4Dwm is an X Window System client based on mwm. It provides window management functionality, desks and some session management functionality. It provides functions that facilitate control (by the user and the programmer) of elements of window states such as placement, size, icon/normal display, and input-focus ownership. The session management functionality can launch clients as well as provide a way of stopping a client. This manual page only describes additions to and differences from mwm. Ref...
abicc is a wrapper shell script for cc for compiling MIPS ABI applications. It translates a common subset of the SVR4 SGS (Software Generation System) flags and arguments to those of the native IDO (IRIS Development Option). By the use of this wrapper, applications which link "on-site" on a target platform are isolated from having to know the details of invoking that platform's compilation system. abicc also serves to hide the details of constructing an ABI application on IRIX. The details of...
ABIinfo provides a shell-level interface to determine whether a particular MIPS ABI feature is supported by the operating system. ABIinfo also provides the version of the MIPS Processor ABI Conformance Guide to which the operating system conforms. This interface allows a feature which will appear in a future Conformance Guide to be supported by the host operating system prior to that system becoming conformant with that Conformance Guide . It also allows applications to determine whether feature...
abild is a wrapper shell script for ld for link editing MIPS ABI applications. It translates a common subset of the SVR4 SGS (Software Generation System) flags and arguments to those of the native IDO (IRIS Development Option). By the use of this wrapper, applications which link "on-site" on a target platform are isolated from having to know the details of invoking that platform's compilation system. abild also serves to hide the details of constructing an ABI application on IRIX. The details...
accept allows lp(1) to accept requests for the named destinations. A destination can be either a line printer (LP) or a class of printers. Use lpstat(1) to find the status of destinations. Reject prevents lp(1) from accepting requests for the named destinations. A destination can be either a printer or a class of printers. Use lpstat(1) to find the status of destinations. The following option is useful with reject. -r[reason] Associates a reason with preventing lp from accepting requests. This r...
The accessworkstation program allows the user to open an IRIX Interactive Desktop directory view or toolchest on a specified machine. It replaces the obsolete newdir(1) program (shipped in previous IRIX releases). Users can run accessworkstation from a Unix shell command line or from the toolchest (Desktop > Access Files > As Another User or By Remote Login). The user is allowed to select interactively the directory or toolchest to be viewed, as well as the machine and login name to be used. The...
The accessx graphical interface allows movement-impaired users to set and activate special keyboard features. It uses the XKB extension built into the X server in IRIX 6.2 and later releases. The accessx panel can be run from a Unix shell command line or from the toolchest (Desktop > Customize > Accessibility). Like most other IRIX Interactive Desktop (IID) customization panels, accessx has the ``runonce'' feature, meaning only one instance of the application will run at one time. Attempting t...
Accounting software is structured as a set of tools (consisting of both C programs and shell procedures) that can be used to build accounting systems. acctsh(1M) describes the set of shell procedures built on top of the C programs. Connect-time accounting is handled by various programs that write records into /var/adm/wtmp, as described in utmp(4). The programs described in acctcon(1M) convert this file int...
acctcms reads one or more files, normally in the form described in acct(4). It adds all records for processes that executed identically named commands, sorts them, and writes them to the standard output, normally using an internal summary format. The options are: -a Print output in ASCII rather than in the internal summary format. The output includes command name, number of times executed, total kcore minutes, total CPU minutes, total real minutes, mean siz...
acctcom reads file, the standard input, or /var/adm/pacct in the form described by acct(4) and writes selected records to the standard output. Each record represents the execution of one process. The output shows the COMMAND NAME, USER, TTYNAME, START TIME, END TIME, REAL (SEC), C...
acctcon converts a sequence of login/logoff records to total accounting records (see the tacct format in acct(4)). Login/logoff records are read from standard input. The file /var/adm/wtmp is usually the source of the login/logoff records; however, because it may contain corrupted records or system date changes, it should first be fixed using wtmpfix. The fixed version of file /va...
The acctcvt command is used to convert accounting data from one format to another. The data can come from a file or stdin (such as when used as an audit filter) and similarly can be written to another file or stdout. Both SGI extended accounting and standard SVR accounting formats are supported. In addition, output can be in ASCII text. The output can be in the form of human-readable text, either in the format similar to that produced by sat_interpret(1M) or by acctcom(1). The output can also be...
acctmerg reads its standard input and up to nine additional files, all in the tacct format (see acct(4)), or an ASCII version thereof. It merges these inputs by adding records whose keys (normally user ID and name) are identical and expects the inputs to be sorted on those keys. Options are: -a Produce output in ASCII version of tacct. -i Input files are in ASCII version of tacct. -p Print input wi...
acctprc reads standard input, in the form described by acct(4), and converts it to total accounting records (see the tacct record in acct(4)). acctprc divides CPU time into prime time and nonprime time and determines mean memory size (in memory segment units). acctprc then summarizes the tacct records, according to user IDs, and adds login names corresponding to the user IDs. The ...
chargefee can be invoked to charge a number of units to login-name. A record is written to /var/adm/fee, to be merged with other accounting records by runacct. ckpacct should be initiated via cron(1M) to periodically check the size of /var/adm/pacct. If the size exceeds blocks, 1000 by default, turnacct is invoked w...
acroread is a shell script that launches the Adobe Acrobat Reader program. The program's features are fully documented in The Acrobat Help, an on-line prgram guide which is available from the product's Help menu. Acrobat Reader is part of the Adobe Acrobat family of software that lets you view, distribute, print, and save documents in Portable Document Format (PDF)-regardless of the computer, operating system, fonts, or application used to create the original file. PDF files retain all the for...
This command is used on an IRIS that has a printer attached to it. The command registers a remote user's machine, allowing it to connect to this machine in order to submit a printing request using lp(1). In the first form of the command, client is the name of a remote machine to which access will be granted. If the second form of the command is used then all remote machines will be granted access. This command modifies the /etc/hosts.lpd file and possibly /etc/passwd. Execute this command once ...
adddefpriv adds an entry to the defaultPrivileges(4) database, which has the effect of giving privilege to all users on the system. This means that any user on the system can successfully run /usr/sysadm/bin/runpriv privilege (See runpriv(1M)). In order to run adddefpriv, you must either be running as root or you must provide the -auth auth-scheme arguments and pass the authentication test. If auth-scheme is unix, then must you type the root password when prompted in order to pass. The ability t...
Addfstabentry adds a mount entry into /etc/fstab file. The filesystem/directory is not mounted. Use mountfs(1M) to mount it. Refer to fstab(4) for a detailed description of the input parameters.
Addhost adds or modifies an entry in the host file. The entry is added to the end of /etc/hosts. If the hostname already exists, the entry is modified to use the new IP address. If the IP address already exists, the hostname is updated to use the new hostname.
addLocalFileSwap creates a file of the specified size in the indicated directory. If the directory does not exist, it will be created. The file name will be chosen automatically, depending on the name of any other swap files in the directory. Once the file is created, the swapctl(2) system call is used to add the file for use as swap space. This privcmd is not intended for command line use. A better and more flexible interface is provided by the swap(1M) command....
addModem is a privileged command that edits configuration files and initializes a modem to prepare it to be used by higher-level software such as cu(1C) or ppp(1M).
Addpppin adds a PPP incoming entry to the system to enable the named account or system to have the right to call into this host using the PPP protocol. Please refer to PPP(1M) for a detail description of the input parameters. It is important to note that if you do not set up an incoming connection, a remote workstation may be able to connect to your workstation using an existing user account, such as "guest". This can be an important security issue....
Addpppout adds a PPP outgoing entry to the system to enable the system to call another host using the PPP protocol. Please refer to PPP(1M) for a detailed description of the input parameters.
addpriv adds an entry to the privilege(4) database, so that henceforth user is granted privilege. This means that runpriv would run the command privilege in the directory /usr/sysadm/privbin on user's behalf. Multiple privileges can be passed to one addpriv command. An entry is added for each privilege specified. To see the privileges associated with individual tasks, choose "View as Tasks" from the Privilege Manager menu. See privmgr(1M). The -chkconfig option is used to enable privileges on...
addprivuser adds an entry to the privilegedUsers(4) database. This gives username the ability to run all of the privileged commands in /var/sysadm/privbin as if he or she were root. In order to run addprivuser, you must either be running as root or you must provide the -auth auth-scheme arguments and pass the authentication test. If auth-scheme is unix, then must you type the root password when prompted in order to pass. The ability to run addprivuser is not itself a privilege. root cannot give ...
addSerialDevice is a privileged command that configures the system to use a serial device. addSerialDevice configures a serial port for a terminal if its first argument is terminal, an input device such as a tablet or space ball if its first argument is input, or midi if its first argument if midi. When a device is configured for a terminal, the line in /etc/inittab for the serial port is configured to run getty(1M). When a device is configured for an input device, a link is made from /dev/input...
addUserAccount adds a local user account or an NIS access account to the system. The addUserAccount command has the following required parameter: -l login-name The login name of the new user The addUserAccount command has the following optional parameters: -y Requests creation of an NIS access account -u user-ID The unique user-ID of the new user (local accounts only) -g group-ID The primary group-ID of the new user (local accounts only) -P Indicates that a password is to be added to the account...
addVirtualSwap creates a trivial file in the directory /vswap (which will be created, if necessary) and then uses the swapctl(2) system call to add that entry as the requested amount of virtual swap space. This privcmd is not intended for command line use. A better and more flexible interface is provided by the swap(1M) command.
Addzone uses the AppleTalk Zone Information Protocol to add a zone to the network attached to a specific interface. If the zone never appears, it is a sign that the nbpd(1m) daemon is malfunctioning. Adding a zone to the loopback (lo0) adds it to the local pseudo-net. If other routers are present on the same network, it is important that each have the same list of zones. This is most easily accomplished by designating a ``seed'' router and allowing the other routers to obtain their zone lists ...
Add_disk enables you to add an extra SCSI disk to a system if the disk is on an integral SCSI controller (i.e., it can not be used for disks attached to VME SCSI controllers). The disk_number option must be specified if you are not adding the default ID of 2; similarly the controller and lun must be specified if other than 0. The Add_disk command creates the required directory, makes the appropriate device file links, makes a new filesystem, does the required mount operation, and adds the approp...
admin is used to create new SCCS files and change parameters of existing ones. Arguments to admin, which may appear in any order, consist of keyletter arguments, which begin with -, and named files (note that SCCS filenames must begin with the characters s.). If a named file does not exist, it is created and its parameters are initialized according to the specified keyletter arguments. Parameters not initialized by a keyletter argument are assigned a default value. If a named file does exist, pa...
aiff2aiffc is a command-line program which reads an AIFF-C digital audio input file, and copies the header information and sample data to an AIFF output file. The output file contain copies of all the AIFF-C chunks in the original input file which are backward compatible with the old AIFF spec. This includes most standard information, such as author and copyright strings and loop points. The chunks in the new file may not appear in exactly the same order as in the original file. It the AIFF-C in...
aifccompress is a command-line program which reads an AIFF-C digital audio input file, and copies the header information and sample data to a compressed AIFF-C digital audio output file. The output file will contain copies of all the AIFF-C chunks in the original input file. The chunks may not appear in exactly the same order as in the original file. aiffccompress offers compression algorithms which are supported by the SGI audio file library. They are selected with the -c option. Be sure to aud...
aifcdecompress is a command-line program which reads an AIFF-C compressed digital audio input file, and copies the header information and sample data to a AIFF-C uncompressed digital audio output file. The output file will contain copies of all the AIFF-C chunks in the original input file. The chunks may not appear in exactly the same order as in the original file. aifcdecompress decodes data which has been compressed using one of the algorithms supported by the SGI audio file library: G.722 CCI...
aifcinfo is a command-line program which parses an AIFF-C or AIFF digital audio input file, and prints out a description of the contents of the file, including header information about the sample data, author and copyright strings, and loop point locations. If the AIFF-C/AIFF input file parses correctly, aifcinfo returns 0. If there is an error, aifcinfo returns 1. The AIFF and AIFF-C file format specifications are published by Apple Computer Inc....
-rate rate specifies the sampling rate for the output file outfile.aifc. The value rate must be one of the following (sample frames per second): 8000 11025 16000 22050 32000 44100 48000 The sampling rate specified for the output file must be different from the sampling rate of the input file. -dynamic decibels specifies the minimum attenuation (in decibels) of the alias/image artifacts generated by the sampling rate conversion. The loss in dynamic range due to the rate conversion process will be...
aiff2aiffc is a command-line program which reads an AIFF digital audio input file, and copies the header information and sample data to an AIFF-C digital audio output file. The output file will contain copies of all the AIFF chunks in the original input file. The chunks may not appear in exactly the same order as in the original file. The sample data in the AIFF-C output file will not be compressed. If the input AIFF file parses correctly, and the output file is written with no errors, aiff2aifc...
The ainfo command is used to display various information about arrays known to the array services daemon. This information could be useful for both interactive users and shell scripts, and can be displayed in formats appropriate for either. The type of information displayed is determined by the request argument which is described below. Many of the options are used to narrow down a request or to specify a particular element to be described. Not all of the options make sense for every request. Op...
The akill command sends a signal to the processes in the array session specified by the array session handle ASH, or to the single process specified by process ID PID. The value of signal may be numeric or symbolic (see signal(5)). The symbolic name is the name as is appears in /usr/include/sys/signal.h, with the SIG prefix stripped off. Signal 15 (SIGTERM) is sent by default; this will normally kill processes that do not catch or ignore the signal. The processes that are to be signalled by akil...
The alias utility creates or redefines alias definitions or writes the values of existing alias definitions to standard output. An alias definition provides a string value that replaces a command name when it is encountered. An alias definition affects the current shell execution environment and the execution environments of the subshells of the current shell. When used as specified by this specification, the alias definition will not affect the parent process of the current shell nor any utilit...
AliasToIv converts 3D model files in Alias wire format (versions 5.0, 5.0.1, 5.1, and 5.1.1) into Open Inventor 2.0 files. NURB curves and surfaces, polygons, hierarchy, textures, cameras and lights are converted into equivalent Open Inventor objects. Alias NURB surfaces are converted into Open Inventor surfaces, which are then tesselated into polygons according to the object complexity setting. If perfomance is not satisfactory on the model, try a lower complexity setting. For textures, convert...
The alpq command takes no arguments or options. It presents, on its standard output, a list of the functions currently registered with the alp STREAMS module. Information on building and using these functions is contained in the manual entry alp(7). The output list contains such entries as 1 Ucase (Upper to lower case converter) The first field is a sequence number. Th...
amconfig is used to configure availmon(5) via four configuration flags, two configuration values, and a list of email addresses. If no argument is given, amconfig shows the status of all flags and values and the content of the email lists. The first synopsis is for configuration flags. In this case, usage for showing status and turning flags on or off is the same as for chkconfig(1M). The autoemail flag controls automatic distribution of availmon reports according to autoemail.list. The shutdown...
amparse parses an availmon(5) report and extracts information according to the specified fieldname. The availmon report is read from filename, or from standard input if no filename is given. Only one fieldname can be specified at a time: -SYSID System serial number -HOSTNAME System hostname or internet address -PREVSTART Previous start time, including seconds since Jan 1, 1970, and local time -PREVSTART1 Previous start time in the form of seconds since Jan 1, 1970 -PREVSTART2 Previous start time...
amreceive converts a received availmon(5) email report to plain text. The email report can be a file or can be read from standard input. The availmon report should be sent by Embedded Support Partner facilities (see esp(5) for more details) so that the format type and report type are correctly specified in the email subject. The output of amreceive can be redirected to a file, appended to a site logfile, or piped to a mailer or to a front-end interface of a database system for further reference ...
amsyslog parses system log files and prints messages of a specified (or higher) priority. The default system log files are /var/adm/SYSLOG and /var/adm/oSYSLOG. The default priority level is 4 (warning, error and critical messages). Repeated messages in any order are recorded once, at the point of first occurrence, with the repetition count and the last time stamp shown at the end of the message, delimited by "<" and ">". This includes interspersed multiple sequences of repeated messages. Th...
amtime1970 prints the current seconds since Jan 1, 1970 if no argument is given. With arguments, it converts between local time and seconds since Jan 1, 1970. The format of local time is the same as the output of ctime(3C). The arguments are: -d seconds Convert seconds since Jan 1, 1970 to local time -t localtime Convert local time to seconds since Jan 1, 1970
IRIS Annotator is an authoring environment for annotating 3D models. Annotator is based on a 3D geometry viewer for viewing and manipulating 3D models. Analogous to 2D redlining, it also allows you to annotate the models using 3D markers. You then create and/or import multi-media notes that present additional information about the model, and attach them to the markers. Finally, you can save the annotated model, and mail it to others for their review. Annotator optionally takes a filename on the ...
ansitape reads and writes magnetic tapes written in ANSI standard format (called ``Files-11'' by DEC). Tapes written by ansitape are labeled with the first six characters of the machine name by default. Actions are controlled by the key argument. The key is a string of characters containing at most one function letter. Other arguments to the command are a tape label and filenames specifying which files are to be written onto or extracted from the tape. Note that this version is designed to wor...
audiopanel provides a graphical interface to control the audio hardware. The display indicates the state of one or more independent loci of audio hardware control known as "devices" and allows control of their signal levels, sample rates, and master timing as well as input signal metering and monitoring. The display is loosely divided into two halves; input devices panels with their related controls, when displayed, appear on the left half of the window and output devices panels and their cont...
appdefpath is responsible for supplying an absolute path to the appropriate resource defaults given X server specific information. The default is typically /usr/lib/X11/appdefaults. Page 1 (printed 10/9/01)
apply runs the named command on each argument arg in turn. Normally, arguments are chosen singly; the optional number n specifies the number of arguments to be passed to command. If n is zero, command is run without arguments once for each arg. Character sequences of the form %d in command, where d is a digit from 1 to 9, are replaced by the dth following unused arg. If any such sequences occur, n is ignored and the number of arguments passed to command is the maximum value of d in command. The ...
The appres program prints the resources seen by an application (or subhierarchy of an application) with the specified class and instance names. It can be used to determine which resources a particular program will load. For example, % appres XTerm will list the resources that any xterm program will load. If no application class is specified, the class -AppResTest- is used. To match a particular instance name, specify an instance name explicitly after the class name, or use the normal Xt toolkit ...
apropos shows which manual sections contain instances of any of the given keywords in their title. Each word is considered separately, and, case of letters is ignored. Words that are parts of other words are considered; thus, when looking for compile, apropos will also find all instances of compiler. Try apropos password and apropos editor If the line starts `name(section) ...' you can do `man section name' to get the documentation for it. Try `apropos format' and then `man 3 printf' to get ...
The archiver (ar) maintains groups of files as a single archive file. Generally, you use this utility to create and update library files that the link editor uses; however, you can use the archiver for any similar purpose. This version of ar produces both 32-bit and 64-bit archives. The 32-bit archive format is defined in the System V Release 4 ABI. The 64-bit archive format is defined in the 64-bit ELF OBJECT File Specification. 32-bit objects and 64-bit objects cannot be mixed in an archive. T...
The arp program displays and modifies the Internet-to-Ethernet address translation tables used by the address resolution protocol (arp(7P)). With no flags, the program displays the current ARP entry for hostname. The host can be specified by name or by number, using Internet dot notation. The arp flags are: -a Display all of the current ARP entries by reading the table from the routing socket. -c Clear all of the current non-permanent ARP entries from the table. -d hostname A superuser can delet...
The array command is used to execute the array command specifed by "command args..." on one or more machines in an array and display the resulting output on stdout. An array command is not necessarily the same thing as a UNIX command. It is passed to arrayd(1M), the array services daemon, which is responsible for translating it to an actual UNIX command and executing it on the machines that make up the array. Several array commands are available by default; these are described below. array tak...
arrayconfig is a tool for configuring a simple array of systems. It can perform the following tasks: - Generate an array configuration file (arrayd.conf) containing an array definition for the nodes in a single array. - Distribute an array configuration file to the nodes in an array and activate array services on them. - Update the "array services machine identifier" on the local system or all of the systems in the array that support them. The arrayconfig command itself has several command lin...
arrayd is the array services daemon. It performs several different tasks related to the use of an array of two or more machines, such as: - Allocating global array session handles - Forwarding "array commands" to all of the machines in an array - Maintaining a database of the current array configuration and providing that information to other commands and programs - Determining which processes belong to a particular array session and providing that information to other commands and programs Fo...
arshell is an array-cognizant variation of the standard rsh(1C) command: it connects to the specified host and executes the specified command. For the purposes of parsing the arshell command line, host (optionally prepended with username) is considered to be the first argument that does not being with the character "-", and command is considered to be the second such argument, as well as all of the arguments following it. arshell copies its standard input to the remote command, the standard ou...
as is the SGI assembler. It assembles a symbolic assembly language source program, producing an object file in elf format. The SGI assembler support three different Application Binary Interfaces controlled by the options -o32 , -n32 , and -64 (see abi(5) ) As never runs the loader. as always defines the preprocessor symbols: _LANGUAGE_ASSEMBLY, __sgi, __mips, __host_mips, __unix, _MIPSEB, _SYSTYPE_SVR4, _SVR4_SOURCE, _SGI_SOURCE, _MIPS_ISA, _MIPS_SIM, _MIPS_FPSET, _MIPS_SZINT, _MIPS_SZLONG, and ...
Asa interprets the output of FORTRAN programs that utilize ASA carriage control characters. It processes either the files whose names are given as arguments or the standard input if no file names are supplied. The first character of each line is assumed to be a control character; their meanings are: ' ' (blank) single new line before printing 0 double new line before printing 1 new page before printing + overprint previous line. Lines beginning with other than the above characters are treated ...
ascheck validates the configuration on all the array services daemons known to the local array services daemon. Checks are made to ensure that the various array and machine definitions are consistent with each other, both on the individual servers and with corresponding definitions on the other servers. If any problems are found, they are described in detail and suggestions are provided to correct the situation. It should be noted that ascheck is not a syntax checker for the individual array ser...
The askRestartFm utility restarts the file manager on the desktop background and, if necessary, the icon catalog. Its purpose is to show new application icons immediately, saving the user the trouble of logging out and back in. askRestartFm displays a question dialog asking the user whether to restart fm and iconcatalog. If the user clicks the Now button, then it restarts them immediately. Caveat: All iconviews (dirviews) are closed and must be reopened manually by the user. The existing fm proc...
at and batch read commands from standard input to be executed at a later time. at allows you to specify when the commands should be executed, while jobs queued with batch will execute when system load level permits. The at utility reads commands from standard input and groups them together as an at-job, to be executed at a later time. The at-job will be executed in a separate invocation of the shell, running in a separate process group with no controlling terminal, except that of the environment...
The atconfig command enables AppleTalk on an interface. It is similar in function to ifconfig(1m). When atconfig is run, the interface uses the Apple Address Resolution Protocol (AARP) to determine its net and node number. When run on the loopback lo0, atconfig sets the net and node of a local pseudo-network. Specifying a intr of "default" will configure the first interface in the ifaddr list. All numeric arguments may be specified in hexadecimal by prepending them with a 0x. The flags are def...
The atinfo command prints netrange, net, node, phase, and zone information for each Ethernet interface. If the interface has not been configured with atconfig, the Zone field will read ``Interface not configured.'' Despite the fact that Phase I AppleTalk is no longer supported, atinfo may still print phase information as ``1 or 2'' until the interface is configured. If the interface is configured, atinfo attempts to contact the nbpd(1m) to get a list of zones for the interface. If the daemon...
The atinit program manages startup and shutdown of K-Talk AppleTalk services. It is normally invoked by the server's startup scripts (see the SYSTEM ADMINISTRATION HINTS section for details) at system boot time. The action argument may be any one of the following: halt stops all AppleTalk servers running on the UNIX system. start starts all the servers and commands listed in /usr/etc/appletalk/services (described below). The command atinit start is usually found in the system startup file. It s...
The atlic command allows the user to view and modify the status of their Xinet license. The -u option will allow a user to update an existing (and valid) license. Page 1 (printed 5/15/100)
The atping command attempts to use the Apple Echo Protocol (AEP) to ping an AppleTalk node. It is similar in function to ping(1m). In its usual usage, atping is given an AppleTalk net and node number, and it sends an echo request every second. It waits for response packets, and lists each one as it is received. The output includes a round trip time, and a count of packets received and lost. The net and node arguments can be prepended with a 0x to specify hexadecimal input. -x causes atping to pr...
The atservers utility uses the AppleTalk Name Binding Protocol (NBP) to look up all named entities on the UNIX host's AppleTalk network. The flags are defined as follows: -v produces a more readable (but less parseable) output. number specifies the number of entities atservers will look up. If no number is specified, atservers will look for up to 20 entities per zone. If there are more entities in a zone than number, a '[...]' (or a longer message in verbose mode) will be printed at the end o...
The atstat command prints out tables and statistics that it reads from the AppleTalk kernel implementation. When invoked, it will print a list of tables and let you select one at a time for viewing. The -x flag will cause all numbers to be printed in hexadecimal. There are options for viewing the AARP, DDP, and RTMP statistics. These statistics are relatively selfexplanatory, and will very from implementation to implementation. They can all be reset to zero by using the "Clear statistics" opti...
Extended Attributes implement the ability for a user to attach name/value pairs to objects within the filesystem. They are currently only fully supported in XFS and CXFS filesystems. Other filesystems may provide a partial implementation. They could be used to store meta-information about the file. For example "character-set=kanji" could tell a document browser to use the Kanji character set when displaying that document and "thumbnail=..." could provide a reduced resolution overview of a hi...
System Modes Indigo2 and Indy systems support four simultaneous analog audio input and output channels. To support this additional functionality while maintaining functional compatibility with the Indigo systems, the Indigo2 and Indy provides two modes of operation: four-channel mode and Indigo mode. By default, the system is in Indigo mode, and remains in it unless you explicitly change to four-channel mode, via apanel. Switching between the modes changes both the electrical properties of the c...
audiostate is a program which displays the state of the audio hardware, in Audio Library parameter values. The state also includes count of audio ports available for use by other applications and a list of open input and output ports, described by process name, process ID, audio port name. Many audio applications name their ports inadequately.
The audit shell script is called during system startup from /etc/rc2 to start the system audit trail daemon, satd(1M), and enable auditing of predefined audit events (using sat_select(1M)). The script is called during system shutdown from /etc/rc0 to kill the daemon gracefully and disable auditing. Note that, as installed, auditing is off by default and must be enabled as described in configuration flags, below. In addition, once auditing has been enabled via chkconfig(1M), the system should be ...
The autoconfig command is used invoke lboot and other commands to generate a UNIX kernel. The autoconfig command is also a startup script in /etc/init.d. The options are as: -v Requests verbose output from lboot and other commands. -f Generates a new kernel even if it appears that no hardware or software changes have been made. Use of -f will clear any options set in the /var/config/autoconfig.options file. -p toolroot Specifies the directory tree containing the compiler and other tools needed t...
autofs is a command that installs AutoFS mount points and associates an AutoFS map with each mount point. The AutoFS filesystem monitors attempts to access directories within it and notifies the autofsd(1M) daemon. The daemon uses the map to locate a filesystem, which it then mounts at the point of reference within the AutoFS filesystem. If the filesystem is not accessed within an appropriate interval (five minutes by default), the autofsd daemon unmounts the filesystem. AutoFS is started by the...
autofsd is an RPC server that answers filesystem mount and unmount requests from the AutoFS filesystem. It uses local files or name service maps to locate filesystems to be mounted. These maps are described with the autofs(1M) command. The autofsd daemon is started during system initialization from the /etc/init.d/network script if the configuration flags nfs and autofs are set on. Type the following commands as superuser to enable AutoFS: /etc/chkconfig...
Automount is a daemon that automatically and transparently mounts NFS filesystems as needed. Whenever a user on a client machine running automount invokes a command that needs to access a remote file or directory, the hierarchy to which that file or directory belongs is mounted and remains mounted for as long as it is needed. When a certain amount of time has elapsed during which the hierarchy is not accessed, it is automatically unmounted. No mounting of unaccessed remote filesystems is done at...
autopush allows you to configure the list of modules to be automatically pushed onto the stream when a device is opened. It can also be used to remove a previous setting or get information on a setting. The following options apply to autopush: -f file This option sets up the autopush configuration for each driver according to the information stored in the specified file. An autopush file consists of lines of at least four fields each, where the fields are separated by a space as shown below: maj...
The ArrayView command (also known by its synonym aview) is used to display status information about the various machines in an array. The ArrayView window is made up of two sections. In the top section, a brief summary of the overall system utilization of each machine is displayed. In the bottom section, a separate pane for each machine is used to display more detail about some aspect of the system, such as logged-in users or the most active processes. The relative size of the upper and lower se...
Awf formats the text from the input file(s) (standard input if none) in an imitation of The -macro option is mandatory and must be `-man' or `-ms'. Awf implements the following raw requests: .\" .ce .fi .in .ne .pl .sp .ad .de .ft .it .nf .po .ta .bp .ds .ie .ll .nr .ps .ti .br .el .if .na .ns .rs .tm and the following in-text codes: \$ \% \* \c \f \n \s plus the full list of /troff special characters in the original V7 troff manual. Many restrictions are present; the behavior in gene...
NOTE: This version of awk has some incompatibilities with previous versions. See the COMPATIBILITY ISSUES section below for more detail. awk and nawk use the old regexp() and compile() regular expression routines. When the environment variable _XPG is equal to 1 (one), pawk is exec'ed which uses the newer regcomp() and regexec() routines which implement the Extended Regular Expression package. awk scans each input file for lines that match any of a set of patterns specified in prog. The prog st...
The background customization panel is used to edit the background for a particular desk. The user is presented with a list of different backgrounds. All backgrounds except those using the graphics library (GL) can be previewed. The user can select a background, modify its colors if it is a non-GL pattern, then apply the background pattern to the current desk. The background panel can be run from a Unix shell command line or from the toolchest (Desktop > Customize > Background). Like most other c...
The Backup command archives the named file or directory (the current directory if none is specified) to the local or remote tape device. It can be used to make a full system backup by specifying the directory name as /. In case of a full backup, this command makes a list of the files in the disk volume header and saves this information in a file which is then stored on tape. This file is used during crash recovery to restore a damaged volume header. Information about mounted filesystems and logi...
backup is a privileged command that performs a backup of the entire system or of a selected list of files. The backup can be performed now, once at a later date, or recurring either daily or weekly. backup uses cpio(1) to write its output. device would typically be a tape device, but can also be a file for backing up to disk. -n is used to specify that a backup occur now, -l is for backups which are occur once at a later date, -d is for daily backups, and -w is for weekly backups. Backups that o...
Managers display information about your system and provide access to interactive guides (also called tasks) that let you administer your system. For example, the User Manager displays a list of the user accounts currently on the system and gives you access to guides like "Add a User Account" and "Modify a User Account." In a Manager window, you can open a guide by choosing its name from the Task menu or by clicking its button at the bottom of the window. The Backup and Restore Manager displa...
basename deletes any prefix ending in / and the suffix (if present in string) from string, and prints the result on the standard output. It is normally used inside substitution marks (``) within shell procedures. The suffix is a pattern as defined on the ed(1) manual page. dirname delivers all but the last level of the pathname in string.
Bdftopcf is a font compiler for the X server and font server. Fonts in Portable Compiled Format can be read by any architecture, although the file is structured to allow one particular architecture to read them directly without reformatting. This allows fast reading on the appropriate machine, but the files are still portable (but read more slowly) on other machines.
bdiff is used in a manner analogous to diff to find which lines in file1 and file2 must be changed to bring the files into agreement. Its purpose is to allow processing of files too large for diff. If file1 (file2) is -, the standard input is read. Valid options to bdiff are: n The number of line segments. The value of n is 3500 by default. If the optional third argument is given and it is numeric, it is used as the value for n. This is us...
The bfs command is similar to ed except that it is read-only and processes much larger files. Files can be up to 1024K bytes and 32K lines, with up to 512 bytes, including new-line, per line (255 for 16-bit machines). bfs is usually more efficient than ed for scanning a file, since the file is not copied to a buffer. It is most useful for identifying sections of a large file where the csplit command can be used to divide it into more manageable pie...
If job control is enabled (see the description of set -m in the sh(1) manpage), the bg utility resumes suspended jobs from the current environment by running them as background jobs. If the job specified by job_id is already a running background job, the bg utility has no effect and will exit successfully. Using bg to place a job into the background causes its process ID to become "known in the current shell execution environment", as if it had been started as an asynchronous list....
bgicons maintains icons on the desktop background by comparing its notion of the system stored in icondb with the new state of the system from inputfile. If the -inputfile argument is not specified, the new state of the system is read from standard input. inputfile is a text file containing lines of serialized DNA. icondb is maintained by bgicons; the first time bgicons is run for a particular icondb, it is expected that icondb will not exist. icondb should not be edited by any program other tha...
bindkey is a program which provides an interface to the xwsh(1G) function key binding facilities. key is the name of a key on the keyboard; type bindkey without arguments to obtain a list of valid keys. The following are valid bindkey keys: f1 f2 f3 f4 f5 f6 f7 f8 f9 f10 f11 f12 print-scrn scroll-lock pause insert home page-up end page-down left-arrow up-arrow down-arrow right-arrow binding is the text string which the key is bound to. The text of the binding argument must be in the printable ch...
Bison is a parser generator in the style of yacc(1). It should be upwardly compatible with input files designed for yacc. Input files should follow the yacc convention of ending in .y. Unlike yacc, the generated files do not have fixed names, but instead use the prefix of the input file. For instance, a grammar description file named parse.y would produce the generated parser in a file named parse.tab.c, instead of yacc's y.tab.c. This description of the options that can be given to bison is ad...
The bitmap program is a rudimentary tool for creating or editing rectangular images made up of 1's and 0's. Bitmaps are used in X for defining clipping regions, cursor shapes, icon shapes, and tile and stipple patterns. The bmtoa and atobm filters convert bitmap files (FILE FORMAT) to and from ASCII strings. They are most commonly used to quickly print out bitmaps and to generate versions for including in text....
bootp is a server that supports the Internet Bootstrap Protocol (BOOTP). This protocol is designed to allow a (possibly diskless) client machine to determine its own Internet address, the address of a boot server, and the name of an appropriate boot file to be loaded and executed. BOOTP does not provide the actual transfer of the boot file, which is typically done with a simple file transfer protocol such as TFTP. A detailed protocol specification for BOOTP is contained in RFC 951, which is avai...
bootpadd is a tool to help automate the process of adding client hosts to /usr/etc/bootptab. See bootp(1M) for more details on the contents and format of /usr/etc/bootptab. bootpadd can also be used to update existing information in the /usr/etc/bootptab. bootpadd checks the /usr/etc/bootptab to see if an entry already exists for the specified host. If an entry exists, the current options are used as defaults. The bootpadd command takes the following arguments: -b bootfile Specifies the name of ...
bootparamd is a server process that provides information to diskless clients necessary for booting. It consults the bootparams database. If the client is not found there, or if the network information service (NIS) is not running, then the /etc/bootparams file is consulted. bootparamd can be invoked either by inetd(1M) or by the user.
These shell procedures are executed via entries in /etc/inittab by init(1M) whenever the system is booted (or rebooted). First, the bcheckrc procedure checks the status of the root filesystem. If the root filesystem is found to be bad, bcheckrc repairs it. Then, the brc procedure clears the mounted filesystem table, /etc/mtab, and puts the entry for the root filesystem into the mount table. After these two procedures have executed, init checks for the initdefault value in /etc/inittab. This tell...
Bru is a UNIX filesystem backup utility with significant enhancements over other more common utilities such as tar, cpio, volcopy, and dd. Some of bru's capabilities include: o Full or incremental backup with quick and easy restoration of files. o Multiple physical volumes per archive. o Data integrity assurance via checksum computation on every archive block. o Ability to properly save and restore directories, symbolic links, block special files, and character special files. o Comparison of ar...
Note: This is the Bourne shell description. All references to sh and shell pertain to bsh and all references below to /usr/lib/rsh, the restricted shell, no longer apply to the Bourne shell. (See sh(1)). bsh is a command programming language that executes commands read from a terminal or a file. jsh is an interface to the shell that provides all the functionality of sh and enables Job Control (see Job Control below). See Invocation below for the meaning of arguments to the shell. ...
This command is a filter which buffers input from the input file and writes it to the output file. The command is especially useful for reading from or writing to streaming tape drives, where bstream can be used as a speed matching program to keep the tape streaming as much as possible. If input or output files are not specified, then bstream simply copies the standard input to the standard output through multiple buffers. A tape can be written to or read from in this manner, but bstream will no...
bufview displays periodic information about the file system buffer cache. It is modeled after the program top(1) which displays information about running processes.
The buildppd program constructs a PPD (PostScript Printer Description) file for the specified printer in the current directory. The PPD file is used by a variety of programs (including papserver(1m), textps(1), and imagetops(1) ) to determine the capabilities of the printer. buildppd first queries the printer for its "Product", and attempts to select the correct PPD from /usr/adm/appletalk/ppds. If this is not possible, it will try to build a simple PPD by querying the printer. The PPD file bu...
The following is the old c2ph.doc documentation by Tom Christiansen Date: 25 Jul 91 08:10:21 GMT Once upon a time, I wrote a program called pstruct. It was a perl program that tried to parse out C structures and display their member offsets for you. This was especially useful for people looking at binary dumps or poking around the kernel. Pstruct was not a pretty program. Neither was it particularly robust. The problem, you see, was that the C compiler was much better at parsi...
cached monitors the number of single bit errors in the secondary cache of each cpu. It reports the number of single bit errors encountered on any cpu each time it runs. The -s size parameter determines the size of the cpu secondary cache in bytes. If no value is specified, the default value of 4194304 (4 MB) is used. The -S delay parameter indicates the amount of time to wait each time between examining the secondary caches. This delay is in seconds and the default is 3600 seconds (one hour). Th...
cal prints a calendar for the specified year. If a month is also specified, a calendar just for that month is printed. If neither is specified, a calendar for the present month is printed. The month is a number between 1 and 12. The year can be between 1 and 9999. The calendar produced is that for England and the United States.
calendar consults the file calendar in the current directory and prints out lines that contain today's or tomorrow's date anywhere in the line. Most reasonable month-day dates such as Aug. 24, august 24, 8/24, and so on, are recognized, but not 24 August or 24/8. On weekends ``tomorrow'' extends through Monday. calendar can be invok...
For each input hostname, canonhost prints a single line on stdout containing the canonical name of that host. The canonical name of a host is determined by calling gethostbyname(3N).
The capitem program reads an /etc/printcap entry for the given printer and prints the value of the 2-letter item on its standard output, if the item has a value. If capitem cannot find the given printer or item in the printer's entry, it will print an error message on standard error.
captoinfo looks in file for termcap descriptions. For each one found, an equivalent terminfo description is written to standard output, along with any comments found. A description that is expressed as relative to another description (as specified in the termcap tc = field) is reduced to the minimum superset before being output. If no file is given, the environment variable TERMCA...
The capture program is obsolete. The command name and argument syntax have been retained for backwards compatibility, but their use is strongly deprecated. capture has been replaced by mediarecorder. Please refer to the manual page for mediarecorder(1) and update your scripts accordingly. capture is an interactive program to record digital media files from the camera, microphone and workstation screen. -nofork Causes capture to run in the foreground, rather than the default behavior of forking i...
cat reads each file in sequence and writes it on the standard output. Thus cat file prints the contents of file on your terminal, and cat file1 file2 >file3 concatenates file1 and file2, and writes the results in file3. If no input file is given, or if the argument - is encountered, cat reads from the standard input. cat processes su...
The cb command reads C programs either from its arguments or from the standard input, and writes them on the standard output with spacing and indentation that display the structure of the code. Under default options, cb preserves all user new-lines. cb accepts the following options. -s Canonicalizes the code to the style of Kernighan and Ritchie in The C Programming Language. -j Causes split lines to be put back together. -n Causes pairs of left braces with only whitespace between them to be int...
If directory is not specified, the value of shell parameter $HOME is used as the new working directory. If directory specifies a complete path starting with /, ., .., directory becomes the new working directory. If neither case applies, cd tries to find the designated directory relative to one of the paths specified by the $CDPATH shell variable. $CDPATH has the same syntax as, and similar semantics to, the $PATH shell variable. cd must have execute (search) permission in directory. Because a ne...
cdc changes the delta commentary, for the SID (SCCS IDentification string) specified by the -r keyletter, of each named SCCS file. Delta commentary is defined to be the Modification Request (MR) and comment information normally specified via the delta(1) command (-m and -y keyletters). If a directory is named, cdc behaves as though each file in the directory were specified as a named file, except that non-SCCS files (last component of the pathname does not begin with s.) and unreadable files are...
cddbcvt takes a database file in the old format used by pre-4.0.5 versions of cdplayer, and converts them to a CD database directory, as used by CDman and later versions of cdplayer. The optional argument olddbfile is the name of the database file you wish to convert. By default this is .cdplayerrc in the user's home directory. The optional argument newdbdir is the name of the directory in which to put the new database files. The directory will be created if it does not already exist. By defaul...
cdheadphone is a Motif based control panel for playing audio Compact Discs on a CD-ROM drive. Output is through the headphone jack or output jacks of the CD-ROM drive. To play a CD through the IRIS audio hardware (where available, e.g. on the IRIS Indigo) you must either run cdplayer(1) or plug the output jacks of the CD-ROM drive into the lineinput jacks of the audio hardware. cdheadphone can store the names of discs and tracks, and also allows track programming and assigning names to these pro...
CdPlayer is a program for playing audio tapes and CDs. When called as datplayer it works as a tape player. When called as cdplayer or when the -dev cd option is specified, CDplayer works as a CD player.
The cflow command analyzes a collection of C, yacc, and lex files and attempts to build a graph charting the external references. Files suffixed with .y, .l, .c, or .i are yacced, lexed, and compiled as appropriate. The results are collected and turned into a graph which is displayed upon the standard output. If the environment variable _XPG is defined, cflow operates in conformance with the X/Open XPG4 specifications. The format of the output may differ in accordance to the XPG4 standards. In a...
The cfsadmin command provides administrative tools for managing cached file systems. Its functions fall into four general categories: o cache creation o deletion of cached file systems o listing of cache contents and statistics o resource parameter adjustment when the file system is unmounted. For each form of the command, you must specify a cache directory, that is, the directory under which the cache is actually stored. A path name in the front file system identifies the cache directory. You c...
Cfsstat displays statistical information about the Cache File System (CacheFS). It can also be used to reinitialize this information. If no options are given the default is to print everything and reinitialize nothing. The optional argument interval may be used to indicate the interval in seconds between display updates in the "full-screen" mode described below. The default value is 1.
chacl changes the Access Control List (see acl(4)) for a file or directory. The -b flag indicates that there are two ACLs, the first is the file access ACL and the second the directory default ACL. The -d flag is used to set only the default ACL of a directory. The -R and -D flags are used to remove the file access ACL and directory default ACL respectively, the -B flag will remove all ACLs. The ACL(s) specified are applied to each file in the pat<...
chcap changes the effective, permitted, and inheritable capability sets of the specified file(s) or removes them. A file's capability sets affect the capabilities that are assigned to a process upon execution of the file. For a more complete description of the capability mechanism, see capabilities(4). capsets is a string that describes the changes to the file capability sets. It is comprised of one or more capability lists. Each capabili...
check displays RCS checkout information for files in the current directory. This includes the revision level, checkout status of the file, and who the file is checked out to. check assumes ./RCS is the default RCS directory. A different RCS directory can be specified with the rcsdir argument. The -d switch causes check to display the date when the file was checked out in addition to the usual information. The -l switch causes check to display only the names of files currently checked out. If che...
checkPassword is used to confirm a password for a particular user account. The password is supplied via stdin so that it is not visible on the process command line. The checkPassword command has the following required parameter: -l login-name The login name of the user account whose password is being checked.
checkpriv checks to see if you have been granted privilege. If checkpriv indicates that you do have privilege, then runpriv(1M) would run the command privilege found in the directory /usr/sysadm/privbin on your behalf. checkpriv indicates that you have privilege if any one of the following conditions are met: 1. You are running as root. 2. There is no root password on the system. 3. The file /var/sysadm/defaultPrivileges/privilege exists and has the string "on" as its first line (see defaultPr...
check_abi_compliance checks an object file for ABI compliance and optionally displays references to routines which are not part of the ABI and required routines which are missing from the object file. -abidir directory This specifies a directory which contains files which specify ABI routines. The filenames are of the form LIBRARY.names. -liblist library_list This specifies a list of shared objects on which this object file depends. This defaults to the liblist of the object file. -required Disp...
check_abi_interface checks a library interface and displays ABI entries which are missing as well as public entries which are not part of the ABI. -abidir directory This specifies a directory which contains files which specify ABI routines. The filenames are of the form LIBRARY.names. -libname library_list This specifies the name of the library to use when searching in abidir. The default is the name of the file. -missing Display only ABI routines which are missing from the library. -extra Displ...
check_for_syscalls finds embedded system calls in an object file. An ABI-compliant program may not directly do system calls, it must invoke an ABI-compliant DSO to access system services. -syscalls syscall_file This file is used to translate from system call numbers to names. The default is /usr/lib/abi/data/syscall.names.
chkconfig with no arguments or with the -s option prints the state (on or off) of every configuration flag found in the directory /var/config. The flags normally are shown sorted by name; with the -s option they are shown sorted by state. A flag is considered on if its file contains the string ``on'' and off otherwise. If flag is specified as the sole argument, chkconfig exits with status 0 if flag is on and with status 1 if flag is off or nonexistent. The exit status can be used by shell scri...
chkutent opens and reads /var/adm/utmpx and makes 2 checks for consistency; whether there are any entries that have duplicate 'id' fields, and whether there are any entries that are stale. Stale entries are found by looking at all entries that have ut_type equal to USER_PROCESS and checking to see if the process (specified by ut_pid) is still alive. If it isn't, ...
chlabel resets the security labels of the files specified by the listed path arguments to the value specified by label. Unprivileged users may only specify a label that is equal to that of their current process label. A user with CAP_MAC_UPGRADE capability may specify a label that is more sensitive or of lower integrity than the current process label. A user with CAP_MAC_DOWNGRADE capability may specify a label that is less sensitive or of higher integrity than the current process label. A user ...
The permissions of the named files or directories are changed according to mode, which may be symbolic or absolute. Absolute changes to permissions are stated using octal numbers: chmod nnn file(s) where n is a number from 0 to 7. Symbolic changes are stated using mnemonic characters: chmod a operator b file(s) where a is one or more characters corresponding to user, group, or other; where operator is +, -, and =, signifying assignment of permissions; and where b is one or more characters corres...
chown changes the owner of the files to owner. The owner may be either a login name found in the password file, or a decimal user ID. An optional group, separated from the owner by either a period or a colon, may also be specified. The group may be either a group name found in the group file, or a decimal group ID. chgrp changes the group ID of the files to group. The group may be either a group name found in the group file, or a decimal group ID. No errors, except for usage errors, are reported...
chroot causes the given command to be executed relative to the new root, newroot. The meaning of any initial slashes (/) in the pathnames is changed for the command and any of its child processes to newroot. Furthermore, upon execution, the initial working directory is newroot. If you redirect the output of the command to a file: chroot newroot command > x chroot creates the file x relative to the original root of the command, not the new one. The new root pathname is always...
The chrtbl command creates two tables containing information on character classification, upper/lowercase conversion, character-set width, and numeric formatting. One table is an array of (2*257*4) + 7 bytes that is encoded so a table lookup can be used to determine the character classification of a character, convert a character [see ctype(3C)], and find the byte and screen width of a character in one of the supplementary code sets. The other table contains info...
ci stores new revisions into RCS files. Each pathname matching an RCS suffix is taken to be an RCS file. All others are assumed to be working files containing new revisions. ci deposits the contents of each working file into the corresponding RCS file. If only a working file is given, ci tries to find the corresponding RCS file in an RCS subdirectory and then in the working file's directory. For more details, see FILE NAMING below. For ci to work, the caller's login must be on the access list,...
cidxfonts is a utility normally run during the installation process which processes CID-keyed fonts and creates files necessary for the operation of the X server or font server. After preprocessing some of the font files to improve font performance, the fonts.scale file is created based on information in ps2xlfd_map files. Finally, cidxfonts will run mkfontdir to generate the necessary fonts.dir file. If some condition exists that prevents cidxfonts from effectively generating a directory, the u...
The cksum utility writes to the standard output three whitespace separated fields for each input file. These fields are a checksum CRC, the total number of octets in the file and the file name. If no file name is specified, the standard input is used and no file name is written. The options are as follows: -o Use historic algorithms instead of the (superior) default one. Algorithm 1 is the algorithm used by historic Unix systems as the sum 1 algorithm. This is a 16-bit checksum...
In order to improve performance, the IRIX Interactive Desktop automatically maintains a cache of ftr types and layouts for all of the directories that are viewed with fm or dirview. The cleanCache shell script can be used remove cache files for directories which no longer exists. Since /usr/lib/desktop/cleanCache is a shell script, users can copy and modify it to suit their own particular needs.
clear clears your screen if this is possible. It looks in the environment for the terminal type and then uses the terminfo(4) database to figure out how to clear the screen. clear opens a full screen window and clears all bitplanes (front, back overlay, underlay, alphaoverlay and so forth). It sends a redraw to all open windows.
clipfly is one of the sample programs distributed with the OpenGL Performer high-performance graphics library. It is based on the perfly program, and has perfly's functionality and command-line options, with additional enhancements designed for viewing and manipulating clip textures in scenes on InfiniteReality graphics hardware. For full desription of these enhancements and suggestions on how to get started, see /usr/share/Performer/src/sample/C/clipfly/README. ote: clipfly is not supported un...
The clogin command is executed at the beginning of each session on the graphics console. It replaces the functionality of the command login(1). The choice between login(1) and clogin is made on the basis of the configuration variable visuallogin(4). If this configuration variable is set to on then clogin is used in place of login(1). clogin displays a window containing two areas. The top area contains either icons representing users who can log onto the system or an SGIlogo design. The bottom ar...
clri writes nulls on the inode table entry for i-number. This effectively eliminates the inode at that address. special is the device name on which an EFS filesystem has been defined. After clri is executed, any blocks in the affected file shows up as ``not accounted for'' when fsck(1M) is run against the filesystem. The inode can be allocated to a new file. Read and write permission is required on the specified special device. This command is used to remove a file that appears in no directory...
cl_init is the init(1M) program in diskless share tree. When client workstation installs its software using the PROM menu, the workstation uses the share tree as the root and process 1 runs cl_init instead of the regular /etc/init. cl_init prompts the user with the following questions: Do you want to use server XXX for software installation (y/n) ? XXX is the default server name used in the tapedevice or bootfile PROM variables. When doing installation, this default is the name of the server tha...
The two files are compared. (If file1 is -, the standard input is used.) Under default options, cmp makes no comment if the files are the same; if they differ, it announces the byte and line number at which the difference occurred. If one file is an initial subsequence of the other, that fact is noted. skip1 and skip2 are initial byte offsets into file1 and file2 respectively, and may be either octal or decimal; a leading 0 denotes octal. Options: -l Print the byte number (d...
cmssgi2jpg converts an SGI image file into a JPEG compliant JFIF image file and preserves the embedded ICC device profile if one is present. The compression level can be set from the command line. The resulting image file is written to the same directory as the original, with the extension changed to .jpg. Command Line Options cmssgi2jpg supports the following command line options: -q quality Specifies the quality level required for the resulting image. (This may be thought of as the inver...
cmstag associates an International Color Consortium (ICC) profile with one or more image files. The image files need not all be in the same format. There are two possible ways to associate the profile with the image(s). By default, or if the -f flag is set, the full ICC profile will be embedded as a tag in the image file(s). If the -n flag is set, then only the name of the file will be embedded. This approach is only useful if the image file and profile are guaranteed to always resid...
cmstaggif associates an International Color Consortium (ICC) profile with a GIF image file; this is called "tagging" the image file. There are two possible ways to associate the profile with the image. By default, or if the -f flag is set, the full ICC profile will be embedded as a tag in the image file. If the -n flag is set, then only the name of the file will be embedded. This approach is only useful if the image file and profile are guaranteed to always reside on the same machi...
cmstagjpeg associates an International Color Consortium (ICC) profile with a JPEG image file (in the JFIF file format); this is called "tagging" the profile. There are two possible ways to associate the profile with the image. By default, or if the -f flag is set, the full ICC profile will be embedded as a tag in the image file. If the -n flag is set, then only the name of the file will be embedded. This approach is only useful if the image file and profile are guaranteed to always...
cmstagsgi associates an International Color Consortium (ICC) profile with an SGI image file. There are two possible ways to associate the profile with the image. By default, or if the -f flag is set, the full ICC profile will be embedded as a tag in the image file. If the -n flag is set, then only the name of the file will be embedded. This approach is only useful if the image file and profile are guaranteed to always reside on the same machine. The profile tag is preserved when conv...
cmstagstiff associates an International Color Consortium (ICC) profile with an image file in the STIFF image file format. Note that the file must be in the STIFF Streamable TIFF image file format. This procedure will mangle a TIFF file that is not in the STIFF file format. If Impressario is installed, files may be converted into the STIFF format using /usr/lib/print/il2stiff. Command Line Options cmstagstiff supports the following command line options: -s s...
cmstif2jpg converts a TIFF image file into a JPEG compliant JFIF image file and preserves the embedded ICC device profile if one is present. The compression level can be set from the command line. The resulting image file is written to the same directory as the original, with the extension changed to .jpg. Command Line Options cmstif2jpg supports the following command line options: -q quality Specifies the quality level required for the resulting image. (This may be thought of as the inver...
co retrieves a revision from each RCS file and stores it into the corresponding working file. Pathnames matching an RCS suffix denote RCS files; all others denote working files. Names are paired as explained in ci(1). Revisions of an RCS file may be checked out locked or unlocked. Locking a revision prevents overlapping updates. A revision checked out for reading or processing (e.g., compiling) need not be locked. A revision checked out for editing and later checkin must normally be locked. Chec...
cocogif uses the International Color Consortium (ICC) profiles to determine how to perform the appropriate color management operation ("color correction", hence "coco") upon a GIF image file. The operation will be a color space conversion from the input device color space to the output device color space. The device color space associated with the input stream is determined in one of four ways. The following approaches are tried in order: o First, if the -s flag is set, the specified s...
cocojpeg uses the International Color Consortium (ICC) profiles to determine how to perform the appropriate color management operation ("color correction", hence "coco") upon a JPEG/JFIF image file. The operation will be a color space conversion from the input device color space to the output device color space. The device color space associated with the input stream is determined in one of four ways. The following approaches are tried in order: o First, if the -s flag is set, the spec...
cocostiff uses the International Color Consortium (ICC) profiles to determine how to perform the appropriate color management operation ("color correction", hence "coco") upon a TIFF stream. The operation will be a color space conversion from the input device color space to the output device color space. A TIFF stream is a TIFF image file in the Streamable TIFF (STIFF) format. STIFF files are directly created by Impressario products, such as gscan. Regular TIFF image files can...
col reads from the standard input and writes onto the standard output. It performs the line overlays implied by reverse line feeds (ASCII code ESC-7), and by forward and reverse half-line-feeds (ESC-9 and ESC-8). col is particularly useful for filtering multicolumn output made with the .rt command of nroff and output resulting from use of the tbl(1) preprocessor. If the -b option is given, col assumes that the output devi...
When porting a large application a critical question is ``How do I know if names in this application conflict with names in libraries I must use?'' Collide answers that question by finding name collisions across archive libraries and object files. It treats a Dynamic Shared Object (dso) as if it were an archive library. Given a list of files, collide finds all duplicate external names and writes those names to standard output. There is no output if there are no conflicts. The -l (longform) opt...
The colltbl command takes as input a specification file, file, that describes the collating sequence for a particular language and creates a database that can be read by strxfrmstrcmp(3C), strncmp(3C), or memcmp(3C). strcoll(3C) transforms its arguments and does a comparison. If no input file is supplied, stdin is read. The output file produced contains the database with collat...
Colorview is an X11 program that displays a color ``patch'' and a list of color names from an X11 rgb database. The color for a name is displayed by clicking the left mouse button over the color name. Command-line arguments are: -browse only lists the colors; the Accept and Apply buttons are not displayed. -display dpy specifies the X server to contact; see X(1). -geometry geom specifies the preferred size and position of the window; see X(1). -name name specifies the application name under wh...
comb generates a shell procedure [see sh(1)] which, when run, will reconstruct the given SCCS files. The reconstructed files will, hopefully, be smaller than the original files. The arguments may be specified in any order, but all keyletter arguments apply to all named SCCS files. If a directory is named, comb behaves as though each file in the directory were specified as a named file, except that non-SCCS files (last component of the path name does not begin with s.) and unreadable files are si...
comm reads file1 and file2, which should be ordered in ASCII collating sequence [see sort(1)], and produces a three-column output: lines only in file1; lines only in file2; and lines in both files. The file name - means the standard input. Flags 1, 2, or 3 suppress printing of the corresponding column. Thus comm -12 prints only the lines common to the two files; comm -23 prints only lines in the first file but not in t...
The command utility causes the shell to treat the arguments as a simple command, suppressing the shell function lookup. If the command_name is the same as the name of one of the special builtin utilities, the special properties in the enumerated list below (See SPECIAL BUILT-IN PROPERTIES) will not occur. In every other respect, if command_name is not the name of a function, the effect of command will be the same as omitting command. The command utility also provides information concerning how a...
Compress reduces the size of the named files using adaptive Lempel-Ziv coding. Whenever possible, each file is replaced by one with the extension .Z, while keeping the same permission modes, access and modification times. When invoked by the superuser the ownership modes are also retained. If no files are specified, the standard input is compressed to the standard output. Compressed files can be restored to their original form using uncompress or zcat. The -d option causes compress to uncompress...
comvpiew provides a graphical interface to view an image and the result of compressing the image with either sofware or hardware JPEG while interactively setting the quality factor of the compressed image. The size of the original image, the size of the compressed image, and the compression ratio are displayed. As an option the compresses/decompress cycle can be performed multiple times, with the resulting image then displayed. compview also provides panels to view the difference between the ori...
concerta ("Concert A") provides a graphical interface to a sine wave generator which can be set to produce a tone at any selected frequency or MIDI key number. It is useful for tuning samples while creating preset files for midisynth(1).
configAutoLogin is a privileged command that either enables or disables the auto login feature. If auto login is enabled, the system will automatically login to a specific user account when the system is restarted. Since no password is requested for auto login, this means that anyone can use the auto login account to gain access to the system.
Configdefaultroute adds or deletes a default route from the network routing table. This enables connection to be established with with the remote location. This may be necessary if a point-to-point link is in use or when route are off.
This command with the -up option activates the primary interface. The file /etc/config/ifconfig-1.options is updated. The -down option deactivates the primary interface. If your system is a standalone machine or you are using some other network interface, such as ISDN or modem instead of the ethernet interface, you may want to deactivate the ethernet interface. When the ethernet port is not connected and the interface is still up, you may see a dialog box that pops up at a regular interval with ...
This command with the -off option enables the user to stop forwarding routing information to other systems. If multiple network interfaces are present or if a point-to-point link is in use, you may want to suppress the routing information. The -q option is added to /etc/config/routed.options. The -on option enables the routing information to be forwarded again.
The program configkfs finds and allows users to mount AppleShare volumes from AppleShare servers on the network. It is a semifriendly interactive front-end to the mount(1m) and mount_kfs(1m) programs. Users who have X displays should use the vastly superior xktalk(1) program. The flags are defined as follows: -a look in all zones (default is the local zone) -O look for servers with this name (default is all servers) -T look for this type of server (default is AFPServer) -Z look in this zone (def...
The program configks configures printers on an AppleTalk network. The flags are defined as follows: -a look in all zones (default is the local zone) -P look for devices with this name (default is LaserWriter) -T look for this type of printer (default is LaserWriter) -Z look in this zone (default is local zone) This program looks for all AppleTalk printers that match the specified options. It then asks if you want to set up a spooler for them. It also prompts to see if you want to configure seria...
configmail is the historic interface to modifying parameters used in the sendmail.cf sendmail.cf file shipped with IRIX to obtain information about the local mail environment. configmail can also be executed by the user to display and/or modify that information. configmail is no longer the primary way to configure the sendmail.cf file. The correct way is to modify the sendmail.mc file. configmail can be used to generate a new sendmail.cf from the information and settings in the sendmail.mc file....
The configmon utility is responsible for tracking changes in system hardware and software configuration. It performs its duties automatically during system start-up. configmon gathers information about hardware and software components installed in the system and compares the results to configuration data stored in the Embedded Support Partner (ESP) database. If it finds that any hardware or software components have been installed or deinstalled, it updates the database and logs information about...
configNetIf configures the network interfaces on the system. This command not only updates the given network interface, but also updates relevant system files. This command is used by the Set Up and Start Networking and Turn Off Networking tasks.
configResolver configures the host resolution order used by various applications to resolve the hostnames on the system. This command is used by the Set Up and Start NIS, Add Host, and Modify Network Settings tasks to configure the host resolution order.
The program confirmjob is an X11/Motif client that creates a single MessageBox and waits for a button click. The text in the MessageBox is supplied by the question argument. The -title option will set the MessageBox's title bar to titlestring.
ConvertLayout reads the layout files from the Indigo Magic 1.x desktop and writes an IRIX Interactive Desktop 2.0 format layout file for those directories that still exist. It is not intended to be run directly by end users. Note: The positions of remote device icons on the background are not translated. Local devices are automatically generated. ConvertLayout accepts the following options: -v Verbose mode. Give detailed information on each layout file. -s Silent mode. Give no progress informati...
conv_alias reads $HOME/.zmailrc for MediaMail aliases and adds any new aliases to user's Netscape Address Book. If the alias already exists in the Address Book as a user or list, the alias will not be added and a message will be printed. conv_alias does not alter $HOME/.zmailrc. It updates $HOME/.netscape/address-book.html, or creates it if it doesn't exist. A backup copy of the Address Book(s) is taken before any modifications are done ($HOME/address-book.html.original or $HOME/address-book.h...
conv_nspref reads $HOME/.netscape/preferences or $HOME/.netscapepreferences and copies the most important preferences into the new $HOME/.netscape/preferences.js file. If $HOME/.netscape/preferences.js already exists then this command does nothing. conv_nspref is only required to work around a serious bug in Communicator 4.05 and should be fixed in the 4.1 release. PPPPaaaaggggeeee 1111...
The cord(1) command can be used to rearrange procedures in an executable object to correspond with an ordering provided in a reorder_file. Normally, the ordering is arranged to reduce virtual memory paging and/or instruction cache misses. The reorder file can be produced by the -feedback option to prof (see prof(1)). The -gprof -feedback options in prof can be used to produce a procedure ordering based on the function call counts. The default reorder file is prog.pixie.fb (if that does not exist...
cosmocreate is a WYSIWYG editor for creating HyperText Markup Language (HTML) documents for publishing on the World Wide Web (WWW). Through its WYSIWYG interface and its tight integration with the IRIX Interactive Desktop, cosmocreate greatly simplifies the task of creating compelling HTML documents. The cosmocreate program contains extensive online help and users guide. For this reason, this man page will not go into detail on the interactive aspects of the program. Please read the Cosmo Create...
covici retrieves a revision from an RCS file and opens it for editing using vi (1). The edited file is then stored as a new revision into the appropriate RCS file (see rcs (1)). A pathname matching an RCS suffix denotes an RCS file; other pathnames are assumed to denote working files not currently under RCS. If the pathname matches an RCS suffix covici runs co -l (see co (1)) and then loads the working file into vi. If the path does not match an RCS suffix the file is loaded directly into vi. Af...
file1 is copied (linked, moved) to target. Under no circumstance can file1 and target be the same (take care when using sh(1) metacharacters). If target is a directory, then one or more files are copied (linked, moved) to that directory. If target is an existing file, its contents are destroyed, except in the ln and ln -s case where the command will fail and ln will write a diagnostic message to standard error (use the -i or -f option to override this behavior). NOTE that this is a change from t...
The -i, -o, and -p options select the action to be performed. The following list describes each of the actions (which are mutually exclusive). cpio -i (copy in) extracts files from the standard input, which is assumed to be the product of a previous cpio -o. Only files with names that match patterns are selected. patterns are regular expressions given in the filename-generating notation of sh(1). In patterns, metacharacters ?, *, ...
cpp is a K&R C language preprocessor designed for standalone use and to be invoked as the first pass of all FORTRAN compilations and any K&R mode C compilation with the -mp option. Thus, cpp's output is designed to be in a form acceptable as input to the next pass of the C compiler. Standalone use of cpp on C code is not suggested, since the functionality of cpp has been incorporated into the C front-end. See m4(1) for a more general macro processor. This is a K&R C language preprocessor, not a...
IRIX Checkpoint and Restart (CPR) offers a set of user-transparent software management tools, allowing system administrators, operators, and users with suitable privileges to suspend a job or a set of jobs in midexecution, and restart them later on. The jobs may be running on a single machine or on an array of networking connected machines. CPR may be used to enhance system availability, provide load and resource control or balancing, and to facilitate simulation or modeling. The cview command p...
The cpuset command is used to create and destroy cpusets, to retrieve information about existing cpusets, and to attach a process and all of its children to a cpuset. A cpuset is a named set of CPUs, which may be defined to be restricted or open. A restricted cpuset only allows processes that are members of the cpuset to run on the set of CPUs. An open cpuset allows any process to run on its cpus, but a process that is a member of the cpuset can only run on the CPUs belonging t...
cron executes commands at specified dates and times. Regularly scheduled commands can be specified according to instructions found in crontab files in the directory /var/spool/cron/crontabs. Users can submit their own crontab file via the crontab(1) command. Commands that are to be executed only once can be submitted using the at(1) command. The following options are supported: -j jobs Specify the maximum number of jobs (MAXRUN) that cron can simultaneously run. The default value is 25. The maxi...
crontab copies the specified file, or standard input if no file is specified, into a directory that holds all users' crontabs. The -r option removes a user's crontab from the crontab directory. crontab -l will list the crontab file for the invoking user. The -e option spawns an editor which contains the user's current crontab (as output by crontab -l), and automatically updates the crontab when the user saves the file and exits the editor. The name of the editor to invoke can be specified by ...
crypt reads from the standard input and writes on the standard output. The password is a key that selects a particular transformation. If no argument is given, crypt demands a key from the terminal and turns off printing while the key is being typed in. If the -k option is used, crypt will use the key assigned to the environment variable CrYpTkEy. crypt encrypts and decrypts with the same key: crypt key cypher crypt key
csh, the C shell, is a command interpreter with a syntax reminiscent of the C language. It provides a number of convenient features for interactive use that are not available with the standard (Bourne) shell, including filename completion, command aliasing, history substitution, job control, and a number of built-in commands. As with the standard shell, the C shell provides variable, command and filename substitution....
csplit reads file and separates it into n+1 sections, defined by the arguments arg1...argn. By default the sections are placed in xx00...xxn (n may not be greater than 99). These sections get the following pieces of file: 00: From the start of file up to (but not including) the line referenced by arg1. 01: From the line referenced by arg1 up to the line referenced by arg2. . . . n: From the line referenced by argn to the end of file. If the file argum...
Ctags makes a tags file for ex(1) from the specified C, Pascal, Fortran, YACC, lex, and lisp sources. A tags file gives the locations of specified objects (in this case functions and typedefs) in a group of files. Each line of the tags file contains the object name, the file in which it is defined, and an address specification for the object definition. Functions are searched with a pattern, typedefs with a line number. Specifiers are given in separate fields on the line, separated by blanks or ...
The ctrace command allows you to follow the execution of a C program, statement-by-statement. The effect is similar to executing a shell procedure with the -x option. ctrace reads the C program in file (or from standard input if you do not specify file), inserts statements to print the text of each executable statement and the values of all variables referenced or modified, and writes the modified program to the standard output. You must put the output of ctrace into a temporary file because the...
cu calls up another UNIX system, a terminal, or possibly a non-UNIX system. It manages an interactive conversation with possible transfers of ASCII files. cu accepts the following options and arguments: -sspeed Specifies the transmission speed (300, 1200, 2400, 4800, 9600); The default value is "Any" speed which will depend on the order of the lines in the /etc/uucp/Devices file. -lline Specifies a device name to use as the communication line. This can be used to override the search that would...
Electronic Services CustomerLink (custlink) application provides a desktop interface to the information stored in the Silicon Graphics database. CustomerLink allows a registered user to view, maintain, and update information pertaining to themselves and their relationship with Silicon Graphics. Command Lines -config on|off Starts the application to allow reconfiguration of CustomerLink to setup the type of network configuration and the country where the application is runnin...
Use cut to cut out columns from a table or fields from each line of a file; in data base parlance, it implements the projection of a relation. The fields as specified by list can be fixed length, that is, character positions as on a punched card (-c option) or the length can vary from line to line and be marked with a field delimiter character like tab (-f option). cut can be used as a filter; if no files are given, the standard input is used. A file name of ``-...
Cvbuild provides a graphical display of build dependency information, as determined from a description file for make(1). COMMAND LINE OPTIONS Cvbuild accepts the following options: -directory Change the named directory as the working directory. -f Use the named makefile as the description file, instead of the default.
cvcat is used by the WorkShop Debugger and Performance tools to prepare command-line arguments for the target process when the complete command line is longer than can be handled by the canonical processing of the pty driver. It reads its standard input, concatenating lines and writing the result to the named file.
cvconfig is a shell script that allows the user to configure their environment so that WorkShop knows which configuration management system is in use. This is relevant when the user attempts to checkin, checkout, or uncheckout using the Versioning menu item in the File Menu of Source View (cvsource), or the Source menu of the debugger's main view. For example, to configure your environment to use rcs, run cvconfig with the argument rcs. Then, when you run WorkShop, rcs commands will be used for...
cvconnect is invoked by the WorkShop Debugger and Performance tools in order to establish a secure connection to the debug server, cvpcs. It is not normally run by users.
cvcord is a tool designed to allow a user to explore the working set behavior of an executable or shared library (DSO), and to construct a feedback file for use by cord to generate an executable with improved working-set behavior. The premise for this tool is as follows: when application and/or DSOs execute, they bring in pages from their instructions (text) as needed to execute the chain of functions triggered by any operation. By recording a WorkShop Performance Experiment, and capturing ideal...
cvcov invokes the command line version of the WorkShop Tester dynamic test coverage tool. cvxcov invokes the GUI version of the same tool. All functionality is available from either program. Some of the graphical representations of the data will be available only from cvxcov. For more information on using cvcov please refer to the "CASEVision/WorkShop Tester User's Guide." For installation of cvcov please refer to the "WorkShop Tester Release Notes."...
cvd invokes the WorkShop Debugger. The executable used with the debugger is produced by specifying an appropriate option (usually -g) to the compiler. When the executable parameter is specified, the WorkShop Debugger will be invoked with the specified executable as the target. Breakpoints and other traps may then be set on the executable before running the program. If a corefile is specified, or if the file core exists in the current directory, the WorkShop Debugger can be used to look at the st...
cvexprnt prints out the formatted contents of one or more WorkShop performance experiment directories or experiment data files. Each of the files consists of a string of beads, as described in ../include/bead.h If the name is that of a directory, the file named DESC in that directory, and any other files named within it will be dumped. If the name is that of a file, just the file will be dumped. Options are used to control the printing of the files. -d Print detailed information for each bead. -...
cvhang instantiates a process from the given command and arguments, and leaves it poised for execution just before it would execute its first user instruction. The WorkShop Debugger may then attach to it and take control of its execution.
cvinstr is a program which reads an executable program, and writes an equivalent program containing additional instrumentation code used for performance measurment of the executable. The additional code either maintains an array of counts representing the number of times various elements of the program are executed, or the number of statistical samples that found the PC at various values, or both. If the target program uses dynamic shared libraries, they are also instrumented. Normally, cvinstr ...
Cvmake is a program building tool designed to help programmers quickly compile their programs, find errors, edit the source files, and recompile. GETTING STARTED Cvmake is invoked automatically when the user selects the "Recompile" menu option in the File menu of the WorkShop Source Viewer. It can also be invoked directly from the command line. COMMAND LINE OPTIONS Cvmake accepts the following options: -f [makefile] Use the named makefile instead of the default. Cvmake passes this option along...
cvmeter is a WorkShop program that presents a graphical display of the process resource usage data for a running process, whose pid is given by the argument. It shows a number of stripcharts for various combinations of resources. It does not record data, and can not be scrolled back. It may also be launched using the Views menu on any of the WorkShop Debugger Views.
cvpav reads the analysis file(s) generated by MIPSpro 7.2 or higher, for the files in a fileset, and displays information about the loops in the files in a window. It allows the user to select any loop, request changes governing that loop, and then install those changes in the source. The analysis file is generated by MIPSpro 7.2 or higher, which is a prerequisite for WorkShop Pro MPF. The analysis file contains the information currently shown on MIPSpro 7.2 or higher, listing file (*.l), and so...
cvpcs is normally invoked by cvpcsd and, after performing the security checks described in cvconnect(1m) serves as a debug server for the various visible components of the WorkShop Debugger (cvd) and the WorkShop Performance Analyzer (cvperf).
cvperf presents a graphical display of the performance data gathered in a WorkShop Performance experiment whose experiment directory is given by . cvperf can also present the display of performance information from a pixie counts file given by . To use this feature, you will need to install a patch with a later version of pixie than is on the current released system. Contact Customer Support to obtain the patch....
cvspeed is the descriptive term for the WorkShop performance tools. It no longer exists as a program in the current release. To record a performance experiment, invoke the WorkShop Debugger, cvd, on the executable to be measured, and use the ``Perf'' menu entry to select the type of data to be recorded. To examine a previously recorded experiment, invoke the WorkShop Performance Analyzer, cvperf, with the experiment directory as its argument. You may also use the system program pixie to genera...
Cvstatic is a source code analysis tool designed to help programmers understand the structure of a program. Cvstatic allows the programmer to ask questions about a collection of files, such as "Who calls this function", or "Who references this variable". Cvstatic supports C, C++, and Fortran, and provides various ways to look at your program structure graphically, in addition to providing textual results of queries. GETTING STARTED To get started, type "cvstatic" in the directory containin...
cvusage is a WorkShop component that runs a process from the given command and arguments and prints out a summary of the resources used during the run. It is used in exactly the same way as time(1), but prints additional information. The usage information is printed to stderr in the form: 1.89 real, 0.04 user, 0.29 sys, 15 majf, 2 minf, 0 sw, 1 rb, 0 wb, 21 vcx, 38 icx The real, user and sys fields give the real-time, user-CPU time and system-CPU time, respectively. majf gives major page faults,...
cvxcov invokes the GUI version of the WorkShop Tester dynamic test coverage tool. cvcov invokes the command line version of the same tool. All functionality is available from either program. Some of the graphical representations of the data will be available only from cvxcov. For more information on using cvxcov please refer to the "CASEVision/WorkShop Tester User's Guide." For installation of cvxcov please refer to the "WorkShop Tester Release Notes."...
cvxhang is used by the WorkShop Debugger and Performance tools to instantiate the target process with its optional args and leave it waiting just before executing its first instruction. A debugger, or any other tool, may then attach to the process and take control of its execution. If the -signal argument is given, once the process is created, cvxhang informs the window of the WorkShop Debugger requesting the creation, as given by the optional hostname and window on the command line, of the targ...
The cxref command analyzes a collection of C, yacc, and lex files and attempts to build a cross-reference table. It produces a listing on standard output of all symbols (auto, static, and global) in each file separately, or, with the -c option, in combination. Each symbol contains an asterisk (*) before the declaring reference. If the environment variable _XPG is defined, cxref operates in conformance with the X/Open XPG4 specifications. The format of the output may differ in accordance to the X...
If no argument is given, or if the argument begins with +, the current date and time are printed. Otherwise, the current date is set if the user has appropriate privileges and the system permits the setting of the system date and time. Supplementary code set characters in +format (see below) are recognized and displayed according to the locale specified in the LC_CTYPE environment variable [see LANG on environ(5)]. Month and weekday nam...
DATman is a program for playing audio tapes and CDs. When called as datman it works as a tape recorder. When the -cd option is specified, DATman works as a CD player.
dbx is a source-level debugger that allows the user to trace the execution of a given object-file as well as a pool of arbitrary processes. dbx works with cc(1), f77(1), pc(1) as(1), CC(1), and MIPS machine code on 32- and 64-bit ELF object-files. The object-file used with the debugger is produced by specifying an appropriate option (usually -g) to the compiler (and linking the resulting object(s), creating an executable object-file). The resulting object-file contains debugging information, inc...
dbxhang starts a program running by doing a fork(2) and exec(2), leaving the program stopped before executing its first instruction. This is useful when a program to be debugged does unusual things with tty characteristics, or which is sensitive to the character and you don't want any in the dbx command window sent to the program to be debugged. Use dbxhang on the program to be debugged in one window and intercept the stopped program with dbx -p or dbx -P from a differen...
Dc is a reverse-polish desk calculator which supports unlimited precision arithmetic. It also allows you to define and call macros. Normally dc reads from the standard input; if any command arguments are given to it, they are filenames, and dc reads and executes the contents of the files before reading from standard input. All normal output is to standard output; all error output is to standard error. A reverse-polish calculator stores numbers on a stack. Entering a number pushes it on the stack...
dd copies the specified input file to the specified output with possible conversions. The standard input and output are used by default. The input and output block sizes can be specified to take advantage of raw physical I/O. dd processes supplementary code-set characters according to the locale specified in the LC_CTYPE environment variable (see LANG in environ(5)), except as noted below. Option Values if=file Input filename; standard input is default. ...
ddopt, the MIPS data-dependency-based optimizer, reads the input binary ucode file on a procedure by procedure basis, performs loop-based transformations on each outer-most loop nest in each procedure and outputs the optimized binary ucode file. By convention, it takes a binary ucode file with the extensions .B or .M as input and output a binary ucode file with the extension .D. In the compilation process, ddopt runs after the front-end, after uld and usplit, and before umerge, uopt and ugen. Cu...
deleteSerialDevice is a privileged command that removes configuration information about a serial port. deleteSerialDevice can be used to unconfigure terminals, input devices, and midi. Use deleteModem(1M) to unconfigure modems. When midi is unconfigured, the stopmidi command is run.
deleteUserAccount deletes a user account from the system and handles the deleted account's files. The deleteUserAccount command has the following required parameter: -l login-name The login name of the user account to delete The deleteUserAccount command has the following optional parameters: -A Indicates that all of the user's files local to the system should be deleted. None of -D, -H, or -E may be specified with the -A option. -D Indicates that the user's home directory should be deleted. ...
delta is used to permanently introduce into the named SCCS file changes that were made to the file retrieved by get(1) (called the g-file, or generated file). delta makes a delta to each named SCCS file. If a directory is named, delta behaves as though each file in the directory were specified as a named file, except that non-SCCS files (last component of the path name does not begin with s.) and unreadable files are silently ignored. If a name of - is given, the standard input is read (see WARN...
