the PROM. The sparc bootblocks are split into two parts: a small firststage program that is written into the superblock area in ... |
mvme68k/installboot(8) -- install a bootstrap on an FFS disk
|
installboot is used to install a "first-stage" boot program into the boot area of an FFS disk partition, and initialize the table of block numbers the bootxx program uses to load the second-stage bo... |
mvme88k/installboot(8) -- install a bootstrap on an FFS disk
|
installboot is used to install a "first-stage" boot program into the boot area of an FFS disk partition, and initialize the table of block numbers the bootxx program uses to load the second-stage bo... |
intro(8) -- introduction to system maintenance and operation commands
|
The manual pages in section 8 contain information related to system operation and maintenance. They describe commands used to create new file systems, newfs(8); verify the integrity of the file system... |
iopctl(8) -- a program to control IOP devices
|
The iopctl command can be used to interrogate and control I2O devices. The following options are available: -f ctldev Specify the control device to use. The default is /dev/iop0. The following command... |
iostat(8) -- report I/O statistics
|
iostat displays kernel I/O statistics on terminal, disk and CPU operations. By default, iostat displays one line of statistics averaged over the machine's run time. The use of -c presents successive ... |
ipsecadm(8) -- interface to set up IPsec
|
The ipsecadm utility sets up security associations in the kernel to be used with ipsec(4). It can be used to specify the encryption and authentication algorithms and key material for the network layer... |
isakmpd(8) -- ISAKMP/Oakley a.k.a. IKE key management daemon
|
The isakmpd daemon establishes security associations for encrypted and/or authenticated network traffic. At this moment, and probably forever, this means ipsec(4) traffic. The way isakmpd goes about i... |
kadmin(8) -- Kerberos administration utility
|
The kadmin program is used to make modifications to the Kerberos database, either remotely via the kadmind(8) daemon, or locally (with the -l option). Supported options: -p string, --principal=string ... |
kadmind(8) -- server for administrative access to Kerberos database
|
kadmind listens for requests for changes to the Kerberos database and performs these, subject to permissions. When starting, if stdin is a socket it assumes that it has been started by inetd(8), other... |
macppc/kbd(8) -- set national keyboard translation
|
kbd is used to change the keyboard encoding. The execution of kbd normally occurs in the system multi-user initialization file /etc/rc to set a national keyboard layout. If called as kbd -l, all avail... |
sgi/kbd(8) -- set national keyboard translation
|
kbd is used to change the keyboard encoding. The execution of kbd normally occurs in the system multi-user initialization file /etc/rc to set a national keyboard layout. If called as kbd -l, all avail... |
alpha/kbd(8) -- set national keyboard translation
|
kbd is used to change the keyboard encoding. The execution of kbd normally occurs in the system multi-user initialization file /etc/rc to set a national keyboard layout. If called as kbd -l, all avail... |
vax/kbd(8) -- set national keyboard translation
|
kbd is used to change the keyboard encoding. The execution of kbd normally occurs in the system multi-user initialization file /etc/rc to set a national keyboard layout. If called as kbd -l, all avail... |
cats/kbd(8) -- set national keyboard translation
|
kbd is used to change the keyboard encoding. The execution of kbd normally occurs in the system multi-user initialization file /etc/rc to set a national keyboard layout. If called as kbd -l, all avail... |
i386/kbd(8) -- set national keyboard translation
|
kbd is used to change the keyboard encoding. The execution of kbd normally occurs in the system multi-user initialization file /etc/rc to set a national keyboard layout. If called as kbd -l, all avail... |
amd64/kbd(8) -- set national keyboard translation
|
kbd is used to change the keyboard encoding. The execution of kbd normally occurs in the system multi-user initialization file /etc/rc to set a national keyboard layout. If called as kbd -l, all avail... |
hppa/kbd(8) -- set national keyboard translation
|
kbd is used to change the keyboard encoding. The execution of kbd normally occurs in the system multi-user initialization file /etc/rc to set a national keyboard layout. If called as kbd -l, all avail... |
sparc/kbd(8) -- set national keyboard translation
|
kbd is used to change the keyboard encoding. The execution of kbd normally occurs in the system multi-user initialization file /etc/rc to set a national keyboard layout. If called as kbd -l, all avail... |
sparc64/kbd(8) -- set national keyboard translation
|
kbd is used to change the keyboard encoding. The execution of kbd normally occurs in the system multi-user initialization file /etc/rc to set a national keyboard layout. If called as kbd -l, all avail... |
kdc(8) -- Kerberos 5 server
|
kdc serves requests for tickets. When it starts, it first checks the flags passed, any options that are not specified with a command line flag are taken from a config file, or from a default compiled-... |
kgmon(8) -- generate a dump of the operating system's profile buffers
|
kgmon is a tool used when profiling the operating system. When no arguments are supplied, kgmon indicates the state of operating system profiling as ``running'', ``off'', or ``not configured'' (... |
kpasswdd(8) -- Kerberos 5 password changing server
|
kpasswdd serves request for password changes. It listens on UDP port 464 (service kpasswd) and processes requests when they arrive. It changes the database directly and should thus only run on the mas... |
ktutil(8) -- manage Kerberos keytabs
|
ktutil is a program for managing keytabs. Supported options: -v, --verbose Verbose output. command can be one of the following: add [-p principal] [--principal=principal] [-V kvno] [--kvno=kvno] [-e e... |
kvm_mkdb(8) -- create kernel database
|
kvm_mkdb creates a database in /var/db containing information about the specified file. If no file is specified, /bsd is used by default. The file is named kvm_filename.db, where filename is the name ... |
ldconfig(8) -- configure the shared library cache
|
ldconfig is used to prepare a set of ``hints'' for use by the run-time linker ld.so(1) to facilitate quick lookup of shared libraries available in multiple directories. It scans a set of built-in sy... |
lmccontrol(8) -- configure Lan Media Corporation SSI/HSSI/T1/T3 devices
|
The lmccontrol command controls the operation of the Lan Media devices via the lmc(4) driver. Most of the parameters that can be changed relate to the line characteristics or layer 2 protocol options.... |
locate.updatedb(8) -- update locate database
|
locate.updatedb updates the database used by locate(1). It is typically run once a week by the /etc/weekly script. The contents of the newly built database can be controlled by the /etc/locate.rc file... |
login_activ(8) -- provide ActivCard, CRYPTOCard and SNK-004 authentication
|
The login_token program implements an X9.9 token card challenge response authentication mechanism (see login.conf(5)). It must be invoked by one of the names: login_activ, login_crypto, or login_snk. ... |
login_chpass(8) -- change password authentication type
|
The login_chpass utility is typically called from login(1). It is functionally the same as calling the program: ``passwd user''. This will use the login_lchpass(8) utility to change the user's loca... |
login_crypto(8) -- provide ActivCard, CRYPTOCard and SNK-004 authentication
|
The login_token program implements an X9.9 token card challenge response authentication mechanism (see login.conf(5)). It must be invoked by one of the names: login_activ, login_crypto, or login_snk. ... |
login_krb5(8) -- provide KerberosV authentication type
|
The login_krb5 utility implements the KerberosV authentication mechanism. It is called by login(1), su(1), ftpd(8), and others to authenticate the user with KerberosV. The user argument is the user's... |
login_krb5-or-pwd(8) -- provide KerberosV or password authentication type
|
The login_krb5-or-pwd program first attempts to authenticate the user via KerberosV and, failing that, falls back to standard password authentication. If KerberosV is not configured on the system, log... |
login_lchpass(8) -- change local password authentication type
|
The login_lchpass utility is typically called from login(1). It is functionally the same as calling the program: ``passwd -l user''. Only the login service is supported. See login.conf(5). The class... |
login_passwd(8) -- provide standard password authentication type
|
The login_passwd utility is called by login(1), su(1), ftpd(8), and others to authenticate the user with passwd-style authentication. The user argument is the login name of the user to be authenticate... |
login_radius(8) -- contact radiusd for authentication
|
The login_radius utility contacts the radiusd daemon to authenticate a user. If no class is specified, the login class will be obtained from the password database. When executed as the name login_styl... |
login_reject(8) -- provide rejected authentication
|
The login_reject utility provides the rejection authentication class. The user name, while required, is ignored. The class name, which is optional, is also ignored. The reject authentication mechanism... |
login_skey(8) -- provide S/Key authentication type
|
The login_skey utility is called by login(1), su(1), ftpd(8), and others to authenticate the user with S/Key authentication. The service argument specifies which protocol to use with the invoking prog... |
login_snk(8) -- provide ActivCard, CRYPTOCard and SNK-004 authentication
|
The login_token program implements an X9.9 token card challenge response authentication mechanism (see login.conf(5)). It must be invoked by one of the names: login_activ, login_crypto, or login_snk. ... |
login_token(8) -- provide ActivCard, CRYPTOCard and SNK-004 authentication
|
The login_token program implements an X9.9 token card challenge response authentication mechanism (see login.conf(5)). It must be invoked by one of the names: login_activ, login_crypto, or login_snk. ... |
logresolve(8) -- resolve hostnames for IP-adresses in Apache logfiles
|
logresolve is a post-processing program to resolve IPadresses in Apache's access logfiles. To minimize impact on your nameserver, logresolve has its very own internal hash-table cache. This means tha... |
lpc(8) -- line printer control program
|
lpc is used by the system administrator to control the operation of the line printer system. For each line printer configured in /etc/printcap, lpc may be used to: +o disable or enable a printer, +o d... |
lpd(8) -- line printer spooler daemon
|
lpd is the line printer daemon (spool area handler) and is normally invoked at boot time from the rc(8) file. It makes a single pass through the printcap(5) file to find out about the existing printer... |
mail.local(8) -- store mail in a mailbox
|
mail.local reads the standard input up to an end-of-file and appends it to each user's mail file. The user must be a valid user name. The options are as follows: -f from Specify the sender's name. -... |
mailq(8) -- print the mail queue
|
mailq prints a summary of the mail messages queued for future delivery. It may only be run by the superuser. The first line printed for each message shows the internal identifier used on this host for... |
mailstats(8) -- display mail statistics
|
The mailstats utility displays the current mail statistics. First, the time at which statistics started being kept is displayed, in the format specified by ctime(3). Then, the statistics for each mail... |
mailwrapper(8) -- invoke appropriate MTA software based on configuration file
|
At one time, the only Mail Transfer Agent (MTA) software easily available was sendmail(8). As a result of this, most Mail User Agents (MUAs) such as mail(1) had the path and calling conventions expect... |
makedbm(8) -- create a YP database
|
makedbm is the utility in YP that creates the database file containing the YP map. The database format is a slightly modified version of ndbm. The options are as follows: -u Dump a database to standar... |
hp300/MAKEDEV(8) -- create system and device special files
|
The shell script MAKEDEV, found in the /dev directory, is used to create various special files. See intro(4) for a more complete discussion of special files. MAKEDEV takes any number of device names a... |
macppc/MAKEDEV(8) -- create system and device special files
|
The shell script MAKEDEV, found in the /dev directory, is used to create various special files. See intro(4) for a more complete discussion of special files. MAKEDEV takes any number of device names a... |
sgi/MAKEDEV(8) -- create system and device special files
|
The shell script MAKEDEV, found in the /dev directory, is used to create various special files. See intro(4) for a more complete discussion of special files. MAKEDEV takes any number of device names a... |
alpha/MAKEDEV(8) -- create system and device special files
|
The shell script MAKEDEV, found in the /dev directory, is used to create various special files. See intro(4) for a more complete discussion of special files. MAKEDEV takes any number of device names a... |
vax/MAKEDEV(8) -- create system and device special files
|
The shell script MAKEDEV, found in the /dev directory, is used to create various special files. See intro(4) for a more complete discussion of special files. MAKEDEV takes any number of device names a... |
cats/MAKEDEV(8) -- create system and device special files
|
The shell script MAKEDEV, found in the /dev directory, is used to create various special files. See intro(4) for a more complete discussion of special files. MAKEDEV takes any number of device names a... |
i386/MAKEDEV(8) -- create system and device special files
|
The shell script MAKEDEV, found in the /dev directory, is used to create various special files. See intro(4) for a more complete discussion of special files. MAKEDEV takes any number of device names a... |
amd64/MAKEDEV(8) -- create system and device special files
|
The shell script MAKEDEV, found in the /dev directory, is used to create various special files. See intro(4) for a more complete discussion of special files. MAKEDEV takes any number of device names a... |
mac68k/MAKEDEV(8) -- create system and device special files
|
The shell script MAKEDEV, found in the /dev directory, is used to create various special files. See intro(4) for a more complete discussion of special files. MAKEDEV takes any number of device names a... |
hppa/MAKEDEV(8) -- create system and device special files
|
The shell script MAKEDEV, found in the /dev directory, is used to create various special files. See intro(4) for a more complete discussion of special files. MAKEDEV takes any number of device names a... |
sparc/MAKEDEV(8) -- create system and device special files
|
The shell script MAKEDEV, found in the /dev directory, is used to create various special files. See intro(4) for a more complete discussion of special files. MAKEDEV takes any number of device names a... |
sparc64/MAKEDEV(8) -- create system and device special files
|
The shell script MAKEDEV, found in the /dev directory, is used to create various special files. See intro(4) for a more complete discussion of special files. MAKEDEV takes any number of device names a... |
mvme68k/MAKEDEV(8) -- create system and device special files
|
The shell script MAKEDEV, found in the /dev directory, is used to create various special files. See intro(4) for a more complete discussion of special files. MAKEDEV takes any number of device names a... |
mvme88k/MAKEDEV(8) -- create system and device special files
|
The shell script MAKEDEV, found in the /dev directory, is used to create various special files. See intro(4) for a more complete discussion of special files. MAKEDEV takes any number of device names a... |
luna88k/MAKEDEV(8) -- create system and device special files
|
The shell script MAKEDEV, found in the /dev directory, is used to create various special files. See intro(4) for a more complete discussion of special files. MAKEDEV takes any number of device names a... |
makekey(8) -- encrypt passwords from the command line or standard input
|
encrypt prints the encrypted form of string to the standard output. This is mostly useful for encrypting passwords from within scripts. The options are as follows: -k Run in makekey compatible mode; a... |
makemap(8) -- create database maps for sendmail
|
makemap creates the database maps used by the keyed map lookups in sendmail(8). It reads input from the standard input and outputs them to the indicated mapname. Depending on how it is compiled, makem... |
makewhatis(8) -- create a whatis.db database
|
makewhatis strips the NAME lines from compiled or raw man(1) pages and creates a whatis.db database (that is, a subject index) for use with apropos(1), whatis(1), and man(1)'s -k option. If manpath i... |
map-mbone(8) -- Multicast connection mapper
|
map-mbone attempts to display all multicast routers that are reachable from the multicast router starting_router. If not specified on the command line, starting_router is ``localhost''. map-mbone se... |
i386/memconfig(8) -- control system cache behaviour with respect to memory
|
A number of supported system architectures allow the behaviour of the CPU cache to be programmed to behave differently depending on the region being written. memconfig provides an interface to this fa... |
mfs(8) -- construct a new file system
|
Before running newfs or mount_mfs, the disk must be labeled using disklabel(8). newfs builds a file system on the specified special device, basing its defaults on the information in the disk label. Ty... |
mkalias(8) -- a YP map conversion program
|
mkalias is used to convert a mail.aliases map to a mail.byaddr map. This is an inverse map of user@host (or user!host) back to alias. The options are as follows: -v Verbose mode. -e Check host to veri... |
hppa/mkboot(8) -- create LIF files
|
Creates the LIF file containing the bootstrap program and possibly other programs to be used by the HP 9000/700 and HP 9000/800 systems. An argument to the -l option specifies the load point for the b... |
mkhybrid(8) -- create an hybrid ISO9660/JOLIET/HFS filesystem with optional Rock Ridge attributes.