The deroff command reads each file in sequence and removes all nroff and troff command lines, backslash constructions, macro definitions, eqn constructs (between .EQ and .EN lines or between delimiters), and table descriptions and writes the remainder on the standard output. deroff follows chains of included files (.so and .nx commands); if a file has already been included, a .s
This reference page describes the Desktop customization panel, which is part of the IRIX Interactive Desktop software. For information about the entire IRIX Interactive Desktop environment and about the XUSERFILESEARCHPATH environment variable, see the IID(1) man page. The desktop customization panel allows the user to set certain resources applicable to the file manager (fm) and the IRIX Interactive Desktop environment. The desktop panel can be run from a Unix shell command line or from the too...
desktophelp is a program that is launched from the IRIX Interactive Desktop(TM) Toolchest, under the "Help" menu. Depending upon which version of IRIX you are running, the specific submenu item that launches desktophelp is either "Desktop Help" (IRIX 6.2), "How Do I..." (IRIX 6.3 or 6.4), or "Quick Answers" (IRIX 6.5). desktophelp has the simple task of posting a request to the sgihelp(1) process. If this process is not already running, it will start-up automatically. At the point sgihel...
devnm identifies the special file associated with the mounted filesystem where the argument name resides. This command is most commonly used by /etc/brc (see brc(1M)) to construct a mount table entry for the root device.
df reports the number of total, used, and available disk blocks (one disk block equals 512 bytes) in filesystems. The filesystem argument is a device special file containing a disk filesystem, a mounted NFS filesystem of the form hostname:pathname, or any file, directory, or special node in a mounted filesystem. If no filesystem arguments are specified, df reports on all mounted filesystems. The options to df are: -b Causes df to report usage in 512-byte units, which is the default. -e Causes on...
dgld is the server for programs performing remote graphics with the Graphics Libary or for programs linked with the Distributed Graphics Library. The server provides both a subprocess graphics facility and a networked graphics facility. dgld is started either by inetd(1M) or by dnserver. TCP socket connections are serviced by inetd. inetd listens for connections on the port indicated in the ``sgi-dgl'' service specification; see services(4). When a connection is found, dgld is started as speci...
dhcpdb is a database manager for the NDBM database used by the DHCP server to store address leases. It provides a command line interface to add, delete, update, or print the DHCP database. The tool can be used either in entry mode to manipulate individual entries or in file mode. In file mode the entire contents of the database can be dumped to a file or loaded from a file. COMMAND LINE OPTIONS In the entry mode options can be used to add (replace), delete, update a lease, or print an entry usin...
dhcp_bootp is the server that communicates with other DHCP and proclaim(1M) clients to provide configuration parameters, including at least an IP address. The format of DHCP messages is based on bootp messages (see RFC 951). A detailed protocol specification for DHCP is contained in RFC 1541, available from the Network Information Center. The DHCP protocol uses UDP/IP as its transport mechanism. The DHCP server receives service requests at the UDP port indicated in the bootp service description ...
dhcp_relay is the relay-agent that communicates with other DHCP and proclaim clients and servers to provide address-leases across networks using DHCP messages. The format of DHCP messages is based on BOOTP messages (see RFC 951). A detailed protocol specification for DHCP is contained in RFC 1541, available from the Network Information Center. The DHCP relay-agent receives service requests at the UDP port indicated in the bootp service description contained in the file /etc/services (see service...
diagsetup controls the running of cached and onlinediag by the diag user. This command can be used to either turn off the running of these diagnostic tests or to make them run more frequently or less frequently then they do by default. The -x cached | onlinediag parameter indicates which diagnostic testing program we are modifying the behavior of. We can modify the frequency of running one of these programs. The -x parameter must be present for this program to run. The -h par...
If both arguments are directories, diff sorts the contents of the directories by name, and then runs the regular file diff algorithm (described below) on text files which are different. Binary files which differ (unless -a is specified), common subdirectories, and files which appear in only one directory are listed. Options when comparing directories are: -l long output format; each text file diff is piped through pr(1) to paginate it, other differences are remembered and summarized after all te...
Diff3 compares three versions of a file, and publishes disagreeing ranges of text flagged with these codes: ==== all three files differ ====1 file1 is different ====2 file2 is different ====3 file3 is different The type of change suffered in converting a given range of a given file to some other is indicated in one of these ways: f : n1 a Text is to be appended after line number n1 in file f, where f = 1, 2, or 3. f : n1 , n2 c Text is to be changed in the range line n1 to line n2. If n1 = n2, t...
dircmp examines dir1 and dir2 and generates various tabulated information about the contents of the directories. Listings of files that are unique to each directory are generated for all the options. If no option is entered, a list is output indicating whether the file names common to both directories have the same contents. dircmp processes supplementary code set characters in directory and file names according to the locale specified in the LC_CT...
dirview presents the contents of a directory or URL using the IRIX Interactive Desktop file manager fm. If an fm is already open to that location, its window will be raised. Otherwise, a new fm will be started which will open the directory or URL specified as the pathname argument, and present icons of the items contained in that directory or URL. The icons can be moved, copied, opened, and manipulated in other ways. dirview is a link to fm. See fm(1) for more information, including a descriptio...
dis disassembles object files into machine instructions. The options are as follows: -b beginaddress disassemble starting at the given address. The address can be in decimal, octal (with a leading 0), or hexadecimal (with a leading 0x). -d section disassemble the named section as data, printing the offset from the beginning of the section. -C demangle C++ names. -D section disassemble the named section as data, printing the actual address of the data. -e endaddress disassembly stops at the given...
The disableXhost utility is used to prevent remote hosts from placing windows on or otherwise getting access to the local display during a user's login session. All remote hosts will have display access disabled, whether access originally was granted implicitly (ex., using xhost +) or explicitly (ex., using xhost + hostname). Remote toolchests will no longer be able to post windows on the local display; however, remote iconviews (dirviews) will be able to continue displaying and spawning child ...
This utility is designed to assist in creating striped XLV disk volumes for data streaming applications. There are many factors that must be taken into account when creating a striped XLV volume such as stripe alignment, restrictions imposed by a filesystem on the volume and by the operating system I/O functions such as readv(). This tool, in conjunction with diskprep and diskperf will help extract maximum performance from a striped XLV disk configuration for data streaming applications. The out...
Managers display information about your system and provide access to interactive guides (also called tasks) that let you administer your system. For example, the User Manager displays a list of the user accounts currently on the system and gives you access to guides like "Add a User Account" and "Modify a User Account." In a Manager window, you can open a guide by choosing its name from the Task menu or by clicking its button at the bottom of the window. The Disk Manager monitors the fixed d...
diskpatch is normally run from cron(1M) twice a week and whenever the system is shutdown. It uses the hardware inventory mechanism to find all the disk drives on the system attached to the supported SCSI controllers, (excluding the jag(7M) controller) and determines the type of disk drive by sending the SCSI inquiry command, using the ds(7M) driver. If the drive is found to be one of the susceptible drives, a special command is issued to the drive that causes it to spin down (stop) for a brief p...
The purpose of this utility is to measure the performance of a disk configuration as either a raw volume or with a filesystem such as XFS. A number of different test patterns are run including forward and backward sequential as well as random seek read/write patterns. The output is tabulated in a form usable for processing by other utilities such as gnuplot for further analysis.
diskusg generates intermediate disk accounting information from data in files or the standard input if omitted. diskusg outputs lines on the standard output (one per user) in the following format: uid login #blocks where uid is the numeric user ID of the user login is the login name of the user #blocks is the total number of disk blocks allocated to this user diskusg is normally used to read the inodes of efs or xfs...
distcp copies or compares software distributions. Software distributions are software releases for one or more software products prepared by Silicon Graphics and installed by inst(1M) or swmgr(1M). distcp is typically used to copy a software release tape or to copy software from a tape to a server workstation, which becomes the software distribution source for many workstations on a network. NOTE: Installing (loading) the miniroot from tape is no longer possible as of IRIX 6.2. It is still possi...
dkstat reports physical disk I/O statistics. The default report shows the average physical I/O rate (requests per second, or IOPS) to each disk during the sample interval (default 5 seconds). The options to dkstat are as follows; -? Output usage information. -h host Report for the host host, which must be running pmcd(1). The default is to report for the local host. -L Report for the local host and by-pass pmcd(1). This option is mutually exclusive with the -h option and is the default if pmcd(1...
The given command is executed and after each child process exits dlook shows where each process was running when it exited and how its stack and heap data was placed with page size information. If sampling is enabled, this data is also displayed at regular intervals.
dmconvert converts between different digital media files. Input files are combined, converted, and written to an output file of a selected format. dmconvert may also be used to describe input files without converting to an output file. Supported files include the following audio, image, and movie formats. The output file format is specified with the -f option, and may be any of the formats except those marked describe-only or read-only. Format Description Audio aifc Audio Interchange File Format...
dminfo displays information about the contents of each of the files. Supported digital media files are those readable by dmconvert(1), and include many audio, image, and movie formats.
dmplay plays back a movie file which contains a JPEG-compressed video track. By default, dmplay shows the video output in a window on your monitor as well as to video output devices connected to mvp (built-in on O2 systems), impact (Impact or Octane Video, as well as the Impact or Octane Compression options), ev1 (Indy Video, Indigo2 Video, and Galileo Video, for other systems). A hardware decompressor (ice for O2 systems, impact for Impact and Octane Compression, cosmo for others) is used to de...
dmrecord records a movie file which contains a JPEG-compressed video track and, optionally, an audio track. dmrecord supports realtime video recording to disk through Impact Compression, Octane Compression, ev1 video and Cosmo Compress. (Indy Video, Indigo2 Video, and Galileo Video are ev1 = 'Express Video' devices.) On O2 systems, dmrecord uses the built-in MVP ports and ICE compressor. The recorded movie file contains JPEG-compressed image data. Audio is recorded as stereo or mono 16-bit dat...
Without an argument, domainname displays the name of the current network information service (NIS) domain, which typically encompasses a group of hosts under the same administration. As such, the name of an NIS domain is typically a valid Internet domain name in order to be consistent with the domain name used by the BIND name server, named(1M). Only the super-user can set the domain name by giving an argument; this is performed by the system startup procedure using the contents of /var/yp/ypdom...
The given program is executed after placement policies are set up according to command line arguments and the specifications described in placement_file.
The given command is executed and memory accesses are sampled; after completion, dprof prepares a histogram of memory accesses. Histograms are computed for each thread of multi-threaded applications that utilize sproc(2).
drop is a fun game that tests your ability to drop 3d puzzle pieces onto a grid. The goal of the game is to drop the puzzle pieces onto the green court and form a solid grid of cubes. Each time that you fill an entire grid, that grid unit will glow brightly and drop down and off the court. You get extra points for each complete grid unit that you fill. If you get enough points during a game, then you move to the next (more difficult) level. The game will get progressively harder as you ascend th...
dtl2sgft is a utility program used to assist in maintaining a full-text searchable index of online books available to the infosearch(1) application. For a specified insight(1) online book, dtl2sgft builds a full-text indexable word file which is an extraction of the content of the book. This word file is used in conjunction with the booksAdmin(1) utility to aid in constructing and maintaining a full-text index. Along with the word file, a HTML-based version of the book's table of contents is al...
This program may be used to maintain some databases used by the AppleShare server, a la ``Rebuild Desktop'' on the Mac. FullPress and WebNative users may also use it to (re)create FPO/WEB images. It performs one or more operations on one or more files, directories and/or AppleShare volumes. Running dtrebuild with no arguments will produce an up-todate list of available OPerations. In the absence of the -a option, most of the OPerations may be run on a selected subset of AppleShare volumes or d...
dtshutdown shuts down (restarts) the system after shutting down the desktop. This command is used by the Shut Down System and Restart System tasks on the toolchest(1X) System menu.
The dtSounds customization panel lets the user toggle which sounds the SGI system produces. The panel presents a set of six toggle buttons: Mute System Startup & Shutdown Tunes Desktop Sounds System Alerts Sounds Keyboard Bell Key Click Play Desktop Sounds Through (different output choices)
The dtUtilities customization panel lets the user choose favorite utility programs for use in the IRIX Interactive Desktop. For example, the program chosen as the user's Text Editor will be used any time the user double-clicks a text icon; the contents of the text file will appear in that editor. Similarly, the program chosen as the user's Web Browser will be used any time the user double-clicks a webjumper (or jumpsite) icon. These preferences are saved on a per-user basis and remembered acro...
The du command reports the number of blocks contained in all files and (recursively) directories within each directory and file specified by the name arguments. If no name arguments are given, the current directory is used. By default, the block counts reported are in terms of 512-byte blocks, but this can be modified to 1024-byte blocks by specifying the -k option (see below). The block count includes only the actual data blocks used by each file and directory, not indirect blocks o...
dump and rdump are applicable only to EFS filesystems, use xfsdump(1m) for XFS filesystems. dump backs up all files in filesystem or files changed after a certain date to magnetic tape or files. The key specifies the date and other options about the dump. key consists of characters from the set 0123456789fusCcdbWwn. Any arguments supplied for specific options are given as subsequent words on the command line, in the same order as that of the options listed. If no key is given, the key is assumed...
dumpcounts prints out the formatted contents of a .Counts file, as generated by running a pixified executable. dumpcounts recognizes the following options: -header Print the header in the file. -bbcount Print the count data bins -gprof Print the callgraph data.
dvhtool is used to copy files to and from the volume header of disks. Formerly it had other functions also, but these have long been deprecated and have been removed. The disk volume header consists of two main parts: the partition table, and the volume directory. The volume directory is used to locate files kept in the volume header area of the disk for standalone use. The partition table describes the logical device partitions. You must be superuser to use dvhtool. Invoked with no arguments (o...
The dwarfdump command prints DWARF sections as requested by specific options. With no options nothing prints! The format is intended to be human readable. If a script is to parse the output, the -d option is useful. The format may change from release to release, so it is unwise to depend too heavily on the format. The dwarfdump command accepts one or more of the following options: -a Dumps all sections. Same as -bcfilmoprsy -tfv. -b Dumps the .debug_abbrev section. -c Dumps the .debug_loc sectio...
DxfToIv converts 3D model files in Autodesk DXF R12 format into Open Inventor 2.0 files. The program converts ASCII or binary .DXF format. Polygons, polylines, and certain versions of text are converted into equivalent Open Inventor objects. The DXF file divides the objects into layers and/or blocks. These layers and blocks are converted into Open Inventor separators so all DXF entities in a given layer are placed under one Open Inventor separator node. DXF text entities that refer to an AutoCAD...
dynaweb is a HTTP (web) server extension designed specifically for delivering searchable online books via any web client. For users who prefer to view and search online manuals via a web client, Dynaweb dynamically converts full-text indexed SGML files, the same source files used for display in IRIS InSight, to HTML. dynaweb runs as a CGI (Common Gateway Interface) program, and should not be executed standalone....
ecadmin may be used on systems with MIPS R1x000 processors to configure the global event counters maintained by IRIX using the underlying hardware event counter mechanisms. The global event counters are maintained on a system-wide basis, aggregated over all processes and for all user and system mode execution. The event arguments identify hardware-specific event counters. These may be either integers or mnemonic, case-insensitive names. In conjunction with the -e option, a single event specifica...
ecfind may be used on systems with R1x000 processors to discover which processes, if any, are currently using the process-based hardware event counter mechanisms, e.g. executing an application under the control of perfex(1). This is most useful in situations where the global event counters cannot be enabled with ecadmin(1) due to concurrent use of the process-based event counters. ecfind uses icrash(1) on the running kernel, and hence must be run as root. The options to ecfind are as follows; -t...
echo writes its arguments separated by blanks and terminated by a newline (except when "-n" is specified, see below) on the standard output. It also understands C-like escape conventions; beware of conflicts with the shell's use of \: \b backspace \c print line without new-line \f form-feed \n new-line \r carriage return \t tab \v vertical tab \\ backslash \0n where n is the 8-bit character whose ASCII code is the 1-, 2- or 3-digit octal number representing that character. echo has...
ecstats may be used on systems with R1x000 processors to interrogate the global event counters maintained by IRIX using the underlying hardware event counter mechanisms. The global event counters are maintained on a system-wide basis, aggregated over all processes and for all user and system mode execution. Global event counters are enabled and disabled using the ecadmin(1) command. The options to ecstats are as follows; -a Report absolute values for the event counters (the complement of -r). -C...
ed is the standard text editor. red is a restricted version of ed. If the file argument is given, ed simulates an e command (see below) on the named file; that is to say, the file is read into ed's buffer so that it can be edited. Both ed and red process supplementary code set characters in file, and recognize supplementary code set characters in the prompt string given to the -p option (see below) according to the locale specified in the...
edit is a variant of the text editor ex recommended for new or casual users who wish to use a command-oriented editor. It operates precisely as ex(1) with the following options automatically set: novice ON report ON showmode ON magic OFF These options can be turned on or off via the set command in ex(1). -r Recover file after an editor or system crash. -x Encryption option; when used the file is encrypted as it is being written and requires an encryption key to be read. edit makes an educated gu...
Editres is a tool that allows users and application developers to view the full widget hierarchy of any X Toolkit application that speaks the Editres protocol. In addition, editres will help the user construct resource specifications, allow the user to apply the resource to the application and view the results dynamically. Once the user is happy with a resource specification editres will append the resource string to the user's X Resources file....
edquota is a quota editor. When used with the -j option all operations are performed on project quotas and command line names are project names. Without the -j option all operations are performed on user quotas and command line names are user names. One or more users or project names may be specified on the command line. When used without the -f and -l options, a temporary file is created with an ASCII representation of the current disk quotas for each user or project and an editor is then invok...
egcmd is a diagnostic tool used for debugging gigabit Ethernet (''egN'') interfaces. egcmd has a variety of options which depend upon implementation details of the gigabit Ethernet software. It is expected that egcmd will be run as directed by Silicon Graphics service personnel. See the usage message of egcmd for a complete list of debugging options.
egconfig is executed at system startup time to download the firmware for each gigabit Ethernet (''egN'') interface configured into the system. After egconfig executes, it is still necessary to use ifconfig(1M) to configure protocol addresses and other parameters. egconfig is run automatically at system startup. It should not normally be necessary to execute it, unless resetting the interface is required....
egrep (expression grep) searches files for a pattern of characters and prints all lines that contain that pattern. egrep uses full regular expressions (expressions that have string values that use the full set of alphanumeric and special characters) to match the patterns. It uses a fast deterministic algorithm that sometimes needs exponential space. egrep accepts full regular expressions as in ed(1), except for \( and \), and except for \< and \>, with the addition of: 1. A full regular expr...
eject ejects a removable mediad device. If the device has mounted filesystems, eject will first try to unmount them. Without any options, eject will act upon the first device it finds in the hardware inventory table.
The elfdump command dumps selected parts of a given ELF object file or an archive file. This command works for 32-bit or 64-bit ELF object files or ELF archives only. In the case of an archive, options other than -g generate output output from each object in the archive. elfdump accepts one or more of these options: -a Dumps the archive header of each member of an archive. -brief Dump most sections in the file. Like -h, but leaves out sections whose names begin with .debug_, .rel, or .MIPS. -c D...
enable activates the named printers, enabling them to print requests taken by lp(1). Use lpstat(1) to find the status of printers. Disable deactivates the named printers, disabling them from printing requests taken by lp(1). By default, any requests that are currently printing on the designated printers will be reprinted in their entirety either on the same printer or on another member of the same class. Use lpstat(1) to find the status of printers. Options useful with disable are: -c Cancel any...
endsession terminates a login session initiated by xdm by removing the session property placed on the root window by reaper. Removal of this property is a signal to xdm that the session should be closed. This results in immediate termination of the current login session. endsession uses the environment variable DISPLAY to determine what session to terminate. Command line options are available to change the display variable and to suppress the confirmation window. The command line options are: -d...
Env obtains the current environment, modifies it according to its arguments, then executes the command with the modified environment. Arguments of the form name=value are merged into the inherited environment before the command is executed. If no command is specified, the resulting environment is printed, one name-value pair per line. Printenv prints out the names and values of the variables in the environment, with one name/value pair per line. If name is specified, only its value is printed. I...
Epd is the host implementation for the AppleTalk Echo Protocol. It listens for Echo Protocol packets and returns replies as specified by the protocol definition. -D causes epd to remain in the foreground and print information about packets received. -x will cause this information to be printed in hexadecimal. If hostname is specified, it is used to register epd with the Name Binding Protocol; otherwise, the gethostname(2) is used to determine a name to register....
epfirm is intended to install new firmware in an E-Plex 8-port Ethernet board. The firmware is contained within the epfirm program itself. This program is normally run by the network initialization script as the system is being started (see network(1M)). Note that the epfirm program and driver for the E-Plex board in /var/sysgen/boot/if_ep.o must match each other. When no interface name such as ep0 is present, the program checks and update if necessary the firmware in all E-Plex boards installed...
esparchive is a utility that is used for archiving the database in the Embedded Support Partner. This is generally used to conserve space on the disk. The archiving utility has to be launched from the command line. The archiving process temporarily shuts down the Embedded Support Partner to conserve data integrity during the archival process. Once archived, the database is compressed and used only for generating reports. A new database is created with no records in ...
The espconfig -help prints the list of command specifications. The optional parameter is used to list commands that matches some substring in the specification text. For example, 'espconfig -help add' will list all commands containing character sequence 'add' in the specification. The espconfig -spec command prints all commands specification in the way the command line is parsed to match the specification. The espconfig -version command gives the version of espconfig ...
esplogger is a facility for the scripted tools/tasks to log the data to the SGI Embedded Support Partner. esplogger serves as a communication pipe between different tasks and EventMon. esplogger cannot be called without an options(s). One or more of the following options must be specified: -s sequence number option that allows to specify sequence number (in decimal or hexadecimal notation). This option works only in conjunction with -t and -f, or -m options. -f filename option that allows to spe...
espnotify is a generic command line utility that is packaged with SGI Embedded Support Partner (see esp(5) for more details). It is used to perform various types of notifications. espnotify can post a given message to e-mail addresses, can display a message on local/remote X display, can post a message to a paging service to be delivered to a pager or can display the message on the system console. espnotify supports various command line options for various types of notifications. These options a...
espquery is a command that is designed to perform limited set of operations on the database in the Embedded Support Partner The command is provided mostly for use by tools that are script in nature, yet need an interface to the SSDB. The tools would have to have intimate knowledge of the schema in the SSDB and the rights to access the database. The operations on the on the SSDB are limited to:
The espreport -help prints the list of command specifications. The optional specifies to list only commands where matches some substring in the specification text. For example, 'espreport -help event' will list all commands containing character sequence 'event' in the specification. The espreport -spec command prints all commands specification in the same way as the command line is parsed to match the specification. The espreport -version command gives the version of ...
eventmond runs at system startup, collects system events from syslogd, esplogger or any other application that interacts with EventmonAPI (see EventmonAPI(3X) for more details), and passes such system events directly to the SGI Embedded Support Partner (a.k.a ESP; see esp(5) for more details) framework. In case SGI ESP Support Data Base server is not running or SGI ESP Event Manager is not running, eventmond will buffer events. Whenever rate of the incoming events is higher than ability of the s...
This page describes tools for adding and viewing real-time events in a Performer program. In describes the following programs: evpp - An Event Pre-Processor. This program takes a description of user events and generates a C program adding the new events into an application programs. evanalyzer - A viewing program for captured events. evhist - A display program for generating histograms of event durations. Usually activated from within evanalyzer. evgraph - A display program for plotting function...
ex is the root of a family of editors: ex and vi. ex is a superset of ed, with the most notable extension being a display editing facility. Display based editing is the focus of vi. If you use a window or a CRT terminal, you may wish to use the vi(1) editor, which focuses on the display-editing portion of ex.
The expand utility writes files or the standard input to the standard output with tab characters replaced with one or more space characters needed to pad to the next tab stop. Any backspace characters will be copied to the output and cause the column position count for tab stop calculations to be decremented; the column position count will not be decremented below zero.
Expect is a program that "talks" to other interactive programs according to a script. Following the script, Expect knows what can be expected from a program and what the correct response should be. An interpreted language provides branching and high-level control structures to direct the dialogue. In addition, the user can take control and interact directly when desired, afterward returning control to the script. Expectk is a mixture of Expect and Tk. It behaves just like Expect and Tk's wish...
Expectk is a combination of Expect with Tk. (See their respective man pages for a more comprehensive explanation of either.) Expectk should run any wish or expect script (with minor changes - see below). The differences between the Expectk and Expect environment follows. The send command is Tk's. Expect's send command can be invoked by the name exp_send. (For compatibility, Expect allows either send or exp_send to be used.) Scripts may be invoked implicitly on systems which support the #! nota...
exportfs makes a local directory (or file) available for mounting over the network by NFS clients. It is normally invoked at boot time by the /etc/init.d/network script, and uses information contained in the /etc/exports file to export a directory (which must be specified as a full pathname). The superuser can run exportfs at any time to alter the list or characteristics of exported directories. Directories that are currently exported are listed in the file /etc/xtab. With no options or argument...
The arguments are taken as an expression. After evaluation, the result is written on the standard output. Terms of the expression must be separated by blanks. Characters special to the shell must be escaped. Note that 0 is returned to indicate a zero value, rather than the null string. Strings containing blanks or other special characters should be quoted. Integer-valued arguments may be preceded by a unary minus sign. Internally, integers are treated as 32-bit, 2s complement numbers. The len...
The exstr utility is used to extract strings from C language source files and replace them by calls to the message retrieval function [see gettxt(3C)]. This utility will extract all character strings surrounded by double quotes, not just strings used as arguments to the printf command or the printf routine. In the first form, exstr finds all strings in the source files and writes them on the standard output. Each...
Extcentry is used to extract C functions for which FORTRAN-callable interface routines (wrappers) are to be generated by the program mkf2c(1). Extcentry accepts as input any C file (infile), and outputs (to outfile) only those portions which are surrounded by the special comments /* CENTRY */ and /* ENDCENTRY */. The first step in generating a FORTRAN-to-C interface routine is to surround only those C functions for which entry points are to be generated by these special comments and to run the f...
EZsetup, also referred to as System Setup, provides basic system administration and user account configuration. EZsetup eases first-time set up of a new IRIX system or of a new user account. In IRIX 6.5.14, EZsetup's appearance (layout and colors) was modernized. Logging in as EZsetup launches a web-based application running in a customized version of the webviewer browser from which users can do the following: 1. Set up some basic system security 2. Set up basic networking 3. Add a user to the...
When you use factor without an argument, it waits for you to give it an integer. After you give it a positive integer less than or equal to 10 to the 14th (1.0e14), it factors the integer, prints its prime factors the proper number of times, and then waits for another integer. factor exits if it encounters a zero or any non-numeric character. If you invoke factor with an argument, it factors the integer as described above, and then it exits. The maximum time to factor an integer is proportional ...
fam is a server that tracks changes to the filesystem and relays these changes to interested applications. Applications such as fm(1G) and mailbox(1) present an up-to-date view of the filesystem. In the absence of fam, these applications and others like them are forced to poll the filesystem to detect changes. fam is more efficient. Applications can request fam to monitor any files or directories in any filesystem. When fam detects changes to monitored files, it notifies the appropriate applicat...
fbdump prints out the formatted contents of compiler feedback files generated by prof(1). fbdump recognizes the following options: -verbose This option prints all the information in verbose mode. If this option is specified, table with all zero entries will be printed also. -header Print Feedback file header as described in "cmplrs/fb.h". -sections Print Feedback file section headers table as described in "cmplrs/fb.h". -proc Print Feedback procedure table as described in "cmplrs/fb.h". If...
The fc utility lists or edits and reexecutes, commands previously entered to an interactive sh. The command history list references commands by number. The first number in the list is selected arbitrarily. The relationship of a number to its command will not change except when the user logs in and no other process is accessing the list, at which time the system may reset the numbering to start the oldest retained command at another number (usually 1). When the number reaches an implementation-de...
fcagent and fccli have been deprecated in favor of a new fibre channel drive manager sesdaemon and sesmgr. Accordingly, fcagent is now chkconfig off by default. fcagent is a daemon which allows communication with attached FibreVault enclosures; status is collected and re-configuration is allowed. The low-level transport protocol is the industry standard SES (SCSI-3 Enclosure Services). The top-level transport is via RPC to allow for remote system monitoring and control. See fccli(1M) for details...
fcagent and fccli have been deprecated in favor of a new fibre channel drive manager sesdaemon and sesmgr. Accordingly, fcagent is now chkconfig off by default. The fccli command is a user front end to fcagent which collects status of all FibreVault enclosures and allows for configuration changes.
The fdetach command detaches a STREAMS-based file descriptor from a name in the filesystem. path is the pathname of the object in the filesystem name space, which was previously attached (see fattach(3C)). The user must be the owner of the file or a user with the appropriate privileges. All subsequent operations on path operate on the filesystem node and not on the STREAMS file. The permissions and status of the node are restored to the state the node wa...
If job control is enabled (see the description of set -m), the fg utility will move a background job from the current environment into the foreground. Using fg to place a job into the foreground will remove its process ID from the list of those "known in the current shell execution environment.
fgrep (fast grep) searches files for a character string and prints all lines that contain that string. fgrep is different from grep(1) and egrep(1) because it searches for a string, instead of searching for a pattern that matches an expression. It uses a fast and compact algorithm. The characters $, *, [, ^, |, (, ), and \ are interpreted literally by fgrep, that is, fgrep does not recognize full regular expressions as does egrep. Since these characters have special meaning to the shell, it is ...
file performs a series of tests on each file supplied by arg and, optionally, on each file supplied in ffile in an attempt to classify it. If arg appears to be a text file, file examines the first 512 bytes and tries to guess its programming language. If arg is an executable a.out, file prints the version stamp, provided it is greater than 0. For COFF executables, the version stamp will give the version of compilers used to generate the executab...
Managers display information about your system and provide access to interactive guides (also called tasks) that let you administer your system. In a Manager window, you can open a guide by choosing its name from the Task menu or by clicking its button at the bottom of the window. The Filesystem Manager uses several methods to monitor the filesystems in use by the system. It uses fam to detect changes in /etc/mtab, which lists mounted filesystems. It also uses fam to monitor the execution of oth...
filetype is a utility used to determine the IRIX Interactive Desktop (IID(1G)) file type of a file or set of files. filetype uses the IRIX Interactive Desktop file typing database to look up file typing rules and apply them to the files listed, then prints the file type for each file whose type was requested. The conversion rules are located in compiled .otr files in /usr/lib/filetype. The older ftr(1) database format, .ctr files are not supported anymore. The source .ftr files can be found in t...
find recursively descends the directory hierarchy for each pathname in the path-name-list (that is, one or more pathnames) seeking files that match a boolean expression written in the primaries given below. If the expression does not contain at least one of -print, -ok, or -exec, including the case of a null expression, a -print is implicit. In the descriptions, the argument n is used as a decimal integer where +n means more than n, -n means less than n, and n means exactly n. Valid expressions ...
findblk finds the filesystem claimants for the block specified as blkno; special is the device name on which a filesystem has been defined. Read permission is required on the specified special device.
This perl script is part of the Samba suite. findsmb is a perl script that prints out several pieces of information about machines on a subnet that respond to SMB name query requests. It uses nmblookup(1) to obtain this information.
findvis describes OpenGL-capable X11 Visuals that meet user-specified selection criteria. The options are as follows: -1 List only the first matching Visual, rather than all matching Visuals. -id List only the Visual ID of matching Visuals, rather than a one-line description of the Visual. This is particularly useful in shell scripts, for passing a Visual ID to a program without Visual-selection ability. -display X11-display-name Use the specified X11 display, rather than the default display giv...
Finger is used to find out about people. It searches for the local /etc/passwd file and the NIS for matching account names and first or last names. Finger displays, if known, the name of the person associated with each account, mail alias, and home and office telephone numbers. If there is an account on the local machine, the home directory and login shell, and any plan which the person has placed in the file .plan in their home directory, and the project on which they are working from the file ...
fingerd is a simple protocol based on RFC742 that provides an interface to the finger program at several network sites. The program is supposed to return a friendly, human-oriented status report on a particular person. There is no required format, and the protocol consists mostly of specifying a single ``command line.'' fingerd listens for TCP requests at port 79. Once connected, it reads a single line terminated by a and passes the first three words on the line as arguments to finger(1...
Mail folders and folder directories should be created via the Message Center in Netscape Communicator. If they are created manually outside of Netscape, Netscape may not be able to see those folders if they do not follow Netscape's naming convention. fix_nsmailfdir scans $HOME/nsmail directory to ensure that all folders and folder directories conform to Netscape's naming convention. $HOME/nsmail will be corrected so that every folder directory will end with the .sbd suffix and have a file with...
flash allows a user to manage the flash PROMs on the IO and CPU boards of Origin systems, the base system board on OCTANE systems and CPU boards on the SGI Origin 3000 server series. Without options, the command flashes all appropriate boards on the machine with the PROM images found in /usr/cpu/firmware. Normally, flash is executed automatically during the installation of a new release of IRIX. A customer should rarely need to use it directly. You must have superuser privilege to use this comma...
flashio allows a user to manage the flash PROMs on the IO4 board of Everest-based high-end systems (the Challenge L/XL, PowerChallenge L/XL, Onyx L/XL, and PowerOnyx L/XL are all based on the Everest architecture). Normally, flashio is executed automatically during the installation of a new release of IRIX; as a result, a customer should rarely need to use it directly. flashio can perform two major tasks: it can alter the contents of the flash PROMs by transferring the contents of a file into th...
flashmmsc allows a user to manage the firmware installed on the multimodule system controller ("MMSC") of Origin2000 rack systems. Ordinarily, an MMSC is shipped with firmware pre-installed. The flashmmsc command is only needed by a customer for upgrades or emergency repairs of the MMSC firmware. There are several ways to use the flashmmsc command. In the first form, the flashmmsc command is assumed to be issued from a terminal that has access to one of the MMSC's associated with the system. ...
The flashpbay utility updates FLASH memory in the power bay. The power bay flash memory contains the code for communicating status information to the L1 controller; it does not control the functional operation of the power bay. The power bay has two separate flash memories, only one of which is accessible for updating by the flashpbay utility. The power bay firmware that supports flashing resides in the inaccessible flash memory, so it is not possible to corrupt this memory during the flashing p...
The flashsc utility updates FLASH memory in the L1 or L2 controllers. The FLASH memory in the SN1 L1 controller is divided into three areas: - a "bootstrap" image, which always executes at power-up - an "a" image, which is a copy of the full L1/L2 controller firmware - a "b" image, which is a copy of the full L1/L2 controller firmware Due to memory constraints, there is only one full L2 controller image in the L2 firmware. The second image is the image that is currently running in the L2'...
flex is a tool for generating scanners: programs which recognized lexical patterns in text. flex reads the given input files, or its standard input if no file names are given, for a description of a scanner to generate. The description is in the form of pairs of regular expressions and C code, called rules. flex generates as output a C source file, lex.yy.c, which defines a routine yylex(). This file is compiled and linked with the -lfl library to produce an executable. When the executable is ru...
FLtoPopDB reads standard input, treating each line as a fully qualified pathname. If the file exists, then the filename is converted to the special format required by bgicons (serialized DNA), and written to the standard output. This is used with bgicons to put icons for specific applications on the desktop background by default.
In order to improve performance, the IRIX Interactive Desktop automatically maintains a cache of ftr types and layouts for all of the directories that are viewed with fm or dirview. The flushCache shell script can be used remove all directory-related cache files (the background, default, and URL layout files are not removed). Since /usr/lib/desktop/flushCache is a shell script, users can copy and modify it to suit their own particular needs....
The IRIX Interactive Desktop file manager, fm, is a safe, easy, and attractive alternative to the IRIX shell for running applications and organizing information. Its deceptively simple user interface spares the user from many subtle and not-so-subtle pitfalls of working in raw IRIX shells. fm presents a graphical interface to manipulate the contents of a directory or URL. The icons on the background and the windows showing icons of directories or URL sites comprise the fm application. If fm is l...
The fmprefs customization panel allows the user to define a default layout for their directory views (dirviews). The file manager fm applies these settings when displaying a directory view for the first time. Three of the settings apply to all dirviews -- new and old, open and closed -- and are called Global Settings. The fmprefs panel can be launched from the toolchest (Desktop > Customize > Icon Views) or from a Unix shell command line. Like most other customization panels, the desktop panel h...
fmserv is used by the IRIX Interactive Desktop to maintain correct folder state when multiple fm(1) processes are executing. fmserv also monitors for changes to the desktop file typing database and prompts the user to restart the desktop if a change occurs. fmserv is started and stopped automatically by the IRIX Interactive Desktop. Users should never run this command directly. For more information about the entire IRIX Interactive Desktop environment, see the IID(1) man page....
Fmt is a simple text formatter which reads the concatenation of input files (or standard input if none are given) and produces on standard output a version of its input with lines as close to width characters long as possible. The spacing at the beginning of the input lines is preserved in the output, as are blank lines and interword spacing. The default width is 72 characters. Fmt is meant to format mail messages prior to sending, but may also be useful for other simple tasks. For instance, wit...
Based on a message's classification component, fmtmsg either writes a formatted message to stderr or writes a formatted message to the console. A formatted message consists of up to five standard components as defined below. The classification and subclass components are not displayed as part of the standard message, but rather define the source of the message and direct the display of the formatted message. The valid options are: -c class Describes the...
formatRMedia formats removable media with the following formats: XFS for SGI workstations, EFS for SGI workstations, HFS for Apple Macintosh computers, and FAT for MS DOS/Windows computers. It invokes mkfp to format HFS and FAT filesystems, and fx and mkfs to format EFS and XFS filesystems.
fpck audits and repairs inconsistent conditions for filesystems. When fpck locates major filesystem structure destruction, such as critical sector damage or unrecoverable error, an error message is given. Otherwise, the user is notified with a warning message. The -t flag is required to designate a target filesystem. This utility supports two types of filesystem with four options. dos and fat are synonyms in representing MSDOS FAT filesystem while mac and hfs are synonyms in representing MACINTO...
fpmode executes command, forcing it to use the specified floating point exception and memory access mode. This is only meaningful on processors that support multiple modes. On these processors, the default mode is usually performance mode (also called imprecise exception mode) and nonsequential memory (nsmm) mode. On all other processors, the default is precise exception and sequential (smm) mode. The R8000 is the only processor which supports both a precise exception mode and a performance mode...
fru is a hardware state analyzer that provides board replacement information based on system crash dumps. The output provided by fru displays what system boards, if any, are the most likely suspects that might have induced a hardware failure. fru can be run on any namelist and corefile specified on the command line. namelist contains symbol table information needed for symbolic access to the system memory image being examined. This will typically be the unix.N kernel copied into /var/adm/crash, ...
fsck is applicable only to EFS filesystems. To repair XFS filesystems, see xfs_repair(1M). fsck audits and repairs inconsistent conditions for filesystems. You must have both read and write permission for the device containing the filesystem unless you give the -n flag, in which case only read permission is required. If the filesystem is inconsistent, you are normally prompted for concurrence before each correction is attempted. Most corrective actions result in some loss of data. The amount and...
fsdb is applicable only to EFS filesystems. fsdb can be used to patch up a damaged filesystem after a crash. It has conversions to translate block and i-numbers into their corresponding disk addresses. Also included are mnemonic offsets to access different parts of an inode. These greatly simplify the process of correcting control block entries or descending the filesystem tree. Because fsdb reads the disk raw, it is able to circumvent normal filesystem security. It also bypasses the buffer cach...
fsdump is applicable to EFS and XFS filesystems. fsdump creates the dumpfile used by rfindd(1M) to respond to rfind(1) requests. The dumpfile contains: inode contents For each allocated inode in the file system mounted at directory, fsdump stores all the fields from the inode header, excluding the extent and reference count fields. directory contents For each directory in the file system that is readable by the user "rfindd", fsdump stores the inode numbers and filenames in that directory. Qui...
fserv assists in the transfer of files when IRIX Interactive Desktop icons are dragged from one machine to another. It is invoked automatically as part of the transfer; users should never run this command directly. For more information about the entire IRIX Interactive Desktop environment, see the IID(1) man page. PPPPaaaaggggeeee 1111
Fsinfo is a utility for displaying information about an X font server. It is used to examine the capabilities of a server, the predefined values for various parameters used in communicating between clients and the server, and the font catalogues and alternate servers that are available.
Fslsfonts lists the fonts that match the given pattern. The wildcard character "*" may be used to match any sequence of characters (including none), and "?" to match any single character. If no pattern is given, "*" is assumed. The "*" and "?" characters must be quoted to prevent them from being expanded by the shell.
fsplit splits the named file(s) into separate files, with one procedure per file. A procedure includes blockdata, function, main, program, and subroutine program segments. Procedure X is put in file X.f, X.r, or X.e depending on the language option chosen, with the following exceptions: main is put in the file MAIN.[efr] and unnamed blockdata segments in the files blockdataN.[efr] where N is a unique integer value for each file. The following options pertain: -f (default) Input files are FORTRAN...
fsr improves the organization of mounted filesystems. The reorganization algorithm operates on one file at a time, compacting or otherwise improving the layout of the file extents (contiguous blocks of file data). fsr improves the EFS filesystems by executing fsr_efs (1M); XFS filesystems are improved with fsr_xfs (1M). The intended usage is to call fsr from crontab at a regular time -- the default is once per week....
fsr_efs is applicable only to EFS filesystems. fsr_efs improves the organization of mounted filesystems. The reorganization algorithm operates on one file at a time, compacting or otherwise improving the layout of the file extents (contiguous blocks of file data) while simultaneously compacting the filesystem free space. The following options are accepted by fsr_efs. The -m, -t, and -f options have no meaning if any filesystems, directories, or files are specified on the command line. -m mtab Us...
fsr_xfs is applicable only to XFS filesystems. fsr_xfs improves the organization of mounted filesystems. The reorganization algorithm operates on one file at a time, compacting or otherwise improving the layout of the file extents (contiguous blocks of file data). The following options are accepted by fsr_xfs. The -m, -t, and -f options have no meaning if any filesystems or files are specified on the command line. -m mtab Use this file for the list of filesystems to reorganize. The default is to...
fsstat reports on the status of the filesystem on special_file. During startup, this command is used to determine if the filesystem needs checking before it is mounted. fsstat succeeds if the filesystem is unmounted and appears O.K. For the root filesystem, it succeeds if the filesystem is active and not marked bad. fsstat attempts to assure that the blocksize of the device matches that specified in the device volume header....
The fstobdf program reads a font from a font server and prints a BDF file on the standard output that may be used to recreate the font. This is useful in testing servers, debugging font metrics, and reproducing lost BDF files.
fstyp allows the user to determine the filesystem identifier of mounted or unmounted filesystems using heuristic programs. The filesystem type is required by mount(2) and sometimes by mount(1M) to mount filesystems of different types. The directory /etc/fstyp.d contains a program for each filesystem type to be checked; each of these programs applies some appropriate heuristic to determine whether the supplied special file is of the type for which it checks. If it is, the program prints on standa...
ftimer provides the cpu number of the processor handling the fast clock used by the real time itimer facility. It also reports any outstanding real time itimer timeouts. The fast clock is inactive until it is first used, then remains active from that time onward. The fast clock typically becomes active when a realtime process (i.e., those running with a non-degrading priority, see npri(1)) executes setitimer(2), or less frequently when some special kernel driver needs the fast clock enabled for ...
ftp is the user interface to the Internet standard File Transfer Protocol (FTP). The program allows a user to transfer files to and from a remote network site. The client host with which ftp is to communicate can be specified on the command line. If this is done, ftp immediately attempts to establish a connection to an FTP server on that host; otherwise, ftp enters its command interpreter and awaits instructions from the user. When ftp is awaiting commands from the user, the prompt ftp> is provi...
Ftpd is the Internet File Transfer Protocol server process. The server uses the TCP protocol and listens at the well-known port specified in the services(4) file. Ftpd is started by inetd(1M) whenever a remote client makes a connection request. The following options should specified on the ftpd line in inetd's configuration file, /etc/inetd.conf. If the -l option is specified, each successful and failed ftp session login is logged in the syslog. If this option is specified twice, the retrieve (...
fftr is a utility used to compile file-type rule (FTR) files. It creates optimized type rule (OTR) files. The ftr command, a link to the fftr command, does not support the older compiled type rule (CTR) format files anymore. An FTR file contains a list of file-type rules. Each rule describes how a file of a particular type will appear within the IRIX Interactive Desktop and defines what functions the user can perform on the file by double-clicking on it or choosing menu items that manipulate it....
ftr2mime is a utility used to generate mailcap and mime.type files from the file typing rules. This tool is now used to update the files, whenever new software is installed on the system, or whenever the FTR databases are updated. By default it looks in the desktop FTR database, /usr/lib/filetype/desktop.otr for generating the MIME type information. Users can also specify a different database with the -d option. If the output file option, -o is not given, this tool prints the information onto th...
fuser outputs the process IDs of the processes that are using the files specified as arguments. Each process ID is followed by one of these letter codes, which identify how the process is using the file: c As its current directory. r As its root directory, which was set up by the chroot(1M) command. o As an open file. t As its text file. m As a mapped file, requested by mmap(2) or exec(2) in the case of dynamic shared librar...
fwtmp reads from the standard input and writes to the standard output, converting binary records of the type found in /var/adm/wtmp to formatted ASCII records. The ASCII version is useful when it is necessary to edit bad records. The argument -ic is used to denote that input is in ASCII form and that output is to be written in binary form. wtmpfix examines the standard input or named files in utmp....
fx is an interactive, menu-driven disk utility. It detects and maps out bad blocks on a disk. It also displays information stored on the label of the disk, including partition sizes, disk drive parameters, and the volume directory. An expert mode, available by invoking with the -x flag, provides additional functions normally used during factory set-up or servicing of disks, such as formatting the disk and creating or modifying the disk label or drive parameters. Warning: Unless you are very fami...
Gated is a routing daemon that handles multiple routing protocols and replaces routed(1M), egpup(1M), and any routing daemon that speaks the HELLO routing protocol. Gated currently handles the RIP, EGP, and HELLO routing protocols. Gated can be configured to perform all routing protocols or any combination of the three. The configuration for gated is stored in the file /usr/etc/gated.conf. COMMAND LINE TRACING OPTIONS Gated can be invoked with a number of tracing flags and/or a log file. Tracing...
/usr/OnRamp/* support libraries and files /usr/WebFace/* CGI source documents /usr/ns-home/httpd-gateway/* gateway web server Page 2 GATEWAY(1) GATEWAY(1)
The gencat utility merges the message text source file(s) msgfile into a formatted message database catfile. The database catfile will be created if it does not already exist. If catfile does exist its messages will be included in the new catfile. If set and message numbers collide, the new message text defined in msgfile will replace the old message text currently contained in catfile. The message text source file (or set of files) input to gencat can contain...
The genDeviceIcons program is used to create IRIX Interactive Desktop device icons on the desktop background. It is used in conjuction with the bgicons program. The genDeviceIcons program is run automatically from the /var/X11/xdm/Xsession.dt file when the user logs in, and is not intended to be run directly by end users. genDeviceIcons reads the inputfile to determine which devices to look for. If the device is present on the system, then serialized DNA for the device is written to the standard...
Gendist generates the primary components for software products. These are the product descriptor, the product idb, and the images. The required input is a tree containing all of the files to be shipped, a master idb containing a description of each file or directory to be included in the product, and a distribution specification (spec) file that describes the product structure. Gendist reads the distribution specification file and generates products as defined in that file. For each product, the...
genperm is a simple script that constructs a somewhat restrictive /etc/uucp/Permissions file. By default, it creates a file that allows any remote system to use the name nuucp. Each remote system is allowed to use any of several services. Systems with login names not of the form Uremote where remote is the UUCP name of the system are accommodated by editing the script. This is most commonly necessary when the remote system name is long....
get generates an ASCII text file from each named SCCS file according to the specifications given by its keyletter arguments, which begin with -. The arguments may be specified in any order, but all keyletter arguments apply to all named SCCS files. If a directory is named, get behaves as though each file in the directory were specified as a named file, except that non-SCCS files (last component of the path name does not begin with s.) and unreadable files are silently ignored. If a name of - is ...
getabi is used to determine whether to use the 32-bit ABI (abi32) or the 64-bit ABI (abi64). It returns the ABI enumeration values as defined in /usr/include/getabi.h, and writes the new args list on standard output. First it checks the args for "-32" or "-64". If neither of these is given, then it checks the args for a "-mips[1-4]" option. Mips 1 and 2 imply abi32 while mips 3 and 4 imply abi64. If none of the args options specify the abi, then we check the SGI_ABI environment variable, w...
getallpppinisdn returns all the valid PPP incoming ISDN entries by reading the /etc/ppp.conf and /etc/passwd file. When the command is completed, it writes a status code to stdout then followed by the number of entries found and the name of each entry.
getallpppinmodem returns all the valid PPP incoming modem entries by reading the /etc/ppp.conf and /etc/passwd file. When the command is completed, it writes a status code to stdout then followed by the number of entries found and the name of each entry.
getallpppoutisdn returns all the valid PPP outgoing ISDN entries by reading the /etc/ppp.conf and /etc/uucp/Systems file. When the command is completed, it writes a status code to stdout then followed by the number of entries found and the name of each entry.
getallpppoutmodem returns all the valid PPP outgoing modem entries by reading the /etc/ppp.conf and /etc/uucp/Systems file. When the command is completed, it writes a status code to stdout then followed by the number of entries found and the name of each entry.
getconf provides a method to determine the current values of certain configurable system limits, options and parameters. If the system_var argument is given, getconf(1) will print the value of each requested system parameter, one per line. If the path_var and pathname arguments are given, getconf(1) will print the value of the requested variable specified by the path_var argument for the path specified by the pathname operand....
getDiskInfo checks all local fixed disks and reports their capacity and partition information. The partition information is similar to that produced by prtvtoc, but filesystem partitions are tested for valid EFS and XFS filesystems, and xlv partitions are tested to determine whether or not they are actually being administered by xlv. This privcmd is used by the DiskManager which can't access the information directly because root privilege is required to read the disk header and to invoke the xl...
getDiskParts reads the disk's volume header and returns, for each partition, its number, type, start location, and size. The getDiskParts privcmd is used by Tasks which need to read partition information, since root permission is required to read the disk's volume header.
getExportList is a privileged command that gets the list of nfs exported directories from host-name. getExportList works by contacting mountd(1M) on the remote machine. getExportList is a privileged command because in general it is necessary to use a privileged port when communicating with mountd.
Getipforwarding uses systune to get the ipforwarding state. Systune supports ipforwarding since 6.3 only. When the command is completed, it writes a '1' to stdout if ipforwarding is on and a '0' if it is off. If the ipforwarding systune is equal to 2 (i.e. forward packets unless they contain a source-route option) getipforwarding returns 1.
Getjavafrompref gets the state of Java or JavaScript from the preferences file of the user account home directory. If the preferences file does not exist, it reads $HOME/.EZsetupData/-wwwSecureData for status. For javaScript, it checks the WebViewer configuration file in $HOME/.web/.webdefaults also. When the command is completed, it writes a '0' to stdout if no status file is found. It writes a '1' if Java or Netscape JavaScript is disabled; it writes a '2' if Java or Netscape Java...
The getopts(1) command supersedes getopt. For more information, see the NOTES below. getopt is used to break up options in command lines for easy parsing by shell procedures and to check for legal options. It recognizes supplementary code set characters in the argument given to optstring according to the locale specified in the LC_CTYPE environment variable [see LANG on environ(5)]. opt...
getopts is a built-in command to sh(1) used to parse positional parameters and to check for legal options. It supports all applicable rules of the command syntax standard (see Rules 3-10, intro(1)). It should be used in place of the getopt(1) command. See the WARNINGS section below. optstring must contain the option letters the command using getopts will recognize; if a letter is followed by a colon, the option is expected to have an argument, or group of arguments, which must be separated from ...
Getsomeaccounts gets the user accounts that have no password and the account should not be locked either. It can also get active user accounts, that is an account that you can login. When the command is completed, it writes the name of the accounts to stdout beginning with the total number of accounts found.
gettxt retrieves a text string from a message file in the directory /usr/lib/locale/locale/LC_MESSAGES. The directory name locale corresponds to the language in which the text strings are written; see setlocale(3C) and environ(5). msgfile Name of the file from which to retrieve msgnum. The name can be up to 14 characters in length, but may not contain...
getty is a program that is invoked by init(1M). It is the second process in the series, (init-getty-login-shell) that ultimately connects a user with the UNIX system. It can only be executed by the super-user; that is, a process with the user-ID of root. Initially getty prints the contents of /etc/issue (if it exists), then prints the login message field for the entry it is using from /etc/gettydefs, reads the user's login name, and invokes the login(1) command with the user's name as argument...
The getzones command uses the AppleTalk Zone Information Protocol (ZIP) to look up all zones on all AppleTalk networks. It does this by sending a request to the nbpd(1m) daemon. The program then prints all reported zones. If no zones are listed, it means the nbpd(1m) daemon is not functioning correctly.
gfxinfo extracts the type of each graphics subsystem resident, and displays information that is relevant to the various pieces of hardware found in each. The displayed material may include the subsystem type, the number of boards, the number of screens attached, etc.
gfxinit extracts the type of each graphics subsystem resident, and initializes it. The initialization procedure typically consists of loading microcode. If the -v option is used, a verbose description of the procedure steps is displayed. Typically the description includes the full path name of the microcode files been loaded.
The gfxtopology command extracts information about the graphics pipes, keyboards, and mice attached to the system from the hardware graph and /etc/ioconfig.conf. This information is then displayed to relate the physical location of the devices to the logical configuration from ioconfig.conf. The first section of the gfxtopology output describes the brick that the G brick is attached to, as well as the information for the GE board of that pipe. The second section describes the physical location o...
ggd manages the I/O-rate guarantees that have been granted to processes on the system. The daemon is started from a script in the /etc/rc2.d directory. It reads the /etc/grio_disks file to obtain information about the available hardware devices. Processes can make requests for I/O-rate guarantees by using the grio_action_list(3X), grio_reserve_file(3X), or grio_reserve_fs(3X) library calls. After determining if the I/O rate can be guaranteed, the daemon returns a confirmation or rejection to the...
glp, also known as PrintPanel and printpanel, provides a graphical interface to the lp(1) printing command of the AT&T System V print spooling system. The glp program accepts all lp command line options and allows these options to be set interactively. Similar to lp, glp permits multiple filenames to be specified on the command line for printing. glp also permits its standard input to be redirected so that the output of other programs can be printed using redirection or piping. In addition, if g...
glxinfo lists information about the GLX extension, OpenGL capable visuals, and the OpenGL renderer of an X server. The GLX and renderer information includes the version and extension attributes. The visual information lists the GLX visual attributes for each OpenGL capable visual (e.g. whether the visual is double buffered, the component sizes, etc). Command line options are: -display Specify the display to query. -h list the options. -t By default the visual information is presented i...
gmemusage is a graphical memory usage viewer. gmemusage displays a bar chart depicting the breakdown of memory use, with each bar labeled with the name of the program using the memory and the number of kilobytes of memory used. If more than one copy of a program is running, the number of copies is displayed in parentheses after the program name. In addition, gmemusage will display a breakdown of the regions within a program. Clicking on a bar or program name in the main chart will replace the ma...
grelnotes provides a graphical interface for viewing the on-line release notes. For each software product installed on the workstation there is a set of on-line release notes. Each set of release notes contains a number of chapters providing important information about the product. grelnotes makes it possible to quickly locate and browse these release notes. If grelnotes is executed with no arguments, it will come up displaying the release notes for the "IRIX" software product. The "IRIX" pr...
The grep utility searches the input files, selecting lines matching one or more patterns; the types of patterns are controlled by the options specified. The patterns are specified by the -e option, -f option, or the pattern_list operand. The pattern_list's value consists of one or more patterns separated by newline characters; the pattern_file's contents consist of one or more patterns terminated by newline characters. By default, an input line will be selected if any pattern, trea...
grio displays information about the active GRIO reservations and statistics on the GRIO subsystem. Only one of the options BCDFIPRSV can be specified on a single invocation of grio: -B Print information about active GRIO reservations on a given device. Devices can be specified with the -d or -a options. -C Print the device path and show active GRIO reservations. Devices are specified with the -d option. This only works for disks. Each path component reported can be fed back to grio with the -d o...
grio_bandwidth is used to determine the number of I/O operations of a given size that can be guaranteed to be performed by a given disk device, RAID subsystem or SCSI controller in one second. It creates processes which repeatedly issue I/O requests of the given size, and device seeks of random lengths, to the specified devices. The length of time to complete each request is recorded and this information is used to determine the average number of I/O operations that were performed by the device ...
The groups command shows the groups to which you or the optionally specified user belong. Each user belongs to a group specified in the password file /etc/passwd and possibly to other groups as specified in the file /etc/group. Invoking groups without a user specified executes a getgroups system call, which returns the grouplist of which the process is currently a member. This list will contain only the effective group ID unless a multgrps call has been executed; in that case it will contain all...
growfs expands an existing Extent Filesystem, see efs(4). The special argument is the pathname of the device special file where the filesystem resides. The filesystem must be unmounted to be grown, see umount(1M). The existing contents of the filesystem are undisturbed, and the added space becomes available for additional file storage. If a -s size argument is given, the filesystem is grown to occupy size basic blocks of storage (if available). If no size argument is given, the filesystem is gro...
grpck verifies all entries in the group file, file. This verification includes a check of: the number of fields, group name, group ID, whether all login names appear in the password file, duplicate logname entries, and maximum number of groups per logname. The default group file is /etc/group. grpck has the ability to parse YP entries in the group file.
Graphical version of nstats(1). The column of values shows the exact system values, whereas the meters display a moving average of the change in these values. Note that when viewing total system activity, the meters show the total change, but the column of values continues to display on a per node basis.
This command provides a graphical display of usage of certain types of system resources. This display provides a real-time window into the overall operation of the system. The main display element is a rectangular area which is filled by uniquely colored bands, each band signifying a sampled variable measuring system performance. This rectangular area is called a bar throughout the rest of this description. Each bar in a window has a header which consists of the bar title plus the names of each ...
Graphical version of sn(1); Multiple nodes may be selected at once in order to set the same system values in more than one node at a time. Note that when more than one node is selected, the values displayed are for the first node selected.
gr_top displays a sorted list of processes which are using some portion of the available CPU cycles on a machine. The display is updated periodically as specified by interval. This version of gr_top is a perl script built on top of top(1) and xwsh(1G) which closely (although not perfectly) emulates the previous SGI gr_top. For details on the system and process data that is displayed within the gr_top window, see the top(1) man page. The version of top that is used by this gr_top is a much newer ...
gview is a program for viewing, editing, and learning about Inventor 3d scene graphs. There are two views of the Inventor scene graph: a 3d rendered view (left) and a scene graph view (right). The 3d rendered view displays the data in an examiner viewer and allows selection as well as viewing. The scene graph view renders the scene database as a directed acyclic graph illustrating the structure and relationships within the database. This view is displayed in a GraphViewer component, which is der...
Gzcmp and gzdiff are used to invoke the cmp or the diff program on compressed files. All options specified are passed directly to cmp or diff. If only 1 file is specified, then the files compared are file1 and an uncompressed file1.gz. If two files are specified, then they are uncompressed if necessary and fed to cmp or diff. The exit status from cmp or diff is preserved.
The gzexe utility allows you to compress executables in place and have them automatically uncompress and execute when you run them (at a penalty in performance). For example if you execute ``gzexe /bin/cat'' it will create the following two files: -r-xr-xr-x 1 root bin 9644 Feb 11 11:16 /bin/cat -r-xr-xr-x 1 bin bin 24576 Nov 23 13:21 /bin/cat~ /bin/cat~ is the original file and /bin/cat is the self-uncompressing executable file. You can remove /bin/cat~ once you are sure that /bin/cat works p...
gzforce forces a .gz extension on all gzip files so that gzip will not compress them twice. This can be useful for files with names truncated after a file transfer. On systems with a 14 char limitation on file names, the original name is truncated to make room for the .gz suffix. For example, 12345678901234 is renamed to 12345678901.gz. A file name such as foo.tgz is left intact.
Gzgrep is used to invoke the grep on compress'ed or gzip'ed files. All options specified are passed directly to grep. If no file is specified, then the standard input is decompressed if necessary and fed to grep. Otherwise the given files are uncompressed if necessary and fed to grep. If gzgrep is invoked as gzegrep or gzfgrep then egrep or fgrep is used instead of grep. If the GREP environment variable is set, gzgrep uses it as the grep program to be invoked. For example: for sh: GREP=fgrep g...
Gzip reduces the size of the named files using Lempel-Ziv coding (LZ77). Whenever possible, each file is replaced by one with the extension .gz, while keeping the same ownership modes, access and modification times. (The default extension is -gz for VMS, z for MSDOS, OS/2 FAT, Windows NT FAT and Atari.) If no files are specified, or if a file name is "-", the standard input is compressed to the standard output. Gzip will only attempt to compress regular files. In particular, it will ignore sym...
Gzmore is a filter which allows examination of compressed or plain text files one screenful at a time on a soft-copy terminal. gzmore works on files compressed with compress, pack or gzip, and also on uncompressed files. If a file does not exist, gzmore looks for a file of the same name with the addition of a .gz, .z or .Z suffix. Gzmore normally pauses after each screenful, printing --More-- at the bottom of the screen. If the user then types a carriage return, one more line is displayed. If th...
Gznew recompresses files from .Z (compress) format to .gz (gzip) format. If you want to recompress a file already in gzip format, rename the file to force a .Z extension then apply znew.
h2ph converts any C header files specified to the corresponding Perl header file format. It is most easily run while in /usr/include: cd /usr/include; h2ph * sys/* The output files are placed in the hierarchy rooted at Perl's architecture dependent library directory. You can specify a different hierarchy with a -d switch. If run with no arguments, filters standard input to standard output.
h2xs builds a Perl extension from any C header file. The extension will include functions which can be used to retrieve the value of any #define statement which was in the C header. The module_name will be used for the name of the extension. If module_name is not supplied then the name of the header file will be used, with the first character capitalized. If the extension might need extra libraries, they should be included here. The extension Makefile.PL will take care of checking whether the li...
halt is executed by the superuser to shut the machine down so it is safe to remove power. halt leaves the machine executing the firmware monitor, unless the -p option is present and supported on the machine. If you are remotely logged in to the system, you are prompted to confirm the shutdown. The -p option requests that the power be turned off after the system is shut down. Only some systems support this....
The hash utility affects the way the current shell environment remembers the locations of utilities found as described in Command Search and Execution . Depending on the arguments specified, it adds utility locations to its list of remembered locations or it purges the contents of the list. When no arguments are specified, it reports on the contents of the list. Utilities provided as built-ins to the shell are not reported by hash....
haven is an X screensaver client that manages a GL window as the screensaver. The pathname of the GL program to use and its argument list are specified as arguments to haven. haven has two algorithms that it can use to try to find the GL window. The -n option chooses a newer more robust algorithm. However, if it fails, the -o option is compatible with older versions of haven. The default is -n. When invoked with the -k option, haven attempts to kill any other screensaver that may be running and ...
Help finds information to explain a message from an SCCS command or explain the use of an SCCS command. Zero or more arguments may be supplied. If no arguments are given, help will prompt for one. The arguments may be either message numbers (which normally appear in parentheses following messages) or command names, of one of the following types: type 1 Begins with non-numerics, ends in numerics. The non-numeric prefix is usually an abbreviation for the program or set of routines which produced t...
hinv displays the contents of the system hardware inventory table. This table is created each time the system is booted and contains entries describing various pieces of hardware in the system. The items in the table include main memory size, cache sizes, floating point unit, and disk drives. Without arguments, the hinv command displays a one line description of each entry in the table. In addition, on some systems hinv can display manufacturing information such as board name, part number and ba...
The hostid command with no arguments prints the identifier of the current host in hexadecimal. This numeric value is expected to be unique across all hosts and is commonly set to the host's Internet address. The super-user can set the host ID by giving an argument that is a hexadecimal value or a hostname. With the -h option, the argument must be a hostname. If the argument is a hostname, hostid sets the ID to the name's Internet address listed in /etc/hosts. Hostid sets the exit status to 0 i...
Managers display information about your system and provide access to interactive guides (also called tasks) that let you administer your system. For example, the User Manager displays a list of the user accounts currently on the system and gives you access to guides like "Add a User Account" and "Modify a User Account". In the Manager window, you can open a guide by choosing its name from the Task menu or by clicking its button at the bottom of the window. The Host manager displays the local...
Hostname prints the name of the current host. The -s option trims any domain information from the printed name. The super-user can set the hostname by supplying an argument; this is usually done in the system setup initialization script /etc/init.d/sysetup using the contents of /etc/sys_id. This setting persists only until the next reboot when the startup procedure will once again initialize the hostname with the contents of the above file. To permanently change this value change the contents of...
When invoked with no arguments, hot-convert will convert NCSA Mosaic hotlist entries found in $HOME/.mosaic-hotlist-default.html into Netscape Navigator booksmarks and append them to $HOME/.MCOM-bookmarks.html If input-file is specified, then the NCSA hotlist is read from that file. If you want to save the Netscape bookmarks in another location, then you must also specify output-file as the destination file for the bookmarks....
The hotfd program monitors any hot folders configured on the system. When files appear in the folders, it submits them via the local printing system to the appropriate printer. One daemon monitors all of the folders on a single machine. Hot folders are controled by a configuration file, and are usually created with the Xinet GUI. Hotfd runs as a daemon in the background unless one of the debug options is given. The configuration file consists of a series of text lines specifying the directory to...
hpsnmpd is a daemon for the Simple Network Management Protocol (SNMP) as specified in Internet RFC 1157, and supports a subset of the HP-UX enterprise MIB. The daemon, called the SNMP agent, can be configured to run from the network startup script at boot time by the command chkconfig snmpd on or started from the command line. You must be superuser (root) to run hpsnmpd. Hpsnmpd acts as a subagent to the SGI master agent snmpd or the Peer networks encapsulator peer_encaps. The hpsnmpd subagent m...
htmake is a "site compiler." It creates a World Wide Web site (composed of several hypertext documents and related objects (e.g., graphics) from a source tree (expressed as a directory hierarchy). Pre-requisites to using htmake are: 1. a server supporting NCSA-compliant Server-Side Includes ("includes"); and 2. a Netscape-style frames- and JavaScript-capable browser/client/user-agent (such as Netscape 2.1). Includes (including `execs') must be enabled in the site's target directory. You ca...
htsmall is a simple "web site compiler." It provides a subset of the functionality found in the htmake site compiler (see htmake(1)). htsmall reads a source directory (the current working directory if not specified on the command line) and generates a single page in the destination directory. htsmall also copies all necessary files within the source directory to the destination directory. The generated page is a simple index, useful for the top level of a web site. The index is structured as a...
ical is a calendar for use as a desk accessory. It displays one month at a time. Each click of the middle mouse button advances the month. Each click of the left mouse button makes the month go back by one. PPPPaaaaggggeeee 1111
The iceauth program is used to edit and display the authorization information used in connecting with ICE. This program is usually used to extract authorization records from one machine and merge them in on another (as is the case when using remote logins or granting access to other users). Commands (described below) may be entered interactively, on the iceauth command line, or in scripts.
The command, iconbooktocatalog, is for use internally by iconcatalog. This program converts the pre-IRIX 6.3 format to post-IRIX 6.3 format. In IRIX 6.2 and earlier releases, an iconbook page is represented by a file and each line in the file represents an icon on that page. In IRIX 6.3 and later releases, an iconcatalog page is represented by a directory and each symbolic link in that directory is an icon on that page. There are user pages and system pages to be converted. The system pages are ...
The iconcatalog (or iconbook) contains named pages which can store any type of icon, including files, folders, programs, printers, people, hosts, and tape and disk drives. Icons are stored in the catalog as references to the actual entities. If an icon is dragged onto an iconcatalog page, only a reference to the actual entity is kept on the page. With the default IndigoMagic color scheme, blue iconcatalog pages can be distinguished easily from green icon views. The "Make Reference" operation o...
iconcatalogedit modifies the contents of an existing iconcatalog(1) page by adding icons to it or removing icons from it. The icon to be added or removed is specified by the iconstring. Here is an example of a "File" iconstring: "Category:File Name:/usr/sbin/jot" The pagename is the string seen on the tabs at the bottom of the iconcatalog(1) window. For example, "Applications", "Collaboration", and "Demos" are all pagenames. A page is either a -syspage shared by...
IconSmith is an interactive drawing editor for artwork created from twodimensional polygons. This artwork is used in file-typing rules to create icons for the IRIX 5.X and 6.X Indigo Magic Desktop and the 6.5 IRIX Interactive Desktop graphical user interface (see the IID(1G) reference page). The fftr(1) compiler and the older ftr(1) compiler combine this artwork with IRIX commands specified in file-typing rules to produce icons. See the fftr(1) reference page for full details. IconSmith data fil...
iconv converts the characters or sequences of characters in file from one code set to another and writes the results to standard output. Should no conversion exist for a particular character then it is converted to the underscore ' ' in the target code set. With the arguments fromcode and tocode identifying the input and output code sets, respectively iconv will data perform conversion. If no file argument is specified on the command line, iconv rea...
icrash is a hands-on utility that generates detailed kernel information in an easy-to-read format. icrash also provides the ability to generate reports about system crash dumps created by savecore(1M). Depending on the type of system crash dump, icrash can create a unique report that contains information about what happened when the system crashed. icrash can be run on live systems or with any namelist and corefile specified on the command line. namelist contains symbol table information needed ...
id displays the calling process's ID and name. It also displays the group ID and name. If the real and effective IDs do not match, both are printed. user The login name for which the information is to be reported. -a Report all the groups to which the invoking process belongs. -g Reports only the effective group ID, using the format "%u\n". -G Reports all different group IDs (effective, real and supplementary), using the format "%u\n". If there is more than one dis...
idbg allows the superuser to invoke a number of internal kernel routines that provide useful debugging information. The -r option provides a record of the output to the given file. The kernel routines are part of the idbg kernel module, which can be either dynamically loaded or statically configured into the kernel. The ml command can be used to dynamically load the idbg.o module into a running kernel without reconfiguring and rebooting the kernel: ml ld -i /var/...
ident searches for all instances of the pattern $keyword: text $ in the named files or, if no files are named, the standard input. These patterns are normally inserted automatically by the RCS command co(1), but can also be inserted manually. The option -q suppresses the warning given if there are no patterns in a file. The option -V prints ident's version number. ident works on text files as well as object files and dumps. For example, if the C program in f.c contains #include static...
ieditor is a simple internationalized editor in which the mouse is used to cut, copy, and paste text, and to position the cursor. ieditor also allows the user to perform simple searches and replaces. ieditor accepts several standard X-style command-line arguments (listed above) whose default values can be initialized in your Foreground and background colors are set using the options of the same name. ieditor uses a font list --mincho-*--14-;7x14;*--14-* as default fonts. If you want to change fo...
ifconfig is used to assign an address to a network interface and/or configure network interface parameters. ifconfig is invoked at boot time from /etc/init.d/network to define the network address of each interface present on a machine; you can also use it once the system is up to redefine an interface's address or other operating parameters. The interface parameter is a string of the form ``name unit'', for example, enp0. Using the -a option shows status for all interfaces on the machine. If ...
Two environment variables can be used to configure the global IFL environment. These environment variables are summarized in a table here and described in more detail below: Variable Default ______________________________________________ IFL_DATABASE /usr/lib/ifl/ifl_database LD_LIBRARY_PATH /usr/lib:/lib LD_LIBRARYN32_PATH /usr/lib32:/lib32 LD_LIBRARY64_PATH /usr/lib64:/lib64 The image file formats recognized by IFL are determined at runtime by searching for dynamic shared objects (DSOs) that c...
***THIS COMMAND IS NOW OBSOLETE*** Trusted networking rule is no longer assigned to network interface, thus iflabel is obsolete. The rhost.conf database is used, it describes the default labels to use for networking to non-trusted hosts and the idiom of network label support used for trusted multi-label hosts. PPPPaaaaggggeeee 1111
In IRIX 6.3 and later releases, screen-specific resources are kept in subdirectories under the $HOME/.desktop- directory named for the screen (for example, $HOME/.desktop-/0.0). These hold many of the 4Dwm resource files that in previous IRIX releases resided in the ./desktop- directory. Host-specific resources are kept under the $HOME/.desktophost directory. This is data that cannot be shared among hosts. Specific files and subdirectories of interest in each $HOME/...
The IRIS InSight Viewer is an online information retrieval system. This viewer provides an easy-to-use interface which allows the user to search and browse through online information that is distributed from Silicon Graphics.
A set of environment variables can be used to configure the global IL environment. In particular, the file format, multi-processing, graphics hardware acceleration, caching capabilities and monitoring functions of the IL can be controlled using these variables. The environment variables are summarized in a table here and describe in more detail below: Variable Default ____________________________________________ IL_ARENA_MAXUSERS 40 IL_CACHE_FRACTION .3 IL_CACHE_SIZE use cache fraction IL_COMPUT...
ilptops converts a text file into a PostScript file for printing on an Apple LaserWriter, or any other PostScript-compatible output device. It supports selection of a variety of fonts at arbitrary point sizes, margin specification, portrait and landscape page orientation, automatic page numbering, page outlining, and multi-column printing. It is similar to ilptops (1) except that it processes supplementary code set characters according to the locale specified in the LC_CTYPE environment variable...
The program imagetops produces a printable PostScript version of the image filename on standard output. It will be able to read all image formats that the psfiletype(1) program labels as ``image'' or ``eps.''
imdmonitor runs in the background and monitors available space on mounted filesystems and requests for message alerts from the sysmon(1M) facility. When it detects a condition requiring a graphical alert notifier, it uses fork(2) to launch a new process to post the notifier. The /usr/lib/sysmon/errhook program posts the notifier. imdmonitor is launched at login from the /var/X11/xdm/Xsession.dt script. It is not intended to be run directly by end users. It establishes a connection to the X serve...
imgcopy allows image files with formats supported by the ImageVision Library to be copied and converted to other supported formats. The following command line options are allowed: -fformat Specifies the file format to convert to. By default the output image file format is based on the file name extension. If the extension is not of a known type, then the default file format will be used (usually TIFF). The supported file formats depend on what ImageVision file formats have been installed; if an ...
imged is a pixel-based editor for making changes to image files stored in the SGI imglib format. Images may be stored in colormap, RGB, or greyscale format. imged may also be used to create a new colormap or RGB image by specifying an X and Y size on the command line. If the -rgb flag is given, the new image is created as RGB, otherwise it is created as a colormap image. New images are initialized with a solid grey background. The imged window contains a scaled representation of the image being ...
imginfo prints information about image files with formats supported by the ImageVision Library. The information includes: image dimensions in pixels, page size, data type, dimension order, color model, minimum and maximum pixel values, file format, data compression and image description if available. The following command line options are allowed: -gui Runs in a graphical user interface mode that shows the information in a separate window, along with a reduced view of the image data. In this mod...
The imgtcl shell provides a tcl-based scripting interface to the IL. IL operators and image files can be created, linked together, and displayed in an ilViewer or ilDisplay object. Most of the IL's classes can be be created and manipulated within imgtcl; multi-dimensional arrays can also be allocated (usually to be used as parameters to an IL function.)
imgview allows multiple image files to be displayed. Only image files with formats supported by the Image File Library (IFL) and that are installed, can be displayed. Use the imgformats command to determine which file formats are currently supported. The following command line options are allowed: -compare Tells the tool to display all images on the command line in a single window instead of in separate windows. The images will be stacked one on top of the other with the last file specified on t...
imgworks is a visual tool for altering and enhancing color and monochrome images. imgworks provides a graphical user interface that shows the effect of each operation as it is performed. Additionally, you can undo or redo a series of operations. You can use imgworks to manipulate images in the following ways: flipping, resizing, cropping, and rotating them; converting color to monochrome; creating photographic negatives; adjusting brightness, contrast, and color balance; thresholding and posteri...
When inetd is started at boot time by /etc/init.d/network, it reads its configuration information from the /etc/inetd.conf and listens for connections on certain internet sockets. When a connection is found on one of its sockets, it decides what service the socket corresponds to, and invokes a program to service the request. After the program is finished, it continues to listen on the socket (except in some cases which will be described below). Essentially, inetd allows running one daemon to inv...
infocmp can be used to compare a binary terminfo entry with other terminfo entries, rewrite a terminfo description to take advantage of the use= terminfo field, or print out a terminfo description from the binary file (term) in a variety of formats. In all cases, the boolean fields will be printed first, followed by the numeric fields, followed by the string fields....
inform opens up a window on the graphics console containing the text and a Continue button. If the mouse is clicked in the Continue button, the window will go away.
init init is a general process spawner. Its primary role is to create processes from information stored in an inittab file (see inittab(4)). The default inittab file used is /etc/inittab; other files can be specified using the INITTAB keyword in the system file (see system(4)). At any given time, the system is in one of eight poss...
initDisk invokes fx to initialize a disk and partition it as an option disk with all usable space in one partition, partition 7. It is essentially equivalent to performing the operation fx -x -c INITIALIZE on the indicated disk.
inpcontrol is used as a command line interface to InPerson. It passes commands specified in the commandstring to InPerson. This is useful for applications that want to initiate InPerson calls, or for users who wish to create InPerson shortcuts.
Please see the on-line InPerson User's Guide and the InPerson Setup and Administration Guide for detailed instructions on the use of this product. What follows is a brief summary.
The IRIS InSight Administration utility is used to assist in maintaining the libraries of books available to the IRIS InSight Viewer. This utility will rebuild the library-level index for any bookshelf specified on the invocation line, and will update the list of books for that particular bookshelf (booklist.txt). After the installation of any book, inst(1M) automatically runs this command over the necessary bookshelves. The only time an administrator needs to execute this command is if they hav...
inst is the installation tool used to install, upgrade, or remove software distributed by Silicon Graphics. There are two ways to run inst: - Invoke inst as a command from the shell. This is known as invoking inst using IRIX Installation and you must be superuser to do this. Some software cannot be installed using IRIX Installation (Release Notes and inst itself warn you about this software) and some commands within inst cannot be performed when using IRIX Installation. This is due to system int...
Install copies regular files generated in a source tree into a target directory. It can also create directories, links and special files in a target directory. The target directory's pathname will be prefixed by the value of the ROOT environment variable. Install is most commonly invoked from makefiles (see make(1)). If the RAWIDB environment variable is set, install creates no files in target directories; instead, it appends records describing the files that it would have created to the instal...
installf informs the system that a pathname not listed in the pkgmap file is being created or modified. It should be invoked before any file modifications have occurred. When the second synopsis is used, the pathname descriptions will be read from standard input. These descriptions are the same as would be given in the first synopsis but the information is given in the form of a list. (The descriptions should be in the form: pathname [ftype [[major minor...
The Inventor 3d File Format is SGI's standard for 3d data. The format supports both an ASCII and private binary format. The binary format is network-neutral and thus can be exported across machine boundaries. Page 1 Release 6.5 August 1991
ioconfig assigns logical controller numbers to all devices in the I/O subsystem. It is run as a part of the /etc/bcheckrc startup script. ioconfig walks the /hw hardware graph tree and assigns a unique and persistent logical controller number to each physical device found. The options are: -d Enable debugging messages. -f starting_directory Specify the root of the hardware graph tree. ioconfig attempts to match each device found as it walks the /hw hardware graph tree with an entry in /etc/iocon...
ipanel allows the user to change the environment's international settings consisting of locale, keyboard layout, and timezone specification through a graphical user interface. Individual users' environments as well as the system default environment can be set by using ipanel. If the specified combination of the country and language does not exist as one of the defined locales in the system, ipanel will generate the appropriate customized co...
ipaste is a utility that displays images stored using the image library "libimage.a". ipaste reads pixel values, image dimensions and other relevant data from the file imgfile via calls to the image library. ipaste then displays the image in a window. On machines with few bit planes, ipaste dithers the image. The -f option causes ipaste to run in the foreground. Normally, ipaste forks off a background process to display the image while the foreground process exits back to the command line. Wit...
ipcrm will remove one or more specified messages, semaphore or shared memory identifiers. The identifiers are specified by the following options: -q msqid removes the message queue identifier msqid from the system and destroys the message queue and data structure associated with it. -m shmid removes the shared memory identifier shmid from the system. The shared memory segment and data structure associated with it are destroyed after the last detach. -s semid removes the semaphore identifier semi...
ipcs prints certain information about active inter-process communication facilities for which the calling process has read access. Without options, information is printed in short format for message queues, shared memory, and semaphores that are currently active in the system. Otherwise, the information that is displayed is controlled by the following options: -q Print information about active message queues. -m Print information about active shared memory segments. -s Print information about ac...
-d This enables ipfilterd into a debug mode in which it will display each filter that is being created when reading the configuration file. Packets that are passed to the ipfilterd daemon for a accept/reject/grab decision will be logged using the syslog(3C) function with the log facility set to LOG_DAEMON. This includes an indication of whether the packet matched a filter or was dropped by default; an indication of whether the filter was one that specified an interface only or included protocol ...
Ipkbd changes the specified user's keyboard-cfg.xkb file to contain the specified configuration settings. These settings must be given as name/value pairs on the command line. This privcmd is not intended for command line use. Rather, ipanel(1) should be used to customize your cultural settings and create composite locales.
Iplang changes the specified user's $HOME/.lang file to contain the specified locale string. This privcmd is not intended for command line use. Rather, ipanel(1) should be used to customize your cultural settings and create composite locales.
Ipld creates a composite locale based on a specification read from stdin. This privcmd is not intended for command line use. Rather, ipanel(1) should be used to customize your cultural settings and create composite locales.
Iptime changes the specified user's $HOME/.timezone file to contain the specified timezone string. This privcmd is not intended for command line use. Rather, ipanel(1) should be used to customize your cultural settings and create composite locales.
ipxdebug is used to enable or disable diagnostic output from the IPX protocol stack. It is intended for use by Silicon Graphics developers and field personnel.
ipxstat shows various statistics related to IPX packet traffic. These include the total number of input and output packets, as well as the number and type of malformed packets dropped. The IPX protocol is implemented by the ipx STREAMS module, and is used by the NetWare client software to communicate with a NetWare server.
ircombine creates and operates on video format combinations, descriptions of raster sizes and timings to be used on video outputs, as well as the configuration of the underlying frame buffer. The resulting combination can be used as the current video configuration, stored as the default configuration to be used at system power-up or graphics initialization, or saved in a video format combination file. The combination can be created from scratch or by modifying the current or a saved combination....
Managers display information about your system and provide access to interactive guides (also called tasks) that let you administer your system. For example, the User Manager displays a list of the user accounts currently on the system and gives you access to guides like "Add a User Account" and "Modify a User Account". In the Manager window, you can open a guide by choosing its name from the Task menu or by clicking its button at the bottom of the window. The ISDN manager displays the ISDN ...
isSuper is used to check if testtype has a supertype of type supertype defined in the optimized type rule (OTR) file file.otr or, if not there, in /usr/lib/filetype/desktop.otr. It also supports the old compiled type rule (CTR) database file format. For more information about the entire IRIX Interactive Desktop environment, see the IID(1) man page.
ivcat reads each file in sequence and then writes each out. If no input file is given, or a filename of "-" is specified, ivcat reads from the standard input file. The input files must be valid Open Inventor 3D Interchange Format files (1.0 or 2.0). The following command line options are allowed: -b Write out the files in binary Inventor format. The default is to write out the files in Inventor's ASCII format. -f Remove all SoFile nodes. This has the effect of condensing hierarchical files in...
ivdowngrade reads the input file infile and converts it to the Inventor format specified by -v targetVersion , either 1.0 or 2.0. If the -v option is not specified, an Inventor V2.0 file will be generated. The input file can be in Inventor or VRML format. The output will always be in ascii format. If no output file is specified, ivdowngrade writes to stdout. If no input file is specified as well, ivdowngrade reads from stdin....
ivfix reads an Inventor object and restructures it to improve the object's rendering performance. ivfix processes the scene graph in two phases: Phase 1) Analyzes the organization of the input scene graph, and tries to sort it a better way to take advantage of coherence. For example, it tries to organize subgraphs by common textures, since switching textures is expensive. Once sorted, it also tries to combine subgraphs so that the final result has fewer nodes. Phase 2) "Flattens" the subgraph...
ivinfo prints (to standard output) information about the named file. (If no input file is given, ivinfo reads from the standard input.) The information includes whether the file is in ASCII or binary format, and, for each scene graph in the file, the number of nodes in the graph and the contents of any SoInfo nodes contained in it.
IvToRib converts an Open Inventor 2.0 file into a Renderman 3.0.3 .RIB data file. Copyright (c) Acuris, Inc. 1995. Command Line Options Typically, IvToRib expects an Open Inventor file to be specified on the command line after all command option switches. If no Open Inventor file is specified on the command line, IvToRib will read from standard input (stdin). By default, IvToRib writes the converted data to standard output (stdout) and messages to standard error (stderr). -h Prints a program usa...
ivview reads an Inventor file (or files) and provides a simple interface to quickly view 3D data. The input files must be valid Inventor 3D files (versions 1.0 or 2.0). All the files specified at the command line are read in and rendered. ivview presents a single window containing an Inventor viewer (examiner viewer or the walk viewer) and a menu bar. Note that if you click and hold the right mouse button, the viewer pop-up capabilities will be displayed. Also, note that the viewer has a help ca...
The iwsh program is an international terminal emulation program that runs a shell (or other UNIX command) within its own window on the screen. It comes from xwsh. The functions are the same as original xwsh, and the iwsh using xwnmo inputing multilingual strings.
/usr/java/bin/javac Java language compiler /usr/java/bin/java Java language interpreter /usr/java/bin/jdb Java language command-line debugger /usr/java/bin/javah Program that creates C header files and C stub files for a Java class /usr/java/bin/javap Program that disassembles compiled Java files /usr/java/bin/javadoc Program that generates API documentation in HTML /usr/java/bin/appletviewer Program that allows you to run applets without a web browser /usr/java/bin/jar The Java archive tool /us...
For more general information about the purpose and use of this plug-in, see http://java.sun.com/products/plugin/ For details on its use on SGI systems, see the release notes for java_plugin relnotes java_plugin
Jgui is an administration program for Xinet servers which speaks a proprietary protocol over a TCP/IP connection to a ``client'' application that handles user GUI interactions. Xinet also ships a JAVA application that implements the client side of this protocol. See the Xinet Administration Guide for details about running the JAVA client on a Macintosh. The jgui program implements identical behaviour to xktalk(1), except for not interacting with the user via the X Window System. It even uses t...
The jobs utility displays the status of jobs that were started in the current shell environment; see Shell Execution Environment. When jobs reports the termination status of a job, the shell removes its process ID from the list of those "known in the current shell execution environment".
join forms, on the standard output, a join of the two relations specified by the lines of file1 and file2. If file1 is -, the standard input is used. file1 and file2 must be sorted in increasing code set collating sequence on the fields on which they are to be joined, normally the first in each line [see sort(1)]. join processes supplementary code set characters in files, and recognizes supplementary code set characters given to the -e and -t op...
Jot is a display-oriented cut-and-paste style ASCII text editor tuned to run on Silicon Graphics machines. Jot is written using pure Graphics Library code, and hence will not work on a generic X terminal, and it ignores the X resources. Jot (which was originally called "zip"), is tuned to run well on large files, and can edit arbitrary binary files.
These routines let you copy, delete, move and set AppleShare attributes for K-AShare files. K-AShare stores AppleShare specific information, such as file Type and Creator and the resource fork, in several utility files. This information will be lost if you use cp(1), mv(1) and rm(1), to move K-AShare files around a unix filesystem. If you use kscp, ksmv, and ksrm, the AppleShare info will be moved or deleted as necessary. Kats is an administrative program used to view and set various AppleShare ...
Katype tests each argument in an attempt to classify it. It uses the same algorithm as K-AShare to determine the Macintosh Finder Information, FileType and FileCreator for files resident in the UNIX filesystem. The main purpose of katype is to check the proper working of the file typing heuristics. See filetype(5) for a discussion of these. Flags include: -m typefile specifies an alternate file of specifications. This is useful when one wants to test the applied heuristics. -c gives a test print...
Tables included in the file filename are loaded into the kbd STREAMS module, which must already have been pushed into the standard input stream. (In this context loaded means copied from a disk file into main memory within the operating system.) This program is intended both to provide for loading and linking of both shared or public tables and private tables implementing user-specific functionality. New users should refer to kbdcomp(1M) and kbd(7) for a ge...
The kbdpipe command allows the use of kbd tables as pipeline elements between user programs. [See kbdcomp(1M) and kbd(7) for descriptions of the module and its capabilities.] kbdpipe is mostly useful in code set conversion applications. If an output file is given, then all infiles are piped to the given output file. With no arguments other than -t, standard input is converted and sent to standard output. The r...
The kbdset command is the normal user interface to the kbd STREAMS module. [See kbdcomp(1M) and kbd(7) for a general description of the module's capabilities.] kbdset allows users to attach to pre-loaded tables, detach from tables, and set options. Options are provided for setting hot-keys to toggle tables and for controlling modes of the module. Arguments and options are scanned and acted on in command line order. If th...
The kernprof executable allows kernel profiling information to be gathered. To use it, use the ssrun(1) command on the kernprof executable, specifying any of the experiments that are supported for the kernel. These experiments will generate a SpeedShop experiment named kernprof... The experiments describe themselves as being run on the program "/unix", and prof(1) can be used to process the data; the filename of the actual kernel for which the data was collected must to b...
keyboard allows users to set four keyboard parameters: key click sounds (on or off), key repeat (whether or not holding down a key causes a character to repeat), repeat speed (rate at which a depressed key will repeat characters), and repeat delay (amount of time to pass before a depressed key begins repeating characters). The panel can be launched from the toolchest (Desktop > Customize > Keyboard) or from a Unix shell command line. Like most other customization panels, the desktop panel has th...
kill sends a signal to the specified processes. The value of signal may be numeric or symbolic [see signal(5)]. The symbolic signal name is the name as it appears in /usr/include/sys/signal.h, with the SIG prefix stripped off. Signal 15 (SIGTERM) is sent by default; this will normally kill processes that do not catch or ignore the signal. pid and pgid are unsigne...
killall sends a signal to a set of processes or process groups specified by pname(s). It is similar to kill(1), except that it allows processes to be specified by name and has special options used by shutdown(1M). When no processes are specified, killall terminates all processes that are not in the same process group as the caller. This form is for use in shutting down the system and is only available to the superuser. The options to killall are: signal, -signal Specifies the signal number. The ...
Killautomount kills the automount deamon. It tries to unmount the filesystems that are automounted and not busy. "chkconfig automount off" is executed also.
The killxwnmo requires termination of the input manager xwnmo. If the owner of killxwnmo process is not same as that of xwnmo process, that requirement will fail. And if more than zero client(s) is(are) connecting to xwnmo, that requirement will fail. But with -9 option, that requirement will success even if more than zero client(s) is(are) connecting to xwnmo. "SEE ALSO" xwnmo(1X)
The file /var/adm/klogpp is a kernel /dev/log post-processor. It reads from standard input, converts standard device name formats to include the mounted filesystem, and then writes to standard output. This program is usually invoked as a filter via /etc/syslogd.conf by syslogd(1M) to convert hex device numbers in kernel printfs to /dev names.
Zone memory consists of a number of zones of differing sizes. Since there is limited table space for zones, structures with sizes close to each other are lumped together in the same zone. For example, structures that have a size of 712 bytes may be put into the zone listed as size 768. In cases like this, you may need to know the exact size of the structure you wish to split when using kmem_split_zone. kmem_split_zone should not be used with kmem_make_zones_private_max and kmem_make_zones_privat...
Ksd is an AppleShare network file system server. It uses the K-Talk AppleTalk protocols to service file system requests from remote clients. The K-AShare server advertises its services with the Name Binding Protocol Daemon nbpd(1m) using the server-name specified (unless the -noddp argument is given). The server name may contain blanks, but it must then be quoted in the shell invocation. The boot-time invocation of the servers normally resides in the file /usr/etc/appletalk/services, which is us...
ksd_msg allows the administrator to send a message to all K-AShare users who have volumes mounted. The message will appear in a pop-up dialog box on each user's screen.
ksd_restart allows the administrator to shut down the KAShare server and, if desired, restart it. The script will query for a number of minutes before shutdown, and will allow the invoker to specify a custom message. The message will be sent to all K-AShare users with mounted volumes every minute until the shutdown, telling the reason for the shutdown, and the number of minutes until shutdown.
These utility programs let the user convert between various Macintosh archival formats and the K-AShare file format. The supported archive formats are AppleSingle, AppleDouble, BinHex, CAP-AUFS 3.0, Helios Ethershare, MacBinary, TOPS (version 2 or later), and IPT uShare 4.1. These formats are used to encode Macintosh specific information (file type and creator, resource fork etc.) into one or more files that can be stored on non-Macintosh file systems. BinHex also encodes files into ASCII, so th...
labelit can be used to provide labels for unmounted disk file systems or file systems being copied to tape. You must be superuser to run labelit . The -n option provides for initial labeling only (this destroys previous contents). With the optional arguments omitted, labelit prints current label values. The special name should be the physical disk section (e.g., /dev/dsk/dks0d1s0), or the a rewind tape device (e.g., /dev/tape). The device may not be on a remote machine. The fsname argument repre...
Last will look in the wtmp file which records all logins and logouts for information about a user, a terminal or any group of users and terminals. Arguments specify names of users or terminals of interest. Names of terminals may be given fully or abbreviated. For example `last d1' is the same as `last ttyd1'. If multiple arguments are given, the information which applies to any of the arguments is printed. For example `last root console' would list all of "root's" sessions as well as all s...
launch is a small application which consists of a text field where the user can enter commands and their arguments for execution. The IRIX Interactive Desktop file manager (fm) invokes launch when the user double-clicks an icon and the icon's filetype requires additional information before the corresponding application can be launched. End users can also run launch program at a Unix shell command line, though this would be unusual (it is easier to run the command itself directly). The options t...
The launchbookviewer utility launches the user's favorite book viewer as chosen on the dtUtilities(1) panel or set in the BOOKVIEWER environment variable. If the user has not chosen a favorite book viewer, the script launches Insight. The launchbookviewer script is not intended to be run directly by the end user, but can be run at a Unix shell command line. It is also accessible from the toolchest (Help > Online Books). For more information about the entire IRIX Interactive Desktop environment,...
launchESPartner is a utility that brings up SGI Embedded Support Partner User Interface. A web based User Interface requires a html browser (Netscape or Lynx) to operate. The User Interface provides access to all SGI Embedded Support Partner facilities. Please refer to esp(5) for a detailed description of Embedded Support Partner and available facilities. launchESPartner can be invoked either by double-clicking the Embedded Support Partner icon (located in Icon Catalog > Support Tools folder) or...
The launchWebJumper script opens a webjumper or URL into the user's Web browser. The script runs when the user chooses Internet > Open Web Browser on the toolchest or double-clicks a webjumper(1) icon. Also the user can run it at a Unix shell command line. -n Use Netscape, ignoring the user's chosen Web browser. The optional jumpsite and URL arguments specify which page(s) to load. Each page appears in a separate browser window. Given no arguments, launchWebJumper opens the user's chosen Web ...
The lboot command is used to configure a bootable UNIX kernel. Master files in the directory master contain configuration information used by lboot when creating a kernel. System files in the directory system are used by lboot to determine which modules are to be configured into the kernel. If a module in master is specified in the system file via "INCLUDE:", that module is included in the bootable kernel. For all included modules, lboot searches the boot directory for an object file with the ...
Applications that would like to take advantage of the Low Bandwidth extension to X (LBX) must make their connections to an lbxproxy. These applications need to know nothing about LBX, they simply connect to the lbxproxy as if were a regular server. The lbxproxy accepts client connections, multiplexes them over a single connection to the X server, and performs various optimizations on the X protocol to make it faster over low bandwidth and/or high latency connections. With regard to authenticatio...
Ld, the link editor, links Elf object files. The archive format ld uses is the one created by the archiver ar(1). ld is normally invoked by cc(1), although it can be run separately. When ld is used as part of a cc compilation, the ld options must be passed via the -Wl mechanism. See cc(1) for details of -Wl. The ld command combines several object files into one, performs relocation, resolves external symbols, builds tables and relocation information for run-time linkage in case of shared linking...
IRIX systems DESCRIPTION: The runtime dynamic linker loads the object (an executable or DSO) and all of the libraries reporting what libraries were loaded. But does not execute the program or DSO. This is to make it easy to detect what libraries are loaded by an executable without having to run it. Options: -a rldargs Sets the environment variable _RLD_ARGS to the string rldargs before executing the runtime linker (rld). -D Does not on delay-loaded DSOs....
NOTE: When the environment variable _XPG is a value greater than 0 (zero), lex execs the POSIX compliant /usr/bin/flex. The lex command generates programs to be used in simple lexical analysis of text. The input files (standard input default) contain strings and expressions to be searched for and C text to be executed when these strings are found. lex processes supplementary code set characters in program c...
lfmt uses format for printf style formatting of args. lfmt encapsulates the output in the standard error message format and displays the output on stderr. In addition, lfmt forwards its output to the logging and monitoring facility. The following options are available. -c Also write the output to the console logger device (/dev/conslog), with a date and time stamp. This device is not normally used wit...
The RX Plug-in may be used with Netscape Navigator (3.0 or later) to interpret documents in the RX MIME type format and start remote applications. The RX Plug-in reads an RX document, from which it gets the list of services the application wants to use. Based on this information, the RX Plug-in sets the various requested services, including creating authorization keys if your X server supports the SECURITY extension. It then passes the relevant data, such as the X display name, to the applicatio...
When executed without file arguments, License Manager displays the Main Window, which provides a complete graphical interface for viewing, installing, upgrading, and removing FLEXlm and NetLS software licenses. The optional argument -vendor is used to specify the vendor mode, which customizes the License Manager interface for a specific vendor. The vendor mode determines the default values of license entry fields, the location of the license files, and the location of licensing server startup sc...
line copies one line (up to a new-line) from the standard input and writes it on the standard output. It returns an exit code of 1 on EOF and always prints at least a new-line. It is often used within shell files to read from the user's terminal.
The link command is used to create a filename that points to another file. The unlink command is used to remove a link to a file. The only difference between ln(1) and link(1M) is that the latter simply makes the link(2) system call with the arguments specified. No error checking is performed. Analogously, unlink(1M) simply calls the unlink(2) system call with the specified pathname. Use of these commands is discouraged. The commands ln(1), rm(1), and rmdir(1) provide the necessary functionality...
linkstat reports on router link performance and error rates. It also reports error rates on the Hub chip Craylink network interface (NI) and I/O Interface (II) links.
lint detects features of C program files which are likely to be bugs, non-portable, or wasteful. It also checks type usage more strictly than the compiler. lint issues error and warning messages. Among the things it detects are unreachable statements, loops not entered at the top, automatic variables declared and not used, and logical expressions whose value is constant. lint checks for functions that return values in some places and not in others, functions c...
listAllDiskFS checks all local fixed disks for filesystems, and for each filesystem found reports its partition type, filesystem type, size, free space, and mount directory, if any. This privcmd is used by the FilesystemManager which can't access the information directly because root privilege is required to read the disk header.
The listen port monitor ``listens'' to a network for service requests, accepts requests when they arrive, and invokes servers in response to those service requests. The network listener process may be used with any connection-oriented network (more precisely, with any connectionoriented transport provider) that conforms to the Transport Interface (TLI) specification. The listener internally generates a pathname for the minor device for each connection; it is this pathname tha...
listPrinters is a privileged command that gets a list of printers which are connected to host-name. The list is written to standard output, one printer per line. listPrinters works by running /usr/lib/print/listprinters. listPrinters is a separate program because /usr/lib/print/listprinters must be run as root in order to work properly; listPrinters is used to grant users the "list printers" privilege....
The listres program generates a list of a widget's resource database. The class in which each resource is first defined, the instance and class name, and the type of each resource is listed. If no specific widgets or the -all switch are given, a two-column list of widget names and their class hierarchies is printed. This internationalized version listres uses the internationalized Athena Widget Set. And so it generates a list of the internationalized Widget....
listRootBackups is a privileged command that uses at(1M) and crontab(1M) to get information about backups which have been scheduled by the superuser. This is a privileged command because ordinary users cannot get information about the super-user's at and cron jobs. It is installed as a default privilege. The output format is one line per at backup consisting of the at identifier followed by the backup command, a blank line, and then one line per cron backup consisting of the cron line for that ...
The List_tape command lists the contents of a system backup tape made with Backup(1), cpio(1), tar(1), or bru(1). If a tape drive attached to a remote host is used, the name of the remote host needs to be specified with the -h hostname option on the command line. For remote listing to successfully work, the user should have a TCP/IP network connection to the remote host and also have "guest" rsh privileges on that host. If the local or remote tape device is pointed to by a device file other th...
lltune is a utility which either: o puts a set of lapb parameters to the lapb driver, o gets a set of lapb parameters from the lapb driver, o puts a set of llc2 parameters to the llc2 driver, or o gets a set of llc2 parameters from the llc2 driver. By default, a get operation is performed. These parameters are on a per-subnetwork basis and thus, the subnetwork identifier must be specified. The options used in lltune are the following: -s subnet_id subnet_id is the subnetwork to be referenced. -p...
lmcksum will perform a checksum of a license file. This is useful to verify data entry errors at your location. lmcksum will print a line-byline checksum for the file as well as an overall file checksum. lmcksum takes the -k switch to force the encryption key checksum to be casesensitive. lmcksum will ignore all fields that do not enter into the encryption key computation; thus the server node name and port number, the vendor daemon and options file paths, and lowercase keyword=value pairs on FE...
lmdiag diagnoses problems when license checkout fails. If no feature is specified, lmdiag will operate on all features in the license file(s) in your path. lmdiag will first print information about the license, then attempt to checkout each license. If the checkout succeeds, lmdiag will indicate this. If the checkout fails, lmdiag will give you the reason for the failure. The the failure is a failed connection to the server, you will have the option of running extended connection diagnostics....
lmdown sends a message to every license daemon asking it to shut down. The license damons write out their last messages to the log file, close the file, and exit. All licenses which have been given out by those daemons will rescinded, so that the next time a client program goes to verify his license, it will not be valid. NOTE: In FLEXlm v2.4 and later, lmdown is either a link or a copy of the lmutil program. (On VMS, lmdown is still a separate program)....
lmhostid calls the FLEXlm version of gethostid and displays the results. The output of lmhostid looks like this: lmhostid - Copyright (C) 1989, 1990 Highland Software, Inc. The FLEXlm host ID of this machine is "1200abcd"
When executed with an argument, lmparthostids will print the lmhostid for each possible partition of the current system. The optional sysid argument may be used to compute lmhostids for an arbitrary system.
lmremove allows the system administrator to remove a single user's license for a specified feature. This could be required in the case where the licensed user was running the software on a node that subsequently crashed. This situation will sometimes cause the license to remain unusable. lmremove will allow the license to return to the pool of available licenses.
lmreread allows the system administrator to tell the license daemon to reread the license file. This can be useful if the data in the license file has changed; the new data can be loaded into the license daemon without shutting down and restarting it. lmreread uses the license file from the command line (or the default file, if none specified) only to find the license daemon to send it the command to reread the license file. The license daemon will always reread the original file that it loaded....
lmstat provides information about the status of the server nodes, vendor daemons, vendor features, and users of each feature. Information can be optionally be qualified by specific server nodes, vendor damons, or features.
lmswitchr switches the FLEXadmin REPORTLOG log file to a new file. The feature argument is to connect to the correct vendor-daemon. All feature log entries for that daemon are moved to the new file.
lmutil is the "general-purpose" FLEXlm utility program. Normally, endusers would not use lmutil directly, they would use the individual utility programs which are either a copy or a link to lmutil.
lmver scans the contents of a binary or library file for the FLEXlm version string and displays it. If no argument is given, lmver assumes the filename is "liblmgr.a" and attempts to find and display the version from that file.
The locale utility writes information about the current locale environment to the standard output. When locale is invoked without any arguments, it summarizes the current locale environment for each locale category as determined by the settings of the environment variables defined LANG, LC_ALL, LC_CTYPE, LC_COLLATE, LC_MONETARY, LC_NUME...
The localedef utility converts source definitions for locale categories into the locale source files usable by the locale generators such as chrtbl, wchrtbl, colltbl, and montbl. It will then execute those generators to produce the locale runtime files LC_CTYPE, LC_COLLATE, and LC_MONETARY respectively. The lo...
lockd provides the inherently stateful locking services within the stateless NFS environment. It allows the locking of records and files between applications running on different physical machines sharing the same filesystems mounted with NFS. nservers is the number of lockd servers to start. Locks are presently advisory only. The lock style implemented by lockd is that specified in the SVID (see lockf(3C) and fcntl(2)). There is no interaction between the lockd's locks and flock(3B) style lock...
Logger provides a shell command interface to the syslog(3B) system log routine. It can log a message specified on the command line, from a specified file, or from the standard input. Each line in the specified file or standard input is logged separately. Logger has the following options: -i Log the process ID of the logger process with each line. -s Log the message to standard error, as well as the system log. -f file Log the contents of the specified file. -p pri Enter the message with the spec...
The login command is used at the beginning of each terminal session and allows you to identify yourself to the system. It is invoked by the system when a connection is first established. It is invoked by the system when a previous user has terminated the initial shell by typing a to indicate an end-of-file. If login is invoked as a command, it must replace the initial command interpreter. This is accomplished by typing exec login ...
lp arranges for the named files and associated information (collectively called a request) to be printed by a line printer. If no file names are mentioned, the standard input is assumed. The file name - stands for the standard input and may be supplied on the command line in conjunction with named files. The order in which files appear is the same order in which they will be printed. lp associates a unique id with each request and prints it on the standard output. This id can be used later to ca...
lpadmin configures line printer (LP) spooling systems to describe printers, classes and devices. It is used to add and remove destinations, change membership in classes, change devices for printers, change printer interface programs and to change the system default destination. Exactly one of the -p, -d or -x options must be present for every legal invocation of lpadmin. -pprinter names a printer to which all of the options below refer. If printer does not exist then it will be created. -xdest r...
lpenabled monitors the output device for the printer specified on the command line. An example output device is /dev/plp. Once the output device is writable (by lp) lpenabled will enable the printer using the enable(1) command. lpenabled is normally invoked by lpsched(1) when it can not open the output device and the output device. This can happen when the parallel port is connected to both a floppy drive and a printer on O2 systems. The parallel port will become available once the floppy is eje...
lpqserver is obsolete. The functionality is now available in spoolserv. The lpqserver is a server that provides information to the Macintosh K-Spool Monitor desk accessory. It accepts requests from Macintoshes, and responds with information gained by executing lpq(1) (for lpr systems) or lpstat(1) (for lp systems), or by attempting to read the various files in the printer's spool directory. The lpqserver is invoked with an argument naming an entry in the printcap(5) file. Flags include: -D turn...
lpsched schedules requests taken by lp(1) for printing on line printers (LP's). lpsched is normally invoked at boot time from the /etc/init.d/lp file. chkconfig (1M) can be used to enable or disable lpsched from starting ("chkconfig lp off" or "chkconfig lp on"). lpsched will normally fork to free the calling process. The -nofork option can be used to prevent lpsched from forking. Do NOT use -nofork in the /etc/init.d/lp file (the intended use is for debugging when running lpsched from a sh...
lpstat prints information about the current status of the LP spooling system. If no options are given, then lpstat prints the status of all requests made to lp(1) by the user. Any arguments that are not options are assumed to be request ids (as returned by lp). lpstat prints the status of such requests. Options may appear in any order and may be repeated and intermixed with other arguments. Some of the keyletters below may be followed by an optional list that can be in one of two forms: a list o...
lptops converts a text file into a PostScript file for printing on an Apple LaserWriter, or any other PostScript-compatible output device. It supports selection of a variety of fonts at arbitrary point sizes, margin specification, portrait and landscape page orientation, automatic page numbering, page outlining, and multi-column printing. This program is usually used to print ascii text files. However, it can also be used to print files which contain ISO 8859-1 characters. To print a file with I...
For each directory argument, ls lists the contents of the directory; for each file argument, ls repeats its name and any other information requested. The output is sorted alphabetically by default. When arguments are not given, the current directory is listed. When several arguments are given, the arguments are first sorted appropriately, but file arguments appear before directories and their contents. ls processes supplementary code set characters according to the locale speci...
lv_to_xlv parses the file describing the logical volumes used by the local machine and generates the required xlv_make(1M) commands to create an equivalent XLV volume. Normally, lv_to_xlv uses the logical volume file /etc/lvtab, but when the -f option is specified, the given argument lvtab_file is used. If the -o option is specified, the xlv_make(1M) commands are sent to the file output_file instead of stdout....
The m4 command is a macro processor intended as a front end for C, assembler, and other languages. Each of the argument files is processed in order; if there are no files, or if a file name is -, the standard input is read. The processed text is written on the standard output. m4 processes supplementary code set characters in comments and literals according to the locale specified in the LC_CTYPE environment variable [see LANG on envi
The mactest command allows the current process and specified files/directories to have their MAC label attributes compared for dominance, equality and moldyness. mactest evaluates the MAC labels using the given options and returns a boolean result. The options P, F, L and M determine the type of test: -P Compare current running process and file. -F Compare two files. -L Compare MAC label and file. -M Check if the process or directory is moldy. The options D, d, e and x determine the type of comp...
Mail.local reads the standard input up to an end-of-file and appends it to each user's mail file. The user must be a valid user name. The options are as follows: -f from Specify the sender's name. Individual mail messages in the mailbox are delimited by an empty line followed by a line beginning with the string ``From ''. A line containing the string ``From '', the sender's name and a time stamp is prepended to each delivered mail message. A blank line is appended to each message. A great...
mailbox watches your mailbox, and notifies you when you have mail. It displays a small picture of a mailbox to perform notification. The flag on the mailbox rises whenever new mail messages appear in your mailbox. You can open the mailbox and read your mail by clicking on the mailbox window with the left mouse button. If one of the shift keys is held down, or if you have no mail, the mailbox door simply opens without running the mail reading program. Once you have finished reading your mail, the...
Mailq prints a summary of the mail messages queued for future delivery. The first line printed for each message shows the internal identifier used on this host for the message, the size of the message in bytes, the date and time the message was accepted into the queue, and the envelope sender of the message. The second line shows the error message that caused this message to be retained in the queue; it will not be present if the message is being processed for the first time. The following lines...
The mailstats utility displays the current mail statistics. First, the time at which statistics started being kept is displayed, in the format specified by ctime(3). Then, the statistics for each mailer are displayed on a single line, each with the following whitespace separated fields: M The mailer number. msgsfr Number of messages from the mailer. bytes_from Kbytes from the mailer. msgsto Number of messages to the mailer. bytes_to Kbytes to the mailer. msgsrej Number of messages rejected. msgs...
mailx is an interactive mail processing system, which has a command syntax reminiscent of ed with lines replaced by messages. Send Mode can be used by applications or users to send messages from the text in standard input. Receive Mode is more oriented to interactive users. Mail can be read and sent in this interactive mode. When reading mail, mailx provides commands to facilitate saving, deleting and responding to messages. When sending mail, mailx allows editing, reviewing and other modificati...
Sending Mail The command-line arguments that follow affect SENDING mail: An address can be any one of the following: 1) An RFC 822-compliant address specification (i.e. ``user@host.domain''). 2) A UUCP route (i.e. ``host1!host2!user''). 3) A local user name or alias. When addresses are specified, mail assumes a message is being sent. It reads the text of the message from standard input up to an end-of-file (control-d), or until it reads a line consisting of just a period. When either of thos...
Mail is an interactive mail processing system, which has a command syntax reminiscent of ed with lines replaced by messages. The -v flag puts Mail into verbose mode; the details of delivery are displayed on the users terminal. The -i flag causes tty interrupt signals to be ignored. This is particularly useful when using Mail on noisy phone lines. The -n flag inhibits the reading of /usr/lib/Mail.rc. Sending mail. To send a message to one or more other people, Mail can be invoked with arguments w...
The make utility can be used as a part of software development to update files that are derived from other files. A typical case is one where object files are derived from the corresponding source files. The make utility examines time relationships and updates those derived files (called targets) that have modified times earlier than the modified times of the files (called prerequisites) from which they are derived. A description file (makefile) contains a description of the relationships betwee...
MAKEDEV creates specified device files in the current directory; it is primarily used for constructing the /dev directory. It is a "makefile" processed by the make(1) command. Its arguments can be either targets in the file or assignments overriding parameters defined in the file. The targets alldevs and owners are assumed if no other targets are present (see below). All devices are created relative to the current directory, so this command is normally executed from /dev. In order to create th...
To work properly, the IRIX Interactive Desktop (IID) requires the directory $HOME/.desktop- to exist when the user logs into a host named . This directory is referred to as the desktop configuration or dot desktop directory. The makeDotDesktop program lets users choose whether their desktop configuration should be the same as or different from their desktop configurations on other systems. makeDotDesktop runs at login from the /usr/lib/X11/xdm/Xsession.dt script. The user can...
makeIconVisuals chooses a set of visuals based on the hardware to provide good-looking IRIX Interactive Desktop icons that use a minimum of memory and avoid colormap flashing. This program is run from the file /usr/lib/X11/xdm/Xsession.dt at user login. Users should normally not run this command directly. For more information about the entire IRIX Interactive Desktop environment, see the IID(1) man page. PPPPaaaaggggeeee 1111...
makekey improves the usefulness of encryption schemes depending on a key by increasing the amount of time required to search the key space. It reads 10 bytes from its standard input, and writes 13 bytes on its standard output. The output depends on the input in a way intended to be difficult to compute (i.e., to require a substantial fraction of a second). The first eight input bytes (the input key) can be arbitrary ASCII characters. The last two (the salt) are best chosen from the set of digits...
A colormap is a mapping from color-index values (integers) into RGB values. All GL programs (graphics programs linked with libgl) share a common X colormap, which is distinct from the default X root colormap. Essentially, makemap causes a certain set of colors to be assigned to the GL colormap (which is just another X colormap as far as the X server is concerned). Although there may be multiple X colormaps defined in the system at any one time, only one of these X colormaps is installed (loaded ...
makemdbm takes infile and converts it to a file in mdbm(3B) format. Each line of the input file is converted to a single mdbm record. All characters up to the first tab or space form the key, and the rest of the line is the data. If a line ends with \, then the data for that record is continued on to the next line. It is left for the clients of the network information service (NIS) to interpret #; makedbm does not itself treat it as a comment character. infile can be -, in which case standard i...
makemovie is used to take image and audio data in a variety of forms and put them into a movie file that can be edited with moviemaker or viewed with movieplayer. The -o option must be used to specify the file in which the resulting movie will be placed. Image and audio data are taken from the input files in the order listed; this ordering determines the order in which they will appear when the movie is played. The options -c, -l, -i, -t, -r, -s, -b, -q, -p, -k, and -a can be used to set the com...
makepsres creates PostScript language resource database files. Resource database files can be used to specify the location of resources that are used by the font selection panel and other Adobe software. For a complete description of the resource location facilities in the Display PostScript system, see Appendix A and Appendix B of "Display PostScript Toolkit for X" in Programming the Display PostScript System with X. makepsres creates a resource database file named PSres.upr that contains all...
makewhatis scans the manual page (also known as reference page) trees, parses the manual pages, and strips out the NAME section information to create the "whatis" database used by apropos(1), man(1), and whatis(1). By default, makewhatis creates the file /usr/share/catman/whatis. Another file can be created as the database by specifying its filename on the command line. An alternate manual page tree can be specified by using the -M option to specify a path or paths to a manual page tree or tre...
This tool is part of the Samba suite. make_smbcodepage compiles or de-compiles codepage files for use with the internationalization features of Samba 2.2
This tool is part of the Samba suite. make_unicodemap compiles text unicode map files into binary unicode map files for use with the internationalization features of Samba 2.2.
man locates and prints the titled entries from the on-line reference manuals. man also prints summaries of manual entries selected by keyword or by associated filename. If a section is given, only that particular section is searched for the specified title. The current list of valid sections are any single digit [0-9], the letter 'D', plus the sections local, public, new, and old, corresponding to the sections l, p, n, and o, respectively. When a section name of this form is given, the first c...
maze is a fun 3d game that will test your ability to navigate a marble through a 3d maze by tilting the floor of the maze. The object of the game is to maneuver the marble through the entire maze without falling into any of the holes. There is only one path through the maze and it is NOT marked. Use the left mouse to control the tilt of the maze floor. You can adjust the view of maze by pressing the right mouse button and choosing the Decoration on menu button. This will add some additional butt...
The mcogamma command allows the setting of the gamma lookup table directly for each output of the MultiChannel Option. This command affects the MultiChannel Option only, and has no effect on the standard graphics output.
mdbm_remove will perform mdbm_invalidate and unlink on the listed files. mdbm_remove will NOT remove files that are not mdbm databases. This command is needed to remove any mdbm file where there may be a process that has opened the mdbm file. The mdbm_invalidate call will cause any process to close the mdbm file on their next access.
mediaconvert is a graphical tool for converting between different audio, image, and movie file formats. Internally, mediaconvert invokes the command-line conversion utility dmconvert(1). -b Causes mediaconvert to print status and debug information. This includes the command-line that is used to invoke dmconvert(1). mediaconvert, formerly called moviemaster, replaces the soundfiler and movieconvert tools that shipped in previous releases. It provides a superset of the file conversion functionalit...
mediad is a daemon that monitors the removable media devices on a system. When media is inserted, mediad scans the media for filesystems and mounts them. When a user issues the eject command, eject sends mediad a message, and mediad dismounts the filesystems and ejects the media. N.B.: Because data corruption and loss will occur if media is forcibly removed without unmounting any filesystems present on the media, always eject disk media using either the eject command or the Eject selection in th...
mediarecorder is a graphical tool to record digital media files from the camera, microphone, external video and audio hardware, and workstation screen. To supplement the discussion below, you may wish to consult the online help, accessible from the Help menu within the tool. mediarecorder records three different types of files: movie files (such as QuickTime), still image files (such as TIFF, JFIF or GIF), and audio files (such as AIFF/AIFC). You can record movie or still image files from the sy...
memleak is a utility that generates a report describing possible memory leaks in the operating system. It is intended to be used only by those involved in writing and debugging device drivers or other parts of the kernel. There are times when zone memory growth is normal. Someone involved with writing and debugging kernel or device driver modules will know when the growth is normal. namelist contains symbol table information needed for symbolic access to the system memory image being examined. T...
merge incorporates all changes that lead from file2 to file3 into file1. The result goes to standard output if -p is present, into file1 otherwise. merge is useful for combining separate changes to an original. Suppose file2 is the original, and both file1 and file3 are modifications of file2. Then merge combines both changes. A conflict occurs if both file1 and file3 have changes in a common segment of lines. If a conflict is found, merge normally outputs a warning and brackets the conflict wit...
The mergeOPTIONS program accepts data from stdin (or a single optional file) and sends it to stdout. Its primary purpose is to merge queue or user-specific PostScript options into the postscript stream. In addition, in many types of printers, mergeOPTIONS is responsible for performing accounting and performance timing. The flags are defined as follows: -u specifies the user who sent the job. This determines what printer-specific options are sent when the job originates on Unix. -p specifies the ...
mesg with argument n forbids messages via write(1) , talk or other utilities by revoking non-user write permission on the user's terminal. The terminal affected is determined by searching for the first terminal in the sequence of devices associated with standard input, standard output and standard error, respectively. mesg with argument y reinstates permission. All by itself, mesg reports the current state without changing it. Processes with appropriate privileges may be able to send messages t...
midikeys provides a 3D graphical MIDI keyboard controller interface used to transmit events to an external MIDI device or the internal software MIDI synthesizer. The MIDI Controllers panel is used to transmit a plethora of MIDI controllers and monitor incoming data. MIDI note data is transmitted by clicking the mouse on the music keyboard or pressing the computer keyboard keys. See the OnLine book for the computer keyboard to note mapping scheme. The position of the mouse button click controls t...
midisynth is a program which listens on the MIDI input port and generates sounds in real time in response to MIDI events. midisynth has the following command-line options, most with a short and long form as indicated: -h help Print list of options. -a allMIDI Listen to all MIDI inputs. Default is to listen to only the 'Software Synth' port. -bank Use as the default GM preset bank. Default is /usr/share/data/sounds/synth/presets/GeneralMIDI_SoundSetLevel1 -chans N Open an ...
Miser starts the miser daemon. Miser is a deterministic batch scheduling facility that can be used to balance batch and interactive cpu and memory usage.
The miser_jinfo command is used to query the schedule/description of a job that has already been scheduled by miser(1) If the specified job exists and miser(1) is running, miser_jinfo will return the schedule in the same format as miser_submit(1).
The miser_kill command is used to terminate a miser job. The command sends a SIGKILL to the job and all it's children. Upon termination of the job, the reserved resources are freed immediately. A miser job that is killed using other mechanisms, may not properly cleanup all it's children and/or the committed resources.
The miser_move command removes a tuple of space from the source queue's vector and adds it to the destination queue's vector beginning at the start time and ending at the end time. The resources added or removed do not change the vector definition and are, therefore, temporary. The command returns a table that lists the start and end times of each resource transfer and the amount of resources transfered....
The miser_qinfo command is used to retrieve information about the free resources of a queue, the names of all miser queues, and to query all jobs currently scheduled against a particular queue.
The miser_reset command is used to force a running version of miser to use a new configuration file (the format of the configuration file is detailed in miser(4) ). The new configuration will succeed if and only if all currently scheduled jobs can be successfully scheduled against the new configuration. If the attempt at creating a new configuration fails, then miser(1) retains the old configuration. The miser_reset will fail if the requested new miser configuration oversubscribes the resources ...
The miser_submit command is used to submit a job (the command) to a miser(1) queue. A job is an application that will be scheduled by miser. Any application that does not change its session ID or change its process group ID can be submitted to a miser queue. For an application to be properly submitted to a miser(1) queue, it needs to specify its resource schedule. A resource schedule is a list of resource specifications, called segments, that define the resource requirements of a particular job....
mkboottape is used to build, list, or extract "boot tape filesystems". Booting from tape is no longer supported. However, the tape filesystem format is still used in the sa file used in booting from CDROM. A tape filesystem consists of a special directory that contains the list of filenames, sizes, and offsets, and from one to 20 files. Filenames can be up to 16 characters in length. The following options are understood: -l List the contents of the boot tape. In this case the file arguments ar...
mkbsdnetpr provides access on a local machine to a printer that is connected to a networked remote machine. The BSD printing protocols are used to communicate with the remote machine. mkbsdnetpr can be run either interactively or in batch mode. mkbsdnetpr will run interactively if any or all of its command line arguments have not been specified. mkbsdnetpr will prompt for any missing command line arguments. local printer name is the name you wish to give the printer on your machine (see lpadmin ...
mkcentpr installs a printer with a parallel interface for use with the System V printer spooling system. mkcentpr is an interactive installation program that will display available options and prompt for the relevant installation parameters. You must be root to execute mkcentpr. The program first asks for the name you wish to give the printer. This name must be no more than fourteen characters. See lpadmin(1M) for more information on naming printers. After entering a name for the printer, the pr...
Mkdepend infers make(1) dependencies from source containing C #include directives. It invokes cc(1) with the -M option to compile dependencies given a list of source files, and edits the generated dependency information into depfile, which may be a makefile or a make include file. The -c option substitutes compiler, which may be an elaborate, quoted invocation of a compiler, for the default cc -M. This option is useful in an environment where the -D and -I options of cc are used to govern header...
mkdir creates the specified directories in mode 777 [possibly altered by umask(1)]. Standard entries in a directory, ., for the directory itself, and .., for its parent are made automatically. mkdir cannot create these entries by name. Creation of a directory requires write permission in the parent directory. The owner ID and group ID of the new directories are set to the process's real user ID and group ID, respectively. The mkd...
mkf2c is used to generate assembly-language routines to provide greater flexibility when calling a C function from a FORTRAN routine. Mkf2c accepts as input a set of C functions, and produces an assemblylanguage interface routine in the output file. If the input and output files are not specified, mkf2c reads from stdin and writes to stdout. The input may be a copy of the actual C file being interfaced, perhaps filtered by the program extcentry(1). The output of mkf2c is an assembly-language (.s...
mkfifo creates the FIFO special files named by its argument list. The arguments are taken sequentially, in the order specified; and each FIFO special file is either created completely or, in the case of an error or signal, not created at all. For each path argument, the mkfifo command behaves as if the function mkfifo [see mkfifo(2)] was called with the argument path set to path and the mode set to the bitwise inclusive OR o...
mkfile creates one or more files. The file is padded with zeroes by default. The default size is in bytes, but it can be flagged as kilobytes, blocks, megabytes, or gigabytes with the k, b, m, or g suffixes, respectively.
For each directory argument, mkfontdir reads all of the font files in the directory searching for properties named "FONT", or (failing that) the name of the file stripped of its suffix. These are converted to lower case and used as font names, and, along with the name of the font file, are written out to the file "fonts.dir" in the directory. The X server and font server use "fonts.dir" to find font files. The kinds of font files read by mkfontdir depend on configuration parameters, but ty...
mkfp is a formatting/partitioning utility that can be used to create DOS and HFS file systems on devices such as floppy, floptical, SuperDisk (LS-120), SyQuest, Jaz, Zip and hard drives. It also works on PC Cards. mkfp is capable of creating single DOS partitions on floppies and floptical disks as well as multiple DOS partitions on other forms of media. On the other hand, mkfp can only create single HFS partitions spanning entire disks. mkfp can NOT be used to manipulate existing partitions on d...
mkfs constructs a filesystem by writing on the special file given as one of the command line arguments. The filesystem constructed is either an EFS filesystem or an XFS filesystem depending on the arguments given. mkfs constructs EFS filesystems by executing mkfs_efs(1M); XFS filesystems are constructed by executing mkfs_xfs(1M). The filesystem type chosen can be forced with the -t option (also spelled -F). If one of those options is not given, mkfs determines which filesystem type to construct ...
mkfsXfs is a wrapper around mkfs_xfs that facilitates granting access to it as a privileged command. It makes an xfs filesystem on the given device. The details of the other parameters are the same as for mkfs_xfs.
mkfs_efs constructs a filesystem by writing on the special file using the values found in the remaining arguments of the command line. Normally mkfs_efs prints the parameters of the filesystem to be constructed; the -q flag suppresses this. If the -i flag is given, mkfs_efs asks for confirmation after displaying the parameters of the filesystem to be constructed. In it's simplest (and most commonly used form), the size of the filesystem is determined from the disk driver. As an example, to make...
mkfs_xfs constructs an XFS filesystem by writing on a special file using the values found in the arguments of the command line. It is invoked automatically by mkfs(1M) when mkfs is given the -t xfs option, options that are specific to XFS, or no options that are specific to EFS. In its simplest (and most commonly used form), the size of the filesystem is determined from the disk driver. As an example, to make a filesystem on partition 7 (all of the useable portion of an option drive, normally) o...
The mkmsgs utility is used to create a file of text strings that can be accessed using the text retrieval tools [see gettxt(1), srchtxt(1), exstr(1), and gettxt(3C)]. It will take as input a file of text strings for a particular geographic locale [see setlocale(3C)] and create a file of text strings in a format that can be retrieved by both gettxt(1) and ge...
mknetpr provides access on a local machine to a printer that is connected to a networked remote machine. mknetpr can be run either interactively or in batch mode. mknetpr will run interactively if any or all of its command line arguments have not been specified. If run interactively mknetpr will first query the user and display: Spool files: 1. To another SGI workstation? 2. A printer connected to a non-SGI workstation that supports the BSD printing protocols (files will be converted to PostScri...
mknod makes a directory entry and corresponding inode for a special file or named pipe. The first argument is the name of the entry to create. In the first form of the command, the second argument is b if the special file describes a block device (disks, tape) or c if it is a character device (for example, a tty line). The last two arguments are numbers specifying the major device number and the minor device number (for example, the unit, drive, or line number). They may be either decimal or oct...
mkpart is the partition administration tool for the Origin 3000 series of servers. It provides the System Administrator with capabilities to list current partitions, re-configure the system into multiple partitions, and to re-initialize, or unpartition, the system. You must have superuser privilege to use this command. If the system is configured as CAP_NO_SUPERUSER, you must have effective capabilities of CAP_SHUTDOWN, CAP_DEVICE_MGT and CAP_SYSINFO_MGT. All the affected partitions have to be r...
mkserialpr installs a printer with a serial interface for use with the System V printer spooling system. mkserialpr is an interactive installation program that will display available options and prompt for the relevant installation parameters. You must be root to execute mkserialpr. The program first asks for the name you wish to give the printer. This name must be no more than fourteen characters. See lpadmin(1M) for more information on naming printers. After entering a name for the printer, th...
Mkstr is used to create files of error messages. Its use can make programs with large numbers of error diagnostics much smaller, and reduce system overhead in running the program as the error messages do not have to be constantly swapped in and out. Mkstr will process each of the specified files, placing a massaged version of the input file in a file whose name consists of the specified prefix and the original name. To process the error messages in the source to the message file mkstr keys on th...
The ml command provides a means of loading and unloading dynamic kernel modules. The first argument to ml specifies its action from one of the following: list, load, unload, register, unregister. With no options, ml acts as if it were invoked as ml list -b. The ld, unld, reg, and unreg options are available only to the superuser. If successful, the ml command executes silently, unless the -v option is specified. ml list provides a list of modules that are currently known by the kernel. The follo...
mmail2nsmail copies files and directories from a specified folder directory ($HOME/Mail unless the user changes this when prompted) to $HOME/nsmail, where Netscape Messenger expects folders to reside when using Movemail. mmail2nsmail does not alter or delete any files in the original folder directory. If the folder already exists in $HOME/nsmail, the folder will not be copied over and a message will be displayed. Files in detach.dir and index.dir directories will not be copied over. If there are...
mmscd is a daemon run by /etc/rc2.d/S33sn0start. It handles all necessary communications with an Origin2000 system's Multi-Module System Controller (MMSC). An MMSC is usually connected to systems composed of more than one module (one or more racks). The MMSC controls power sequencing and fan speed, monitors system sensors, and drives the LCD front panel. mmscd works with the MMSC to run the CPU activity meter on the front panel, perform controlled normal or emergency system shutdowns, and handl...
This command mounts the /proc filesystem. /proc is the new name for the /debug filesystem. See proc(4) for a detailed description of the /proc filesystem. This filesystem is mounted at system boot time by the brc(1M) startup script. /proc should never be unmounted. The system automatically unmounts the /proc filesystem during a reboot(1M).
This is the standard interpreter for executing Tcl Motif programs. Specialised versions of this may be built, or it can have Tcl extensions added to it. The moat interpreter is an extension to the Tcl interpreter tclsh. If it is run with no file argument it reads commands from standard input. If it is run with a file argument (which is a file name not beginning with a `-' sign) it reads and executes commands from that file. The options are the standard Xt options, which typically consist of an ...
This command is used by the Printer Manager and other utilities (mkcentpr(1m), mknetpr(1m), mkserialpr(1M)) to build a list of supported printers. When modelinfo is first run it creates the file /var/spool/lp/modelinfo.dat which contains the modelinfo output. The contents of this file are also printed to standard out. The directories /var/spool/lp/model and /var/spool/lp/PPD_model are searched to determine supported printers. (/var/spool/lp/PPD_model will only exist if the Impressario PPD driver...
modifyPermissionsAndOwnership modifies the permissions and/or ownership of files and directories using chown(1) and chmod(1). The modifyPermissionsAndOwnership command requires at least one set of modifications and one set of files. These sets must be non-empty. Each pair of modifications and the files they should be applied to should be separated by commas. The modifications can be specified as follows (at least one is required): -u Specifies the changes to make to the user permission...
Modify an existing user account and do associated handling of user files if needed. The modifyUserAccount command has the following required parameter: -l login-name The login name of the user account to modify The modifyUserAccount command has the following optional parameters: -P Indicates that the account password is to be replaced with a new password. The command will prompt the user for the new password. This option may not be used in conjunction with -N or with -R. -N Indicates that the ac...
modinfofltr is used to parse the data found in the file /var/spool/lp/modelinfo.dat. (See the modelinfo(1m) man page for information about the modelinfo.dat file.) modinfofltr reads input from standard in and writes to standard out. modinfofltr is used by various script files to present a menu of printer choices for the user to select....
monpanel provides a graphical interface to control the backlight level of the Presenter display, to switch the display between high and low color resolution, to turn on the Presenter display when the display was not connected at boot time, and to restart the Presenter display when the display has been disconnected.
The montbl command takes as input a specification file, infile, that describes the formatting conventions for monetary quantities for a specific locale. -o outfile Write the output on outfile; otherwise, write the output on a file named LC_MONETARY. The output of montbl is suitable for use by the localeconv function [see localeconv(3C)]. Before outfile can be used b...
more is a filter that displays the contents of a file on the terminal, one screenful at a time. After each screenful more prints a prompt and pauses awaiting user commands. The prompt usually contains the name of the file and an indication (percentage) of the current location within the file. more scrolls up to display one more line in response to a RETURN character; it displays another screenful in response to a SPACE character. Other commands are listed belo...
mount attaches a named filesystem fsname to the filesystem hierarchy at the pathname location dir. The directory dir must already exist. It becomes the name of the newly mounted root. The contents of dir are hidden until the filesystem is unmounted. If fsname is of the form host:path, the filesystem type is assumed to be nfs. umount unmounts a currently mounted filesystem, which can be specified either as a mounted-on directory or a filesystem. mount and umount maintain a table of mounted filesy...
This command mounts all filesystems listed in /etc/fstab. It can be executed only by the superuser. Before each filesystem is mounted, it is checked using fsstat(1M) to see if it appears mountable. If the filesystem does not appear mountable, it is checked, using fsck(1M), before the mount is attempted.
mountd is an rpc(4) server that answers rpc filesystem mount/umount requests. One such sender of the requests is autofs. mountd reads the file /etc/xtab (described in exportfs(1M)) to determine which filesystems are available to which machines and users. It also provides information as to which clients have filesystems mounted. This information is stored in the servers /etc/rmtab file and can be accessed using the showmount(1M) command. The mountd daemon is normally invoked by inetd(1M)....
The mount_kfs program is an AppleShare mounter. It lets the user mount volumes from AppleShare servers on UNIX file systems. Mounted file systems "look" like K-AShare volumes; i.e., data forks appear as normal UNIX files, resource forks appear in a special resource directory (.HSResource), Macintosh desktop info (file type, creator, comments etc.) is stored in a desktop database (.HSancillary), and Macintosh ASCII characters in file names are mapped to hexadecimal equivalents. In general, user...
mouse allows the user to modify mouse acceleration, mapping (left- or right-handed), and click speed (delay between clicks in a double-click). The user can launch this panel from the toolchest (Desktop > Customize > Mouse) or at a Unix shell command line. Like most other customization panels, the mouse panel has the ``runonce'' feature, meaning only one instance of the application will run at one time. Attempting to launch the application a second time will have the effect of deiconifying the ...
mediaplayer, also known as movieplayer for backwards compatibility, is a player application for SGI, QuickTime, AVI and MPEG-1 movie files, as well as Audio files supported by the SGI audiofile library (eg, AIFF, AIFC, WAVE, MPEG1-audio, Sun .snd/Next .au, etc.). mediaplayer can be used as a stand-alone application with a graphic user interface for interactive control of the playback. It can also be used as a command line utility for launching playback from within other applications, such as IRI...
mpadmin provides control/information of processor status. Exactly one argument is accepted by mpadmin at each invocation. The following arguments are accepted: -n Report which processors are physically configured. The numbers of the physically configured processors are written to the standard output, one processor number per line. Processors are numbered beginning from 0. -u[processor] When no processor is specified, the numbers of the processors that are available to schedule unrestricted proce...
Mpc is a source-to-source C translator that transforms code containing parallel directives, inserted by pca(1) or by hand, into parallel C code containing calls to the C multiprocessing library. For further information on the types of directives that mpc implements, refer to the IRIS Power C User's Guide. Mpc is normally invoked as an option to cc(1), although it can be run separately. When mpc is used as part of a cc compilation, the mpc options must be passed via the -W (specifically, -WM) me...
Mrouted is an implementation of the Distance-Vector Multicast Routing Protocol (DVMRP), an earlier version of which is specified in RFC-1075. It maintains topological knowledge via a distance-vector routing protocol (like RIP, described in RFC-1058), upon which it implements a multicast datagram forwarding algorithm called Reverse Path Multicasting. Mrouted forwards a multicast datagram along a shortest (reverse) path tree rooted at the subnet on which the datagram originates. The multicast deli...
mt is used to give commands to the magnetic tape drives. By default, mt performs the requested operation using /dev/nrtape. Normally the operations are performed once. Some operations may be performed multiple times by specifying count . For all others, count is ignored. count is parsed with the strtol(3) library routine, which means that values with leading 0's are taken as octal, those with leading 0x or 0x are taken to be hex, and other's are taken to be decimal. To use an alternate device,...
Assessing problems in the distribution of IP multicast traffic can be difficult. mtrace utilizes a tracing feature implemented in multicast routers (mrouted version 3.3 and later) that is accessed via an extension to the IGMP protocol. A trace query is passed hop-by-hop along the reverse path from the receiver to the source, collecting hop addresses, packet counts, and routing error conditions along the path, and then the response is returned to the requestor. The only required parameter is the ...
Mtrconfig is used to configure the Madge token ring specific parameters in each token ring interface. General network parameters, such as network address, are configured through ifconfig (1). Mtrconfig is invoked at boot time from /etc/init.d/network to start the token ring interface when it detects the existence of a Madge token ring PCI device. The default values defined in /var/sysgen/mtune/if_mtr are used for all the interfaces in the system. These values can be modified in /var/sysgen/stune...
multgrps creates a new shell process which is simultaneously a member of all groups to which the invoking user belongs. Every user belongs to a default group specified in /etc/passwd. Any additional group memberships are listed in the file /etc/group. Traditional System V allows processes to be in only one group at any given time; that group may be changed via the newgrp(1) command. A process has group access privileges only to the files whose group ID matches the process's current value. BSD a...
multi switches the system to multiuser mode if it was in singleuser mode or causes it to reread its /etc/inittab file and turn the appropriate gettys on and off. multi is a shell script that invokes /etc/telinit.
mvdir moves directories within a filesystem. dirname must be a directory. If name does not exist, it is created as a directory. If name does exist, dirname is created as name/dirname. dirname and name can not be on the same path; that is, one can not be subordinate to the other. For example: mvdir x/y x/z is legal, but mvdir x/y x/y/z is not....
The mwm window manager provides functions that facilitate control (by the user and the programmer) of elements of window state such as placement, size, icon/normal display, and input-focus ownership. The stand-alone window manager is not an integral part of CDE and does not support communication with other components in the CDE environment, such as the Style Manager and the Session Manager. Options -display display This option specifies the display to use; see X(1). -xrm resourcestring This opti...
The myzone command uses the AppleTalk Zone Information Protocol to look up the host's AppleTalk zone on the network by sending a Zone Inquiry to the nbpd(1m) daemon. The program then prints the reported zone. If the zone is reported as "*" it indicates that the nbpd(1m) daemon is malfunctioning. The zone returned is the default local zone which was specified as an argument to nbpd(1m) when it was started. Services that are not given a specific zone will be located in this zone....
named is the Internet domain name server. It replaces the original host table lookup of information in the network hosts file /etc/hosts. (See RFC1034 for more information on the Internet name-domain system.) named-xfer is invoked by named to transfer zone data from primary servers. named is started at system initialization if the configuration flag named is set on with chkconfig(1M). Without any arguments, named reads the default boot file /etc/named.boot, read any initial data and listen for q...
The nbpd daemon is a host daemon which manages AppleTalk Name Binding Protocol (NBP) requests and AppleTalk Zone Information Protocol (ZIP) requests. It listens on the well-known Names Information Socket for NBP lookup requests and on the ZIP socket for ZIP requests. The daemon maintains a table of named services registered by host processes and reports these services when requested by remote users. The nbpd daemon creates two files upon its invocation: /usr/adm/appletalk/names_table, the regist...
Nbpremove uses the AppleTalk Name Binding Protocol (NBP) to remove entity names that are registered with the local nbpd(1m). It is usually used to remove the name of a service that has exited irregularly (i.e., core dump). If the removal is successful, the pid of the process that registered the name is printed. If the -Z zone option is given, the removal will be for the specified AppleTalk zone; otherwise, the lookup will be in the local zone....
NCC (which is synonymous with CC -32) compiles C++ with a integrated compiler frontend (i.e. not a translator to C), using a conventional (cfront-compatible) code generation style. DCC, which refers to the old SGI Delta/C++ compiler, no longer compiles C++ source files using Delta/C++ style code generation, but rather, is also synonomous with CC -32) for compatibility. Both NCC and DCC produce only 32-bit executables. For more information, refer to the CC(1) man pages. Page 1 Release 6.4...
ncheck with no arguments generates a pathname and i-number list of all files on a set of default filesystems (see /etc/fstab). Names of directory files are followed by /.. The options are as follows: -i limits the report to only those files whose i-numbers follow. -a allows printing of the names . and .., which are ordinarily suppressed. -s limits the report to special files and files with setuserid mode. This option may be used to detect violations of security policy. filesystem must be specifi...
The Networked Dual-head Software Daemon, ndsd, enables a machine with ndsd software, the "slave" machine, to accept keyboard and mouse input from another machine on the network (the "master" machine). Conversely, a "master" machine with ndsd software can also be used to control applications on a remote "slave" machine. Various configuration options can be specified by command line options or in the ndsd configuration file /usr/nds/dh_config. Commands in the configuration file will overri...
Managers display information about your system and provide access to interactive guides (also called tasks) that let you administer your system. The Network Interface Manager displays a list of network interfaces, that are currently installed on your system. It also allows you to get the interface status, and configure an interface using the Set Up and Start Networking guide. In the Manager window, you can open a guide by choosing its name from the Task menu or by clicking its button at the bott...
netprint sends a print request to a printer on another host. netprint is used in the lp model file /var/spool/lp/model/netface to submit lp print jobs to remote printers.
When started, netscape will automatically load either the URL(s) specified on the command line, or the "home page" specified in the user preferences if no URL is given on the command line. On line help describing the configuration and use of netscape can be accessed by selecting Help Contents from the Help menu on the right hand side of the netscape menu bar....
Netsnoop captures packets which match an optional filter from a network interface or saved tracefile. If filter is omitted and no -e option is given, it captures packets promiscuously. For each packet, netsnoop prints decoded frames of protocol data on standard output. It stores captured packets in a buffer before decoding them; the default buffer size is one. After decoding buffered packets, netsnoop resumes capturing. Only the superuser can run netsnoop on a local network interface. Users acce...
The netstat command symbolically displays the contents of various network-related data structures. There are a number of output formats, depending on the options for the information presented. The first form of the command displays a list of active sockets for each protocol. The second form presents the contents of one of the other network data structures according to the option selected. Using the third form, with an interval specified, netstat will continuously display the information regardin...
The nettest and nettestd commands invoke client and server programs that are used for timing data throughput of various methods of interprocess communication. For TCP and OSI connections, the nettest program establishes a connection with the nettestd program, and then it does count writes of size bytes, followed by count reads of size bytes. For UDP, the nettest program performs only writes; reads are not performed. The nettestd program, if used with UDP connections, reads the data packets and p...
The network shell script is called during system startup from /etc/rc2 to initialize the standard and optional network devices and daemons. The script is called during system shutdown from /etc/rc0 to gracefully kill the daemons and inactivate the devices. When called with the start argument, the network script does the following, using the various configuration flags described below: o Defines the hostname and hostid based on the name in /etc/sys_id and its corresponding Internet address in /et...
Newaliases rebuilds the random access data base for the mail aliases file /etc/aliases. It must be run each time this file is changed in order for the change to take effect. Newaliases is identical to ``sendmail -bi''. The newaliases utility exits 0 on success, and >0 if an error occurs.
The newer command compares the modification times (in seconds since 00:00:00 UTC, Jan. 1, 1970) of the two files given as arguments. If file1 was modified more recently than file2, or if either file does not exist, then the newer command returns a status of 0. Otherwise it returns a status of 1. The /var/X11/xdm/Xsession.dt script uses the newer command. The newer command is not intended to be run directly by the end user, unless the user is writing shell scripts. For more information about the ...
The newfile program creates a new file with the prefix name (default: out) in the directory dir, but waits until there is enough available free disk space in the directory. The actual file created will have the pathname dir/name###sfx, where ### is an optional unique three-digit HEX number; i.e. newfile will not overwrite an existing file. There is no default sfx. The final complete pathname will be written on standard output. If the -d argument is given, newfile restricts the last component of ...
newform reads lines from the named files, or the standard input if no input file is named, and reproduces the lines on the standard output. Lines are reformatted in accordance with command line options in effect. Except for -s, command line options may appear in any order, may be repeated, and may be intermingled with the optional files. Command line options are processed in the order specified. This means that option sequences like ``-e15 -l60'' will yield results different from ``-l60 -e15'...
newgrp changes a user's group identification. The user remains logged in and the current directory is unchanged, but calculations of access permissions to files are performed with respect to the new real and effective group IDs. The user is always given a new shell, replacing the current shell, by newgrp, regardless of whether it terminated successfully or due to an error condition (i.e., unknown group). Exported variables retain their values after invoking newgrp; however, all unexported varia...
newlabel allows the user to run a process at another label without logging off. To prevent inappropriate transfers of information, all open file descriptors are closed before the new process is invoked. Unless the invoked by the Superuser with one or more of the -E, -F, -I, or -O options, the stdin, stdout, and stderr are closed and reopened after the label is changed. The default path used is /dev/tty, but may be changed with the -e, -f, -i, and -o options. If the path cannot be opened /dev/nul...
newproj changes the user's project identification to project. The user remains logged in and the current directory is unchanged, but all process and array session resource accounting will be performed with respect to the new project. If the change is successful, the user will be given a new shell. The original shell, and any processes it may have had running, will remain alive and associated with the original project. Thus, exiting the new shell will return the user to the original shell and or...
news is used to keep the user informed of current events. By convention, these events are described by files in the directory /var/news. When invoked without arguments, news prints the contents of all current files in /var/news, most recent first, with each preceded by an appropriate header. news stores the ``currency'' time as the modification date of a file named .news_time in...
The newsess command starts a new array session. The user remains logged in and the current directory is unchanged. If the change is successful, the user will be given a new shell. The original shell, and any processes it may have had running, will remain alive and associated with the original array session. Thus, exiting the new shell will return the user to the original shell and original array session. By default, the new array session will be a global array session (see array_sessions(5) for ...
nfsd starts the nfs(4) server daemons that handle client NFS requests. biod starts asynchronous block I/O daemons. This command is used on a NFS client to perform buffer cache read-ahead and write-behind. bio3d processes are the asynchronous kernel processes for NFS version 3. No daemon is necessary to start bio3ds. There is one bio3d associated with each mounted filesystem at mount time. If the NFS traffic to a filesystem increases, up to three more bio3d processes are spawned for that filesyst...
nfsSetup configures the NFS state ( chkconfig nfs on|off ), and turns on automount, autofs or none. This command is used by Set Up and Start NFS, and Turn Off NFS tasks.
nfsstat displays statistical information about the Network File System (NFS) and Remote Procedure Call (RPC) interfaces to the kernel. It can also be used to reinitialize this information. If no options are given, the default is nfsstat -csnr That is, print everything and reinitialize nothing. The optional arguments unix and core can be used to indicate another system namelist and kernel memory image, respectively....
nice executes command with a lower CPU scheduling priority. If the increment argument (in the range 1-20) is given, it is used; if not, an increment of 10 is assumed. The invoking process (generally the user's shell) must be in the timesharing scheduling class. The super-user may run commands with priority higher than normal by using a negative increment, e.g., --10.
nisSetup configures the NIS domain name, and turns on/off the NIS state ( chkconfig yp on/off ). This command is used by Set Up and Start NIS and Turn Off NIS tasks.
nl reads lines from the named file, or the standard input if no file is named, and reproduces the lines on the standard output. Lines are numbered on the left in accordance with the command options in effect. nl processes supplementary code set characters according to the locale specified in the LC_CTYPE environment variable [see LANG on environ(5)], except as noted below. In regular expressions, pattern searches are performed on ...
The nm command prints formatted listings of the symbol tables for each ELF file specified. A file can be a relocatable or absolute ELF object file, or it can be an archive. nm produces different output formats depending on options and the binary ABI. The differences are an attempt to preserve the operation of scripts that depend on nm. Anyone desiring consistent operation across different ABIs should use XPG4 format or Berkeley format. For old 32-bit-ABI objects the output format by default is t...
This tool is part of the Samba suite. nmblookup is used to query NetBIOS names and map them to IP addresses in a network using NetBIOS over TCP/IP queries. The options allow the name queries to be directed at a particular IP broadcast area or to a particular machine. All queries are done over UDP.
nohup executes command with hangups and quits ignored. If output is not re-directed by the user, both standard output and standard error are sent to nohup.out. If nohup.out is not writable in the current directory, output is redirected to $HOME/nohup.out. If standard output is redirected by the user, then nohup will redirect standard error to the same destination as standard output.
noodle is an interactive program for creating a variety of 3d objects. The concept is very similar to a pasta maker in which one chooses a noodle cross-section and pushes the dough through, (hence the name). noodle was written using the Inventor 3d Toolkit. It outputs Inventor files. The noodle program has 5 main windows and a control panel. The five windows are: Each window can be used to view or edit the object (with the exception of the top right window which only allows viewing). Use the rig...
This command allows the super-user to modify certain scheduling parameters of a process or to create a new process with specific scheduling parameters. For a detailed description of how the parameters affect the scheduling of a process, please see the sched_setscheduler(2) manual page. If npri is invoked without reference to a specific process or command to execute, it simply invokes a copy of the user's shell, as specified by the SHELL environment variable, with the scheduling characteristics ...
The config-directory argument tells the server the location of the server configuration files. The ns-admin command should never be invoked from the shell. During configuration of a Netscape server, you must specify a specific port number where your Netscape Administration server is to listen for admin requests. A single Netscape administration server can manage all Netscape servers on a host. The default port number is port 81. Assuming you have not relocated the server root for your administra...
The config-directory argument tells the server the location of the server configuration files. The ns-httpd command should never be invoked from the shell. Once the servers have been installed they will attempt to autoconfigure themselves upon startup. The installation process pre-configures the server on your system with the user "admin" as the administration user and "admin" as the administration password. The administration port is port 8182. To administer the Netscape FastTrack Server 3....
The nsadmin utility is used for administration of the Unified Name Service interface (see nsd(1m)). The nsd daemon maintains a filesystem typically mounted on /ns using various directory service protocols to provide information. It also maintains local cache files for each lookup. The nsadmin command allows manipulation of the name space and cache files maintained by the nsd daemon. Run with no arguments it acts as a command line interpreter and can be given multiple commands. Each command is fo...
The Unified Name Service (UNS) provides a generic interface to network lookup services. The daemon provides a filesystem front end to the name service namespace, and maintains local cache files. The services that the nsd daemon supports are NIS and NIS+ - the Network Information Service, DNS - the Domain Name Service, local configuration files, MDBM, NDBM, and DB - local hash files, LDAP - Lightweight Directory Access Protocol. By default the nsd daemon is activated at system startup time from t...
Nslookup is a program to query Internet domain name servers. Nslookup has two modes: interactive and non-interactive. Interactive mode allows the user to query name servers for information about various hosts and domains or to print a list of hosts in a domain. Non-interactive mode is used to print just the name and requested information for a host or domain.
nsmount attaches the filesystem provided by the nsd(1M) daemon. Nsd satisfies the requests using directory service protocols and caches them in memory then provides the data as a filesystem using the nfs(4) protocol. There may be no actual remote filesystem containing the data. This command is executed directly by the nsd daemon so there is rarely any need for it to be run separately.
This command retrieves the current NUMA placement strategies for the process specified by pid. Information displayed includes current placement policies, MLDSETs and MLDs.
nvram can be used to set or print the values of non-volatile RAM variables. When invoked with no arguments, nvram displays all known variables in the name=value form. The nvram arguments are: name Print the value of name. value If name is defined in non-volatile RAM, replace name's definition string with value. -v Print a line of the form name=value after getting or setting the named variable. If invoked as sgikopt, more than one name can be given. names that do not match known variables are ig...
nwfsdebug is used to enable or disable diagnostic output from the NetWare file system. It is intended for use by Silicon Graphics developers and field personnel.
nwlogin is used to remotely login a NetWare user to a NetWare server. If successful, the NetWare server is mounted as a filesystem under the /netware directory. Three values are needed by nwlogin : a server name, a user name, and the user's password. None of these are case-sensitive. Any information not provided on the command line will be prompted for interactively. Access rights to the files on the remote server are controlled by NetWare, according to the access rights of the NetWare username...
nwmount is used to establish a mount point (root directory) where all NetWare servers on the network will be visible. If a directory is specified on the command line, that directory will be used as the mount point. If one is not specified, then the default directory /netware will be used. -r Mounts the NetWare filesystem as read-only.
oawk scans each input file for lines that match any of a set of patterns specified in prog. With each pattern in prog there can be an associated action that will be performed when a line of a file matches the pattern. The set of patterns may appear literally as prog, or in a file specified as -f file. The prog string should be enclosed in single quotes (') to protect it from the shell. Parameters, in the form x=... y=... etc., may be passed to oawk. Files are read in order; if there are no file...
ObjToIv converts 3D model files in Wavefront .obj format (versions 3.0 and 4.0) into Open Inventor 2.0 files. The program converts ASCII files in .obj format, .pv files are not handled. NURB and cardinal surface, polygons, groups, textures are converted into equivalent Open Inventor objects. For textures, convert the bitmap texture image to an SGI .rgb file. Place it in the same directory as the .obj file. Use the function fromrla to convert .rla files into .rgb files. For materials, either the ...
OCC (capital OCC) invokes the cfront translator to translate C++ source code to C source code. Its normal operation is then to invoke the C compiler cc(1) to generate an object file. CC will invoke OCC if given the -use_cfront option. In the subsequent discussion below, CC refers to OCC. CC takes arguments ending in .C, .c, .c++, .cc, or .cxx to be C++ source programs. Files with the suffixes .a , .o, and .s, are also accepted by the CC command and passed to cc(1). CC defines the same symbols fo...
od displays a list of files in one or more formats, as selected by user supplied arguments. If no such argument is given, -t o2 (or -o) is default. If no file is specified, the standard input is used. For the purposes of this description, ``word'' refers to a 16-bit unit, independent of the word size of the machine; ``long word'' refers to a 32-bit unit, and ``double long word'' refers to a 64-bit unit. od processes supplementary code set characters according to the...
This used to be the diff command. The current diff command is a port of GNU diff, and is upward compatible with this odiff. If both arguments are directories, odiff sorts the contents of the directories by name, and then runs the regular file odiff algorithm (described below) on text files which are different. Binary files which differ, common subdirectories, and files which appear in only one directory are listed. Options when comparing directories are: -l long output format; each text file odi...
The odump command dumps selected parts of each object file. It works on object files in either COFF or Elf formats. But users are recommended to use elfdump(1) for Elf objects because it is better supported. This command works for object files and archives of object files. It accepts one or more of these options: -a Dumps the archive header for each member of the specified archive file. -c Dumps the string table. -f Dumps each file header. -g Dumps the global symbols from the symbol table of a M...
oglsnoop is a program for viewing the color, depth and stencil values of windows on the desktop. It displays these values graphically as well as numerically in its window. oglsnoop can be used to determine the Visual and Colormap that a given window is using. It can view both the Front and Back buffers of Double Buffered windows and allows you to visualize the Depth and Stencil Buffers using a grey scale display. oglsnoop has an Information dialog to view information about the window currently b...
The on program is used to execute commands on another system, in an environment similar to that invoking the program. All environment variables are passed, and the current working directory is preserved. To preserve the working directory, the working file system must be either already mounted on the host or be exported to it. Relative path names will only work if they are within the current file system; absolute path names may cause problems. Standard input is connected to standard input of the ...
onlinediag runs diagnostic tests on cpus to test floating point units. It reads the full path names of binaries out of a config file (default of /etc/config/onlinediag.config) and reports failures of these tests in the /var/adm/SYSLOG. The output of the test binaries are saved in the log file (default of /var/adm/onlinediag.logfile) if there are any failures or the tests fail to run for some reason. The -p procnum parameter indicates what processor the test will run on. If no value is specified,...
The openHintsShortcuts script loads the IRIX Interactive Desktop Hints & Shortcuts documentation into the user's favorite Web browser as chosen on the dtUtilities(1) panel. If the user has not chosen a favorite browser, it uses Netscape. If the Hints & Shortcuts documentation is not installed on the local host, then openHintsShortcuts uses InfoSearch and tries to load the page from the InfoSearch documentation server last accessed. The openHintsShortcuts script can be accessed from the toolches...
The openhomepg script loads the user's OutBox page into the user's favorite Web browser. If the user has not yet chosen a favorite browser on the dtUtilities(1) panel, then it will use Netscape. If the OutBox product is not installed, then it will post a dialog telling the user how to install it. The openhomepg script is launched from the toolchest (Internet > Browse OutBox Page). Users can also launch it from a Unix shell command line, though that is not its intended use. For more information...
The optionalsym command both reports on and sets the st_other field in an ELF symbol table. It was written to manipulate the STO_OPTIONAL value in the st_other field of the ELF symbol table. Thus the name optionalsym. The optionalsym command accepts one or more of the following options: -p prints information on selected symbols. If -u is also supplied, the symbol is printed before updating. -v selectname selects symbols with st_other having that value. For example, optionalsymbol -v STO_OPTIONAL...
Ordist is a program to maintain identical copies of files over multiple hosts. It preserves the owner, group, mode, and mtime of files if possible and can update programs that are executing. Ordist reads commands from distfile to direct the updating of files and/or directories. If distfile is `-', the standard input is used. If no -f option is present, the program looks first for `distfile', then `Distfile' to use as the input. If no names are specified on the command line, ordist will update...
osview monitors various portions of the activity of the operating system and displays them using the full screen capabilities of the current terminal. A large number of activity counters are monitored, and the display may be dynamically altered to hide or show only those counters in which the user is interested. The default is no longer to display all the statistics initially, instead there is a selection menu at the bottom of the display; enter the number of the selection to switch displays. Se...
outbox is a simple tool to Publish files automatically to the user's Out Box page. These files can then be viewed or downloaded by people viewing the user's Out Box page using Mosaic, Netscape or another Web Browser. The URL for the user's Out Box Page is http:///~
outputd captures output from applications launched from the desktop (the file manager, toolchest, session management), and displays them in popup windows, one per application. If outputd is not running, all output goes to the system console. By default, outputd is not launched. It can be launched via the Desktop customization panel (desktop). This panel can be opened from the Desktop toolchest by selecting Customize and then Desktop; on the panel, check the Display Application Errors toggle. Sub...
With the desks overview, ov, users can create, change, copy, rename and delete desks. Users can also drag windows from one desk to another or place windows on the global desk. Desks are available only when running a version of 4Dwm that includes support for desks. Users can launch the program from the toolchest (Desktop > Extra Desks) or from a Unix shell command line. ov has the ``runonce'' feature, meaning only one instance of the application will run at one time. Attempting to launch the ap...
pack attempts to store the specified files in a compressed form. Wherever possible (and useful), each input file name is replaced by a packed file name.z with the same access modes, access and modified dates, and owner as those of name. The -f option will force packing of name. This is useful for causing an entire directory to be packed even if some of the files will not benefit. If pack is successful, name will be removed. Packed files can be restored to their original form using unpack or pcat...
padc traces the activity of a process or group of processes and writes the raw event data to the standard output. System calls, scheduling actions, and disk i/o operations are activities that padc can trace. In addition to kernel-generated events, padc collects any events created by processes through the rtmon_log_user_tstamp(3) library routine. padc is normally invoked by the par(1) pr...