|
mkhybrid is effectively a pre-mastering program to generate an HFS/ISO9660/JOLIET hybrid filesystem. It is based on mkisofs(1) and will generate a pure ISO9660 filesystem unless the HFS hybrid command... |
mknetid(8) -- a YP filter program
|
mknetid is used to create a map named netid.byname. The map consists of information from passwd(5), group(5) and hosts(5), concatenated with a netid(5) file, if one exists. The options are as follows:... |
mknod(8) -- build special file
|
The mknod command creates device special files. Normally the shell script /dev/MAKEDEV is used to create special files for commonly known devices; it executes mknod with the appropriate arguments and ... |
modload(8) -- load a kernel module
|
The modload utility loads a loadable kernel module into a running system. The input file is an object file (.o file). The options to modload are as follows: -d Debug. Used to debug modload itself. -n ... |
modstat(8) -- display status of loaded kernel modules
|
The modstat utility displays the status of any loadable kernel modules present in the kernel. The options are as follows: -i id Display the status of only the module with this ID. -n name Display the ... |
modunload(8) -- unload a kernel module
|
The modunload utility unloads a loadable kernel module from a running system. The id or name is the ID or name of the module as shown by modstat(8). One of the following options must be specified: -i ... |
monthly(8) -- periodic system maintenance
|
The three files /etc/daily, /etc/weekly, and /etc/monthly are shell scripts run on a periodic basis by the clock daemon, cron(8). They take care of some basic administrative tasks. The results are mai... |
mopd(8) -- MOP loader daemon
|
mopd services MOP Load requests on the Ethernet connected to interface or all interfaces if -a is given. In a load request received by mopd a filename can be given. This is the normal case for, e.g., ... |
mount(8) -- mount file systems
|
The mount command invokes a file system specific program to prepare and graft the special device or remote node (rhost:path) on to the file system tree at the point node. If either special or node are... |
mountd(8) -- service remote NFS mount requests
|
mountd is the server for NFS mount requests from other client machines. mountd listens for service requests at the port indicated in the NFS server specification; see Network File System Protocol Spec... |
mount_ados(8) -- mount an AmigaDOS file system
|
The mount_ados command attaches the AmigaDOS filesystem residing on the device special to the global filesystem namespace at the location indicated by node. This command is invoked by mount(8) when us... |
mount_cd9660(8) -- mount an ISO-9660 filesystem
|
The mount_cd9660 command attaches the ISO-9660 filesystem residing on the device special to the global filesystem namespace at the location indicated by node. This command is invoked by mount(8) when ... |
mount_ext2fs(8) -- mount an ext2fs file system
|
The mount_ext2fs command attaches an ext2fs file system special device on to the file system tree at the point node. This command is invoked by mount(8) when using the syntax mount [options] -t ext2fs... |
mount_fdesc(8) -- mount the file-descriptor file system
|
The mount_fdesc command attaches an instance of the per-process file descriptor namespace to the global filesystem namespace. The conventional mount point is /dev and the filesystem should be union mo... |
mount_ffs(8) -- mount a Berkeley Fast File System
|
The mount_ffs command attaches the Berkeley Fast File System on the special device on to the file system tree at point node. This command is invoked by mount(8) when using any of the following syntax:... |
mount_kernfs(8) -- mount the /kern file system
|
The mount_kernfs command attaches an instance of the kernel parameter namespace to the global filesystem namespace. The conventional mount point is /kern. This command is invoked by mount(8) when usin... |
mount_mfs(8) -- construct a new file system
|
Before running newfs or mount_mfs, the disk must be labeled using disklabel(8). newfs builds a file system on the specified special device, basing its defaults on the information in the disk label. Ty... |
mount_msdos(8) -- mount an MS-DOS file system
|
The mount_msdos command attaches the MS-DOS filesystem residing on the device special to the global filesystem namespace at the location indicated by node. This command is invoked by mount(8) when usi... |
mount_nfs(8) -- mount NFS file systems
|
The mount_nfs command calls the mount(2) system call to prepare and graft a remote NFS file system (rhost:path) on to the file system tree at the point node. This command is normally executed by mount... |
mount_ntfs(8) -- mount an NTFS file system
|
The mount_ntfs command attaches the NTFS filesystem residing on the device special to the global filesystem namespace at the location indicated by node. This command is normally executed by mount(8) a... |
mount_null(8) -- demonstrate the use of a null file system layer
|
The mount_null command creates a null layer, duplicating a sub-tree of the file system namespace under another part of the global file system namespace. It is implemented using a stackable layers tech... |
mount_portal(8) -- mount the portal daemon
|
The mount_portal command attaches an instance of the portal daemon to the global filesystem namespace. The conventional mount point is /p. This command is normally executed by mount(8) at boot time. T... |
mount_procfs(8) -- mount the process file system
|
The mount_procfs command attaches an instance of the process namespace to the global filesystem namespace. The conventional mount point is /proc. This command is normally executed by mount(8) at boot ... |
mount_umap(8) -- sample file system layer
|
The mount_umap command is used to mount a subtree of an existing file system that uses a different set of UIDs and GIDs than the local system. Such a file system could be mounted from a remote site vi... |
mount_union(8) -- mount union filesystems
|
The mount_union command attaches directory above uniondir in such a way that the contents of both directory trees remain visible. By default, directory becomes the upper layer and uniondir becomes the... |
mount_xfs(8) -- mount the xfs filesystem
|
The mount_xfs command mounts one of the xfs character devices. The character device is used for communication with a user-land cachemanager and fileprovider. The options are as follows: -o options Opt... |
mrinfo(8) -- displays configuration info from a multicast router
|
mrinfo attempts to display the configuration information from the specified multicast_router. mrinfo uses the ASK_NEIGHBORS IGMP message to the specified multicast router. If it router responds, the v... |
mrouted(8) -- IP multicast routing daemon
|
mrouted is an implementation of the Distance-Vector Multicast Routing Protocol (DVMRP), an earlier version of which is specified in RFC 1075. It maintains topological knowledge via a distance-vector r... |
mtrace(8) -- print multicast path from a source to a receiver
|
Assessing problems in the distribution of IP multicast traffic can be difficult. mtrace utilizes a tracing feature implemented in multicast routers (mrouted version 3.3 and later) that is accessed via... |
mtree(8) -- map a directory hierarchy
|
The utility mtree compares the file hierarchy rooted in the current directory against a specification read from the standard input. Messages are written to the standard output for any files whose char... |
named(8) -- Internet domain name server
|
named is a Domain Name System (DNS) server, part of the BIND 9 distribution from ISC. For more information on the DNS, see RFCs 1033, 1034, and 1035. When invoked without arguments, named will fork in... |
named-checkconf(8) -- named configuration file syntax checking tool
|
named-checkconf checks the syntax, but not the semantics, of a named configuration file. |
named-checkzone(8) -- zone file validity checking tool
|
named-checkzone checks the syntax and integrity of a zone file. It performs the same checks as named does when loading a zone. This makes named-checkzone useful for checking zone files before configur... |
ncheck(8) -- generate names from inode-numbers
|
ncheck_ffs generates a list of filenames and inode numbers for the given file system. Names of directories are followed by a `.'. b The options aPe as follows: r -a Prini the file names `.' and `..... |
ncheck_ffs(8) -- generate names from inode-numbers
|
ncheck_ffs generates a list of filenames and inode numbers for the given file system. Names of directories are followed by a `.'. b The options aPe as follows: r -a Prini the file names `.' and `..... |
ndp(8) -- control/diagnose IPv6 neighbor discovery protocol
|
The ndp command manipulates the address mapping table used by the Neighbor Discovery Protocol (NDP). -a Dump the currently existing NDP entries. The following information will be printed: Neighbor IPv... |
netgroup_mkdb(8) -- generate the netgroup databases
|
netgroup_mkdb creates db(3) style databases for the specified file. If no file is specified, /etc/netgroup is used. These databases are then installed into /etc/netgroup.db. The file must be in the co... |
netstart(8) -- command scripts for network startup
|
netstart is the command script that is invoked by rc(8) during an automatic reboot and after single user mode is exited; it performs network initialization. The netstart script can also be used to sta... |
newaliases(8) -- rebuild the data base for the mail aliases file
|
Newaliases rebuilds the random access data base for the mail aliases file /etc/mail/aliases. It must be run each time this file is changed in order for the change to take effect. Newaliases is identic... |
newfs(8) -- construct a new file system
|
Before running newfs or mount_mfs, the disk must be labeled using disklabel(8). newfs builds a file system on the specified special device, basing its defaults on the information in the disk label. Ty... |
newfs_msdos(8) -- construct a new MS-DOS (FAT) file system
|
The newfs_msdos utility creates a FAT12, FAT16, or FAT32 file system on device special, using disktab(5) entry disktype to determine geometry, if required. The options are as follows: -N Don't create... |
newsyslog(8) -- trim log files to manageable sizes
|
newsyslog is a program that should be scheduled to run periodically by cron(8). When it is executed it archives log files if necessary. If a log file is determined to require archiving, newsyslog rear... |
nfsd(8) -- remote NFS server
|
nfsd runs on a server machine to service NFS requests from client machines. At least one nfsd must be running for a machine to operate as a server. Unless otherwise specified, four servers for UDP tra... |
nologin(8) -- politely refuse a login
|
nologin displays a message that an account is not available and exits non-zero. It is intended as a replacement shell field for accounts that have been disabled. If the file /etc/nologin.txt exists, n... |
nslookup(8) -- query Internet name servers interactively
|
Nslookup is a program to query Internet domain name servers. |
nsupdate(8) -- Dynamic DNS update utility
|
nsupdate is used to submit Dynamic DNS Update requests as defined in RFC2136 to a name server. This allows resource records to be added or removed from a zone without manually editing the zone file. A... |
ntalkd(8) -- remote user communication server
|
Talkd is the server that notifies a user that someone else wants to initiate a conversation. It acts as a repository of invitations, responding to requests by clients wishing to rendezvous to hold a c... |
ntpd(8) -- Network Time Protocol daemon
|
The ntpd daemon synchronizes the local clock to one or more remote NTP servers, and can also act as an NTP server itself, redistributing the local time. It implements the Simple Network Time Protocol ... |
pac(8) -- printer/plotter accounting information
|
pac reads the printer/plotter accounting files, accumulating the number of pages (the usual case) or feet (for raster devices) of paper consumed by each named user, and prints out how much each user c... |
macppc/pdisk(8) -- HFS(DPME) partition maintenance program
|
pdisk is a menu driven program which partitions disks using the standard Apple disk partitioning scheme described in "Inside Macintosh: Devices". It does not support the intel/dos partitioning schem... |
mac68k/pdisk(8) -- HFS(DPME) partition maintenance program
|
pdisk is a menu driven program which partitions disks using the standard Apple disk partitioning scheme described in "Inside Macintosh: Devices". It does not support the intel/dos partitioning schem... |
pfctl(8) -- control the packet filter (PF) and network address translation (NAT) device
|
The pfctl utility communicates with the packet filter device using the ioctl interface described in pf(4). It allows ruleset and parameter configuration and retrieval of status information from the pa... |
pflogd(8) -- packet filter logging daemon
|
pflogd is a background daemon which reads packets logged by pf(4) to the packet logging interface pflog0 and writes the packets to a logfile (normally /var/log/pflog) in tcpdump(8) binary format. Thes... |
ping(8) -- send ICMP ECHO_REQUEST packets to network hosts
|
ping uses the ICMP protocol's mandatory ECHO_REQUEST datagram to elicit an ICMP ECHO_REPLY from a host or gateway. ECHO_REQUEST datagrams (``pings'') have an IP and ICMP header, followed by a ``str... |
ping6(8) -- send ICMPv6 ECHO_REQUEST packets to network hosts
|
ping6 uses the ICMPv6 protocol's mandatory ICMP6_ECHO_REQUEST datagram to elicit an ICMP6_ECHO_REPLY from a host or gateway. ICMP6_ECHO_REQUEST datagrams (``pings'') have an IPv6 header, and ICMPv6... |
popa3d(8) -- Post Office Protocol (POP3) server
|
popa3d is a POP3 server. It offers network access to user mailboxes through the POP3 protocol. The server uses the TCP protocol and listens at the port specified in the ``pop3'' service specificatio... |
portmap(8) -- DARPA port to RPC program number mapper
|
portmap is a server that converts RPC program numbers into DARPA protocol port numbers. It must be running in order to make RPC calls. When an RPC server is started, it will tell portmap what port num... |
ppp(8) -- Point to Point Protocol (a.k.a. user-ppp)
|
This is a user process PPP software package. Normally, PPP is implemented as a part of the kernel (e.g., as managed by pppd(8)) and it's thus somewhat hard to debug and/or modify its behaviour. Howev... |
pppctl(8) -- PPP control program
|
This program provides command line control of the ppp(8) daemon. Its primary use is to facilitate simple scripts that control a running daemon. pppctl is passed at least one argument, specifying the s... |
pppd(8) -- Point-to-Point Protocol daemon
|
PPP is the protocol used for establishing internet links over dial-up modems, DSL connections, and many other types of point-topoint links. The pppd daemon works together with the kernel ppp(4) driver... |
pppoe(8) -- PPP Over Ethernet translator
|
The pppoe program can, with the help of ppp(8), act as a server or client for running PPP Over Ethernet. The options are as follows: -i interface Specify the interface that pppoe is to use, which shou... |
pppstats(8) -- report statistics for the specified PPP interface
|
The pppstats utility reports PPP-related statistics at regular intervals for the specified PPP interface. If the interface is unspecified, it will default to ppp0. The display is split horizontally in... |
pstat(8) -- display system data structures
|
pstat displays open file entry, swap space utilization, terminal state, and vnode data structure information. If corefile is given, the information is sought there, otherwise in the running kernel via... |
pwd_mkdb(8) -- generate the password databases
|
pwd_mkdb creates db(3) style secure and insecure databases for the specified file. These databases are then installed into /etc/spwd.db and /etc/pwd.db, respectively. The file argument is installed in... |
i386/pxeboot(8) -- i386-specific second-stage PXE bootstrap
|
pxeboot is a modified version of the i386 second-stage bootstrap program, boot(8), configured to run under Intel's Preboot Execution Environment (PXE). PXE is a form of smart boot ROM, built into man... |
amd64/pxeboot(8) -- amd64-specific second-stage PXE bootstrap
|
pxeboot is a modified version of the amd64 second-stage bootstrap program, boot(8), configured to run under Intel's Preboot Execution Environment (PXE). PXE is a form of smart boot ROM, built into ma... |
quot(8) -- display disk space occupied by each user
|
quot is used to gather statistics about the disk usage for each local user. The options are as follows: -a Include statistics for all mounted filesystems. -c Display three columns containing number of... |
quotacheck(8) -- filesystem quota consistency checker
|
quotacheck examines each filesystem, builds a table of current disk usage, and compares this table against that recorded in the disk quota file for the filesystem. If any inconsistencies are detected,... |
quotaoff(8) -- turn filesystem quotas on and off
|
quotaon announces to the system that disk quotas should be enabled on one or more filesystems. quotaoff announces to the system that the specified filesystems should have any disk quotas turned off. T... |
quotaon(8) -- turn filesystem quotas on and off
|
quotaon announces to the system that disk quotas should be enabled on one or more filesystems. quotaoff announces to the system that the specified filesystems should have any disk quotas turned off. T... |
raidctl(8) -- configuration utility for the RAIDframe disk driver
|
raidctl is the user-land control program for raid(4), the RAIDframe disk device. raidctl is primarily used to dynamically configure and unconfigure RAIDframe disk devices. For more information about t... |
rarpd(8) -- reverse ARP daemon
|
rarpd services Reverse ARP requests on the Ethernet connected to interface. Upon receiving a request, rarpd maps the target hardware address to an IP address via its name, which must be present in bot... |
rbootd(8) -- HP remote boot server
|
The rbootd utility services boot requests from HewlettPackard workstations over a local area network. All boot files must reside in the boot file directory; further, if a client supplies path informat... |
rc(8) -- command scripts for system startup
|
rc is the command script that is invoked by init(8) during an automatic reboot and after single user mode is exited; it performs system housekeeping chores and starts up system daemons. Additionally, ... |
rc.conf(8) -- system daemon configuration database
|
This file contains a series of Bourne-shell syntax assignments that are used to configure the system daemons. It is not read by the kernel, but is sourced by various other files in the /etc/rc.* serie... |
rc.conf.local(8) -- system daemon configuration database
|
This file contains a series of Bourne-shell syntax assignments that are used to configure the system daemons. It is not read by the kernel, but is sourced by various other files in the /etc/rc.* serie... |
rc.local(8) -- command scripts for system startup
|
rc is the command script that is invoked by init(8) during an automatic reboot and after single user mode is exited; it performs system housekeeping chores and starts up system daemons. Additionally, ... |
rc.securelevel(8) -- command scripts for system startup
|
rc is the command script that is invoked by init(8) during an automatic reboot and after single user mode is exited; it performs system housekeeping chores and starts up system daemons. Additionally, ... |
rc.shutdown(8) -- command script run at system shutdown
|
When the system is administratively shut down using either the reboot(8) or halt(8) command, either of these programs checks for the existence of a /etc/rc.shutdown script to run before halting the sy... |
rdate(8) -- set the system's date from a remote host
|
rdate displays and sets the local date and time from the host name or address given as the argument. The time source may be an RFC 868 TCP protocol server, which is usually implemented as a built-in s... |
rdconfig(8) -- configure RAM disks
|
The rdconfig command configures RAM disk devices. It will associate the special file special_file with a range of user-virtual memory allocated by the rdconfig process itself. The rdconfig command sho... |
rdump(8) -- filesystem backup
|
dump examines files on a filesystem and determines which files need to be backed up. These files are copied to the given disk, tape or other storage medium for safe keeping (see the -f option below fo... |
reboot(8) -- stopping and restarting the system
|
The halt and reboot utilities flush the file system cache to disk, run the system shutdown script, send all running processes a SIGTERM (and subsequently a SIGKILL), and, respectively, halt or restart... |
release(8) -- building an OpenBSD release
|
There are several steps necessary to build a system release. They are: 1. Update sources. 2. Build and install a new kernel. 3. Build a new system. 4. Make and validate the system release. 5. Build an... |
renice(8) -- alter priority of running processes
|
renice alters the scheduling priority (an integer) of one or more running processes. The following who parameters (pid, pgrp and user) are interpreted as process IDs, process group IDs, or user names.... |
repquota(8) -- summarize quotas for a file system
|
repquota prints a summary of the disk usage and quotas for the specified filesystem(s). The options are as follows: -a Print the quotas of all filesystems listed in /etc/fstab. -g Print only group quo... |
restore(8) -- restore files or file systems from backups made with dump
|
The restore command performs the inverse function of dump(8). A full backup of a file system may be restored and subsequent incremental backups layered on top of it. Single files and directory subtree... |
revnetgroup(8) -- generate reverse netgroup data
|
revnetgroup processes the contents of a file in netgroup(5) format into what is called reverse netgroup form. That is, where the original file shows netgroup memberships in terms of which members resi... |
rip6query(8) -- RIPng debugging tool
|
rip6query requests remote RIPng daemon on destination to dump RIPng routing information. -I lets you specify outgoing interface for the query packet, and is useful when link-local address is specified... |
rmail(8) -- handle remote mail received via uucp
|
The rmail utility interprets incoming mail received via uucp, collapsing ``From'' lines in the form generated by mail.local(8) into a single line of the form ``return-path!sender'', and passing th... |
rmgroup(8) -- delete a Unix group
|
rmgroup deletes the specified Unix group from group database. rmgroup will not delete the system groups wheel, daemon, kmem, sys, tty, operator, bin, nogroup, nobody, or groups with gid 0. Do not dele... |
rmt(8) -- remote magtape protocol module
|
rmt is a program used by the remote dump and restore programs in manipulating a magnetic tape drive through an interprocess communication connection. rmt is normally started up with an rcmd(3) or rcmd... |
rmuser(8) -- add and delete users from the system
|