The papserver is a server which emulates a LaserWriter. It registers itself on the network as a Laserwriter, accepts print requests from Macintoshes and other machines, and spools them for printing. The papserver is an implementation of the server side of the AppleTalk Printer Access Protocol (PAP). It communicates with the LaserWriter driver on the Macintosh, and answers printer queries. It will collect and cache dictionaries, so they do not have to be retransmitted. The papserver will also par...
The papstatus program checks the status of AppleTalk printers. The flags are defined as follows: -a look in all zones (default is the local zone) -p read the printer, type and zone parameters out of the /etc/printcap entry for name printer. -P look for printer with the name printer (default is LaserWriter) -T look as if it is the type of printer (default is LaserWriter) -Z tells papstatus to look in the zone zone (default is local zone) number specifies the maximum number of printers to check (d...
par is a system utility program that reports on system call and scheduling activity for one or more processes. par can be used to trace the activity of a single process, a related group of processes, or the system as a whole. See the EXAMPLES section near the end for some examples on how par is commonly used. When tracing system calls, par(1) prints a report showing all system calls made by the subject processes complete with arguments and retur...
The passmgmt command updates information in the password files. This command works with both /etc/passwd and /etc/shadow. If there is no /etc/shadow, any changes made by passmgmt will only go into /etc/passwd. If the shadow file is not present, the -f and -e options have no effect, because the data fields they modify are not present in the base password file. passmgmt -a adds an entry for user name to the password files. passmgmt -a +na...
Passthru opens an audio input port and an output port, and connects them. Command line options allow the user to experiment with the various audio port parameters. -h help: print out a list of command line options and their descriptions -v verbose: output to stdout -n number of channels: 1 = mono, 2 = stereo -s sample format: 8, 16, or 24 bit -r sample rate: 48000, 44100, 32000, etc -b transfer blocksize: specify value in sample FRAMES -q queuesize for each of the two audio ports: specify value ...
The passwd command changes the password or lists password attributes associated with the user's login name. Additionally, super-users may use passwd to install or change passwords and attributes associated with any login name. Passwords for NIS entries that don't override the passwd field with a local value must be changed with yppasswd(1). When used to change a password, passwd prompts ordinary users for their old password, if any. It then prompts for the new password twice. The first time th...
In the first two forms, paste concatenates corresponding lines of the given input files file1, file2, and so on. It treats each file as a column or columns of a table and pastes them together horizontally (parallel merging). If you will, it is the counterpart of cat(1) which concatenates vertically, that is, one file after the other. In the last form above, paste replaces the function of an older command with the same name by combining subsequent lines of t...
Patch will take a patch file containing any of the four forms of difference listing produced by the diff program and apply those differences to an original file, producing a patched version. By default, the patched version is put in place of the original, with the original file backed up to the same name with the extension ".orig" ("~" on systems that do not support long file names), or as specified by the -b, -B (--prefix), or -V (--version-control) options. The extension used for making ba...
pathchk checks that one or more pathnames are valid (that is, they could be used to access or create a file without causing syntax errors) and portable (that is, no filename truncation will result). More extensive portability checks are provided by the -p option. By default, the pathchk utility will check each component of each pathname operand based on the underlying file system. A diagnostic will be written for each pathname operand that: o is longer than PATH_MAX bytes o contains any co...
pathconf provides a shell interface to the pathconf(2) system call for determining the current value of a configurable limit or option (variable) that is associated with a file or directory. The name argument represents the variable to be queried. The list of supported variables can be obtained by invoking pathconf without any arguments. By default, the values pertain to the root file system (``/''), to query the values of a different file or dir...
Pax reads and writes archive files which conform to the Archive/Interchange File Format specified in IEEE Std. 1003.1-1988. Pax can also read, but not write, a number of other file formats in addition to those specified in the Archive/Interchange File Format description. Support for these traditional file formats, such as V7 tar and System V binary cpio format archives, is provided for backward compatibility and to maximize portability. Pax will also support traditional cpio and System V tar int...
pciconfig is used to hot-plug insert a device into a PCI slot, hot-plug remove a device from a PCI slot, and query a slot on a PCI bus controlled by a bridge device. PCI Hot-Plug operations are executed while the system is running. A hot-plug insertion powers-up the PCI slot, determines the type of card installed, and calls the appropriate device driver to initialize the card and its software. Typically, after a successful hot-plug insertion, new device entries will be found in the hardware grap...
peer_encaps is a daemon which provides a way to encapsulate proprietary SNMP agents, and an integrated environment for hosts that also run an off-the-shelf or custom, non-extensible SNMP Agent or proxy. The peer_snmpd(1m) daemon implements the Simple Network Management Protocol (SNMP). Since only a single SNMP Agent can be listening to the standard SNMP port (UDP port 161), this limits a Manager to access only variables associated with one agent. The peer_encaps daemon provides a mechanism to ov...
peer_snmpd is a daemon which implements versions one and two (V1 and V2p) of the Simple Network Management Protocol (SNMP) as specified in Internet RFC series 1441-1452. The daemon, called the SNMP agent, can be configured to run from the network startup script at boot time by the command chkconfig snmpd on or started from the command line. You must be superuser (root) to run peer_snmpd. peer_snmpd listens on a udp(7P) socket for the snmp service for SNMP queries. If no such service can be found...
peoplepages provides phonebook-like database capabilities for InPersonTM and other communication tools. The database is comprised of a number of books. Complete information about people & places you need to contact can be stored in these books. peoplepages displays a list of the available books. You click on the desired book to select it. peoplepages' main window displays a list of entries from the current book. Each entry has a draggable icon which can be dropped on InPerson, MediaMailTM & oth...
The given command is executed; after it is complete, perfex prints the values of various hardware performance counters. The counts returned are aggregated over all processes that are descendants of the target command, as long as their parent process controls the child through wait (see wait(2)). The R10000 event counters are different from R12000 event counters. See the r10k_counters(5) man page for differences. For R10000 CPUs, the integers event0 and event1 index the following table: 0 = Cycle...
perfly is one of the sample programs distributed with the OpenGL Performer high-performance graphics library. perfly is a powerful way to see graphics data: it's very fast, reads many different graphics file formats, and has interesting options for examining geometric data. Take a Test Drive If you are new to OpenGL Performer, the best way to start learning about it is to go for a test drive. The Performer-based sample application perfly is installed in the /usr/sbin directory. To start perfly,...
Perl is a language optimized for scanning arbitrary text files, extracting information from those text files, and printing reports based on that information. It's also a good language for many system management tasks. The language is intended to be practical (easy to use, efficient, complete) rather than beautiful (tiny, elegant, minimal). Perl combines (in the author's opinion, anyway) some of the best features of C, sed, awk, and sh, so people familiar with those languages should have little...
Perl's source code should use the above functions instead of those defined in ANSI C's stdio.h, perlio.h will the #define them to the I/O mechanism selected at Configure time. The functions are modeled on those in stdio.h, but parameter order has been "tidied up a little". PerlIO * This takes the place of FILE *. Unlike FILE * it should be treated as opaque (it is probably safe to assume it is a pointer to something). PerlIO_stdin(), PerlIO_stdout(), PerlIO_stderr() Use these rather than std...
1 Do not attempt to verify the type of $self. That'll break if the class is inherited, when the type of $self is valid but its package isn't what you expect. See rule 5. 2 If an object-oriented (OO) or indirect-object (IO) syntax was used, then the object is probably the correct type and there's no need to become paranoid about it. Perl isn't a paranoid language anyway. If people subvert the OO or IO syntax then they probably know what they're doing and you should let them do it. See rule 1...
A program to help generate bug reports about perl or the modules that come with it, and mail them. If you have found a bug with a non-standard port (one that was not part of the standard distribution), a binary distribution, or a non-standard module (such as Tk, CGI, etc), then please see the documentation that came with that distribution to determine the correct place to report bugs. perlbug is designed to be used interactively. Normally no arguments will be needed. Simply run it, and follow th...
Although this stuff is easier to explain using examples, you first need be aware of a few important definitions. Perl has a number of C functions that allow you to call Perl subroutines. They are I32 perl_call_sv(SV* sv, I32 flags) ; I32 perl_call_pv(char *subname, I32 flags) ; I32 perl_call_method(char *methname, I32 flags) ; I32 perl_call_argv(char *subname, I32 flags, register char **argv) ; The key function is perl_call_sv. All the other functions are fairly simple wrappers which make it eas...
"As soon as we started programming, we found to our surprise that it wasn't as easy to get programs right as we had thought. Debugging had to be discovered. I can remember the exact instant when I realized that a large part of my life from then on was going to be spent in finding mistakes in my own programs." --Maurice Wilkes, 1949 If you invoke Perl with the -d switch, your script runs under the Perl source debugger. This works like an interactive Perl environment, prompting for debugger com...
Perl5.004 builds out of the box on Unix, Plan 9, LynxOS, VMS, OS/2, QNX, AmigaOS, and Windows NT. Perl runs on Windows 95 as well, but it cannot be built there, for lack of a reasonable command interpreter.
perldoc looks up a piece of documentation in .pod format that is embedded in the perl installation tree or in a perl script, and displays it via pod2man | nroff -man | $PAGER. (In addition, if running under HP-UX, col -x will be used.) This is primarily used for the documentation for the perl library modules. Your system may also have man pages installed for those modules, in which case you can probably just use the man(1) command....
The most important thing to understand about all data structures in Perl -- including multidimensional arrays--is that even though they might appear otherwise, Perl @ARRAYs and %HASHes are all internally onedimensional. They can hold only scalar values (meaning a string, number, or a reference). They cannot directly contain other arrays or hashes, but instead contain references to other arrays or hashes. You can't use a reference to a array or hash in quite the same way that you would a real ar...
At the time of this writing, there are two versions of Perl which run under Win32. Interfacing to Activeware's Perl library is quite different from the examples in this documentation, as significant changes were made to the internal Perl API. However, it is possible to embed Activeware's Perl runtime, see the Perl for Win32 FAQ: http://www.perl.com/perl/faq/win32/Perl_for_Win32_FAQ.html With the "official" Perl version 5.004 or higher, all the examples within this documentation will compile ...
When I first began the Perl FAQ in the late 80s, I never realized it would have grown to over a hundred pages, nor that Perl would ever become so popular and widespread. This document could not have been written without the tremendous help provided by Larry Wall and the rest of the Perl Porters.
Copyright (c) 1997 Tom Christiansen and Nathan Torkington. All rights reserved. See the perlfaq manpage for distribution information. Page 5 PERLFAQ1(1) PERLFAQ1(1) PPPPaaaaggggeeee 6666
Copyright (c) 1997 Tom Christiansen and Nathan Torkington. All rights reserved. See the perlfaq manpage for distribution information. Page 9 PERLFAQ2(1) PERLFAQ2(1) PPPPaaaaggggeeee 11110000
Copyright (c) 1997 Tom Christiansen and Nathan Torkington. All rights reserved. See the perlfaq manpage for distribution information. Page 10 PERLFAQ3(1) PERLFAQ3(1) PPPPaaaaggggeeee 11111111
Copyright (c) 1997 Tom Christiansen and Nathan Torkington. All rights reserved. See the perlfaq manpage for distribution information. Page 22 PERLFAQ4(1) PERLFAQ4(1) PPPPaaaaggggeeee 22223333
Copyright (c) 1997 Tom Christiansen and Nathan Torkington. All rights reserved. See the perlfaq manpage for distribution information. Page 17 PERLFAQ5(1) PERLFAQ5(1) PPPPaaaaggggeeee 11118888
Copyright (c) 1997 Tom Christiansen and Nathan Torkington. All rights reserved. See the perlfaq manpage for distribution information. Page 12 PERLFAQ6(1) PERLFAQ6(1) PPPPaaaaggggeeee 11113333
Copyright (c) 1997 Tom Christiansen and Nathan Torkington. All rights reserved. See the perlfaq manpage for distribution information. PPPPaaaaggggeeee 11115555
Copyright (c) 1997 Tom Christiansen and Nathan Torkington. All rights reserved. See the perlfaq manpage for distribution information. Page 7 PERLFAQ9(1) PERLFAQ9(1) PPPPaaaaggggeeee 8888
Because the values line may contain arbitrary expressions (for at fields, not caret fields), you can farm out more sophisticated processing to other functions, like sprintf() or one of your own. For example: format Ident = @<<<<<<<<<<<<<<< &commify($n) . To get a real at or caret into the field, do this: Page 4 PERLFORM(1) PERLFORM(1) format Ident = I have an @ here. "@" . To center a whole line of text, do something like this: format Ident = @||||||||||||||||||||||||||||||||||||||||||||||| "...
Datatypes Perl has three typedefs that handle Perl's three main data types: SV Scalar Value AV Array Value HV Hash Value Each typedef has specific routines that manipulate the various data types. What is an "IV"? Perl uses a special typedef IV which is a simple integer type that is guaranteed to be large enough to hold a pointer (as well as an integer). Perl also uses two special typedefs, I32 and I16, which will always be at least 32-bits and 16-bits long, respectively....
Perl uses a simple signal handling model: the %SIG hash contains names or references of user-installed signal handlers. These handlers will be called with an argument which is the name of the signal that triggered it. A signal may be generated intentionally from a particular keyboard sequence like control-C or control-Z, sent to you from another process, or triggered automatically by the kernel when special events transpire, like a child process exiting, your process running out of stack space, ...
If Perl applications are to be able to understand and present your data correctly according a locale of your choice, all of the following must be true: o Your operating system must support the locale system. If it does, you should find that the setlocale() function is a documented part of its C library. o Definitions for the locales which you use must be installed. You, or your system administrator, must make sure that this is the case. The available locales, the location in which they are kept,...
Now it's time to print your data structure out. How are you going to do that? Well, if you want only one of the elements, it's trivial: print $LoL[0][0]; If you want to print the whole thing, though, you can't say print @LoL; # WRONG because you'll get just references listed, and perl will never automatically dereference things for you. Instead, you have to roll yourself a loop or two. This prints the whole structure, using the shell-style for() construct to loop across the outer set of subs...
See the perlmodlib manpage for general style issues related to building Perl modules and classes as well as descriptions of the standard library and CPAN, the Exporter manpage for how Perl's standard import/export mechanism works, the perltoot manpage for an in-depth tutorial on creating classes, the perlobj manpage for a hard-core reference document on objects, and the perlsub manpage for an explanation of functions and scoping. PPPPaaaaggggeeee 8888...
CPAN stands for the Comprehensive Perl Archive Network. This is a globally replicated collection of all known Perl materials, including hundreds of unbundled modules. Here are the major categories of modules: o Language Extensions and Documentation Tools o Development Support o Operating System Interfaces o Networking, Device Control (modems) and InterProcess Communication o Data Types and Data Type Utilities o Database Interfaces o User Interfaces o Interfaces to / Emulations of Other Programmi...
A kinder, gentler tutorial on object-oriented programming in Perl can be found in the perltoot manpage. You should also check out the perlbot manpage for other object tricks, traps, and tips, as well as the perlmodlib manpage for some style guides on constructing both modules and classes. Page 9 PERLOBJ(1) PERLOBJ(1) PPPPaaaaggggeeee 11110000
Terms and List Operators (Leftward) A TERM has the highest precedence in Perl. They includes variables, quote and quote-like operators, any expression in parentheses, and any function whose arguments are parenthesized. Actually, there aren't really functions in this sense, just list operators and unary operators behaving as functions because you put parentheses around the arguments. These are all documented in the perlfunc manpage. If any list operator (print(), etc.) or any unary operator (chd...
You can embed pod documentation in your Perl scripts. Start your documentation with a "=head1" command at the beginning, and end it with a "=cut" command. Perl will ignore the pod text. See any of the supplied library modules for examples. If you're going to put your pods at the end of the file, and you're using an __END__ or __DATA__ cut mark, make sure to put an empty line there before the first pod directive. __END__ =head1 NAME modern - I am a modern module If you had not had that empt...
You may not (usefully) use a reference as the key to a hash. It will be converted into a string: $x{ \$a } = $a; If you try to dereference the key, it won't do a hard dereference, and you won't accomplish what you're attempting. You might want to do something more like $r = \@a; $x{ $r } = $r; And then at least you can use the values(), which will be real refs, instead of the keys(), which won't....
Upon startup, Perl looks for your script in one of the following places: 1. Specified line by line via -e switches on the command line. 2. Contained in the file specified by the first filename on the command line. (Note that systems supporting the #! notation invoke interpreters this way.) 3. Passed in implicitly via standard input. This works only if there are no filename arguments--to pass arguments to a STDIN script you must explicitly specify a "-" for the script name. With methods 2 and 3...
Like many languages, Perl provides for user-defined subroutines. These may be located anywhere in the main program, loaded in from other files via the do, require, or use keywords, or even generated on the fly using eval or anonymous subroutines (closures). You can even call a function indirectly using a variable containing its name or a CODE reference to it, as in $var = \&function. The Perl model for function call and return values is simple: all functions are passed as parameters one single ...
Prior to release 5.0 of Perl, a programmer could use dbmopen() to connect an on-disk database in the standard Unix dbm(3x) format magically to a %HASH in their program. However, their Perl was either built with one particular dbm library or another, but not both, and you couldn't extend this mechanism to other packages or types of variables. Now you can. The tie() function binds a variable to a class (package) that will provide the implementation for access methods for that variable. Once this ...
Before you create a class, you need to decide what to name it. That's because the class (package) name governs the name of the file used to house it, just as with regular modules. Then, that class (package) should provide one or more ways to generate objects. Finally, it should provide mechanisms to allow users of its objects to indirectly manipulate these objects from a distance. For example, let's make a simple Person class module. It gets stored in the file Person.pm. If it were called a Ha...
The Change Permissions tool allows the user to change the permissions and ownership on a set of files and directories. First, the user constructs a list of files (or directories) to be modified. Files can be added to the list in two ways: 1) by dragging and dropping files into the colored Files and Directories panel and 2) by clicking on the "Add File To List..." button or selecting File->Add... (Ctrl+A) from the menu. Next, the user can change ownership or permissions. To change the ownership...
pfa2pfb converts Adobe Type 1 font programs from the Printer Font ASCII (PFA) to the Printer Font Binary (PFB) format. If the file output is not specified, output goes to the standard output. If the file input is not specified, input comes from the standard input. In this way pfa2pfb can be used as a filter.
pfb2pfa converts Adobe type-1 font programs in PFB (binary) format to PFA (hexadecimal) format. If the file output is not specified output goes to the standard output. If the file input is not specified input comes from the standard input. In this way pfb2pfa can be used as a filter.
pfconv is one of the sample programs distributed with the OpenGL Performer high-performance graphics library. pfconv loads one or more files into an OpenGL Performer scene graph, and then writes the resulting scene graph out to a named output file. It is installed in the /usr/sbin directory on IRIX, and /usr/bin/X11 on Linux. The following formats support file writing: dwb Coryphaeus Software Designer's Workbench format medit Medit productions modeler format pfa OpenGL Performer ASCII file form...
pfmt uses format for printf style formatting of args. pfmt encapsulates the output in the standard error message format and displays it on stderr. The following options are available. -l label Specify the label string to be displayed with the message (for example, "UX:cat"). label is a character string no more than 25 characters in length; it will be automatically suffixed with a colon (:). When unspec...
pfpalettize is one of the sample programs distributed with the OpenGL Performer high-performance graphics library. pfpalettize loads one or more files into an OpenGL Performer scene graph, searches for all textures and palettizes them according to defaults or options specified, and then writes the resulting scene graph to an output file and writes the newly created palettized textures out to new palettized image files. pfpalettize command line options -h - "Usage" message -m - Enabel ...
The pg command is a filter that allows the examination of files one screenful at a time on a CRT. (If no file is specified or if it encounters the file name -, pg reads from standard input.) Each screenful is followed by a prompt. If the user types a carriage return, another page is displayed; other possibilities are listed below. pg processes supplementary code set characters in files, and recognizes supplementary code set characters in the string given to the -p opti...
Photoshop is an imaging application developed and supported by Adobe Systems Inc. 'photoshop_sgi' is a performance package which works in conjunction with Photoshop to provide SGI specific acceleration and customization. 'photoshop_sgi' has been designed to work in harmony with Adobe's standard version of Photoshop. When Photoshop and photoshop_sgi are installed by default, 'photoshop' will invoke Photoshop as shipped by Adobe and 'photoshop_sgi' will invoke Photoshop as modified by SGI...
Ping is a tool for network testing, measurement and management. It utilizes the ICMP protocol's ECHO_REQUEST datagram to elicit an ICMP ECHO_RESPONSE from a host or gateway. ECHO_REQUEST datagrams (``pings'') have an IP and ICMP header, followed by an 8-byte timestamp, and then an arbitrary number of ``pad'' bytes used to fill out the packet. The host can be the name of a host or its Internet address. The options are: -c count Stop after sending (and waiting the specified delay to receive) ...
pixdump prints out the formatted contents of the tables from one or more SpeedShop instrumented executables or DSOs. Options are used to control the printing of the files. -verbose Print detailed information. -perf Print out the contents of the perf section. -graph Print out the contents of the graph section. -binmap Print out the contents of the binmap section. -addrs Print out the contents of the addrs section. -argtrace Print out the contents of the argtrace section. -funcnode Print out the c...
pixie is an object instrumentation tool that can be used to measure code execution frequency in a program for performance analysis. pixie reads an executable program, partitions it into basic blocks, and writes an equivalent program containing additional code that counts the execution of each basic block. (A basic block is a region of the program that can be entered only at the beginning and exited only at the end). Other options allow producing an uninstrumented copy of the executable, with map...
pl2pm is a tool to aid in the conversion of Perl4-style .pl library files to Perl5-style library modules. Usually, your old .pl file will still work fine and you should only use this tool if you plan to update your library to use some of the newer Perl 5 features, such as AutoLoading.
playaifc parses AIFF-C (and/or AIFF) file(s) containing 8-bit or 16-bit audio sample data (single channel, stereo, or 4-channel) and plays the samples through the audio hardware. playaifc reads the contents of the AIFF/AIFF-C Common and Sound Data chunks, and skips all other chunks. The hardware sample rate is modified, if possible, so that it agrees with the value in the Common chunk. By default, the hardware sample rate will not be modified if another program is using an output audio port at a...
-d what Specify what modules should print debugging information. what is a string of letters from the following set: a, c, d, j, m, s, t, v. Use A or * to print all information. -e Give environment variables precedence over those in the makefile(s). -f makefile Specify a different makefile to read than the standard ``Makefile'' or ``makefile''. If makefile is "-", standard input is read. -h Prints out help information and default values. -i ``Ignore errors'' - ignore non-zero exit status...
pod2man converts its input file containing embedded pod directives (see the perlpod manpage) into nroff source suitable for viewing with nrof using the man(7) macro set. Besides the obvious pod conversions, pod2man also takes care of func(), func(n), and simple variable references like $foo or @bar so you don't have to use code escapes for them; complex expressions like $fred{'stuff'} will still need to be escaped, though. Other nagging little roffish things that it catches include translatin...
portmap is a server that converts RPC program numbers into TCP or UDP protocol port numbers. It must be running in order to make RPC calls. When an RPC server is started, it tells portmap what port number it is listening to, and what RPC program numbers it is prepared to serve. When a client wishes to make an RPC call to a given program number, it first contacts portmap on the server machine to determine the port number where RPC packets should be sent. After portmap starts, inetd(1M) can regist...
portstat is a very simple program which dumps the status of all the currently open audio ports on a system. For each open port, it prints, in order: "port," the name of the port as passed to ALopenport; "pid," the ID of the process that opened the port; "rbid," the internal ID of the sample queue; "AL v," the version of the Audio Library which was used to open the port; "type," the type of the port (input or output); "nchans," the number of channels in the port's sample queue; "fil...
This command brings the system to a state where nothing is running so the power can be turned off. By default, the user is asked questions that control how much warning the other users are given. The options: -y prevents the questions from being asked and just gives the warning messages. There is a 60 second pause between the warning messages. -Y is the same as -y except it has no pause between messages. It is the fastest way to bring the system down....
PPP is a standard protocol for transmitting network data over point-topoint links using synchronous modems, asynchronous modems, or ISDN links. It can be used to transfer data between applications which are using TCP/IP or UDP/IP. The ppp program is used to connect to a remote machine. It does everything necessary to permit network data to reach the modem or ISDN line, and to connect the TTY port to the rest the network system. It does things that are done by ifconfig(1M) for other network inter...
Managers display information about your system and provide access to interactive guides (also called tasks) that let you administer your system. For example, the User Manager displays a list of the user accounts currently on the system and gives you access to guides like "Add a User Account" and "Modify a User Account". In the Manager window, you can open a guide by choosing its name from the Task menu or by clicking its button at the bottom of the window. The PPP manager displays a list of ...
pppstat displays the current status of PPP links. Both configuration values (e.g. IP addresses, protocols, and packet sizes) and operational values (e.g. recent compression performance, corrupted packets, and current links in the multilink bundle) are displayed. The options are: -n display numbers instead of names. -u unit display the stat of PPP unit unit instead of the first active unit. -i interval refresh the screen every interval seconds instead of once per second. -m d|r|z display using d ...
pr is used to format and print the contents of a file. If file is -, or if no files are specified, pr assumes standard input. pr prints the named files on standard output. By default, the listing is separated into pages, each headed by the page number, the date and time that the file was last modified, and the name of the file. Page length is 66 lines which includes 10 lines of header and trailer output. The header is composed of 2 blank lines, 1 line of text ( can be altered with -h), and 2 bla...
The praliases utility displays the current system aliases, one per line, in no particular order. The options are as follows: -f Read the specified file instead of the default sendmail system aliases file. The praliases utility exits 0 on success, and >0 if an error occurs.
preallocColors is run early in the login process to preallocate a small set of colors used by the IRIX Interactive Desktop. By preallocating these colors early in the login process, it avoids colormap flashing when running GL programs. On machines with multiple colormaps, where flashing is not a problem, preallocColors exits immediately, without allocating any colors. On machines with a single colormap, preallocColors will allocate the colors, and for a child. The parent will exit immediately, w...
preset is a tool to be used only as a last resort. preset resets the lp spooling system to a state in which no printers are installed, the spooler is not running, and all special spooler files have been removed and recreated. After preset has been run, no information regarding previously installed printers will exist on the system. preset should be used only when all other methods of manipulating printers and the printing queues fail....
These options apply only to raster image files supported by Impressario, but are independent of the image file type. All of the following options apply to all supported image types. bestfit Rotate and scale the image to occupy the largest possible amount of space on the page. rotate Rotate the image in integer degrees, clockwise. Takes one integer argument. flip Flip the image, producing a mirror image. Useful for printing transparencies and iron-on decals. zoom Scale the image to an integer per...
printers provides a graphical interface to the System V print spooling system. It allows the user to easily add, remove, and configure printers. It also has commands for setting the system default printer, setting printer specific options, and viewing the job queue of a particular printer. printers is typically started by using the "Printer Manager" command on the "System" menu of the toolchest(1). printers can also be started from the "System Manager" (chost(1M)) or the command line....
The printf command converts, formats, and prints its args under control of the format. It fully supports conversion specifications for strings (%s descriptor); however, the results are undefined for the other conversion specifications not specifically mentioned below. format a character string that contains three types of objects: 1) plain characters, which are simply copied to the output stream; 2) conversion specifications, each of which results in fetching zero or more...
printstatus, also known as PrintStatus, provides a graphical interface for monitoring printers under the AT&T System V print spooling system. The program can be displayed on 24-bit, 8-bit, and 1-bit X displays. Command Line Options -e updateInterval Specifies the interval, in seconds, between updates of the printer engine status information. This includes the icon itself and the Current Printer Status area of the interface. This information is polled whether printstatus is iconified or not. -q u...
prioinfo prints out the priority IO allocation table of the system. Each entry represents an allocation, with a blank line in between entries. Within each entry, the first row is the bandwidth allocation handle, the process id of the process which owns the allocation, followed by the bandwidth in bytes/second. The second row is the source name, the third row is the sink name.
Managers display information about your system and provide access to interactive guides (also called tasks) that let you administer your system. For example, the User Manager displays a list of the user accounts currently on the system and gives you access to guides like "Add a User Account" and "Modify a User Account." In a Manager window, you can open a guide by choosing its name from the Task menu or by clicking its button at the bottom of the window. The Privilege Manager displays inform...
Managers display information about your system and provide access to interactive guides (also called tasks) that let you administer your system. For example, the user Manager displays a list of the user accounts currently on the system and gives you access to guides like "Add a User Account" and "Modify a User Account". In the Manager window, you can open a guide by choosing its name from the Task menu or by clicking its button at the bottom of the window. The Process manager displays the pr...
Proclaim is a client that communicates with a DHCP server to obtain configuration parameters, including at least an IP address. The format of DHCP messages is based on the format of bootp messages, described in RFC 951. A detailed protocol specification of DHCP is in RFC 1541, available from the Network Information Center. The DHCP protocol uses UDP/IP as its transport mechanism. The DHCP server receives service requests at the UDP port indicated in the bootp service description contained in the...
ProclaimRelayMgr is a graphical front end that displays the status and configuration of the proclaim relay-agent running on the local host. It also displays the set of proclaim servers to which requests are forwarded. Proclaim is an implementation of DHCP (dynamic host configuration protocol). The main window allows you to add and delete addresses and names of proclaim servers. You can enable or disable the relay-agent by clicking the Relay On/Off button in the main window. The File button opens...
ProclaimServerMgr is a graphical front end that displays the status and configuration of the proclaim server running on the local host. It displays the set of IP addresses and lease times that are currently assigned. Proclaim is an implementation of DHCP (dynamic host configuration protocol). The File button on the main window opens a pull-down menu for editing options and configuration files. The Options menu choice allows you to edit proclaim server options defined in the /etc/config/proclaim_...
prof analyzes one or more data files generated by the SpeedShop performance tools and produces a report. (Note that most reports are formatted with long lines, and should be viewed in a window that is 135 characters wide, and printed in wide format.) The second form is used to analyze data files generated by the SpeedShop performance tools if the target program is not in the same directory as the data files (in which case should be the path to the target program). Multiple file...
Prfld, prfstat, prfdc, prfsnap, and prfpr form a system of programs to facilitate an activity study of the UNIX operating system. Prfld is used to initialize the recording mechanism in the system. It generates a table containing the starting address of each system subroutine as extracted from system_namelist. Prfstat is used to enable or disable the sampling mechanism. The range parameter selects what values will be sampled at the sampling points. The current choices for range are pc to select P...
The proxy manager (proxymngr) is responsible for resolving requests from xfindproxy (and other similar clients), starting new proxies when appropriate, and keeping track of all of the available proxy services. The proxy manager strives to reuse existing proxies whenever possible. There are two types of proxies that the proxy manager deals with, managed and unmanaged proxies. A managed proxy is a proxy that is started ``on demand'' by the proxy manager. An unmanaged proxy, on the other hand, is...
prs prints, on the standard output, parts or all of an SCCS file [see sccsfile(4)] in a user-supplied format. If a directory is named, prs behaves as though each file in the directory were specified as a named file, except that non-SCCS files (last component of the path name does not begin with s.), and unreadable files are silently ignored. If a name of - is given, the standard input is read; each line of the standard input is taken to be the name of an SCCS file or directory to be processed; n...
prtvtoc prints a summary of the information in the volume header for a single disk or all of the local disks attached to a system (see vh(7M)). The command is usually used only by the superuser. The rawdiskname name should be the raw device filename of a disk volume header in the form /dev/rdsk/dks?d?vh. Note: prtvtoc knows about the special file directory naming conventions, so the /dev/rdsk prefix can be omitted. If no name is given, the information for the root disk is printed. In singl...
ps prints information about active processes. Without options, information is printed about processes associated with the controlling terminal. The output consists of a short listing containing only the process ID, terminal identifier, cumulative execution time, and the command name. Since a batch job doesn't have a controlling terminal, invoking ps without options from a batch job will result in an error. Otherwise, the information that is displayed is controlled by the selection of options. o...
The psf filter, a printer driver for PostScript printers, accepts PostScript on input and supports AppleTalk networked and serially-connected printers. The psf filter carries on a full duplex dialog with the printer determining status, etc. as the job is sent. When psf opens a printer (either through AppleTalk or serially), it queries the printer to insure that the correct version of all needed dictionaries are loaded, and loads the correct version if they are not. If there is no PRINTER.PPD fil...
The psfiletype program scans the given file to figure out what kind of file it is; mainly to distinguish between PostScript and image files so that they may be printed correctly on a PostScript printer. After determining the data type, psfiletype prints one of the strings: image, eps, PostScript, unsupported, or unknown. The result ``unsupported'' means that the file is an image, but the imagetops program won't be able to convert it to PostScript....
The filter psif is a csh(1) script which runs psf(1m). It is usually specified in /etc/printcap ( printcap(5)) as the input filter (if=) and is called by lpd(1m) as part of processing each job. This script is usually created by the configks(1m) program and is primarily concerned with printing data. You can modify the psif script to reverse page order if you want by adding psreverse(1m) and the -r option in the psif script....
If no options are given, psifconfig will show the configuration of the packet scheduler for the specified interface. A system administrator can also set some configuration parameters. The interface name must be specified.
The program psreverse reverses the pages for the printer. It is usually called from the lp(1) or lpr(1) printer script. One usually pipes the output of psreverse into psf(1m).
The program pssplit reads a PostScript print job file and writes separate output files each containing one page of the job, repeating the PostScript header and dictionaries in each file. While the resulting output files will not be EPS, many applications that accept EPS will accept them. The output file(s) written by pssplit will each have a pathname of the form destdir/filename.pgofsuffix, where is the sequential page numbers, starting with 1, and is the total number of pa...
The following is the old c2ph.doc documentation by Tom Christiansen Date: 25 Jul 91 08:10:21 GMT Once upon a time, I wrote a program called pstruct. It was a perl program that tried to parse out C structures and display their member offsets for you. This was especially useful for people looking at binary dumps or poking around the kernel. Pstruct was not a pretty program. Neither was it particularly robust. The problem, you see, was that the C compiler was much better at parsi...
pwck scans the password file and notes any inconsistencies. The checks include validation of: the number of fields, login name, user ID, group ID, and whether the login directory and the program-to-use-as-Shell exist. The default password file is /etc/passwd. pwck has the ability to parse YP entries in the password file. The -p option prevents checking of the login directory and shell fields, useful for NIS administrators in checking the yppasswd file, where each login directory is not usu...
The pwconv command creates and updates /etc/shadow with information from /etc/passwd. If the /etc/shadow file does not exist, pwconv creates /etc/shadow with information from /etc/passwd. The command populates /etc/shadow with the user's login name, password, and p...
pwd prints the path name of the working (current) directory. pwd is both an explicit command (invoked as /usr/bin/pwd), as well as a builtin command to each shell (invoked as pwd).
qlist is used to display the list of print queues available on a NetWare server. If no server is specified on the command line, the default (most recently logged-into) NetWare server is used.
qmorf reads in a series of Inventor quad mesh files and draws an animated sequence which metamorphoses from one object to the next. These quad mesh files must meet the exact specifications described below (40x40). Qmorf is not related to other morphing programs (like the program used to produce the effects in Michael Jackson's "Black or White" video). Those programs use image warping techniques to modify 2D images; this program actually modifies an object's 3D geometry. qmorf was written usi...
The query program sends a PostScript query (from queryfile) to a printer, and places the result in the file outfile. The flags are defined as follows: -a look in all zones (default) -s indicates the printer is serial (see below) -v says be verbose -P says look for printer with this name (default is LaserWriter) -T means look as if it is this type of printer (default is LaserWriter) -Z tells it which zone to look in (default is all zones) The queryfile must exist, and contain a PostScript procedu...
QuickPage sends messages to a paging terminal using the SNPP and IXO (also known as TAP) protocols. It is normally used with no options other than a recipient and the message text, in which case the message is sent to the SNPP server where it is submitted to a page queue to be sent by a separate daemon process. Page groups and duty schedules are supported. Status notification messages indicating the success or failure of a page are sent via e-mail to submitters of high-priority (level 0) pages. ...
quota displays users' or projects' disk usage (in kilobytes) and limits. Only the super-user may use the optional idname argument to view the limits of another user or project. If a -n flag is supplied, quota will only display user's or project's quotas for local file systems. Remotely mounted file systems are ignored. If a -j flag is supplied, quota will report project quotas. If the -j flag isn't supplied, quota will report user quotas. Normally, output pertaining to only those filesystem...
quotacheck examines local EFS filesystems, builds a table of current disk usage, and compares this table against that stored in the disk quota file for the filesystem. If any inconsistencies are detected, both the quotas file and the current system copy of the incorrect quotas are updated (the latter only occurs if quotas has been enabled for the filesystem). The filesystem has to be mounted for quotacheck to be able to operate on it. quotacheck ignores XFS filesystems since the XFS quota system...
quotaon announces to the system that disk quotas should be enabled on one or more local filesystems. The filesystem(s) specified must be mounted at the time. quotaoff announces to the system that filesystems specified should have any disk quotas turned off. Both these commands behave slightly differently between EFS and XFS filesystems. On EFS filesystems, a quota file must be present in the root directory of the specified filesystem and be named quotas. XFS filesystems have two components to th...
rarpd responds to Reverse Address Resolution Protocol (Reverse ARP, RARP) requests. It puts itself in the background, and requires root privileges. The Reverse ARP protocol is used by systems at boot time to discover their 32-bit Internet Protocol (IP) address given their 48-bit Ethernet address. In order for a RARP request to be answered, the requesting system's name-to-IP-address entry must exist in the /etc/hosts file and its name-to-Ethernet-address entry must exist in the /etc/ethers file....
rbview is a very simple GL program which monitors the state of the sample queues for all audio applications on a system. This is primarily helpful for debugging audio applications: rbview is useful in determining where an application acquires latency, whether or not it is losing audio data, and when it opens and closes audio ports. For each open port, rbview displays a bar indicating the current number of samples in the port's sample queue. Within the bar are two lines: the line on the left dis...
This file is executed by an entry in /etc/inittab and is responsible for performing those operations that bring the system down to either the administrative maintenance state, traditionally state s, called the "single-user" state, or to the system halt state in preparation for powering the system down. /etc/rc0 runs files beginning with K in /etc/rc0.d. These files are executed by /bin/sh in ascii sort-sequence order (see FILES below for more information). Each of these files can also check th...
/etc/rc2 is executed via an entry in /etc/inittab and is responsible for the initializations that bring the system to a ready-to-use state, traditionally state 2, which is called the "multi-user" state. /etc/rc2 runs files beginning with S in /etc/rc2.d. These files are executed by /bin/sh in ascii sort-sequence order (see FILES below for more information). Each of these files may also check the state of the corresponding chkconfig flag for that function. If the state is on, the script starts ...
rcp copies files between machines. Each file or directory argument has one of these forms: o A local filename, path, containing no : characters, or a \ before any :'s. o A remote filename of the form remhost:path. o A remote filename of the the form remuser@remhost:path, which uses the user name remuser rather than the current user name on the remote host. If path is not a full pathname, it is interpreted relative to your login directory on remhost. A path on a remote host can be quoted (using...
rcpDevice is a simple shell script for copying a single file or directory to a remote system. Its icon can be found on the Desktop Tools page of the IconCatalog. Users can also launch it from a Unix shell command line. Users may find it easier to copy files between hosts using the accessworkstation(1) panel, available on the toolchest as Desktop > Access Files > By Remote Login. That panel can be used to launch a remote directory view or iconview(1). Users can then Ctrl-drag files from the iconv...
rcs creates new RCS files or changes attributes of existing ones. An RCS file contains multiple revisions of text, an access list, a change log, descriptive text, and some control attributes. For rcs to work, the caller's login name must be on the access list, except if the access list is empty, the caller is the owner of the file or the superuser, or the -i option is present. Pathnames matching an RCS suffix denote RCS files; all others denote working files. Names are paired as explained in ci...
rcsclean removes files that are not being worked on. rcsclean -u also unlocks and removes files that are being worked on but have not changed. For each file given, rcsclean compares the working file and a revision in the corresponding RCS file. If it finds a difference, it does nothing. Otherwise, it first unlocks the revision if the -u option is given, and then removes the working file unless the working file is writable and the revision is locked. It logs its actions by outputting the correspo...
rcsdiff runs diff(1) to compare two revisions of each RCS file given. Pathnames matching an RCS suffix denote RCS files; all others denote working files. Names are paired as explained in ci(1). The option -q suppresses diagnostic output. Zero, one, or two revisions may be specified with -r. The option -ksubst affects keyword substitution when extracting revisions, as described in co(1); for example, -kk -r1.1 -r1.2 ignores differences in keyword values when comparing revisions 1.1 and 1.2. To av...
rcsfreeze assigns a symbolic revision number to a set of RCS files that form a valid configuration. The idea is to run rcsfreeze each time a new version is checked in. A unique symbolic name (C_number, where number is increased each time rcsfreeze is run) is then assigned to the most recent revision of each RCS file of the main trunk. An optional name argument to rcsfreeze gives a symbolic name to the configuration. The unique identifier is still generated and is listed in the log file but it wi...
Author: Walter F. Tichy. Revision Number: 5.7; Release Date: 2000/10/27. Copyright c 1982, 1988, 1989 by Walter F. Tichy. Page 4 RCSINTRO(1) RCSINTRO(1) Copyright c 1990, 1991, 1992, 1993 by Paul Eggert.
rcsmerge incorporates the changes between two revisions of an RCS file into the corresponding working file. Pathnames matching an RCS suffix denote RCS files; all others denote working files. Names are paired as explained in ci(1). At least one revision must be specified with one of the options described below, usually -r. At most two revisions may be specified. If only one revision is specified, the latest revision on the default branch (normally the highest branch on the trunk) is assumed for ...
rdisc implements the ICMP router discover protocol. The first form of the command is used on hosts and the second form is used on routers. On a host rdisc is invoked at boot time to populate the network routing tables with default routes. On a router it is also invoked at boot time in order to start advertising the router to all the hosts. Host (First Form) On a host rdisc listens on the ALL_HOSTS (224.0.0.1) multicast address ...
Rdist is a program to maintain identical copies of files over multiple hosts. It preserves the owner, group, mode, and mtime of files if possible and can update programs that are executing. Rdist reads commands from distfile to direct the updating of files and/or directories. If distfile is `-', the standard input is used. If no -f option is present, the program looks first for `distfile', then `Distfile' to use as the input. If no names are specified on the command line, rdist will update al...
Rdistd is the server program for the rdist command. It is normally run by rdist via rsh(1). The -S argument must be specified. The option is required so that rdistd is not accidentally started since it normally resides somewhere in a normal user's $PATH.
The read utility will read a single line from standard input. By default, unless the -r option is specified, backslash () acts as an escape character. If standard input is a terminal device and the invoking shell is interactive, read will prompt for a continuation line when: The shell reads an input line ending with a backslash, unless the -r option is specified. A here-document is not terminated after a newline character is entered. The line will be split into fields as in the shell; the first ...
readlink provides command-line access to the readlink(2) system call. readlink uses the readlink(2) system call to print the value of a symbolic link to stdout. If path is not a symbolic link, path is printed ant a non-zero exit status is returned. The readlink command is intended for use by developers who need access to symbolic link contents for their FTR rules.
realpath provides command-line access to the realpath(3C) library routine. realpath uses the realpath(3C) library routine to resolve all links, symbolic links, and references to ``.'' and ``..'' in path and prints the result to stdout. If the realpath(3C) call fails for any reason, path is printed and a non-zero exit status is returned. The realpath command is intended for use by developers who need access to absolute pathnames for their FTR rules....
reaper is responsible for managing a login session via xdm. When a user logs in through xdm, reaper is executed as part of the session. It places a property on the root window which specifies that a login session is in progress, and then exits. When this property is removed from the root window, via execution of endsession, the session is terminated. xdm then puts up the login window and awaits the next login. If reaper is not included in the user's session, such as in a $HOME/.xsession script,...
In an IRIX shell, reboot halts and then restarts the system in an orderly fashion. It is useful after changing the configuration of the system. You must have superuser privilege to use this command. If you are remotely logged in to the system, you are prompted to confirm the reboot. To halt the system before turning it off, use halt(1M) or shutdown(1M) instead of reboot.
sfrecord creates an output file containing audio sample data recorded through the audio hardware. sfrecord records audio input for a time equal to a given -t argument, or until the user sends it an interrupt. The file's sampling rate will be equal to the rate of the default audio input device. This can be set via the -r argument. The format, compression, and channel count can be set via the appropriate arguments. Silicon Graphics has adopted AIFF-C (".aifc" suffix) as its standard interchange...
The regcmp command performs a function similar to regcmp(3X) and, in most cases, precludes the need for calling regcmp(3X) from C programs. This saves on both execution time and program size. The command regcmp compiles the regular expressions in file and places the output in file.i. If the - option is used, the output will be placed in file.c. The format of entries in file is a name (C variable) followed by one or more blanks followed by a regular expression enclosed in double quotes. The outpu...
With On-line Registration, SGI hopes to establish a mutually beneficial information link with the primary user of each low end and high end system. To register your system with SGI, fill out and return your completed Online Registration form via the Internet. Note: You will need to have Netscape (or an equivalent browser) to launch On-line Registration. To Access On-line Registration Double click on the Register_To_Win icon that appears on your desktop at user login or use your web browser to ac...
registrar, which runs on a NIS master only, is a NIS hostname data base update program. A hostname registration request can be sent from either the yp_host(1M) command, or from the PROM IP address auto-registration function. This requests is initially sent to a RPC daemon process rpc.ypupdated(1M). registrar is invoked indirectly by rpc.ypupdated(1M) by an intermediate make file updaters(4). The host-file parameter should be the host file that is used in NIS database makefile, /var/yp/Makefile. ...
reinstallpr deletes and reinstalls all network printers currently installed on the system. Printers physically attached to the system are not deleted or reinstalled.
relnotes is an interface to the on-line release notes. It displays the release notes by product and chapter using the man(1) command. It can also show which products' release notes are installed and the title of each chapter installed. With no arguments, relnotes shows which products have release notes installed. -h shows how to use the command. product shows the chapters that are installed for the named product. If no table of contents file can be found, relnotes shows you a list of chapter nu...
remotedir opens a remote directory. It first attempts to bring up a dirview(1) running on the local workstation displaying the remote directory via autofs(1M). If that fails, remotedir will run accessworkstation(1). -f directory directory is the directory on the remote workstation to view. -h hostname hostname is the remote workstation to log into. -l login login is the login id passed to accessworkstation if autofs cannot access directory. remotedir is used by the file typing rules (FTRs) for O...
Managers display information about your system and provide access to interactive guides (also called tasks) that let you administer your system. For example, the User Manager displays a list of the user accounts currently on the system and gives you access to guides like "Add a User Account" and "Modify a User Account." In a Manager window, you can open a guide by choosing its name from the Task menu or by clicking its button at the bottom of the window. The removable media manager gets its ...
The command, removeOldLangCatalog, is a shell script that checks for the existence of $HOME/.desktop-/configchecks/lastloginlocale. If not found, or if the locale in that file is not the same as the current locale (as set in LANG environment variable), it removes all empty directories under $HOME/.desktop-/iconcatalog/pages. It then writes the current locale in the lastloginlocale file. For information about the entire IRIX Interactive Desktop environment, see the IID(1) man ...
removeSwap removes the specified swap element from the system with the swapctl(2) system call, deletes the disk file corresponding to the swap element, and removes the swap element's entry in /etc/fstab/ This privcmd is not intended for command line use. The swap(1M) command provides a more robust and capable user interface for managing swap from the command line.
renice alters the scheduling priority of one or more running processes. renice'ing a process group causes all processes in the process group to have their scheduling priority altered. renice'ing a user causes all processes owned by the user to have their scheduling priority altered. The -n increment specifies how the system scheduling priority of the specified process(es) is to be adjusted. The increment option-argument is a positive or negative decimal integer that is used to modify the syste...
repquota outputs a summary of the disk usage and quotas for the specified filesystems for all users declared in the local /etc/passwd file. For each user the current number of files and amount of space (in kilobytes) is printed, along with any quotas created with edquota(1M). Using repquota, it is possible to obtain information about the overall XFS quota system as well as output XFS quota limits in a format understood by edquota....
Resize prints a shell command for setting the TERM and TERMCAP environment variables to indicate the current size of xterm window from which the command is run. For this output to take effect, resize must either be evaluated as part of the command line (usually done with a shell alias or function) or else redirected to a file which can then be read in. From the C shell (usually known as /bin/csh), the following alias could be defined in the user's .cshrc: % alias rs 'set noglob; eval `resize`...
The Restore command copies the named file or directory from a local or remote backup tapes to disk. If no file or directory is specified, Restore copies all the files found on the tape to disk. Files are restored into the current directory if the backup tape contains pathnames beginning with ".". Files on disk are overwritten even if they are more recent than the respective files on tape. The options and arguments to Restore are: -h hostname If a tape drive attached to a remote host is used fo...
restore, and rrestore are applicable only to dumps made by dump(1m) from EFS filesystems, but they can restore files into any type of filesystem, not just an EFS filesystem. restore reads tapes dumped with the dump(1M) command and restores them relative to the current directory. Its actions are controlled by the key argument. The key is a string of characters containing at most one function letter and possibly one or more function modifiers. Any arguments supplied for specific options are given ...
restore, and rrestore are applicable only to dumps made by dump(1m) from EFS filesystems, but they can restore files into any type of filesystem, not just an EFS filesystem. restore reads tapes dumped with the dump(1M) command and restores them relative to the current directory. Its actions are controlled by the key argument. The key is a string of characters containing at most one function letter and possibly one or more function modifiers. Any arguments supplied for specific options are given ...
All named files are recreated with their current symbolic link information. A symbolic link is a special kind of file whose contents are the name of another file (see symlink(2)). A symbolic link contains the name of the file to which it is linked, and is created with the ln(1) command. The resymlink command allows a user to recreate a current symbolic link, possibly using different filesystem creation policies. In particular, if the Extent Filesystem global system parameter efs_inline is non-ze...
revo is an interactive Inventor program for creating 3d objects by drawing a curve and then revolving it around an axis. The program has two main viewing windows: the curve view and the 3d rendered view. To create a object, click the left mouse button in the curve view near the default blue line. Hold the button down and continue to move the mouse, the point will be dragged. You can drag existing points on the curve by clicking and dragging. To delete a point from the curve, simply click the poi...
rexd is the rpc(4) server for remote program execution. This daemon is started by inetd(1M) whenever a remote execution request is made (see the note below). For non-interactive programs, standard file descriptors are connected directly to TCP connections. Interactive programs involve pseudo-terminals, similar to the login sessions provided by rlogin(1C). This daemon may use NFS to mount filesystems specified in the remote execution request. rexd should be used on trusted networks only. It is no...
Rexecd is the server for the rexec(3N) routine. The server provides remote execution facilities with authentication based on user names and passwords. NOTE: password aging is not supported by this daemon. Rexecd listens for service requests at the port indicated in the ``exec'' service specification; see services(4). When a service request is received the following protocol is initiated: 1) The server reads characters from the socket up to a null (`\0') byte. The resultant string is interpre...
rfind is a fast, client-server adaptation of the find(1) command. It maps the specified file-system name to a host machine, and submits the search-expression to the rfindd(1M) daemon running on that host, for evaluation over the specified file-system. The rfindd(1M) daemon searches side files for the requested information, and returns it to rfind(1) for display on stdout. These side files were previously created by the fsdump(1M) command, and contain information about a particular file-system If...
rfindd is the daemon that handles requests from rfind(1). This daemon is started during system initialization from the /etc/init.d/rfindd script if the configuration flag rfindd is set on. Use the chkconfig(1M) command to turn this flag on or off. See the fsdump(1M) reference page for more details.
rgb reads the standard input and writes ndbm files /usr/lib/X11/rgb.pag and /usr/lib/X11/rgb.dir. These files are suitable for use by the X server. The expected use of rgb is to support custom modification of /usr/lib/X11/rgb.txt. Typically, it is used by invoking: rgb < [path]rgb.txt NOTE: You must have permission enabling you to write the files in /usr/lib/X11. Typically, this means running as the Super-User....
On systems with TSIX networking enabled, the kernel uses an internal lookup table, called the internal Remote Host Database (RHDB), to enforce per host security policy. The rhost command loads the RHDB with the attributes of remote hosts and networks, specified in /etc/rhost.conf.
The ripsock program accepts data from stdin and sends it to the specified TCP/IP socket. Its purpose is to send the output of a spooler to a RIP that accepts data that way without ever hitting disk. This filter is designed to be called from a "Custom" print queue. The flags are defined as follows: -h specifies the host to send the job to. The default is the local host. -s defines the name of the service (as specified in /etc/services) to be used. Defaults to "dps". If a port is specified, th...
rlog prints information about RCS files. Pathnames matching an RCS suffix denote RCS files; all others denote working files. Names are paired as explained in ci(1). rlog prints the following information for each RCS file: RCS pathname, working pathname, head (i.e., the number of the latest revision on the trunk), default branch, access list, locks, symbolic names, suffix, total number of revisions, number of revisions selected for printing, and descriptive text. This is followed by entries for t...
rlogin connects your terminal on the current local host system to the remote host system rhost. The remote username used is the same as your local username, unless you specify a different remote name with the -l option or use the username@rhost format. The rlogin arguments and options are: rhost The hostname of the remote system. username The user ID to be used on the remote system. -l username Specifies the user ID to be used on the remote system. -ec Specifies a different escape character. The...
Rlogind is the server for the rlogin(1C) program. The server provides a remote login facility with authentication based on privileged port numbers from trusted hosts. The -a option verifies the remote host name and address match on all incoming connections. Normally this check is performed only for connections from hosts in the local domain. The -l option disables validation using .rhosts files, unless the user is logging in as the superuser. Transport-level keep-alive messages are enabled unles...
rm removes the entries for one or more files from a directory. It does not remove .. and anything above target directory when invoked with an argument which ends in /.. It will print error messages in these cases. If the directory containing the file to be removed has the 'sticky' bit set (see chmod(2)) then in order to remove the file one of the following must be true: the user owns the file, the user owns the directory, or the user is the super-user. If the kernel tunable xpg4_sticky_b...
Rmail interprets incoming mail received via uucp(1), collapsing ``From'' lines in the form generated by mail.local(8) into a single line of the form ``return-path!sender'', and passing the processed mail on to sendmail(8). Rmail is explicitly designed for use with uucp and sendmail.
rmdefpriv removes an entry from the defaultPrivileges(4) database. After running rmdefpriv, privilege will no longer be a default privilege (see runpriv(1M)). In order to run rmdefpriv, you must either be running as root or you must provide the -auth auth-scheme arguments and pass the authentication test. If auth-scheme is unix, then must you type the root password when prompted in order to pass. The ability to run rmdefpriv is not itself a privilege. root cannot give other users the ability to ...
rmdel removes the delta specified by the SID from each named SCCS file. The delta to be removed must be the newest (most recent) delta in its branch in the delta chain of each named SCCS file. In addition, the specified must not be that of a version being edited for the purpose of making a delta (i. e., if a p-file [see get(1)] exists for the named SCCS file, the specified must not appear in any entry of the p-file). The -r option is used for specifying the SID (SCCS IDentification) level of the...
Rmfstabentry removes a filesystem entry from the /etc/fstab file. The filesystem is not unmounted. Use umountfs(1M) to unmount the filesystem before executing this command.
rmprinter removes a printer from the System V printer spooling system. Normally, if print jobs are pending in the print queue, rmprinter will not remove the printer. If the -f flag is specified, the printer will be removed regardless of pending print jobs. In this case the pending print jobs will not be printed. If the -x flag is specified, any pending print jobs will be moved to dest printer and then the printer will be removed. More than one printer can be specified for removal at one time. If...
rmpriv removes the entry in the privilege(4) database that grants privilege to user. If the -acct argument is specified, then all privileges will be removed for user. If the -all argument is specified, then all users will lose privilege. The -chkconfig option is used to disable all privileges on the system. rmpriv -chkconfig runs the command chkconfig privileges off. To see the privileges associated with individual tasks, choose "View as Tasks" from the Privilege Manager menu. See privmgr(1M)....
rmprivuser removes an entry from the privilegedUsers(4) database. username will no longer be a privileged user. username may still be able to run privileged commands; see runpriv(1M) for a description of the criteria for a user to be able to run a privileged command. In order to run rmprivuser, you must either be running as root or you must provide the -auth auth-scheme arguments and pass the authentication test. If auth-scheme is unix, then must you type the root password when prompted in order...
Rmt is a program used by the remote programs in manipulating a magnetic tape drive through an interprocess communication connection. Rmt is normally started up with an rexec(3N) or rcmd(3N) call. The rmt program accepts requests specific to the manipulation of magnetic tapes, performs the commands, then responds with a status indication. All responses are in ASCII and in one of two forms. Successful commands have responses of: Anumber\n where number is an ASCII representation of a decimal numbe...
roboinst is a tool to help automate the process of upgrading software on a number of hosts. roboinst can help in automating installing and upgrading operating system and application software, installing patches, repartitioning disks, and other software installation tasks. More complete documentation is provided in the online book IRIX Admin: Software Installation and Licensing. This book can be obtained by installing the eoe.books.sgi_admin subsystem using inst(1M) or Software Manager(1M). Once ...
roboinst_config is run on the configuration server system to check and index the contents of an roboinst configuration directory (configdir). The mrconfig file is parsed for errors, other scripts, if any, are checked, and a table of contents is built. Any custom configuration directories (for specific hardware or network addresses) beneath the configuration directory are also checked and included in the table of contents. roboinst_config first reads the mrconfig file. The mrconfig file must be p...
Route is a utility used to manually manipulate the network routing tables. It normally is not needed, as a system routing table management daemon such as routed(1M), should tend to this task. The route utility supports a limited number of general options, but a rich command language, enabling the user to specify any arbitrary request that could be delivered via the programmatic interface -n Bypasses attempts to print host and network names symbolically when reporting actions. (The process of tra...
Routed is a dameon invoked at boot time to manage the network routing tables. It uses Routing Information Protocol, RIPv1 (RFC 1058), RIPv2 (RFC 1723), and Internet Router Discovery Protocol (RFC 1256) to maintain the kernel routing table. The RIPv1 protocol is based on the reference 4.3BSD daemon. It listens on the udp(7P) socket for the route service (see services(4)) for Routing Information Protocol packets. It also sends and receives multicast Router Discovery ICMP messages. If the host is a...
routeprint is a utility accessible from the IRIX command line to request a Bourne Shell command line which will convert the given file to the requested format. routeprint may also be used to convert files of various types to print on one of a set of desired printers. routeprint uses file types specified on the command line to look up print conversion rules for each file to be printed. The conversion rules are located in compiled .otr files in /usr/lib/filetype. The older ftr(1) database format, ...
rpc.passwd is a server that handles password change requests from yppasswd(1). It changes a password entry in the passwd file or if present, the shadow file. These files provide the basis for the passwd.byname and passwd.byuid maps. Entries in the passwd or shadow files are only changed if the password presented by yppasswd(1) matches the encrypted password of the entry. If the -D option is given the passwd or shadow files are located under the directory path specified with -D. The default direc...
rpcbind is a server that converts RPC program numbers into universal addresses. It must be running to make RPC calls. When an RPC service is started, it will tell rpcbind at what address it is listening, and what RPC program numbers it is prepared to serve. When a client wishes to make an RPC call to a given program number, it will first contact rpcbind on the server machine to determine the address where RPC packets should be sent. ...
This tool is part of the Samba suite. rpcclient is a utility initially developed to test MS-RPC functionality in Samba itself. It has undergone several stages of development and stability. Many system administrators have now written scripts around it to manage Windows NT clients from their UNIX workstation.
rpcgen is a tool that generates C code to implement an RPC protocol. rpcgen will produce file to be used with libc [see intro.3n(1)]. To produce file to be used with libnsl see rpcgen_tli(1). The input to rpcgen is a language similar to C known as RPC Language (Remote Procedure Call Language). rpcgen is normally used as in the first synopsis where it takes an input file and ...
rpcgen_tli is a tool that generates C code to implement an RPC protocol. rpcgen_tli will produce files to be used with libnsl [see intro.3n(1)]. To produce files to be used with the libc see rpcgen(1). The input to rpcgen_tli is a language similar to C known as RPC Language (Remote Procedure Call Language). rpcgen_tli is normally used as in the fir...
The rqsall command is used to requickstart ELF files that are out of sync on a system. This command reads a description of the ELF files that have been recorded (in an undocumented plain text format) in ifile. Those descriptions are generated using the rqsread command. Using those descriptions this command determines which ELF files will not quickstart when executed. For each of those files, this command will normally execute the command /usr/etc/rqs or /usr/etc/rqs64 (as appropriate) on that fi...
The rqsprint command is display information relating to a collection of ELF files on a system. This command reads a description of the ELF files that have been recorded in file. Those descriptions are generated using the rqsread command. Using those descriptions this command can be used to determine which files will not quickstart, which files have conflict symbols, the set of files that will be loaded when executing a particular file, etc. This command takes two set of options. The preoptions a...
The rqsread extracts the information needed by the program rqsall from files, so that rqsall can determine whether the files should be requickstarted or if other files that depend on files need to be requickstarted. If no files are specified and no other list of files has been specified using the -l option, then this command will read a list of files (one per line) to process from stdin. -c outfile Causes the output to be written to outfile. outfile is truncated if it already exists. -f outfile ...
rquotad is an rpc(4) server that returns quotas for a user of a local filesystem that is mounted by a remote machine using NFS. The results are used by quota(1) to display user quotas for remote filesystems. The rquotad daemon is normally invoked by inetd(1M).
Rshd is the server for the rcmd(3N) routine and, consequently, for the rsh(1C) program. The server provides remote execution facilities with authentication based on privileged port numbers from trusted hosts. The -a option verifies the remote host name and address match on all incoming connections. Normally this check is performed only for connections from hosts in the local domain. The -l option disables validation using .rhosts files. Transport-level keep-alive messages are enabled unless the ...
rsh connects to the specified host, and executes the specified command. rsh copies its standard input to the remote command, the standard output of the remote command to its standard output, and the standard error of the remote command to its standard error. Interrupt, quit, and terminate signals are propagated to the remote command; rsh normally terminates when the remote command does. The remote username used is the same as your local username, unless you specify a different remote name with t...
Rstat displays the RSVP reservation state on the local system or on any specific remote node. In default operation, rstat displays reservation state for each interface and each session (destination address and port) for which there is a reservation. Each line contains the interface name, the style, the session address and port, the filter spec selecting sender(s), and the next hop address. If there is path state but no reservation, rstat simply lists the session with the notation "(no resv)". ...
Rsvpd is a daemon program that uses the RSVP resource reservation protocol to set up reservation state in hosts and routers. It supports an API that allows applications to make reservation requests. It includes an adaptation module to the admission control and traffic control mechanisms provided by the output device drivers in the kernel. rsvpd contains a SNMP agent, called rsvpd-snmpagent. The rsvpd-snmpagent allows SNMP managers to read all RSVP and Integrated Service MIB variables, and to wri...
The RSVP daemon rsvpd is capable of multicasting UDP packets containing diagnostic information (a summary of its internal state) periodically and whenever the state changes. Rsvpeep is a command-line program to receive and display this state. By default rsvpeep will display state from all nodes. However, if one or more node_ID parameters occur, rsvpeep will display only the state from the specified node(s). A node_ID is the first component of the DNS name of a node....
Rsvpfilter selects which RSVP messages are selected according to the IP address. In the normal operation of rsvpd, all debugging messages of all sessions are logged as requested by the debugging mask and debugging level. Filter allows a user to request that messages of only specific sessions specified by IP address are logged. By default, rsvpd has filtering turned off. The on and off options turn filtering on and off respectively. When filtering is on, IP addresses to filter on can be added and...
Rsync synchronize RCS working files with the top revisions in their version files. The option -v causes more verbose output. If given twice, each directory name is printed as it is encountered. The option -rrcsdir specifies the name of RCS subdirectories. The default is "RCS". The option -ccmd causes cmd to be used instead of the default co. The option -R causes rsync to descend and synchronize the entire subtree below each specified directory. For each RCS file discovered, if the correspondin...
Rtap is an interactive test program that drives the RSVP daemon through the RSVP API. Rtap may be used either as a standalone application, or it may be linked directly into the RSVP daemon. Rtap repeatedly displays the command prompt >, and executes each command as it is entered. For the standalone version, -f parameter will execute a stream of commands from the file file_name; at the end of that file, rtap will enter interactive mode. This man page describes the rtap program included with Relea...
rtmon-client connects to the rtmond daemon running on the machine hostname and collects event data for one or more CPUs. This event data can be displayed by programs such as par(1), rtmon-dump(1), and the optional IRIXview(1) product. If event collection is done for an unspecified period of time (see the -t option below) then rtmon-client will collect event data until it is interrupted.
rtmon-dump prints binary event data collected from an rtmond(1) server process using rtmon-client(1) or padc(1). Data can be read from a file or from the standard input. By default, rtmon-dump displays all interesting events found in a file using the same format as par(1). Various options are provided for filtering which events are printed and how they are displayed.
rtmon-run is used in conjuction with rtmon-client(1) to collect system call and context switch events from a remote machine. rtmon-run marks one or more processes for system call and context switch event tracing and then pauses waiting for an interrupt or a time limit to expire. If no processes are specified on the command line, the entire system is monitored. Event collection must be done separately; typically from another machine with the rtmon-client application. rtmon-run must be run on the ...
rtmond is the server process that collects system and user events and dispatches them to clients such as padc(1), IRIXview(1), and rtmon- client(1). In normal operation, rtmond is atomatically started when the system is booted. Only one copy of rtmond can be started per machine. When clients connect to rtmond and request event data, rtmond creates additional children to collect event data from each CPU that event data is being requested for (if such children are not already run...
The rtmpd daemon is a host daemon which manages AppleTalk Routing Table Maintenance Protocol (RTMP) requests. It listens on the well-known RTMP and RTMPReq sockets. On machines with one Ethernet interface, it advertises the presence of the local pseudo-network. On machines with more than one interface, rtmpd advertises the networks on the other interfaces. Killing rtmp with a SIGUSR2 will cause it to dump its table of networks in /usr/adm/appletalk/at_log. -D Causes rtmpd to run in the foregroun...
Rtquery is used to query a RIP network routing daemon, routed(1M) or gated(1M), for its routing table by sending a request or poll command. The routing information in any routing response packets returned is displayed numerically and symbolically. Rtquery by default uses the request command. When the -p option is specified, rtquery uses the poll command, an undocumented extension to the RIP specification supported by gated(1M). When querying gated(1M), the poll command is preferred over the Requ...
The run-proclaim shell script is called during system startup from /etc/rc2 to obtain (or verify) an IP address and host configuration parameters. The script is called during system shutdown from /etc/rc0 to gracefully kill the proclaim(1) client. The arguments to run-proclaim are: start Do the following, using the configuration flags described below: o Kill any existing proclaim clients. o Run the proclaim client with the -i option to verify an existing lease if one exists and obtain a new addr...
runacct is the main daily accounting shell procedure. It is normally initiated via cron. runacct processes connect, fee, disk, and process accounting files. It also prepares summary files for prdaily or billing purposes. runacct takes care not to damage active accounting files or summary files in the event of errors. It records its progress by writing descriptive diagnostic messages into active. When ...
runcatalog runs a system administration manager. catalog-descriptor is a catalog descriptor file that contains a specification of the library that implements the manager and any privileges needed by the manager. Catalog descriptor files contain the pathname to the DSO that implements the catalog, the pathname to the DSO that implements the status panel for the object type monitored by the catalog, and a title, description, and list of keywords for the catalog....
runexec Runs the executable described by executable-descriptor, which is an executable descriptor file. The purpose of an executable descriptor file is to specify certain auxiliary information about a program that can by used by the System Manager (sysmgr(1M)). If operand is specified, it is passed on the command line to the executable described in executable-descriptor.
runon executes command, assigning it to run only on cpu n, where n varies between 0 and the number of processors on the system minus one. (For single-processor systems, then, there is only cpu 0.) This cpu affinity is inherited across fork() and exec() system calls. A sysmp(2) call can change the cpu affinity. Note that command may still run on other processors, briefly, to perform i/o or other hardwarespecific actions. runon can not run a command on a cpu that is part of a cpuset unless the use...
runpanel runs a system administration status panel. A status panel displays the status for an object on the system such as a user account. catalog-descriptor is a catalog descriptor file that specifies which class of system administration objects the status panel is for. object specifies which object in that class to display.
runpriv checks to see if you have been granted privilege, and if so it runs the command privilege found in the directory /usr/sysadm/privbin with the remaining arguments. runpriv succeeds if any one of following conditions are met: 1. You are running as root. 2. There is no root password on the system. 3. The file /var/sysadm/defaultPrivileges/privilege exists and has the string "on" as its first line (see defaultPrivileges(4)). 4. There is an entry in the privilegedUsers(4) database granting ...
runtask runs a system administration active guide specified by task- descriptor. Task descriptor files are located in /usr/sysadm/taskdf, and specify the library that implements the task, the privileges it requires, and a task name, description, and keywords used for the search feature in System Manager (sysmgr(1M)). Active guides typically use runtask(1M) to implement their actions.
Rup gives a status similar to uptime for remote machines; it broadcasts on the local network, and displays the responses it receives. Normally, the listing is in the order that responses are received, but this order can be changed by specifying one of the options listed below. When host arguments are given, rather than broadcasting rup will only query the list of specified hosts. Any sorting options are ignored in this case. A remote host will only respond if it is running the rstatd daemon, whi...
Ruptime gives a status line like uptime for each machine on the local network; these are formed from packets broadcast by each host on the network every three minutes. Machines for which no status report has been received for 11 minutes are shown as being down. Users idle an hour or more are not counted unless the -a flag is given. Normally, the listing is sorted by host name. The -l , -t , and -u flags specify sorting by load average, uptime, and number of users, respectively. The -r flag rever...
The rusers command produces a listing of users on remote machines. It broadcasts on the local network, and prints the responses it receives. Normally, the listing is in the order that responses are received, but this order can be changed by specifying one of the options listed below. When host arguments are given, rather than broadcasting rusers will only query the list of specified hosts. The default is to print out a listing with one line per machine. When the -l flag is given, a who(1) style ...
Rwall reads a message from standard input until end-of-file. It then sends this message, preceded by the line ``Broadcast Message ...'', to all users logged in on the specified host machines. With the -n option, it sends to the specified network groups, which are defined in netgroup(4). A machine can only receive such a message if it is running rwalld(1m), which is normally started up by the daemon inetd(1m)....
Rwalld is a server that handles rwall(1) and shutdown(1) requests. It is implemented by calling wall(1) to all the appropriate network machines. The rwalld daemon is normally invoked by inetd(1M).
The rwho command produces output similar to who, but for all machines on the local network. If no report has been received from a machine for 5 minutes then rwho assumes the machine is down, and does not report users last known to be logged into that machine. If a user hasn't typed to the system for a minute or more, then rwho reports this idle time. If a user hasn't typed to the system for an hour or more, then the user will be omitted from the output of rwho unless the -a flag is given....
Rwhod is the server which maintains the database used by the rwho(1C) and ruptime(1C) programs. Its operation is predicated on the ability to broadcast or multicast messages on a network. Rwhod is started at system initialization if the configuration flag rwhod is set ``on'' with chkconfig(1M). Site-dependent options and arguments to rwhod belong in the file /etc/config/rwhod.options. Rwhod operates as both a producer and consumer of status information. As a producer of information it periodic...
The Service Access Controller (SAC) is the overseer of the server machine. It is started when the server machine enters multiuser mode. The SAC performs several important functions as explained below. Customizing the SAC environment. When sac is invoked, it first looks for the per-system configuration script /etc/saf/_sysconfig. sac interprets _sysconfig to customize its own environment. The modifi...
sact informs the user of any impending deltas to a named SCCS file. This situation occurs when get(1) with the -e option has been previously executed without a subsequent execution of delta(1). If a directory is named on the command line, sact behaves as though each file in the directory were specified as a named file, except that non-SCCS files and unreadable files are silently ignored. If a name of - is given, the standard input is read with each line being taken as the name of an SCCS file to...
sar, in the first instance, samples cumulative activity counters in the operating system at n intervals of t seconds, where t should be 5 or greater. If the -o option is specified, it saves the samples in file in binary format. The default value of n is 1. In the second instance, with no sampling interval specified, sar extracts data from a previously recorded file, either the one specified by -f option or, by default, the standard system activity daily data file /var/adm/sa/sadd for the current...
satconfig is a graphical user interface to saton(2), satoff(2), and satstate(2). It provides equivalent functionality to sat_select(1M). satconfig is fully self documenting. From the right hand corner of the menu bar, choose the help pull down. Choose Help Using Program for a complete explanation of the graphical user interface. Choose Help Choosing Events for one line descriptions of each audit event. SEE ALSO, sat_select(1M), saton(2), satoff(2), satstate(2). PPPPaaaaggggeeee 111...
satd saves its input data in the directories and/or files named in its path arguments. When one output path becomes full, satd replaces the current output path with a path that is not full. The method of replacement is configurable with the -r option. The output path is also replaced if satd receives a SIGHUP signal, for instance one sent with a kill -1 command. If an output path becomes nearly full, warnings are displayed to the system console to notify the administrator to move the audit trail...
sat_echo inserts the data from its standard input into the system audit trail. (Only the first 65535 bytes of standard input are used; the rest are discarded.) Use sat_echo in shell scripts that enforce security policy and must generate audit records.
sat_interpret takes binary audit records from standard input or optionally a file and prints the records to standard output in English. The auditing subsystem was changed with Irix 6.5, and audit records written on Irix 6.5 or later systems are shown in a different format than records that were written under previous release levels of Irix. To illustrate the output format of sat_interpret, the following is an example of an Irix 6.5 audit record: sat_open_ro,Success TIME = (09/23/1998,15:18:18) S...
sat_reduce examines an input stream of binary audit data, selects records that match the criteria specified by its run time arguments, and prints the chosen records in binary to standard output.
sat_select directs the system audit trail to collect records of a particular idtype describing certain events and to ignore records describing certain other events. Note that if no idtype is specified, then the events will be default to global event mask. sat_select with no arguments lists the audit events currently being collected. The effect of multiple executions of sat_select is cumulative. The auditable event types are described in the IRIX Admin: Backup, Security, and Accounting. For a bri...
sat_summarize prints a statistical summary of the audit trail to the standard output device. Data is displayed either when end of file is reached on input or when sat_summarize receives the SIGUSR1 signal. Run time options determine the format of the printout and which statistics are presented.
savecore is meant to be called by /etc/rc2.d/S48savecore. savecore attempts to save the core dump of the system (assuming one was made) and write a reboot message in the shutdown log. The S48savecore script will save all output files to dirname, which defaults to /var/adm/crash, unless overridden by site-specific command-line options in the file /etc/config/savecore.options. In the event of a software-detectable system crash, one of the last steps that the kernel performs before shutting down is...
Sccs is a front end to the SCCS programs that helps them mesh more cleanly with the rest of UNIX. It also includes the capability to run ``set user id'' to another user to provide additional protection. Basically, sccs runs the command with the specified flags and args. Each argument is normally modified to be prepended with ``SCCS/s.''. Flags to be interpreted by the sccs program must be before the command argument. Flags to be passed to the actual SCCS program must come after the command a...
sccsdiff compares two versions of an SCCS file and generates the differences between the two versions. Any number of SCCS files may be specified, but arguments apply to all files. -rSID? SID1 and SID2 specify the deltas of an SCCS file that are to be compared. Versions are passed to bdiff(1) in the order given. -p pipe output for each file through pr(1). -sn n is the file segment size that bdiff will pass to diff(1). This is useful when diff fails due to a high system load....
SceneViewer is a program for viewing and interacting with Inventor scene graph files (the SGI 3D file format standard). SceneViewer was written to demonstrate Inventor features, and serves as the basis for the IRIS Explorer Render Module. When SceneViewer is run, a window appears containing the Inventor examiner viewer and a menu bar. The viewer allows the user to interactively change the view of the scene through direct manipulation, or indirect slider and push button controls. The menu bar con...
The schemebr panel allows the user to select a new color scheme in which subsequently launched window applications will appear. It also lets users create new color schemes. The panel can be launched from a Unix shell command line, or from the toolchest (Desktop > Customize > Color Schemes). Like most other customization panels, the schemebr panel has the ``runonce'' feature, meaning only one instance of the application will run at one time. Attempting to launch the application a second time wi...
Script makes a typescript of everything printed on your terminal. The typescript is written to file, or appended to file if the -a option is given. It can be sent to the line printer later with lp. If no file name is given, the typescript is saved in the file typescript. The script ends when the forked shell exits. This program is useful when using a crt and a hard-copy record of the dialog is desired, as for a student handing in a program that was developed on a crt when hard-copy terminals are...
scsiadminswap allows a user to live plug or unplug a scsi device assuming it is not a primary resource (such as the system disk). There are three required options. These indicate whether to perform a plug or an unplug and provide a bus and device number. An additional argument can be used to change the default timeout value. To execute scsiadminswap, a user must have root status. There are many different ways that a disk may be accessed. While this man page outlines and gives examples of the mor...
scsicontrol may be used to print info from the SCSI inquiry commands, which normally indicate the device type, manufacturer, and similar info. Other options may be used show more data, or to issue commands that control the operation of the device, or the bus as a whole. By using the debug option (-d), the exact command sent, and the data returned (if any) is displayed, along with more extensive error information. The device(s) may be specified without the normal /dev/scsi prefix, if desired. -C ...
The first form is used to dump failover status, while the second and third are used to initiate failover. The device-name required when performing a failover should be that of the a disk (raw or block) or a devscsi device associated with the primary path of the group the failover is being attempted on. The difference between the -s and -t options is that the former will choose paths that do not require a controller tresspass in preference to paths that do, while the latter will choose the next p...
scsiha is used to perform operations on fibrechannel loops of SCSI devices and parallel SCSI buses. The following options apply to both parallel SCSI and fibrechannel SCSI: -p Probe for devices on the bus or loop. On parallel SCSI buses, this option causes the driver to look for devices at every ID on the SCSI bus. On fibrechannel SCSI loops, this option causes the driver to look for devices at every ID that was reported in use at the most recent loop initialization. On parallel SCSI buses, when...
scsiquiesce is used to stop all operations on a SCSI bus for a specific amount of time. Ctrl-C kills the quiesce. You can extend the quiesce time by pressing the Enter key and inputting additional quiesce time. When the quiesce completes, the bus is rescanned for new devices. The options are: -q bus_quiesce_time Quiesce time in seconds. This required option informs the low level SCSI driver how many seconds to quiesce the bus for. -t quiesce_in_progress_timeout How long the low level driver shou...
sdiff uses the output of diff(1) to produce a side-by-side listing of two files indicating those lines that are different. Each line of the two files is printed with a blank gutter between them if the lines are identical, a < in the gutter if the line only exists in file1, a > in the gutter if the line only exists in file2, and a | for lines that are different. For example: x | y a a b < c < d d > c The following options exist: -w n Use the next argument, n, as the width of the output line. The ...
sdpd listens for multicast announcements on the network (as observed by the server), maintains an updated list of these announcements, and makes them available to clients through the use of the .sdr mime type suffix. sdpd also maintains a list of locally created announcements, broadcasting the information periodically. The sdpd server supports Mbone announcements of type SPD V1, SPD V2, and SGI Radio....
sdr-launch is a HTTP helper application that is launched on the client system through the use of the .sdr mime typeextension. This application parses the session directory announcement sent by the Web Server and after consulting the transformations file (mbone-fmt.txt) launches the appropriate media tool for audio, video, whiteboard announcements.
The searchbook (or search tool) contains named pages on which users can create queries to find files. The user can launch searchbook from the toolchest (Find > Search For Files) or at a Unix shell command line. This application has the ``runonce'' feature, meaning only one instance of the application will run at one time. Attempting to launch the application a second time will have the effect of deiconifying the application window or popping it to the top on the current desk. The options have ...
This command tries to improve the security of the system by modifying parameters that affect the security of the system. They include disable or enable Java and/or JavScript for user accounts, add password, lock or delete user accounts, remove NIS accounts, lock out an account if it has no password, use shadow password, turn off graphical login (clogin(1)), disable the use of privilege accounts on system adminitration tools (see PrivilegeManager(1M)), disable the display of windows of remote sys...
sed copies the named files (standard input default) to the standard output, edited according to a script of commands. The -e option causes the script to be take from the script option argument. The -f option causes the script to be taken from file script_file. The scripts from the -e and -f options accumulate. If there is just one -e option and no -f options, the flag -e may be omitted. The -n option suppresses the default output. sed has two operating modes. By default, sed operates compatibly ...
Sendmail sends a message to one or more recipients, routing the message over whatever networks are necessary. Sendmail does internetwork forwarding as necessary to deliver the message to the correct place. Sendmail is not intended as a user interface routine; other programs provide user-friendly front ends; sendmail is used only to deliver pre-formatted messages. With no flags, sendmail reads its standard input up to an end-of-file or a line consisting only of a single dot and sends a copy of th...
Managers display information about your system and provide access to interactive guides (also called tasks) that let you administer your system. For example, the User Manager displays a list of the user accounts currently on the system and gives you access to guides like "Add a User Account" and "Modify a User Account." In a Manager window, you can open a guide by choosing its name from the Task menu or by clicking its button at the bottom of the window. The serial device manager displays an...
sesdaemon is a daemon which allows communication with attached fibre channel drive enclosures; status is collected and re-configuration is allowed. The low-level transport protocol is the industry standard SES (SCSI-3 Enclosure Services). See sesmgr(1M) for details. The sesdaemon is normally started automatically during boot if sesdaemon is chkconfig'ed on. One process containing 4 threads is started for each instance of sesdaemon; the backend polling thread which handles polling the drive encl...
The sesmgr command is a user front end to sesdaemon which collects status of all supported fibre channel enclosures and allows for configuration changes.
The setAudioDevice program sets the SoundScheme audio output device. Applications that play sounds through SoundScheme (for example, the IRIX Interactive Desktop software) will be affected. This program is not intended to be run by end users. If no argument is given, then SoundScheme sounds will be made to play through the Default Output as set on the audiopanel(1) control panel. If a non-negative integer argument whichDevice is specified on the command line, then SoundScheme sounds will be play...
setdevperms adds or removes entries from the /etc/ioperms file. If the line exists in the file then it is not added. If the line to delete exists more then once in the file then all occurrences are deleted. When deleting a line leading and trailing white space is NOT ignored. Any line to add or delete must start with "/dev" or "#". There are no other syntax checks performed on lines added or removed. Multiple lines can be added and removed at the same time by specifying multiple instances of...
setDiskParts changes the partion table in a disk's volume header. The setDiskParts privcmd is used by Tasks which need to change partition information, since root permission is required to write to the disk's volume header. This privcmd should not be called directly from the command line. fx provides a much more robust user interface for accomplishing the same operations.
setlogopt is a privileged command that sets options that control system administration logging. rotsize is the size in bytes that the log file /var/sysadm/salog is allowed to reach before it gets rotated to /var/sysadm/oldsalog. If -syslog is specified, messages in /var/sysadm/salog will be copied to syslogd(1M). -nosyslog turns off the copying of messages to syslogd.
setmnt creates the /etc/mtab table, which is used by the mount(1M) and umount commands, among others. If given the -f option, it creates an alternate mtab. setmnt reads standard input and writes an entry in mtab(4) format for each line read. Input lines have the format: fsname dir where fsname is the name of the filesystem's special file (for example, /dev/dsk/dks?d?s?) and dir is the mountpoint of that filesystem. Thus, fsname and dir become the first two strings in the mount table entry....
setmon changes the video output format to the one specified; it also specifies the default video format to be used at system power-up or graphics initialization. You must set the DISPLAY environment variable to the local machine (e.g. :0.0) so that any GL calls that setmon makes will occur on the local machine, and not over a network interface. If none of (-n, -x, -w) options are specified on the command line, then setmon will prompt for input to determine whether the format being loaded should ...
setNameServers is a privileged command that edits /etc/resolv.conf to contain the nameserver entries specified on the command line. After setNameServers runs, the only nameserver entries in /etc/resolv.conf will be those that were specified on the command line. Thus, if no nameserver entries are specified, all nameserver entries in /etc/resolv.conf will be removed. Between 0 and 3 nameservers can be specified on the command line....
setPowerSaver checks to see if the system's monitor supports the powersave option. If it is supported, setPowerSaver sets the powersave to a default of 1200 seconds (20 minutes). This program is intended to be run whenever the user logs into the system and has not (yet) chosen a custom screensaver. The Xsession.dt file executes setPowerSaver automatically; the program is not intended to be run on the command line by end users. If it is run in this way, it will simply reset the powersave timeout...
setsym reads in the symbol table of the file filename and writes it back into an internal symbol table that is part of the filename .data section. The input file is intended to be a debug kernel. This internal symbol table is used by symmon(1M) for symbolic debugging of the kernel. Normally, filename is unix or unix.install. The -d flag Dump symbols from already processed file. The -e flag includes ELF symbols only (default is ELF & DWARF). Additional error messages can be seen with the -v flag....
settime sets the access and modification dates for one or more files. The dates are set to the specified date, or to the access and modification dates of the file specified via -f. Exactly one of these methods must be used to specify the new date(s). The first mm is the month number; dd is the day number in the month; hh is the hour number (24 hour system); the second mm is the minute number; yy is the last two digits of the year and is optional. For example: se<...
setupMacPrinters is a privileged command that installs a printer connected to a Macintosh or a NetWare server. After the installation, the installed printer can be administered by the Printer Manager and will work like a general printer connected to an SGI machine. The Macintosh or NetWare server needs to be on the same network as the SGI machine. The printerInfo string includes all the configuration information needed in the installation. If it is a Macintosh printer, printerInfo should have an...
The setxkbmap command maps the keyboard to use the layout deterined by the options specified on the command line. An XKB keymap is constructed from a number of components which are compiled only as needed. The source for all of the components can be found in /usr/lib/X11/xkb.
The setxkeymap command maps all of the keys on the keyboard to use the layout specified in a keymap file; keymap files normally have a .xkm extension. The directory /usr/lib/X11/input/PC contains about a dozen keymaps for the Indy and Indigo^2, while /usr/lib/X11/input/SGI contains keymaps for all older machines. In IRIX5.1 and later, the directory /var/X11/input is symbolically linked to the appropriate machine dependent directory. If the specified keymap file is not found, setxkeymap tries add...
set_vacation creates a default vacation message for when you will be away from the office and sets up the .forward file to activate the vacation program. set_vacation will launch the jot editor to allow you to customize the message sent to users when you are gone and sets a default interval of 7 days. PPPPaaaaggggeeee 1111
sfconvert converts a soundfile to another soundfile of a different file format or data format. If invoked with no arguments, sfconvert displays help. The default conversion is to the same format. So, the following invocation: sfconvert in.snd out.snd Is basically like "cp in.snd out.snd," except that it will not copy comments or undocumented chunks found in the input file to the output file. If invoked with a pair of filenames and some output keywords, sfconvert will attempt to open 'infile'...
sfinfo reports information about the soundfile(s) specified. If invoked with no arguments, it will display help. If invoked like: sfinfo flute.aif It will give you info in the format: Filename: flute.aif File Format: Audio Interchange File Format (aiff) Size: 32100 sample frames, 0.73 seconds, 64.6 Kbytes. Format: 1 channel 16-bit integer (2's complement, big endian) file. Sampling Rate: 44.100 kHz. Data begins at offset 402 (192 hex). If you specify the -short (-s) option, sfinfo reports infor...
These keywords are used in situations where information about a soundfile format is needed, such as in sfconvert: sfconvert in.snd out.aif format aiff integer 16 2 chan 2 Specifies a stereo, 16-bit (2's complement signed) integer aiff file. Note that some keywords, such as 'integer', require parameters. These parameters can also be abbreviated, except for the parameter of the 'format' keyword. The 'format' keyword specifies the file format. Currently supported file formats are: aiff Audio...
sfplay plays the given soundfile(s). It will play files in many formats not supported by the audio hardware, by automatically converting the data as it is played. If invoked with no arguments, sfplay will display help. By default, sfplay ignores any file specified that is not a valid soundfile, reporting no error. The -reporterror (-r) option tells sfplay to report an error in this case. It is often useful to see information about soundfiles as they are played. The -printinfo option prints this ...
sgihelp is an online help viewer. This viewer provides an easy-to-use interface which allows the user to browse through help information that is distributed from Silicon Graphics. sgihelp is based on the insight(1) on-line viewing technology. The content for the help information that is displayed is derived from the insight(1) books. sgihelp is an application that gets started only when a request is made for "help". A user should never have to start sgihelp from the commandline, unless it is u...
sgimeeting is a desktop collaboration tool that allows for data conferencing between IRIX desktops and other T.120 compliant applications such as Microsoft NetMeeting and PictureTel LiveShare Plus. sgimeeting provides T.128 application sharing, T.127 file transfer, T.126 whiteboarding, and Microsoft NetMeeting proprietary whiteboarding, chat and shared clipboards. The sgimeeting program contains extensive online help and user guide. Please read the SGImeeting online User's Guide available from ...
Build the .so using the -shared option to ld or cc. Make sure that the build line references all libraries that are needed by the extension library; for example, Tk requires "-lX11 -lc -lm". Adding the -no_unresolved flag will ensure that there are no unresolvable symbols which will probably save you time later. Many of the TCL packages come with a makefile that builds a .a archive which can be given to ld to build the shared object. If not, you'll need to identify what object files need to b...
sgi_use_anyaddr executes command with the reserved range of the virtual address space (from 0x30000000 to 0x40000000) disabled. Normally, the kernel does not auto-place mappings made by mmap(2) and shmat(2) in the reserved range. By disabling the reserved range with sgi_use_anyaddr, the kernel is permitted to use any available virtual address for mapping requests made by command. sgi_use_anyaddr is implemented by invoking syssgi(2) with request parameter...
Note: As of IRIX 6.4, sh is the Korn shell rather than the Bourne shell. See bsh(1) for the Bourne Shell description. See the COMPATIBILITY ISSUES section below for more detail. sh is a command and programming language that executes commands read from a terminal or a file. /usr/lib/rsh is a restricted version of the standard command interpreter sh; it is used to set up login names and execution environments whose capabilities are more controlled than those of the standard shell. S...
sharefinder displays a user interface for accessing shared resources on remote workstations. Three catagories of information are displayed: shared directories, shared removable media devices, and shared printers. The list of shared directories is obtained from the getExportList(1M) privileged command. getExportList uses the mountd(1M) protocol to query the remote workstation for its shared directories. The list of shared removable media devices is obtained from mediad(1M) running on the remote w...
The Shared Resource Manager displays the directories, removable media devices, and printers on your workstation that are shared over the network with other workstations. The directories displayed by sharemgr are those which have been exported via nfs using the exportfs(1M) command. The removable media devices are those which have been shared via mediad(1M). Printers are displayed if remote workstations are allowed to print to your printers, which is controlled by the rhosts(4) file for the lp ac...
sharePrinters is a privileged command that enables the sharing of local printers by editing the .rhosts file for the "lp" user account. When "lp" on one IRIS can rlogin(1C) to the "lp" account on another IRIS, the first IRIS can then forward print jobs to the second IRIS. When the -all option is used, /var/spool/lp/.rhosts is edited to contain one line with the single character '+'. This enables remote access for all hosts. When the -hosts option is used, /var/spool/lp/.rhosts is edited ...
shareRemovableMedia is a privileged command that shares a removable media device with other systems on the network. After running shareRemovableMedia, device will be accessible via mediad(1M) on remote workstations.
Share_inst , client_inst , and clone_client are tools that install the system software for diskless workstations. Share_inst installs the portion of the IRIX operating system that diskless workstations can share. This shared software is known as the share tree. A share tree can contain only one IRIX release; a separate share tree must be installed for each additional IRIX release that clients require. Client_inst installs the software that is used exclusively by an individual diskless client. Th...
Share_setup , client_setup , and verify are tools that help create proper configuration files for diskless installation. Configuration files are fed into share_inst(1M), client_inst(1M), and clone_client(1M) so that installation tools will know the hardware information for the machines that will act as diskless clients. Share_setup allows a user to interactively create a configuration file for a share tree while client_setup allows the same for a client tree configuration file. Verify is a progr...
IRIS Showcase is a mixed media presentation system. It's very useful for creating interactive or printed presentations, short documents, onlinehelp systems and much more. Showcase allows you to integrate 2D drawings, text, raster images, 3D models, and audio. By default, showcase displays a blank page, the Master Gizmo and the Status Gizmo. The Master Gizmo has a palette of objects that can be created on the page. These objects include text, 3D scenes, images, audio, filled and unfilled rectang...
showfiles is a tool used to list files belonging to installed software products. The -f option can be used to list files in a software distribution packaged in the inst(1M) archive format. Current command-line options are: product List only files belonging to the given product(s). -- file List only files matching the specified file expression(s), which must follow the -- argument. Filename expressions are those described in regexp(5), with special treatment of the asterisk * and period . charact...
Showfont displays data about the font that matches the given pattern. The wildcard character "*" may be used to match any sequence of characters (including none), and "?" to match any single character. If no pattern is given, "*" is assumed. The "*" and "?" characters must be quoted to prevent them from being expanded by the shell.
showmount lists all the clients that have remotely mounted a filesystem from host (or the local host if host is not given). This information is maintained by the mountd(1M) server on host, and is saved across crashes in the file /etc/rmtab.
showprods is a tool used to list products installed, previously installed, or present on a distribution. The prods arguments specifies which products are to be listed. If no products are specified, all products are listed. showprods lists only products listed in the database used by the inst or swmgr commands. The command line options are: -a List all products, not just products currently installed (default is to list only installed products). -D depth List products down to the specified depth (...
The showrgb program reads an rgb color-name database compiled for use with the dbm database routines and converts it back to source form, printing the result to standard output. The default database is the one that X was built with, and may be overridden on the command line. Specify the database name without the .pag or .dir suffix.
This command is executed by the superuser to change the state of the machine. By default, it brings the system down into the PROM monitor. The command sends a warning message and a final message before it starts actual shutdown activities. By default, the command asks for confirmation before it starts shutting down daemons and killing processes. The options are used as follows: -y Pre-answers the confirmation question so the command can be run without user intervention. A default of 60 seconds i...
sid displays the array session handle and the project ID and name of the array session that the current process belongs to. -a Reports only the array session handle of the current array session, printed as a 16-digit hexadecimal number preceded by "0x". -p Reports only the project ID of the current array session. -P Reports all of the project IDs for which the current user is authorized, each separated by a space. -n Reports project names instead of numeric pro...
sitemgr.cgi allows access to sitemgr(1) data through a HTTP web server. Installing sitemgr.sw.server places links into the default CGI root (/var/www/cgi-bin/), which will enable sitemgr(1) to access the web site through it's interface. sitemgr.cgi should not be executed standalone, but should be used in conjunction with the sitemgr(1) client.
sitemgr.cgi allows access to sitemgr(1) data through a HTTP web server. Installing sitemgr.sw.server places links into the default CGI root (/var/www/cgi-bin/), which will enable sitemgr(1) to access the web site through it's interface. sitemgr.cgi should not be executed standalone, but should be used in conjunction with the sitemgr(1) client.
sitestat.cgi allows access to sitemgr(1) log file information through a HTTP web server. Installing sitemgr.sw.server places links into the default CGI root (/var/www/cgi-bin/), which will enable sitemgr(1) to access the site's log file information through the client interface. sitestat.cgi should not be executed standalone, but should be used in conjunction with the sitemgr(1) client.
The size command prints segment or section information in bytes about the various sections or segments of each named ELF object file. Each file can be an object or an archive. When calculating segment information, the size command prints out the total file size of the non-writable segments, the total file size of the writable segments, and the total memory size minus the total file size of the writable segments. If it cannot find segment information, size calculates based on section information....
SlaToIv converts an SLA formatted file into an Open Inventor 2.0 file. Copyright 1993 by Iowa State University. Specifies the name of the SLA file to read and convert. Specifies the name of the Open Inventor file to use for output.
sleep suspends execution for time seconds. It is used to execute a command after a certain amount of time, as in: (sleep 105; command)& or to execute a command every so often, as in: while true do command sleep 37 done
SLIP or SL/IP stands for Serial Line Internet Protocol. It is used to extend a local area network using low speed telephone lines. It can be used to transfer data between machines which are using TCP/IP or UDP/IP. The modems and communications lines used with SLIP are relatively inexpensive, and operate at 2400 to 38,400 bits/second. This makes SLIP appropriate for remote sessions and modest file transfers. The slip program is used to connect to a remote machine. It does everything necessary to ...
slist is used to display a list of all NetWare servers visible on the network. The list of available servers can also be obtained using ls on the /netware directory.
This tool is part of the Samba suite. smbclient is a client that can 'talk' to an SMB/CIFS server. It offers an interface similar to that of the ftp program (see ftp(1)). Operations include things like getting files from the server to the local machine, putting files from the local machine to the server, retrieving directory information from the server and so on.
This tool is part of the Samba suite. smbsh allows you to access an NT filesystem using UNIX commands such as ls, egrep, and rcp. You must use a shell that is dynamically linked in order for smbsh to work correctly.
smcmd allows a user (from the command-line; within a window shell) to publish documents and perform some administrative tasks on a web site that has the proper SiteMgr server extensions (see sitemgr.cgi(1)) installed.
smdbf.cgi initializes a sitemgr(1) database through a HTTP web server. Installing sitemgr.sw.server places links into the default CGI root (/var/www/cgi-bin/), which will enable sitemgr(1) to initialize it's database entirely from the client interface. smdbf.cgi should not be executed standalone, but should be used in conjunction with the sitemgr(1) client; however, it can be used to reinitialize the sitemgr database. Refer to the SiteMgr Release Notes for information....
The smrsh program is intended as a replacement for sh for use in the ``prog'' mailer in sendmail(8) configuration files. It sharply limits the commands that can be run using the ``|program'' syntax of sendmail in order to improve the over all security of your system. Briefly, even if a ``bad guy'' can get sendmail to run a program without going through an alias or forward file, smrsh limits the set of programs that he or she can execute. Briefly, smrsh limits programs to be in the director...
sn0log is run at system boot by /etc/rc2.d/S33sn0start. It displays any messages that were written to one or all CPU board flash PROM logs since the last time a sync mark was written to the log(s). If the -s option is used, a sync mark is automatically written to the log(s). Messages in a CPU board flash PROM log may include analysis data for a prior system crash. The options are: -a Specifies that all CPU board flash PROM logs in the system should be processed. Otherwise, a single hub_mon_devic...
sn0msc performs operations on the Origin and Onyx2 Module System Controllers (MSCs). WARNING: If used improperly, this command may cause system malfunction that is not fixed by system reset or power cycling. See below for more information. There are three basic operations controlled by the flags given: -r Reads the MSC NVRAM contents of a specific MSC device (elsc_nvram_dev) at a specific address (addr) for a specific number of bytes (count, default 1). Output is in hex if the -x flag is given, ...
snetd configures a STREAMS network from a specification given in a configuration file whose format is described in the Configuration section. By default the configuration is taken from the file /etc/config/snetd.options. An alternative file may be specified as a command line argument (config_file). The special filename '-' is taken to mean the standard input. Upon system startup, if the state of the snetd daemon is on, the daemon is started by /etc/init.d/network. You may use chkconfig(1M) to ...
snmpd is a daemon for the Simple Network Management Protocol (SNMP) as specified in Internet RFC 1157, and supports MIB II, as specified in Internet RFC 1213. The daemon, called the SNMP agent, can be configured to run from the network star-tup script at boot time by the command chkconfig snmpd on or started from the command line. You must be superuser (root) to run snmpd. snmpd listens on a udp(7P) socket for the snmp service for SNMP queries. If no such service can be found, a default port of ...
snoop captures packets from the network and displays their contents. snoop uses both the network packet filter and streams buffer modules to provide efficient capture of packets from the network. Captured packets can be displayed as they are received, or saved to a file for later inspection. snoop can display packets in a single-line summary form or in verbose multi-line forms. In summary form, only the data pertaining to the highest level protocol is displayed. For example, an NFS packet will h...
SoftimageToIv converts 3D model files in Softimage version 2.6 model (.hrc) format into Open Inventor 2.0 files. Scene files are also handled, the default database settings are used or the database indicated by the -d flag. NURB curves and surfaces, polygons, hierarchy, textures, cameras and lights are converted into equivalent Open Inventor objects. Softimage NURB surfaces are converted into Open Inventor surfaces, which are then tesselated into polygons according to the object complexity setti...
The sort command sorts lines of all the named files together and writes the result on the standard output. The standard input is read if - is used as a filename or no input files are named. Comparisons are based on one or more sort keys extracted from each line of input. By default, there is one sort key, the entire input line, and ordering is lexicographic by bytes in machine collating sequence. sort processes supplementary code set characters according to the locale ...
soundeditor provides a graphical interface for recording, playing and editing AIFF format soundfiles. Features include: - Realtime audio recording and playing - Tape recorder-style transport controls - Graphical audio waveform display - Cut & paste editing of audio data - Fade-in and out, level, echo, pitch and reverse effects - Undo/redo for editing operations For more detailed instructions on using soundeditor, access the on-line help facility via the "Help" menu item on the right side of th...
soundplayer is a simple-to-use application which plays sound files using the built-in audio hardware. soundplayer also plays Standard MIDI Files to an external MIDI sound module or the Silicon Graphics MIDI synthesis software (see midisynth(1)). The following sound/MIDI file formats are supported: AIFF (.aiff) and AIFF-C (.aifc) Sun/NeXT (.au, .snd) Microsoft RIFF WAVE (.wav) MPEG-1 layer I, II audio bitstreams (.mpa, .mpg, .mp2) Sound Designer II BICSF (IRCAM) Audio Visual Research (.avr) Amiga...
soundscheme is an X-based server daemon which provides high-level audio playback services for applications. Based on the audio and audiofile libraries, soundscheme mixes and plays sounds on demand as requested by multiple client programs using a single audio port. Each client may provide an X resource file which specifies a palette of sound names and the mappings of these names to soundfiles. Named sounds are activated within applications using function calls from the daemon's client library. T...
SoundTrack is a graphical application for recording, editing and processing up to 32 tracks of audio. SoundTrack can be used to create multi-element soundtracks for movies, commercials, and web pages. A wide variety of soundfile formats is supported for import/export and cut/paste. Also, SoundTrack allows pre-mastering of digital audio tapes via the export-to-DAT feature. For more detailed instructions on using soundtrack, access the on-line help facility via the "Help" menu item on the right ...
SpeedShop works under IRIX 6.2, or later, and supports executables compiled with the IRIX 6.2 compilers (o32, n32 and 64), or with the MIPSPro 7.x compilers (n32 and 64). SpeedShop supports C, C++, FORTRAN, ADA, and asm programs. Programs must be built using shared libraries (DSOs); nonshared or stripped executables are not supported.
Spell collects words from the named documents, and looks them up in a spelling list. Words that neither occur among nor are derivable (by applying certain inflections, prefixes or suffixes) from words in the spelling list are printed on the standard output. If no files are named, words are collected from the standard input. Spell ignores most troff, tbl and eqn(1) constructions. Under the -v option, all words not literally in the spelling list are printed, and plausible derivations from spelling...
The diagnostics Pragma This module extends the terse diagnostics normally emitted by both the perl compiler and the perl interpeter, augmenting them with the more explicative and endearing descriptions found in the perldiag manpage. Like the other pragmata, it affects the compilation phase of your program rather than merely the execution phase. To use in your program as a pragma, merely invoke use diagnostics; at the start (or near the start) of your program. (Note that this does enable perl's ...
split reads an input file and writes it in one or more output files. The default size of each output file is 1000 lines. The size of the output files can be modified by -b and -l options. Each output file is created with a unique suffix. The suffix consists of exactly suffix_length lower-case letters from locale. The letters of the suffix are used as if they were a base-26 digit system, with the first suffix to be created consisting of all a characters, the second with...
spoolserv responds to queries via its own protocol used to monitor and manipulate print queues. Currently the only client application is "Queue Master" for the Macintosh. This client allows users to check on jobs and move jobs between print queues, and remove jobs. The -a -u and -g options control administrator access. Administrator access allows users to manipulate jobs that they did not queue, as well as start and stop the queues. If the -a option is given, all users have administrator acces...
spray sends a one-way stream of packets to host using RPC, and then reports how many were received by host and what the transfer rate was. The hostname can be either a name or an Internet address.
squeeze will allocate a region of its virtual memory of a size given by its arguments, and lock that virtual memory down into real memory, thus making it unavailable to other processes. It can only be used by the superuser. The amount of memory locked is specified as an integer argument, in units given by the flag argument. By default it is in megabytes (-m flag). A flag of -p, implies that the amount is in pages; a flag of -k implies that the amount in kilobytes; and a flag of -% implies a perc...
The srchtxt utility is used to display all the text strings in message databases, or to search for a text string in message databases [see mkmsgs(1)]. These databases are files in the directory /usr/lib/locale/locale/LC_MESSAGES [see setlocale(3C)], unless a file name given with the -m option contains a /. The directory locale can be viewed a...
The ssaver customization panel allows the user to toggle the screen saver on or off, demo the available screen savers, and choose a new screen saver. In IRIX 6.2 and later releases, it also lets the user configure the power saver option available on some systems. This customization panel does not control the power saver settings that take effect when no one is logged into the console. To change these, edit (as root) the /usr/lib/X11/xdm/Xlogin file. See the xdm(1) reference page for more informa...
sscord is a tool designed to allow a user to explore the working set behavior of an executable or shared library (DSO), and to construct a feedback file for use by cord to generate an executable with improved working-set behavior. sscord reads the executable or DSO given by executable, and generates a function list from it. It can import individual working-sets or the sets named in a working-set-list file; it can also import an existing order (feedback file). It shows the list of working sets, a...
ssdoallexp is a noship script will successively run ssdoexp using all of the supported experiments on the target executable with the provided arguments.
ssdoexp is a noship script will run ssrun with the given experiment name, on the given executable, with its stout and stderr directed to a file named OUT.. It assumes that any executables needed have been built in the current directory, and will clean out any files with names that it might use for output. After the target runs, ssdoexp will check for a core dump, and, if found, will append a cvdump suummary of the crash to the file, as well as save the core file. Then, it will then run ...
ssdump prints out the formatted contents of one or more SpeedShop performance experiment data files. Each of the files consists of a string of "beads", or count-key-data records. If any of the named files contain beads indicating additional data files, from descendant processes of the original run, those files will also be dumped. Options are used to control the printing of the files. -d Print detailed information for each bead. For compressed beads, the compressed form will be dumped. -D Prin...
ssorder is a tool designed to allow generation of a cord feedback file from the executable or DSO and a list of working set files, and weights, derived from measurements. ssorder is a command-line version of sscord; it generates identical feedback files, but can be run from a script. The theory and strategy for the computations involved is described in the man page for sscord(1), q.v.
Note: The version of ssperf in this release is not functional. PLEASE DO NOT USE. Use prof instead. ssperf presents a graphical display of the performance data gathered in a SpeedShop Performance experiment(s) whose output data is given by the command line arguments. The main window has a Experiment and status component, a Function List component, and a TimeLine component. The Experiment and Status-simply states the task or objective that the user selected for this experiment. The Function List-...
ssrun is used by the SpeedShop performance tools to establish the environment to capture performance data for an executable, and create a process from the executable (or an instrumented version), and then run it. When performance data is collected, it is written to a file whose name is of the form .. where can be 'm' for the master process created by ssrun, 'p' for a process created by a call to sproc(), 'f' for a process created by a call to fork(), 'e...
ssusage is a SpeedShop executable that runs a process from the given command and arguments, and prints out a summary of the resources used during the run. It is used in exactly the same way as time(1), but prints additional information. The usage information is printed to stderr in the form: 1.89 real, 0.04 user, 0.29 sys, 15 majf, 2 minf, 0 sw, 1 rb, 0 wb, 21 vcx, 38 icx 854, mxrss The real, user, and sys fields give the real-time, user-CPU time, and system-CPU time, respectively. majf gives ma...
sswsextr is a script that will determine how many caliper-points were recorded in the given experiment file, and extract working-set files for each consecutive interval for the named DSO and produce a working-set list file, suitable for processing with sscord or ssorder. DSOname may either be the base executable, or any DSO contained in the executable. The experiment file must be from an ideal experiment. Working set files will be named with the convention: ..ws. where ...
stacker is an administrative utility used to move tapes between a robotic tape library's slots and drive(s). stacker currently supports the Exabyte 10i and 10e, the DLT2500, DLT2500xt, DLT2700, DLT2700xt, DLT4500, DLT4700, the IBM Magstar (3590) and IBM Magstar MP (3570), the SGI DLT7000 autoloader (Minivault), the Fujitsu Computer Products of America (FCPA) M1016/M1017, M2483 and M2488 3480/3490 drives, and all tape robots that conform to the SCSI-2 Medium Changer command set. The device argum...
Startautofs starts the autofs deamon. "chkconfig autofs on" and "chkconfig nfs on" are executed also. The options in /etc/config/autofs.options and in /etc/auto_master are used when starting the deamon.
Startautomount starts the automount deamon. "chkconfig automount on" and "chkconfig nfs on" are executed also. The options in '/etc/config/automount.options' are used when starting the deamon.
The startdesktop utility opens a dirview of the user's home directory. It does not restart the file manager (fm(1)) on the desktop background, however. (Compare with the similar /usr/lib/desktop/telldesktop restart command.) The startdesktop program can be launched from the toolchest (Desktop > Access Files > In my Home Directory). Users can also run it from a Unix shell command line. For more information about the entire IRIX Interactive Desktop environment, see the IID(1) man page....
startgfx turns the windowsystem configuration flag on, and executes the X Display Manager, xdm. stopgfx turns the windowsystem configuration flag off, and terminates the X Display Manager.
Startmidi initializes the serial ports and links them to the MIDI streams driver. startmidi also reports the names of the MIDI interfaces currently configured. stopmidi removes the specified interface. The following options control the startmidi command: -n name Name of the interface. -d device The actual driver this interface will talk to, either a s...
NOTE: The startx script supplied with the X11 distribution is a sample designed more as a base for customization than as a finished product. Site administrators are urged to customize it for their site. And to update this manual page when they do! The startx script is a front end to xinit that provides a somewhat nicer user interface for running a single session of the X Window System. It is typically run with no arguments. To determine the client to run, startx first looks for a file called .xi...
For each argument name, stat(2) that name and display the results. By default, display all the stat(2) attributes. If specific attributes are requested, just display those requested. The options are: -L Use lstat(2) instead. -q Quiet; just print numeric value of displayed attributes, without syntactic sugar, for easier use in shell scripts. -i Show inode number (st_ino). -d Show device (st_dev). -r Show raw device (st_rdev). -l Show link count (st_nlink). -s Show size (st_size). -p Show permissi...
statd is an intermediate version of the status monitor. It implements a simple protocol that allows applications to monitor the status of other machines. lockd(1M) uses statd to detect both client and server failures. statd is started during system initialization if the chkconfig(1M) lockd flag is set on. Applications use RPC to register machines they want monitored by statd. The status monitor maintains a database of machines to track and the corresponding applications to notify of crashes. It ...
When compiling for the old 32-bit ABI (-32), the compilers generate an intermediate language which is separated into binary instructions and debugging information, each constituting a separate file. Use stdump to dump a file containing debugging information which was generated by the compilers. stdump writes to the standard output. The organization of the output is simple but the details of the output are complicated. The detailed output is be defined here. The output of stdump is subject to cha...
Stopppp stops a PPP call of the specified entry name. The call could be started with execppp(1M). -c connName The unique entry name given to this call entry.
strace without arguments writes all STREAMS event trace messages from all drivers and modules to its standard output. These messages are obtained from the STREAMS log driver (log(7)). If arguments are provided they must be in triplets of the form mid, sid, level, where mid is a STREAMS module ID number, sid is a sub-ID number, and level is a tracing priority level. Each triplet indicates that tracing messages are to be received from the given module/driver, sub-ID (usu...
strain is used to extract error messages from a build log. It displays the error and a certain amount of context around it. strain can work on an arbitrary input, but works best with input that has special markers known to strain. For large build logs, strain is an effective tool in determining build success or failure. strain works by folding the log file into 512 character lines and feeding these lines through a nawk(1) script which looks for known error messages patterns. When strain encounte...
strclean is used to clean up the STREAMS error logger directory on a regular basis (for example, by using cron). By default, all files with names matching error.* in /var/adm/streams that have not been modified in the last three days are removed. A directory other than /var/adm/streams can be specified using the -d option. The maximum age ...
strerr receives error log messages from the STREAMS log driver (log(7)) and appends them to a log file. The error log files produced reside in the directory /var/adm/streams, and are named error.mm-dd, where mm is the month and dd is the day of the messages contained in each log file. The format of an error log message is:
The strings command looks for ASCII strings in a binary file. A string is any sequence of 4 or more printing characters ending with a newline or a null character, or (if not in XPG4 mode) any non-printing character. strings is useful for identifying random object files and many other things. The following options are available: -a Look everywhere in the file for strings. If this flag is omitted, strings only looks in the initia...
The strip command removes the symbol table (the section named ".symtab", Elf section kind SHT_SYMTAB) and relocation bits ordinarily attached to the output of the assembler and loader. This is useful to save space after a program has been debugged. Unless option -f is given, only objects marked with ELF type ET_EXEC (the type given to main programs) are stripped. See /usr/include/elf.h for the type codes. The effect of the default strip is similar to use of the -s option of ld. Strip recognize...
stty sets certain terminal I/O options for the device that is the current standard input; without arguments, it reports the settings of certain options. In this report, if a character is preceded by a caret (^), then the value of that option is the corresponding CTRL character (e.g., ``^H'' is CTRL-H ; in this case, recall that CTRL-H is the same as the ``backspace'' key.) The sequence ``^''' means that an option has a null value. For example, normally stty -a will report that the value o...
su allows you to become another user without logging off. The default user name is root (that is, superuser). To use su, you must supply the appropriate password (except as described below). If the password is correct, su executes a new shell with the real and effective user ID set to that of the specified user. The new shell is the program optionally named in the shell field of the specified user's password file entry (see passwd(4)), or /bin/sh if none is specified (see sh(1)). To restore nor...
suattr allows root to execute a command using the given capabilities set and at the given MAC label. suattr is designed primarily for system initialization, to grant commands executed by startup scripts the privileges they need. To use suattr, the real user id must be 0.
sulogin is automatically invoked by init when the system is first started. It prompts the user to type the root password to enter system maintenance mode (single-user mode) or to type EOF (typically CTRL-d) for normal startup (multi-user mode). sulogin should never be directly invoked by the user.
sum calculates and prints a 16-bit checksum for the named file, and also prints the number of blocks in the file. NULL characters (with ASCII value zero) are ignored in computing the checksum. sum is typically used to look for bad spots, or to validate a file communicated over some transmission line. The option -r causes an alternate algorithm to be used in computing the checksum. This alternate algorithm does not ignore NULL characters....
swap provides a method of adding, deleting, and monitoring the system swap areas used by the memory manager. The following options are recognized: -a Add the specified swap resource. name is the name of the block special partition, for example, /dev/dsk/dks0d1s1 or a regular file. Files on NFS mounted file systems are also permitted (see Swapping to NFS Files below). low is the offset in 512-byte blocks into the partition/file ...
Managers display information about your system and provide access to interactive guides (also called tasks) that let you administer your system. For example, the User Manager displays a list of the user accounts currently on the system and gives you access to guides like "Add a User Account" and "Modify a User Account." In a Manager window, you can open a guide by choosing its name from the Task menu or by clicking its button at the bottom of the window. The Swap Manager monitors the system...
swmgr is the graphical tool used to install, remove, and browse software distributed by Silicon Graphics. SoftwareManager invokes swmgr with the arguments provided after prompting for the root password if one is necessary. The -f option specifies the location of new software to be installed. The source argument is either a single distribution, or a directory containing one or more distributions. Software distributions are in a format defined by Silicon Graphics and that can be read only by swmgr...
Swpkg is a Motif based tool used to package software for inst, the Silicon Graphics installation program. Swpkg provides an environment for creating and updating spec and idb files and running gendist(1M). A spec file defines the products that will be turned into a software distribution by gendist. It gives the names of the products, their images and subsystems, information about the contents of those subsystems, and the installation procedure and environment they require. Installation database ...
sync executes the sync(2) system primitive. If the system is to be stopped, sync must be called to insure filesystem integrity. It flushes all previously unwritten system buffers out to disk, thus assuring that all file modifications up to that point are saved. See sync(2) for details.
syntheditor allows users to edit and modify the active presets and voices in midisynth in real time, and also functions as an editor for modifying or creating synthesizer preset files (see synthpreset(4)). syntheditor has the following command-line options: -help Display the available options and flags. -channel Listen on MIDI channel . Default is channel 1. -nomidi Do not communicate with midisynth(1) via MIDI. This mode is useful when editing and/or creating synthpreset(4) files i...
synthpanel manages all 16 MIDI channels in a compact grid of 16 rows. It also provides an interface through which synthesizer preset banks may be added and selected for use with midisynth(1). On startup, synthpanel polls the internal software synthesizer for its configuration. Since MIDI includes minimal provisions for query, synthpanel is unable to poll external MIDI devices. You can also use synthpanel to monitor MIDI data played by soundplayer....
sysconf provides a method to determine the current values of certain configurable system limits, options and parameters. If the optional name argument or list is given, sysconf(1) will print the value of each requested system parameter, one per line. If name is not supplied, sysconf(1) will print all known values with accompanying parameter names. In some cases the value will be 1 or -1, indicating that the system does (1) or does not (-1) implement that...
sysctlrd can be run as a user command or as a daemon run by /etc/rc2.d/S33sysctlr. It handles all necessary communications with an Onyx or Challenge L/XL system's system controller, which controls power sequencing and fan speed, monitors system sensors, and drives the LCD front panel. sysctlrd runs the cpu activity histogram on the front panel, retrieves environmental sensor data, and handles warning and alarm messages from the system controller. sysctlrd also logs configuration error messages ...
syserrpanel is the Desktop control panel for System Alert notification. It is part of the Desktop System Monitor (sysmon) and can be launched from the Icon Catalog's "Control Panel" Page. It can also be launched from the Toolchest by selecting "Desktop" then "Customize" then "System Alerts." The notification toggle button will enable or disable all notification. If audio notification is enabled, an error or warning sound will accompany the notification. Users can also turn off notificat...
sysevent capture messages generated from syslogd(1m) and, using regex(3g) pattern stored in a configuration file, allow one or more user-defined action to be performed when a message match a given expression. sysevent is multi-threaded. Someone may also want to use the -T mode to remove duplicates from the configuration file: the new configuration file will go on standard output. sysevent capture syslogd-generated messages using syslog pipe file mechanism. By default, /tmp/.sysevent is used and ...
syseventEp syseventEp read on stdin a formatted configuration file for sysevent(1m) and generate an ESP event profile on stdout. This file is normally /etc/sysevent.config.
sysinfo with no options prints the unique identifier of the system. This identifier is guaranteed to be unique within the Silicon Graphics product family. With the -s option a shorter (32 bit) identifier is printed. This identifier is not guaranteed to be unique but in practice is. This number is the same that is available from within a program via the sysid function. On multiple module systems this will return a 32 bit version of the lowest numbered module's identifier. Because this interface ...
syslogd reads and logs messages into a set of files described by the configuration file /etc/syslog.conf. Each message is one line. A message can contain a priority code, marked by a number in angle braces at the beginning of the line. Priorities are defined in . syslogd reads from the stream device /dev/log, from an Internet domain socket specified in /etc/services, and from the special device /dev/klog (to read kernel messages). syslogd reads its configuration when it starts up a...
sysmeter opens a window and displays various system performance values collected from either local machine, or any remote machine that implements the rstat version 3 protocol. When sysmeter starts, it makes a connection to the rstatd(1M) daemon on the target machine and periodically collects data from the daemon. Various performance data can be selected for display. Each selected performance value will be displayed within one sub-window in either of the two styles: bar chart or strip chart. In b...
The sysmgr command is available from the Desktop Toolchest and allows the user to access Desktop System Administration Managers and Active Guides. This document provides an overview of the Desktop System Administration model and describes how to use the System Manager. IRIX 6.5.14 updates the System Manager appearance to adhere to modern SGI branding guidelines (layout, colors, and font), but System Manager functionality is the same....
sysmon is part of the Desktop System Monitor. It can be launched by selecting the Toolchest "System Manager" menu, then selecting "System Performance" and then "View the System Log." sysmon allows a user to browse the system log file (/var/adm/SYSLOG). The 8 syslog priorities (see syslog(3B)) are simplified into 4 priority levels. The following table shows how syslog priorities map into sysmon's simplified priority scheme: Sysmon Priority Syslog Priority # Priority Symbol ________________...
systune is a tool that enables you to examine and configure your tunable kernel parameters. systune can adjust some parameters in real time and informs you if you need to reboot your system after reconfiguration. It saves the reconfigured kernel in /unix.install, unless the -f option is used. systune has two modes: interactive and noninteractive. Interactive mode allows you to query information about various portions of tunable parameters or to set new values for tunable parameters. Some paramet...
tabs sets the tab stops on the user's terminal according to the tab specification tabspec, after clearing any previous settings. The user's terminal must have remotely-settable hardware tabs. tabspec Four types of tab specification are accepted for tabspec. They are described below: canned (-code), repetitive (-n), arbitrary (n1,n2,...), and file (--file). If no tabspec is given, the default value is -8, i.e., UNIX system ``standard'' tabs. The lowest column number is 1. Note that for tabs, ...
tag is used to set, clear or query the tag number in a MIPS executable or shell script that follows the convention of #!/bin/sh or #!/bin/csh on the first line. The tag number is used by the IRIX Interactive Desktop to determine the type of a file and thus display the appropriate icon and have it exhibit the correct behavior when the user interacts with it. Usually software developers use the tag command. End users have no need to use the tag command. End users who create their own personal desk...
tail copies the named file to the standard output beginning at a designated place. If no file is named, the standard input is used. Copying begins at distance +number from the beginning, or -number from the end of the input (if number is null, the value 10 is assumed). If the -c or -n options are used, number is assumed to be negative unless a + sign is prepended. Number is counted in units of lines, blocks, or characters, according to the appended/prepended opti...
Talk is a visual communication program which copies lines from your terminal to that of another user. If you wish to talk to someone on your own machine, then person is just the person's login name. If you wish to talk to a user on another host, then person is of the form user@host. If you want to talk to a user who is logged in more than once, the ttyname argument may be used to indicate the appropriate terminal name, where ttyname is of the form ``ttyXX''. When first called, talk sends the ...
talkd is the server that notifies a user that somebody else wants to initiate a conversation. It acts as a repository of invitations, responding to requests by clients wishing to rendezvous to hold a conversation. In normal operation, a client, the caller, initiates a rendezvous by sending a CTL_MSG to the server of type LOOK_UP (see ). This causes the server to search its invitation tables to check if an invitation currently exists for the caller (to speak to the callee speci...
tar saves and restores multiple files on a single file (usually a magnetic tape, but it can be any file). This single logical file may span multiple physical tapes (this is known as "multi-volume tar"). Such tapes do not have a filemark at the end of intermediate volumes, and an archived file may be split across multiple tapes. The second through last tape may be read without earlier tapes (aside from the possible first file split across the tape boundary) by using the e option. The key argume...
Tclsh is a shell-like application that reads Tcl commands from its standard input or from a file and evaluates them. If invoked with no arguments then it runs interactively, reading Tcl commands from standard input and printing command results and error messages to standard output. It runs until the exit command is invoked or until it reaches end-of-file on its standard input. If there exists a file .tclshrc in the home directory of the user, tclsh evaluates the file as a Tcl script just before ...
This registers an interpreter using the name name. The name must be unique to the server. It takes a tcl interpreter and a toplevel widget as additional arguments. This creates two commands within the interpreter, send and interps. The send command behaves like the send command for Tk: given an interpreter name and a command, it executes the command in that interpreter. The interpreter for the command may be the current interpreter. The interps command returns a list of interpreters currently kn...
Tcsh is an enhanced version of the Berkeley UNIX C shell csh(1). It behaves similarly to the C shell, except for the added utilities of: 1) Command line editing using Emacs-style commands. 2) Visual step up/down through the history list. 3) Terminal mode sanity checking and resetting. 4) Interactive command, file name and user name completion. 5) File/directory/user list in the middle of a typed command. 6) Spelling correction of command, file, and user names. 7) Lookup of command documentation ...
tee transcribes the standard input to the standard output and makes copies in the files. The sole purpose of tee is to serve, as its name implies, as a ``T'' in a pipe. For example, the command grep pattern file1 | tee file2 | wc -l catches the output of grep in file2 without having to reexecute the command. The available options are: -i ignore interrupts; -a causes the output to be appended to the files rather th...
The telldesktop utility invokes file manager (fm) functions as long as the file manager was started with the -b parameter. (If the file manager is not running on the desktop background, then these commands will have no effect because there will be no file manager process to intercept them.) Most file manager functions require an icon to be selected before the operation can be performed.
The tellwm utility invokes window functions in a cooperating resident window manager program. Cooperating window managers post the _SGI_TELL_WM property on the root window, containing a list of command strings they support externally. If the command argument given to tellwm matches this published protocol, tellwm forwards the command to the window manager for execution. tellwm exits with a non-zero status if the current window manager does not provide the cooperating property, or if it does not ...
The telnet command is used to communicate with another host using the TELNET protocol. If telnet is invoked without the host argument, it enters command mode, indicated by its prompt, telnet>. In this mode, it accepts and executes the commands listed below. If it is invoked with arguments, it performs an open command (see below) with those arguments. Options: -d Sets the initial value of the debug toggle to TRUE. -n tracefile Opens tracefile for recording trace information. See the set tracefile...
telnetd is a server which supports the Internet standard TELNET virtual terminal protocol. telnetd is invoked by the Internet super-server (see inetd(1M)), normally for requests to connect to the TELNET port as indicated by the /etc/services file (see services(4)). The -h option suppresses the host information banner before the login prompt. The -n option suppresses transport-level keep-alive messages. The use of keepalive messages allows sessions to be timed out if the client crashes or becomes...
test evaluates the expression expr and, if its value is true, sets a zero (true) exit status; otherwise, a non-zero (false) exit status is set; test also sets a non-zero exit status if there are no arguments. When permissions are tested, the effective user ID of the process is used. All operators, flags, and brackets (brackets used as shown in the second SYNOPSIS line) must be separate arguments to the test command; normally these items are separated by spaces. The following primitives are used ...
This tool is part of the Samba suite. testparm is a very simple test program to check an smbd configuration file for internal correctness. If this program reports no problems, you can use the configuration file with confidence that smbd will successfully load the configuration file. Note that this is NOT a guarantee that the services specified in the configuration file will be available or will operate as expected. If the optional host name and host IP address are specified on the command line, ...
This tool is part of the Samba suite. testprns is a very simple test program to determine whether a given printer name is valid for use in a service to be provided by smbd(8) "Valid" in this context means "can be found in the printcap specified". This program is very stupid - so stupid in fact that it would be wisest to always specify the printcap file to use.
Textcolors is used to set the various colors used by a xwsh window. When no arguments are given, textcolors will query xwsh for the current settings and report them. The values reported will be in hexadecimal. When one or more arguments are given (up to 8), xwsh uses the argument to set a specific color. The color arguments are either a hexadecimal number (starts with a #), or a name. Textcolors will also allow color indices for backwards compatibility....
textomatic is an Inventor program for creating beveled, 3D text. It supports arbitrary bevels, arbitrary messages, assigning different materials to the front, back and sides of the text, and supports pasting into other applications (like showcase or SceneViewer). The textomatic window is split into four parts: The top of the window is an Inventor examiner viewer, displaying the 3D text and allowing you to rotate and zoom it. By default the "decoration" of buttons and thumbwheels used to contro...
The textps filter converts text to Postscript. It accepts ASCII text on standard input and sends PostScript language to standard output. The textps filter passes PostScript through without changing it. The textps filter allows page layout specification, but does not cause the text within a page to be rearranged. Text extending beyond the maximum image area, however, is truncated. The output defaults to the Courier typeface. K-Spool usually uses textps in the pipeline of the input filter of a pri...
Tftp is the user interface to the Internet TFTP (Trivial File Transfer Protocol), which allows users to transfer files to and from a remote machine. The remote host may be specified on the command line, in which case tftp uses host as the default host for future transfers (see the connect command below).
tftpd is a server that supports the Internet Trivial File Transfer Protocol (TFTP). The TFTP server operates at the port indicated in the tftp service description; see services(4). The server is normally started by inetd(1M). The use of tftp(1C) does not require an account or password on the remote system. Due to the lack of authentication information, tftpd allows only publicly readable files to be accessed. Files containing the string ../ are not allowed. Files can be written only if they alre...
thrash will allocate a region of its virtual memory of a size given by its arguments, and either randomly or sequentially access that memory in order to explore the system paging behavior. The amount of memory to thrash over is specified by a size flag followed by an integer argument, whose units are determined by the particular size flag used. The flag may be -m, for megabytes, -p, for pages; or -k for kilobytes. An additional argument of -s implies sequential thrashing; the default is random. ...
The command tic translates a terminfo file from the source format into the compiled format. The results are placed in the directory /usr/share/lib/terminfo. The compiled format is necessary for use with the library routines in curses(3X). -vn Specifies that (verbose) output be written to standard error trace information showing tic's progress. The optional integ...
The command is executed; after it exits, time prints resource usage statistics to standard error. By default, this report includes the elapsed time the command spent running, the CPU time spent in execution of the command its reaped children, and the CPU time spent executing system code by the command and its reaped children. Times are reported in seconds. time may be directed to produce other resource usage reports via command line options. Additionally, the environment variable TIME may be use...
Timed is a time server daemon and is normally invoked at boot time from the /etc/init.d/network file. It synchronizes the host's time with the time of other machines in a local area network running timed. These time servers will slow down the clocks of some machines and speed up the clocks of others to bring them to the average network time. The average network time is computed from measurements of clock differences using the ICMP timestamp request message. Timed communicates with the date(1) c...
timedc is used to control the operation of the timed(1M) program. It may be used to: o measure the differences between machines' clocks o find the location where the master time server is running o enable or disable tracing of messages received by timed o perform various debugging actions Without any arguments, timedc prompts for commands from the standard input. If arguments are supplied, timedc interprets the first argument as a command and the remaining arguments as parameters to the command...
timeserver responds to queries from the Macintosh Chooser rdev 'K-Time'. This rdev is used to set the clock on the Mac so that its time matches the UNIX machine's time. If no name is give, the machine's hostname is used. If the -D option is used, timeserver stays in the foreground and prints debugging information about activity,
Timeslave matches the clock in the local machine to a better clock. It does this by speeding up or slowing down the local clock, or if the local clock is particularly wrong, by changing the date. When the date is changed, because the difference is too great to correct smoothly, timeslave logs the event in the system log. Timeslave understands several options: -H netmaster specifies the hostname or Internet address of another machine that has a better clock or that has, in turn, slaved its clock ...
The given command is executed; the elapsed time, user time and system time spent in execution are reported in seconds. Optionally, process accounting data for the command and all its children can be listed or summarized, and total system activity during the execution interval can be reported. The output of timex is written on standard error. Options are: -p List process accounting records for command and all its children. Suboptions f, h, k, m, r, and t modify the data items reported. The option...
Tlink creates a directory tree rooted at target identical to the directory tree rooted at source, populating the directories in the target tree with symbolic links to corresponding files under the source tree. If optional paths are supplied after source and target, only the subtrees named by concatenating each path with source are linked under target. The -c (clean) option causes tlink to walk the target tree removing any directory which lacks a counterpart in the source tree, any symbolic link ...
toggleSystemTunes is a privileged command that controls the speaker volume during boot up. This controls the startup, shutdown, and bad graphics tunes. toggleSystemTunes uses the nvram(1M) command to set the value of the volume variable.
The togglexhost utility turns on or off access control for the local X server, running the xhost(1) command with the appropriate argument and posting a feedback dialog to the user. It requires one argument: + The plus symbol enables remote display (disables access control), allowing X display access to any remote host. - The minus symbol disables remote display (enables access control), preventing X display access to remote hosts. The script can be run from the toolchest (System > Utilities > Di...
The toolchest program displays a list of buttons, each of which can invoke a useful command or present a submenu of additional buttons. The standard set of menu buttons in the IRIX Interactive Desktop toolchest is Desktop, Selected, Find, System, and Help. Each menu provides lists of useful commands for running top-level window management programs (in conjunction with 4Dwm), desk utilities, search utilities, system administration functions, or documentation-displaying programs....
Top displays the top processes on the system and periodically updates this information. If standard output is an intelligent terminal (see below) then as many processes as will fit on the terminal screen are displayed by default. Otherwise, a good number of them are shown (around 20). Raw cpu percentage is used to rank the processes. If number is given, then the top number processes will be displayed instead of the default. Top makes a distinction between terminals that support advanced capabili...
Machine topology information is extracted from the hardware graph. The output of the topology command is not guaranteed to remain constant between releases. The topology command is an editable script that can be customized by the end user.
touch causes the access and modification times of each argument to be updated. The file name is created if it does not exist. If no time is specified [see date(1)] the current time is used. The -a and -m options cause touch to update only the access or modification times respectively (default is -am). The -c option silently prevents touch from creating the file if it did not previously exist. The -r option causes touch to...
to_dos converts a UNIX text file into a MSDOS text file by appending a control-M character at the end of each line and a control-Z character at the end of the file. to_unix converts a MSDOS text file into a UNIX text file by stripping trailing control-M and control-Z characters. Both commands can take zero, one, or two arguments. If no arguments are given, the commands act as a filter, taking input from stdin and writing the modified file to stdout. When a single argument is specified, the argum...
to_imap copies files and directories from a specified folder directory such as $HOME/Mail or $HOME/nsmail, to the IMAP folder directory, typically $HOME/imap. Use this program if you will be using the IMAP server from University of Washington. This server can be found in the June 1998 Edition of SGI Freeware. Do not use this program if you will be using Netscape Messaging Server because the folder structure is different in the Netscape Messaging Server. If the current folders are not on the same...
tput uses the terminfo database to make the values of terminal-dependent capabilities and information available to the shell (see sh(1)), to initialize or reset the terminal, or return the long name of the requested terminal type. tput outputs a string if the attribute (capability name) is of type string, or an integer if the attribute is of type integer. If the attribute is of type boolean, tput simply sets the exit code (0 fo...
tr copies the standard input to the standard output with substitution or deletion of selected characters. Input characters found in string1 are mapped into the corresponding characters of string2. tr processes supplementary code set characters according to the locale specified in the LC_CTYPE environment variable [see LANG on environ(5)]. Searches and translations are performed on characters, not bytes. The following options are s...
The Internet is a large and complex aggregation of network hardware, connected by gateways. Tracking the route your packets follow (or finding the miscreant gateway that's discarding your packets) can be difficult. traceroute utilizes the IP protocol ``time-to-live'' (TTL) field and attempts to elicit an ICMP TIME_EXCEEDED response from each gateway along the path to some host. The only mandatory parameter is the destination host name or IP address. The default probe datagram length is 40 byt...
trcore will truncate file1 or copy file1 to file2 truncated to trunc_level. If file2 is not supplied, then file1 is truncated in place. There is a three second delay after the warning message is printed to abort the operation. Aborting any time before the end of execution will leave file1 intact. The resulting file ( file1 or file2) will be equivalent to a crash vmcore dump written at a lower dump level. The equivalent dump level is specified by trunc_level. The following options apply to trcore...
The tsarchive command renames the tspd.log log file in the /var/spool/ts/pd/log directory so that the file can be archived. A cron job executes the command daily in the /var/spool/cron/crontabs/root directory, and the file is renamed if the file size is greater than 1024000 bytes. The file is renamed ...
The tsdaemon command starts tape support. If you configure a system to do so, it is started during the system boot. To modify the exiting tape support personality-daemon definitions after tsdaemon has been started, send signal 17 to tsdaemon to request that it read a new configuration. tsdaemon rereads the configuration file specified at startup and modifies its personality-daemon information. The exi...
The tserrpt command prints selected records from the /var/spool/ts/pd/log/tspd.log file. If one or more record-selection options are specified, records matching all the specified options are selected. If no record-selection options are specified, all records are selected. file specifies an input file that you want to search for records. The special filename, '-', specifies stand...
Tset causes terminal dependent processing such as setting erase and kill characters, setting or resetting delays, and the like. It first determines the type of terminal involved, names for which are specified by the /usr/lib/terminfo data base, and then does necessary initializations and mode settings. In the case where no argument types are specified, tset simply reads the terminal type out of the environment variable TERM and re-initializes the terminal. The rest of this manual concerns itself...
The tsort command produces on the standard output a totally ordered list of items consistent with a partial ordering of items mentioned in the input file. If no file is specified, the standard input is understood. The input consists of pairs of items (nonempty strings) separated by blanks. Pairs of different items indicate ordering. Pairs of identical items indicate presence, but not ordering.
The tsset command sets option values in a personality daemon. These option settings override those set in the personality-daemon configuration file, /etc/config/tspd.config. The options set by tsset remain in effect until they are reset by another tsset command. The command currently supports one option, the tracing enabled setting. For more information on the personality-daemon conf...
The tsstop command stops tape support or one of the personality daemons. When a personality daemon is terminated, the tape support driver terminates all users with the device file open and prevents further opens of the device until all current users have closed the device file. The tsstop command accepts the following options: -a Terminates tape support. This option stops the entire system including all personality daemons. -d pathname Terminates t...
Ttcp times the transmission and reception of data between two systems using the UDP or TCP protocols. It differs from common ``blast'' tests, which tend to measure the remote inetd as much as the network performance, and which usually do not allow measurements at the remote end of a UDP transmission. For testing, the transmitter should be started with -t and -s after the receiver has been started with -r and -s. Tests lasting at least tens of seconds should be used to obtain accurate measureme...
tty prints the path name of the user's terminal. -l prints the synchronous line number to which the user's terminal is connected, if it is on an active synchronous line. -s inhibits printing of the terminal path name, allowing one to test just the exit code. EXIT CODES 2 if invalid options were specified, 0 if standard input is a terminal, 1 otherwise.
Twm is a window manager for the X Window System. It provides titlebars, shaped windows, several forms of icon management, user-defined macro functions, click-to-type and pointer-driven keyboard focus, and user-specified key and pointer button bindings. This program is usually started by the user's session manager or startup script. When used from xdm(1) or xinit(1) without a session manager, twm is frequently executed in the foreground as the last client. When run this way, exiting twm causes t...
type1xfonts is a utility normally run during the installation process which creates a Type1 font directory suitable for use with the X server or font server. Symbolic links are made to Type1 fonts elsewhere on the system and a fonts.scale file is created. After the links are made, type1xfonts will run mkfontdir to generate the necessary fonts.dir file. If some condition exists that prevents type1xfonts from effectively generating a directory, the utility at least attempts to create a fonts.dir f...
In order to improve performance, the IRIX Interactive Desktop automatically maintains a cache of ftr types for all of the directories that are viewed with fm or dirview. The typeCache utility can be used to "pre-fill" this cache for the specified directory.
The uadmin command provides control for basic administrative functions. This command is tightly coupled to the System Administration procedures and is not intended for general use. It can be invoked only by a privileged user. The arguments cmd (command) and fcn (function) are converted to integers and passed to the uadmin(2) system call.
uconv converts a FORTRAN unformatted data file either from IRIS Series 2000 or IRIS Series 3000 FORTRAN form to IRIS-4D Series FORTRAN form, or vice versa. uconv allows FORTRAN users to port their otherwise nonportable data files opened as FORM="UNFORMATTED". The uconv command has the following options: -i Identifies the input file as an IRIS Series 2000 or IRIS Series 3000 FORTRAN unformatted data file. This is the default. Note: the -c option may not be specified with this option. -c Identif...
The uilcommand invokes the UIL compiler. The User Interface Language (UIL) is a specification language for describing the initial state of a user interface for a Motif application. The specification describes the objects (menus, dialog boxes, labels, push buttons, and so on) used in the interface and specifies the routines to be called when the interface changes state as a result of user interaction. file Specifies the file to be compiled through the UIL compiler. options Specifies one or more o...
The ul command reads the named filenames (or the standard input if none are given) and translates occurrences of underscores to the sequence which indicates underlining for the terminal in use, as specified by the environment variable TERM. ul uses the appropriate /usr/share/lib/terminfo file to determine the character sequences for underlining. If the terminal is incapable of underlining, but is capable...
The ulimit utility sets or reports the file-size writing limit imposed on files written by the shell and its child processes (files of any size may be read). Only a process with appropriate privileges can increase the limit.
The user file-creation mode mask is set to ooo. The three octal digits refer to read/write/execute permissions for owner, group, and others, respectively (see chmod(2) and umask(2)). The value of each specified digit is subtracted from the corresponding ``digit'' specified by the system for the creation of a file (see creat(2)). For example, umask 022 removes group and others write permission (files normally created with mode 777 become mode 755; files created with mode 666 become mode 644). I...
umerge, the ucode inliner, reads the input binary ucode file into an input ucode buffer. An output ucode buffer is then allocated. umerge then makes a pass over the input ucode buffer to collect information and build data structures, including the program call graph. This pass also copies all top-level non-procedure ucode to the output buffer. It then analyzes the data structures to decide what to do for the output ucode. Finally, it copies the code from the input buffer to the output buffer acc...
Umountfs unmounts a filesystem. -a indicates that all filesystems should be unmounted -d fsMountPoint specifies the mount point of the filesystem to be unmounted -r indicates that the specified entry is to be removed from /etc/fstab -s netwareServerName specifies the name of the netware server containing the filesystem to be unmounted
uname prints information that identifies the current IRIX system to standard output. The string IRIX64 is printed on systems that support 64-bit addressing (pointers); also see the KERN_POINTERS argument to sysconf(1). The options cause selected information returned by uname(2) to be printed: -a Behave as though all of the options -mnrsv were specified. -m Print the machine hardware name. This is the type of CPU board that the system is running on, e.g. IP22. -n Print the hostname or nodename. T...
uncompvm expands IRIX vmcore.n.comp files into standard vmcore.n files. Under some circumstances, an IRIX operating system core dump may be made in a special compressed format. Running file(1) on a vmcore.n.comp file yields something like the following: vmcore.0.comp: IRIX vmcore dump of 'IRIX abu stever-j 03080214 IP19' uncompvm without any command-line options uncompresses these into files of up to the size of the physical memory on the system that created the dump. For this reason, it may n...
The unconfigks program unconfigures printers that were configured with the configks(1m) utility. It removes the printer(s) from /etc/printcap, kills any daemons and prompts the user to remove appropriate spool directories. If the configuration was modified by hand after it was created with configks(1m), some parts may have to be removed by hand. The unconfigks program will inform the user if this is necessary....
The unexpand utility copies files or the standard input to the standard output, converting blank characters at the beginning of each line into the maximum number of tab characters followed by the minimum number of space characters needed to fill the same column positions originally filled by the translated blank characters. By default, tabstops are set at every eighth column position. Each backspace character is copied to the output, and causes the column position count for tab calculations to b...
unget undoes the effect of a get -e done prior to creating the intended new delta. If a directory is named, unget behaves as though each file in the directory were specified as a named file, except that non-SCCS files and unreadable files are silently ignored. If a name of - is given, the standard input is read with each line being taken as the name of an SCCS file to be processed. Keyletter arguments apply independently to each named file. -rSID Uniquely identifies which delta is no longer inte...
Unifdef reads C source files and prints all input lines except those excluded by #ifdef constructs that refer to specified identifiers. The -D option defines name as a macro with the value 1, causing unifdef to simplify #ifdef name Included text #else Excluded text #endif to just Included text and contrariwise for #ifndef. The -U option works like -D except that name is undefined, so the #ifdef above would simplify to Excluded text -Dname=string causes unifdef to replace occurrences of name with...
uniq reads the input file comparing adjacent lines. In the normal case, the second and succeeding copies of repeated lines are removed; the remainder is written on the output file. Input and output should always be different. Note that repeated lines must be adjacent in order to be found; see sort(1). If the -u flag is used, just the lines that are not repeated in the original file are output. The -d option specifies that one copy of just the repeated lines is...
units converts quantities expressed in various standard scales to their equivalents in other scales. It works interactively in this fashion: You have: inch You want: cm * 2.540000e+00 / 3.937008e-01 A quantity is specified as a multiplicative combination of units optionally preceded by a numeric multiplier. Powers are indicated by suffixed positive integers, division by the usual sign: You have: 15 lbs force/in2 You want:...
unschedBackup is a privileged command that uses at(1) to unschedule backups scheduled to occur once at a later time and cron(1M) to unschedule recurring backups. See the backup(1M) man page for information on how backups are scheduled.
unsharePrinters is a privileged command that disables the sharing of local printers by removing the .rhosts file for the "lp" user account. Additionally, if the "lp" account has no password, '*' is written into the password field for the "lp" account in /etc/passwd. This prevents the "lp" account on other hosts from being able to rlogin(3C) to the local "lp" account, which disables printer sharing....
unshareRemovableMedia is a privileged command that stops a removable media device from being shared with other systems on the network. After running unshareRemovableMedia, device will not be accessible via mediad(1M) on remote workstations.
uopt, the MIPS ucode optimizer, reads the input binary ucode file, performs optimization on an intra-procedural, global basis and outputs the optimized binary ucode file. It checks the version stamp of the ucode file, and if it does not correspond to its own stamp, a warning message will be printed. By convention, unoptimized binary ucode files have the extension .B and optimized binary ucode files have the extension .O, but uopt does not force this convention on the user. The string file is use...
Updateclogin updates the /var/sysadm/config/clogin.conf file. The configuration file customizes the behavior of clogin(1), including not displaying icons for certain users, displaying generic icons vs. images, etc.
updbootparam, which runs on an NIS master only, is the NIS bootparams(4) update program that modifies the database upon request. An update request is sent from yp_bootparam(1M) command using an RPC call. updbootparam is invoked indirectly by the RPC daemon rpc.ypupdated(1M) via an intermediate makefile updaters(4). updbootparam is designed to be used in the makefile updaters. The parameter bootparams-file is the bootparams file used in the NIS database makefile, /var/yp/Makefile. Usually, it is ...
Uptime prints the current time, the length of time the system has been up, and the average number of jobs in the run queue over the last 1, 5 and 15 minutes. It is, essentially, the first line of a w(1) command.
userenv executes a user's login shell, finds the resulting environment, and then prints to stdout commands such as PATH=mypath; export PATH which can be eval'ed by /bin/sh in order to set the environment. Userenv starts an interactive shell. Before executing the shell, it sets the environment variable ENVONLY equal to 1. Thus, when your login scripts are executed as a result of userenv, they will execute fastest if, after seeing that ENVONLY = 1, they do very little except for setting the envi...
Managers display information about your system and provide access to interactive guides (also called tasks) that let you administer your system. The User Manager displays a list of the user accounts currently on the system and gives you access to related guides. In the Manager window, you can open a guide by choosing its name from the Task menu or by clicking its button at the bottom of the window....
uucheck checks for the presence of the uucp system required files and directories. Within the uucp makefile, it is executed before the installation takes place. It also checks for some obvious errors in the Permissions file (/etc/uucp/Permissions). When executed with the -v option, it gives a detailed explanation of how the uucp programs will interpret the Permissions file. The -x option is used for debugging. debug_level is a single digit in the range 1-9; the higher the value, the greater the ...
uucico is the file transport program for uucp work file transfers. Role numbers for the -r are the digit 1 for master mode or 0 for slave mode (default). The -r option should be specified as the digit 1 for master mode when uucico is started by a program or cron. uux and uucp both queue jobs that will be transferred by uucico. It is normally started by the scheduler, uusched, but can be started manually; this is done for debugging. For example, the shell uutry starts uucico with debugging turned...
uucleanup scans the spool directories for old files and takes appropriate action to remove them in a useful way: Inform the requester of send/receive requests for systems that can not be reached. Return mail that cannot be delivered to the sender. Delete or execute rnews for rnews type files (depending on where the news originated--locally or remotely). Remove all other files. In addition, there is provision to warn users of requests that have been waiting for a given number of days (default 1)....
uucp uucp copies files named by the source-file arguments to the destination- file argument. A file name may be a path name on your machine, or may have the form: system-name!path-name where system-name is taken from a list of system names that uucp knows about. The system-name may also be a list of names such as system-name!system-name!...!system-name!path-name in which case an attempt is made to send the file via the specified route, to the destination. See WARNINGS and BUGS below for restrict...
uucpd allows the use of incoming UUCP connections over TCP/IP. The UUCP/TCP server operates at the port indicated in the uucp service description; see services(4). The server is normally started by inetd(1M). Any of the UUCP protocols supported by uucico can be used, but 'e' and 't' are most common. uucpd relies primarily on the authentication mechanisms of uucico. However, it first obtains a username and password from the remote system, and checks them in much the same way as getty and logi...
Uuencode and uudecode are used to transmit binary files over transmission mediums that do not support other than simple ASCII data. Uuencode reads the named source file, file, (or by default, the standard input) and writes an encoded version to the standard output. Normally it will be used as part of a pipeline, or with the output redirected to a file, similar to this: uuencode binarydatafile decoded_name | mail someuser In this case, when the file is decoded with uudecode after it is received, ...
uugetty is similar to getty(1M), but changes have been made to support using the line for uucico, cu, and ct; that is, the line can be used in both directions. The uugetty will allow users to login, but if the line is free, uucico, cu, or ct can use it for dialing out. The implementation depends on the fact that uucico, cu, and ct create lock files when devices are used. When the "open()" returns (or the first character is read when -r option is used), the status of the lock file indicates whe...
uusched is the uucp file transport scheduler. It is usually started by the uudemon.hour script that is started by cron(1M) from an entry in /var/spool/cron/crontabs/uucp such as: 39 * * * * /etc/uucp/uudemon.hour The two options are for debugging purposes only: -x sched_level Output debugging messages from uusched. -u cico_level Passed as -x cico_level to uucico. The sched_level or cico_level is a number between 0 and 9. Larger numbers give more detailed information. Before starting to contact e...
uustat will display the status of, or cancel, previously specified uucp commands, or provide general status on uucp connections to other systems. Only one of the following options can be specified with uustat per command execution: -a Output all jobs in queue. -m Report the status of accessibility of all machines. -p Execute a ``ps -flp'' for all the process-ids that are in the lock files. -q List the jobs queued for each machine. If a status file exists for the machine, its date, time and sta...
uuto sends source-files to destination. uuto uses the uucp(1C) facility to send files, while it allows the local system to control the file access. A source-file name is a path name on your machine. Destination has the form: system!user where system is taken from a list of system names that uucp knows about (see uuname). User is the login name of someone on the specified system. Two options are available: -p Copy the source file into the spool directory before transmission. -m Send mail to the s...
Uutry is a shell that is used to invoke uucico to call a remote site. Debugging is turned on (default is level 5); -x will override that value. The -r overrides the retry time in /var/spool/uucp/.status. The debugging output is put in file /tmp/system_name. A tail -f of the output is executed. The current INTR character, which is often , , or , will give control back to the terminal while the uucico continues to run, putting its output in /tmp/system_name....
uux will gather zero or more files from various systems, execute a command on a specified system and then send standard output to a file on a specified system. NOTE: For security reasons, most installations limit the list of commands executable on behalf of an incoming request from uux, permitting only the receipt of mail (see mail(1)). (Remote execution permissions are defined in /etc/uucp/Permissions.) The command-string is made up of one or more arguments that look like a shell command line, ...
uuxqt is the program that executes remote job requests from remote systems generated by the use of the uux command. (Mail uses uux for remote mail requests.) uuxqt searches the spool directories looking for X. files. For each X. file, uuxqt checks to see if all the required data files are available and accessible and file commands are permitted for the requesting system. The Permissions file is used to validate file accessibility and command execution permission. There are two environment variab...
Vacation automatically returns a message to anyone who sends you mail. Typically, this message informs the sender that you are not available to read your mail. Initializing the Database When called with the -i flag, vacation initializes the ndbm(3B) database files .vacation.pag and .vacation.dir in your home directory. If a vacation database already exists, vacation will delete the old one and create a new (empty) one. vacation uses this database to keep track of the people to whom it has sent m...
val determines if the specified file is an SCCS file meeting the characteristics specified by the optional argument list. Arguments to val may appear in any order. The arguments consist of keyletter arguments, which begin with a -, and named files. val has a special argument, -, which causes reading of the standard input until an end-of-file condition is detected. Each line read is independently processed as if it were a command line argument list. val generates diagnostic messages on the standa...
The vc command copies lines from the standard input to the standard output under control of its arguments and control statements encountered in the standard input. In the process of performing the copy operation, user declared keywords may be replaced by their string value when they appear in plain text and/or control statements. The copying of lines from the standard input to the standard output is conditional, based on tests (in control statements) of keyword values specified in control statem...
verifyDisk invokes fx to perform two verification passes over the disk surface, isolate any bad blocks found, and then partition it as an option disk with all usable space in one partition, partition 7. It is essentially equivalent to performing the operation fx -x -c VERIFY on the indicated disk.
versions calls the programs showprods, showfiles, and (in the case of removing software with versions remove|removehist), inst. Users may wish to use these programs directly, instead of versions, since these programs provide a more complete and consistent set of capabilities. To find out what underlying command versions would execute with a given set of arguments, use the -V option ahead of other options, for example, versions -V remove ftn.sw pas.sw. The versions command has three functions: - ...
vi (visual) is a display-oriented text editor based on an underlying line editor ex(1). It is possible to use the command mode of ex from within vi and vice-versa. The visual commands are described on this manual page; how to set options (like automatically numbering lines and automatically starting a new output line when you type carriage return) and all ex line editor commands are described on the ex(1) reference page. When using vi, changes you make to the file are reflected in what you see o...
-t Title of displayed window. -v The number of the video input node to connect to. -n The number of the video device to be used. -f Disable forking. -F Select video format. -d Print debug messages. -b Don't put borders on window. -B # Use # buffers for buffering video data between video input and the display. The default is 3. -A Display when source is available. -I Print node and path IDs for use with command line interface. -z Initial zoom ratio numerator/deno...
-nocontrol Don't map controls window. -borderwidth Set width of window border to bw. -n Use video device number devnum. -h Display usage message and exit. -o Use output node number outputnodenum. -I Print node and path IDs. -f Disable forking. -geometry Specifies size and placement of the output window. See X(1) for details on the format and interpretation of the geometry argument.
-f Name of output file to be created. '-00000.' will be appended to the filename. If count is > 1 the subsequent filenames will be sequenced. -w Don't write frame to disk, simply capture and exit. -d Display frame in window on screen. -c Capture frames, up to the limits of the hardware for burst capture. -r [packing] Capture data in raw, device-dependent packing. When written to disk, the filename's suffix will indicate the packing. The optional packing parame...
viewlog displays the contents of the system administration log /var/sysadm/salog (see salog(4)) in a text window. For command lines in salog, viewlog displays the date and the command. For other lines, viewlog displays either Error:, Warning:, or Info: as appropriate and the message. Non-command lines are indented.
The viewres program displays a tree showing the widget class hierarchy of the Athena Widget Set. Each node in the tree can be expanded to show the resources that the corresponding class adds (i.e. does not inherit from its parent) when a widget is created. This application allows the user to visually examine the structure and inherited resources for the Athena Widget Set. This internationalized version of viewres uses the internationalized Athena Widget Set....
-l List voluminous info about all controls on all nodes. -b List the info in brief format. (Implies -l ). -n Uses case-insensitve search on first part of node names to specify which nodes to list information about. -c Uses case-insensitve search on first part of control names to specify which controls to list information about. (Used with the '-l' option).
Vmsprep traverses hierarchies of files and prepares them for transportation to VMS. Since ANSI standard tapes (the VMS standard) do not allow hierarchy, this program provides a method of flattening the hierarchy onto a tape in such a way that it can be unpacked on VMS to recreate the same tree structure. For reasons best not described here, vmsprep will attempt to exclude all RCS and SCCS archives by ignoring all files or directories named 'RCS' or 'SCCS', or files starting with 's.' or en...
The IRIS RealityEngine provides two video outputs: a RGB video output (which is normally connected to the graphics monitor), and a composite video output. vout provides an easy-to-use graphical interface to control the composite output. It also controls several parameters of the RGB video output. The composite output is available at the BNC connector labeled `composite', and at the S-Video connector. Both connections show the same signal. The video output is always a region of the graphics scre...
w prints a summary of the current activity on the system, including what each user is doing. The heading line shows the current time of day, how long the system has been up, the number of users logged into the system, and the load averages. The load average numbers give the number of jobs in the run queue averaged over 1, 5 and 15 minutes. The fields output are: the user's login name, the name of the tty the user is on, the host from which the user is logged in (generally the session's $DISPLA...
Wait for your background process whose process id is n and report its termination status. If n is omitted, all your shell's currently active background processes are waited for and the return code will be zero. The shell itself executes wait, without creating a new process.
wait4wm ensures that the window manager has been started before allowing other clients to open windows. This is appropriate at the beginning of a login session so that the window manager is able to control window placement.
wakeupat allows you to specify a time at which the system will power on by itself. Currently only Indy, Indigo2, OCTANE , O2 and Challenge M support this feature. The syntax for specifying the time is identical to that of the at(1) command. If the system is rebooted after this command is used, the wakeupat time is cleared and must be reissued. If the system is not powered off before the given time, the command has no effect (that is, the system will not power back on as soon as powered off). Sys...
wall reads msg_file (or its standard input if none specified) until an end-of-file. It then sends this message to all currently logged-in users preceded by: Broadcast Message from ... If the -g option is used then only those users in the specified group as defined in the file /etc/group or the NIS group map are sent the message. The list of logged-on users is derived from the file /var/adm/utmp. It is used to warn all users, typically prior to shutting down the system. The sender must be super-u...
This tool is part of the Samba suite. The wbinfo program queries and returns information created and used by the winbindd(8) daemon. The winbindd(8) daemon must be configured and running for the wbinfo program to be able to return information.
wc counts lines, words, and characters or bytes in the named files, or in the standard input if no names appear. It also keeps a total count for all named files, if more than one input is specified. The wc utility considers a word to be a non-zero length string of characters delimited by white space.
wchrtbl creates tables containing information on character classification, character conversion, character set width, and numeric editing. The first table is a multi-byte-sized array encoded such that a table lookup can be used to determine the character classification of a character, convert a character [see ctype(3C) and wctype(3W)], and find the byte and screen width of a character in one of the supplementary code sets. The size of the arr...