The adduser program adds new users to the system. The rmuser program removes users from the system. When not passed any arguments, both utilities operate in interactive mode and prompt for any require... |
rndc(8) -- name server control utility
|
rndc controls the operation of a name server. It supersedes the ndc utility that was provided in old BIND releases. If rndc is invoked with no command line options or arguments, it prints a short summ... |
rndc-confgen(8) -- rndc key generation tool
|
rndc-confgen generates configuration files for rndc. It can be used as a convenient alternative to writing the rndc.conf file and the corresponding controls and key statements in named.conf by hand. A... |
rotatelogs(8) -- rotate Apache logs without having to kill the server
|
rotatelogs is a simple program for use in conjunction with Apache's piped logfile feature which can be used like this: TransferLog "| rotatelogs /path/to/logs/access_log 86400" This creates the fil... |
route(8) -- manually manipulate the routing tables
|
route is a utility used to manually view and manipulate the network routing tables. Except for setting up the default route, it normally is not needed to manipulate routes, as a system routing table m... |
route6d(8) -- RIP6 routing daemon
|
The route6d is a routing daemon which supports RIP over IPv6. Options are: -a Enables aging of the statically defined routes. With this option, any statically defined routes will be removed unless cor... |
routed(8) -- network RIP and router discovery routing daemon
|
routed is a daemon invoked at boot time to manage the network routing tables. It uses Routing Information Protocol, RIPv1 (RFC 1058), RIPv2 (RFC 1723), and Internet Router Discovery Protocol (RFC 1256... |
rpc.bootparamd(8) -- boot parameter server
|
bootparamd is a server process that provides information to diskless clients necessary for booting. It consults the file /etc/bootparams. It should normally be started from /etc/rc. This version will ... |
rpc.lockd(8) -- NFS file locking daemon
|
rpc.lockd is a daemon which provides file- and record-locking services in an NFS environment. The options are as follows: -d [debug_level] Write debugging information to syslog, recording all RPC tran... |
rpc.rquotad(8) -- remote quota server
|
rpc.rquotad is an rpc(3) server which returns quotas for a user of a local filesystem which is NFS-mounted onto a remote machine. quota(1) uses the results to display user quotas for remote filesystem... |
rpc.rstatd(8) -- kernel statistics server
|
rpc.rstatd is a server which returns performance statistics obtained from the kernel. Some of these statistics may be read using the rup(1) command. The rpc.rstatd daemon is normally invoked by inetd(... |
rpc.rusersd(8) -- logged in users server
|
rpc.rusersd is a server which returns information about users currently logged in to the system. At startup, rpc.rusersd opens /var/run/utmp and subsequently performs a chroot(2) to /var/empty and swi... |
rpc.rwalld(8) -- write messages to users currently logged in server
|
rpc.rwalld is a server which will send a message to users currently logged in to the system. This server invokes the wall(1) command to actually write the messages to the system. Messages are sent to ... |
rpc.sprayd(8) -- spray server
|
rpc.sprayd is a server which records packets sent by the spray(8) command and sends a traffic report to the originator of the packets. The rpc.sprayd daemon is normally invoked by inetd(8). rpc.sprayd... |
rpc.yppasswdd(8) -- YP update password file daemon
|
rpc.yppasswdd must be running on the YP master server to allow users to change information in the password file. If the user needs to change his password this is normally done with a program called yp... |
rpcinfo(8) -- report RPC information
|
rpcinfo makes an RPC call to an RPC server and reports what it finds. The options are as follows: -p Probe the portmapper on host, and print a list of all registered RPC programs. If host is not speci... |
rquotad(8) -- remote quota server
|
rpc.rquotad is an rpc(3) server which returns quotas for a user of a local filesystem which is NFS-mounted onto a remote machine. quota(1) uses the results to display user quotas for remote filesystem... |
rrestore(8) -- restore files or file systems from backups made with dump
|
The restore command performs the inverse function of dump(8). A full backup of a file system may be restored and subsequent incremental backups layered on top of it. Single files and directory subtree... |
rshd(8) -- remote shell server
|
The rshd server is the server for the rcmd(3) routine and, consequently, for the rsh(1) program. The server provides remote execution facilities with authentication based on privileged port numbers fr... |
rtadvd(8) -- router advertisement daemon
|
rtadvd sends router advertisement packets to the specified interfaces. The program will daemonize itself on invocation. It will then send router advertisement packets periodically, as well as in respo... |
rtquery(8) -- query routing daemons for their routing tables
|
rtquery is used to query a network routing daemon, routed(8) or gated, for its routing table by sending a request or poll command. The routing information in any routing ``response'' packets returne... |
rtsol(8) -- router solicitation daemon
|
rtsold is the daemon program to send ICMPv6 Router Solicitation messages on the specified interfaces. If a node (re)attaches to a link, rtsold sends some Router Solicitations on the link destined to t... |
rtsold(8) -- router solicitation daemon
|
rtsold is the daemon program to send ICMPv6 Router Solicitation messages on the specified interfaces. If a node (re)attaches to a link, rtsold sends some Router Solicitations on the link destined to t... |
rwalld(8) -- write messages to users currently logged in server
|
rpc.rwalld is a server which will send a message to users currently logged in to the system. This server invokes the wall(1) command to actually write the messages to the system. Messages are sent to ... |
rwhod(8) -- system status server
|
rwhod is the server which maintains the database used by the rwho(1) and ruptime(1) programs. Its operation is predicated on the ability to broadcast messages on a network. rwhod operates as both a pr... |
sa(8) -- print system accounting statistics
|
The sa utility reports on, cleans up, and generally maintains system accounting files. sa is able to condense the information in /var/account/acct into the summary files /var/account/savacct and /var/... |
savecore(8) -- save a core dump of the operating system
|
savecore copies the currently running kernel and its associated core dump into directory, and enters a reboot message and information about the core dump into the system log. The options are as follow... |
scan_ffs(8) -- find UFS/FFS partitions on a disk
|
This is the life-saver of typos. If you have ever been working too long, and just happened to type 'disklabel -rw sd0 floppy', instead of 'disklabel -rw fd0 floppy', you know what I am talking abo... |
scsi(8) -- program to assist with SCSI devices
|
The scsi program is used to send commands to a SCSI device. It is also a sample usage of the user-level SCSI commands. out_fmt can be `-' to read output data from stdin; in_fmt can be `-' to write i... |
security(8) -- periodic system security check
|
security is a command script that examines the system for some signs of security weaknesses. It is only a security aid and does not offer complete protection. The security script is normally run from ... |
sendmail(8) -- an electronic mail transport agent
|
Sendmail sends a message to one or more recipients, routing the message over whatever networks are necessary. Sendmail does internetwork forwarding as necessary to deliver the message to the correct p... |
sensorsd(8) -- monitor hardware sensors
|
The sensorsd utility retrieves hardware sensor monitoring data like fan speeds, temperatures and voltages, via sysctl(3). It uses syslog(3) to send an alert if they are out of the given limits. Limits... |
sesd(8) -- monitor SCSI Environmental Services Devices
|
sesd monitors SCSI Environmental Services (or SAF-TE) devices for changes in state and logs such changes to the system error logger (see syslogd(8)). At least one device must be specified. When no oth... |
setencstat(8) -- set SCSI Environmental Services Device enclosure status
|
setencstat sets summary status for a SCSI Environmental Services (or SAFTE) device. The enclosure status argument may take the values: 0 Set the status to an OK state. 1 Set the status to an UNRECOVER... |
setextattr(8) -- set a named extended attribute
|
setextattr is a user tool to set a named extended attribute on a file or directory to the provided string. The attrnamespace argument should be the namespace of the attribute to retrieve: legal values... |
alpha/setnetbootinfo(8) -- configure network bootstrap program
|
The setnetbootinfo utility configures the OpenBSD/alpha network bootstrap program so that it can be used to bootstrap systems with old firmware revisions. The OpenBSD/alpha network bootstrap program n... |
setobjstat(8) -- set SCSI Environmental Services Device object status
|
setobjstat sets the object status for a SCSI Environmental Services (or SAF-TE) device. The objectid argument may be determined by running getencstat(8). The status fields are partially common (first ... |
sftp-server(8) -- SFTP server subsystem
|
sftp-server is a program that speaks the server side of SFTP protocol to stdout and expects client requests from stdin. sftp-server is not intended to be called directly, but from sshd(8) using the Su... |
showmount(8) -- show remote NFS mounts on host
|
showmount shows status information about the NFS server on host. By default it prints the names of all hosts that have NFS file systems mounted on the host. See NFS: Network File System Protocol Speci... |
shutdown(8) -- close down the system at a given time
|
shutdown provides an automated shutdown procedure for superusers to nicely notify users when the system is shutting down, saving them from system administrators, hackers, and gurus, who would otherwis... |
skeyprune(8) -- prune zeroed and old entries from S/Key database
|
skeyprune searches through the S/Key database, /etc/skey, and prunes out entries that have been zeroed out via skeyinit(1) as well as entries that have not been modified in days days. If days is not s... |
slattach(8) -- attach serial lines as network interfaces
|
slattach is used to assign a tty line to a network interface, and will attach the named tty line to the first available slipdevice that is configured and up. The following operands are supported by sl... |
slip(8) -- attach serial lines as network interfaces
|
slattach is used to assign a tty line to a network interface, and will attach the named tty line to the first available slipdevice that is configured and up. The following operands are supported by sl... |
sliplogin(8) -- attach a serial line network interface
|
sliplogin is used to turn the terminal line on standard input into a Serial Line IP (SLIP) link to a remote host. To do this, the program searches the file /etc/sliphome/slip.hosts for an entry matchi... |
slstats(8) -- report slip statistics
|
The slstats utility reports slip-related statistics for the sl`unit- number' interface. If the unit-number is unspecified, it defaults to 0. These statistics are displayed at regular intervals. The d... |
smrsh(8) -- restricted shell for sendmail
|
The smrsh program is intended as a replacement for /bin/sh for use in the ``prog'' mailer in sendmail(8) configuration files. It sharply limits the commands that can be run using the ``|program'' ... |
snkadm(8) -- manage the ActivCard, CRYPTOCard and
|
The tokenadm utility displays and edits user entries in the various token databases. It may also be invoked as one the following: activadm, cryptoadm, or snkadm. The options are as follows: -1 Display... |
snkinit(8) -- modify or add user in ActivCard, CRYPTOCard,
|
The tokeninit utility may also be invoked by one of the following names: activinit, cryptoinit, or snkinit. Depending on the name it was invoked as, it will initialize the system information to allow ... |
spamd(8) -- spam deferral daemon
|
spamd is a fake sendmail(8)-like daemon which rejects false mail. If the pf(4) packet filter is configured to redirect port 25 (SMTP) to this daemon, it will attempt to waste the time and resources of... |
spamd-setup(8) -- parse and load file of spammer addresses
|
The spamd-setup utility adds blacklists by adding addresses to the pf(4) table , as well as configuring mail rejection messages for the added list of addresses in spamd(8). The spamd table is u... |
spamdb(8) -- spamd database tool
|
spamdb manipulates the spamd database in /var/db/spamd used for spamd(8) greylisting. The options are as follows: -a ip Add or update a whitelist entry for IP address "ip". Updates time last seen to... |
spamlogd(8) -- spamd whitelist updating daemon
|
spamlogd manipulates the spamd(8) database in /var/db/spamd used for spamd(8) greylisting. spamlogd updates the /var/db/spamd whitelist entries whenever a connection to port 25 is logged to the pflog(... |
spppcontrol(8) -- display or set parameters for an sppp interface
|
The sppp(4) driver might require a number of additional arguments or optional parameters besides the settings that can be adjusted with ifconfig(8). These are things like authentication protocol param... |
spray(8) -- send many packets to host
|
spray sends multiple RPC packets to host and records how many of them were correctly received and how long it took. The options are as follows: -c count Send count packets. -d delay Pause delay micros... |
sprayd(8) -- spray server
|
rpc.sprayd is a server which records packets sent by the spray(8) command and sends a traffic report to the originator of the packets. The rpc.sprayd daemon is normally invoked by inetd(8). rpc.sprayd... |
ssh-keysign(8) -- ssh helper program for hostbased authentication
|
ssh-keysign is used by ssh(1) to access the local host keys and generate the digital signature required during hostbased authentication with SSH protocol version 2. ssh-keysign is disabled by default ... |
sshd(8) -- OpenSSH SSH daemon
|
sshd (SSH Daemon) is the daemon program for ssh(1). Together these programs replace rlogin and rsh, and provide secure encrypted communications between two untrusted hosts over an insecure network. Th... |
ssl(8) -- details for libssl and libcrypto
|
This document describes some of the issues relating to the use of the OpenSSL libssl and libcrypto libraries. This document is intended as an overview of what the libraries do, and what uses them. The... |
starttls(8) -- ESMTP over TLS/SSL
|
STARTTLS is an ESMTP option, defined in RFC 2487, which is used to conduct ESMTP transactions over TLS circuits. This is used to increase the security of mail server transactions. As of version 8.11, ... |
stdethers(8) -- YP filtering program
|
stdethers is used to get rid of unwanted information in file, or the standard input if no file argument is given. This utility is used by YP when creating YP maps. |
stdhosts(8) -- YP filtering program
|
stdhosts is used to get rid of unwanted information from file, or the standard input if no file argument is given. This utility is used by YP when creating YP maps. |
sticky(8) -- sticky text and append-only directories
|
A special file mode, called the sticky bit (mode S_ISVTX), is used to indicate special treatment for files and directories. See chmod(2) or the file /usr/include/sys/stat.h for an explanation of file ... |
string2key(8) -- map a password into a key
|
string2key performs the string-to-key function. This is useful when you want to handle the raw key instead of the password. Supported options: -5, --version5 Output Kerberos v5 string-to-key -4, --ver... |
sudo(8) -- execute a command as another user
|
sudo allows a permitted user to execute a command as the superuser or another user, as specified in the sudoers file. The real and effective uid and gid are set to match those of the target user as sp... |
suexec(8) -- Switch User For Exec
|
suexec is the "wrapper" support program for the suexec behaviour for the Apache HTTP server. It is run from within the server automatically to switch the user when an external program has to be run ... |
supfilesrv(8) -- sup server processes
|
Supfilesrv is the server processes used to interact with sup client processes via the IP/TCP network protocol. This server normally is expected to be running on server machines at all times. Each mach... |
supscan(8) -- sup server processes
|
Supfilesrv is the server processes used to interact with sup client processes via the IP/TCP network protocol. This server normally is expected to be running on server machines at all times. Each mach... |
supservers(8) -- sup server processes
|
Supfilesrv is the server processes used to interact with sup client processes via the IP/TCP network protocol. This server normally is expected to be running on server machines at all times. Each mach... |
swapctl(8) -- system swap management tool
|
The swapctl program adds, removes, lists and prioritizes swap devices and files for the system. The swapon program acts the same as the swapctl program, as if called with the -a option, except if swap... |
swapon(8) -- system swap management tool
|
The swapctl program adds, removes, lists and prioritizes swap devices and files for the system. The swapon program acts the same as the swapctl program, as if called with the -a option, except if swap... |
sync(8) -- force completion of pending disk writes (flush cache)
|
The sync utility can be called to ensure that all disk writes have been completed before the processor is halted in a way not suitably done by reboot(8) or halt(8). Generally, it is preferable to use ... |
sysctl(8) -- get or set kernel state
|
The sysctl utility retrieves kernel state and allows processes with appropriate privilege to set kernel state. The state to be retrieved or set is described using a ``Management Information Base'' (... |
syslogc(8) -- collect messages from syslog memory buffer
|
syslogc collects messages from the syslogd(8) memory buffer specified by the logname argument. For syslogc to work, syslogd(8) must be configured with one or more memory buffer logs (see syslog.conf(5... |
syslogd(8) -- log systems messages
|
syslogd reads and logs messages to the system console, log files, other machines and/or users as specified by its configuration file. The options are as follows: -a path Specify a location where syslo... |
talkd(8) -- remote user communication server
|
Talkd is the server that notifies a user that someone else wants to initiate a conversation. It acts as a repository of invitations, responding to requests by clients wishing to rendezvous to hold a c... |
tcpd(8) -- tcp wrappers access control facility for internet services
|
The tcpd program can be set up to monitor incoming requests for telnet(1), finger(1), ftp(1), rsh(1), tftp(1), talk(1), comsat(8), and other services that have a one-to-one mapping onto executable fil... |
tcpdchk(8) -- tcp wrapper configuration checker
|
tcpdchk examines your tcp wrapper configuration and reports all potential and real problems it can find. The program examines the tcpd(8) access control files (by default, these are /etc/hosts.allow a... |
tcpdmatch(8) -- tcp wrapper oracle
|
tcpdmatch predicts how the tcp wrapper would handle a specific request for service. Examples are given below. The program examines the tcpd(8) access control tables (default /etc/hosts.allow and /etc/... |
tcpdrop(8) -- drop a TCP connection
|
The tcpdrop command drops the TCP connection specified by the local address laddr, port lport and the foreign address faddr, port fport. Addresses and ports can be specified by name or numeric value. |
tcpdump(8) -- dump traffic on a network
|
tcpdump prints out the headers of packets on a network interface that match the boolean expression. You must have read access to /dev/bpf*. The options are as follows: -a Attempt to convert network an... |
telnetd(8) -- DARPA TELNET protocol server
|
The telnetd command is a server which supports the DARPA standard TELNET virtual terminal protocol. Telnetd is normally invoked by the internet server (see inetd(8)) for requests to connect to the TEL... |
tftpd(8) -- DARPA Trivial File Transfer Protocol server
|
tftpd is a server which supports the DARPA Trivial File Transfer Protocol. The TFTP server operates at the port indicated in the `tftp' service description; see services(5). The server is normally st... |
timed(8) -- time server daemon
|
The timed utility is a time server daemon which is normally invoked at boot time from the rc(8) file. It synchronizes the host's time with the time of other machines, which are also running timed, in... |
timedc(8) -- timed control program
|
timedc is used to control the operation of the timed(8) program. It may be used to: +o Measure the differences between machines' clocks, +o Find the location where the master time server is running, ... |
tokenadm(8) -- SNK-004 token databases
|
The tokenadm utility displays and edits user entries in the various token databases. It may also be invoked as one the following: activadm, cryptoadm, or snkadm. The options are as follows: -1 Display... |
tokeninit(8) -- or SNK-004 authentication system
|
The tokeninit utility may also be invoked by one of the following names: activinit, cryptoinit, or snkinit. Depending on the name it was invoked as, it will initialize the system information to allow ... |
traceroute(8) -- print the route packets take to network host
|
The Internet is a large and complex aggregation of network hardware, connected together by gateways. Tracking the route one's packets follow (or finding the miscreant gateway that's discarding your ... |
traceroute6(8) -- print the route IPv6 packets will take to the destination
|
-d Debug mode. -f firsthop Specify how many hops to skip in trace. -g gateway Specify intermediate gateway (traceroute6 uses routing header). -I Use ICMP6 ECHO instead of UDP datagrams. -l Print both ... |
trpt(8) -- transliterate protocol trace
|
trpt interrogates the buffer of TCP trace records created when a socket is marked for ``debugging'' (see setsockopt(2)), and prints a readable description of these records. When no options are suppl... |
ttyflags(8) -- set device-specific flags for terminals
|
ttyflags sets the device-specific flags for terminals, based on the flags found on the terminal's line in /etc/ttys. The options are as follows: -a Set the flags for all terminals in /etc/ttys. -v Be... |
tunefs(8) -- tune up an existing file system
|
tunefs is designed to change the dynamic parameters of a file system which affect the layout policies. The parameters which are to be changed are indicated by the flags given below: -A The file system... |
UKC(8) -- how to change kernel configuration at boot
|
BOOT_CONFIG is a kernel option that makes it possible to change the configuration at boot time. The same interface is available from userland, using the -e argument to config(8). The boot time configu... |
umount(8) -- unmount file systems
|
The umount command calls the unmount(2) system call to remove a special device or the remote node (rhost:path) from the file system tree at the point node. If neither special nor node are provided, th... |