Given an Inst software distribution directory, webdist automatically generates the HTML for a Web Software Distribution page. With a Web Software Distribution page, a user can choose and install the Inst products in a distribution directory using a Web interface. An Inst software distribution directory contains products that can be installed using the SoftwareManager(1M) or Inst(1M) installation programs. The distdir argument is used to specify the pathname of the software distribution directory...
The WebJumper tool lets users create and modify "webjumper" or "jumpsite" icons. A jumpsite is a three-line text file containing an SGI designator, an optional description, and an URL. Opening (doubleclicking) a jumpsite will cause a specific World Wide Web site to appear in the user's default Web browser, such as Netscape or Mosaic. WebJumper can be launched from the toolchest (Internet > Create a WebJumper) or from a Unix shell command line. Like most applications, WebJumper's icon can b...
/usr/WebFace/Apps /usr/WebFace/Source /usr/WebFace/Tasks Internet Gateway source tree hierarchy /usr/WebFace/bin /usr/WebFace/lib support tools and libraries
what searches the given files for all occurrences of the pattern that get(1) substitutes for %Z% (this is @(#) at this printing) and prints out what follows until the first ~, >, new-line, \, or null character. For example, if the C program in file f.c contains char ident[] = "@(#)identification information"; and f.c is compiled to yield f.o and a.out, then the command what f.c f.o a.out will print f.c: identification information f.o: identification information a.out: identification informati...
whatis looks up a given command and gives the header line from the manual section. You can then run the man(1) command to get more information. If the line starts `name(section) ...' you can do `man section name' to get the documentation for it. Try `whatis ed' and then you should do `man 1 ed' to get the manual. whatis is actually just the -f option to the man(1) command.
Whereis locates source/binary and manuals sections for specified files. The supplied names are first stripped of leading pathname components and any (single) trailing extension of the form ``.ext'', e.g. ``.c''. Prefixes of ``s.'' resulting from use of source code control are also dealt with. Whereis then attempts to locate the desired program in a list of standard places. If any of the -b, -s or -m flags are given then whereis searches only for binaries, sources or manual sections respect...
Which takes a list of names and looks for the files which would be executed had these names been given as commands. Each argument is expanded if it is aliased, and searched for along the user's path. Aliases are taken from the user's .cshrc file. The current value of path is used. The -a option reports all instances rather than just the first one. With the -f (fast) option, which ignores the .cshrc file....
who can list the user's name, terminal line, login time, elapsed time since activity occurred on the line, and the process ID of the command interpreter (shell) for each current UNIX system user. It examines the /var/adm/utmpx file to obtain its information. If file is given, that file (which must be in utmpx(4) format, and must have the filename end with the letter x) is examined. Usually, file will be /var/a
whoami displays the login name corresponding to the current effective user ID. If you have used su to temporarily adopt another user, whoami will report the login name associated with that user ID. whoami gets its information from the geteuid and getpwuid library routines (see getuid and getpwent, respectively)....
whodo produces formatted and dated output from information in the /var/adm/utmp and /tmp/.ps_data files. The display is headed by the date, time, and machine name. For each user logged in, device name, user-id, and login time is shown, followed by a list of active processes associated with the user-id. The list includes the device name, process-id, cpu minutes and seconds used, and process name.
The windows customization panel allows the user to set certain IRIX Interactive Desktop resources applicable to the SGI window manager (4Dwm). The following is a list of resources configurable via the windows customization panel: Toolchest Orientation (horizontal/vertical) Keyboard Focus (click to type/point to type) Display Windows Overview (on/off) Opaque Window Move (on/off) Auto Window Placement (on/off) Save Windows & Desks (continuously/explicitly) If Save Windows & Desks is set to Explici...
winterm is a shell script that runs an application in a shell window. It uses the environment variable $WINTERM to determine which kind of shell window to use. Terminal emulators supported are xwsh, wsh and xterm. If WINTERM is unset, winterm provides xwsh as a default. This script is used by fm(1) and toolchest(1X) when launching applications with teletype-style user interfaces. -name or -n name-string sets the winterm's application name, under which resources are to be obtained. The name stri...
Wishx is a minimal Tcl interpreter. By default it includes the standard Tcl(3Tcl) commands, the Extended TclX(3Tcl) commands, the Tk(3Tk) windowing toolkit, and the SGI specific dlopen(3) command. Common extensions can be added by doing an explicit open of a shared library containing the extensions with dlopen. Current included extensions include: tclMotif(3), tclSNMP(3), SybTcl(3), ProDB(3), tclSAUtils(3), TK(3), tkGLX(3), tkGLXAux(3), and tclObjectserver(3)....
write copies lines from your terminal to that of another user. When first called, it sends the message: Message from yourname (tty??) [ date ]... to the person you want to talk to. When it has successfully completed the connection, it also sends two bells to your own terminal to indicate that what you are typing is being sent. The recipient of the message should write back at this point. Communication continues until an end of file is read from the terminal, an interrupt is sent, or the recipien...
The following table shows how to map the old style wsh command line arguments to the xwsh command line arguments: -C textcolor,pagecolor,hilitecolor,cursorbgcolor,selfg,selbg Use -fg, -bg, -bold, -cursorfg, -cursorbg, -selbg, -selfg. -E Use -holdonerror. -f font Use -fn "font". -F Use -xrm "XWsh.fixedSize: true". -H Use -hold. -l logfile Use -log "logfile". -L dev1,dev2 Use -listen "dev1,dev2". -m COLS,LINES Use -max COLSxLINES. -n name Use -name "name". -p x,y Use -geom +x-y. -r lines...
X Window System servers run on computers with bitmap displays. The server distributes user input to and accepts output requests from various client programs through a variety of different interprocess communication channels. Although the most common case is for the client programs to be running on the same machine as the server, clients can be run transparently from other machines (including machines with different architectures and operating systems) as well. X supports overlapping hierarchical...
The xactl command is used to query or modify extended accounting behavior on a running system. The particular operation to be performed is specified by subcommand, which may be in upper, lower or mixed case. The valid subcommands are: allownew Permits any member of an array session to start a new array session using the newarraysess(2) system call. The handle of the array session is specified with the -ash option. The user must be privileged to invoke this subcommand. Notice that it is normally ...
xargs constructs a command line consisting of the command and initial- arguments operands specified followed by as many arguments read in sequence from standard input as will fit in length and number constraints specified by the options. xargs then invokes the constructed command line and waits for its completion. This sequence is repeated until an end-of-file condition is detected on standard input or an invocation of a constructed command line returns an exit stat...
The xauth program is used to edit and display the authorization information used in connecting to the X server. This program is usually used to extract authorization records from one machine and merge them in on another (as is the case when using remote logins or granting access to other users). Commands (described below) may be entered interactively, on the xauth command line, or in scripts. Note that this program does not contact the X server except when the generate command is used. Normally ...
The xbiff program displays a little image of a mailbox. When there is no mail, the flag on the mailbox is down. When mail arrives, the flag goes up and the mailbox beeps. By default, pressing any mouse button in the image forces xbiff to remember the current size of the mail file as being the ``empty'' size and to lower the flag. This program is nothing more than a wrapper around the Athena Mailbox widget....
xbstat monitors the traffic from and to each of the active slots of the Crossbow (Xbow) i/o interconnect. It reports the total number of micropackets sent from and received at each link. It also reports the LLP retries at each link. The -d devname option specifies which Crossbow to monitor in a multiCrossbow system. devname should be a valid Xtalk monitor point under the /hw graph. If the devname is not explicitly specified, xbstat monitors /dev/xbmon by default. The -t sec option determines the...
xcalendar is a simple interactive calendar program with a notebook capability. It is built on the X Toolkit and the Athena or Motif Widgets (compile time option). If month and year are not provided on the command line they are assumed to be current.
The xclipboard program is used to collect and display text selections that are sent to the CLIPBOARD by other clients. It is typically used to save CLIPBOARD selections for later use. It stores each CLIPBOARD selection as a separate string, each of which can be selected. Each time CLIPBOARD is asserted by another application, xclipboard transfers the contents of that selection to a new buffer and displays it in the text window. Buffers are never automatically deleted, so you'll want to use the ...
xcmsdb is used to load, query, or remove Device Color Characterization data stored in properties on the root window of the screen as specified in section 7, Device Color Characterization, of the ICCCM. Device Color Characterization data (also called the Device Profile) is an integral part of Xlib's X Color Management System (Xcms), necessary for proper conversion of color specification between device-independent and device-dependent forms. Xcms uses 3x3 matrices stored in the XDCCC_LINEAR_RGB_M...
xconfirm displays a line of text for each -t argument specified (or a file when the -file argument is used), and a button for each -b argument specified. When one of the buttons is pressed, the label of that button is written to xconfirm's standard output. The enter key activates the specified default button. This provides a means of communication/feedback from within shell scripts and a means to display useful information to a user from an application. Command line options are available to spe...
The xcutsel program is used to copy the current selection into a cut buffer and to make a selection that contains the current contents of the cut buffer. It acts as a bridge between applications that don't support selections and those that do. By default, xcutsel will use the selection named PRIMARY and the cut buffer CUT_BUFFER0. Either or both of these can be overridden by command line arguments or by resources. An xcutsel window has the following buttons: quit When this button is pressed, xc...
xdiff is a graphical browser for viewing the differences between two files and can be used to produce a merged version. The text of the two files are presented side by side with their differences highlighted for easy identification. The two paths supplied on the command line identify the files to be compared. One of the two paths must be a file. The other may be one of three things. Another file, a directory, in which case the last component of the file name will be appended to the directory to ...
The xditview program displays ditroff output on an X display. It uses no special metrics and automatically converts the printer coordinates into screen coordinates; using the user-specified screen resolution, rather than the actual resolution so that the appropriate fonts can be found. If ``-'' is given as the filename, xditview reads from standard input. If ``|'' is the first character of filename, xditview forks sh to run the rest of the ``file name'' and uses the standard output of that...
Xdm manages a collection of X displays, which may be on the local host or remote servers. The design of xdm was guided by the needs of X terminals as well as The Open Group standard XDMCP, the X Display Manager Control Protocol. Xdm provides services similar to those provided by init, getty and login on character terminals: prompting for login name and password, authenticating the user, and running a ``session.'' A ``session'' is defined by the lifetime of a particular process; in the tradit...
Xdpr uses the commands xwd, xpr, and lpr or lp to dump an X window, process it for a particular printer type, and print it out on the printer of your choice. This is the easiest way to get a printout of a window. Xdpr by default will print the largest possible representation of the window on the output page. The options for xdpr are the same as those for xpr, xwd, and lpr or lp. The most commonly-used options are described below; see the manual pages for these commands for more detailed descript...
Xdpyinfo is a utility for displaying information about an X server. It is used to examine the capabilities of a server, the predefined values for various parameters used in communicating between clients and the server, and the different types of screens and visuals that are available. By default, numeric information (opcode, base event, base error) about protocol extensions is not displayed. This information can be obtained with the -queryExtensions option. Use of this option on servers that dyn...
Xedit provides a window consisting of the following four areas: Commands Section A set of commands that allow you to exit xedit, save the file, or load a new file into the edit window. Message Window Displays xedit messages. In addition, this window can be used as a scratch pad. Filename Display Displays the name of the file currently being edited, and whether this file is Read-Write or Read Only. Edit Window Displays the text of the file that you are editing or creating....
The xfd utility creates a window containing the name of the font being displayed, a row of command buttons, several lines of text for displaying character metrics, and a grid containing one glyph per cell. The characters are shown in increasing order from left to right, top to bottom. The first character displayed at the top left will be character number 0 unless the -start option has been supplied in which case the character with the number given in the -start option will be used. The character...
xfindproxy is a program used to locate available proxy services. It utilizes the Proxy Management Protocol to communicate with a proxy manager. The proxy manager keeps track of all available proxy services, starts new proxies when necessary, and makes sure that proxies are shared whenever possible. The -manager argument is required, and it specifies the network address of the proxy manager. The format of the address is a standard ICE network id (for example, "tcp/blah.x.org:6500"). The -name a...
The xfontsel application provides a simple way to display the fonts known to your X server, examine samples of each, and retrieve the X Logical Font Description ("XLFD") full name for a font. If -pattern is not specified, all fonts with XLFD 14-part names will be selectable. To work with only a subset of the fonts, specify -pattern followed by a partially or fully qualified font name; e.g., ``-pattern *medium*'' will select that subset of fonts which contain the string ``medium'' somewhere...
xfsdump backs up files and their attributes in a filesystem. The files are dumped to storage media, a regular file, or standard output. Options allow the operator to have all files dumped, just files that have changed since a previous dump, or just files contained in a list of pathnames. The xfsrestore(1M) utility re-populates a filesystem with the contents of the dump. Each invocation of xfsdump dumps just one filesystem. That invocation is termed a dump session. The dump session splits the fil...
xfsdump(1M) maintains an online dump inventory in /var/xfsdump/inventory. The -I option of xfsdump displays the inventory contents hierarchically. The levels of the hierarchy are: filesystem, dump session, stream, and media file. Over time, this database may grow too large as xfsdump and xfsrestore(1M) do not remove entries from the inventory. The database may also develop inconsistencies for various reasons such as operator errors etc., that may cause xfsdump or xfsrestore to print error or war...
xfsrestore restores filesystems from dumps produced by xfsdump(1M). Two modes of operation are available: simple and cumulative. The default is simple mode. xfsrestore populates the specified destination directory, dest, with the files contained in the dump media. The -r option specifies the cumulative mode. Successive invocations of xfsrestore are used to apply a chronologically ordered sequence of delta dumps to a base (level 0) dump. The contents of the filesystem at the time each dump was pr...
xfs_bmap prints the map of disk blocks used by files in an XFS filesystem. The map lists each extent used by the file, as well as regions in the file that do not have any corresponding blocks (holes). Each line of the listings takes the following form: extent: [startoffset..endoffset]: startblock..endblock Holes are marked by replacing the startblock..endblock with hole. All the file offsets and disk blocks are in units of 512-byte blocks, no matter what the filesystem's block size is. If porti...
xfs_check checks whether an XFS filesystem is consistent. It is normally run only when there is reason to believe that the filesystem has a consistency problem. The filesystem to be checked is specified by the xfs_special argument, which should be the disk or volume device for the filesystem. Filesystems stored in files can also be checked, using the -f flag. The filesystem should normally be unmounted or read-only during the execution of xfs_check. Otherwise, spurious problems are reported. xfs...
xfs_chver uses the xfs_db command to change the version of a filesystem to enable the extent unwritten version. This version is needed to close a security hole where a process can sometimes read old data off disk. The command must be run by the super-user. The command either does all devices found in fstab(4) when the -a option is used or the given devices from the second form above. The command either does the changes or creates scripts which can later be applied using the xfs_db command. If th...
xfs_copy copies an XFS filesystem to one or more targets in parallel (see xfs(4)). The first (source) argument must be the pathname of the device or file containing the XFS filesystem. The remaining arguments specify one or more target devices or a filename. If the pathnames specify devices, a copy of the source XFS filesystem is created on each device. If any of the source or target device names specify devices that are not raw devices, xfs_copy attempts to locate the raw device corresponding t...
xfs_db is used to examine an XFS filesystem. Under rare circumstances it can also be used to modify an XFS filesystem, but that task is normally left to xfs_repair(1M) or to scripts such as xfs_chver that run xfs_db. xfs_db64 is a 64-bit version of xfs_db which is not as susceptible to running out of memory. It is available only on 64-bit capable systems. The options to xfs_db are: -c cmd xfs_db commands may be run interactively (the default) or as arguments on the command line. Multiple -c argu...
For each directory argument, xfs_estimate estimates the space that directory would take if it were copied to an XFS filesystem. xfs_estimate does not cross mount points. The following definitions are used: KB = *1024 MB = *1024*1024 GB = *1024*1024*1024 The xfs_estimate options are: -b blocksize Use blocksize instead of the default blocksize of 4096 bytes. The modifier k can be used after the number to indicate multiplication by 1024. For example, xfs_estimate
xfs_growfs expands an existing XFS filesystem (see xfs(4)). The mount- point argument is the pathname of the directory where the filesystem is mounted. The filesystem must be mounted to be grown (see mount(1M)). The existing contents of the filesystem are undisturbed, and the added space becomes available for additional file storage. The options to xfs_growfs are: -d, -D size Specifies that the data section of the filesystem should be grown. If the -D size option is given, the data section is gr...
xfs_logprint prints the log of an XFS filesystem (see xfs(4)). The device-name argument is the pathname of the partition or logical volume containing the filesystem. The contents of the filesystem remain undisturbed. There are two major modes of operation in xfs_logprint. One mode is better for filesystem operation debugging. It is called the transactional view and is enabled through the -t option. The transactional view prints only the portion of the log that pertains to recovery. In other word...
xfs_ncheck with no -i arguments generates an inode number and pathname list of all files on the given filesystem. Names of directory files are followed by /.. The output is not sorted in any particular order. The filesystem to be examined is specified by the xfs_special argument, which should be the disk or volume device for the filesystem. Filesystems stored in files can also be checked, using the -f flag. xfs_ncheck64 is a 64-bit version of xfs_check which is not as susceptible to running out ...
xfs_repair repairs corrupt or damaged XFS filesystems (see xfs(4)). xfs_repair does not work on EFS filesystems (see fsck(1M)). The filesystem is specified using the xfs_special argument which should be the device name of the disk partition or volume containing the filesystem. If given the name of a block device, xfs_repair will attempt to find the raw device associated with the specified block device and will use the raw device instead. Regardless, the filesystem to be repaired must be unmounte...
The X firewall proxy (xfwp) is an application layer gateway proxy that may be run on a network firewall host to forward X traffic across the firewall. Used in conjunction with the X server Security extension and authorization checking, xfwp constitutes a safe, simple, and reliable mechanism both to hide the addresses of X servers located on the Intranet and to enforce a server connection policy. Xfwp cannot protect against mischief originating on the Intranet; however, when properly configured i...
The xhost program is used to add and delete host names or user names to the list allowed to make connections to the X server. In the case of hosts, this provides a rudimentary form of privacy control and security. It is only sufficient for a workstation (single user) environment, although it does limit the worst abuses. Environments which require more sophisticated measures should implement the user-based mechanism or use the hooks in the protocol for passing other authentication data to the ser...
The xinit program is used to start the X Window System server and a first client program on systems that cannot start X directly from /etc/init or in environments that use multiple window systems. When this first client exits, xinit will kill the X server and then terminate. If no specific client program is given on the command line, xinit will look for a file in the user's home directory called .xinitrc to run as a shell script to start up client programs. If no such file exists, xinit will us...
The xkbcomp keymap compiler converts a description of an XKB keymap into one of several output formats. The most common use for xkbcomp is to create a compiled keymap file (.xkm extension) which can be read directly by XKB-capable X servers or utilities. The keymap compiler can also produce C header files or XKB source files. The C header files produced by xkbcomp can be included by X servers or utilities that need a built-in default keymap. The XKB source files produced by xkbcomp are fully res...
The xkbprint comman generates a printable or encapsulated PostScript description of the XKB keyboard description specifed by source. The source can be any compiled keymap (.xkm) file that includes a geometry description or an X display specification. If an output_file is specified, xkbprint writes to it. If no output file is specified, xkbprint creates replaces the extension of the source file with .ps or .eps depending on the requested format. If the source is a non-local X display (e.g.:0), xk...
Xkill is a utility for forcing the X server to close connections to clients. This program is very dangerous, but is useful for aborting programs that have displayed undesired windows on a user's screen. If no resource identifier is given with -id, xkill will display a special cursor as a prompt for the user to select a window to be killed. If a pointer button is pressed over a non-root window, the server will close its connection to the client that created the window....
The program xkspool is a command-line interface to a few of the xktalk (1) GUI's printer maintenance duties. It can create and delete printers, or can updated printer queue scripts. Only the Super-User (root) may use this program. When run with the -O option, a printer queue will be created to the printer object in the default zone if no -Z option is specified. The name of the queue can be supplied with the -createq option, but qname only overrides a queue name that would have been made from th...
The program xktalk is an X11/Motif client that handles GUI administration of Xinet software. See the K-Talk Administrator's Guide for more information on running xktalk. The only option xktalk accepts that is not an X Toolkit option is -notroot. When a user other than the super-user (root) runs xktalk, they are prompted to supply the superuser password if they want system-administrator privileges. If the -notroot option is given on xktalk's command line, that prompt dialog box will not appear,...
xlistscrns prints (to standard output) a list of available screens for an X server. The list items are suitable for use as a display parameter to most X applications. For example, if janus is running X server 1 which has two screens, then xlistscrns -display janus:1 will print janus:1.0 janus:1.1
xlock blanks (or otherwise saves) the screen and possibly locks the X server till the user enters their password at the keyboard. While xlock is has the screen locked, all new server connections are refused. The screen saver is disabled. The mouse cursor is turned off. The screen is blanked and a changing pattern is put on the screen. If a key or a mouse button is pressed then the user is prompted for the password of the user who started xlock. If the correct password is typed, then the screen i...
Xlsatoms lists the interned atoms. By default, all atoms starting from 1 (the lowest atom value defined by the protocol) are listed until unknown atom is found. If an explicit range is given, xlsatoms will try all atoms in the range, regardless of whether or not any are undefined.
Xlsclients is a utility for listing information about the client applications running on a display. It may be used to generate scripts representing a snapshot of the user's current session.
Xlsfonts lists the fonts that match the given pattern. The wildcard character "*" may be used to match any sequence of characters (including none), and "?" to match any single character. If no pattern is given, "*" is assumed. The "*" and "?" characters must be quoted to prevent them from being expanded by the shell.
xlvCreateLV invokes xlv_make to configure the indicated disk partition(s) into a new xlv logical volume. The name of the newly created volume is written to standard output. This privcmd is not intended to be called from the command line. xlv_make provides a more interactive interface for creating xlv objects, including logical volumes.
xlvExtend adds another partition to a logical volume and then grows the filesystem on it. The data already on the logical volume remains intact, but any information previously on the partition that is being added will be destroyed. This command calls xlv_make(1M) to make the new partition into a volume, xlv_mgr(1M) to add the volume element to the logical volume, and xfs_growfs(1M) to grow the filesystem onto the new volume. This privcmd is not intended to be called from the command line. xlv_ma...
xlv_assemble scans all the disks attached to the local system for logical volume labels. It assembles all the available logical volumes and generates a configuration data structure. xlv_assemble also creates the device nodes for all XLV volumes in /dev/xlv and /dev/rxlv. The kernel is then activated with the newly created configuration data structure. If necessary, xlv_assemble also asks the xlv_plexd(1M) daemon to perform any necessary plex revives. xlv_assemble is automatically run on system s...
xlv_labd, xlv_plexd, and xlvd are logical volume daemons. xlv_labd and xlv_plexd reside in user process space and xlvd resides in kernel process space. The XLV label daemon, xlv_labd, is a user process that writes logical volume disk labels. It is normally started during system restart. Upon startup, xlv_labd immediately calls into the kernel to wait for an action request from the kernel daemon, xlvd. When an action request comes, xlv_labd processes it and updates the appropriate volume disk lab...
xlv_make creates new logical volume objects by writing logical volume labels to the devices that are to constitute the volume objects. A volume object can be an entire volume, a plex, or a volume element. xlv_make allows you to create objects that are not full volumes so that you can maintain a set of spares. xlv_make supports the following command line options: -c cmdstring Command line option. Causes xlv_make to go into command line mode and use cmdstring as the command input. Multiple instanc...
xlv_mgr displays and modifies existing XLV objects (volumes, plexes, volume elements, and XLV disk labels). xlv_mgr can operate on XLV volumes even while they are mounted and in use. xlv_mgr supports the following command line options: -r root Use root as the root directory. This is used in the miniroot when / is mounted as /root. -c cmdstring Command line option. Causes xlv_mgr to go into command line mode and use cmdstring as the command input. Multiple instances of -c are accumulated. -v Verb...
xlv_set_primary finds the XLV volume and plex to which device_name belongs and makes that plex the active copy. All the other plexes that belong to this volume are marked stale. This causes all of the plexes in this volume to be synchronized to the contents of the active plex when the volume is later assembled by xlv_assemble(1M). xlv_set_primary is designed for use during the miniroot when only a single plex of the volume is running. Making that plex the primary plex of the volume ensures that ...
xlv_shutdown is used to gracefully shut down (``disassemble'') logical volumes after their corresponding filesystems have been unmounted. It is called by /etc/umountfs, which is called by /etc/inittab at system shutdown time. xlv_shutdown typically does not need to be explicitly invoked. xlv_shutdown gets the XLV volumes from the kernel and cleanly shuts them down. This ensures that all the plexes in a volume are in sync so that they do not need to be revived when restarted. After a volume has...
The xmag program allows you to magnify portions of an X screen. If no explicit region is specified, a square with the pointer in the upper left corner is displayed indicating the area to be enlarged. The area can be dragged out to the desired size by pressing Button 2. Once a region has been selected, a window is popped up showing a blown up version of the region in which each pixel in the source image is represented by a small square of the same color. Pressing Button1 in the enlargement window...
Xman is a manual page browser. This is international version to browse manual written in various languages. Although this manual is written in English, an user can change any English menu label below to that one written in other language. The default size of the initial xman window is small so that you can leave it running throughout your entire login session. In the initial window there are three options: Help will pop up a window with on-line help, Quit will exit, and Manual Page will pop up a...
Xmessage displays a window containing a message from the command line, a file, or standard input. Along the lower edge of the message is row of buttons; clicking the left mouse button on any of these buttons will cause xmessage to exit. Which button was pressed is returned in the exit status and, optionally, by writing the label of the button to standard output. Xmessage is typically used by shell scripts to display information to the user or to ask the user to make a choice....
The xmh program provides a graphical user interface to the MH Message Handling System. To actually do things with your mail, it makes calls to the MH package. Electronic mail messages may be composed, sent, received, replied to, forwarded, sorted, and stored in folders. xmh provides extensive mechanism for customization of the user interface. This document introduces many aspects of the Athena Widget Set....
The xmodmap program is used to edit and display the keyboard modifier map and keymap table that are used by client applications to convert event keycodes into keysyms. It is usually run from the user's session startup script to configure the keyboard according to personal tastes.
Xon runs the specified command (default xterm -ls) on the remote machine using rsh, remsh, or rcmd. Xon passes the DISPLAY, XAUTHORITY and XUSERFILESEARCHPATH environment variables to the remote command. When no command is specified, xon runs 'xterm -ls'. It additionally specifies the application name to be 'xtermremote-host' and the window title to be '-fIremote-host'. Xon can only work when the remote host will allow you to log in without a password, by having an entry in the .rhosts fil...
xpr takes as input a window dump file produced by xwd(1) and formats it for output on PostScript printers, the Digital LN03 or LA100, the IBM PP3812 page printer, the HP LaserJet (or other PCL printers), or the HP PaintJet. If no file argument is given, the standard input is used. By default, xpr prints the largest possible representation of the window on the output page. Options allow the user to add headers and trailers, specify margins, adjust the scale and orientation, and append multiple wi...
The Open Group's X Project Team was created as the successor to the X Consortium, Inc., after the X Consortium was merged into The Open Group. The X.Org Group (hereinafter called "X.Org") was created as the successor to The X Project Team after the The Open Group ceased operating The X Project Team. The purpose of X.Org is to foster development, evolution, and maintenance of the X Window System. X.Org operates under the corporate umbrella of The Open Group. The X Consortium was an independent...
For each of these properties, its value on the selected window or font is printed using the supplied formatting information if any. If no formatting information is supplied, internal defaults are used. If a property is not defined on the selected window or font, "not defined" is printed as the value for that property. If no property list is given, all the properties possessed by the selected window or font are printed. A window may be selected in one of four ways. First, if the desired window ...
Xrdb is used to get or set the contents of the RESOURCE_MANAGER property on the root window of screen 0, or the SCREEN_RESOURCES property on the root window of any or all screens, or everything combined. You would normally run this program from your X startup file. Most X clients use the RESOURCE_MANAGER and SCREEN_RESOURCES properties to get user preferences about color, fonts, and so on for applications. Having this information in the server (where it is available to all clients) instead of on...
Xrefresh is a simple X program that causes all or part of your screen to be repainted. This is useful when system messages have messed up your screen. Xrefresh maps a window on top of the desired area of the screen and then immediately unmaps it, causing refresh events to be sent to all applications. By default, a window with no background is used, causing all applications to repaint ``smoothly.'' However, the various options can be used to indicate that a solid background (of any color) or th...
xscope is a program that monitors connections between an X server and a client. xscope prints to stdout the contents of each request, reply, error, or event that is communicated between the server and client. This information can be useful in debugging and performance tuning of X servers and clients. xscope attaches to the X server as if it were a client. By adjusting the host and/or display number, the client can be made to attach to xscope instead of the X server. server <-----> xscope <----->...
Host Access Any client on a host in the host access control list is allowed access to the X server. This system can work reasonably well in an environment where everyone trusts everyone, or when only a single person can log in to a given machine, and is easy to use when the list of hosts used is small. This system does not work well when multiple people can log in to a single machine and mutual trust does not exist. The list of allowed hosts is stored in the X server and can be changed with the ...
X is the generic name for the X Window System display server. It is frequently a link or a copy of the appropriate server binary for driving the most frequently used server on a given machine.
Xsetmon is a GUI program that allows a user to set the video output format/combinations, the sync sources for the graphics display, and gamma correction values. Xsetmon can also be used to set the default video format to be used at system power-up or graphics initialization. Users wishing to change the default video format must have root privileges on the target machine. xscreen is an alternative name for xsetmon....
The setroot program allows you to tailor the appearance of the background ("root") window on a workstation display running X. Normally, you experiment with xsetroot until you find a personalized look that you like, then put the xsetroot command that produces it into your X startup file. If no options are specified, or if -def is specified, the window is reset to its default state. The -def option can be specified along with other options and only the nonspecified characteristics will be reset ...
Xsgi is the name for the Silicon Graphics, Inc. X Window System server. The server supports the X version 11 protocol, and is based on Release 6 of the X Consortium distribution. The X Window System is described in X Window System by Scheifler and Gettys (Digital Press, ISBN 1- 55558-088-2). For details on use of the X Window System, it is recommended that you refer to the X Window System User's Guide for Version 11 (Volume III), by Tim O'Reilly, Valerie Quercia, and Linda Lamb (O'Reilly & As...
Xshowcmap displays the contents of the currently active colormap in a window. The created window shows a square for every color currently defined in the servers active colormap. The number of squares is the number of colormapcells the server supports. Xshowcmap has been specially written to aid server debugging/verification. To leave xshowcmap type 'q' while the cursor is in its window. The following options are valid: -bd color as usual - change border color -bw number as usual - change borde...
xsm is a session manager. A session is a group of applications, each of which has a particular state. xsm allows you to create arbitrary sessions - for example, you might have a "light" session, a "development" session, or an "xterminal" session. Each session can have its own set of applications. Within a session, you can perform a "checkpoint" to save application state, or a "shutdown" to save state and exit the session. When you log back in to the system, you can load a specific sess...
The xstdcmap utility can be used to selectively define standard colormap properties. It is intended to be run from a user's X startup script to create standard colormap definitions in order to facilitate sharing of scarce colormap resources among clients. Where at all possible, colormaps are created with read-only allocations.
Xstr maintains a file strings into which strings in component parts of a large program are hashed. These strings are replaced with references to this common area. This serves to implement shared constant strings, most useful if they are also read-only. The -v flag makes xstr verbose. The command xstr -c name will extract the strings from the C source in name, replacing string references by expressions of the form (&xstr[number]) for some number. An appropriate declaration of xstr is prepended to...
xsubpp will compile XS code into C code by embedding the constructs necessary to let C functions manipulate Perl values and creates the glue necessary to let Perl access those functions. The compiler uses typemaps to determine how to map C function parameters and variables to Perl values. The compiler will search for typemap files called typemap. It will use the following search path to find default typemaps, with the rightmost typemap taking precedence. ../../../typemap:../../typemap:../typemap...
The xterm program is a terminal emulator for the X Window System. It provides DEC VT102 and Tektronix 4014 compatible terminals for programs that can't use the window system directly. If the underlying operating system supports terminal resizing capabilities (for example, the SIGWINCH signal in systems derived from 4.3bsd), xterm will use the facilities to notify programs running in the window whenever it is resized. The VT102 and Tektronix 4014 terminals each have their own window so that you ...
Xwd is an X Window System window dumping utility. Xwd allows X users to store window images in a specially formatted dump file. This file can then be read by various other X utilities for redisplay, printing, editing, formatting, archiving, image processing, etc. The target window is selected by clicking the pointer in the desired window. The keyboard bell is rung once at the beginning of the dump and twice when the dump is completed....
Xwininfo is a utility for displaying information about windows. Various information is displayed depending on which options are selected. If no options are chosen, -stats is assumed. The user has the option of selecting the target window with the mouse (by clicking any mouse button in the desired window) or by specifying its window id on the command line with the -id option. Or instead of specifying the window by its id number, the -name option may be used to specify which window is desired by n...
The xwnmo is a input manager for Input Method of X Window System. It is based on [X Window System, Version 11 Input Method Specifications]. It provides a multi-language input environment for multiple clients in the X Window System Version 11. Clients can connect to it by using XIM library. xwnmo supports multi-screen environment. xwnmo creates one window for Root-mode on each screen. The conversion engine xwnmo use is the internationalized Wnn. It selects conversion server in accordance with lan...
xwsh is a terminal emulation program that runs a login shell (or other UNIX command) within its own window on the screen. Command line options are available to specify the font, window size, title, and position when xwsh starts up. The command line options are: -anchor anchor-point Set the anchor point for window size changes. When the window size is changed from the size menu, xwsh needs to define which corner of the window is anchored down during the size change. xwsh attempts to keep the anch...
Xwud is an X Window System image undumping utility. Xwud allows X users to display in a window an image saved in a specially formatted dump file, such as produced by xwd(1).
The yacc command converts a context-free grammar into a set of tables for a simple automaton that executes an LALR(1) parsing algorithm. The grammar may be ambiguous; specified precedence rules are used to break ambiguities. yacc processes supplementary code set characters in program comments and strings, and single-byte supplementary code set characters in tokens, according to the locale specified in the LC_CTYPE environment variable [see LA...
ypcat prints out values in the network information service (NIS) map specified by mname, which may be either a mapname or a map nickname. ypcat uses the current NIS server to obtain the information. For example, to display the network-wide password database, passwd.byname, (with the nickname passwd), type: ypcat passwd Refer to ypfiles(4) and nis(1M) for an overview of NIS.
Ypchpass changes selected passwd(4) fields associated with the user name (your own name by default) in the network information service (NIS) passwd databases. The passwd fields that can be modified with ypchpass may have different contents from those for the same user in the local /etc/passwd file. If invoked without options, ypchpass invokes the editor named by the environment variable EDITOR, or vi(1) if EDITOR is null or unset, to edit a template of selected passwd fields. After the user has ...
ypinit sets up network information service (NIS) on a system. It can be used to set up a client or a master or slave server. You must be the superuser to run it. It asks a few self-explanatory questions, and reports success or failure to the terminal. It sets up a master server using the simple model in which that server is master to all maps in the data base. This is the way to bootstrap the NIS system; later if you want, you can change the association of maps to masters. All databases are buil...
On NIS master machines, ypmake uses the file /var/yp/mdbm_parse and the optional file /var/yp/local.make.script to build the network information service (NIS) databases. With no arguments, ypmake creates mdbm(3B) databases for any NIS maps that are out-of-date and then executes yppush(1M) to notify slave servers that there has been a change. If invoked with map, ypmake updates that map only. Typing ypmake passwd creates and yppushes the password database (assuming it is out-of-date). Likewise, y...
ypmatch prints the values associated with one or more keys from the network information service (NIS) map (database) specified by a mname, which may be either a mapname or an map nickname. Multiple keys can be specified; the same map will be searched for all. The keys must be exact values insofar as capitalization and length are concerned. No pattern matching is available. If a key is not matched, a diagnostic message is produced....
yppasswd changes (or installs) a password associated with the user name (your own name by default) in the network information service (NIS) passwd databases. The NIS password may be different from the one for the same user in the local /etc/passwd file. yppasswd prompts for the old NIS password and then for the new one. The caller must supply both. The new password must be typed twice, to forestall mistakes. New passwords must be at least four characters long if they use a sufficiently rich alph...
yppoll asks a ypserv process what the order number is and which host is the network information service (NIS) master server for the map mapname. If the server is a v.1 NIS protocol server, yppoll uses the older protocol to communicate with it. In this case, it also uses the older diagnostic messages in case of failure.
yppush copies a new version of the specified NIS map from the master NIS server to the slave NIS servers. It is normally run only on the master server by ypmake(1M) after the master databases are changed. It first constructs a list of NIS server hosts by reading the ypservers map within the domain. Keys within the ypservers map are the hostnames of the domain's NIS servers. A ``transfer map'' request is sent to the NIS server at each host, along with the information needed by the transfer age...
ypset tells ypbind(1M) to get the network information service (NIS) for the specified domain from the ypserv process running on server. If server is down, or isn't running ypserv, this is not discovered until an NIS client process tries to get a binding for the domain. At this point, the binding set by ypset will be tested by ypbind. If the binding is invalid, ypbind attempts to rebind for the same domain. By default, ypbind does not allow ypset operations from local or remote hosts. ypset retu...
ypupdated is a daemon that updates information in the network information service (NIS), normally started up by inetd(1M). ypupdated consults the file updaters(4) in the directory /var/yp to determine which NIS maps should be updated and how to change them. By default, the daemon requires the most secure method of authentication available to it, which currently is AUTH_UNIX. The DES authentication method is not implemented at the time....
ypwhich tells which network information service (NIS) server supplies NIS services to an NIS client, or which server is the master for a map. If invoked without arguments, it prints the NIS server for the local machine. If hostname is specified, that machine is queried to find out which NIS server it is using. Refer to ypfiles(4) and nis(1M) for an overview of NIS.
ypxfr moves a network information service (NIS) map to the local host by making use of normal NIS services. It creates a temporary map in the directory /var/ns/domain/domain (which must already exist), fills it by enumerating the map's entries, fetches the map parameters (master and order number) and loads them. It then deletes any old versions of the map and moves the temporary map to the real mapname. If ypxfr is run interactively, it writes its output to the terminal. However, if it is invok...
yp_bootparam is the user interface tool to update the NIS bootparams(4) database directly on client workstation without running on ypmaster. yp_bootparam uses the ypupdated(1M) service on ypmaster to update the bootparams database. User can either add an entry to database or delete an entry. As long as the hostname is registered in the NIS hosts database and the bootparam entry does not exist, the user can always add an entry to the bootparams database. In this process, a security key can be req...
yp_host is the user command to update the NIS hosts database directly from a client workstation. yp_host uses the ypupdated(1M) service on the NIS master to update the NIS hosts database. The single-threaded nature of ypupdated(1M) guarantees the database will remain consistent even when multiple updates are attempted at the same time. Users can add, change, or delete an entry to the database. As long as the hostname is not used in the current database, there are no restrictions for creating an ...
The argument s is a socket that has been created with socket(2), bound to an address with bind(2), and is listening for connections after a listen(2). Accept extracts the first connection on the queue of pending connections, creates a new socket with the same properties of s and allocates a new file descriptor for the socket. If no pending connections are present on the queue, and the socket is not marked as non-blocking, accept blocks the caller until a connection is present. If the socket is m...
path points to a path name naming a file. access checks the named file for accessibility according to the bit pattern contained in amode, using the real user ID in place of the effective user ID and the real group ID in place of the effective group ID. The bit pattern contained in amode is constructed by an OR of the following constants (defined in <unistd.h>): R_OK test for read permission W_OK test for write permission X_OK t...
acct enables or disables the system process accounting routine. If the routine is enabled, an accounting record will be written in an accounting file for each process that terminates. The termination of a process can be caused by one of two things: an exit call or a signal [see exit(2) and signal(2)]. The calling process must have the capability CAP_ACCT_MGT (see capabilities(4) ) in its effective set to en...
adjtime adjusts the system's notion of the current time, as returned by gettimeofday(3C), advancing or retarding it by the amount of time specified in the struct timeval pointed to by delta. The adjustment is effected by speeding up (if that amount of time is positive) or slowing down (if that amount of time is negative) the system's clock by some small percentage, generally a fraction of one percen...
alarm instructs the alarm clock of the calling process to send the signal SIGALRM to the calling process after the number of real time seconds specified by sec have elapsed [see signal(2)]. Alarm requests are not stacked; successive calls reset the alarm clock of the calling process. If sec is 0, any previously made alarm request is canceled. fork sets the alarm clock of a new process to 0 [see fork(2)]. A process crea...
The arsctl function queries and/or modifies some aspect of the behavior of array sessions on the currently running system. Most of the array session control operations take some sort of argument. A pointer to the argument is passed as bufptr, and the length of the argument is specified with buflen. The particular operation to be performed is identified by the function code func, which is defined in . Available array session control operations include:...
The arsop function performs an operation on the array session identified by the handle ash. If ash is less than 0, then the operation is performed on the array session that is associated with the calling process. Most array session operations take some sort of argument. A pointer to the argument is passed as bufptr, and the length of the argument is specified with buflen. The particular operation to be performed is identified by the function code func, which is defined in . Availab...
The attr group of system calls implement the ability for a user to attach name/value pairs to objects within the filesystem. They could be used to store meta-information about the file. For example "character-set=kanji" could tell a document browser to use the Kanji character set when displaying that document and "thumbnail=..." could provide a reduced resolution overview of a high resolution graphic image. The names can be up to MAXNAMELEN bytes in length, terminated by the first 0 byte. Th...
The attr group of system calls implement the ability for a user to attach name/value pairs to objects within the filesystem. They could be used to store meta-information about the file. For example "character-set=kanji" could tell a document browser to use the Kanji character set when displaying that document and "thumbnail=..." could provide a reduced resolution overview of a high resolution graphic image. The names can be up to MAXNAMELEN bytes in length, terminated by the first 0 byte. Th...
The attr group of system calls implement the ability for a user to attach name/value pairs to objects within the filesystem. They could be used to store meta-information about the file. For example "character-set=kanji" could tell a document browser to use the Kanji character set when displaying that document and "thumbnail=..." could provide a reduced resolution overview of a high resolution graphic image. The names can be up to MAXNAMELEN bytes in length, terminated by the first 0 byte. Th...
The attr group of system calls implement the ability for a user to attach name/value pairs to objects within the filesystem. They could be used to store meta-information about the file. For example "character-set=kanji" could tell a document browser to use the Kanji character set when displaying that document and "thumbnail=..." could provide a reduced resolution overview of a high resolution graphic image. The names can be up to MAXNAMELEN bytes in length, terminated by the first 0 byte. Th...
The attr group of system calls implement the ability for a user to attach name/value pairs to objects within the filesystem. They could be used to store meta-information about the file. For example "character-set=kanji" could tell a document browser to use the Kanji character set when displaying that document and "thumbnail=..." could provide a reduced resolution overview of a high resolution graphic image. The names can be up to MAXNAMELEN bytes in length, terminated by the first 0 byte. Th...
Bind assigns a name to an unnamed socket. When a socket is created with socket(2) it exists in a name space (address family) but has no name assigned. Bind requests that name be assigned to the socket. The rules used in name binding vary between communication domains. Consult the protocol manual entries in section 7 for detailed information.
These routines provide a complete set of blocking/unblocking capabilities for processes. Blocking is implemented with a counting semaphore in the kernel. Each call to blockproc decrements the count. When the count becomes negative, the process is suspended. When unblockproc is called, the count is incremented. If the count becomes non-negative (>= 0), the process is restarted. This provides both a simple, race free synchronization ability between two processes and a much more powerful capability...
brk and sbrk are used to change dynamically the amount of space allocated for the calling process's data segment [see exec(2)]. The change is made by resetting the process's break value and allocating the appropriate amount of space. The break value is the address of the first location beyond the end of the data segment. The amount of allocated space increases as the break value increases. Newly allocated space is set to zero. If, however, the same memory space...
The cachectl system call allows a process to make ranges of its address space cacheable or uncacheable. Initially, a process's entire address space is cacheable. The op parameter may be one of: CACHEABLE Make the indicated pages cacheable UNCACHEABLE Make the indicated pages uncacheable The CACHEABLE and UNCACHEABLE op's affect the address range indicated by addr and nbytes. addr must be page aligned and nbytes must be a multiple of the page size. Changing a page from UNCACHEABLE state to CACH...
cacheflush and _flush_cache are different names for the same function. They flush the contents of the indicated cache(s) for user addresses in the range addr to (addr+nbytes-1). The cache parameter may be one of: ICACHE Flush only the instruction cache DCACHE Flush only the data cache BCACHE Flush both the instruction and the data cache
chdir and fchdir cause a directory pointed to by path or fildes to become the current working directory, the starting point for path searches for path names not beginning with /. path points to the path name of a directory. The fildes argument to fchdir is an open file descriptor of a directory. In order for a directory to become the current directory, a process must have execute (search) access to the directory. chdir will fai...
chmod and fchmod set the access permission portion of the mode of the file whose name is given by path or referenced by the descriptor fildes to the bit pattern contained in mode. If path or fildes are symbolic links, the access permissions of the target of the symbolic links are set. Access permission bits are interpreted as follows: S_ISUID 04000 Set user ID on execution. S_ISGID 020#0 Set group ID on execution if # is 7, ...
Path points to a path name naming a file, and fd refers to the file descriptor associated with a file. The owner ID and group ID of the named file are set to the numeric values contained in owner and group respectively. Note that lchown differs from chown in that it does not follow symbolic links. Only processes with effective user ID equal to the file owner or superuser may change the ownership of a file. However, if the variable restricted_chown is enabled [see intro(2) and lboot(1M)] then onl...
path points to a path name naming a directory. chroot causes the named directory to become the root directory, the starting point for path searches for path names beginning with /. The user's working directory is unaffected by the chroot system call. The calling process must have the super-user privilege to change the root directory. The .. entry in the root directory is interpreted to mean the root directory itself. Thus, .. cannot be used to ...
The clock_settime() function sets the specific clock, clock_id, to the value specified by tp. Time values that are between two consecutive nonnegative integer multiples of the resolution of the specified clock are truncated down to the smaller multiple of the resolution. The clock_gettime() function returns the current value tp for the specified clock, clock_id. Depending on the clocks resolution, it may be possi...
fildes is a file descriptor obtained from a creat, open, dup, fcntl, pipe, or iocntl system call. close closes the file descriptor indicated by fildes. All outstanding record locks owned by the process (on the file indicated by fildes) are removed. If the link count of the file is zero, when all file descriptors associated with the file have been closed, the space occupied by the file is freed and the...
The comp library and associated system calls allows applications to use the compression and decompression algorithms from compress(1) and uncompress(1) directly, without having to invoke a separate executable. The compression code in this library has been optimized, and if used in combination with large buffer file reading can result in improved compression times of up to 30% over the standard compress code. You must link with the comp library: cc -o prog prog.c -lcomp...
The parameter s is a socket. If it is of type SOCK_DGRAM, then this call specifies the peer with which the socket is to be associated; this address is that to which datagrams are to be sent, and the only address from which datagrams are to be received. If the socket is of type SOCK_STREAM, then this call attempts to make a connection to another socket. The other socket is specified by name, which is an address in the communications space of the socket. Each communications space interprets the na...
creat creates a new ordinary file or prepares to rewrite an existing file named by the path name pointed to by path. If the file exists, the length is truncated to 0 and the mode and owner are unchanged. If the file does not exist the file's owner ID is set to the effective user ID of the process. The group ID of the file is set to the effective group ID of the process or to the group ID of the directory in which the file is being created. This is determined as follows: If the un...
dmi is a system interface specific to Silicon Graphics systems. It is used to implement the interface defined in the X/Open document: Systems Management: Data Storage Management (XDSM) API dated February 1997. This interface is available made available on Silicon Graphics systems by means of the libdm library. The value of the opcode parameter determines the meaning of the remaining arguments. These are all interfaces that are used to implement various libdm functions. The only filesystem that s...
fildes is a file descriptor obtained from a creat, open, dup, fcntl, pipe, or ioctl system call. dup returns a new file descriptor having the following in common with the original: Same open file (or pipe). Same file pointer (i.e., both file descriptors share one file pointer). Same access mode (read, write or read/write). The new file descriptor is set to remain open across exec system calls [see ...
exec in all its forms overlays a new process image on an old process. The new process image is constructed from an ordinary, executable file. This file is either an executable object file, or a file of data for an interpreter. There can be no return from a successful exec because the calling process image is overlaid by the new process image. An interpreter file begins with a line of the form #! pathname [arg] where pathname is the path of the interpreter, and arg i...
The C library routine exit, which is discussed at the end of this section, invokes the system routine _exit upon completion of its own cleanup chores. _exit terminates the calling process with the following consequences: All of the file descriptors, directory streams and message catalogue descriptors open in the calling process are closed. If the process is sharing file descriptors via an sproc, other members of the share group do NOT have their...
fcntl provides for control over open descriptors. fildes is an open descriptor obtained from a creat, open, dup, fcntl, pipe, socket, or socketpair system call. The commands available are: F_DUPFD Return a new descriptor as follows: Lowest numbered available descriptor greater than or equal to the third argument, arg, taken as an object of type int. Refers to the same object as the original descriptor. Same file pointer as the original file (i.e., both file descriptors share one file pointer). S...
fdes_to_devname is useful to determine the canonical hardware graph path name given the a device file descriptor. Note that this file descriptor can correspond to any of the different alias names for the device.
fdes_to_drivername is useful to determine the name of the driver handling the device corresponding to the special file descriptor. Note that this file descriptor can correspond to any of the different alias names for the device.
filename_to_devname is useful to determine the canonical hardware graph path name given the filename for the device. Note that there can multiple alias names for a device vertex in the hardware graph and the canonical name is unique.
filename_to_drivername is useful to determine the name of the driver handling the device with the given special filename. Note that there can multiple alias names for a device vertex in the hardware graph.
fork causes creation of a new process. The new process (child process) is an exact copy of the calling process (parent process). This means the child process inherits the following attributes from the parent process: real user ID, real group ID, effective user ID, effective group ID environment close-on-exec flag [see exec(2)] signal handling settings (i.e., SIG_DFL, SIG_IGN, SIG_HOLD, function address) supplementar...
The functions fpathconf and pathconf return the current value of a configurable limit or option associated with a file or directory. The path argument points to the pathname of a file or directory; fildes is an open file descriptor; and name is the symbolic constant (defined in <sys/unistd.h>) representing the configurable system limit or option to be returned. The values returned by pathc...
fsync moves all modified data and attributes of fildes to a storage device. When fsync returns, all in-memory modified copies of buffers associated with fildes have been written to the physical medium. fsync is different from sync, which schedules disk I/O for all files but returns before the I/O completes. fsync should be used by programs that require that a file be in a known state. For example, a program that contains a s...
The getash function returns the array session handle (ASH) for the array session that contains the calling process. The handle for an array session is normally assigned by the system when the array session is first created. This can be overridden using the privileged setash(2) function. For details, see the man pages for setash(2).
These functions, along with those defined in makecontext(3C), are useful for implementing user level context switching between multiple threads of control within a process. getcontext initializes the structure pointed to by ucp to the current user context of the calling process. The user context is defined by ucontext(5) and includes the contents of the calling process's machine registers, signal mask and exe...
fildes is a file descriptor obtained from a creat, open, dup, fcntl, pipe, or ioctl system call. getdents attempts to read nbyte bytes from the directory associated with fildes and to format them as file system independent directory entries in the buffer pointed to by buf. Since the file system independent directory entries are of variable length, in most cases the actual number of bytes returne...
Getdomainname returns the name of the NIS domain for the current host, as previously set by setdomainname. The parameter namelen specifies the size of the name array. The returned name is null-terminated unless insufficient space is provided. Setdomainname sets the NIS domain of the host to be name, which has length namelen. This call is restricted to the superuser and is normally used only during system initialization. The purpose of NIS domains is to enable two distinct networks that may have ...
getdtablesize returns the maximum number of file descriptors that the calling process can open. The related getdtablehi(3C) function returns the value of the largest open file descriptor, plus one. The description of {OPEN_MAX} in intro(2) provides more information about how file descriptors are allocated and the various limits imposed on their use.
getgroups retrieves the current group access list of the user process and stores it in the array gidset. The parameter setlen indicates the number of entries that may be placed in gidset. The return value is the actual number of groups placed in gidset, and this will never be greater than NGROUPS_UMAX for the POSIX version, and NGROUPS for the BSD version, as defined in . As a special case, if the setlen parameter is zero, getgroups returns the number of supplemental group IDs assoc...
Sethostid establishes a 32-bit identifier for the current host that is intended to be unique among all UNIX systems in existence. This is normally a DARPA Internet address for the local machine. This call is allowed only to the superuser and is normally performed at boot time. Gethostid returns the 32-bit identifier for the current host.
Gethostname returns the standard hostname for the current processor, as previously set by sethostname. The parameter namelen specifies the size of the name array. The returned name is null-terminated and truncated if insufficient space is provided. Sethostname sets the name of the host machine to be name, which has length namelen. This call is restricted to the superuser and is normally used only when the system is bootstrapped....
The system provides each process with three interval timers, defined in . The getitimer call returns the current value for the timer specified in which, while the setitimer call sets the value of a timer (optionally returning the previous value of the timer). A timer value is defined by the itimerval structure: struct itimerval { struct timeval it_interval; /* timer interval */ struct timeval it_value; /* current value */ }; If it_value is non-zero, it indicates the time to the next ...
getmountid returns an identifier for the filesystem containing the file named by path. Read, write, or execute permission for the named file is not required, but all directories listed in the path name leading to the file must be searchable. buf is a pointer to a mountid structure that is filled by the system call. The identifier returned is guaranteed to be unique for the mounted filesystem within the running system, except for autofs's lofs f...
getmsg retrieves the contents of a message [see intro(2)] located at the stream head read queue from a STREAMS file, and places the contents into user specified buffer(s). The message must contain either a data part, a control part, or both. The data and control parts of the message are placed into separate buffers, as described below. The semantics of each part is defined by the STREAMS module that generated the message. The function getpmsg...
Getpagesize returns the number of bytes in a page. Page granularity is the granularity of many of the memory management calls. The page size is a system page size and may not be the same as the underlying hardware page size. In systems with multiple page sizes, the base page size is returned. The base page size is the smallest page size used by a system.
Getpeername returns the name of the peer connected to socket s. The namelen parameter should be initialized to indicate the amount of space pointed to by name. On return it contains the actual size of the name returned (in bytes). The name is truncated if the buffer provided is too small.
getpid returns the process ID of the calling process. getpgrp returns the process group ID of the calling process. The BSDgetpgrp form is provided for Berkeley compatibility. If the pid_t is 0, it is the same as the getpgrp form, otherwise it returns the process group for the argument, if the process exists. getppid returns the parent process ID of the calling process. getp<...
The getprid function returns the project ID for the array session containing the calling process. The initial project ID of an array session is typically assigned at login time, and can be changed with the privileged function setprid(2). The newproj(1) command can be used to start a new array session with a different project ID. For more details on project IDs, see projects(5).
The scheduling priority of the process, process group, or user, as indicated by which and who is obtained with the getpriority call and set with the setpriority call. Which is one of PRIO_PROCESS, PRIO_PGRP, or PRIO_USER, and who is interpreted relative to which (a process identifier for PRIO_PROCESS, process group identifier for PRIO_PGRP, and a user ID for PRIO_USER). A zero value of who denotes the current process, process group, or user. Prio is a value in the range -20 to 20. The default pr...
Limits on the consumption of a variety of system resources by a process and each process it creates may be obtained with getrlimit and set with setrlimit. getrlimit64 and setrlimit64 allow 32-bit programs to set 64-bit limits. This is particularly useful for shells and other 32-bit programs which fork 64-bit binaries. Unless otherwise specified, getrlimi...
The function getsid returns the session ID of the process whose process ID is equal to pid. If pid is equal to (pid_t)0, getsid returns the session ID of the calling process.
Getsockname returns the current name for the specified socket. The namelen parameter should be initialized to indicate the amount of space pointed to by name. On return it contains the actual size of the name returned (in bytes).
Getsockopt and setsockopt manipulate options associated with a socket. Options may exist at multiple protocol levels; they are always present at the uppermost ``socket'' level. When manipulating socket options the level at which the option resides and the name of the option must be specified. To manipulate options at the ``socket'' level, level is specified as SOL_SOCKET. To manipulate options at any other level the protocol number of the appropriate protocol controlling the option is suppli...
The getspinfo function stores the service provider information for the array session containing the current process into the acct_spi struct pointed to by spi. The service provider information for an array session is normally inherited from the array session of the process that created it, or it can be changed with the privileged setspinfo(2) function. For more details on service provider information, see the man pages for setspinfo(2). getspinfo is provided primarily for compatibility with prev...
getuid returns the real user ID of the calling process. geteuid returns the effective user ID of the calling process. getgid returns the real group ID of the calling process. getegid returns the effective group ID of the calling process.
This section describes all of the system calls. Most of these calls have one or more error returns. An error condition is indicated by an otherwise impossible returned value. This is almost always -1 or the NULL pointer; the individual descriptions specify the details. An error number is also made available in the external variable errno. errno is not cleared on successful calls, so it should be tested only after an error has been indicated. Many of these errors are caused by certain system or u...
ioctl performs a variety of control functions on devices and STREAMS. For non-STREAMS files, the functions performed by this call are devicespecific control functions. request and an optional third argument with varying type are passed to the file designated by fildes and are interpreted by the device driver. For STREAMS files, specific functions are performed by the ioctl call as described in streamio(7). Argument types and other request-spe...
kill sends a signal to a process or a group of processes. The process or group of processes to which the signal is to be sent is specified by pid. The signal that is to be sent is specified by sig and is either one from the list given in signal(2), or 0. If sig is 0 (the null signal), error checking is performed but no signal is actually sent. This can be used to check the validity of pid. The real or effective user ID of the sending process must match the real, saved, or effective user ID of th...
path1 points to a path name naming an existing file. path2 points to a path name naming the new directory entry to be created. link creates a new link (directory entry) for the existing file and increments its link count by one. Upon successful completion, link marks for update the st_ctime field of the file. Also, the st_ctime and st_mtime fields of the directory that contains the new entry are marked for upd...
To accept connections, a socket is first created with socket(2), a willingness to accept incoming connections and a queue limit for incoming connections are specified with listen(2), and then each new connection is accepted with accept(2). The listen call applies only to sockets of type SOCK_STREAM. The backlog parameter defines the maximum length the queue of pending connections. If a connection request arrives with the queue full the client may receive an error with an indication of ECONNREFUS...
fildes is a file descriptor returned from a creat, open, dup, fcntl, pipe, or ioctl system call. lseek and lseek64 set the file pointer associated with fildes as follows: If whence is SEEK_SET, the pointer is set to offset bytes. If whence is SEEK_CUR, the pointer is set to its current location plus offset. If whence is SEEK_E<...
madvise provides the system advice about the process' expected use of its address space from addr to addr + len. The following types of behavior are currently recognized by the system: MADV_DONTNEED informs the system that the address range from addr to addr + len will likely not be referenced in the near future. The memory to which the indicated addresses are mapped will be the first to be reclaimed when memory is needed by the system. madvise will fail if: [ENOMEM] Addresses in the range (add...
NOTE: this function is not currently implemented in IRIX. Any calls to this function will return ENOSYS. The function memcntl allows the calling process to apply a variety of control operations over the address space identified by the mappings established for the address range [addr, addr + len). addr must be a multiple of the pagesize as returned by sysconf(3C). The scope of the control operations can be further defined with additional selection criteri...
mkdir creates a new directory with the name path. The mode of the new directory is initialized from mode (see chmod(2) for values of mode]. The protection part of mode is modified by the process's mode mask (see umask(2)). The S_ISGID, S_ISUID, and S_ISVTX bits are silently deleted from mode. The directory's owner ID is set to the process's effective user ID. The directory's group ID is set to the process's effective group ID or the grou...
The mkfifo routine creates a new FIFO special file named by the pathname pointed to by path. IRIX implements it via the following mknod call: mknod(path, (mode | S_IFIFO), 0) where S_IFIFO is defined in . Refer to mknod(2) for details.
mknod creates a new file named by the path name pointed to by path. The mode of the new file (including file type bits) is initialized from mode. The value of the file type bits which are permitted with this system call are those listed below. The other types listed in sys/stat.h are made with other system calls, or are not supported by this operating system. S_IFIFO fifo special S_IFCHR character special S_IFBLK block special S_IFREG ordinary file All other mode bits are interpreted as describe...
The functions mmap and mmap64 establish a mapping between a process's address space and a virtual memory object. The format of the call is as follows: pa = mmap(addr, len, prot, flags, fd, off); mmap establishes a mapping between the process's address space at an address pa for len bytes to the memory object represented by the file descriptor fd at offset off for len bytes. The value of pa is an implementation-depend...
mount requests that a removable file system contained on the block special file identified by spec be mounted on the directory identified by dir. spec and dir are pointers to path names. fstyp is the file system type number. The sysfs(2) system call can be used to determine the file system type number. If both the MS_DATA and MS_FSS flag bits of mflag are off, the file system type defaults to the root file system type. Only if either...
mpin reads into memory all pages over the range (addr, addr + len), and locks the pages into memory. Associated with each locked page is a counter which is incremented each time the page is locked. The superuser can lock as many pages as it wishes, other users are limited to a configurable per process maximum. munpin decrements the lock counter associated with the pages over the range (addr, addr + len). Pages whose counters are zero are available to be swapped out ...
The function mprotect changes the access protections on the mappings specified by the range [addr, addr + len) to be that specified by prot. Legitimate values for prot are the same as those permitted for mmap and are defined in <sys/mman.h> as: PROT_READ /* page can be read */ PROT_WRITE /* page ca...
msgctl provides a variety of message control operations as specified by cmd. The following cmds are available: IPC_STAT Place the current value of each member of the data structure associated with msqid into the structure pointed to by buf. The contents of this structure are defined in intro(2). IPC_SET Set the value of the following members of the data structure associated with msqid to the corresponding value found in the ...
msgget returns the message queue identifier associated with key. A message queue identifier and associated message queue and data structure [see intro(2)] are created for key if one of the following are true: key is IPC_PRIVATE. key does not already have a message queue identifier associated with it, and (msgflg&IPC_CREAT) is true. On creation, the data structure associated with the new message queue identi...
msgsnd sends a message to the queue associated with the message queue identifier specified by msqid. msgp points to a user defined buffer that must contain first a field of type long integer that will specify the type of the message, and then a data portion that will hold the text of the message. The following is an example of members that might be in a user defined buffer. long mtype; /* message type */...
The function msync writes all modified copies of pages over the range [addr, addr + len) to their backing storage locations. msync optionally invalidates any copies so that further references to the pages will be obtained by the system from their backing storage locations. The backing storage for a modified MAP_SHARED mapping is the file the page is mapped to; the backing storage for a modified MAP_PRIVATE map...
The function munmap removes the mappings for pages in the range [addr, addr + len). Further references to these pages will result in the delivery of a SIGSEGV signal to the process. If the region being detached via munmap(2) belongs to a shared address space, and I/O is being done to this range by a process belonging to the same shared group, munmap(2) would fail returning EBUSY. The specified virtual addre...
The nanosleep system call causes the current thread to suspend until either the time interval specified by the rqtp argument has elapsed or a signal is delivered to the calling thread and its action is to invoke a signal-handling function or terminate the process. The suspension time will be rounded to a multiple of the underlying system-provided sleep resolution. For processes that have requested a timeout of less then the base clock tick of 10 milliseconds, this resolution is defined by the va...
The newarraysess function creates a new array session and moves the current process from its original array session to the new one. The parents, children and siblings of the current process are not affected by this and remain in their original array sessions. A handle for the new array session will be generated by the system. Normally the new handle is guaranteed to be unique on the current system only, though some systems may be able to assign global array session handles that are unique across...
Nfssvc starts an NFS daemon listening on socket sock. The socket must be AF_INET, and SOCK_DGRAM (protocol UDP/IP). The system call will return only if the process is killed. Async_daemon implements the NFS daemon that handles asynchronous I/O for an NFS client. The system call never returns.
nice allows a process in the time-sharing scheduling class to change its priority. The sched_setscheduler and schedctl system calls are more general interfaces to scheduler functions. nice adds the value of incr to the nice value of the calling process. A process's nice value is a non-negative number for which a more positive value results in lower CPU priority. A maximum nice value of 39 and a mi...
path points to a path name naming a file. open opens a file descriptor for the named file and sets the file status flags according to the value of oflag. oflag values are constructed by OR-ing Flags from the following list (only one of the first three flags below may be used): O_RDONLY Open for reading only. O_WRONLY Open for writing only. O_RDWR Open for reading and writing. O_NDELAY or O_NON
pause suspends the calling process until it receives a signal. The signal must be one that is not currently set to be ignored by the calling process. If the signal causes termination of the calling process, pause does not return. If the signal is caught by the calling process and control is returned from the signal-catching function [see signal(2)], the calling process resumes execution from the point of suspension; with a return value of -1 from <...
pipe creates an I/O mechanism called a pipe and returns two file descriptors, fildes[0] and fildes[1]. IRIX has two distinct versions of pipe: the SVR4 version and the SVR3.2 version. The SVR3.2 version is faster, and is generally preferred unless STREAMS semantics are required for a specific reason. The SVR4 version of pipe returns two STREAMS-based file descriptors which are both opened for reading and writing. The O_NDELAY and ...
plock allows the calling process to lock into memory or unlock its text segment (text lock), its data segment (data lock), or both its text and data segments (process lock). Locked segments are immune to all routine swapping. The calling process must have the super-user privilege to use this call. plock does not lock down memory which has been mapped into the address space of a process via the mmap(2) system call (e.g., IRIX Arenas). These mmaped memory ...
The IRIX version of poll provides users with a mechanism for multiplexing input and output over a set of any type of file descriptors, rather than the traditional limitation to only descriptors of STREAMS devices [see select(2)]. Poll identifies those descriptors on which a user can send or receive messages, or on which certain events have occurred. Fds specifies the file descriptors to be examined and the events of interest for each file descriptor. It is a pointer to an array with one element ...
prctl provides information about processes and the ability to control certain of their attributes. The return type ptrdiff_t is used so that prctl can return an integral value that is large enough to return a pointer/address. option specifies one of the following actions: PR_MAXPROCS returns the system imposed limit on the number of processes per user. PR_MAXPPROCS returns the maximum number of processors the calling process can utilize. If the caller is restricted ...
profil provides CPU-use statistics by profiling the amount of CPU time expended by a program. profil generates the statistics by creating an execution histogram for a current process. The histogram is defined for a specific region of program code to be profiled, and the identified region is logically broken up into a set of equal size subdivisions, each of which corresponds to a count in the histogram. With each clock tick, the current subdivision is identified and its corresponding histogram co...
ptrace allows a parent process to control the execution of a child process. Its primary use is for the implementation of breakpoint debugging [see dbx(1)]. The child process behaves normally until it encounters a signal [see signal(5)], at which time it enters a stopped state and its parent is notified via the wait(2) system call. When the child is in the stopped state, its parent can examine and modify its ``core image'' using pt<...
putmsg creates a message from user-specified buffer(s) and sends the message to a STREAMS file. The message may contain either a data part, a control part, or both. The data and control parts to be sent are distinguished by placement in separate buffers, as described below. The semantics of each part is defined by the STREAMS module that receives the message. The function putpmsg does the same thing as putmsg, but provides the user the abi...
The quotactl(2) call manipulates disk quotas for local EFS and XFS filesystems. cmd indicates a command to be applied to the user ID uid. special is a pointer to a null-terminated string containing the pathname of the block special device for the filesystem being manipulated. The block special device must be mounted as an EFS or XFS filesystem (see mount(2)). addr is the address of an optional, command specific data structure which is copied in or out of the system. The interpretation of addr is...
read attempts to read nbyte bytes from the file associated with fildes into the buffer pointed to by buf. If nbyte is zero, read returns zero and has no other results. fildes is a file descriptor obtained from a creat, open, dup, fcntl, pipe, or ioctl system call. On devices capable of seeking, the read starts at a position in the file given by the file pointer associated with fildes...
readlink places the contents of the symbolic link referred to by path in the buffer buf, which has size bufsiz. The contents of the link are not null-terminated when returned. readlink fails and the buffer remains unchanged if: EACCES Search permission is denied for a component of the path prefix of path. EACCES Read permission is denied on the file named by path. EFAULT path or buf extends outs...
Recv, recvfrom, and recvmsg are used to receive messages from a socket. The recv call is normally used only on a connected socket (see connect(2)), while recvfrom and recvmsg may be used to receive data on a socket whether it is in a connected state or not. If from is non-zero, the source address of the message is filled in. Fromlen is a value-result parameter, initialized to the size of the buffer associated with from, and modified on return to indicate the actual size of the address stored the...
rename renames a file. old is a pointer to the pathname of the file or directory to be renamed. new is a pointer to the new pathname of the file or directory. Both old and new must be of the same type (either both files, or both directories) and must reside on the same file system. If new already exists, it is removed. Thus, if new names an existing directory, the directory must not have any entries other than, possibly, ``.'' and ``..''. When renaming directories,...
rexec in all its forms overlays a new process image on an old process and commences execution on a new cell. This system call was reserved to be supported in a future version of IRIX. In IRIX release 6.5, the only valid value for cell is 0 and then each form of rexec is equivalent to the corresponding form of exec. Therefore use of rexec is deprecated as this system call may not be present in future IRIX releases....
rmdir removes the directory named by the path name pointed to by path. The directory must not have any entries other than ``.'' and ``..''. If the directory's link count becomes zero and no process has the directory open, the space occupied by the directory is freed and the directory is no longer accessible. If one or more processes have the directory open when the last link is removed, the ``.'' and ``..'' entries, if present, are removed before r...
saton switches on collection of audit records of the specified event type. satoff switches off collection of audit records of the specified event type. satstate reports whether the audit subsystem is currently collecting or discarding records of the event type specified. To modify or query the audit state for every event type, call saton, satoff, or satstate repeatedly, once for each valid event type....
satgetid returns the audit identity of the calling process. satsetid sets the audit identify of the calling process. The calling process must have appropriate privilege to successfully call satgetid or satsetid. If _POSIX_CAP is in effect, appropriate privilege includes CAP_AUDIT_CONTROL capability.
satmp_done de-registers the token-mapping daemon. The calling process must have appropriate privilege. If _POSIX_CAP is in effect, appropriate privilege includes CAP_NETWORK_MGT capability.
satmp_get_attr_reply sends a SATMP_GET_ATTR_REPLY message to the kernel. fd is a file descriptor that references the token-mapping daemon's socket. buf is the address of a buffer containing the message. size is the size of the message in bytes.
satmp_get_lrtok_reply sends a SATMP_GET_LRTOK_REPLY message to the kernel. fd is a file descriptor that references the token-mapping daemon's socket. buf is the address of a buffer containing the message. size is the size of the message in bytes.
satmp_init initializes the kernel interface to the token-mapping daemon. fd is a file descriptor that references a socket, and generation is the initial generation of the token-mapping database. The calling process must have appropriate privilege. If _POSIX_CAP is in effect, appropriate privilege includes CAP_NETWORK_MGT capability.
satmp_init_reply sends a SATMP_INIT_REPLY message to the kernel. fd is a file descriptor that references the token-mapping daemon's socket. addr is the address of the hostid sending the message. flag indicates success or failure. It's valid values are IRQ_FLAG_OK and IRQ_FLAG_FAILED . generation is the generation of the remote token-mapping database.
satread attempts to read nbytes bytes from the security audit trail record queue into the buffer pointed to by buffer. satread destroys the data that has been read. A subsequent satread call will read new and different data.
satwrite writes nbytes bytes to the security audit trail record queue from the buffer pointed to by buffer. satvwrite is a more convenient libc interface for generating audit records, which are generally text strings. Format is a printf-like format string, followed by a variable number of arguments. See printf(3S) for more information on the possible formatting characters. Event must be equal to one of the SAT record type constants for administrative events, as defined in /usr/include/sys/sat.h....
This system call is used to alter scheduling parameters of either individual processes or of the system as a whole. The following commands are supported:
The sched_getparam system call is used to get the scheduling parameters for the process specified by pid. If pid is set to zero, then the scheduling parameters of the calling process will be obtained. A process may obtain the scheduling parameters of itself and any process sharing the same real user ID [see getuid(2)]. To obtain the scheduling parameters of an unrelated process, the calling process must have the CAP_SCHED_MGT capability [s...
The sched_getscheduler system call is used to get the scheduling policy of the process specified by pid. If pid is set to zero, then the scheduling policy of the caller is returned. A process may obtain the scheduling policy of itself and any process sharing the same real user ID [see getuid(2)]. To obtain the scheduling policy of an unrelated process, the calling process must have the CAP_SCHED_MGT capability [see capability]....
sched_rr_get_interval stores the round robin scheduling interval at address interval for the process named by pid. If pid is set to zero, then sched_rr_get_interval obtains the interval for the calling process. sched_rr_get_interval will fail if one or more of the following are true: [EFAULT] The address specified by interval is outside...
The sched_setparam system call is used to set the scheduling policy parameters for the process specified by pid. If pid is set to zero, then the scheduling parameters of the calling process will be affected. The scheduling parameters of pid are specified by the parameter structure at address param. The priority of the target process may be modified by setting the desired priority value in the sched_priority field of the param structure. Unlike IRIX 6.2 and ...
The sched_setscheduler system call is used to set the scheduling policy and related parameters for the process specified by pid. If pid is set to zero, then the scheduling policy and parameters of the calling process will be affected. The policy parameter is used to select one of the following scheduling policies:
The sched_yield system call causes the calling process to relinquish the processor to a runnable process of higher or equal priority. In the event a higher or equal priority process is not available, the calling process reacquires control of the processor.
Select examines the I/O descriptor sets whose addresses are passed in readfds, writefds, and exceptfds to see if some of their descriptors are ready for reading, are ready for writing, or have an exceptional condition pending, respectively. The first nfds file descriptors are checked in each set; i.e. the file descriptors from 0 through nfds - 1 will be examined (see getdtablehi(3) for largest open descriptor). On return, select replaces the given descriptor sets...
semctl provides a variety of semaphore control operations as specified by cmd. The following cmds are executed with respect to the semaphore specified by semid and semnum: GETVAL Return the value of semval [see intro(2)]. {READ} SETVAL Set the value of semval to arg.val. {ALTER}. When this command is successfully executed, the semadj value corresponding to the speci...
semget returns the semaphore identifier associated with key. A semaphore identifier and associated data structure and set containing nsems semaphores [see intro(2)] are created for key if one of the following is true: key is equal to IPC_PRIVATE. key does not already have a semaphore identifier associated with it, and (semflg&IPC_CREAT) is true. On creation, the data structure associated with the new semaph...
semop is used to perform atomically an array of semaphore operations on the set of semaphores associated with the semaphore identifier specified by semid. sops is a pointer to the array of semaphore-operation structures. nsops is the number of such structures in the array. The contents of each structure includes the following members: short sem_num; /* semaphore number */ shor<...
Send, sendto, and sendmsg are used to transmit a message to another socket. Send may be used only when the socket is in a connected state, while sendto and sendmsg may be used when the socket is unconnected. The address of the target is given by to with tolen specifying its size. The length of the message is given by len. If the message is too long to pass atomically through the underlying protocol, then the error EMSGSIZE is returned, and the message is not transmitted. Usually no indication of...
The setash function changes the handle for the array session containing the current process to the value specified by ash. The current process must have superuser privileges to invoke setash. Ordinarily, a handle that is unique within the current system is assigned to an array session when the array session is created using the newarraysess(2) function. The setash function can be used to override this default handle, perhaps for assigning a handle that is unique across an entire array or for syn...
setgroups initializes the group access list of the current user process according to the array gidset. The parameter ngroups indicates the number of entries in the array. The sysconf(_SC_NGROUPS_MAX) system call may be used to determine at runtime the maximum allowable value for ngroups in the particular kernel configuration (it is an lbootable value (ngroups_max) which is declared in /var/sysgen/master.d/kernel). If using the BSD version, ngroups may never be greater than NGROUPS (as defined in...
setpgid sets the process group ID of the process with ID pid to pgid. If pgid is equal to pid, the process becomes a process group leader. If pgid is not equal to pid, the process becomes a member of an existing process group. If pid is equal to 0, the process ID of the calling process is used. If pgid is equal to 0, the process specified by pid becomes a process group leader. setpgid fails and returns an error if one or more of the following are true: <...
The System V version of setpgrp behaves identically to setsid (2). The BSD version of setpgrp sets the process group of the specified process pid to the specified pgrp. If pid is zero, then the call applies to the current process. If pgrp is zero and pid refers to the calling process, setpgrp() behaves identically to setsid (2). If the invoker is not the super-user, then the affected process must have the same effective user-id as the invoker or be a member of the same session as the calling pro...
The setprid function changes the project ID for the array session containing the current process to the value specified by prid. Ordinarily, the project ID for a new array session is inherited from the array session of the process that created it. However, when the array session is created as part of a new login (or moral equivalent, such as a batch job or rsh(1)), it may be appropriate to assign a new project ID, such as a default project ID associated with the user that is logging in. The setp...
The real and effective group ID's of the current process are set to the arguments. Unprivileged users may change the real group ID to the effective group ID and vice-versa; only the super-user may make other changes. Supplying a value of -1 for either the real or effective group ID forces the system to substitute the current ID in place of the -1 parameter.
The real and effective user ID's of the current process are set according to the arguments. If ruid or euid is -1, the current uid is filled in by the system. Unprivileged users may change the real user ID to the effective user ID and vice-versa; only the super-user may make other changes.
If the calling process is not already a process group leader, setsid sets the process group ID and session ID of the calling process to the process ID of the calling process, and releases the process's controlling terminal. setsid will fail and return an error if the following is true: EPERM The calling process is already a process group leader, or there are processes other than the calling process whose process group ID is equal to the process...
The setspinfo function sets the service provider information for the array session containing the current process to the contents of the acct_spi struct pointed to by spi. Typically, this would only be done when the array session is first created. The invoker must have superuser privileges. Service provider information is intended for use by software such as batch queueing systems that need to maintain fairly static information about an array session. It is included in session accounting records...
The setuid system call sets the real user ID, effective user ID, and saved user ID of the calling process. The setgid system call sets the real group ID, effective group ID, and saved group ID of the calling process. At login time, the real user ID, effective user ID, and saved user ID of the login process are set to the login ID of the user responsible for the creation of the process. The same is true for the real, effective, and saved group IDs; they are set...
This system call is used for underlying operating system support of graphics and window management functions. It is not intended for direct use by user programs. PPPPaaaaggggeeee 1111
The IRIX kernel saves most of the IRIS PROM Monitor environment variables (option strings) for later use by the kernel as well as user programs. sgikopt allows the user to retrieve the values of these variables. The option argument specifies the name of the variable; the value of the option is returned in the buffer addressed by buf. The size in bytes of this buffer is given by buflen. The string returned by sgikopt is guaranteed to be null-terminated, even if the length of the option value stri...
The IRIX kernel saves most of the IRIS PROM Monitor environment variables (option strings) for later use by the kernel as well as user programs. sgikopt allows the user to retrieve the values of these variables. The option argument specifies the name of the variable; the value of the option is returned in the buffer addressed by buf. The size in bytes of this buffer is given by buflen. The string returned by sgikopt is guaranteed to be null-terminated, even if the length of the option value stri...
The sginap system call provides two functions. With an argument of 0, it yields the processor to any higher or equal priority threads immediately, thus potentially allowing another thread to run. Note that because normally the user has no direct control over the exact priority of a given thread, this does not guarantee that another thread will run. With an argument which is non-zero, sginap will suspend the thread for between ticks-1 and ticks clock ticks. That is, it will suspend for at least t...
sgi_eag_mount is identical to mount(2), except that it accepts an additional argument attrs, which contains a data block specifying default attributes for the filesystem. sgi_eag_mount requires that the calling process have appropriate privilege. If _POSIX_CAP is in effect, the appropriate capability is CAP_MOUNT_MGT.
The sgi_revoke system call invalidates all currently open file descriptors referencing the file named by fname. sgi_revoke requires that the calling process have appropriate privilege. If _POSIX_CAP is in effect, the appropriate capability is CAP_DEVICE_MGT.
shmctl provides a variety of shared memory control operations as specified by cmd. The following cmds are available: IPC_STAT Place the current value of each member of the data structure associated with shmid into the structure pointed to by buf. The contents of this structure are defined in intro(2). {READ} IPC_SET Set the value of the following members of the data structure associated with shmid to the corresponding value ...
shmget returns the shared memory identifier associated with key. A shared memory identifier and associated data structure and shared memory segment of at least size bytes [see intro(2)] are created for key if one of the following are true: key is equal to IPC_PRIVATE. key does not already have a shared memory identifier associated with it, and (shmflg&IPC_CREAT) is true. Upon creation, the contents of the s...
shmat attaches the shared memory segment associated with the shared memory identifier specified by shmid to the data segment of the calling process. The segment is attached at the address specified by one of the following criteria: If shmaddr is equal to (void *) 0, the segment is attached at the first available address as selected by the system. If (shmflg&SHM_SGI_ANYADDR) is true, the segment is attached at the fi...
path is a pointer to the character string which names a shared memory object. shm_open opens a file descriptor for the shared memory object and sets the memory access flag according to the value of oflag. The oflag must be set to one of the following values: O_RDONLY Open the memory object for reading only. O_RDWR Open the memory object for reading and writing. With one of the above flags set, any of the following flags may also be specifi...
path is a pointer to the character string, naming a shared memory object. shm_unlink deletes the named shared memory object from the file namespace. The contents of the shared memory will persist after the call to shm_unlink, if one or more processes still reference the memory object. Once the last reference has been dropped, the space occupied by the shared memory object is freed and the object ceases to exist [see close(2) an...
The shutdown call causes all or part of a full-duplex connection on the socket associated with s to be shut down. If how is 0, then further receives will be disallowed. If how is 1, then further sends will be disallowed. If how is 2, then further sends and receives will be disallowed.
sigaction specifies and reports on the way individual signals are to be handled in the calling process. sig specifies the signal and can be assigned any of the signals specified in signal(5). If act is non-zero, it points to a structure specifying the new action to be taken when delivering sig. If oact is non-zero, the previous handling information for the signal is returned to the user. In this way (a NULL act and a non-NULL oact) the user can enquire as to the current handling of a signal with...
sigaltstack allows users to define an alternate stack area on which signals are to be processed. If ss is non-zero, it specifies a pointer to, and the size of a stack area on which to deliver signals, and tells the system if the process is currently executing on that stack. When a signal's action indicates its handler should execute on the alternate signal stack [specified with a sigaction(2) call], the system checks to see if the proc...
The siginterrupt() function is used to change the restart behaviour when a function is interrupted by the specified signal. The function siginterrupt(sig, flag) has an effect as if implemented as: siginterrupt(int sig, int flag) { int ret; struct sigaction act; void (sigaction)(sig, NULL, act); if (flag) act.sa_flags = ~SA_RESTART; else act.sa_flags = SA_RESTART; ret = sigaction(sig, act, NULL); return ret; }; The siginterrupt() function supports programs written to historical system interfaces....
signal allows the calling process to choose one of three ways in which it is possible to handle the receipt of a specific signal. sig specifies the signal and func specifies the choice. For a list of valid signals and a general description of the signal mechanism please see signal(5). [EINVAL] signal will fail if sig is an illegal signal number, including SIGKILL and SIGSTOP. [EINVAL] signal will fail if an illegal operation...
sigpending returns the set of signals pending for the calling thread (i.e., blocked from delivery) in the space pointed to by maskptr. Routines described in sigsetops(3) are used to examine the returned signal set. sigpending will fail if: [EFAULT] maskptr points to memory that is not a part of process's valid address space.
sigprocmask manipulates the set of signals which are blocked from delivery to the thread. A non-NULL set specifies the set of signals to use in modifying the currently-active set, and the incoming signals may be added to, deleted from, or completely replace the active set, as specified by the operation parameter, which may have the following values (as defined in ): SIG_NOP Do not alter current signal mask SIG_BLOCK Add specified signals to those in current mask SIG_UNBLOCK Remove the ...
Can only be called from within the kernel. The sigreturn system call is used by the kernel to return from signal handlers. It restores the context of the process which received the signal. The general behaviour of this system call is very similar to longjmp(2).
sigsend sends a signal to the process or group of processes specified by id and idtype. The signal to be sent is specified by sig and is either zero or one of the values listed in signal(5). If sig is zero (the null signal), error checking is performed but no signal is actually sent. This value can be used to check the validity of id and idtype. In order to send the signal to the target process (pid), the sending process must have permission to do so, subje...
These functions provide signal management for application processes. sigset specifies the system signal action to be taken upon receipt of signal sig. disp specifies the signal's disposition, which may be SIG_DFL, SIG_IGN, or the address of a signal handler. If disp is the address of a signal handler, the system adds sig to the calling process's signal mask before executing the signal handler; when the signal handler returns, the system res...
Sigstack allows users to define an alternate stack on which signals are to be processed. If ss is non-zero, it specifies a signal stack on which to deliver signals and tells the system if the process is currently executing on that stack. When a signal's action indicates its handler should execute on the signal stack (specified with a sigvec(3b) call), the system checks to see if the process is currently executing on that stack. If the process is not currently executing on the signal stack, the ...
sigsuspend replaces the current thread's set of masked signals with the set pointed to by maskptr and then suspends the thread until delivery of a signal whose action is either to execute a signal-catching function or to terminate the process. If the action is to terminate the process then sigsuspend will never return. If the action is to execute a signal-catching function, then sigsuspend will return after the signal-catching functions returns, with the signal mask restored to the set that exi...
Socket creates an endpoint for communication and returns a descriptor. The domain parameter specifies a communications domain within which communication will take place; this selects the protocol family which should be used. The protocol family generally is the same as the address family for the addresses supplied in later operations on the socket. These families are defined in the include file . The currently understood formats are: PF_INET (DARPA Internet protocols) PF_RAW (Link-...
The socketpair call creates an unnamed pair of connected sockets in the specified domain d, of the specified type, and using the optionally specified protocol. The descriptors used in referencing the new sockets are returned in sv[0] and sv[1]. The two sockets are indistinguishable.
The sproc and sprocsp system calls are a variant of the standard fork(2) call. Like fork, the sproc calls create a new process that is a clone of the calling process. The difference is that after an sproc call, the new child process shares the virtual address space of the parent process (assuming that this sharing option is selected, as described below), rather than simply being a copy of the parent. The pa...
sprofil provides CPU-use statistics by profiling the amount of CPU time expended by a program in disjoint text spaces. This is useful if you need to profile programs using shared libraries or profile an address space using different granularities for different sections of text. sprofil generates the statistics by creating an execution histogram for a current process. The histogram is defined for a list of regions of program code to be profiled specified by members of the profp array: profp[0], p...
These single/double precision routines listed above are available in libc. These should not be confused with the standard math library square root functions [see sqrt (3M)]. If v is a negative, the sqrt functions will return a NaN, but won't set the errno value. This is done since the ABI doesn't specify a errno value if the v is negative.
The only difference between the *stat and the *stat64 calls is that the *stat64 calls return a stat64 structure, with three fields increased in size to allow for larger files and filesystems: st_ino, st_size, and st_blocks are all 64-bit values. NOTE: All programs compiled either -n32 or -64 get the stat64 versions of the stat system call, even whe...
The only difference between the *stat and the *stat64 calls is that the *stat64 calls return a stat64 structure, with three fields increased in size to allow for larger files and filesystems: st_ino, st_size, and st_blocks are all 64-bit values. NOTE: All programs compiled either -n32 or -64 get the stat64 versions of the stat system call, even whe...
statfs returns a ``generic superblock'' describing a file system. It can be used to acquire information about mounted as well as unmounted file systems, and usage is slightly different in the two cases. In all cases, buf is a pointer to a structure (described below) which will be filled by the system call, and len is the number of bytes of information which the system should return in the structure. Len must be no greater than sizeof (struct statfs) and ordinarily it will contain exactly that ...
statvfs returns a ``generic superblock'' describing a file system; it can be used to acquire information about mounted file systems. buf is a pointer to a structure (described below) that is filled by the system call. path should name a file that resides on that file system. The file system type is known to the operating system. Read, write, or execute permission for the named file is not required, but all directories listed in the path name leading to the file must be sea...
stime sets the system's idea of the time and date. tp points to the value of time as measured in seconds from 00:00:00 UTC January 1, 1970. stime will fail if: EPERM the calling process does not have the super-user privilege.
swapctl adds, deletes, or returns information about swap resources. Swap resources can be local disk partitions (block devices), local file system files, and files on file systems mounted via nfs. cmd specifies one of the following options contained in <sys/swap.h>: SC_ADD /* add a resource for swapping */ SC_LIST /* l...
symlink creates a symbolic link name2 to the file name1. Either name may be an arbitrary pathname, the files need not be on the same file system, and name1 may be nonexistent. The file to which the symbolic link points is used when an open(2) operation is performed on the link. A stat(2) on a symbolic link returns the linked-to file, while an lstat returns information about the link itself. This can lead to surprising results when a sym...
sync causes all information in memory that should be on disk to be written out. This includes modified super blocks, modified i-nodes, and delayed block I/O. It should be used by programs that examine a file system, such as fsck(1M), df(1M), etc. It is mandatory before a re-boot. The writing, although scheduled, is not necessarily completed before sync returns. The fsync system call completes the writing before it returns....
sysfs returns information about the file system types configured in the system. The number of arguments accepted by sysfs varies and depends on the opcode. The currently recognized opcodes and their functions are: GETFSIND Translate fsname, a null-terminated file-system type identifier, into a file-system type index. GETFSTYP Translate fs_index, a file-system type index, into a nullterminated file-system type identifie...
The sysget system call provides user access to kernel structures and tables on IRIX systems. sysget can return data for a combination of cpus, nodes, or cells depending on the combination of flags and cookie settings. The sysget system call accepts the following arguments: name Identifies the kernel structure or table. The sys/sysget.h file contains the list of names supported. Most come from the sysmp MP_SAGET options. Here is a partial list: SGT_SINFO SGT_MINFO SGT_DINFO SGT_SERR Returns the v...
sysinfo copies information relating to the UNIX system on which the process is executing into the buffer pointed to by buf; sysinfo can also set certain information where appropriate commands are available. count is the size of the buffer. The POSIX P1003.1 interface sysconf [see sysconf(2)] provides a similar class of configuration information, but returns an integer rather than a string. The commands available ...
sysmips is the interface to various machine specific functions. The cmd argument determines the function performed. The number of arguments expected is dependent on the function.
sysmp provides control/information for miscellaneous system services. This system call is usually used by system programs and is not intended for general use. The arguments arg1, arg2, arg3, arg4 are provided for command-dependent use. As specified by cmd, the following commands are available:
syssgi is a system interface specific to Silicon Graphics systems. The value of the request parameter determines the meaning of the remaining arguments. In the descriptions below, arg1, arg2, and arg3 refer to parameters following the request argument. The following requests are currently supported: SGI_SYSID Returns an identifier for the given system. This identifier is guaranteed to be unique within the Silicon Graphics product family. The argument arg1 for this request should be a pointer to ...
time returns the value of time in seconds since 00:00:00 UTC, January 1, 1970. If tloc is non-zero, the return value is also stored in the location to which tloc points.
times fills the tms structure pointed to by buffer with time-accounting information. The tms structure is defined in <sys/times.h> as follows: struct tms { clock_t tms_utime; clock_t tms_stime; clock_t tms_cutime; clock_t tms_c...
The file whose name is given by path or referenced by the descriptor fildes has its size set to length bytes. If the file was previously longer than length, bytes past length will no longer be accessible. If it was shorter, bytes from the EOF before the call to the EOF after the call will be read in as zeros. The effective user ID of the process must have write permission for the file, and for ftruncate and ftruncate64 the file must be ...
uadmin provides control for basic administrative functions. This system call is tightly coupled to the system administrative procedures and is not intended for general use. The argument mdep is provided for machine-dependent use and is not defined here. As specified by cmd, the following commands are available: A_SHUTDOWN The system is shut down. All user processes are killed, the buffer cache is flushed, and the root file system (and no other) is unm...
This function provides for control over process limits. The cmd values available are: UL_GETFSIZE Get the regular file size limit of the process. The limit is in units of 512-byte blocks and is inherited by child processes. Files of any size can be read. UL_SETFSIZE Set the regular file size limit of the process to the value of newlimit , taken as a long. newlimit is interpreted in units of 512-byte blocks. If, when converte...
umask sets the process's file mode creation mask to cmask and returns the previous value of the mask. Only the access permission bits of cmask and the file mode creation mask are used.
umount requests that a previously mounted file system contained on the block special device or directory identified by file be unmounted. file is a pointer to a path name. After unmounting the file system, the directory upon which the file system was mounted reverts to its ordinary interpretation. umount may be invoked only by a process with the super-user privilege. umount will fail if one or more of the following are true: EPER<...
uname stores information identifying the current UNIX system in the structure pointed to by name. uname uses the structure utsname defined in <sys/utsname.h> whose members are: char sysname[SYS_NMLN]; char nodename[SYS_NMLN]; char release[...
unlink removes the directory entry named by the path name pointed to by path. and decrements the link count of the file referenced by the directory entry. When all links to a file have been removed and no process has the file open, the space occupied by the file is freed and the file ceases to exist. If one or more processes have the file open when the last link is removed, space occupied by the file is not released until all references to the file have been closed. If path is ...
ustat returns information about a mounted file system. dev is a device number identifying a device containing a mounted file system [see makedev(3C)]. buf is a pointer to a ustat structure that includes the following elements: daddr_t f_tfree; /* Total free blocks */ ino_t f_tinode; /* Number...
path points to a path name naming a file. utime sets the access and modification times of the named file. If times is NULL, the access and modification times of the file are set to the current time. A process must be the owner of the file or have write permission to use utime in this manner. If times is not NULL, times is interpreted as a pointer to a utimbuf structure (defined in utime.h) and the ...
The utimets call uses the "accessed" and "updated" times in that order from the timets vector to set the corresponding recorded times for file. The caller must be the owner of the file or have write permission to use utimets in this manner. This routine is not part of any standard and is specific to IRIX 6.5.10 and later. Applications that call utimets may be run under earlier versions of IRIX if they test for the existence of the interface and fall back to using one of the older file time s...
Vhangup is used by the initialization process init(1M) (among others) to arrange that users are given "clean"' terminals at login, by revoking access of the previous users' processes to the terminal. To effect this, vhangup searches the system tables for references to the control terminal of the invoking process, revoking access permissions on each instance of the terminal that it finds. Further attempts to access the terminal by the affected processes will yield i/o errors (EIO). Finally, a...
wait suspends the calling process until one of the immediate children terminate, or until a child that is being traced stops because it has hit an event of interest. The wait will return prematurely if a signal is received. If all child processes stopped or terminated prior to the call on wait, return is immediate. If the call is successful, the process ID of a child is returned. wait3 is BSD's extension of wait. It provides an alte...
waitid suspends the calling process until one of its children changes state. It records the current state of a child in the structure pointed to by infop. If a child process changed state prior to the call to waitid, waitid returns immediately. The idtype and id arguments specify which children waitid is to wait for. If idtype is P_PID, waitid waits for the child with a process ID equal to (<...
write attempts to write nbyte bytes from the buffer pointed to by buf to the file associated with fildes. If nbyte is zero and the file is a regular file, write returns zero and has no other results. fildes is a file descriptor obtained from a creat, open, dup, fcntl, pipe, or ioctl system call. pwrite and pwrite64 are the same as writ<...
Tcl_Interp *interp (in) Interpreter to use for error reporting. Tk_Window tkwin (in) Token for window (for all | procedures except Tk_Get3DBorder, | must be the window for which the | border was allocated). Tk_Uid colorName (in) Textual description of color corresponding to background (flat areas). Illuminated edges will be brighter than this and shadowed edges will be darker than this. Drawable drawable (in) X token for window or pixmap; indicates where graphics are to be drawn. Must either be ...
These functions are used to maintain numbers stored in base-64 ASCII characters. This is a notation by which long integers can be represented by up to six characters; each character represents a ``digit'' in a radix-64 notation. The characters used to represent ``digits'' are . for 0, / for 1, 0 through 9 for 2-11, A through Z for 12-37, and a through z for 38-63. a64l takes a pointer to a null-terminated base-64 representation and returns a corresponding long value. If the string pointed to...
ABIinfo queries whether a particular MIPS ABI feature indicated by selector is available on the target system, and if so, which version. A return value of -1 indicates that the feature represented by the selector is not present. A valid return value indicates that the feature is present, and the value indicates the version of MIPS Processor ABI Conformance Guide in which that version of the feature is documented. The return values and their meanings are listed in the <...
These routines provide a simple, standard interface to base level mutual exclusion primitives. They are found in the library ``libmutex.so'', and is loaded if the option ``-lmutex'' is used with cc(1) or ld(1). The parameter lck must point to memory shared by all processes wishing to acquire or test the lock. The contents of the structure abilock_t are as follows: typedef struct { unsigned int abi_lock; } abilock_t; The function init_lock must be called on a lock befo...
abort terminates the program which calls it, closing all open files truncated to the current position of the file pointer. The abort usually results in a core dump.
abort terminates the program which calls it, closing all open files truncated to the current position of the file pointer. The abort usually results in a core dump.
abort first closes all open files, stdio(3S) streams, directory streams and message catalogue descriptors, if possible, then causes the signal SIGABRT to be sent to the calling process.
abs is the family of absolute value functions. iabs returns the integer absolute value of its integer argument. It accepts either integer*2 or integer*4 arguments and the result is the same type. dabs returns the double-precision absolute value of its double-precision argument. qabs returns the real*16 absolute value of its real*16 argument. cabs returns the complex absolute value of its complex argument. zabs returns the double-complex absolute value of its double-complex argument. cqabs return...
abs is the family of absolute value functions. iabs returns the integer absolute value of its integer argument. It accepts either integer*2 or integer*4 arguments and the result is the same type. dabs returns the double-precision absolute value of its double-precision argument. qabs returns the real*16 absolute value of its real*16 argument. cabs returns the complex absolute value of its complex argument. zabs returns the double-complex absolute value of its double-complex argument. cqabs return...
op expects one of six symbolic constants: AC_CLEAR: The red, green, blue, and alpha accumulation buffer contents are all set to value (rounded to the nearest integer). value is clamped to the range of the accumulation buffer. AC_ACCUMULATE: Pixels are taken from the current readsource bank (front, back, or zbuffer). If this buffer has color component resolutions of other than 8 bits, the components are rescaled to the range [0,255]. Then the red, green, blue, and alpha components are each scaled...
The argument s is a socket that has been created with socket and bound to an address with bind, and that is listening for connections after a call to listen. accept extracts the first connection on the queue of pending connections, creates a new socket with the properties of s, and allocates a new file descriptor, ns, for the socket. If no pending connections are present on the queue and the socket is not marked as non-blocking, <...
acl_copy_ext sets *bufp to *aclp if the arguments are valid. acl_copy_int allocates a struct acl and copies the struct acl pointed to by *bufp into it, if the arguments are valid. The storage should be freed by calling acl_free(3c) when no longer needed. In the POSIX specifications, the internal form of an ACL may be different from the external form, hence the need for these functions. In IRIX, both forms are the same....
Deletes the default ACL associated with the directory specified in path. The effective UID of the process must match the owner of the directory or the process must have appropriate privilege to delete the default ACL from path_p. If capabilities are not enabled, only the superuser can delete the default ACL from a directory not owned by the effective UID. If _POSIX_CAP is in effect, then the appropriate capability shall include CAP_FOWNER. In addition, if _POSIX_MAC is in effect, then the proces...
These routines convert strings defined by the POSIX P1003.1e specifications (see chacl(1) acl(4)) to/from struct acl, which is the internal format for an Access Control List (see acl(4)).
acl_get_fd returns a pointer to an allocated struct acl associated with the open file referred to by fd. If _POSIX_MAC is in effect, then the process must have MAC read access to the object. acl_set_fd sets the ACL for the open file referred to by fd from the struct acl pointed to by aclp. The effective UID of the process must match the owner of the object or the process must have appropriate privilege to set the access ACL on the object. If _POSIX_CAP is in effect, then the appropriate capabili...
acl_get_file returns a pointer to an allocated struct acl associated with the pathname pointed to by path. type determines whether the default ACL (type == ACL_TYPE_DEFAULT) or access ACL (type == ACL_TYPE_ACCESS) is returned. The default ACL is available only for directories. If there is no default ACL associated with the specified directory, an ACL containing zero entries is returned. If _POSIX_MAC is in effect, then the process must have MAC read access to the object. acl_set_file sets the AC...
Returns the size of an ACL pointed to by aclp. In IRIX ACLs are all a fixed size, but the POSIX specifications allow for the possibility of variable sized structures.
Check that the format of an ACL is valid. First, aclp must be non null. The three required entries (ACL_USER_OBJ, ACL_GROUP_OBJ, and ACL_OTHER) must exist exactly once in the ACL. If the ACL contains any ACL_USER, ACL_GROUP, or any implementation-defined entries in the file group class, then one ACL_MASK entry is required. The ACL may contain at most one ACL_MASK entry. The qualifier field must be unique among all entries of the same type....
The single-precision and long double-precision routines listed above are only available in the standard math library, -lm, and in -lmx. sin, cos and tan return trigonometric functions of radian arguments x for double data types. fsin, fcos and ftan, and their ANSI-named counterparts sinf, cosf and tanf return trigonometric functions of radian TRIG(3M) TRIG(3M) arguments x for float data types. sinl, cosl and tanl do the same for long double data types. The asin routines return the arc sine in th...
Tcl_Interp *interp (in) Interpreter in which to record information. char *message (in) Identifying string to record in errorInfo variable. char *element (in) String to record as one element of errorCode variable. Last element argument must be NULL.
The function addsev defines additional severities for use in subsequent calls to pfmt or lfmt. addsev associates an integer value int_val in the range [5-255] with a character string. It overwrites any previous string association between int_val and string. If int_val is ORed with the flags passed to subsequent calls to pfmt or lfmt, string will be used as the severity. Passing a N.ULL string removes the severity...
The addseverity function builds a list of severity levels for an application to be used with the message formatting facility, fmtmsg. severity is an integer value indicating the seriousness of the condition, and string is a pointer to a string describing the condition (string is not limited to a specific size). If addseverity is called with an integer value that has not been previously defined, the function adds ...
pup expects the menu identifier of the menu to which you want to add. The menu identifier is the returned function value of the menu creation call to either newpup or defpup functions. str expects a pointer to the text that you want to add as a menu item. In addition, you have the option of pairing an "item type" flag with each menu item. There are seven menu item type flags: %t marks item text as the menu title string. %F invokes a routine for every selection from this menu except those marke...
file expects an AFfilehandle structure, previously created by a call to afOpenFile(3dm). track expects an integer which identifies the audio track in the file. Since all currently supported file formats allow at most one audio track per file, the constant value AF_DEFAULT_TRACK should always be used for this argument for now. buf is a data buffer used to pass the 24 bytes of AES channel status data to afSetAESChannelData(), or to obtain the 24 bytes of AES channel status data from afGetAESChanne...
file is an AFfilehandle structure, previously created by a call to afOpenFile(3dm). track is an integer which identifies the audio track in the file. Since all currently supported file formats allow at most one audio track per file, the constant value AF_DEFAULT_TRACK should always be used for this argument.
file expects an AFfilehandle structure, previously created by a call to afOpenFile(3dm). trackid is an integer which identifies an audio track in the file. Since all currently supported file formats allow at most one audio track per file, the value AF_DEFAULT_TRACK should always be used for this argument for now. compression is a pointer to an integer which will be filled in with the symbolic constant indicating which compression scheme used for the specified audio track. pvlist is an AUpvlist s...
file is an AFfilehandle structure for the audio file whose file descriptor you wish to obtain. This structure is the returned value of an afOpenFile(3dm) call.
file is an AFfilehandle structure, previously created by a call to afOpenFile(3dm) or afOpenFD(3dm). track is an integer which identifies an audio track in handle. Since all currently supported file formats contain only one audio track, the value AF_DEFAULT_TRACK should used here for now. params a DMparams list, previously created by a call to dmParamsCreate(3dm).
file is an AFfilehandle structure, previously created by a call to afOpenFile(3dm). track is an integer which identifies an audio track in file. Since all currently supported file formats contain exactly one audio track per file, the constant AF_DEFAULT_TRACK should always be used here.
file is an AFfilehandle structure, previously created by a call to afOpenFile(3dm). track is an integer which identifies an audio track in file. extend3to4 is a integer boolean value (i.e., 0 or 1) indicating whether the routine should extend the value of the frame size for 24-bit uncompressed data out to 32 bits. Since all currently supported file formats contain exactly one audio track per file, the constant AF_DEFAULT_TRACK should always be used here for now....
file expects an AFfilehandle structure, created when an audio file was opened by a call to afOpenFile(3dm). instids an array of integer locations used to return a list of (unique) positive instrument ID's which can be used to reference the sampler configurations in a file. For an AIFF/AIFF-C file, this array will return the ID AF_DEFAULT_INST if there is an instrument chunk. If you pass a null instids array to afGetInstIDs(), it simply returns the number of sampler configurations stored in the ...
file is an AFfilehandle structure, previously created by a call to afOpenFile(3dm). instid is a positive integer which identifies an instrument configuration in the file. Since the number of supported inst chunks varies with file format, applications should always retrieve this value via afGetInstIDs(3dm). pvlist is an AUpvlist structure, previously created by a call to AUpvnew(3dm) nparams is an integer value specifying the number of {parameter, value} item pairs (containing the instrument para...
file expects an AFfilehandle structure, created when an audio file is opened by a call to afOpenFile(3dm) or its equivalent. instid is an integer which identifies a chunk of instrument parameters contained in file. Since the number of supported inst chunks varies with file format, applications should always retrieve this value via afGetInstIDs(3dm). loopids is an array of integer locations used to return a list of (unique) positive loop id's for the given instrument chunk. If loopids is a null ...
file is an AFfilehandle structure, previously created by a call to afOpenFile(3dm). instid is a positive integer value which identifies an instrument configuration in file. Since the number of supported inst chunks varies with file format, applications should always retrieve this value via afGetInstIDs(3dm). loopid is a positive integer value which identifies a loop structure in an instrument parameter chunk. You obtain loopid's by calling afGetInstParamLong(3dm) for AIFF and AIFF-C formats, or...
file is an AFfilehandle structure, previously created by a call to afOpenFile(3dm). instid is a positive integer value which identifies an instrument configuration in file. instid should be an element from an array of IDs retrieved via a call to afGetInstIDs(3dm). loopid is a positive integer value which identifies a loop structure in an instrument parameter chunk. You obtain loopid's by calling afGetLoopIDs(3dm)....
file is an AFfilehandle structure, created when an audio file was opened by a call to afOpenFile(3dm). trackid is an integer which identifies an audio track contained in file. All currently supported file formats contain exactly one track, so always use the constant value AF_DEFAULT_TRACK for now. markids is an array of integer locations used to return a list of unique positive marker id's which can be used to reference the marker structures for track....
file is an AFfilehandle structure, previously created by a call to afOpenFile(3dm). trackid is a positive integer value which identifies an audio track in file. All currently supported file formats allow exactly one audio track per file, so the value AF_DEFAULT_TRACK should always be used here for now. markid is a positive integer value which identifies a marker structure in the audio track given by trackid. You obtain marker ID's by calling afGetMarkIDs(3dm). You can call afInitMarkIDs(3dm) to...
file is an AFfilehandle structure, previously created by a call to afOpenFile(3dm). trackid expects a positive integer value which identifies an audio track in file. All currently supported file formats allow exactly one track per file, so the constant AF_DEFAULT_TRACK should always be used here for now. markid is a positive integer value which identifies a marker structure in the audio track given by trackid. You obtain marker ID's by calling afGetMarkIDs(3dm). You can call afInitMarkIDs(3dm) ...
file is an AFfilehandle structure, created when an audio file was opened by a call to afOpenFile(3dm). miscids[] is an array of integer locations used to return a list of unique positive miscellaneous chunk ID's which can be used to reference the miscellaneous chunks in a file. chunkid is a miscellaneous chunk id from the miscids[] list returned by afGetMiscIDs().
file is an AFfilehandle structure, previously created by a call to afOpenFile(3dm). track is an integer which identifies an audio track in file. Since all currently supported file formats contain exactly one audio track per file, the constant AF_DEFAULT_TRACK should always be used here for now. slope is a pointer to a double precision floating point value which specifies the amplitude scaling factor for the audio waveform associated with track intercept is a pointer to a double precision floatin...
file is an AFfilehandle structure, previously created by a call to afOpenFile(3dm). track is an integer which identifies the audio track in the file. Since all currently supported file formats contain exactly 1 audio track per file, the value AF_DEFAULT_TRACK should always be used for this argument for now.
file expects an AFfilehandle structure, previously created when an audio file was opened by a call to afOpenFile(3dm) or afOpenFD(3dm). track expects an integer which identifies the audio track in the file. Since all file formats currently supported by the audio file library allow at most one audio track per file, the value AF_DEFAULT_TRACK should always be used for this argument. sampfmt is a pointer to an integer location. The routine uses this location to return a symbolic integer constant de...
file expects an AFfilehandle structure, created when an audio file was opened by a call to afOpenFile(). trackids expects an array of integer locations used to return a list of (unique) positive track id's which can be used to reference the audio tracks in a file. If trackids is a null pointer, afGetTrackIDs() will simply return the number of tracks in the file. This value can be used to allocate a trackids array, which can in turn be passed back to afGetTrackIDs()....
fd is a Unix file descriptor returned by a call to open(2) or its equivalent. filename is the full pathname of the file whose fd was passed as the first argument. implemented is a pointer to integer which will have its value set to 0 or 1 by afIdentifyNamedFD(). file is an AFfilehandle structure, previously created by a call to afOpenFile(3dm). vers is used to return a file format version number. The AIFF-C format includes a file chunk which contains a version number. AIFF does not contain a ver...
setup is an AFfilesetup structure, previously created by a call to afNewFileSetup(3dm). track is an integer identifier which identifies an audio track in setup. For now, the constant value AF_DEFAULT_TRACK should always be used for this argument. usedata is a flag indicating whether AES data will be stored in the file.
setup is an AFfilesetup structure, previously created by a call to afNewFileSetup(3dm). track is a positive integer which identifies an audio track in a file configuration. Since all currently supported file formats contain one audio track per file, the constant value AF_DEFAULT_TRACK should always be used here. compression is a positive integer symbolic constant which indicates the type of audio compression for the audio track. pvlist is an AUpvlist structure, previously created by a call to AU...
setup is an AFfilesetup structure, previously created by a call to afNewFileSetup(3dm). track is an integer which identifies an audio track in setup. Since all currently supported file formats contain only one audio track, the value AF_DEFAULT_TRACK should always be used here. offset is a positive value which specifies the offset in bytes for the audio data associated with track. The data type AFfileoffset is large enough to hold any data offset allowed by the filesystem. count is a positive val...
setup is an AFfilesetup structure, previously created by a call to afNewFileSetup(3dm). filefmt is a symbolic integer constant which specifies an audio file format supported by the audio file library.
setup is an AFfilesetup structure, previously created by a call to afNewFileSetup(3dm). track is an integer which identifies an audio track in setup. Since all currently supported file formats contain only one audio track, the value AF_DEFAULT_TRACK should be used here for now. params a DMparams list, previously created by a call to dmParamsCreate(3dm).
setup is an AFfilesetup structure, previously created by a call to afNewFileSetup(3dm). instids is an array of positive integer ID's which are used to reference instrument configurations in a file after it is created by afOpenFile(3dm). ninsts is the number of instrument configurations requested in setup. For AIFF-C (AIFF), this number should be either 0 or 1. The various other file formats supported by the Audio File Library have different support different numbers of instrument configurations...
setup expects an AFfilesetup structure, previously created by a call to afNewFileSetup(3dm). inst is an integer which identifies an instrument configuration to be included in a new file when the file is created. Of the currently supported audio file formats, only AIFF-C (AIFF) files contain instrument configurations, with a maximum of one per file. For this reason, the value AF_DEFAULT_INST should always be used for this argument for now. loopids is an array of unique positive integer values to ...
setup is an AFfilesetup structure, previously created by a call to afNewFileSetup(3dm). trackid is an integer which specifies an audio track in the file configuration. Since all currently supported audio file formats contain exactly one audio track, the value AF_DEFAULT_TRACK should always be used here for now. markids is an array of unique positive integer values to be used as handles for the marker structures in a file which is opened with setup. You typically allocate four marker structures s...
setup is an AFfilesetup structure, previously created by a call to afNewFileSetup(3dm). track is a positive integer value which specifies an audio track in a file configuration. Since all currently supported file formats contain exactly one audio track, the value AF_DEFAULT_TRACK should always be used here for now. markid a positive integer value which identifies a marker structure configured into track previously by afInitMarkIDs(3dm). namestr is a character string which will be written into th...
setup is an AFfilesetup structure, previously created by a call to afNewFileSetup(). miscids is an array of (unique) positive integer ID's which are used to reference miscellaneous data chunks in a new audio file after it is created by passing setup to afOpenFile(3dm). nmisc The total number of miscellaneous chunks in the file configuration. See the audio file format man pages aifc(4), next(4), wave(4), bicsf(4), and sounddesigner2(4) for formatspecific information. chunkid is one of the chunk ...
setup expects an AFfilesetup structure, previously created by a call to afNewFileSetup(3dm). track is an integer which identifies an audio track in setup. Since all currently supported file formats contain one audio track, the value AF_DEFAULT_TRACK should always be used here. slope is a positive double-precision floating point value which specifies an amplitude scaling factor for the waveform to be associated with track. intercept is a positive, negative, or zero double-precision floating point...
setup is an AFfilesetup structure, previously created by a call to afNewFileSetup(3dm). track is an integer which identifies an audio track in setup. Since all currently supported file formats contain only one audio track, the value AF_DEFAULT_TRACK should always be used here. sampfmt an integer constant which denotes a sample format. sampwidth a positive integer value which specifies the number of bits in a sample data point. channels is a positive integer value which indicates the number of in...
setup is an AFfilesetup structure, previously created by a call to afNewFileSetup(3dm). trackids is an array of positive integer id's which are handles for audio tracks in a new file after it is opened with write access. Since all currently supported file formats contain only one audio track, the trackids array should always contain one ID, AF_DEFAULT_TRACK. ntracks The number of audio tracks in the file configuration. For all currently supported file formats, ntracks is always 1....
The Silicon Graphics Audio File Library (AF) provides a uniform programming interface to standard digital audio file formats. Thirteen audio file formats are currently supported by the library: Extended AIFF-C standard AIFF (older version) NeXT/Sun SND/AU WAVE (RIFF) Berkeley/IRCAM/CARL SoundFile MPEG1 audio bitstream Sound Designer II Audio Visual Research Amiga IFF/8SVX SampleVision VOC SoundFont2 Raw (headerless) Note that the library will continue to support additional file formats and data ...
An opaque AFfilesetup structure initialized to the default configuration for a new audio file opened with write access, or for opening a raw (headerless) audio file for read access.
name A character string which names the audio file to be opened. fd A Unix file descriptor corresponding to an audio data file which has been previously returned by open(2) or its equivalent. mode This parameter identifies whether the file is to be opened for reading or writing audio sample data and header information. Acceptable values: "r" configures the file descriptor for read-only access "w" configures the file descriptor for write-only access The current library implementation causes e...
querytype is an integer value token representing the type of query being made. arg1,...arg4 are integer value tokens representing the query selectors and/or subtypes. The number of meaningful arguments to the afQuery routines varies with the querytype.
file is the AFfilehandle structure for the audio file from which audio sample data will be read. This structure is usually the returned value of a call to afOpenFile(3dm). track is an integer which identifies an audio track in a file. Since all currently supported file formats allow at most one audio track per file, the value AF_DEFAULT_TRACK should always be used for this argument for now. samples is a pointer to a buffer into which you want to transfer the samples read from the audio file. Not...
file expects the AFfilehandle structure for the audio file from or to which you want to read or write data. This structure is returned by afOpenFile(3dm) call. miscid expects an integer which identifies the miscellaneous data chunk you want to read from or write to. buf expects a pointer to a buffer which will receive a copy of the miscellaneous data from the file, or which contains the data you want to transfer into the file. nbytes is the number of bytes of data you want to read from the file ...
file is an AFfilehandle structure, previously returned by afOpenFile(3dm), afOpenFD(3dm), or afOpenNamedFD(3dm). track is an integer which identifies an audio track within a file which is open for read access. Since all currently supported file formats contain one audio track per file, the constant value AF_DEFAULT_TRACK should always be used here for now. frameoffset is a sample frame location of type AFframecount with a value between 0 and the total number of sample frames in the track minus o...
file is an AFfilehandle structure, previously created by a call to afOpenFile(3dm) or its equivalent. track is an integer which identifies an audio track in handle. Since all currently supported file formats contain only one audio track, the value AF_DEFAULT_TRACK should always be used here for now. matrix is an array of double precision floating point values which specify the manner in which a channel conversion operation should take place. Because the values in this array will be copied into i...
file is an AFfilehandle structure, previously created by a call to afOpenFile(3dm) or its equivalent. track is an integer which identifies an audio track in file. Since all currently supported file formats contain only one audio track, the value AF_DEFAULT_TRACK should be used here for now. params a DMparams list, previously created by a call to dmParamsCreate(3dm).
setup is an AFfilehandle structure, previously created by a call to afOpenFile(3dm) or afOpenFD(3dm), which opened an audio file for write access. instid is a positive integer value which identifies a chunk of instrument parameters. Since the number of supported inst chunks varies with file format, applications should always retrieve this value via afGetInstIDs(3dm). loopid is a positive integer value which identifies a loop stored in the instrument configuration given by instid. markid is a pos...
file is an AFfilehandle structure, previously created by a call to afOpenFile(3dm). instid is a positive integer value which identifies an instrument configuration in file. instid should be an element from an array of IDs created via a call to afInitInstIDs(3dm). loopid is a positive integer value which identifies a loop structure in an instrument parameter chunk. You create loopid's by calling afInitLoopIDs(3dm)....
file is an AFfilehandle structure, previously created by a call to afOpenFile(3dm) or its equivalent. track is an integer which identifies an audio track in handle. Since all currently supported file formats contain only one audio track, the value AF_DEFAULT_TRACK should always be used here for now. slope is a double precision floating point value which specifies an amplitude scaling factor for the waveform to be associated with track. intercept is a double precision floating point value indicat...
file is an AFfilehandle structure, previously created by a call to afOpenFile(3dm) or its equivalent. track is an integer which identifies an audio track in file. Since all currently supported file formats contain only one audio track, the value AF_DEFAULT_TRACK should be used here for now. params a DMparams list, previously created by a call to dmParamsCreate(3dm).
Parameters for the virtual routines are identical to those for the equivalent afInit routines, except the first argument is an AFfilehandle structure rather than an AFfilesetup. file is an AFfilehandle structure, previously created by a call to afOpenFile(3dm) or its equivalent. track is an integer which identifies an audio track in handle. Since all currently supported file formats contain only one audio track, the value AF_DEFAULT_TRACK should always be used here. sampfmt an integer constant w...
This command is used to delay execution of the program or to execute a command in background after a delay. It has several forms, depending on the first argument to the command: after ms Ms must be an integer giving a time in milliseconds. The command sleeps for ms milliseconds and then returns. While the command is sleeping the application does not respond to X events or any other events. after ms ?script script script ...? In this form the command returns immediately, but it arranges for a Tcl...
ref expects a reference value with which to compare source alpha at each pixel. This value should be in the range 0 through 255. func is a symbolic constant taken from the list below. It identifies the alpha comparison function: AF_NEVER, AF_LESS, AF_EQUAL, AF_LEQUAL, AF_GREATER, AF_NOTEQUAL, AF_GEQUAL, and AF_ALWAYS. AF_ALWAYS is the default.
file expects the AFfilehandle structure for the audio file to which audio sample data will be written. This structure is usually the returned value of a call to afOpenFile(3dm). track is an integer which identifies the audio track (chunk) in the file to be accessed. Since all currently supported file formats allow at most one audio track per file, the value AF_DEFAULT_TRACK should always be used for this argument for now. samples is a pointer to a buffer containing samples to be written to the a...
aint returns the truncated value of its real argument in a real. dint returns the truncated value of its double-precision argument as a double-precision value. qint returns the truncated value of its real*16 argument as a real*16 value. iint returns the truncated value of its real*4 argument in a integer*2. jint returns the truncated value of its real*4 argument in a integer*4. iidint returns the truncated value of its real*8 argument in a integer*2. jidint returns the truncated value of its rea...
The aio_cancel() function attempts to cancel one or more asynchronous I/O requests currently outstanding against file descriptor fildes. The aiocb argument points to the asynchronous I/O control block for a particular request to be canceled. If aiocbp is NULL, then all outstanding cancelable asynchronous I/O requests against fildes are canceled. The aio_cancel64() function is identical to aio_cancel() except that it takes an aiocb64_t * (see ). This structure allows for the specification ...
The aio_error() function returns the error status associated with the aiocbp passed in. The error status for an asynchronous I/O operation is the errno value that would be set by the corresponding read(2) or write(2) or fsync(2) operation. If the operation has not yet completed, then the error status shall be equal to EINPROGRESS. The aio_error64() function is identical to aio_error() except that it takes an aiocb64_t * (see ). This structure allows for the specification of a file offset ...
The aio_fsync() function asynchronously moves all modified data of a file indicated by the file descriptor aio_fildes member of the struct aiocb referenced by the aiocbp argument. The functions return when the operation is queued. If op is O_SYNC then all modified data and attributes are forced to the physical medium. If op is O_DSYNC then only ...
The aio_hold() function allows the calling process to defer or resume the reception of callback notification invocations. If the should_hold parameter is AIO_HOLD_CALLBACK, callbacks will be deferred. If the should_hold parameter is AIO_RELEASE_CALLBACKS then callbacks will be released. If the value is AIO_ISHELD_CALLBAC<...
The aio_read() function allows the calling process to read aiocbp- >aio_nbytes from the file associated with aiocbp->aio_fildes into the buffer pointed to by aiocbp->aio_buf (see read(2)). The function call returns when the read request has been initiated or, at a minimum, queued for the file or device. The aiocb->aio_sigevent defines how the calling process will be notified upon I/O completion. If sigev_notify is SIGEV_NONE, then no notification will be posted to the ...
The aio_return() function returns the return status associated with the aiocbp passed in. The return status for an asynchronous I/O operation is the value that would be returned by the corresponding read(2) or write(2) or fsync(2) operation. If the error status for the operation is equal to EINPROGRESS, then the return status for the operation is undefined. The aio_return() function may be called exactly once to retrieve the return status of a given asynchronous operation; thereafter, if the sam...
The optional aio_sgi_init() function allows the calling process to initialize the asynchronous I/O interface. If this function is not called, the asynchronous I/O interface is initialized the first time a call is made to aio_read(), aio_write() or lio_listio(). aio_sgi_init() takes an aioinit_t * as an argument. If this argument is NULL, default initialization values are used. Initialization of the interface includes starting up slave threads which are used to carry out I/O requests. This is sig...
The aio_suspend() function shall suspend the calling thread until at least one of the asynchronous I/O operations referenced by the aiocbp argument has completed, until a signal interrupts the function, or if timeout is not NULL, until the time interval specified by timeout has passed. If any of the aiocb structures in the list correspond to the completed asynchronous I/O operations(i.e., the error status for the operation is not equal to EINPROGRESS, at the time of the call), the function shall...
The aio_write() function allows the calling process to write aiocbp- >aio_nbytes from the file associated with aiocbp->aio_fildes into the buffer pointed to by aiocbp->aio_buf (see write(2)). The function call returns when the write request has been initiated or, at a minimum, queued for the file or device. The aiocb->aio_sigevent defines how the calling process will be notified upon I/O completion. If sigev_notify is SIGEV_NONE, then no notification will be posted ...
This routine arranges for subroutine proc to be called after time seconds. If time is ``0'', the alarm is turned off and no routine will be called. The returned value will be the time remaining on the last alarm.
eventq expects an ALeventQueue structure from which you want to retrieve audio events. src expects an int with the value of the resource that generated or posted the audio event. param expects an int with the value of the parameter for the audio event. event expects an ALevent structure previously initialized by alNewEvent(3dm).
queue expects the ALeventQueue handle for the audio event queue you want to close. This handle is the returned value of the alOpenEventQueue(3dm) call.
source is the source resource. dest is the destination resource. props is a parameter/value list of desired properties for the connection (see alGetParams(3dm) for more information on parameter/value lists). nprops is the number of parameter/value pairs in the list props.
eventq expects an ALeventQueue structure properly initialized by alOpenEventQueue(3dm). resource expects an int with the value of the resource you are interested in unregistering. params is an int pointer with a parameter list of the audio events you wish to unregister. nparams is an int with the total number of parameters of the list params.
port is the audio port from which you want to discard samples. This is the returned value of an alOpenPort(3dm) call. framecount expects the number of sample frames that you wish to discard.
config expects an ALconfig structure, the returned value of ALnewconfig(3dm) or ALgetconfig(3dm). channels expects a long value indicating the number of samples per sampling interval. The currently valid values are: 1, 2, and 4.
config expects an ALconfig structure, the returned value of alNewConfig(3dm) or alGetConfig(3dm). channels expects a int value indicating the number of samples per sample frame, i.e. the number of channels.
port expects an ALport structure, the returned value of an ALopenport(3dm) call. config expects an ALconfig structure, the returned value of a call to ALnewconfig(3dm) or ALgetconfig(3dm).
port expects an ALport, the returned value of an alOpenPort(3dm) call. config expects an ALconfig, the returned value of a call to alNewConfig(3dm) or alGetConfig.
device expects a device. Currently there is only one device, AL_DEFAULT_DEVICE. parameter expects the symbolic constant for the device state variable for which you want the default value.
config expects an ALconfig structure, the returned value of a call to alNewConfig(3dm) or alGetConfig(3dm). device expects the integer resource ID of an audio device (see alResources(3dm)).
port expects an ALport structure. This structure is the returned value of an ALopenport(3dm) call. fillpoint expects a long value, the fillpoint, in samples.
port expects an ALport structure. This structure is the returned value of an alOpenPort(3dm) call. fillpoint expects a integer value, the fillpoint, in sample frames.
config expects an ALconfig structure, the returned value of a call to ALnewconfig(3dm) or ALgetconfig(3dm). maximum_value expects an IEEE double precision floating point value which defines the range of the floating point data for the ALreadsamps(3dm) or ALwritesamps(3dm) functions.
config expects an ALconfig structure, the returned value of a call to alNewConfig(3dm) or alGetConfig(3dm). maximum_value expects an IEEE double precision floating point value which defines the range of the floating point data for the alReadFrames(3dm) or alWriteFrames(3dm) functions.
port expects the ALport structure for the audio port for which you wish to know the sample frame number. This structure is the returned value of the ALopenport(3dm) call. fnum expects a pointer to an unsigned 64-bit value which is to contain the resultant sample-frame number.
port expects the ALport structure for the audio port for which you wish to know the sample frame number. This structure is the returned value of the alOpenPort(3dm) call. fnum expects a pointer to an unsigned 64-bit value which is to contain the resultant sample-frame number.
port expects the ALport structure for the audio port for which you wish to know the sample frame number. This structure is the returned value of the ALopenport(3dm) call. fnum expects a pointer to an unsigned 64-bit value which is to contain the resultant sample-frame number. time expects a pointer to an unsigned 64-bit value which is to contain the resultant sample-frame time, in nanoseconds.
port expects the ALport structure for the audio port for which you wish to know the sample frame number. This structure is the returned value of the alOpenPort(3dm) call. fnum expects a pointer to an unsigned 64-bit value which is to contain the resultant sample-frame number. time expects a pointer to an unsigned 64-bit value which is to contain the resultant sample-frame time, in nanoseconds.
config expects an ALconfig structure, the returned value of a call to alNewConfig(3dm) or alGetConfig(3dm). value expects a boolean value (0 or 1) indicating whether or not limiting is required on floating-point to integer data conversion for alWriteFrames(3dm) or alWriteBuffers(3dm).
device expects the device to which the device state variable applies. Currently, there is only one device, AL_DEFAULT_DEVICE. param expects the device state variable for which you want to know the range. minparam expects a pointer to the variable into which ALgetminmax(3dm) can write the minimum value associated with param. maxparam expects a pointer to the variable into which ALgetminmax(3dm) can write the maximum value associated with param....
device expects a device. Currently there is only one device, AL_DEFAULT_DEVICE. descriptor expects the descriptor (value of a symbolic constant) for the device state variable you want to identify.
res is the audio resource (see alResources(3dm)) to which the given parameter applies. param is the parameter about which you desire information. pinfo is a pointer to an ALparamInfo structure allocated by the caller.
device expects the device to which this command applies. Currently, there is only one device, AL_DEFAULT_DEVICE. PVbuffer expects an array of longs. The even elements of this array should each contain a device state variable that you choose to read or change. The subsequent odd elements are the current or new value of these variables. bufferlength expects the number of longs in the buffer pointed to by PVbuffer. This value must be even....
resource expects the resource from which you wish to get parameter values. pvs is an array of ALpv structures, each of which contains a single parameter and will contain the associated value upon return from alGetParams. npvs is the number of ALpv items in the array.
config expects an ALconfig structure. This structure is the returned value of an ALnewconfig(3dm) or ALgetconfig(3dm) call. size expects the number of sample locations to use for the internal buffer of an audio port created by a subsequent ALopenport(3dm) call.
config expects an ALconfig structure. This structure is the returned value of an alNewConfig(3dm) or alGetConfig(3dm) call. size expects the number of sample frames to use for the internal buffer of an audio port created by a subsequent alOpenPort(3dm) call.
start_res expects a resource at which the name search is to begin. Typically this is AL_SYSTEM, the top of the audio resource hierarchy. name is a character string describing the resource to be found. type is the type of the desired resource.
config expects an ALconfig structure, the returned value of a call to ALnewconfig(3dm) or ALgetconfig(3dm). sampleformat expects a symbolic constant that identifies the format of an audio sample. There are three symbolic constants defined for this parameter.
config expects an ALconfig structure, the returned value of a call to alNewConfig(3dm) or alGetConfig(3dm). sampleformat expects a symbolic constant that identifies the format of an audio sample. There are three symbolic constants defined for this parameter.
port expects the ALport to which this command applies. PVbuffer expects an array of longs. The even elements of this array should each contain an error variable that you choose to read. The subsequent odd elements are the current or new value of these variables. bufferlength expects the number of longs in the buffer pointed to by PVbuffer. This value must be even.
config expects an ALconfig structure, the returned value of a call to ALnewconfig(3dm) or ALgetconfig(3dm). samplesize expects a symbolic constant that identifies the size of an audio sample. There are three symbolic constants defined for this parameter. AL_SAMPLE_8 indicates a one byte sample width in the range -128 to 127. AL_SAMPLE_16 indicates a two byte sample width in the range -32768 to 32767. AL_SAMPLE_24 indicates a 4 byte sample width in the range -8388608 to 8388607....
config expects an ALconfig structure, the returned value of a call to alNewConfig(3dm) or alGetConfig(3dm). samplesize expects a symbolic constant that identifies the size of an integer audio sample. There are three symbolic constants defined for this parameter. AL_SAMPLE_8 indicates a one byte (signed char) sample width in the range -128 to 127. AL_SAMPLE_16 indicates a 16-bit (short) sample width in the range -32768 to 32767. AL_SAMPLE_24 indicates a 32-bit (int) sample width in the range -838...
The Silicon Graphics Audio Library (AL) provides a uniform, deviceindependent programming interface to real-time audio I/O on Silicon Graphics workstations. The AL was designed to enable multiple programs to share the audio resources of the workstation. Multiple programs may have input and output streams open concurrently, either sharing audio devices or using independent audio devices. The Audio Library provides four major capabilities: 1. input and output of digital audio data 2. control of th...
type is a resource type for which you want to see if subtype is a subtype. type can also be a resource, in which case alIsSubtype uses the type of the given resource. subtype is a resource type for which you want to see if type is a supertype. subtype can also be a resource, in which case alIsSubtype uses the type of the given resource.
alloca returns a pointer to size bytes of uninitialized local stack space. Since the space is allocated using a built-in compiler function, the allocation is quite fast. If zero is passed as size, alloca returns a valid pointer (unlike some versions of malloc, which consider a zero size to be an error). The #include is required. Space allocated when a function foo calls alloca is freed automatically when foo returns. It is an error to call free with a pointer returned by alloca. Not a...
ALnewconfig is obsolete and is provided for backward compatibility. The preferred function is alNewConfig(3dm). Use ALnewconfig(3dm) to create and initialize an ALconfig structure. This structure is used to pass in configuration information when calling ALopenport(3dm) or ALsetconfig(3dm). To change the configuration information stored in an ALconfig structure, see the commands mentioned below in SEE ALSO. The default structure specifies a 100,000 sample stereo buffer, utilizing a 16-bit two's ...
alNewConfig creates and initializes an ALconfig structure. An ALconfig structure specifies the audio data format and queue size to be used by an audio port. The functions alOpenPort(3dm) or alSetConfig(3dm) apply the properties specified in the ALconfig to a new or existing audio port, respectively. To change the properties given in an ALconfig structure, see the commands mentioned below in SEE ALSO. The default ALconfig specifies a 50,000 sample-frame stereo buffer, utilizing a 16-bit two's co...
alNewEvent creates and initializes an ALevent structure. An ALevent structure contains the event information of a particular audio system change. Events are retrieved from event queues through alNextEvent(3dm) and alCheckEvent(3dm). All events have an audio parameter associated with them. For example, an ALevent with an AL_RATE parameter means that an AL_RATE change occurred on an audio resource. Please refer to alParams(3dm) for more information. To access event information, use the following c...
eventq expects a valid ALeventQueue structure from which you want to retrieve audio events. event expects an ALevent structure previously initialized by alNewEvent(3dm).
alog returns the real natural logarithm of its real argument. dlog returns the double-precision natural logarithm of its double-precision argument. qlog returns the real*16 natural logarithm of its real*16 argument. The argument of alog, dlog, and qlog must be greater than zero. clog returns the complex logarithm of its complex argument. The argument of clog must not be (0.,0.). The range of the imaginary part of clog is: -pi < imaginary part <= pi. zlog returns the complex*16 logarithm of its c...
name A port name is an ASCII string which summarizes the usage of this port. It is intended for human consumption, similar to a window title. Port names have a maximum length of 20 characters. direction Use this parameter to identify whether the port is an input or an output port. Acceptable values are: "r" configures the port for reading (input). "w" configures the port for writing (output). config Expects the ALconfig structure returned by ALnewconfig(3dm). This structure contains informat...
name A port name is a character string describing the port. It is intended for human consumption, similar to a window title. Port names have a maximum length of 20 characters. direction Specifies whether the port is for input or output. "r" specifies an input port. "w" specifies an output port. config Expects an ALconfig, as returned by alNewConfig(3dm) or alGetConfig(3dm). This structure describes the data format and queue size for the port. Passing a null (0) value for config yields a port...
Parameters are retrieved or set using an ALpv structure. The most important two fields in the ALpv are: typedef union { int param; /* the parameter */ ALvalue value; /* the associated value */ [...] } ALpv; The ALvalue structure is a union of three types: typedef union { int i; /* 32-bit integer values */ long long ll; /* 64-bit integer and fixed-point values */ void* ptr; /* pointer values */ } ALvalue; The AL supports a small number of data types, each of which uses a specific field of the ALv...
device expects a device. Currently, there is only one device, AL_DEFAULT_DEVICE. PVbuffer expects an array of longs into which ALqueryparams(3dm) can write descriptor/description pairs for each state variable associated with device. The even (0,2,4, ...) entries receive the descriptors. The odd entries (1,3,5, ...) receive the descriptions. These descriptions take on one of four values: +/-AL_RANGE_VALUE if this device state variable can assume a range of values, and the range has some meaning, ...
res expects the audio resource (see alResources(3dm)) for which you desire the information. param expects the parameter whose values you desire. Not all parameters support alQueryValues(3dm); see alParams(3dm) for which parameters apply. set expects an array of ALvalues large enough to hold the results. See alParams(3dm) and alSetParams(3dm) for more information on ALvalues. setsize is the number of ALvalues in set. quals expects an array of ALpv structs called qualifiers. These are used to filt...
port is the audio input port from which you want to read samples. This is the returned value of an alOpenPort(3dm) call. bufs is an array of pointers to sample buffers, each element of which corresponds to a single channel of audio input. strides is an array of integers, one corresponding to each input channel. Each element indicates the number of interleaved channels you desire in the sample buffer for that channel. framecount is the number of sample frames that you want to read from the audio ...
port is the audio input port from which you want to read samples. This is the returned value of an alOpenPort(3dm) call. samples is the buffer into which you want to read the samples. framecount is the number of sample frames that you want to read from the audio port.
port expects the ALport structure for the audio port from which you want to read samples. This structure is the returned value of the ALopenport(3dm) call. samples expects a pointer to a buffer into which you want to transfer the samples read from the audio port. samplecount expects the number of samples that you want to read from the audio port.
Each specific instance of a resource has a unique 32-bit integer identifier, or resource ID. Resource IDs are the "handles" by which an application refers to that resource when calling AL functions.
eventq expects an ALeventQueue structure properly initialized by alOpenEventQueue(3dm). resource expects a resource ID from which you desire events. params expects an int pointer with a list of parameters for which you desire events. nparams expects an int with the total number of parameters in the list params.
resource expects the resource on which you wish to set parameter values. pvs is an array of ALpv structures, each of which contains a single parameter and its desired value. npvs is the number of ALpv items in the array.
port is the audio output port to which you want to write samples. This is the returned value of an alOpenPort(3dm) call. bufs is an array of pointers to sample buffers, each element of which corresponds to a single channel of audio output. strides is an array of integers, one corresponding to each output channel. Each element indicates the number of interleaved channels in the buffer directed at that channel. framecount is the number of sample frames that you want to write to the audio port....
port is the audio output port to which you want to write samples. This is the returned value of an alOpenPort(3dm) call. samples is the buffer containing the samples. framecount is the number of sample frames that you want to write to the audio port.
port expects the ALport structure for the audio port to which you want to write samples. This structure is the returned value of the ALopenport(3dm) call. samples expects a pointer to a buffer from which you want to transfer the sound samples into the audio port. samplecount expects the number of samples that you want to write to the port.
port is the audio output port to which you want to write samples. This is the returned value of an alOpenPort(3dm) call. framecount is the number of sample frames that you want to write to the audio port.
The arena malloc package provides a main memory allocator based on the malloc(3X) memory allocator. This allocator has been extended so that an arbitrary memory space ("arena") may be set up as an area from which to malloc. Calls to the arena malloc package differ from calls to the standard malloc(3X) only in that an arena pointer must be supplied. This arena pointer is returned by a call to acreate. acreate sets up ...
idamax, isamax, izamax, and icamax, return the index of the maximum value of vector x. The vector x has length n and increment incx. For izamax and icamax , the norm of each value is taken as: Abs( Real( x(i) ) ) + Abs( Imag( x(i) ) )
bool is the general name for the bit field manipulation intrinsic functions and subroutines from the FORTRAN Military Standard (MIL-STD1753). and, or and xor return the value of the binary operations on their arguments. not is a unary operator returning the one's complement of its argument. ior, iand, not, ieor - return the same results as and, or, not, and xor. lshift and rshift return the value of the first argument shifted left or right, respectively, the number of times specified by the sec...
This module is a "pure virtual base class"--it has nothing of its own. It's just there to inherit from one of the various DBM packages. It prefers ndbm for compatibility reasons with Perl 4, then Berkeley DB (See the DB_File manpage), GDBM, SDBM (which is always there--it comes with Perl), and finally ODBM. This way old programs that used to use NDBM via dbmopen() can still do so, but new ones can reorder @ISA: BEGIN { @AnyDBM_File::ISA = qw(DB_File GDBM_File NDBM_File) } use AnyDBM_File; Hav...
Append all of the value arguments to the current value of variable varName. If varName doesn't exist, it is given a value equal to the concatenation of all the value arguments. This command provides an efficient way to build up long variables incrementally. For example, ``append a $b'' is much more efficient than ``set a $a$b'' if $a is long.
x expects the x coordinate of the center of the arc. The center of the arc is the center of the circle that would contain the arc. y expects the y coordinate of the center of the arc. The center of the arc is the center of the circle that would contain the arc. radius expects the length of the radius of the arc. The radius of the arc is the radius of the circle that would contain the arc. startang expects the measure of the start angle of the arc. The start angle of the arc is measured from the ...
x expects the x coordinate of the center of the filled arc. The center of the filled arc is the center of the circle that would contain the arc. y expects the y coordinate of the center of the filled arc. The center of the filled arc is the center of the circle that would contain the arc. radius expects the length of the radius of the filled arc. The radius of the filled arc is the radius of the circle that would contain the filled arc. startang expects the measure (in tenths of a degree) of the...
This command performs one of several operations on the variable given by arrayName. Unless otherwise specified for individual commands below, arrayName must be the name of an existing array variable. The option argument determines what action is carried out by the command. The legal options (which may be abbreviated) are: array anymore arrayName searchId Returns 1 if there are any more elements left to be processed in an array search, 0 if all elements have already been returned. SearchId indica...
The single-precision and long double-precision routines listed above are only available in the standard math library, -lm, and in -lmx. sin, cos and tan return trigonometric functions of radian arguments x for double data types. fsin, fcos and ftan, and their ANSI-named counterparts sinf, cosf and tanf return trigonometric functions of radian TRIG(3M) TRIG(3M) arguments x for float data types. sinl, cosl and tanl do the same for long double data types. The asin routines return the arc sine in th...
This macro is useful for putting diagnostics into programs. When it is executed, if expression is false (zero), assert prints Assertion failed: expression, file xyz, line nnn on the standard error output and aborts. In the error message, xyz is the name of the source file and nnn the source line number of the assert statement. The latter are respectively the values of the preprocessor macros __FILE__ and __LINE__. Compiling with the pre...
dasum, sasum, scasum, and dzasum, compute the L1 norm of the vector x of length n and increment incx. asum <--- Sum( Abs( X(i) ) ) ) dasum and sasum asum <--- Sum( Abs(Real(X(i))) + Abs(Imag(X(i))) ) dzasum and scasum
Tcl_AsyncProc *proc (in) Procedure to invoke to handle an asynchronous event. ClientData clientData (in) One-word value to pass to proc. Tcl_AsyncHandler async (in) Token for asynchronous event handler. Tcl_Interp *interp (in) Tcl interpreter in which command was being evaluated when handler was invoked, or NULL if handler was invoked when there was no interpreter active. int code (in) Completion code from command that just completed in interp, or 0 if interp is NULL....
The single-precision and long double-precision routines listed above are only available in the standard math library, -lm, and in -lmx. sin, cos and tan return trigonometric functions of radian arguments x for double data types. fsin, fcos and ftan, and their ANSI-named counterparts sinf, cosf and tanf return trigonometric functions of radian TRIG(3M) TRIG(3M) arguments x for float data types. sinl, cosl and tanl do the same for long double data types. The asin routines return the arc sine in th...
The single-precision and long double-precision routines listed above are only available in the standard math library, -lm, and in -lmx. sin, cos and tan return trigonometric functions of radian arguments x for double data types. fsin, fcos and ftan, and their ANSI-named counterparts sinf, cosf and tanf return trigonometric functions of radian Page 1 TRIG(3M) TRIG(3M) arguments x for float data types. sinl, cosl and tanl do the same for long double data types. The asin routines return the arc sin...
These functions are used to register event handlers for checkpoint and restart, and activate CPR signal handling. The atcheckpoint() routine adds the function func() to the list of functions to be called without arguments upon receipt of checkpoint; see ckpt_create(3). Similarly, the atrestart() routine registers the callback function func() for a restart event; see ckpt_restart(3). At checkpoint or restart time, registered functions are called in the same order as their registration. These func...
atexit adds the function func to a list of functions to be called without arguments on normal termination of the program. Normal termination occurs by either a call to the exit system call or a return from main. At most 32 functions may be registered by atexit; the functions will be called in the reverse order of their registration. For sproc processes, atexit is only called when the last member of the share group exit...
atfork_child adds the function func to the end of a list of functions to be called without arguments on entry of a child process created by fork(2). atfork_child_prepend performs the same task, but it adds the function at the beginning of the list. At most 32 functions may be registered by atfork_child or atfork_child_pre...
atsproc_child adds the function func to a list of functions to be called without arguments on entry of a child process created by sproc(2). At most 32 functions may be registered by atsproc_child; the functions will be called in the same order as their registration. atsproc_parent adds the function func to a list of functions to be called with two integer arguments after ...
vx expects the valuator device number for the device that controls the horizontal location of the cursor. By default, vx is MOUSEX. vy expects the valuator device number for the device that controls the vertical location of the cursor. By default, vy is MOUSEY.
product is a constant symbol for the product license of interest. Currently defined licenses are: AU_LICENSE_AWARE_MULTIRATE_ENCODER AU_LICENSE_AWARE_MULTIRATE_DECODER errorval is a pointer to an integer which will be set only if the return value is AU_LICENSE_ERR. The value is the NetLS error which occurred. message is a pointer to a character pointer, which is changed to point to an informative string only if the return value is AU_LICENSE_ERR. The string will contain the NetLS error that occu...
pvlist_ptr Pointer to an Audio File Library parameter/value list data type. pvlist An Audio File Library parameter value list data type as created by AUpvnew. numitems an integer representing the size to create a new AUpvlist. item a integer zero based index into an AUpvlist. The index should be non-negative and less than numitems-1. type a symbolic constant describing the type a parameter. Currently supported types are: AU_PVTYPE_LONG representing values which are long AU_PVTYPE_DOUBLE represen...
The AutoLoader module works with the AutoSplit module and the __END__ token to defer the loading of some subroutines until they are used rather than loading them all at once. To use AutoLoader, the author of a module has to place the definitions of subroutines to be autoloaded after an __END__ token. (See the perldata manpage.) The AutoSplit module can then be run manually to extract the definitions into individual files auto/funcname.al. AutoLoader implements an AUTOLOAD subroutine. When an und...
This function will split up your program into files that the AutoLoader module can handle. It is used by both the standard perl libraries and by the MakeMaker utility, to automatically configure libraries for autoloading. The autosplit interface splits the specified file into a hierarchy rooted at the directory $dir. It creates directories as needed to reflect class hierarchy, and creates the file autosplit.ix. This file acts as both forward declaration of all package routines, and as timestamp ...
If the module Module is already loaded, then the declaration use autouse 'Module' => qw(func1 func2($;$) Module::func3); is equivalent to use Module qw(func1 func2); if Module defines func2() with prototype ($;$), and func1() and func3() have no prototypes. (At least if Module uses Exporter's import, otherwise it is a fatal error.) If the module Module is not loaded yet, then the above declaration declares functions func1() and func2() in the current package, and declares a function Module::f...
The initauxgroup function provides the means for auxiliary identification and authentication (I&A). uname and gid are the name and group id of the user that is to be subject to auxiliary I&A. display is a handle to the output file stream where any messages (informative or error indicating) may be printed. display is NULL if there is no associated output stream. Usually, initau<...
daxpy, saxpy, zaxpy, and caxpy compute a constant a times a vector x plus a vector y. The result overwrites the initial values of vector y. Page 1 _AXPY(3F) _AXPY(3F) Y <--- Y + a . X incx and incy specify the increment between two consecutive elements of respectively vector x and y.
char *src (in) Pointer to a string starting with a backslash. int *countPtr (out) If countPtr isn't NULL, *countPtr gets filled in with number of characters in the backslash sequence, including the backslash character.
On INPUT NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix. T contains the nonsymmetric matrix. Its subdiagonal is stored in the last N-1 positions of the first column, its diagonal in the N positions of the second column, and its superdiagonal in the first N-1 positions of the third column. T(1,1) and T(N,3) are arbitrary. E contains the subdiagonal elements of the symmetric matrix in its ...
On INPUT NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix. A contains the input matrix to be balanced. On OUTPUT A contains the balanced matrix. LOW and IGH are two integers such that A(I,J) is equal to zero if (1) I is greater than J and (2) J=1,...,LOW-1 or I=IGH+1,...,N. SCALE contains information determining the permutations and scaling factors used. Suppose that the principal submatri...
On INPUT NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix. LOW and IGH are integers determined by BALANC. SCALE contains information determining the permutations and scaling factors used by BALANC. M is the number of columns of Z to be back transformed. Z contains the real and imaginary parts of the eigen- vectors to be back transformed in its first M columns. On OUTPUT Z contains the real...
On INPUT NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix. MB is the (half) band width of the matrix, defined as the number of adjacent diagonals, including the principal diagonal, required to specify the non-zero portion of the lower triangle of the matrix. A contains the lower triangle of the symmetric band input matrix stored as an N by MB array. Its lowest subdiagonal is stored in the ...
On INPUT NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix. MBW is the number of columns of the array A used to store the band matrix. If the matrix is symmetric, MBW is its (half) band width, denoted MB and defined as the number of adjacent diagonals, including the principal diagonal, required to specify the non-zero portion of the lower triangle of the matrix. If the subroutine is being u...
These routines provide a simple rendezvous mechanism for shared address processes. new_barrier takes a usptr_t as an argument to indicate the shared arena from which to allocate the barrier. The usptr_t is a previously allocated handle obtained through a call to usinit(3P). The barrier function takes a pointer to a previously allocated and initialized barrier structure (as returned by new_barrier) and the number of processes/sub-tasks to wait for. As each process enters the barrier, it spins (bu...
Given a pointer to a null-terminated character string that contains a pathname, basename returns a pointer to the last element of path. Trailing ``/'' characters are deleted. If path or *path is zero, pointer to a static constant ``.'' is returned.
xmin expects the width, in pixels, of the smallest displayable feature. ymin expects the height, in pixels, of the smallest displayable feature. x1 expects the x coordinate of a corner of the bounding box. y1 expects the y coordinate of a corner of the bounding box. x2 expects the x coordinate of a corner of the bounding box. The corner referenced by this parameter must be diagonally opposite the corner referenced by the x1 and y1 parameters. y2 expects the y coordinate of a corner of the boundi...
This command rings the bell on the display for window and returns an empty string. If the -displayof option is omitted, the display of the application's main window is used by default. The command uses the current bell-related settings for the display, which may be modified with programs such as xset. This command also resets the screen saver for the screen. Some screen savers will ignore this, but others will reset so that the screen becomes visible again....
j0 and j1 return Bessel functions of x of the first kind of orders zero and one, respectively. jn returns the Bessel function of x of the first kind of order n. j0l, j1l, and jnl are the long double versions of these functions. y0 and y1 return Bessel functions of x of the second kind of orders zero and one, respectively. yn returns the Bessel function of x of the second kind of order n. The value of x must be positive. y0l, y1l, and ynl are the long double versions of these functions....
bgets reads characters from stream into buffer until either count is exhausted or one of the characters in breakstring is encountered in the stream. The read data is terminated with a null byte ('\0') and a pointer to the trailing null is returned. If a breakstring character is encountered, the last non-null is the delimiter character that terminated the scan. Note that, except for the fact that the returned value points to the end of the read string rather than ...
Vertices specified between bgnqstrip and endqstrip are used to define a strip of quadrilaterals. The graphics pipe maintains three vertex registers. The first, second, and third vertices are loaded into the registers, but no quadrilateral is drawn until the system executes the fourth vertex routine. Upon executing the fourth vertex routine, the system draws a quadrilateral through the vertices, then replaces the two oldest vertices with the third and fourth vertices. For each new pair of vertex ...
The bind command associates Tcl scripts with X events. If all three arguments are specified, bind will arrange for script (a Tcl script) to be evaluated whenever the event(s) given by sequence occur in the window(s) identified by tag. If script is prefixed with a ``+'', then it is appended to any existing binding for sequence; otherwise script replaces any existing binding. If script is an empty string then the current binding for sequence is destroyed, leaving sequence unbound. In all of the ...
bind() assigns a name to an unnamed socket. When a socket is created with socket(3N), it exists in a name space (address family) but has no name assigned. bind() requests that the name pointed to by name be assigned to the socket.
Tcl_Interp *interp (in) Interpreter to use when invoking bindings in binding table. Also used for returning results and errors from binding procedures. Tk_BindingTable bindingTable (in) Token for binding table; must have been returned by some previous call to Tk_CreateBindingTable. ClientData object (in) Identifies object with which binding is associated. char *eventString (in) String describing event sequence. char *script (in) Tcl script to invoke when binding triggers. int append (in) Non-zer...
When a binding is created with the bind command, it is associated either with a particular window such as .a.b.c, a class name such as Button, the keyword all, or any other string. All of these forms are called binding tags. Each window contains a list of binding tags that determine how events are processed for the window. When an event occurs in a window, it is applied to each of the window's tags in order: for each tag, the most specific binding that matches the given tag and event is execute...
On INPUT N is the order of the matrix. EPS1 is an absolute error tolerance for the computed eigenvalues. If the input EPS1 is non-positive, it is reset for each submatrix to a default value, namely, minus the product of the relative machine precision and the 1-norm of the submatrix. D contains the diagonal elements of the input matrix. E contains the subdiagonal elements of the input matrix in its last N-1 positions. E(1) is arbitrary. E2 contains the squares of the corresponding elements of E. ...
A bitmap is an image whose pixels can display either of two colors or be transparent. A bitmap image is defined by four things: a background color, a foreground color, and two bitmaps, called the source and the mask. Each of the bitmaps specifies 0/1 values for a rectangular array of pixels, and the two bitmaps must have the same dimensions. For pixels where the mask is zero, the image displays nothing, producing a transparent effect. For other pixels, the image displays the foreground color if ...
count expects the number of graphics timer events after which to blank the current screen. The frequency of graphics timer events is returned by the getgdesc inquiry GD_TIMERHZ.
red is a floating point value between 0 and 1 (default 1.0). green is a floating point value between 0 and 1 (default 1.0). blue is a floating point value between 0 and 1 (default 1.0). alpha is a floating point value between 0 and 1 (default 1.0).
Looks for MakeMaker-like 'blib' directory structure starting in dir (or current directory) and working back up to five levels of '..'. Intended for use on command line with -M option as a way of testing arbitary scripts against an uninstalled version of a package. However it is possible to : use blib; or use blib '..'; etc. if you really must.
rate expects the number of vertical retraces per blink. On the standard monitor, there are 60 vertical retraces per second. i expects an index into the current color map. The color defined at that index is the color that is blinked (alternated). red expects the red value of the alternate color that blinks against the color selected from the color map by the i parameter. green expects the green value of the alternate color that blinks against the color selected from the color map by the i paramet...
data expects a pointer to the buffer that is to receive the queue information. n expects the number of elements in the buffer. FUNCTION RETURN VALUE The returned value of the function is the number of 16 bit words of data actually read into the data buffer. Note that this number will be twice the number of complete queue entries read, because each queue entry consists of two 16 bit words.
bool is the general name for the bit field manipulation intrinsic functions and subroutines from the FORTRAN Military Standard (MIL-STD1753). and, or and xor return the value of the binary operations on their arguments. not is a unary operator returning the one's complement of its argument. ior, iand, not, ieor - return the same results as and, or, not, and xor. lshift and rshift return the value of the first argument shifted left or right, respectively, the number of times specified by the sec...
On INPUT NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix. MB is the (half) band width of the matrix, defined as the number of adjacent diagonals, including the principal diagonal, required to specify the non-zero portion of the lower triangle of the matrix. A contains the lower triangle of the symmetric band input matrix stored as an N by MB array. Its lowest subdiagonal is stored in the ...
This command is typically invoked inside the body of a looping command such as for or foreach or while. It returns a TCL_BREAK code, which causes a break exception to occur. The exception causes the current script to be aborted out to the the innermost containing loop command, which then aborts its execution and returns normally. Break exceptions are also handled in a few other situations, such as the catch command, Tk event bindings, and the outermost scripts of procedure bodies....
bsearch is a binary search routine generalized from Knuth (6.2.1) Algorithm B. It returns a pointer into a table (an array) indicating where a datum may be found or a null pointer if the datum cannot be found. The table must be previously sorted in increasing order according to a comparison function pointed to by compar. key points to a datum instance to be sought in the table. base points to the element at the base of the table. nel is the number of elements in the table. s...
The functions bcopy, bcmp, and bzero operate on variable length strings of bytes. They do not check for null bytes as the routines in string(3) do. bcopy copies length bytes from string src to the string dst. bcmp compares byte string b1 against byte string b2, returning zero if they are identical, non-zero otherwise. Both strings are assumed to be length bytes long. bzero and blkclr place length zero bytes in the string b. ffs finds the first bit set in the argument passed it and returns the in...
bool is the general name for the bit field manipulation intrinsic functions and subroutines from the FORTRAN Military Standard (MIL-STD1753). and, or and xor return the value of the binary operations on their arguments. not is a unary operator returning the one's complement of its argument. ior, iand, not, ieor - return the same results as and, or, not, and xor. lshift and rshift return the value of the first argument shifted left or right, respectively, the number of times specified by the sec...
The routine dbopen is the library interface to database files. One of the supported file formats is btree files. The general description of the database access methods is in dbopen(3), this manual page describes only the btree specific information. The btree data structure is a sorted, balanced tree structure storing associated key/data pairs. The btree access method specific data structure provided to dbopen is defined in the include file as follows: typedef struct { u_long flags; u_int ...
bufsplit examines the buffer, buf, and assigns values to the pointer array, a, so that the pointers point to the first n fields in buf that are delimited by tabs or new-lines. To change the characters used to separate fields, call bufsplit with buf pointing to the string of characters, and n and a set to zero. For example, to use ':', '.', and ',' as separators along with tab and newline: bufsplit ("...
MD5 Data::Dumper # Bundle::libnet may have problems to work without it Bundle::libnet Term::ReadKey Term::ReadLine::Perl # sorry, I'm discriminating the ::Gnu module CPAN::WAIT CPAN
activeBackground cursor highlightThicknesstakeFocus| activeForeground disabledForegroundimagetext | anchor font justify textVariable | background foreground padX underline | bitmap highlightColor padY wrapLength | borderWidth highlightBackground relief See the ``options'' manual entry for details on the standard options. WIDGET-SPECIFIC OPTIONS Name: command Class: Command Command-Line Switch:-command Specifies a Tcl command to associate with the button. This command is typically invoked when ...
These routines convert 16 and 32 bit quantities between network byte order and host byte order. On machines such as the IRIS-4D series, these routines are defined as null macros in the include file . These routines are most often used in conjunction with Internet addresses and ports as returned by gethostbyname(3N) and getservent(3N).
cv For the c4 routines, this parameter expects a four element array containing RGBA (red, green, blue, and alpha) values. If you use the c3 routines, this parameter expects a three element array containing RGB values. Array components 0, 1, 2, and 3 are red, green, blue, and alpha, respectively. Floating point RGBA values range from 0.0 through 1.0. Integer RGBA values range from 0 through 255. Values that exceed the upper limit are clamped to it. Values that exceed the lower limit are not clamp...