update(8) -- flush internal filesystem caches to disk frequently
|
The update command no longer exists, but has been incorporated into the kernel where it will flush dirty buffers that have not been touched for thirty seconds or more. The same effect can be obtained ... |
updatedb(8) -- update locate database
|
locate.updatedb updates the database used by locate(1). It is typically run once a week by the /etc/weekly script. The contents of the newly built database can be controlled by the /etc/locate.rc file... |
usbdevs(8) -- show USB devices connected to the system
|
usbdevs prints a listing of all USB devices connected to the system with some information about each device. The indentation of each line indicates its distance from the root. The options are as follo... |
user(8) -- manage user login information on the system
|
The user utility acts as a frontend to the useradd(8), usermod(8), userinfo(8), and userdel(8) commands. For a full explanation of the options, please see the relevant manual page. The user utility ex... |
useradd(8) -- add a user to the system
|
The useradd utility adds a user to the system, creating and populating a home directory if necessary. Any skeleton files will be provided for the new user if they exist in the skel-dir directory (see ... |
userdel(8) -- remove a user from the system
|
The userdel utility removes a user from the system, optionally removing that user's home directory and any subdirectories. Default values are taken from the information provided in the /etc/usermgmt.... |
userinfo(8) -- displays user information
|
The userinfo utility retrieves the user information from the system. The following command line options are recognised: -e return 0 if the user exists, and non-zero if the user does not exist, on the ... |
usermod(8) -- modify user login information
|
The usermod utility modifies user login information on the system. Default values are taken from the information provided in the /etc/usermgmt.conf file, which, if running as root, is created using th... |
uucpd(8) -- unix to unix copy protocol daemon
|
The uucpd daemon reads a username and password, and then executes uucico, the UUCP file transfer daemon, if the username and password match a valid account and the account's shell is ``/usr/local/lib... |
verify_krb5_conf(8) -- checks krb5.conf for obvious errors
|
verify_krb5_conf reads the configuration file krb5.conf, or the file given on the command line, and parses it, thereby verifying that the syntax is correct. If the file is syntactically correct, verif... |
vipw(8) -- edit the password file
|
vipw edits the password file after setting the appropriate locks, and does any necessary processing after the password file is unlocked. If the password file is already locked for editing by another u... |
visudo(8) -- edit the sudoers file
|
visudo edits the sudoers file in a safe fashion, analogous to vipw(8). visudo locks the sudoers file against multiple simultaneous edits, provides basic sanity checks, and checks for parse errors. If ... |
vmstat(8) -- report statistics about kernel activities
|
vmstat reports certain kernel statistics kept about process, virtual memory, disk, trap and CPU activity. The options are as follows: -c count Repeat the display count times. The first display is for ... |
vnconfig(8) -- configure vnode disks for file swapping or pseudo file systems
|
The vnconfig command configures vnode pseudo disk devices. It will associate (or disassociate) the special file rawdev with the regular file regular_file allowing the latter to be accessed as though i... |
vos(8) -- manage AFS volumes and the VLDB
|
The vos utility is used to manage AFS volumes and the volume location database (VLDB). vos provides several commands: addsite not yet implemented apropos apropos backup make a backup copy of a volume ... |
vpn(8) -- configuring the system for virtual private networks
|
A virtual private network is used to securely connect two or more subnets over the internet. For each subnet there is a security gateway which is linked via a cryptographically secured tunnel to the s... |
weekly(8) -- periodic system maintenance
|
The three files /etc/daily, /etc/weekly, and /etc/monthly are shell scripts run on a periodic basis by the clock daemon, cron(8). They take care of some basic administrative tasks. The results are mai... |
wicontrol(8) -- configure WaveLAN/IEEE devices
|
The wicontrol command controls the operation of WaveLAN/IEEE wireless networking devices via the wi(4) and awi(4) drivers. Most of the parameters that can be changed relate to the IEEE 802.11 protocol... |
macppc/wsconscfg(8) -- configure virtual terminals on a wscons display
|
The wsconscfg tool allows for the creation and removal of virtual terminals on display devices controlled by the wscons terminal framework, as long as the underlying display hardware driver supports m... |
sgi/wsconscfg(8) -- configure virtual terminals on a wscons display
|
The wsconscfg tool allows for the creation and removal of virtual terminals on display devices controlled by the wscons terminal framework, as long as the underlying display hardware driver supports m... |
alpha/wsconscfg(8) -- configure virtual terminals on a wscons display
|
The wsconscfg tool allows for the creation and removal of virtual terminals on display devices controlled by the wscons terminal framework, as long as the underlying display hardware driver supports m... |
cats/wsconscfg(8) -- configure virtual terminals on a wscons display
|
The wsconscfg tool allows for the creation and removal of virtual terminals on display devices controlled by the wscons terminal framework, as long as the underlying display hardware driver supports m... |
i386/wsconscfg(8) -- configure virtual terminals on a wscons display
|
The wsconscfg tool allows for the creation and removal of virtual terminals on display devices controlled by the wscons terminal framework, as long as the underlying display hardware driver supports m... |
amd64/wsconscfg(8) -- configure virtual terminals on a wscons display
|
The wsconscfg tool allows for the creation and removal of virtual terminals on display devices controlled by the wscons terminal framework, as long as the underlying display hardware driver supports m... |
hppa/wsconscfg(8) -- configure virtual terminals on a wscons display
|
The wsconscfg tool allows for the creation and removal of virtual terminals on display devices controlled by the wscons terminal framework, as long as the underlying display hardware driver supports m... |
sparc/wsconscfg(8) -- configure virtual terminals on a wscons display
|
The wsconscfg tool allows for the creation and removal of virtual terminals on display devices controlled by the wscons terminal framework, as long as the underlying display hardware driver supports m... |
sparc64/wsconscfg(8) -- configure virtual terminals on a wscons display
|
The wsconscfg tool allows for the creation and removal of virtual terminals on display devices controlled by the wscons terminal framework, as long as the underlying display hardware driver supports m... |
luna88k/wsconscfg(8) -- configure virtual terminals on a wscons display
|
The wsconscfg tool allows for the creation and removal of virtual terminals on display devices controlled by the wscons terminal framework, as long as the underlying display hardware driver supports m... |
macppc/wsconsctl(8) -- get or set wscons state
|
The wsconsctl command displays or sets various wscons system driver variables. If a list of variables is present on the command line, wsconsctl prints the current value of those variables for the spec... |
sgi/wsconsctl(8) -- get or set wscons state
|
The wsconsctl command displays or sets various wscons system driver variables. If a list of variables is present on the command line, wsconsctl prints the current value of those variables for the spec... |
alpha/wsconsctl(8) -- get or set wscons state
|
The wsconsctl command displays or sets various wscons system driver variables. If a list of variables is present on the command line, wsconsctl prints the current value of those variables for the spec... |
cats/wsconsctl(8) -- get or set wscons state
|
The wsconsctl command displays or sets various wscons system driver variables. If a list of variables is present on the command line, wsconsctl prints the current value of those variables for the spec... |
i386/wsconsctl(8) -- get or set wscons state
|
The wsconsctl command displays or sets various wscons system driver variables. If a list of variables is present on the command line, wsconsctl prints the current value of those variables for the spec... |
amd64/wsconsctl(8) -- get or set wscons state
|
The wsconsctl command displays or sets various wscons system driver variables. If a list of variables is present on the command line, wsconsctl prints the current value of those variables for the spec... |
hppa/wsconsctl(8) -- get or set wscons state
|
The wsconsctl command displays or sets various wscons system driver variables. If a list of variables is present on the command line, wsconsctl prints the current value of those variables for the spec... |
sparc/wsconsctl(8) -- get or set wscons state
|
The wsconsctl command displays or sets various wscons system driver variables. If a list of variables is present on the command line, wsconsctl prints the current value of those variables for the spec... |
sparc64/wsconsctl(8) -- get or set wscons state
|
The wsconsctl command displays or sets various wscons system driver variables. If a list of variables is present on the command line, wsconsctl prints the current value of those variables for the spec... |
luna88k/wsconsctl(8) -- get or set wscons state
|
The wsconsctl command displays or sets various wscons system driver variables. If a list of variables is present on the command line, wsconsctl prints the current value of those variables for the spec... |
alpha/wsfontload(8) -- load a font bitmap into a wscons display device
|
The wsfontload utility loads a font bitmap to a wscons device if the device driver supports it. The font gets assigned a name in this process which it can be referred to by later for use on a display ... |
cats/wsfontload(8) -- load a font bitmap into a wscons display device
|
The wsfontload utility loads a font bitmap to a wscons device if the device driver supports it. The font gets assigned a name in this process which it can be referred to by later for use on a display ... |
i386/wsfontload(8) -- load a font bitmap into a wscons display device
|
The wsfontload utility loads a font bitmap to a wscons device if the device driver supports it. The font gets assigned a name in this process which it can be referred to by later for use on a display ... |
amd64/wsfontload(8) -- load a font bitmap into a wscons display device
|
The wsfontload utility loads a font bitmap to a wscons device if the device driver supports it. The font gets assigned a name in this process which it can be referred to by later for use on a display ... |
hppa/wsfontload(8) -- load a font bitmap into a wscons display device
|
The wsfontload utility loads a font bitmap to a wscons device if the device driver supports it. The font gets assigned a name in this process which it can be referred to by later for use on a display ... |
alpha/wsmoused(8) -- wsmouse daemon
|
wsmoused listens for mouse events on the specified device and communicates them to the wscons(4) driver through the /dev/ttyCcfg interface. Its purpose is to provide copy/paste functionality on the PC... |
i386/wsmoused(8) -- wsmouse daemon
|
wsmoused listens for mouse events on the specified device and communicates them to the wscons(4) driver through the /dev/ttyCcfg interface. Its purpose is to provide copy/paste functionality on the PC... |
amd64/wsmoused(8) -- wsmouse daemon
|
wsmoused listens for mouse events on the specified device and communicates them to the wscons(4) driver through the /dev/ttyCcfg interface. Its purpose is to provide copy/paste functionality on the PC... |
yp(8) -- description of the YP subsystem
|
The YP subsystem allows network management of passwd, group, and hosts file entries through the functions getpwent(3), getgrent(3) and gethostbyname(3). A number of other databases can be network-mana... |
ypbind(8) -- create and maintain a binding to a YP server
|
ypbind finds the server for a particular YP domain and stores information about it in a ``binding file''. This binding information includes the IP address of the server associated with that particul... |
ypinit(8) -- create a YP server (master or slave)
|
ypinit may be used to set up a YP server, or to change the ypserver map. The options are as follows: -m domainname Set up a master YP server. If domainname is not given the default domainname will be ... |
yppasswdd(8) -- YP update password file daemon
|
rpc.yppasswdd must be running on the YP master server to allow users to change information in the password file. If the user needs to change his password this is normally done with a program called yp... |
yppoll(8) -- ask version of YP map from YP server
|
yppoll asks a YP server process for the order number and which host is the master server for mapname. The options are as follows: -h host Ask the YP server process running on host for information abou... |
yppush(8) -- force distribution of YP map
|
yppush is used to distribute an YP map from a master server to any slave server in the domain. All servers of the domain are fetched from the YP map ypservers. The options are as follows: -d domainnam... |
ypserv(8) -- YP server daemon
|
ypserv is a fundamental part of the network information system called YP. This server provides information from YP maps to the YP clients on the network. A YP map is stored on the server as a db(3) da... |
ypset(8) -- tell ypbind(8) which YP server process to use
|
ypset tells the ypbind(8) process on the current machine which YP server process to communicate with. If server is down or is not running a YP server process, it is not discovered until a YP client pr... |
yptest(8) -- calls different YP routines
|
yptest checks various YP functions to see if the YP server works as expected. |
ypxfr(8) -- get a YP map from YP server
|
ypxfr is the utility in YP that transfers maps to the local host. Since the YP master transfers a map when it has changed, an YP slave should check for missed maps regularly. This can be done via an e... |
ypxfr_1perday(8) -- get a YP map from YP server
|
ypxfr is the utility in YP that transfers maps to the local host. Since the YP master transfers a map when it has changed, an YP slave should check for missed maps regularly. This can be done via an e... |
ypxfr_1perhour(8) -- get a YP map from YP server
|
ypxfr is the utility in YP that transfers maps to the local host. Since the YP master transfers a map when it has changed, an YP slave should check for missed maps regularly. This can be done via an e... |
ypxfr_2perday(8) -- get a YP map from YP server
|
ypxfr is the utility in YP that transfers maps to the local host. Since the YP master transfers a map when it has changed, an YP slave should check for missed maps regularly. This can be done via an e... |
zdump(8) -- time zone dumper
|
zdump prints the current time in each zonename named on the command line. These options are available: -c cutoffyear Cut off the verbose output near the start of the given year. -v For each zonename o... |
zic(8) -- time zone compiler
|
zic reads text from the file(s) named on the command line and creates the time conversion information files specified in this input. If a filename is ``-'', the standard input is read. These options... |
macppc/zzz(8) -- Advanced Power Management control program
|
apm communicates with the Advanced Power Management daemon, apmd(8), making requests of it for current power status or to place the system into a suspend or stand-by state. With no flags, apm displays... |
i386/zzz(8) -- Advanced Power Management control program
|
apm communicates with the Advanced Power Management daemon, apmd(8), making requests of it for current power status or to place the system into a suspend or stand-by state. With no flags, apm displays... |
abs(9) -- kernel library routines
|
The kern library implements a set of useful functions and macros inside the kernel. |
addlog(9) -- log a message from the kernel through the /dev/klog device
|
The log() function allows the kernel to send formatted messages to user processes listening on /dev/klog. Usually syslogd(8) monitors /dev/klog for these messages and writes them to a log file. All me... |
add_audio_randomness(9) -- device kernel interface
|
The add_mouse_randomness(), add_tty_randomness(), add_net_randomness(), add_disk_randomness() and add_audio_randomness() routines are used to supply data for the random data source device for further ... |
add_disk_randomness(9) -- device kernel interface
|
The add_mouse_randomness(), add_tty_randomness(), add_net_randomness(), add_disk_randomness() and add_audio_randomness() routines are used to supply data for the random data source device for further ... |
add_mouse_randomness(9) -- device kernel interface
|
The add_mouse_randomness(), add_tty_randomness(), add_net_randomness(), add_disk_randomness() and add_audio_randomness() routines are used to supply data for the random data source device for further ... |
add_net_randomness(9) -- device kernel interface
|
The add_mouse_randomness(), add_tty_randomness(), add_net_randomness(), add_disk_randomness() and add_audio_randomness() routines are used to supply data for the random data source device for further ... |
add_timer_randomness(9) -- device kernel interface
|
The add_mouse_randomness(), add_tty_randomness(), add_net_randomness(), add_disk_randomness() and add_audio_randomness() routines are used to supply data for the random data source device for further ... |
add_true_randomness(9) -- device kernel interface
|
The add_mouse_randomness(), add_tty_randomness(), add_net_randomness(), add_disk_randomness() and add_audio_randomness() routines are used to supply data for the random data source device for further ... |
add_tty_randomness(9) -- device kernel interface
|
The add_mouse_randomness(), add_tty_randomness(), add_net_randomness(), add_disk_randomness() and add_audio_randomness() routines are used to supply data for the random data source device for further ... |
altq(9) -- kernel interfaces for manipulating output queues on network interfaces
|
The ALTQ system is a framework to manage queuing disciplines on network interfaces. ALTQ introduces new macros to manipulate output queues. The output queue macros are used to abstract queue operation... |
arc4random(9) -- device kernel interface
|
The add_mouse_randomness(), add_tty_randomness(), add_net_randomness(), add_disk_randomness() and add_audio_randomness() routines are used to supply data for the random data source device for further ... |
assert(9) -- kernel library routines
|
The kern library implements a set of useful functions and macros inside the kernel. |
audio(9) -- interface between low and high level audio drivers
|
The audio device driver is divided into a high level, hardware independent layer, and a low level, hardware dependent layer. The interface between these is the audio_hw_if structure. struct audio_hw_i... |
autoconf(9) -- autoconfiguration framework
|
Autoconfiguration is the process of matching hardware devices with an appropriate device driver. In its most basic form, autoconfiguration consists of the recursive process of finding and attaching al... |
bcmp(9) -- kernel library routines
|
The kern library implements a set of useful functions and macros inside the kernel. |
bdevvp(9) -- create a vnode for a device
|
The getdevvp() function creates a vnode for a device of type type with a device number of dev, and returns a pointer to it in vpp. Its arguments are: dev The device number of the desired device. vpp W... |
bintime(9) -- system clock
|
This family of functions return the system clock in various different formats. The functions with the "uptime" suffix return the monotonically increasing time since boot. The functions without "up... |
binuptime(9) -- system clock
|
This family of functions return the system clock in various different formats. The functions with the "uptime" suffix return the monotonically increasing time since boot. The functions without "up... |
boot(9) -- halt or reboot the system
|
The boot() function handles final system shutdown, and either halts or reboots the system. The exact action to be taken is determined by the flags passed in howto and by whether or not the system has ... |
boottime(9) -- system time variables
|
The time variable is the system's ``wall time'' clock. It is set at boot by inittodr(9), and is updated by the settimeofday(2) system call and by periodic clock interrupts. The boottime variable ho... |
bounds_check_with_label(9) -- disk label management routines
|
This collection of routines provides a disklabel management interface to kernel device drivers. These routines are classified as machine- or architecture-dependent because of restrictions imposed by t... |
bus_dma(9) -- bus and machine independent DMA mapping interface
|
The bus_dma interface provides a bus and machine independent mechanism for managing DMA data transfers to and from devices. The basic abstraction is the bus_dmamap_t, a pointer to a structure which co... |
bus_dmamap_create(9) -- bus and machine independent DMA mapping interface
|
The bus_dma interface provides a bus and machine independent mechanism for managing DMA data transfers to and from devices. The basic abstraction is the bus_dmamap_t, a pointer to a structure which co... |
bus_dmamap_destroy(9) -- bus and machine independent DMA mapping interface
|
The bus_dma interface provides a bus and machine independent mechanism for managing DMA data transfers to and from devices. The basic abstraction is the bus_dmamap_t, a pointer to a structure which co... |
bus_dmamap_load(9) -- bus and machine independent DMA mapping interface
|
The bus_dma interface provides a bus and machine independent mechanism for managing DMA data transfers to and from devices. The basic abstraction is the bus_dmamap_t, a pointer to a structure which co... |
bus_dmamap_load_mbuf(9) -- bus and machine independent DMA mapping interface
|
The bus_dma interface provides a bus and machine independent mechanism for managing DMA data transfers to and from devices. The basic abstraction is the bus_dmamap_t, a pointer to a structure which co... |
bus_dmamap_load_raw(9) -- bus and machine independent DMA mapping interface
|
The bus_dma interface provides a bus and machine independent mechanism for managing DMA data transfers to and from devices. The basic abstraction is the bus_dmamap_t, a pointer to a structure which co... |
bus_dmamap_load_uio(9) -- bus and machine independent DMA mapping interface
|
The bus_dma interface provides a bus and machine independent mechanism for managing DMA data transfers to and from devices. The basic abstraction is the bus_dmamap_t, a pointer to a structure which co... |
bus_dmamap_sync(9) -- bus and machine independent DMA mapping interface
|
The bus_dma interface provides a bus and machine independent mechanism for managing DMA data transfers to and from devices. The basic abstraction is the bus_dmamap_t, a pointer to a structure which co... |
bus_dmamap_unload(9) -- bus and machine independent DMA mapping interface
|
The bus_dma interface provides a bus and machine independent mechanism for managing DMA data transfers to and from devices. The basic abstraction is the bus_dmamap_t, a pointer to a structure which co... |
bus_dmamem_alloc(9) -- bus and machine independent DMA mapping interface
|
The bus_dma interface provides a bus and machine independent mechanism for managing DMA data transfers to and from devices. The basic abstraction is the bus_dmamap_t, a pointer to a structure which co... |
bus_dmamem_free(9) -- bus and machine independent DMA mapping interface
|
The bus_dma interface provides a bus and machine independent mechanism for managing DMA data transfers to and from devices. The basic abstraction is the bus_dmamap_t, a pointer to a structure which co... |
bus_dmamem_map(9) -- bus and machine independent DMA mapping interface
|
The bus_dma interface provides a bus and machine independent mechanism for managing DMA data transfers to and from devices. The basic abstraction is the bus_dmamap_t, a pointer to a structure which co... |
bus_dmamem_mmap(9) -- bus and machine independent DMA mapping interface
|
The bus_dma interface provides a bus and machine independent mechanism for managing DMA data transfers to and from devices. The basic abstraction is the bus_dmamap_t, a pointer to a structure which co... |
bus_dmamem_unmap(9) -- bus and machine independent DMA mapping interface
|
The bus_dma interface provides a bus and machine independent mechanism for managing DMA data transfers to and from devices. The basic abstraction is the bus_dmamap_t, a pointer to a structure which co... |
bus_space(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_alloc(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_barrier(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_copy_1(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_copy_2(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_copy_4(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_copy_8(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_free(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_map(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_read_1(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_read_2(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_read_4(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_read_8(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_read_multi_1(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_read_multi_2(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_read_multi_4(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_read_multi_8(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_read_raw_multi_2(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_read_raw_multi_4(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_read_raw_multi_8(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_read_raw_region_2(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_read_raw_region_4(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_read_raw_region_8(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_read_region_1(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_read_region_2(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_read_region_4(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_read_region_8(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_set_multi_1(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_set_multi_2(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_set_multi_4(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_set_multi_8(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_set_region_1(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_set_region_2(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_set_region_4(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_set_region_8(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_subregion(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_unmap(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_vaddr(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_write_1(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_write_2(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_write_4(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_write_8(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_write_multi_1(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_write_multi_2(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_write_multi_4(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_write_multi_8(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_write_raw_multi_2(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_write_raw_multi_4(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_write_raw_multi_8(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_write_raw_region_2(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_write_raw_region_4(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_write_raw_region_8(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_write_region_1(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_write_region_2(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_write_region_4(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
bus_space_write_region_8(9) -- bus space manipulation functions
|
The bus_space functions exist to allow device drivers machine-independent access to bus memory and register areas. All of the functions and types described in this document can be used by including th... |
cdevvp(9) -- create a vnode for a device
|
The getdevvp() function creates a vnode for a device of type type with a device number of dev, and returns a pointer to it in vpp. Its arguments are: dev The device number of the desired device. vpp W... |
config_activate(9) -- autoconfiguration framework
|
Autoconfiguration is the process of matching hardware devices with an appropriate device driver. In its most basic form, autoconfiguration consists of the recursive process of finding and attaching al... |
config_attach(9) -- autoconfiguration framework
|
Autoconfiguration is the process of matching hardware devices with an appropriate device driver. In its most basic form, autoconfiguration consists of the recursive process of finding and attaching al... |
config_deactivate(9) -- autoconfiguration framework
|
Autoconfiguration is the process of matching hardware devices with an appropriate device driver. In its most basic form, autoconfiguration consists of the recursive process of finding and attaching al... |
config_defer(9) -- autoconfiguration framework
|
Autoconfiguration is the process of matching hardware devices with an appropriate device driver. In its most basic form, autoconfiguration consists of the recursive process of finding and attaching al... |
config_detach(9) -- autoconfiguration framework
|
Autoconfiguration is the process of matching hardware devices with an appropriate device driver. In its most basic form, autoconfiguration consists of the recursive process of finding and attaching al... |
config_found(9) -- autoconfiguration framework
|
Autoconfiguration is the process of matching hardware devices with an appropriate device driver. In its most basic form, autoconfiguration consists of the recursive process of finding and attaching al... |
config_found_sm(9) -- autoconfiguration framework
|
Autoconfiguration is the process of matching hardware devices with an appropriate device driver. In its most basic form, autoconfiguration consists of the recursive process of finding and attaching al... |
config_init(9) -- autoconfiguration framework
|
Autoconfiguration is the process of matching hardware devices with an appropriate device driver. In its most basic form, autoconfiguration consists of the recursive process of finding and attaching al... |
config_rootfound(9) -- autoconfiguration framework
|
Autoconfiguration is the process of matching hardware devices with an appropriate device driver. In its most basic form, autoconfiguration consists of the recursive process of finding and attaching al... |
config_rootsearch(9) -- autoconfiguration framework
|
Autoconfiguration is the process of matching hardware devices with an appropriate device driver. In its most basic form, autoconfiguration consists of the recursive process of finding and attaching al... |
config_search(9) -- autoconfiguration framework
|
Autoconfiguration is the process of matching hardware devices with an appropriate device driver. In its most basic form, autoconfiguration consists of the recursive process of finding and attaching al... |
copy(9) -- kernel copy functions
|
The copy functions are designed to copy contiguous data from one address to another. All but copystr() copy data from user-space to kernel-space or vice-versa. The copy routines provide the following ... |
copyin(9) -- kernel copy functions
|
The copy functions are designed to copy contiguous data from one address to another. All but copystr() copy data from user-space to kernel-space or vice-versa. The copy routines provide the following ... |
copyinstr(9) -- kernel copy functions
|
The copy functions are designed to copy contiguous data from one address to another. All but copystr() copy data from user-space to kernel-space or vice-versa. The copy routines provide the following ... |
copyout(9) -- kernel copy functions
|
The copy functions are designed to copy contiguous data from one address to another. All but copystr() copy data from user-space to kernel-space or vice-versa. The copy routines provide the following ... |
copyoutstr(9) -- kernel copy functions
|
The copy functions are designed to copy contiguous data from one address to another. All but copystr() copy data from user-space to kernel-space or vice-versa. The copy routines provide the following ... |
copystr(9) -- kernel copy functions
|
The copy functions are designed to copy contiguous data from one address to another. All but copystr() copy data from user-space to kernel-space or vice-versa. The copy routines provide the following ... |
cpu_switch(9) -- switch to another process context
|
The mi_switch() function implements the machine-independent prelude to a process context switch. It is called from only a few distinguished places in the kernel code as a result of the principle of no... |
crypto(9) -- API for cryptographic services in the kernel
|
crypto is a framework for drivers of cryptographic hardware to register with the kernel so ``consumers'' (other kernel subsystems, and eventually users through an appropriate device) are able to mak... |
crypto_dispatch(9) -- API for cryptographic services in the kernel
|
crypto is a framework for drivers of cryptographic hardware to register with the kernel so ``consumers'' (other kernel subsystems, and eventually users through an appropriate device) are able to mak... |
crypto_done(9) -- API for cryptographic services in the kernel
|
crypto is a framework for drivers of cryptographic hardware to register with the kernel so ``consumers'' (other kernel subsystems, and eventually users through an appropriate device) are able to mak... |
crypto_freereq(9) -- API for cryptographic services in the kernel
|
crypto is a framework for drivers of cryptographic hardware to register with the kernel so ``consumers'' (other kernel subsystems, and eventually users through an appropriate device) are able to mak... |
crypto_freesession(9) -- API for cryptographic services in the kernel
|
crypto is a framework for drivers of cryptographic hardware to register with the kernel so ``consumers'' (other kernel subsystems, and eventually users through an appropriate device) are able to mak... |
crypto_getreq(9) -- API for cryptographic services in the kernel
|
crypto is a framework for drivers of cryptographic hardware to register with the kernel so ``consumers'' (other kernel subsystems, and eventually users through an appropriate device) are able to mak... |
crypto_kdispatch(9) -- API for cryptographic services in the kernel
|
crypto is a framework for drivers of cryptographic hardware to register with the kernel so ``consumers'' (other kernel subsystems, and eventually users through an appropriate device) are able to mak... |
crypto_kdone(9) -- API for cryptographic services in the kernel
|
crypto is a framework for drivers of cryptographic hardware to register with the kernel so ``consumers'' (other kernel subsystems, and eventually users through an appropriate device) are able to mak... |
crypto_kregister(9) -- API for cryptographic services in the kernel
|
crypto is a framework for drivers of cryptographic hardware to register with the kernel so ``consumers'' (other kernel subsystems, and eventually users through an appropriate device) are able to mak... |
crypto_newsession(9) -- API for cryptographic services in the kernel
|
crypto is a framework for drivers of cryptographic hardware to register with the kernel so ``consumers'' (other kernel subsystems, and eventually users through an appropriate device) are able to mak... |
crypto_register(9) -- API for cryptographic services in the kernel
|
crypto is a framework for drivers of cryptographic hardware to register with the kernel so ``consumers'' (other kernel subsystems, and eventually users through an appropriate device) are able to mak... |
crypto_unregister(9) -- API for cryptographic services in the kernel
|
crypto is a framework for drivers of cryptographic hardware to register with the kernel so ``consumers'' (other kernel subsystems, and eventually users through an appropriate device) are able to mak... |
ctxsw(9) -- switch to another process context
|
The mi_switch() function implements the machine-independent prelude to a process context switch. It is called from only a few distinguished places in the kernel code as a result of the principle of no... |
db_printf(9) -- kernel formatted output conversion
|
The printf(), snprintf(), vprintf(), vsnprintf(), uprintf(), ttyprintf(), and db_printf() functions allow the kernel to send formatted messages to various output devices. The functions printf() and vp... |
disk(9) -- generic disk framework
|
The OpenBSD generic disk framework is designed to provide flexible, scalable, and consistent handling of disk state and metrics information. The fundamental component of this framework is the disk str... |
disklabel(9) -- disk label management routines
|
This collection of routines provides a disklabel management interface to kernel device drivers. These routines are classified as machine- or architecture-dependent because of restrictions imposed by t... |
disk_attach(9) -- generic disk framework
|
The OpenBSD generic disk framework is designed to provide flexible, scalable, and consistent handling of disk state and metrics information. The fundamental component of this framework is the disk str... |
disk_busy(9) -- generic disk framework
|
The OpenBSD generic disk framework is designed to provide flexible, scalable, and consistent handling of disk state and metrics information. The fundamental component of this framework is the disk str... |
disk_detatch(9) -- generic disk framework
|
The OpenBSD generic disk framework is designed to provide flexible, scalable, and consistent handling of disk state and metrics information. The fundamental component of this framework is the disk str... |
disk_find(9) -- generic disk framework
|
The OpenBSD generic disk framework is designed to provide flexible, scalable, and consistent handling of disk state and metrics information. The fundamental component of this framework is the disk str... |
disk_init(9) -- generic disk framework
|
The OpenBSD generic disk framework is designed to provide flexible, scalable, and consistent handling of disk state and metrics information. The fundamental component of this framework is the disk str... |
disk_resetstat(9) -- generic disk framework
|
The OpenBSD generic disk framework is designed to provide flexible, scalable, and consistent handling of disk state and metrics information. The fundamental component of this framework is the disk str... |
disk_unbusy(9) -- generic disk framework
|
The OpenBSD generic disk framework is designed to provide flexible, scalable, and consistent handling of disk state and metrics information. The fundamental component of this framework is the disk str... |
dohooks(9) -- run all hooks in a list
|
The dohooks() function invokes all hooks established using the hook_establish(9) function. Hooks are called in the order of the TAILQ that head points to, however hook_establish(9) can put the hooks e... |
dopowerhooks(9) -- run all power hooks
|
The dopowerhooks() function invokes all power hooks established using the powerhook_establish(9) function. At ``suspend'' and ``standby'' time, power hooks are called in reverse order, i.e., the p... |
doshutdownhooks(9) -- run all shutdown hooks
|
The doshutdownhooks() function invokes all shutdown hooks established using the shutdownhook_establish(9) function. Shutdown hooks are called in reverse order, i.e., the shutdown hook established last... |
dostartuphooks(9) -- run all startup hooks
|
The dostartuphooks() function invokes all startup hooks established using the startuphook_establish(9) function. Startup hooks are called in order, i.e., the startup hook established first will be cal... |
extattr(9) -- virtual file system named extended attributes
|
Named extended attributes allow additional meta-data to be associated with vnodes representing files and directories. The semantics of this additional data is that of a "name=value" pair, where a na... |
extent(9) -- general purpose extent manager
|
The extent manager provides management of areas of memory or other enumerable spaces (such as I/O ports). An opaque structure called an extent map keeps track of allocated regions within the enumerabl... |
extent_alloc(9) -- general purpose extent manager
|
The extent manager provides management of areas of memory or other enumerable spaces (such as I/O ports). An opaque structure called an extent map keeps track of allocated regions within the enumerabl... |
extent_alloc_region(9) -- general purpose extent manager
|
The extent manager provides management of areas of memory or other enumerable spaces (such as I/O ports). An opaque structure called an extent map keeps track of allocated regions within the enumerabl... |
extent_alloc_subregion(9) -- general purpose extent manager
|
The extent manager provides management of areas of memory or other enumerable spaces (such as I/O ports). An opaque structure called an extent map keeps track of allocated regions within the enumerabl... |
extent_create(9) -- general purpose extent manager
|
The extent manager provides management of areas of memory or other enumerable spaces (such as I/O ports). An opaque structure called an extent map keeps track of allocated regions within the enumerabl... |
extent_destroy(9) -- general purpose extent manager
|
The extent manager provides management of areas of memory or other enumerable spaces (such as I/O ports). An opaque structure called an extent map keeps track of allocated regions within the enumerabl... |
extent_free(9) -- general purpose extent manager
|
The extent manager provides management of areas of memory or other enumerable spaces (such as I/O ports). An opaque structure called an extent map keeps track of allocated regions within the enumerabl... |
extent_print(9) -- general purpose extent manager
|
The extent manager provides management of areas of memory or other enumerable spaces (such as I/O ports). An opaque structure called an extent map keeps track of allocated regions within the enumerabl... |
falloc(9) -- an overview of file descriptor handling
|
These functions provide the interface for the UNIX file descriptors. File descriptors can be used to access vnodes (see vnode(9)), sockets (see socket(2)), pipes (see pipe(2)), kqueues (see kqueue(2))... |
fdrelease(9) -- an overview of file descriptor handling
|
These functions provide the interface for the UNIX file descriptors. File descriptors can be used to access vnodes (see vnode(9)), sockets (see socket(2)), pipes (see pipe(2)), kqueues (see kqueue(2))... |
fd_getfile(9) -- an overview of file descriptor handling
|
These functions provide the interface for the UNIX file descriptors. File descriptors can be used to access vnodes (see vnode(9)), sockets (see socket(2)), pipes (see pipe(2)), kqueues (see kqueue(2))... |
ffs(9) -- kernel library routines
|
The kern library implements a set of useful functions and macros inside the kernel. |
file(9) -- an overview of file descriptor handling
|
These functions provide the interface for the UNIX file descriptors. File descriptors can be used to access vnodes (see vnode(9)), sockets (see socket(2)), pipes (see pipe(2)), kqueues (see kqueue(2))... |
fork1(9) -- create a new process
|
fork1() creates a new process out of p1, which should be the current process. This function is used primarily to implement the fork(2), rfork(2), vfork(2) system calls, as well as the kthread_create(9... |
free(9) -- kernel memory allocator
|
The malloc() function allocates uninitialized memory in kernel address space for an object whose size is specified by size. free() releases memory at address addr that was previously allocated by mall... |
FREE(9) -- kernel memory allocator
|
The malloc() function allocates uninitialized memory in kernel address space for an object whose size is specified by size. free() releases memory at address addr that was previously allocated by mall... |
FREF(9) -- an overview of file descriptor handling
|
These functions provide the interface for the UNIX file descriptors. File descriptors can be used to access vnodes (see vnode(9)), sockets (see socket(2)), pipes (see pipe(2)), kqueues (see kqueue(2))... |
FRELE(9) -- an overview of file descriptor handling
|
These functions provide the interface for the UNIX file descriptors. File descriptors can be used to access vnodes (see vnode(9)), sockets (see socket(2)), pipes (see pipe(2)), kqueues (see kqueue(2))... |
getbintime(9) -- system clock
|
This family of functions return the system clock in various different formats. The functions with the "uptime" suffix return the monotonically increasing time since boot. The functions without "up... |
getbinuptime(9) -- system clock
|
This family of functions return the system clock in various different formats. The functions with the "uptime" suffix return the monotonically increasing time since boot. The functions without "up... |
getdevvp(9) -- create a vnode for a device
|
The getdevvp() function creates a vnode for a device of type type with a device number of dev, and returns a pointer to it in vpp. Its arguments are: dev The device number of the desired device. vpp W... |
getmicrotime(9) -- system clock
|
This family of functions return the system clock in various different formats. The functions with the "uptime" suffix return the monotonically increasing time since boot. The functions without "up... |
getmicrouptime(9) -- system clock
|
This family of functions return the system clock in various different formats. The functions with the "uptime" suffix return the monotonically increasing time since boot. The functions without "up... |
getnanotime(9) -- system clock
|
This family of functions return the system clock in various different formats. The functions with the "uptime" suffix return the monotonically increasing time since boot. The functions without "up... |
getnanouptime(9) -- system clock
|
This family of functions return the system clock in various different formats. The functions with the "uptime" suffix return the monotonically increasing time since boot. The functions without "up... |
getnewvnode(9) -- get a new vnode
|
The getnewvnode() function initializes a new vnode, assigning it the vnode operations passed in vops. It will have its v_tag field set to tag and be placed in the mount queue for the mount point repre... |
getsn(9) -- kernel library routines
|
The kern library implements a set of useful functions and macros inside the kernel. |
getsock(9) -- an overview of file descriptor handling
|
These functions provide the interface for the UNIX file descriptors. File descriptors can be used to access vnodes (see vnode(9)), sockets (see socket(2)), pipes (see pipe(2)), kqueues (see kqueue(2))... |
getvnode(9) -- an overview of file descriptor handling
|
These functions provide the interface for the UNIX file descriptors. File descriptors can be used to access vnodes (see vnode(9)), sockets (see socket(2)), pipes (see pipe(2)), kqueues (see kqueue(2))... |
get_random_bytes(9) -- device kernel interface
|
The add_mouse_randomness(), add_tty_randomness(), add_net_randomness(), add_disk_randomness() and add_audio_randomness() routines are used to supply data for the random data source device for further ... |
gsignal(9) -- post signal to a process
|
These functions post a signal to one or more processes. The argument signum common to all three functions should be in the range [1-NSIG]. The psignal() function posts signal number signum to the proc... |
hardclock(9) -- real-time system clock
|
hardclock() implements the real-time system clock, interrupting hz(9) times a second. The argument frame is an opaque, machine dependent structure that encapsulates the previous machine state. hardclo... |
hash(9) -- general kernel hashing functions
|
The hash32() functions are used to give a consistent and general interface to a decent hashing algorithm within the kernel. These functions can be used to hash ASCII NUL terminated strings, as well as... |
hashinit(9) -- kernel hashtable functions
|
The hashinit() function is used to allocate a hashtable of a desired size given by the num argument. The hashinit() function will round this number to the next power of two, and allocate and initializ... |
hook_disestablish(9) -- add or remove a hook from a specified list
|
The hook_establish() function adds fn to the list of hooks invoked by dohooks(9). If tail is non-zero, the hook is added to the tail of the list denoted by the TAILQ_HEAD pointer head, otherwise to th... |
hook_establish(9) -- add or remove a hook from a specified list
|
The hook_establish() function adds fn to the list of hooks invoked by dohooks(9). If tail is non-zero, the hook is added to the tail of the list denoted by the TAILQ_HEAD pointer head, otherwise to th... |
hz(9) -- system time model
|
The system is driven by hardclock(9) interrupts, which occur at hz frequency, and are used to keep track of real time. On systems where another independent clock is available, it is set at stathz freq... |
hzto(9) -- translate absolute time to timeout delay
|
The hzto() function computes the number of hz until the specified time occurs. This is mainly used to translate a timeval into a suitable argument for timeout(9). |
iic(9) -- Inter IC (I2C) bus
|
I2C is a two-wire bus developed by Philips used for connecting integrated circuits. It is commonly used for connecting devices such as EEPROMs, temperature sensors, fan controllers, real-time clocks, ... |
imax(9) -- kernel library routines
|
The kern library implements a set of useful functions and macros inside the kernel. |
imin(9) -- kernel library routines
|
The kern library implements a set of useful functions and macros inside the kernel. |
inittodr(9) -- initialize system time
|
The inittodr() function determines the time and sets the system clock. It tries to pick the correct time using a set of heuristics that examine the system's battery-backed clock and the time reported... |
intro(9) -- introduction to the kernel internals
|
The manual pages in section 9 contain information related to the internal kernel data structures, variables and functions. |
KASSERT(9) -- kernel library routines
|
The kern library implements a set of useful functions and macros inside the kernel. |
KDASSERT(9) -- kernel library routines
|
The kern library implements a set of useful functions and macros inside the kernel. |
kern(9) -- kernel library routines
|
The kern library implements a set of useful functions and macros inside the kernel. |
knote(9) -- raise kernel event
|
The knote() function provides a hook into the kqueue kernel event notification mechanism to allow sections of the kernel to raise a kernel event in the form of a `knote', which is a struct knote as d... |
KNOTE(9) -- raise kernel event
|
The knote() function provides a hook into the kqueue kernel event notification mechanism to allow sections of the kernel to raise a kernel event in the form of a `knote', which is a struct knote as d... |
kthread(9) -- kernel threads
|
Kernel threads are system light-weight processes: cloned from process 0 (the swapper), sharing its memory map and limits, but with a copy of its file descriptor table. They don't receive broadcast no... |
kthread_create(9) -- kernel threads
|
Kernel threads are system light-weight processes: cloned from process 0 (the swapper), sharing its memory map and limits, but with a copy of its file descriptor table. They don't receive broadcast no... |
kthread_create_deferred(9) -- kernel threads
|
Kernel threads are system light-weight processes: cloned from process 0 (the swapper), sharing its memory map and limits, but with a copy of its file descriptor table. They don't receive broadcast no... |
kthread_exit(9) -- kernel threads
|
Kernel threads are system light-weight processes: cloned from process 0 (the swapper), sharing its memory map and limits, but with a copy of its file descriptor table. They don't receive broadcast no... |
ktrace(9) -- process tracing kernel interface
|
This interface is meant for kernel subsystems and machine dependent code to inform the user about the events occurring to the process should tracing of such be enabled using the ktrace(2) system call.... |
ktrcsw(9) -- process tracing kernel interface
|
This interface is meant for kernel subsystems and machine dependent code to inform the user about the events occurring to the process should tracing of such be enabled using the ktrace(2) system call.... |
ktremul(9) -- process tracing kernel interface
|
This interface is meant for kernel subsystems and machine dependent code to inform the user about the events occurring to the process should tracing of such be enabled using the ktrace(2) system call.... |
ktrgenio(9) -- process tracing kernel interface
|
This interface is meant for kernel subsystems and machine dependent code to inform the user about the events occurring to the process should tracing of such be enabled using the ktrace(2) system call.... |
ktrnamei(9) -- process tracing kernel interface
|
This interface is meant for kernel subsystems and machine dependent code to inform the user about the events occurring to the process should tracing of such be enabled using the ktrace(2) system call.... |
KTRPOINT(9) -- process tracing kernel interface
|
This interface is meant for kernel subsystems and machine dependent code to inform the user about the events occurring to the process should tracing of such be enabled using the ktrace(2) system call.... |
ktrpsig(9) -- process tracing kernel interface
|
This interface is meant for kernel subsystems and machine dependent code to inform the user about the events occurring to the process should tracing of such be enabled using the ktrace(2) system call.... |
ktrsyscall(9) -- process tracing kernel interface
|
This interface is meant for kernel subsystems and machine dependent code to inform the user about the events occurring to the process should tracing of such be enabled using the ktrace(2) system call.... |
ktrsysret(9) -- process tracing kernel interface
|
This interface is meant for kernel subsystems and machine dependent code to inform the user about the events occurring to the process should tracing of such be enabled using the ktrace(2) system call.... |
lmax(9) -- kernel library routines
|
The kern library implements a set of useful functions and macros inside the kernel. |
lmin(9) -- kernel library routines
|
The kern library implements a set of useful functions and macros inside the kernel. |
locc(9) -- kernel library routines
|
The kern library implements a set of useful functions and macros inside the kernel. |
lock(9) -- kernel lock functions
|
The lock functions provide synchronisation in the kernel by preventing multiple processes from simultaneously executing critical sections of code accessing shared data. A number of different locks are... |
lockinit(9) -- kernel lock functions
|
The lock functions provide synchronisation in the kernel by preventing multiple processes from simultaneously executing critical sections of code accessing shared data. A number of different locks are... |
lockmgr(9) -- kernel lock functions
|
The lock functions provide synchronisation in the kernel by preventing multiple processes from simultaneously executing critical sections of code accessing shared data. A number of different locks are... |
lockmgr_printinfo(9) -- kernel lock functions
|
The lock functions provide synchronisation in the kernel by preventing multiple processes from simultaneously executing critical sections of code accessing shared data. A number of different locks are... |
lockstatus(9) -- kernel lock functions
|
The lock functions provide synchronisation in the kernel by preventing multiple processes from simultaneously executing critical sections of code accessing shared data. A number of different locks are... |
log(9) -- log a message from the kernel through the /dev/klog device
|
The log() function allows the kernel to send formatted messages to user processes listening on /dev/klog. Usually syslogd(8) monitors /dev/klog for these messages and writes them to a log file. All me... |
lookup(9) -- pathname lookup
|
The namei interface is used to convert pathnames to file system vnodes. The name of the interface is actually a contraction of the words name and inode for name-to-inode conversion, in the days before... |
malloc(9) -- kernel memory allocator
|
The malloc() function allocates uninitialized memory in kernel address space for an object whose size is specified by size. free() releases memory at address addr that was previously allocated by mall... |
MALLOC(9) -- kernel memory allocator
|
The malloc() function allocates uninitialized memory in kernel address space for an object whose size is specified by size. free() releases memory at address addr that was previously allocated by mall... |
max(9) -- kernel library routines
|
The kern library implements a set of useful functions and macros inside the kernel. |
mbuf(9) -- Kernel memory management for networking protocols
|
The mbuf functions provide a way to manage the memory buffers used by the kernel's networking subsystem. Several functions and macros are used to allocate and deallocate mbufs, but also to get, injec... |
mbuf_tags(9) -- a framework for generic packet attributes
|
These functions allow the manipulation of generic packet attributes. They are used by the kernel to keep track of operations done or scheduled to happen to packets. These attributes are attached to mb... |
MCHTYPE(9) -- Kernel memory management for networking protocols
|
The mbuf functions provide a way to manage the memory buffers used by the kernel's networking subsystem. Several functions and macros are used to allocate and deallocate mbufs, but also to get, injec... |
MCLGET(9) -- Kernel memory management for networking protocols
|
The mbuf functions provide a way to manage the memory buffers used by the kernel's networking subsystem. Several functions and macros are used to allocate and deallocate mbufs, but also to get, injec... |
md5(9) -- message digest routines
|
The md5 module implements the RSA Data Security, Inc. MD5 Message-Digest Algorithm (MD5). It produces 128-bit MD5 Digest of data. MD5Init must be called just before MD5Transform() will be used to prod... |
MD5Init(9) -- message digest routines
|
The md5 module implements the RSA Data Security, Inc. MD5 Message-Digest Algorithm (MD5). It produces 128-bit MD5 Digest of data. MD5Init must be called just before MD5Transform() will be used to prod... |
MD5Transform(9) -- message digest routines
|
The md5 module implements the RSA Data Security, Inc. MD5 Message-Digest Algorithm (MD5). It produces 128-bit MD5 Digest of data. MD5Init must be called just before MD5Transform() will be used to prod... |
memchr(9) -- kernel library routines
|
The kern library implements a set of useful functions and macros inside the kernel. |
memcmp(9) -- kernel library routines
|
The kern library implements a set of useful functions and macros inside the kernel. |
MEXTADD(9) -- Kernel memory management for networking protocols
|
The mbuf functions provide a way to manage the memory buffers used by the kernel's networking subsystem. Several functions and macros are used to allocate and deallocate mbufs, but also to get, injec... |
MEXTALLOC(9) -- Kernel memory management for networking protocols
|
The mbuf functions provide a way to manage the memory buffers used by the kernel's networking subsystem. Several functions and macros are used to allocate and deallocate mbufs, but also to get, injec... |
MFREE(9) -- Kernel memory management for networking protocols
|
The mbuf functions provide a way to manage the memory buffers used by the kernel's networking subsystem. Several functions and macros are used to allocate and deallocate mbufs, but also to get, injec... |
MGET(9) -- Kernel memory management for networking protocols
|
The mbuf functions provide a way to manage the memory buffers used by the kernel's networking subsystem. Several functions and macros are used to allocate and deallocate mbufs, but also to get, injec... |
MGETHDR(9) -- Kernel memory management for networking protocols
|
The mbuf functions provide a way to manage the memory buffers used by the kernel's networking subsystem. Several functions and macros are used to allocate and deallocate mbufs, but also to get, injec... |
MH_ALIGN(9) -- Kernel memory management for networking protocols
|
The mbuf functions provide a way to manage the memory buffers used by the kernel's networking subsystem. Several functions and macros are used to allocate and deallocate mbufs, but also to get, injec... |
microtime(9) -- system clock
|
This family of functions return the system clock in various different formats. The functions with the "uptime" suffix return the monotonically increasing time since boot. The functions without "up... |
microuptime(9) -- system clock
|
This family of functions return the system clock in various different formats. The functions with the "uptime" suffix return the monotonically increasing time since boot. The functions without "up... |
min(9) -- kernel library routines
|
The kern library implements a set of useful functions and macros inside the kernel. |
mi_switch(9) -- switch to another process context
|
The mi_switch() function implements the machine-independent prelude to a process context switch. It is called from only a few distinguished places in the kernel code as a result of the principle of no... |
mono_time(9) -- system time variables
|
The time variable is the system's ``wall time'' clock. It is set at boot by inittodr(9), and is updated by the settimeofday(2) system call and by periodic clock interrupts. The boottime variable ho... |
m_adj(9) -- Kernel memory management for networking protocols
|
The mbuf functions provide a way to manage the memory buffers used by the kernel's networking subsystem. Several functions and macros are used to allocate and deallocate mbufs, but also to get, injec... |
M_ALIGN(9) -- Kernel memory management for networking protocols
|
The mbuf functions provide a way to manage the memory buffers used by the kernel's networking subsystem. Several functions and macros are used to allocate and deallocate mbufs, but also to get, injec... |
m_apply(9) -- Kernel memory management for networking protocols
|
The mbuf functions provide a way to manage the memory buffers used by the kernel's networking subsystem. Several functions and macros are used to allocate and deallocate mbufs, but also to get, injec... |
m_cat(9) -- Kernel memory management for networking protocols
|
The mbuf functions provide a way to manage the memory buffers used by the kernel's networking subsystem. Several functions and macros are used to allocate and deallocate mbufs, but also to get, injec... |
m_copyback(9) -- Kernel memory management for networking protocols
|
The mbuf functions provide a way to manage the memory buffers used by the kernel's networking subsystem. Several functions and macros are used to allocate and deallocate mbufs, but also to get, injec... |
m_copydata(9) -- Kernel memory management for networking protocols
|
The mbuf functions provide a way to manage the memory buffers used by the kernel's networking subsystem. Several functions and macros are used to allocate and deallocate mbufs, but also to get, injec... |
m_copym(9) -- Kernel memory management for networking protocols
|
The mbuf functions provide a way to manage the memory buffers used by the kernel's networking subsystem. Several functions and macros are used to allocate and deallocate mbufs, but also to get, injec... |
m_copym2(9) -- Kernel memory management for networking protocols
|
The mbuf functions provide a way to manage the memory buffers used by the kernel's networking subsystem. Several functions and macros are used to allocate and deallocate mbufs, but also to get, injec... |
m_devget(9) -- Kernel memory management for networking protocols
|
The mbuf functions provide a way to manage the memory buffers used by the kernel's networking subsystem. Several functions and macros are used to allocate and deallocate mbufs, but also to get, injec... |
m_free(9) -- Kernel memory management for networking protocols
|
The mbuf functions provide a way to manage the memory buffers used by the kernel's networking subsystem. Several functions and macros are used to allocate and deallocate mbufs, but also to get, injec... |
m_freem(9) -- Kernel memory management for networking protocols
|
The mbuf functions provide a way to manage the memory buffers used by the kernel's networking subsystem. Several functions and macros are used to allocate and deallocate mbufs, but also to get, injec... |
m_get(9) -- Kernel memory management for networking protocols
|
The mbuf functions provide a way to manage the memory buffers used by the kernel's networking subsystem. Several functions and macros are used to allocate and deallocate mbufs, but also to get, injec... |
m_getclr(9) -- Kernel memory management for networking protocols
|
The mbuf functions provide a way to manage the memory buffers used by the kernel's networking subsystem. Several functions and macros are used to allocate and deallocate mbufs, but also to get, injec... |
m_gethdr(9) -- Kernel memory management for networking protocols
|
The mbuf functions provide a way to manage the memory buffers used by the kernel's networking subsystem. Several functions and macros are used to allocate and deallocate mbufs, but also to get, injec... |
m_getptr(9) -- Kernel memory management for networking protocols
|
The mbuf functions provide a way to manage the memory buffers used by the kernel's networking subsystem. Several functions and macros are used to allocate and deallocate mbufs, but also to get, injec... |
m_inject(9) -- Kernel memory management for networking protocols
|
The mbuf functions provide a way to manage the memory buffers used by the kernel's networking subsystem. Several functions and macros are used to allocate and deallocate mbufs, but also to get, injec... |
M_LEADINGSPACE(9) -- Kernel memory management for networking protocols
|
The mbuf functions provide a way to manage the memory buffers used by the kernel's networking subsystem. Several functions and macros are used to allocate and deallocate mbufs, but also to get, injec... |
M_PREPEND(9) -- Kernel memory management for networking protocols
|
The mbuf functions provide a way to manage the memory buffers used by the kernel's networking subsystem. Several functions and macros are used to allocate and deallocate mbufs, but also to get, injec... |
m_prepend(9) -- Kernel memory management for networking protocols
|
The mbuf functions provide a way to manage the memory buffers used by the kernel's networking subsystem. Several functions and macros are used to allocate and deallocate mbufs, but also to get, injec... |
m_pulldown(9) -- Kernel memory management for networking protocols
|
The mbuf functions provide a way to manage the memory buffers used by the kernel's networking subsystem. Several functions and macros are used to allocate and deallocate mbufs, but also to get, injec... |
m_pullup(9) -- Kernel memory management for networking protocols
|
The mbuf functions provide a way to manage the memory buffers used by the kernel's networking subsystem. Several functions and macros are used to allocate and deallocate mbufs, but also to get, injec... |
m_pullup2(9) -- Kernel memory management for networking protocols
|
The mbuf functions provide a way to manage the memory buffers used by the kernel's networking subsystem. Several functions and macros are used to allocate and deallocate mbufs, but also to get, injec... |
M_READONLY(9) -- Kernel memory management for networking protocols
|
The mbuf functions provide a way to manage the memory buffers used by the kernel's networking subsystem. Several functions and macros are used to allocate and deallocate mbufs, but also to get, injec... |
m_reclaim(9) -- Kernel memory management for networking protocols
|
The mbuf functions provide a way to manage the memory buffers used by the kernel's networking subsystem. Several functions and macros are used to allocate and deallocate mbufs, but also to get, injec... |
m_retry(9) -- Kernel memory management for networking protocols
|
The mbuf functions provide a way to manage the memory buffers used by the kernel's networking subsystem. Several functions and macros are used to allocate and deallocate mbufs, but also to get, injec... |
m_retryhdr(9) -- Kernel memory management for networking protocols
|
The mbuf functions provide a way to manage the memory buffers used by the kernel's networking subsystem. Several functions and macros are used to allocate and deallocate mbufs, but also to get, injec... |
m_split(9) -- Kernel memory management for networking protocols
|
The mbuf functions provide a way to manage the memory buffers used by the kernel's networking subsystem. Several functions and macros are used to allocate and deallocate mbufs, but also to get, injec... |
M_TRAILINGSPACE(9) -- Kernel memory management for networking protocols
|
The mbuf functions provide a way to manage the memory buffers used by the kernel's networking subsystem. Several functions and macros are used to allocate and deallocate mbufs, but also to get, injec... |
m_zero(9) -- Kernel memory management for networking protocols
|
The mbuf functions provide a way to manage the memory buffers used by the kernel's networking subsystem. Several functions and macros are used to allocate and deallocate mbufs, but also to get, injec... |
namei(9) -- pathname lookup
|
The namei interface is used to convert pathnames to file system vnodes. The name of the interface is actually a contraction of the words name and inode for name-to-inode conversion, in the days before... |
nanotime(9) -- system clock
|
This family of functions return the system clock in various different formats. The functions with the "uptime" suffix return the monotonically increasing time since boot. The functions without "up... |
nanouptime(9) -- system clock
|
This family of functions return the system clock in various different formats. The functions with the "uptime" suffix return the monotonically increasing time since boot. The functions without "up... |
NDINIT(9) -- pathname lookup
|
The namei interface is used to convert pathnames to file system vnodes. The name of the interface is actually a contraction of the words name and inode for name-to-inode conversion, in the days before... |
panic(9) -- Bring down system on fatal error
|
The panic() function makes the OpenBSD system terminate. The message fmt is a printf(9) style format string. The message is printed to the console and the location pointed to by the global char pointe... |
pfind(9) -- find process / process group by number
|
The pfind() and pgfind() functions retrieve process and progress group structures from process and process group IDs. Both functions return NULL if the requested ID can't be found. |
pgfind(9) -- find process / process group by number
|
The pfind() and pgfind() functions retrieve process and progress group structures from process and process group IDs. Both functions return NULL if the requested ID can't be found. |
pgsignal(9) -- post signal to a process
|
These functions post a signal to one or more processes. The argument signum common to all three functions should be in the range [1-NSIG]. The psignal() function posts signal number signum to the proc... |
physio(9) -- initiate I/O on raw devices
|
physio() is a helper function typically called from character device read and write routines to start I/O on a user process buffer. It calls back on the provided strategy routine one or more times to ... |
pmap(9) -- machine dependent interface to the MMU
|
The architecture-dependent pmap module describes how the physical mapping is done between the user-processes and kernel virtual addresses and the physical addresses of the main memory, providing machi... |
pmap_clear_modify(9) -- machine dependent interface to the MMU
|
The architecture-dependent pmap module describes how the physical mapping is done between the user-processes and kernel virtual addresses and the physical addresses of the main memory, providing machi... |
pmap_clear_reference(9) -- machine dependent interface to the MMU
|
The architecture-dependent pmap module describes how the physical mapping is done between the user-processes and kernel virtual addresses and the physical addresses of the main memory, providing machi... |
pmap_collect(9) -- machine dependent interface to the MMU
|
The architecture-dependent pmap module describes how the physical mapping is done between the user-processes and kernel virtual addresses and the physical addresses of the main memory, providing machi... |
pmap_copy(9) -- machine dependent interface to the MMU
|
The architecture-dependent pmap module describes how the physical mapping is done between the user-processes and kernel virtual addresses and the physical addresses of the main memory, providing machi... |
pmap_copy_page(9) -- machine dependent interface to the MMU
|
The architecture-dependent pmap module describes how the physical mapping is done between the user-processes and kernel virtual addresses and the physical addresses of the main memory, providing machi... |
pmap_create(9) -- machine dependent interface to the MMU
|
The architecture-dependent pmap module describes how the physical mapping is done between the user-processes and kernel virtual addresses and the physical addresses of the main memory, providing machi... |
pmap_destroy(9) -- machine dependent interface to the MMU
|
The architecture-dependent pmap module describes how the physical mapping is done between the user-processes and kernel virtual addresses and the physical addresses of the main memory, providing machi... |
pmap_enter(9) -- machine dependent interface to the MMU
|
The architecture-dependent pmap module describes how the physical mapping is done between the user-processes and kernel virtual addresses and the physical addresses of the main memory, providing machi... |
pmap_growkernel(9) -- machine dependent interface to the MMU
|
The architecture-dependent pmap module describes how the physical mapping is done between the user-processes and kernel virtual addresses and the physical addresses of the main memory, providing machi... |
pmap_init(9) -- machine dependent interface to the MMU
|
The architecture-dependent pmap module describes how the physical mapping is done between the user-processes and kernel virtual addresses and the physical addresses of the main memory, providing machi... |
pmap_is_modified(9) -- machine dependent interface to the MMU
|
The architecture-dependent pmap module describes how the physical mapping is done between the user-processes and kernel virtual addresses and the physical addresses of the main memory, providing machi... |
pmap_is_referenced(9) -- machine dependent interface to the MMU
|
The architecture-dependent pmap module describes how the physical mapping is done between the user-processes and kernel virtual addresses and the physical addresses of the main memory, providing machi... |
pmap_kenter_pa(9) -- machine dependent interface to the MMU
|
The architecture-dependent pmap module describes how the physical mapping is done between the user-processes and kernel virtual addresses and the physical addresses of the main memory, providing machi... |
pmap_kremove(9) -- machine dependent interface to the MMU
|
The architecture-dependent pmap module describes how the physical mapping is done between the user-processes and kernel virtual addresses and the physical addresses of the main memory, providing machi... |
pmap_page_protect(9) -- machine dependent interface to the MMU
|
The architecture-dependent pmap module describes how the physical mapping is done between the user-processes and kernel virtual addresses and the physical addresses of the main memory, providing machi... |
pmap_protect(9) -- machine dependent interface to the MMU
|
The architecture-dependent pmap module describes how the physical mapping is done between the user-processes and kernel virtual addresses and the physical addresses of the main memory, providing machi... |
pmap_reference(9) -- machine dependent interface to the MMU
|
The architecture-dependent pmap module describes how the physical mapping is done between the user-processes and kernel virtual addresses and the physical addresses of the main memory, providing machi... |
pmap_remove(9) -- machine dependent interface to the MMU
|
The architecture-dependent pmap module describes how the physical mapping is done between the user-processes and kernel virtual addresses and the physical addresses of the main memory, providing machi... |
pmap_steal_memory(9) -- machine dependent interface to the MMU
|
The architecture-dependent pmap module describes how the physical mapping is done between the user-processes and kernel virtual addresses and the physical addresses of the main memory, providing machi... |
pmap_unwire(9) -- machine dependent interface to the MMU
|
The architecture-dependent pmap module describes how the physical mapping is done between the user-processes and kernel virtual addresses and the physical addresses of the main memory, providing machi... |
pmap_update(9) -- machine dependent interface to the MMU
|
The architecture-dependent pmap module describes how the physical mapping is done between the user-processes and kernel virtual addresses and the physical addresses of the main memory, providing machi... |
pmap_virtual_space(9) -- machine dependent interface to the MMU
|
The architecture-dependent pmap module describes how the physical mapping is done between the user-processes and kernel virtual addresses and the physical addresses of the main memory, providing machi... |
pmap_zero_page(9) -- machine dependent interface to the MMU
|
The architecture-dependent pmap module describes how the physical mapping is done between the user-processes and kernel virtual addresses and the physical addresses of the main memory, providing machi... |
pool(9) -- resource-pool manager
|
These utility routines provide management of pools of fixedsized areas of memory. Resource pools set aside an amount of memory for exclusive use by the resource pool owner. This can be used by applica... |
pool_cache_destroy(9) -- resource-pool manager
|
These utility routines provide management of pools of fixedsized areas of memory. Resource pools set aside an amount of memory for exclusive use by the resource pool owner. This can be used by applica... |
pool_cache_destruct_object(9) -- resource-pool manager
|
These utility routines provide management of pools of fixedsized areas of memory. Resource pools set aside an amount of memory for exclusive use by the resource pool owner. This can be used by applica... |
pool_cache_get(9) -- resource-pool manager
|
These utility routines provide management of pools of fixedsized areas of memory. Resource pools set aside an amount of memory for exclusive use by the resource pool owner. This can be used by applica... |
pool_cache_init(9) -- resource-pool manager
|
These utility routines provide management of pools of fixedsized areas of memory. Resource pools set aside an amount of memory for exclusive use by the resource pool owner. This can be used by applica... |
pool_cache_invalidate(9) -- resource-pool manager
|
These utility routines provide management of pools of fixedsized areas of memory. Resource pools set aside an amount of memory for exclusive use by the resource pool owner. This can be used by applica... |
pool_cache_put(9) -- resource-pool manager
|
These utility routines provide management of pools of fixedsized areas of memory. Resource pools set aside an amount of memory for exclusive use by the resource pool owner. This can be used by applica... |
pool_destroy(9) -- resource-pool manager
|
These utility routines provide management of pools of fixedsized areas of memory. Resource pools set aside an amount of memory for exclusive use by the resource pool owner. This can be used by applica... |
pool_get(9) -- resource-pool manager
|
These utility routines provide management of pools of fixedsized areas of memory. Resource pools set aside an amount of memory for exclusive use by the resource pool owner. This can be used by applica... |
pool_init(9) -- resource-pool manager
|
These utility routines provide management of pools of fixedsized areas of memory. Resource pools set aside an amount of memory for exclusive use by the resource pool owner. This can be used by applica... |
pool_prime(9) -- resource-pool manager
|
These utility routines provide management of pools of fixedsized areas of memory. Resource pools set aside an amount of memory for exclusive use by the resource pool owner. This can be used by applica... |
pool_put(9) -- resource-pool manager
|
These utility routines provide management of pools of fixedsized areas of memory. Resource pools set aside an amount of memory for exclusive use by the resource pool owner. This can be used by applica... |
pool_sethiwat(9) -- resource-pool manager
|
These utility routines provide management of pools of fixedsized areas of memory. Resource pools set aside an amount of memory for exclusive use by the resource pool owner. This can be used by applica... |
pool_setlowat(9) -- resource-pool manager
|
These utility routines provide management of pools of fixedsized areas of memory. Resource pools set aside an amount of memory for exclusive use by the resource pool owner. This can be used by applica... |
powerhook_disestablish(9) -- add or remove a power hook
|
The powerhook_establish() function adds fn to the list of hooks invoked by dopowerhooks(9) during any change in apm(4) power state (i.e., during a ``suspend'', ``standby'', or ``resume''). When ... |
powerhook_establish(9) -- add or remove a power hook
|
The powerhook_establish() function adds fn to the list of hooks invoked by dopowerhooks(9) during any change in apm(4) power state (i.e., during a ``suspend'', ``standby'', or ``resume''). When ... |
ppsratecheck(9) -- function to help implement rate-limited actions
|
The ppsratecheck() function provides an easy way to perform packet-persec, or event-per-sec, rate limitation. The motivation for implementing ppsratecheck() was to provide a mechanism that could be us... |
printf(9) -- kernel formatted output conversion
|
The printf(), snprintf(), vprintf(), vsnprintf(), uprintf(), ttyprintf(), and db_printf() functions allow the kernel to send formatted messages to various output devices. The functions printf() and vp... |
profhz(9) -- system time model
|
The system is driven by hardclock(9) interrupts, which occur at hz frequency, and are used to keep track of real time. On systems where another independent clock is available, it is set at stathz freq... |
psignal(9) -- post signal to a process
|
These functions post a signal to one or more processes. The argument signum common to all three functions should be in the range [1-NSIG]. The psignal() function posts signal number signum to the proc... |
radio(9) -- interface between low and high level radio drivers
|
The radio device driver is divided into a high level, hardware independent layer, and a low level hardware dependent layer. The interface between these is the radio_hw_if structure. struct radio_hw_if... |
random(9) -- device kernel interface
|
The add_mouse_randomness(), add_tty_randomness(), add_net_randomness(), add_disk_randomness() and add_audio_randomness() routines are used to supply data for the random data source device for further ... |
rasops(9) -- raster display operations
|
The rasops subsystem is a set of raster operations for wscons(9). The primary data type for using the raster operations is the rasops_info structure in dev/rasops/rasops.h: struct rasops_info { /* * T... |
rasops_init(9) -- raster display operations
|
The rasops subsystem is a set of raster operations for wscons(9). The primary data type for using the raster operations is the rasops_info structure in dev/rasops/rasops.h: struct rasops_info { /* * T... |
rasops_reconfig(9) -- raster display operations
|
The rasops subsystem is a set of raster operations for wscons(9). The primary data type for using the raster operations is the rasops_info structure in dev/rasops/rasops.h: struct rasops_info { /* * T... |
ratecheck(9) -- function to help implement rate-limited actions
|
The ratecheck() function provides a simple time interval check which can be used when implementing time-based rate-limited actions. If the difference between the current monotonically-increasing syste... |
readdisklabel(9) -- disk label management routines
|
This collection of routines provides a disklabel management interface to kernel device drivers. These routines are classified as machine- or architecture-dependent because of restrictions imposed by t... |
relookup(9) -- pathname lookup
|
The namei interface is used to convert pathnames to file system vnodes. The name of the interface is actually a contraction of the words name and inode for name-to-inode conversion, in the days before... |
resettodr(9) -- set battery-backed clock from system time
|
The resettodr() function sets the system's battery backed clock based on the contents of the system time variable. |
runtime(9) -- system time variables
|
The time variable is the system's ``wall time'' clock. It is set at boot by inittodr(9), and is updated by the settimeofday(2) system call and by periodic clock interrupts. The boottime variable ho... |
scanc(9) -- kernel library routines
|
The kern library implements a set of useful functions and macros inside the kernel. |
setdisklabel(9) -- disk label management routines
|
This collection of routines provides a disklabel management interface to kernel device drivers. These routines are classified as machine- or architecture-dependent because of restrictions imposed by t... |
shutdownhook_disestablish(9) -- add or remove a shutdown hook
|
The shutdownhook_establish() function adds fn to the list of hooks invoked by doshutdownhooks(9) at shutdown. When invoked, the hook function fn will be passed arg as its only argument. The shutdownho... |
shutdownhook_establish(9) -- add or remove a shutdown hook
|
The shutdownhook_establish() function adds fn to the list of hooks invoked by doshutdownhooks(9) at shutdown. When invoked, the hook function fn will be passed arg as its only argument. The shutdownho... |
simple_lock(9) -- kernel lock functions
|
The lock functions provide synchronisation in the kernel by preventing multiple processes from simultaneously executing critical sections of code accessing shared data. A number of different locks are... |
simple_lock_init(9) -- kernel lock functions
|
The lock functions provide synchronisation in the kernel by preventing multiple processes from simultaneously executing critical sections of code accessing shared data. A number of different locks are... |
simple_lock_try(9) -- kernel lock functions
|
The lock functions provide synchronisation in the kernel by preventing multiple processes from simultaneously executing critical sections of code accessing shared data. A number of different locks are... |
simple_unlock(9) -- kernel lock functions
|
The lock functions provide synchronisation in the kernel by preventing multiple processes from simultaneously executing critical sections of code accessing shared data. A number of different locks are... |
skpc(9) -- kernel library routines
|
The kern library implements a set of useful functions and macros inside the kernel. |
sleep(9) -- process context sleep and wakeup
|
These functions implement voluntary context switching. tsleep() and sleep() are used throughout the kernel whenever processing in the current context can not continue for any of the following reasons:... |
snprintf(9) -- kernel formatted output conversion
|
The printf(), snprintf(), vprintf(), vsnprintf(), uprintf(), ttyprintf(), and db_printf() functions allow the kernel to send formatted messages to various output devices. The functions printf() and vp... |
spl(9) -- modify system interrupt priority level
|
These functions raise and lower the system priority level. They are used by kernel code to block interrupts with priority less than or equal to the named level (i.e., spltty() blocks interrupts of pri... |
spl0(9) -- modify system interrupt priority level
|
These functions raise and lower the system priority level. They are used by kernel code to block interrupts with priority less than or equal to the named level (i.e., spltty() blocks interrupts of pri... |
splassert(9) -- modify system interrupt priority level
|
These functions raise and lower the system priority level. They are used by kernel code to block interrupts with priority less than or equal to the named level (i.e., spltty() blocks interrupts of pri... |
splbio(9) -- modify system interrupt priority level
|
These functions raise and lower the system priority level. They are used by kernel code to block interrupts with priority less than or equal to the named level (i.e., spltty() blocks interrupts of pri... |
splclock(9) -- modify system interrupt priority level
|
These functions raise and lower the system priority level. They are used by kernel code to block interrupts with priority less than or equal to the named level (i.e., spltty() blocks interrupts of pri... |
splhigh(9) -- modify system interrupt priority level
|
These functions raise and lower the system priority level. They are used by kernel code to block interrupts with priority less than or equal to the named level (i.e., spltty() blocks interrupts of pri... |
splimp(9) -- modify system interrupt priority level
|
These functions raise and lower the system priority level. They are used by kernel code to block interrupts with priority less than or equal to the named level (i.e., spltty() blocks interrupts of pri... |
spllowersoftclock(9) -- modify system interrupt priority level
|
These functions raise and lower the system priority level. They are used by kernel code to block interrupts with priority less than or equal to the named level (i.e., spltty() blocks interrupts of pri... |
splnet(9) -- modify system interrupt priority level
|
These functions raise and lower the system priority level. They are used by kernel code to block interrupts with priority less than or equal to the named level (i.e., spltty() blocks interrupts of pri... |
splsched(9) -- modify system interrupt priority level
|
These functions raise and lower the system priority level. They are used by kernel code to block interrupts with priority less than or equal to the named level (i.e., spltty() blocks interrupts of pri... |
splserial(9) -- modify system interrupt priority level
|
These functions raise and lower the system priority level. They are used by kernel code to block interrupts with priority less than or equal to the named level (i.e., spltty() blocks interrupts of pri... |
splsoftclock(9) -- modify system interrupt priority level
|
These functions raise and lower the system priority level. They are used by kernel code to block interrupts with priority less than or equal to the named level (i.e., spltty() blocks interrupts of pri... |
splsoftnet(9) -- modify system interrupt priority level
|
These functions raise and lower the system priority level. They are used by kernel code to block interrupts with priority less than or equal to the named level (i.e., spltty() blocks interrupts of pri... |
splsoftserial(9) -- modify system interrupt priority level
|
These functions raise and lower the system priority level. They are used by kernel code to block interrupts with priority less than or equal to the named level (i.e., spltty() blocks interrupts of pri... |
splsofttty(9) -- modify system interrupt priority level
|
These functions raise and lower the system priority level. They are used by kernel code to block interrupts with priority less than or equal to the named level (i.e., spltty() blocks interrupts of pri... |
splstatclock(9) -- modify system interrupt priority level
|
These functions raise and lower the system priority level. They are used by kernel code to block interrupts with priority less than or equal to the named level (i.e., spltty() blocks interrupts of pri... |
spltty(9) -- modify system interrupt priority level
|
These functions raise and lower the system priority level. They are used by kernel code to block interrupts with priority less than or equal to the named level (i.e., spltty() blocks interrupts of pri... |
splvm(9) -- modify system interrupt priority level
|
These functions raise and lower the system priority level. They are used by kernel code to block interrupts with priority less than or equal to the named level (i.e., spltty() blocks interrupts of pri... |
splx(9) -- modify system interrupt priority level
|
These functions raise and lower the system priority level. They are used by kernel code to block interrupts with priority less than or equal to the named level (i.e., spltty() blocks interrupts of pri... |
srandom(9) -- kernel library routines
|
The kern library implements a set of useful functions and macros inside the kernel. |
startuphook_disestablish(9) -- add or remove a startup hook
|
The startuphook_establish() function adds fn to the list of hooks invoked by dostartuphooks(9) at startup. When invoked, the hook function fn will be passed arg as its only argument. The startuphook_d... |
startuphook_establish(9) -- add or remove a startup hook
|
The startuphook_establish() function adds fn to the list of hooks invoked by dostartuphooks(9) at startup. When invoked, the hook function fn will be passed arg as its only argument. The startuphook_d... |
stathz(9) -- system time model
|
The system is driven by hardclock(9) interrupts, which occur at hz frequency, and are used to keep track of real time. On systems where another independent clock is available, it is set at stathz freq... |
strcmp(9) -- kernel library routines
|
The kern library implements a set of useful functions and macros inside the kernel. |
strlcat(9) -- kernel library routines
|
The kern library implements a set of useful functions and macros inside the kernel. |
strlcpy(9) -- kernel library routines
|
The kern library implements a set of useful functions and macros inside the kernel. |
strlen(9) -- kernel library routines
|
The kern library implements a set of useful functions and macros inside the kernel. |
strncasecmp(9) -- kernel library routines
|
The kern library implements a set of useful functions and macros inside the kernel. |
strncmp(9) -- kernel library routines
|
The kern library implements a set of useful functions and macros inside the kernel. |
strncpy(9) -- kernel library routines
|
The kern library implements a set of useful functions and macros inside the kernel. |
style(9) -- Kernel source file style guide (KNF)
|
This file specifies the preferred style for kernel source files in the OpenBSD source tree. It is also a guide for preferred user land code style. These guidelines should be followed for all new code.... |
syscall(9) -- system calls overview
|
System calls in the kernel are implemented through a set of switch tables for each emulation type. Each table is generated from the ``master'' file by sys/kern/makesyscalls.sh through the appropriat... |
systrace(9) -- enforce policies for system calls
|
These functions are used to enforce policy on the system calls as described in systrace(1). systrace_redirect() should be used to perform a system call number code with arguments args for the process ... |
systrace_exit(9) -- enforce policies for system calls
|
These functions are used to enforce policy on the system calls as described in systrace(1). systrace_redirect() should be used to perform a system call number code with arguments args for the process ... |
systrace_fork(9) -- enforce policies for system calls
|
These functions are used to enforce policy on the system calls as described in systrace(1). systrace_redirect() should be used to perform a system call number code with arguments args for the process ... |
systrace_redirect(9) -- enforce policies for system calls
|
These functions are used to enforce policy on the system calls as described in systrace(1). systrace_redirect() should be used to perform a system call number code with arguments args for the process ... |
tick(9) -- system time model
|
The system is driven by hardclock(9) interrupts, which occur at hz frequency, and are used to keep track of real time. On systems where another independent clock is available, it is set at stathz freq... |
tickadj(9) -- system time model
|
The system is driven by hardclock(9) interrupts, which occur at hz frequency, and are used to keep track of real time. On systems where another independent clock is available, it is set at stathz freq... |
time(9) -- system time variables
|
The time variable is the system's ``wall time'' clock. It is set at boot by inittodr(9), and is updated by the settimeofday(2) system call and by periodic clock interrupts. The boottime variable ho... |
timeout(9) -- execute a function after a specified period of time
|
The timeout API provides a mechanism to execute a function at a given time. The granularity of the time is limited by the granularity of the hardclock(9) timer which executes hz(9) times a second. The... |
timeout_add(9) -- execute a function after a specified period of time
|
The timeout API provides a mechanism to execute a function at a given time. The granularity of the time is limited by the granularity of the hardclock(9) timer which executes hz(9) times a second. The... |
timeout_del(9) -- execute a function after a specified period of time
|
The timeout API provides a mechanism to execute a function at a given time. The granularity of the time is limited by the granularity of the hardclock(9) timer which executes hz(9) times a second. The... |
timeout_initialized(9) -- execute a function after a specified period of time
|
The timeout API provides a mechanism to execute a function at a given time. The granularity of the time is limited by the granularity of the hardclock(9) timer which executes hz(9) times a second. The... |
timeout_pending(9) -- execute a function after a specified period of time
|
The timeout API provides a mechanism to execute a function at a given time. The granularity of the time is limited by the granularity of the hardclock(9) timer which executes hz(9) times a second. The... |
timeout_set(9) -- execute a function after a specified period of time
|
The timeout API provides a mechanism to execute a function at a given time. The granularity of the time is limited by the granularity of the hardclock(9) timer which executes hz(9) times a second. The... |
timeout_triggered(9) -- execute a function after a specified period of time
|
The timeout API provides a mechanism to execute a function at a given time. The granularity of the time is limited by the granularity of the hardclock(9) timer which executes hz(9) times a second. The... |
tsleep(9) -- process context sleep and wakeup
|
These functions implement voluntary context switching. tsleep() and sleep() are used throughout the kernel whenever processing in the current context can not continue for any of the following reasons:... |
ttyprintf(9) -- kernel formatted output conversion
|
The printf(), snprintf(), vprintf(), vsnprintf(), uprintf(), ttyprintf(), and db_printf() functions allow the kernel to send formatted messages to various output devices. The functions printf() and vp... |
tvtohz(9) -- translate time period to timeout delay
|
The tvtohz() function computes the number of hz in the specified amount of time. This is mainly used to translate a timeval into a suitable argument for timeout(9). |
uao_create(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uao_detach(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uao_reference(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uio(9) -- move data described by a struct uio
|
The uiomove function copies up to n bytes between the kernel-space address pointed to by buf and the addresses described by uio, which may be in user-space or kernel-space. The uio argument is a point... |
uiomove(9) -- move data described by a struct uio
|
The uiomove function copies up to n bytes between the kernel-space address pointed to by buf and the addresses described by uio, which may be in user-space or kernel-space. The uio argument is a point... |
ulmax(9) -- kernel library routines
|
The kern library implements a set of useful functions and macros inside the kernel. |
ulmin(9) -- kernel library routines
|
The kern library implements a set of useful functions and macros inside the kernel. |
untimeout(9) -- execute a function after a specified period of time
|
The timeout API provides a mechanism to execute a function at a given time. The granularity of the time is limited by the granularity of the hardclock(9) timer which executes hz(9) times a second. The... |
uprintf(9) -- kernel formatted output conversion
|
The printf(), snprintf(), vprintf(), vsnprintf(), uprintf(), ttyprintf(), and db_printf() functions allow the kernel to send formatted messages to various output devices. The functions printf() and vp... |
uvm(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvmspace_alloc(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvmspace_exec(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvmspace_fork(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvmspace_free(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvmspace_share(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvmspace_unshare(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_chgkprot(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_coredump(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_deallocate(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_fault(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_fork(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_grow(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_init(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_init_limits(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_io(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_kernacc(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_km_alloc(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_km_alloc1(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_km_free(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_km_free_wakeup(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_km_kmemalloc(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_km_suballoc(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_km_valloc(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_km_valloc_wait(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_km_zalloc(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_map(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
UVM_MAPFLAG(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_map_checkprot(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_map_pageable(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_map_pageable_all(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_map_protect(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_meter(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_pagealloc(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_pagefree(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_pageout(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_pagerealloc(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_page_physload(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_pglistalloc(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_pglistfree(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_scheduler(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_setpagesize(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_swapin(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_swap_init(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_sysctl(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_useracc(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_vnp_setsize(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_vnp_sync(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_vnp_terminate(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_vnp_uncache(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_vslock(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvm_vsunlock(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
uvn_attach(9) -- virtual memory system external interface
|
The UVM virtual memory system manages access to the computer's memory resources. User processes and the kernel access these resources through UVM's external interface. UVM's external interface incl... |
vaccess(9) -- check access permissions based on vnode parameters
|
The vaccess() function checks if the credentials described in cred are sufficient to perform the operation described by acc_mode, based on the file_mode, uid, and gid arguments. These arguments would ... |
vclean(9) -- disassociate the underlying file system from a vnode
|
The vclean() function clears any VM and buffer data associated with the vnode vp and reclaims it from the underlying file system. Its arguments are: vp The vnode to be cleaned. flags The flags indicat... |
vcount(9) -- get total number of references to a device
|
vcount() is used to get the number of references to a particular device. It allows for the fact that multiple vnodes may reference the same device. |
vdevgone(9) -- revoke all specified minor numbered vnodes for a device
|
The vdevgone() function will revoke all the vnodes corresponding to the specified minor number range for the device with a major number of maj and of type type. Its arguments are: maj The major number... |
vfinddev(9) -- lookup a vnode by device number
|
The vfinddev() function returns a pointer to the vnode of the device represented by the device number dev and of type type in vpp. |
vflush(9) -- flush vnodes for a mount point
|
The vflush() function removes any vnodes in the vnode table that belong to the given mount structure. Its arguments are: mp The mount point whose vnodes should be removed. skipvp If this is given, the... |
vfs(9) -- kernel interface to file systems
|
The virtual file system, VFS, is the kernel interface to file systems. The interface specifies the calls for the kernel to access file systems. It also specifies the core functionality that a file sys... |
vget(9) -- get a vnode from the free list
|
Get a vnode from the free list and increment its reference count. Its arguments are: vp The vnode to remove from the free list. flags If non-zero, the vnode will also be locked. p The process responsi... |
vgone(9) -- prepare a vnode for reuse
|
vgone() and vgonel() prepare a vnode for reuse by another file system. The preparation includes the cleaning of all file system specific data and the removal from its mount point vnode list. The diffe... |
vgonel(9) -- prepare a vnode for reuse
|
vgone() and vgonel() prepare a vnode for reuse by another file system. The preparation includes the cleaning of all file system specific data and the removal from its mount point vnode list. The diffe... |
vhold(9) -- acquire a hold on a vnode
|
The vhold() function increments the v_holdcnt of the given vnode. If the vnode has already been added to the free list and its v_holdcnt and v_usecount are both zero, it will be removed from the free ... |
vinvalbuf(9) -- flush and invalidate all buffers associated with a vnode
|
The vinvalbuf() function invalidates all of the buffers associated with the given vnode. This includes buffers on the clean list and the dirty list. If the V_SAVE flag is specified then the buffers on... |
vnode(9) -- an overview of vnodes
|
A vnode is an object in kernel memory that speaks the UNIX file interface (open, read, write, close, readdir, etc.). Vnodes can represent files, directories, FIFOs, domain sockets, block devices, char... |
vn_lock(9) -- acquire the vnode lock
|
The vn_lock() function is used to acquire the vnode lock. Certain file system operations require that the vnode lock be held when they are called. See sys/kern/vnode_if.src for more details. The vn_lo... |
VOP_CREATE(9) -- vnode operations
|
The VOP functions implement a generic way to perform operations on vnodes. The VOP function called passes the arguments to the correct file system specific function. Not all file systems implement all... |
VOP_FSYNC(9) -- vnode operations
|
The VOP functions implement a generic way to perform operations on vnodes. The VOP function called passes the arguments to the correct file system specific function. Not all file systems implement all... |
VOP_GETEXTATTR(9) -- vnode operations
|
The VOP functions implement a generic way to perform operations on vnodes. The VOP function called passes the arguments to the correct file system specific function. Not all file systems implement all... |
VOP_ISLOCKED(9) -- vnode operations
|
The VOP functions implement a generic way to perform operations on vnodes. The VOP function called passes the arguments to the correct file system specific function. Not all file systems implement all... |
VOP_LINK(9) -- vnode operations
|
The VOP functions implement a generic way to perform operations on vnodes. The VOP function called passes the arguments to the correct file system specific function. Not all file systems implement all... |
VOP_LOCK(9) -- vnode operations
|
The VOP functions implement a generic way to perform operations on vnodes. The VOP function called passes the arguments to the correct file system specific function. Not all file systems implement all... |
VOP_LOOKUP(9) -- vnode operations
|
The VOP functions implement a generic way to perform operations on vnodes. The VOP function called passes the arguments to the correct file system specific function. Not all file systems implement all... |
VOP_MKDIR(9) -- vnode operations
|
The VOP functions implement a generic way to perform operations on vnodes. The VOP function called passes the arguments to the correct file system specific function. Not all file systems implement all... |
VOP_PRINT(9) -- vnode operations
|
The VOP functions implement a generic way to perform operations on vnodes. The VOP function called passes the arguments to the correct file system specific function. Not all file systems implement all... |
VOP_READLINK(9) -- vnode operations
|
The VOP functions implement a generic way to perform operations on vnodes. The VOP function called passes the arguments to the correct file system specific function. Not all file systems implement all... |
VOP_REALLOCBLKS(9) -- vnode operations
|
The VOP functions implement a generic way to perform operations on vnodes. The VOP function called passes the arguments to the correct file system specific function. Not all file systems implement all... |
VOP_RECLAIM(9) -- vnode operations
|
The VOP functions implement a generic way to perform operations on vnodes. The VOP function called passes the arguments to the correct file system specific function. Not all file systems implement all... |
VOP_REMOVE(9) -- vnode operations
|
The VOP functions implement a generic way to perform operations on vnodes. The VOP function called passes the arguments to the correct file system specific function. Not all file systems implement all... |
VOP_REVOKE(9) -- vnode operations
|
The VOP functions implement a generic way to perform operations on vnodes. The VOP function called passes the arguments to the correct file system specific function. Not all file systems implement all... |
VOP_RMDIR(9) -- vnode operations
|
The VOP functions implement a generic way to perform operations on vnodes. The VOP function called passes the arguments to the correct file system specific function. Not all file systems implement all... |
VOP_SETEXTATTR(9) -- vnode operations
|
The VOP functions implement a generic way to perform operations on vnodes. The VOP function called passes the arguments to the correct file system specific function. Not all file systems implement all... |
VOP_STRATEGY(9) -- vnode operations
|
The VOP functions implement a generic way to perform operations on vnodes. The VOP function called passes the arguments to the correct file system specific function. Not all file systems implement all... |
VOP_SYMLINK(9) -- vnode operations
|
The VOP functions implement a generic way to perform operations on vnodes. The VOP function called passes the arguments to the correct file system specific function. Not all file systems implement all... |
VOP_UNLOCK(9) -- vnode operations
|
The VOP functions implement a generic way to perform operations on vnodes. The VOP function called passes the arguments to the correct file system specific function. Not all file systems implement all... |
VOP_WHITEOUT(9) -- vnode operations
|
The VOP functions implement a generic way to perform operations on vnodes. The VOP function called passes the arguments to the correct file system specific function. Not all file systems implement all... |
vprintf(9) -- kernel formatted output conversion
|
The printf(), snprintf(), vprintf(), vsnprintf(), uprintf(), ttyprintf(), and db_printf() functions allow the kernel to send formatted messages to various output devices. The functions printf() and vp... |
vput(9) -- decrement the reference count for a vnode and unlock it
|
Decrement the v_usecount field of the vnode vp and unlock the vnode. This operation is functionally equivalent to calling VOP_UNLOCK() followed by vrele(9). |
vrecycle(9) -- recycle a vnode if its reference count is zero
|
The vrecycle() function places the vnode vp on the free list using vgonel(9) if its v_usecount field is zero. If v_usecount is non-zero, it simply returns. If v_usecount is zero and an interlock inter... |
vref(9) -- increment the use count for a vnode
|
Increment the v_usecount field of the vnode specified by vp. Each vnode maintains a reference count of how many parts of the system are using the vnode. This allows the system to detect when a vnode i... |
vrele(9) -- decrement the use count for a vnode
|
Decrement the v_usecount field of the vnode specified by vp. Any code in the system which uses a vnode should call vrele() when it is finished with the vnode. If the v_usecount field of the vnode reac... |
vsnprintf(9) -- kernel formatted output conversion
|
The printf(), snprintf(), vprintf(), vsnprintf(), uprintf(), ttyprintf(), and db_printf() functions allow the kernel to send formatted messages to various output devices. The functions printf() and vp... |
vwaitforio(9) -- wait for all outstanding asynchronous writes
|
The vwaitforio() call sleeps until all asynchronous writes associated with the vnode vp finish. This is used by functions that need to make sure that the writes they initiated have completed. The vwai... |
wakeup(9) -- process context sleep and wakeup
|
These functions implement voluntary context switching. tsleep() and sleep() are used throughout the kernel whenever processing in the current context can not continue for any of the following reasons:... |
writedisklabel(9) -- disk label management routines
|
This collection of routines provides a disklabel management interface to kernel device drivers. These routines are classified as machine- or architecture-dependent because of restrictions imposed by t... |