Tcl_Interp *interp (in) Interpreter with which to associated callback. Tcl_InterpDeleteProc *proc (in) Procedure to call when interp is deleted. ClientData clientData (in) Arbitrary one-word value to pass to proc.
fctn expects a pointer to a function. nargs expects the number of arguments, excluding itself, that the function pointed to by fctn is to be called with. arg1, arg2, ..., argn expect the arguments to the function pointed to by fctn.
background highlightThickness insertWidthtakeFocus | borderWidth insertBackground reliefxScrollCommand | cursor insertBorderWidth selectBackgroundyScrollCommand | highlightColor insertOffTime selectBorderWidth | highlightBackground insertOnTime selectForeground See the ``options'' manual entry for details on the standard options. WIDGET-SPECIFIC OPTIONS Name: closeEnough Class: CloseEnough Command-Line Switch:-closeenough Specifies a floating-point value indicating how close the mouse cursor m...
Tk_Canvas canvas (in) A token that identifies a canvas widget for which Postscript is being generated. double canvasY (in) Y-coordinate in the space of the canvas. Tcl_Interp *interp (in/out) A Tcl interpreter; Postscript is appended to its result, or the result may be replaced with an error message. Pixmap bitmap (in) Bitmap to use for generating Postscript. int x (in) X-coordinate within bitmap of left edge of region to output. int y (in) Y-coordinate within bitmap of top edge of region to out...
Tk_Canvas canvas (in) A token that identifies a canvas widget. Tcl_Interp *interp (in/out) Interpreter to use for error reporting. char *string (in) Textual description of a canvas coordinate. double *doublePtr (out) Points to place to store a converted coordinate. double x (in) An x coordinate in the space of the canvas. double y (in) A y coordinate in the space of the canvas. short *drawableXPtr (out) Pointer to a location in which to store an x coordinate in the space of the drawable currentl...
cap_acquire activates the capabilities from the permitted set of the process by making each of them active in the effective set for the process. cap_surrender sets the effective set to the capabilities specified in the cap argument, and deallocates this structure.
cap_bind asserts appropriate privilege when assigning a name to a socket. This is necessary when a process wishes to bind an Internet Domain socket to a port whose numeric value is less than 1024, for example. If _POSIX_CAP is in effect, a process calling this function should have CAP_PRIV_PORT capability in the permitted vector of its capability set.
cap_copy_ext copies the capability from *cap to *bufp, if the arguments are valid. cap_copy_int allocates a cap_t and copies the cap_t pointed to by *bufp into it, if the arguments are valid. The storage should be freed by calling cap_free(3c) when no longer needed. In the POSIX specifications, the internal form of an capability may be different from the external form, hence the need for these functions. In IRIX, both forms are the same....
Returns a pointer to an allocated capability that is a copy of the capability supplied as an argument. The returned capability should be deallocated using cap_free(3c) when no longer needed.
cap_envl and cap_envp ensure that the calling process will have sufficient privilege to perform actions requiring the specified capabilities. If the desired and current capability sets are different and if the desired capability set can be obtained because the process has the CAP_SETPCAP capability, then the capabilities in the desired will be acquired. cap_envl accepts a variable argument list of capability values, terminated by an argument of 0 (or CAP_NOT_A_CID). cap_envp accepts a counted ar...
These routines convert strings defined by the POSIX P1003.1e specifications (see chcap(1) capabilities(4)) to/from cap_t, which is the internal format for an capability set (see capability(4)).
cap_get_fd returns a pointer to an allocated cap_t associated with the open file referred to by fd. If there is no capability set associated with the file, cap_get_fd returns a NULL pointer and sets errno to ENOATTR. cap_set_fd sets the capabilities for the open file referred to by fd from the cap_t cap. For this function to succeed, the process calling it must have the CAP_SETFCAP capability enabled and either the effective user ID of the process must match the file owner or the calling process...
cap_get_file returns a pointer to an allocated cap_t associated with the pathname pointed to by path. If there is no capability set associated with the file, cap_get_file returns a NULL pointer and sets errno to ENOATTR. If _POSIX_MAC is in effect, then the process must have MAC read access to the object. cap_set_file sets the capabilities of the specified pathname. For this function to succeed, the process must have the CAP_SETFCAP capability enabled and either the effective user ID of the proc...
cap_get_flag Extracts the current value of the specified capability flag (flag) of the capability cap from the capability set pointed to by cap_p and stores it in the location pointed to by value. cap_set_flag Sets the specified capability flag (flag) in each of the array of capabilities caps (which has ncaps elements)of the from the capability set pointed to by cap_p and from the location pointed to by value....
cap_get_proc returns a pointer to an allocated cap_t associated with the process. cap_set_proc sets the capabilities for the process from the cap_t cap. If any flag in cap is set for any capability not currently permitted for the calling process, the function fails, and the capability state of the process shall remain unchanged. cap_set_proc_flags sets the capability state flags for the process from the cap_value_t flags. If the value of flags is CAP_FLAG_PURE_RECALC capabilities will not be inh...
cap_network_ioctl asserts appropriate privilege when executing an I/O control operation. If _POSIX_CAP is in effect, the appropriate privilege depends upon the request.
cap_schedctl asserts appropriate privilege when altering the scheduling parameters of a process. If _POSIX_CAP is in effect, a process calling this function should have CAP_SCHED_MGT capability in the permitted vector of its capability set.
Returns the size of a capability pointed to by capp. In IRIX capabilities are all a fixed size, but the POSIX specifications allow for the possibility of variable sized structures.
cap_socket asserts appropriate privilege for the creation of sockets with privileged protocol types, like SOCK_RAW or SOCK_IGMP . If _POSIX_CAP is in effect, a process calling this function should have CAP_NETWORK_MGT capability in the permitted vector of its capability set.
The Carp routines are useful in your own modules because they act like die() or warn(), but report where the error was in the code they were called from. Thus if you have a routine Foo() that has a carp() in it, then the carp() will report the error as occurring where Foo() was called, not where carp() was called.
The following functions are defined for complex, where: - d, m, and a are of type integer and - x and y are of type complex. d = abs(x) Returns the absolute value or magnitude of x. d = norm(x) Returns the square of the magnitude of x. It is faster than abs, but more likely to cause an overflow error. It is intended for comparison of magnitudes. d = arg(x) Returns the angle of x, ...
Note: the case command is obsolete and is supported only for backward compatibility. At some point in the future it may be removed entirely. You should use the switch command instead. The case command matches string against each of the patList arguments in order. Each patList argument is a list of one or more patterns. If any of these patterns matches string then case evaluates the following body argument by passing it recursively to the Tcl interpreter and returns the result of that evaluation....
The catch command may be used to prevent errors from aborting command interpretation. Catch calls the Tcl interpreter recursively to execute script, and always returns a TCL_OK code, regardless of any errors that might occur while executing script. The return value from catch is a decimal string giving the code returned by the Tcl interpreter after executing script. This will be 0 (TCL_OK) if there were no errors in script; otherwise it will have a non-zero value corresponding to one of the exce...
catgets attempts to read message msg_num, in set set_num, from the message catalogue identified by catd. catd is a catalogue descriptor returned from an earlier call to catopen. s points to a default message string which will be returned by catgets if the identified message catalogue is not currently available.
catopen opens a message catalogue and returns a catalogue descriptor. name specifies the name of the message catalogue to be opened. If name contains a ``/'' then name specifies a pathname for the message catalogue. Otherwise, the environment variable NLSPATH is used. If NLSPATH does not exist in the environment, or if a message catalogue cannot be opened in any of the paths specified by NLSPATH, then the defau...
On INPUT NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix. LOW and IGH are integers determined by CBAL. SCALE contains information determining the permutations and scaling factors used by CBAL. M is the number of eigenvectors to be back transformed. ZR and ZI contain the real and imaginary parts, respectively, of the eigenvectors to be back transformed in their first M columns. On OUTPUT Z...
This subroutine balances a COMPLEX matrix and isolates eigenvalues whenever possible. On INPUT NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix. AR and AI contain the real and imaginary parts, respectively, of the complex matrix to be balanced. On OUTPUT AR and AI contain the real and imaginary parts, respectively, of the balanced matrix. LOW and IGH are two integers such that AR(I,J) and ...
CBDSQR computes the singular value decomposition (SVD) of a real N-by-N (upper or lower) bidiagonal matrix B: B = Q * S * P' (P' denotes the transpose of P), where S is a diagonal matrix with non-negative diagonal elements (the singular values of B), and Q and P are orthogonal matrices. The routine computes S, and optionally computes U * Q, P' * VT, or Q' * C, for given complex input matrices U, VT, and C. See "Computing Small Singular Values of Bidiagonal Matrices With Guaranteed High Rela...
On Entry A COMPLEX(LDA,P). A contains the matrix whose decomposition is to be computed. Only the upper half of A need be stored. The lower part of The array A is not referenced. LDA INTEGER. LDA is the leading dimension of the array A. P INTEGER. P is the order of the matrix. WORK COMPLEX. WORK is a work array. JPVT INTEGER(P). JPVT contains integers that control the selection of the pivot elements, if pivoting has been requested. Each diagonal element A(K,K) is placed in one of three classes ac...
On Entry R COMPLEX(LDR,P), where LDR .GE. P. R contains the upper triangular matrix that is to be downdated. The part of R below the diagonal is not referenced. LDR INTEGER. LDR is the leading dimension of the array R. p INTEGER. P is the order of the matrix R. X COMPLEX(P). X contains the row vector that is to Page 1 CCHDD(3F) CCHDD(3F) be removed from R. X is not altered by CCHDD. Z COMPLEX(LDZ,NZ), where LDZ .GE. P. Z is an array of NZ P-vectors which are to be downdated along with R. LDZ INT...
On Entry R COMPLEX(LDR,P), where LDR .GE. P. R contains the upper triangular factor that is to be updated. Elements of R below the diagonal are not referenced. LDR INTEGER. LDR is the leading dimension of the array R. P INTEGER. P is the order of the matrix R. K INTEGER. K is the first column to be permuted. L INTEGER. L is the last column to be permuted. L must be strictly greater than K. Z COMPLEX(LDZ,NZ), where LDZ .GE. P. Z is an array of NZ P-vectors into which the transformation U is multi...
On Entry R COMPLEX(LDR,P), where LDR .GE. P. R contains the upper triangular matrix that is to be updated. The part of R below the diagonal is not referenced. LDR INTEGER. LDR is the leading dimension of the array R. P INTEGER. P is the order of the matrix R. X COMPLEX(P). X contains the row to be added to R. X is not altered by CCHUD. Page 1 CCHUD(3F) CCHUD(3F) Z COMPLEX(LDZ,NZ), where LDZ .GE. P. Z is an array containing NZ P-vectors to be updated with R. LDZ INTEGER. LDZ is the leading dimens...
Change the current working directory to dirName, or to the home directory (as specified in the HOME environment variable) if dirName is not given. If dirName starts with a tilde, then tilde-expansion is done as described for Tcl_TildeSubst. Returns an empty string.
cdp A pointer to the target CDPARSER. type The type of callback being set. CDDATATYPES is an enumerated type defined in cdaudio.h containing the following values: cd_audio, cd_pnum, cd_index, cd_ptime, cd_atime, cd_catalog, cd_ident, cd_control. func A pointer to the function to be called. arg A user supplied argument that is passed to the callback function.
str A pointer to the ASCII string to be converted. m A pointer to the location to store the minutes value. s A pointer to the location to store the seconds value. f A pointer to the location to store the frame value.
tc A pointer to the struct cdtimecode in which to place the result. s A pointer to the ASCII string to be converted. The string pointed at by s must be at least 11 bytes long not counting the terminating null.
Upon successful completion, CDcreateparser(3dm) returns a pointer to a CDPARSER, an opaque type defined in cdaudio.h. Otherwise a value of null (0) is returned.
fr The frame number to be converted. m A pointer to the location to store the minutes value. s A pointer to the location to store the seconds value. f A pointer to the location to store the frame value.
cd A pointer to the CDPLAYER structure representing the target CDROM drive. track The number of the interesting track. info A pointer to the CDTRACKINFO structure to be filled in.
libcdaudio provides support for audio compact discs in the CD-ROM drive. The library has three sections: support for operating the CD-ROM drive as a player, support for locating and transferring digital audio data into computer memory, and support for parsing and understanding the content of that data. There is some overlap between the first two sections. libcdaudio controls the CD-ROM through the user level SCSI interface /dev/scsi using the facilities of dslib(3). Programs using libcdaudio mus...
dev The name of the devscsi file associated with the CD-ROM device. E.g. /dev/scsi/sc0d4l0. If dev is NULL, then CDopen(3dm) will consult the hardware inventory table to locate a CD-ROM drive. direction A pointer to one of "r", "w", or "rw" indicating the direction of the I/O desired.
cd A pointer to the CDPLAYER structure representing the target CDROM drive. start The number of the track at which to start playing the CD. play If 0, play indicates that the CD will be set to an initial paused state by this function. CDtogglepause(3dm) can then be used to commence play.
cd A pointer to the CDPLAYER structure representing the target CD-ROM drive. min,sec,frame The coordinates of the absolute time location at which to start playing the CD. play If 0, play indicates that the CD will be set to an initial paused state by this function. CDtogglepause(3dm) can then be used to commence play.
cd A pointer to the CDPLAYER structure representing the target CDROM drive. start The number of the track at which to start playing the CD. play If 0, play indicates that the CD will be set to an initial paused state by this function. CDtogglepause can then be used to commence play.
cd A pointer to the CDPLAYER structure representing the target CD-ROM drive. track The CD audio track to be played. min,sec,frame The coordinates of the absolute time location at which to start playing the CD. play If 0, play indicates that the CD will be set to an initial paused state by this function. CDtogglepause(3dm) can then be used to commence play.
cd A pointer to the CDPLAYER structure representing the target CD-ROM drive. buf A pointer to a buffer in which to put the data. numframe The number of frames of digital audio data to read.
cdp A pointer to the target CDPARSER. type The type of callback to remove. CDDATATYPES is an enumerated type defined in cdaudio.h containing the following values: cd_audio, cd_pnum, cd_index, cd_ptime, cd_atime, cd_catalog, cd_ident, cd_control.
s A pointer to a string to store the converted value. The string pointed at by s must be at least count bytes long not counting the terminating null. sb A pointer to an array of six-bit coded characters. count The number of six-bit characters in the sb array.
s A pointer to a string to store the converted value. The string pointed at by s must be at least 8 bytes long not counting the terminating null. tc A pointer to the struct cdtimecode to be converted.
cfftm1d and zfftm1d compute the complex Fourier transform of P complex sequences of N samples each. The k-th index F(k) of the Transform of an N sample sequence f(i) is equal to: F(k) = Sum ( W^(i*k) * f(i) ), for i =0, ..., (N-1) W = exp( (Sign*2*sqrt(-1)*PI) / N ) The Fourier transforms are computed in-place so the input sequence is overwritten by the Fourier transform output.
Initialize the coefficient array which is used in the Multiple 1D FFT modules. This array contains the different twiddle factors and the factorization of N into prime numbers. As the FFT modules cfftm1d or zfftm1d only read the coeff array, it may be reused as long as necessary once it has been initialized. In C, if ptr is NULL, cfftm1di or zfftm1di returns a pointer to an allocated buffer. CFFTM1DI should be used to initialize the coefficient array before any call to CFFTM1D ZFFTM1DI should be ...
On INPUT NM must be set to the row dimension of the two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix A=(AR,AI). AR and AI contain the real and imaginary parts, respectively, of the complex general matrix. MATZ is an integer variable set equal to zero if only eigenvalues are desired. Otherwise it is set to any non-zero integer for both eigenvalues and eigenvectors. On OUTPUT WR and WI contain the real and imaginary parts, respec...
CGBBRD reduces a complex general m-by-n band matrix A to real upper bidiagonal form B by a unitary transformation: Q' * A * P = B. The routine computes B, and optionally forms Q or P', or computes Q'*C for a given matrix C.
On Entry ABD COMPLEX(LDA, N) contains the matrix in band storage. The columns of the matrix are stored in the columns of ABD and the diagonals of the matrix are stored in rows ML+1 through 2*ML+MU+1 of ABD . See the comments below for details. LDA INTEGER the leading dimension of the array ABD . LDA must be .GE. 2*ML + MU + 1 . N INTEGER the order of the original matrix. ML INTEGER number of diagonals below the main diagonal. 0 .LE. ML .LT. N . MU INTEGER number of diagonals above the main diago...
CGBCON estimates the reciprocal of the condition number of a complex general band matrix A, in either the 1-norm or the infinity-norm, using the LU factorization computed by CGBTRF. An estimate is obtained for norm(inv(A)), and the reciprocal of the condition number is computed as RCOND = 1 / ( norm(A) * norm(inv(A)) ).
On Entry ABD COMPLEX(LDA, N) the output from CGBCo or CGBFA. LDA INTEGER the leading dimension of the array ABD . N INTEGER the order of the original matrix. ML INTEGER number of diagonals below the main diagonal. MU INTEGER number of diagonals above the main diagonal. IPVT INTEGER(N) the pivot vector from CGBCO or CGBFA. On Return DET COMPLEX(2) determinant of original matrix. Determinant = DET(1) * 10.0**DET(2) with 1.0 .LE. CABS1(DET(1)) .LT. 10.0 or DET(1) = 0.0 . LINPACK. This version dated...
CGBEQU computes row and column scalings intended to equilibrate an M-by-N band matrix A and reduce its condition number. R returns the row scale factors and C the column scale factors, chosen to try to make the largest element in each row and column of the matrix B with elements B(i,j)=R(i)*A(i,j)*C(j) have absolute value 1. R(i) and C(j) are restricted to be between SMLNUM = smallest safe number and BIGNUM = largest safe number. Use of these scaling factors is not guaranteed to reduce the condi...
On Entry ABD COMPLEX(LDA, N) contains the matrix in band storage. The columns of the matrix are stored in the columns of ABD and the diagonals of the matrix are stored in rows ML+1 through 2*ML+MU+1 of ABD . See the comments below for details. LDA INTEGER the leading dimension of the array ABD . LDA must be .GE. 2*ML + MU + 1 . N INTEGER the order of the original matrix. ML INTEGER number of diagonals below the main diagonal. 0 .LE. ML .LT. N . MU INTEGER number of diagonals above the main diago...
CGBRFS improves the computed solution to a system of linear equations when the coefficient matrix is banded, and provides error bounds and backward error estimates for the solution.
On Entry ABD COMPLEX(LDA, N) the output from CGBCo or CGBFA. LDA INTEGER the leading dimension of the array ABD . N INTEGER the order of the original matrix. ML INTEGER number of diagonals below the main diagonal. MU INTEGER number of diagonals above the main diagonal. IPVT INTEGER(N) the pivot vector from CGBCO or CGBFA. B COMPLEX(N) the right hand side vector. JOB INTEGER = 0 to solve A*X = B , = nonzero to solve CTRANS(A)*X = B , where CTRANS(A) is the conjugate transpose. On Return B the sol...
CGBSV computes the solution to a complex system of linear equations A * X = B, where A is a band matrix of order N with KL subdiagonals and KU superdiagonals, and X and B are N-by-NRHS matrices. The LU decomposition with partial pivoting and row interchanges is used to factor A as A = L * U, where L is a product of permutation and unit lower triangular matrices with KL subdiagonals, and U is upper triangular with KL+KU superdiagonals. The factored form of A is then used to solve the system of eq...
CGBSVX uses the LU factorization to compute the solution to a complex system of linear equations A * X = B, A**T * X = B, or A**H * X = B, where A is a band matrix of order N with KL subdiagonals and KU superdiagonals, and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
CGBTF2 computes an LU factorization of a complex m-by-n band matrix A using partial pivoting with row interchanges. This is the unblocked version of the algorithm, calling Level 2 BLAS.
CGBTRF computes an LU factorization of a complex m-by-n band matrix A using partial pivoting with row interchanges. This is the blocked version of the algorithm, calling Level 3 BLAS.
CGBTRS solves a system of linear equations A * X = B, A**T * X = B, or A**H * X = B with a general band matrix A using the LU factorization computed by CGBTRF.
CGEBAK forms the right or left eigenvectors of a complex general matrix by backward transformation on the computed eigenvectors of the balanced matrix output by CGEBAL.
CGEBAL balances a general complex matrix A. This involves, first, permuting A by a similarity transformation to isolate eigenvalues in the first 1 to ILO-1 and last IHI+1 to N elements on the diagonal; and second, applying a diagonal similarity transformation to rows and columns ILO to IHI to make the rows and columns as close in norm as possible. Both steps are optional. Balancing may reduce the 1-norm of the matrix, and improve the accuracy of the computed eigenvalues and/or eigenvectors....
CGEBD2 reduces a complex general m by n matrix A to upper or lower real bidiagonal form B by a unitary transformation: Q' * A * P = B. If m >= n, B is upper bidiagonal; if m < n, B is lower bidiagonal.
CGEBRD reduces a general complex M-by-N matrix A to upper or lower bidiagonal form B by a unitary transformation: Q**H * A * P = B. If m >= n, B is upper bidiagonal; if m < n, B is lower bidiagonal.
On Entry A COMPLEX(LDA, N) the matrix to be factored. LDA INTEGER the leading dimension of the array A . N INTEGER the order of the matrix A . On Return A an upper triangular matrix and the multipliers which were used to obtain it. The factorization can be written A = L*U where L is a product of permutation and unit lower triangular matrices and U is upper triangular. IPVT INTEGER(N) an integer vector of pivot indices. RCOND REAL an estimate of the reciprocal condition of A . For the system A*X ...
CGECON estimates the reciprocal of the condition number of a general complex matrix A, in either the 1-norm or the infinity-norm, using the LU factorization computed by CGETRF. An estimate is obtained for norm(inv(A)), and the reciprocal of the condition number is computed as RCOND = 1 / ( norm(A) * norm(inv(A)) ).
On Entry A COMPLEX(LDA, N) the output from CGECO or CGEFA. LDA INTEGER the leading dimension of the array A . N INTEGER the order of the matrix A . IPVT INTEGER(N) the pivot vector from CGECO or CGEFA. WORK COMPLEX(N) work vector. Contents destroyed. JOB INTEGER = 11 both determinant and inverse. = 01 inverse only. = 10 determinant only. On Return A inverse of original matrix if requested. Otherwise unchanged. DET COMPLEX(2) determinant of original matrix if requested. Otherwise not referenced. ...
CGEEQU computes row and column scalings intended to equilibrate an M-by-N matrix A and reduce its condition number. R returns the row scale factors and C the column scale factors, chosen to try to make the largest element in each row and column of the matrix B with elements B(i,j)=R(i)*A(i,j)*C(j) have absolute value 1. R(i) and C(j) are restricted to be between SMLNUM = smallest safe number and BIGNUM = largest safe number. Use of these scaling factors is not guaranteed to reduce the condition ...
CGEES computes for an N-by-N complex nonsymmetric matrix A, the eigenvalues, the Schur form T, and, optionally, the matrix of Schur vectors Z. This gives the Schur factorization A = Z*T*(Z**H). Optionally, it also orders the eigenvalues on the diagonal of the Schur form so that selected eigenvalues are at the top left. The leading columns of Z then form an orthonormal basis for the invariant subspace corresponding to the selected eigenvalues. A complex matrix is in Schur form if it is upper tria...
CGEESX computes for an N-by-N complex nonsymmetric matrix A, the eigenvalues, the Schur form T, and, optionally, the matrix of Schur vectors Z. This gives the Schur factorization A = Z*T*(Z**H). Optionally, it also orders the eigenvalues on the diagonal of the Schur form so that selected eigenvalues are at the top left; computes a reciprocal condition number for the average of the selected eigenvalues (RCONDE); and computes a reciprocal condition number for the right invariant subspace correspon...
CGEEV computes for an N-by-N complex nonsymmetric matrix A, the eigenvalues and, optionally, the left and/or right eigenvectors. The right eigenvector v(j) of A satisfies A * v(j) = lambda(j) * v(j) where lambda(j) is its eigenvalue. The left eigenvector u(j) of A satisfies u(j)**H * A = lambda(j) * u(j)**H where u(j)**H denotes the conjugate transpose of u(j). The computed eigenvectors are normalized to have Euclidean norm equal to 1 and largest component real....
CGEEVX computes for an N-by-N complex nonsymmetric matrix A, the eigenvalues and, optionally, the left and/or right eigenvectors. Optionally also, it computes a balancing transformation to improve the conditioning of the eigenvalues and eigenvectors (ILO, IHI, SCALE, and ABNRM), reciprocal condition numbers for the eigenvalues (RCONDE), and reciprocal condition numbers for the right eigenvectors (RCONDV). The right eigenvector v(j) of A satisfies A * v(j) = lambda(j) * v(j) where lambda(j) is it...
On Entry A COMPLEX(LDA, N) the matrix to be factored. LDA INTEGER the leading dimension of the array A . N INTEGER the order of the matrix A . On Return A an upper triangular matrix and the multipliers which were used to obtain it. The factorization can be written A = L*U where L is a product of permutation and unit lower triangular matrices and U is upper triangular. IPVT INTEGER(N) an integer vector of pivot indices. INFO INTEGER = 0 normal value. = K if U(K,K) .EQ. 0.0 . This is not an error ...
SGEGS computes for a pair of N-by-N complex nonsymmetric matrices A, B: the generalized eigenvalues (alpha, beta), the complex Schur form (A, B), and optionally left and/or right Schur vectors (VSL and VSR). (If only the generalized eigenvalues are needed, use the driver CGEGV instead.) A generalized eigenvalue for a pair of matrices (A,B) is, roughly speaking, a scalar w or a ratio alpha/beta = w, such that A - w*B is singular. It is usually represented as the pair (alpha,beta), as there is a r...
CGEGV computes for a pair of N-by-N complex nonsymmetric matrices A and B, the generalized eigenvalues (alpha, beta), and optionally, the left and/or right generalized eigenvectors (VL and VR). A generalized eigenvalue for a pair of matrices (A,B) is, roughly speaking, a scalar w or a ratio alpha/beta = w, such that A - w*B is singular. It is usually represented as the pair (alpha,beta), as there is a reasonable interpretation for beta=0, and even for both being zero. A good beginning reference ...
CGELS solves overdetermined or underdetermined complex linear systems involving an M-by-N matrix A, or its conjugate-transpose, using a QR or LQ factorization of A. It is assumed that A has full rank. The following options are provided: 1. If TRANS = 'N' and m >= n: find the least squares solution of an overdetermined system, i.e., solve the least squares problem minimize || B - A*X ||. 2. If TRANS = 'N' and m < n: find the minimum norm solution of an underdetermined system A * X = B. 3. If ...
CGELSS computes the minimum norm solution to a complex linear least squares problem: Minimize 2-norm(| b - A*x |). using the singular value decomposition (SVD) of A. A is an M-by-N matrix which may be rank-deficient. Several right hand side vectors b and solution vectors x can be handled in a single call; they are stored as the columns of the M-by-NRHS right hand side matrix B and the N-by-NRHS solution matrix X. The effective rank of A is determined by treating as zero those singular values whi...
CGELSX computes the minimum-norm solution to a complex linear least squares problem: minimize || A * X - B || using a complete orthogonal factorization of A. A is an M-by-N matrix which may be rank-deficient. Several right hand side vectors b and solution vectors x can be handled in a single call; they are stored as the columns of the M-by-NRHS right hand side matrix B and the N-by-NRHS solution matrix X. The routine first computes a QR factorization with column pivoting: A * P = Q * [ R11 R12 ]...
On Entry A COMPLEX(LDA, N) the output from CGECO or CGEFA. LDA INTEGER the leading dimension of the array A . N INTEGER the order of the matrix A . IPVT INTEGER(N) the pivot vector from CGECO or CGEFA. B COMPLEX(N) the right hand side vector. JOB INTEGER = 0 to solve A*X = B , = nonzero to solve CTRANS(A)*X = B where CTRANS(A) is the conjugate transpose. On Return B the solution vector X . Error Condition A division by zero will occur if the input factor contains a zero on the diagonal. Technica...
CGESV computes the solution to a complex system of linear equations A * X = B, where A is an N-by-N matrix and X and B are N-by-NRHS matrices. The LU decomposition with partial pivoting and row interchanges is used to factor A as A = P * L * U, where P is a permutation matrix, L is unit lower triangular, and U is upper triangular. The factored form of A is then used to solve the system of equations A * X = B....
CGESVD computes the singular value decomposition (SVD) of a complex Mby-N matrix A, optionally computing the left and/or right singular vectors. The SVD is written A = U * SIGMA * conjugate-transpose(V) where SIGMA is an M-by-N matrix which is zero except for its min(m,n) diagonal elements, U is an M-by-M unitary matrix, and V is an N-by-N unitary matrix. The diagonal elements of SIGMA are the singular values of A; they are real and non-negative, and are returned in descending order. The first m...
CGESVX uses the LU factorization to compute the solution to a complex system of linear equations A * X = B, where A is an N-by-N matrix and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
CGETF2 computes an LU factorization of a general m-by-n matrix A using partial pivoting with row interchanges. The factorization has the form A = P * L * U where P is a permutation matrix, L is lower triangular with unit diagonal elements (lower trapezoidal if m > n), and U is upper triangular (upper trapezoidal if m < n). This is the right-looking Level 2 BLAS version of the algorithm.
CGETRF computes an LU factorization of a general M-by-N matrix A using partial pivoting with row interchanges. The factorization has the form A = P * L * U where P is a permutation matrix, L is lower triangular with unit diagonal elements (lower trapezoidal if m > n), and U is upper triangular (upper trapezoidal if m < n). This is the right-looking Level 3 BLAS version of the algorithm.
CGETRI computes the inverse of a matrix using the LU factorization computed by CGETRF. This method inverts U and then computes inv(A) by solving the system inv(A)*L = inv(U) for inv(A).
CGETRS solves a system of linear equations A * X = B, A**T * X = B, or A**H * X = B with a general N-by-N matrix A using the LU factorization computed by CGETRF.
CGGBAK forms the right or left eigenvectors of a complex generalized eigenvalue problem A*x = lambda*B*x, by backward transformation on the computed eigenvectors of the balanced pair of matrices output by CGGBAL.
CGGBAL balances a pair of general complex matrices (A,B). This involves, first, permuting A and B by similarity transformations to isolate eigenvalues in the first 1 to ILO$-$1 and last IHI+1 to N elements on the diagonal; and second, applying a diagonal similarity transformation to rows and columns ILO to IHI to make the rows and columns as close in norm as possible. Both steps are optional. Balancing may reduce the 1-norm of the matrices, and improve the accuracy of the computed eigenvalues an...
CGGGLM solves a general Gauss-Markov linear model (GLM) problem: minimize || y ||_2 subject to d = A*x + B*y x where A is an N-by-M matrix, B is an N-by-P matrix, and d is a given Nvector. It is assumed that M <= N <= M+P, and rank(A) = M and rank( A B ) = N. Under these assumptions, the constrained equation is always consistent, and there is a unique solution x and a minimal 2-norm solution y, which is obtained using a generalized QR factorization of A and B. In particular, if matrix B is squar...
CGGHRD reduces a pair of complex matrices (A,B) to generalized upper Hessenberg form using unitary transformations, where A is a general matrix and B is upper triangular: Q' * A * Z = H and Q' * B * Z = T, where H is upper Hessenberg, T is upper triangular, and Q and Z are unitary, and ' means conjugate transpose. The unitary matrices Q and Z are determined as products of Givens rotations. They may either be formed explicitly, or they may be postmultiplied into input matrices Q1 and Z1, so th...
CGGLSE solves the linear equality-constrained least squares (LSE) problem: minimize || c - A*x ||_2 subject to B*x = d where A is an M-by-N matrix, B is a P-by-N matrix, c is a given M-vector, and d is a given P-vector. It is assumed that P <= N <= M+P, and rank(B) = P and rank( ( A ) ) = N. ( ( B ) ) These conditions ensure that the LSE problem has a unique solution, which is obtained using a GRQ factorization of the matrices B and A....
CGGQRF computes a generalized QR factorization of an N-by-M matrix A and an N-by-P matrix B: A = Q*R, B = Q*T*Z, where Q is an N-by-N unitary matrix, Z is a P-by-P unitary matrix, and R and T assume one of the forms: if N >= M, R = ( R11 ) M , or if N < M, R = ( R11 R12 ) N, ( 0 ) N-M N M-N M where R11 is upper triangular, and if N <= P, T = ( 0 T12 ) N, or if N > P, T = ( T11 ) N-P, P-N N ( T21 ) P P where T12 or T21 is upper triangular. In particular, if B is square and nonsingular, the GQR fa...
CGGRQF computes a generalized RQ factorization of an M-by-N matrix A and a P-by-N matrix B: A = R*Q, B = Z*T*Q, where Q is an N-by-N unitary matrix, Z is a P-by-P unitary matrix, and R and T assume one of the forms: if M <= N, R = ( 0 R12 ) M, or if M > N, R = ( R11 ) M-N, N-M M ( R21 ) N N where R12 or R21 is upper triangular, and if P >= N, T = ( T11 ) N , or if P < N, T = ( T11 T12 ) P, ( 0 ) P-N P N-P N where T11 is upper triangular. In particular, if B is square and nonsingular, the GRQ fac...
CGGSVD computes the generalized singular value decomposition (GSVD) of an M-by-N complex matrix A and P-by-N complex matrix B: U'*A*Q = D1*( 0 R ), V'*B*Q = D2*( 0 R ) where U, V and Q are unitary matrices, and Z' means the conjugate transpose of Z. Let K+L = the effective numerical rank of the matrix (A',B')', then R is a (K+L)-by-(K+L) nonsingular upper triangular matrix, D1 and D2 are M-by-(K+L) and P-by-(K+L) "diagonal" matrices and of the following structures, respectively: If M-K-L...
CGGSVP computes unitary matrices U, V and Q such that L ( 0 0 A23 ) M-K-L ( 0 0 0 ) N-K-L K L = K ( 0 A12 A13 ) if M-K-L < 0; M-K ( 0 0 A23 ) N-K-L K L V'*B*Q = L ( 0 0 B13 ) P-L ( 0 0 0 ) where the K-by-K matrix A12 and L-by-L matrix B13 are nonsingular upper triangular; A23 is L-by-L upper triangular if M-K-L >= 0, otherwise A23 is (M-K)-by-L upper trapezoidal. K+L = the effective numerical rank of the (M+P)-by-N matrix (A',B')'. Z' denotes the conjugate transpose of Z. This decomposition...
This perl library uses perl5 objects to make it easy to create Web fillout forms and parse their contents. This package defines CGI objects, entities that contain the values of the current query string and other state variables. Using a CGI object's methods, you can examine keywords and parameters passed to your script, and create forms whose initial values are taken from the current query (thereby preserving state information). The current version of CGI.pm is available at http://www.genome.wi...
When using the Perl-Apache API, your applications are faster, but the enviroment is different than CGI. This module attempts to set-up that environment as best it can.
CGI scripts have a nasty habit of leaving warning messages in the error logs that are neither time stamped nor fully identified. Tracking down the script that caused the error is a pain. This fixes that. Replace the usual use Carp; with use CGI::Carp And the standard warn(), die (), croak(), confess() and carp() calls will automagically be replaced with functions that write out nicely timestamped messages to the HTTP server error log. For example: [Fri Nov 17 21:40:43 1995] test.pl: I'm confuse...
CGI::Fast is a subclass of the CGI object created by CGI.pm. It is specialized to work well with the Open Market FastCGI standard, which greatly speeds up CGI scripts by turning them into persistently running server processes. Scripts that perform time-consuming initialization processes, such as loading large modules or opening persistent database connections, will see large performance improvements. OTHER PIECES OF THE PUZZLE In order to use CGI::Fast you'll need a FastCGI-enabled Web server. ...
CGI::Push is a subclass of the CGI object created by CGI.pm. It is specialized for server push operations, which allow you to create animated pages whose content changes at regular intervals. You provide CGI::Push with a pointer to a subroutine that will draw one page. Every time your subroutine is called, it generates a new page. The contents of the page will be transmitted to the browser in such a way that it will replace what was there beforehand. The technique will work with HTML pages as we...
Per default the new() method tries to call new() in the three packages Apache::CGI, CGI::XA, and CGI. It returns the first CGI object it succeeds with. The import method allows you to set up the default order of the modules to be tested.
CGTCON estimates the reciprocal of the condition number of a complex tridiagonal matrix A using the LU factorization as computed by CGTTRF. An estimate is obtained for norm(inv(A)), and the reciprocal of the condition number is computed as RCOND = 1 / (ANORM * norm(inv(A))).
CGTRFS improves the computed solution to a system of linear equations when the coefficient matrix is tridiagonal, and provides error bounds and backward error estimates for the solution.
On Entry N INTEGER is the order of the tridiagonal matrix. C COMPLEX(N) is the subdiagonal of the tridiagonal matrix. C(2) through C(N) should contain the subdiagonal. On output C is destroyed. D COMPLEX(N) is the diagonal of the tridiagonal matrix. On output D is destroyed. E COMPLEX(N) is the superdiagonal of the tridiagonal matrix. E(1) through E(N-1) should contain the superdiagonal. On output E is destroyed. B COMPLEX(N) is the right hand side vector. On Return B is the solution vector. INF...
CGTSV solves the equation where A is an N-by-N tridiagonal matrix, by Gaussian elimination with partial pivoting. Note that the equation A'*X = B may be solved by interchanging the order of the arguments DU and DL.
CGTSVX uses the LU factorization to compute the solution to a complex system of linear equations A * X = B, A**T * X = B, or A**H * X = B, where A is a tridiagonal matrix of order N and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
CGTTRF computes an LU factorization of a complex tridiagonal matrix A using elimination with partial pivoting and row interchanges. The factorization has the form A = L * U where L is a product of permutation and unit lower bidiagonal matrices and U is upper triangular with nonzeros in only the main diagonal and first two superdiagonals.
CGTTRS solves one of the systems of equations A * X = B, A**T * X = B, or A**H * X = B, with a tridiagonal matrix A using the LU factorization computed by CGTTRF.
On INPUT NM must be set to the row dimension of the two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix A=(AR,AI). AR and AI contain the real and imaginary parts, respectively, of the complex hermitian matrix. MATZ is an integer variable set equal to zero if only eigenvalues are desired. Otherwise it is set to any non-zero integer for both eigenvalues and eigenvectors. On OUTPUT W contains the eigenvalues in ascending order. ZR an...
chantab describes the monitor type that is connected to a server's video channel. The server uses this information with a description of the monitor in the moninfo database to determine whether the connected monitor has the capability to run given video formats. The format of each entry in the chantab file consists of the channel number and monitor type name separated by a space. Channel Designator The channel designator must be the first item on a line and is composed of three pieces: server.s...
These functions perform conversion from one data type to another. The function int converts to integer from its integer, real*4, double precision, real*16, complex, double complex, or complex*32 argument. If the argument is real, integer, real*4, double precision, or real*16 int returns the integer whose magnitude is the largest integer that does not exceed the magnitude of the argument and whose sign is the same as the sign of the argument (i.e. truncation). For complex the above rule is applie...
str expects a pointer to the memory containing a sequence of character id's. type expects one of the following symbolic constants defined in : STR_B Each character id is represented by a single unsigned byte. STR_2B Each character id is represented by two, consecutive unsigned bytes. STR_3B Each character id is represented by three, consecutive unsigned bytes. STR_4B Each character id is represented by four, consecutive unsigned bytes. STR_16 Each character id is represented by a 16-bi...
CHBEVD computes all the eigenvalues and, optionally, eigenvectors of a complex Hermitian band matrix A. If eigenvectors are desired, it uses a divide and conquer algorithm. The divide and conquer algorithm makes very mild assumptions about floating point arithmetic. It will work on machines with a guard digit in add/subtract, or on those binary machines without guard digits which subtract like the Cray X-MP, Cray Y-MP, Cray C-90, or Cray-2. It could conceivably fail on hexadecimal or decimal mac...
CHBEVX computes selected eigenvalues and, optionally, eigenvectors of a complex Hermitian band matrix A. Eigenvalues and eigenvectors can be selected by specifying either a range of values or a range of indices for the desired eigenvalues.
CHBGST reduces a complex Hermitian-definite banded generalized eigenproblem A*x = lambda*B*x to standard form C*y = lambda*y, such that C has the same bandwidth as A. B must have been previously factorized as S**H*S by CPBSTF, using a split Cholesky factorization. A is overwritten by C = X**H*A*X, where X = S**(-1)*Q and Q is a unitary matrix chosen to preserve the bandwidth of A.
CHBGV computes all the eigenvalues, and optionally, the eigenvectors of a complex generalized Hermitian-definite banded eigenproblem, of the form A*x=(lambda)*B*x. Here A and B are assumed to be Hermitian and banded, and B is also positive definite.
activeBackground cursor highlightThickness takeFocus | activeForeground disabledForeground image text | anchor font justify textVariable | background foreground padX underline | bitmap highlightBackground padY wrapLength | borderWidth highlightColor relief See the ``options'' manual entry for details on the standard options. WIDGET-SPECIFIC OPTIONS Name: command Class: Command Command-Line Switch:-command Specifies a Tcl command to associate with the button. This command is typically invoked w...
CHECON estimates the reciprocal of the condition number of a complex Hermitian matrix A using the factorization A = U*D*U**H or A = L*D*L**H computed by CHETRF. An estimate is obtained for norm(inv(A)), and the reciprocal of the condition number is computed as RCOND = 1 / (ANORM * norm(inv(A))).
CHEEVD computes all eigenvalues and, optionally, eigenvectors of a complex Hermitian matrix A. If eigenvectors are desired, it uses a divide and conquer algorithm. The divide and conquer algorithm makes very mild assumptions about floating point arithmetic. It will work on machines with a guard digit in add/subtract, or on those binary machines without guard digits which subtract like the Cray X-MP, Cray Y-MP, Cray C-90, or Cray-2. It could conceivably fail on hexadecimal or decimal machines wit...
CHEEVX computes selected eigenvalues and, optionally, eigenvectors of a complex Hermitian matrix A. Eigenvalues and eigenvectors can be selected by specifying either a range of values or a range of indices for the desired eigenvalues.
CHEGS2 reduces a complex Hermitian-definite generalized eigenproblem to standard form. If ITYPE = 1, the problem is A*x = lambda*B*x, and A is overwritten by inv(U')*A*inv(U) or inv(L)*A*inv(L') If ITYPE = 2 or 3, the problem is A*B*x = lambda*x or B*A*x = lambda*x, and A is overwritten by U*A*U` or L'*A*L. B must have been previously factorized as U'*U or L*L' by CPOTRF.
CHEGST reduces a complex Hermitian-definite generalized eigenproblem to standard form. If ITYPE = 1, the problem is A*x = lambda*B*x, and A is overwritten by inv(U**H)*A*inv(U) or inv(L)*A*inv(L**H) If ITYPE = 2 or 3, the problem is A*B*x = lambda*x or B*A*x = lambda*x, and A is overwritten by U*A*U**H or L**H*A*L. B must have been previously factorized as U**H*U or L*L**H by CPOTRF.
CHEGV computes all the eigenvalues, and optionally, the eigenvectors of a complex generalized Hermitian-definite eigenproblem, of the form A*x=(lambda)*B*x, A*Bx=(lambda)*x, or B*A*x=(lambda)*x. Here A and B are assumed to be Hermitian and B is also positive definite.
CHERFS improves the computed solution to a system of linear equations when the coefficient matrix is Hermitian indefinite, and provides error bounds and backward error estimates for the solution.
CHESV computes the solution to a complex system of linear equations A * X = B, where A is an N-by-N Hermitian matrix and X and B are Nby-NRHS matrices. The diagonal pivoting method is used to factor A as A = U * D * U**H, if UPLO = 'U', or A = L * D * L**H, if UPLO = 'L', where U (or L) is a product of permutation and unit upper (lower) triangular matrices, and D is Hermitian and block diagonal with 1-by-1 and 2-by-2 diagonal blocks. The factored form of A is then used to solve the system of...
CHESVX uses the diagonal pivoting factorization to compute the solution to a complex system of linear equations A * X = B, where A is an N-by-N Hermitian matrix and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
CHETF2 computes the factorization of a complex Hermitian matrix A using the Bunch-Kaufman diagonal pivoting method: A = U*D*U' or A = L*D*L' where U (or L) is a product of permutation and unit upper (lower) triangular matrices, U' is the conjugate transpose of U, and D is Hermitian and block diagonal with 1-by-1 and 2-by-2 diagonal blocks. This is the unblocked version of the algorithm, calling Level 2 BLAS....
CHETRF computes the factorization of a complex Hermitian matrix A using the Bunch-Kaufman diagonal pivoting method. The form of the factorization is A = U*D*U**H or A = L*D*L**H where U (or L) is a product of permutation and unit upper (lower) triangular matrices, and D is Hermitian and block diagonal with 1-by-1 and 2-by-2 diagonal blocks. This is the blocked version of the algorithm, calling Level 3 BLAS....
CHETRS solves a system of linear equations A*X = B with a complex Hermitian matrix A using the factorization A = U*D*U**H or A = L*D*L**H computed by CHETRF.
CHGEQZ implements a single-shift version of the QZ method for finding the generalized eigenvalues w(i)=ALPHA(i)/BETA(i) of the equation A are then ALPHA(1),...,ALPHA(N), and of B are BETA(1),...,BETA(N). If JOB='S' and COMPQ and COMPZ are 'V' or 'I', then the unitary transformations used to reduce (A,B) are accumulated into the arrays Q and Z s.t.: Q(in) A(in) Z(in)* = Q(out) A(out) Z(out)* Q(in) B(in) Z(in)* = Q(out) B(out) Z(out)* Ref: C.B. Moler & G.W. Stewart, "An Algorithm for Genera...
On Entry A COMPLEX(LDA, N) the Hermitian matrix to be factored. Only the diagonal and upper triangle are used. LDA INTEGER the leading dimension of the array A . N INTEGER the order of the matrix A . Output A a block diagonal matrix and the multipliers which were used to obtain it. The factorization can be written A = U*D*CTRANS(U) where U is a product of permutation and unit upper triangular matrices , CTRANS(U) is the conjugate transpose of U , and D is block diagonal with 1 by 1 and 2 by 2 bl...
On Entry A COMPLEX(LDA,N) the output from CHIFA. LDA INTEGER the leading dimension of the array A. N INTEGER the order of the matrix A. KVPT INTEGER(N) the pivot vector from CHIFA. WORK COMPLEX(N) work vector. Contents destroyed. JOB INTEGER JOB has the decimal expansion ABC where if C .NE. 0, the inverse is computed, if B .NE. 0, the determinant is computed, if A .NE. 0, the inertia is computed. For example, JOB = 111 gives all three. On Return Variables not requested by JOB are not used. A con...
On Entry A COMPLEX(LDA,N) the Hermitian matrix to be factored. Only the diagonal and upper triangle are used. LDA INTEGER the leading dimension of the array A . N INTEGER the order of the matrix A . On Return A a block diagonal matrix and the multipliers which were used to obtain it. The factorization can be written A = U*D*CTRANS(U) where U is a product of permutation and unit upper triangular matrices , CTRANS(U) is the conjugate transpose of U , and D is block diagonal with 1 by 1 and 2 by 2 ...
On Entry A COMPLEX(LDA,N) the output from CHIFA. LDA INTEGER the leading dimension of the array A . N INTEGER the order of the matrix A . KVPT INTEGER(N) the pivot vector from CHIFA. B COMPLEX(N) the right hand side vector. On Return B the solution vector X . Error Condition A division by zero may occur if CHICO has set RCOND .EQ. 0.0 or CHIFA has set INFO .NE. 0 . To compute INVERSE(A) * C where C is a matrix with P columns CALL CHIFA(A,LDA,N,KVPT,INFO) IF (INFO .NE. 0) GO TO ... DO 10 J = 1, p...
This function changes the filesystem mode of file name. Mode can be any specification recognized by chmod(1). Name must be a single pathname. The normal returned value is 0. Any other value will be a system error number.
On Entry AP COMPLEX (N*(N+1)/2) the packed form of a Hermitian matrix A . The columns of the upper triangle are stored sequentially in a one-dimensional array of length N*(N+1)/2 . See comments below for details. N INTEGER the order of the matrix A . Output AP a block diagonal matrix and the multipliers which were used to obtain it stored in packed form. The factorization can be written A = U*D*CTRANS(U) where U is a product of permutation and unit upper triangular matrices , CTRANS(U) is the co...
CHPCON estimates the reciprocal of the condition number of a complex Hermitian packed matrix A using the factorization A = U*D*U**H or A = L*D*L**H computed by CHPTRF. An estimate is obtained for norm(inv(A)), and the reciprocal of the condition number is computed as RCOND = 1 / (ANORM * norm(inv(A))).
On Entry AP COMPLEX (N*(N+1)/2) the output from CHPFA. N INTEGER the order of the matrix A. KVPT INTEGER(N) the pivot vector from CHPFA. WORK COMPLEX(N) work vector. Contents ignored. JOB INTEGER JOB has the decimal expansion ABC where if C .NE. 0, the inverse is computed, if B .NE. 0, the determinant is computed, if A .NE. 0, the inertia is computed. For example, JOB = 111 gives all three. On Return Variables not requested by JOB are not used. AP contains the upper triangle of the inverse of th...
CHPEVD computes all the eigenvalues and, optionally, eigenvectors of a complex Hermitian matrix A in packed storage. If eigenvectors are desired, it uses a divide and conquer algorithm. The divide and conquer algorithm makes very mild assumptions about floating point arithmetic. It will work on machines with a guard digit in add/subtract, or on those binary machines without guard digits which subtract like the Cray X-MP, Cray Y-MP, Cray C-90, or Cray-2. It could conceivably fail on hexadecimal o...
CHPEVX computes selected eigenvalues and, optionally, eigenvectors of a complex Hermitian matrix A in packed storage. Eigenvalues/vectors can be selected by specifying either a range of values or a range of indices for the desired eigenvalues.
On Entry AP COMPLEX (N*(N+1)/2) the packed form of a Hermitian matrix A . The columns of the upper triangle are stored sequentially in a one-dimensional array of length N*(N+1)/2 . See comments below for details. N INTEGER the order of the matrix A . Output AP A block diagonal matrix and the multipliers which were used to obtain it stored in packed form. The factorization can be written A = U*D*CTRANS(U) where U is a product of permutation and unit upper triangular matrices , CTRANS(U) is the co...
CHPGST reduces a complex Hermitian-definite generalized eigenproblem to standard form, using packed storage. If ITYPE = 1, the problem is A*x = lambda*B*x, and A is overwritten by inv(U**H)*A*inv(U) or inv(L)*A*inv(L**H) If ITYPE = 2 or 3, the problem is A*B*x = lambda*x or B*A*x = lambda*x, and A is overwritten by U*A*U**H or L**H*A*L. B must have been previously factorized as U**H*U or L*L**H by CPPTRF....
CHPGV computes all the eigenvalues and, optionally, the eigenvectors of a complex generalized Hermitian-definite eigenproblem, of the form A*x=(lambda)*B*x, A*Bx=(lambda)*x, or B*A*x=(lambda)*x. Here A and B are assumed to be Hermitian, stored in packed format, and B is also positive definite.
CHPRFS improves the computed solution to a system of linear equations when the coefficient matrix is Hermitian indefinite and packed, and provides error bounds and backward error estimates for the solution.
On Entry AP COMPLEX(N*(N+1)/2) the output from CHPFA. N INTEGER the order of the matrix A . KVPT INTEGER(N) the pivot vector from CHPFA. B COMPLEX(N) the right hand side vector. On Return B the solution vector X . Error Condition A division by zero may occur if CHPCO has set RCOND .EQ. 0.0 or CHPFA has set INFO .NE. 0 . To compute INVERSE(A) * C where C is a matrix with P columns CALL CHPFA(AP,N,KVPT,INFO) IF (INFO .NE. 0) GO TO ... DO 10 J = 1, P CALL CHPSL(AP,N,KVPT,C(1,J)) 10 CONTINUE LINPACK...
CHPSV computes the solution to a complex system of linear equations A * X = B, where A is an N-by-N Hermitian matrix stored in packed format and X and B are N-by-NRHS matrices. The diagonal pivoting method is used to factor A as A = U * D * U**H, if UPLO = 'U', or A = L * D * L**H, if UPLO = 'L', where U (or L) is a product of permutation and unit upper (lower) triangular matrices, D is Hermitian and block diagonal with 1-by-1 and 2-by-2 diagonal blocks. The factored form of A is then used t...
CHPSVX uses the diagonal pivoting factorization A = U*D*U**H or A = L*D*L**H to compute the solution to a complex system of linear equations A * X = B, where A is an N-by-N Hermitian matrix stored in packed format and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
CHPTRD reduces a complex Hermitian matrix A stored in packed form to real symmetric tridiagonal form T by a unitary similarity transformation: Q**H * A * Q = T.
CHPTRF computes the factorization of a complex Hermitian packed matrix A using the Bunch-Kaufman diagonal pivoting method: A = U*D*U**H or A = L*D*L**H where U (or L) is a product of permutation and unit upper (lower) triangular matrices, and D is Hermitian and block diagonal with 1-by-1 and 2-by-2 diagonal blocks.
CHPTRI computes the inverse of a complex Hermitian indefinite matrix A in packed storage using the factorization A = U*D*U**H or A = L*D*L**H computed by CHPTRF.
CHPTRS solves a system of linear equations A*X = B with a complex Hermitian matrix A stored in packed format using the factorization A = U*D*U**H or A = L*D*L**H computed by CHPTRF.
CHSEIN uses inverse iteration to find specified right and/or left eigenvectors of a complex upper Hessenberg matrix H. The right eigenvector x and the left eigenvector y of the matrix H corresponding to an eigenvalue w are defined by: H * x = w * x, y**h * H = w * y**h where y**h denotes the conjugate transpose of the vector y.
CHSEQR computes the eigenvalues of a complex upper Hessenberg matrix H, and, optionally, the matrices T and Z from the Schur decomposition H = Z T Z**H, where T is an upper triangular matrix (the Schur form), and Z is the unitary matrix of Schur vectors. Optionally Z may be postmultiplied into an input unitary matrix Q, so that this routine can give the Schur factorization of a matrix A which has been reduced to the Hessenberg form H by the unitary matrix Q: A = Q*H*Q**H = (QZ)*T*(QZ)**H....
chunk Expects the minimum memory size to allocate for an object. As you add objects to a display list, chunk is the unit size (in bytes) by which the memory allocated to the display list grows.
On INPUT NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix. AR and AI contain the real and imaginary parts, respectively, of the Hessenberg matrix. WR and WI contain the real and imaginary parts, respectively, of the eigenvalues of the matrix. The eigenvalues must be stored in a manner identical to that of subroutine COMLR, which recognizes possible splitting of the matrix. SELECT specifies...
x expects the x coordinate of the center of the circle specified in world coordinates. y expects the y coordinate of the center of the circle specified in world coordinates. radius expects the length of the radius of the circle.
x expects the x coordinate of the center of the filled circle specified in world coordinates. y expects the y coordinate of the center of the filled circle specified in world coordinates. radius expects the length of the radius of the filled circle.
The functions provided here are used to issue checkpoint and restart (CPR) requests to a process or group of processes. The ckpt_setup, ckpt_create, ckpt_restart, and ckpt_remove routines are implemented according to the IEEE standard POSIX 1003.1m Draft 1, with minor modifications (described below). The ckpt_stat function is an IRIX extension. Silicon Graphics intends to follow the future development of POSIX 1003.1m draft standards and endeavor to be compliant. ckpt_setup This routine currentl...
CLABRD reduces the first NB rows and columns of a complex general m by n matrix A to upper or lower real bidiagonal form by a unitary transformation Q' * A * P, and returns the matrices X and Y which are needed to apply the transformation to the unreduced part of A. If m >= n, A is reduced to upper bidiagonal form; if m < n, to lower bidiagonal form. This is an auxiliary routine called by CGEBRD
name A pointer to a string that contains the name of the algorithm. algType The type of the algorithm (CL_ALG_VIDEO or CL_ALG_AUDIO). maxHeaderSize The maximum size of the stream header for the specified algorithm. openCompressor A pointer to the function that opens a compressor for the new algorithm. The function must have the same arguments as clOpenCompressor. compress A pointer to the function that compresses for the new algorithm. The function must have the same arguments as clCompress. clo...
scheme The compression scheme that gets the added parameter. name A pointer to a string that contains the name of the parameter. paramType The type of the parameter (CL_ENUM_VALUE, CL_RANGE_VALUE, CL_FLOATING_ENUM_VALUE, or CL_FLOATING_RANGE_VALUE). min The minimum value the parameter can have. max The maximum value the parameter can have. initial The default value of the parameter. paramIDPtr A pointer to an int value that is to receive the new parameter identifier. paramID The parameter identi...
Using the divide and conquer method, CLAED0 computes all eigenvalues of a symmetric tridiagonal matrix which is one diagonal block of those from reducing a dense or band Hermitian matrix and corresponding eigenvectors of the dense or band matrix.
CLAED7 computes the updated eigensystem of a diagonal matrix after modification by a rank-one symmetric matrix. This routine is used only for the eigenproblem which requires all eigenvalues and optionally eigenvectors of a dense or banded Hermitian matrix that has been reduced to tridiagonal form. T = Q(in) ( D(in) + RHO * Z*Z' ) Q'(in) = Q(out) * D(out) * Q'(out) where Z = Q'u, u is a vector of length N with ones in the CUTPNT and CUTPNT + 1 th elements and zeros elsewhere. The eigenvectors...
CLAED8 merges the two sets of eigenvalues together into a single sorted set. Then it tries to deflate the size of the problem. There are two ways in which deflation can occur: when two or more eigenvalues are close together or if there is a tiny element in the Z vector. For each such occurrence the order of the related secular equation problem is reduced by one.
CLAESY computes the eigendecomposition of a 2-by-2 symmetric matrix ( ( A, B );( B, C ) ) provided the norm of the matrix of eigenvectors is larger than some threshold value. RT1 is the eigenvalue of larger absolute value, and RT2 of smaller absolute value. If the eigenvectors are computed, then on return ( CS1, SN1 ) is the unit eigenvector for RT1, hence [ CS1 SN1 ] . [ A B ] . [ CS1 -SN1 ] = [ RT1 0 ] [ -SN1 CS1 ] [ B C ] [ SN1 CS1 ] [ 0 RT2 ]...
CLAEV2 computes the eigendecomposition of a 2-by-2 Hermitian matrix [ A B ] [ CONJG(B) C ]. On return, RT1 is the eigenvalue of larger absolute value, RT2 is the eigenvalue of smaller absolute value, and (CS1,SN1) is the unit right eigenvector for RT1, giving the decomposition [ CS1 CONJG(SN1) ] [ A B ] [ CS1 -CONJG(SN1) ] = [ RT1 0 ] [- SN1 CS1 ] [ CONJG(B) C ] [ SN1 CS1 ] [ 0 RT2 ].
CLAGS2 computes 2-by-2 unitary matrices U, V and Q, such that if ( UPPER ) then ( -CONJG(SNU) CSU ) ( -CONJG(SNV) CSV ) Q = ( CSQ SNQ ) ( -CONJG(SNQ) CSQ ) Z' denotes the conjugate transpose of Z. The rows of the transformed A and B are parallel. Moreover, if the input 2-by-2 matrix A is not zero, then the transformed (1,1) entry of A is not zero. If the input matrices A and B are both not zero, then the transformed (2,2) element of B is not zero, except when the first rows of input A and B are...
CLAHEF computes a partial factorization of a complex Hermitian matrix A using the Bunch-Kaufman diagonal pivoting method. The partial factorization has the form: A = ( I U12 ) ( A11 0 ) ( I 0 ) if UPLO = 'U', or: ( 0 U22 ) ( 0 D ) ( U12' U22' ) A = ( L11 0 ) ( D 0 ) ( L11' L21' ) if UPLO = 'L' ( L21 I ) ( 0 A22 ) ( 0 I ) where the order of D is at most NB. The actual order is returned in the argument KB, and is either NB or NB-1, or N if N <= NB. Note that U' denotes the conjugate trans...
CLAHQR is an auxiliary routine called by CHSEQR to update the eigenvalues and Schur decomposition already computed by CHSEQR, by dealing with the Hessenberg submatrix in rows and columns ILO to IHI.
CLAHRD reduces the first NB columns of a complex general n-by-(n-k+1) matrix A so that elements below the k-th subdiagonal are zero. The reduction is performed by a unitary similarity transformation Q' * A * Q. The routine returns the matrices V and T which determine Q as a block reflector I - V*T*V', and also the matrix Y = A * V * T. This is an auxiliary routine called by CGEHRD.
CLAIC1 applies one step of incremental condition estimation in its simplest version: Let x, twonorm(x) = 1, be an approximate singular vector of an j-by-j lower triangular matrix L, such that twonorm(L*x) = sest Then CLAIC1 computes sestpr, s, c such that the vector [ s*x ] xhat = [ c ] is an approximate singular vector of [ L 0 ] Lhat = [ w' gamma ] in the sense that twonorm(Lhat*xhat) = sestpr. Depending on JOB, an estimate for the largest or smallest singular value is computed. Note that [s ...
CLANGB returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of an n by n band matrix A, with kl sub-diagonals and ku super-diagonals.
CLANGT returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of a complex tridiagonal matrix A.
CLANHB returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of an n by n hermitian band matrix A, with k super-diagonals.
CLANHE returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of a complex hermitian matrix A.
CLANHP returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of a complex hermitian matrix A, supplied in packed form.
CLANHS returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of a Hessenberg matrix A.
CLANHT returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of a complex Hermitian tridiagonal matrix A.
CLANSB returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of an n by n symmetric band matrix A, with k super-diagonals.
CLANSP returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of a complex symmetric matrix A, supplied in packed form.
CLANSY returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of a complex symmetric matrix A.
CLANTB returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of an n by n triangular band matrix A, with ( k + 1 ) diagonals.
CLANTP returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of a triangular matrix A, supplied in packed form.
CLANTR returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of a trapezoidal or triangular matrix A.
Given two column vectors X and Y, let The subroutine first computes the QR factorization of A = Q*R, and then computes the SVD of the 2-by-2 upper triangular matrix R. The smaller singular value of R is returned in SSMIN, which is used as the measurement of the linear dependency of the vectors X and Y.
CLAPMT rearranges the columns of the M by N matrix X as specified by the permutation K(1),K(2),...,K(N) of the integers 1,...,N. If FORWRD = .TRUE., forward permutation: X(*,K(J)) is moved X(*,J) for J = 1,2,...,N. If FORWRD = .FALSE., backward permutation: X(*,J) is moved to X(*,K(J)) for J = 1,2,...,N.
CLAQGB equilibrates a general M by N band matrix A with KL subdiagonals and KU superdiagonals using the row and scaling factors in the vectors R and C.
CLAR2V applies a vector of complex plane rotations with real cosines from both sides to a sequence of 2-by-2 complex Hermitian matrices, defined by the elements of the vectors x, y and z. For i = 1,2,...,n ( x(i) z(i) ) := ( conjg(z(i)) y(i) ) ( c(i) conjg(s(i)) ) ( x(i) z(i) ) ( c(i) -conjg(s(i)) ) ( -s(i) c(i) ) ( conjg(z(i)) y(i) ) ( s(i) c(i) )
CLARF applies a complex elementary reflector H to a complex M-by-N matrix C, from either the left or the right. H is represented in the form H = I - tau * v * v' where tau is a complex scalar and v is a complex vector. If tau = 0, then H is taken to be the unit matrix. To apply H' (the conjugate transpose of H), supply conjg(tau) instead tau.
CLARFG generates a complex elementary reflector H of order n, such that ( x ) ( 0 ) where alpha and beta are scalars, with beta real, and x is an (n-1)- element complex vector. H is represented in the form H = I - tau * ( 1 ) * ( 1 v' ) , ( v ) where tau is a complex scalar and v is a complex (n-1)-element vector. Note that H is not hermitian. If the elements of x are all zero and alpha is real, then tau = 0 and H is taken to be the unit matrix. Otherwise 1 <= real(tau) <= 2 and abs(tau-1) <= 1...
CLARFT forms the triangular factor T of a complex block reflector H of order n, which is defined as a product of k elementary reflectors. If DIRECT = 'F', H = H(1) H(2) . . . H(k) and T is upper triangular; If DIRECT = 'B', H = H(k) . . . H(2) H(1) and T is lower triangular. If STOREV = 'C', the vector which defines the elementary reflector H(i) is stored in the i-th column of the array V, and H = I - V * T * V' If STOREV = 'R', the vector which defines the elementary reflector H(i) is ...
CLARFX applies a complex elementary reflector H to a complex m by n matrix C, from either the left or the right. H is represented in the form H = I - tau * v * v' where tau is a complex scalar and v is a complex vector. If tau = 0, then H is taken to be the unit matrix This version uses inline code if H has order < 11.
CLARGV generates a vector of complex plane rotations with real cosines, determined by elements of the complex vectors x and y. For i = 1,2,...,n ( c(i) s(i) ) ( x(i) ) = ( a(i) ) ( -conjg(s(i)) c(i) ) ( y(i) ) = ( 0 )
CLARTG generates a plane rotation so that [ -SN CS ] [ G ] [ 0 ] This is a faster version of the BLAS1 routine CROTG, except for the following differences: F and G are unchanged on return. If G=0, then CS=1 and SN=0. If F=0 and (G .ne. 0), then CS=0 and SN=1 without doing any floating point operations.
CLARTV applies a vector of complex plane rotations with real cosines to elements of the complex vectors x and y. For i = 1,2,...,n ( x(i) ) := ( c(i) s(i) ) ( x(i) ) ( y(i) ) ( -conjg(s(i)) c(i) ) ( y(i) )
CLASCL multiplies the M by N complex matrix A by the real scalar CTO/CFROM. This is done without over/underflow as long as the final result CTO*A(I,J)/CFROM does not over/underflow. TYPE specifies that A may be full, upper triangular, lower triangular, upper Hessenberg, or banded.
CLASR performs the transformation consisting of a sequence of plane rotations determined by the parameters PIVOT and DIRECT as follows ( z = m when SIDE = 'L' or 'l' and z = n when SIDE = 'R' or 'r' ): When DIRECT = 'F' or 'f' ( Forward sequence ) then P = P( z - 1 )*...*P( 2 )*P( 1 ), and when DIRECT = 'B' or 'b' ( Backward sequence ) then P = P( 1 )*P( 2 )*...*P( z - 1 ), where P( k ) is a plane rotation matrix for the following planes: when PIVOT = 'V' or 'v' ( Variable pi...
Class::Struct exports a single function, struct. Given a list of element names and types, and optionally a class name, struct creates a Perl 5 class that implements a "struct-like" data structure. The new class is given a constructor method, new, for creating struct objects. Page 1 Class::Struct(3) Class::Struct(3) Each element in the struct data has an accessor method, which is used to assign to the element and to fetch its value. The default accessor can be overridden by declaring a sub of t...
CLASSQ returns the values scl and ssq such that where x( i ) = abs( X( 1 + ( i - 1 )*INCX ) ). The value of sumsq is assumed to be at least unity and the value of ssq will then satisfy 1.0 .le. ssq .le. ( sumsq + 2*n ). scale is assumed to be non-negative and scl returns the value scl = max( scale, abs( real( x( i ) ) ), abs( aimag( x( i ) ) ) ), i scale and sumsq must be supplied in SCALE and SUMSQ respectively. SCALE and SUMSQ are overwritten by scl and ssq respectively. The routine makes only...
CLASYF computes a partial factorization of a complex symmetric matrix A using the Bunch-Kaufman diagonal pivoting method. The partial factorization has the form: A = ( I U12 ) ( A11 0 ) ( I 0 ) if UPLO = 'U', or: ( 0 U22 ) ( 0 D ) ( U12' U22' ) A = ( L11 0 ) ( D 0 ) ( L11' L21' ) if UPLO = 'L' ( L21 I ) ( 0 A22 ) ( 0 I ) where the order of D is at most NB. The actual order is returned in the argument KB, and is either NB or NB-1, or N if N <= NB. Note that U' denotes the transpose of U....
CLATBS solves one of the triangular systems with scaling to prevent overflow, where A is an upper or lower triangular band matrix. Here A' denotes the transpose of A, x and b are n-element vectors, and s is a scaling factor, usually less than or equal to 1, chosen so that the components of x will be less than the overflow threshold. If the unscaled problem will not cause overflow, the Level 2 BLAS routine CTBSV is called. If the matrix A is singular (A(j,j) = 0 for some j), then s is set to 0 a...
CLATPS solves one of the triangular systems with scaling to prevent overflow, where A is an upper or lower triangular matrix stored in packed form. Here A**T denotes the transpose of A, A**H denotes the conjugate transpose of A, x and b are n-element vectors, and s is a scaling factor, usually less than or equal to 1, chosen so that the components of x will be less than the overflow threshold. If the unscaled problem will not cause overflow, the Level 2 BLAS routine CTPSV is called. If the matri...
CLATRD reduces NB rows and columns of a complex Hermitian matrix A to Hermitian tridiagonal form by a unitary similarity transformation Q' * A * Q, and returns the matrices V and W which are needed to apply the transformation to the unreduced part of A. If UPLO = 'U', CLATRD reduces the last NB rows and columns of a matrix, of which the upper triangle is supplied; if UPLO = 'L', CLATRD reduces the first NB rows and columns of a matrix, of which the lower triangle is supplied. This is an aux...
CLATRS solves one of the triangular systems with scaling to prevent overflow. Here A is an upper or lower triangular matrix, A**T denotes the transpose of A, A**H denotes the conjugate transpose of A, x and b are n-element vectors, and s is a scaling factor, usually less than or equal to 1, chosen so that the components of x will be less than the overflow threshold. If the unscaled problem will not cause overflow, the Level 2 BLAS routine CTRSV is called. If the matrix A is singular (A(j,j) = 0 ...
CLATZM applies a Householder matrix generated by CTZRQF to a matrix. Let P = I - tau*u*u', u = ( 1 ), ( v ) where v is an (m-1) vector if SIDE = 'L', or a (n-1) vector if SIDE = 'R'. If SIDE equals 'L', let C = [ C1 ] 1 [ C2 ] m-1 n Then C is overwritten by P*C. If SIDE equals 'R', let C = [ C1, C2 ] m 1 n-1 Then C is overwritten by C*P.
CLAUU2 computes the product U * U' or L' * L, where the triangular factor U or L is stored in the upper or lower triangular part of the array A. If UPLO = 'U' or 'u' then the upper triangle of the result is stored, overwriting the factor U in A. If UPLO = 'L' or 'l' then the lower triangle of the result is stored, overwriting the factor L in A. This is the unblocked form of the algorithm, calling Level 2 BLAS....
CLAUUM computes the product U * U' or L' * L, where the triangular factor U or L is stored in the upper or lower triangular part of the array A. If UPLO = 'U' or 'u' then the upper triangle of the result is stored, overwriting the factor U in A. If UPLO = 'L' or 'l' then the lower triangle of the result is stored, overwriting the factor L in A. This is the blocked form of the algorithm, calling Level 3 BLAS....
scheme The compression/decompression scheme to use. width The width of the image. height The height of the image. format The format of the original image to (de)compress : CL_FORMAT_BGR, CL_FORMAT_XBGR, CL_FORMAT_ABGR, CL_FORMAT_BGR332, CL_FORMAT_GRAYSCALE, CL_FORMAT_YCbCr, CL_FORMAT_YCbCr422, or CL_FORMAT_YCbCr422DC. compressionRatio The target compression ratio. The actual compression ratio depends on this value and the particular codec. A value of 0.0 indicates the default should be used. fra...
handle A handle to the compressor or decompressor. bufferType The type of buffer, either CL_BUF_FRAME or CL_BUF_COMPRESSED. blocks The number of blocks in the buffer. blockSize The size in bytes of each block. This must be equal to the frame size for CL_BUF_FRAME, and 1 for CL_BUF_COMPRESSED. bufferPtr1 A pointer to a pointer to the buffer space. If bufferPtr1 is NULL, clCreateBuf will allocate the blocks. If bufferPtr1 is not NULL and *bufferPtr1 is NULL, clCreateBuf will allocate the blocks an...
The erase and werase routines copy blanks to every position in the window. The clear and wclear routines are like erase and werase, but they also call clearok, so that the screen is cleared completely on the next call to wrefresh for that window and repainted from scratch. The clrtobot and wclrtobot rout...
handle A handle to a compressor or decompressor. paramID The parameter identifier. minPtr A pointer to an int where the minimum value will be written. maxPtr A pointer to an int where the maximum value will be written.
handle An open handle that is actively compressing or decompressing. info A pointer where a CLimageInfo structure is to be placed. sizeOfImageInfo The size of the CLimageInfo structure in bytes.
handle The handle to a compressor or decompressor. paramValueBuffer An array of ints containing parameter identifier/value pairs. The even elements of this array select the parameters to get or set. The odd elements are the current or new values of these parameters. bufferLength The number of ints in the buffer pointed to by paramValueBuffer. paramID An identifier of the parameter to get or set. value The new value of the parameter....
The Compression Library provides an application programming interface for processing video and audio data using a variety of compression algorithms. Compression techniques are useful for extending the utility of system resources such as memory, disk space, and network bandwidth. Some application areas include publishing (presentations, documentation, training, archiving, and annotation), telecommunications (video/voice mail, phone, and conferencing), animation previewing (2D/3D graphics renderin...
Tcl_Interp *interp (in) Interpreter to use for reporting errors. Tk_Window tkwin (in) Window that determines which display's clipboard to manipulate. Atom target (in) Conversion type for this clipboard item; has same meaning as target argument to Tk_CreateSelHandler. Atom format (in) Representation to use when data is retrieved; has same meaning as format argument to Tk_CreateSelHandler. char *buffer (in) Null terminated string containing the data to be appended to the clipboard....
index expects an integer in the range 0 through 5, indicating which of the 6 clipping planes is being modified. mode expects one of three tokens: CP_DEFINE: use the plane equation passed in params to define a clipplane. The clipplane is neither enabled nor disabled. CP_ON: enable the (previously defined) clipplane. CP_OFF: disable the clipplane. (default) params expects an array of 4 floats that specify a plane equation. A plane equation is usually thought of as a 4-vector [A,B,C,D]. In this cas...
clock returns the amount of CPU time used since the first call to clock. The unit time of clock (microseconds) is indicated in the macro CLOCKS_PER_SEC found in the file . The time reported is the sum of the user and system times of the calling process and its terminated child processes for which it has executed wait(2), pclose(3S), or system(3S). The resolution of the clock is 10 milliseconds on IRIS workstations....
scheme The compression scheme to use. handlePtr A pointer to the returned handle of the compressor. Used by subsequent calls to identify the compressor. handle A handle to the compressor. numberOfFrames The number of frames to compress, which should be a multiple of CL_FRAMES_PER_CHUNK (usually 1 for video). numberOfFrames may also be specified as CL_CONTINUOUS_BLOCK or CL_CONTINUOUS_NONBLOCK. frameBuffer A pointer to the frame buffer to be compressed. A value of CL_EXTERNAL_DEVICE may be used w...
scheme The decompression scheme to use. handlePtr A pointer to the returned handle of the decompressor. Used by subsequent calls to identify the decompressor. handle A handle to the decompressor. numberOfFrames The number of frames to decompress, which should be a multiple of CL_FRAMES_PER_CHUNK (usually 1 for video). numberOfFrames may also be specified as CL_CONTINUOUS_BLOCK or CL_CONTINUOUS_NONBLOCK. compressedBufferSize The size of the data to be decompressed in bytes. Used with non-NULL com...
scheme The demultiplexing scheme to use. handlePtr A pointer to the returned handle of the demultiplexer. Used by subsequent calls to identify the demultiplexer. handle A handle to the demultiplexer. count The number of iterations to execute. The amount of processing done during each iteration is scheme and data dependent. count may also be specified as CL_CONTINUOUS_BLOCK or CL_CONTINUOUS_NONBLOCK....
scheme The multiplexing scheme to use. handlePtr A pointer to the returned handle of the multiplexer. Used by subsequent calls to identify the multiplexer. handle A handle to the multiplexer. count The number of iterations to execute. The amount of processing done during each iteration is scheme and data dependent. count may also be specified as CL_CONTINUOUS_BLOCK or CL_CONTINUOUS_NONBLOCK.
Closes the file given by fileId. FileId must be the return value from a previous invocation of the open command; after this command, it should not be used anymore. If fileId refers to a command pipeline instead of a file, then close waits for the children to complete. The normal result of this command is an empty string, but errors are returned if there are problems in closing the file or waiting for children to complete....
algType The algorithm type. Possible values are CL_ALG_VIDEO or CL_ALG_AUDIO. buffer An array of ints into which clQueryAlgorithms writes name/functionality pairs. bufferLength The number of ints in buffer. handle A handle to a compressor or decompressor. name The algorithm name. scheme The scheme identifier. functionality The functionality provided by the scheme. Possible values are CL_COMPRESSOR compression only CL_DECOMPRESSOR decompression only CL_CODEC compression and decompression message ...
bufferHdl A handle to a CL buffer. freeAmount The number of blocks of free space to wait for. If it is zero, then the current number of blocks of free space is returned without waiting. freeData A pointer to the returned pointer to the location of free space. freeWrap The number of blocks of free space that have wrapped to the beginning of the ring buffer. If it is greater than zero, then the total free space is in two segments. amountToAdd The number of blocks of free space that were written by...
handle A handle to a compressor or decompressor. paramValueBuffer An array of ints into which clQueryParams writes name/type pairs. bufferLength The number of ints in buffer. paramName The parameter name.
header A pointer to a buffer containing at least 16 bytes of the header. scheme The decompression scheme to use. handle A handle to the decompressor. headerSize The maximum size of the header in bytes. header A pointer to a buffer containing the header. clQueryScheme attempts to determine the appropriate decompression scheme from 16 bytes of the stream header. It can be called before clOpenDecompressor to determine which scheme to use. Once the scheme has been determined, the handle can be opene...
This man page describes the Aware audio compression algorithms that are installed in the Compression Library (CL). Two Aware schemes are currently supported. 1. CL_MPEG1_AUDIO_AWARE The ISO/MPEG-audio standard algorithm with layers I and II. 2. CL_MULTIRATE_AWARE The Aware-proprietary MultiRate I lossless or low-distortion algorithm. Each scheme is accessed through the standard CL API, described in CLintro(3dm). Listed below are the parameters that may be used with these two codecs. Note that pa...
Cosmo Compress is an optional hardware accelerator for JPEG image compression. The programming interface to Cosmo is via the standard Compression Library. For overviews of the JPEG standard and the CL API, see jpeg(4) and CLintro(3dm). Cosmo Compress implements a subset of the JPEG standard optimized for video originated images. This subset is baseline JPEG, interleaved YCrCb, 8-bits per component. Cosmo Compress is capable of compressing and decompressing to and from memory, or to and from a sp...
The JPEG compression standard, jpeg(4), is supported in the Compression Library, CLintro(3dm), with two schemes 1. CL_JPEG_SOFTWARE software implementation 2. CL_JPEG_COSMO real-time hardware device Each scheme is accessed using the basic CL API and parameter set. This man page describes the additional, JPEG-specific, parameters that are common to both schemes. Note that there are two methods of controlling the quantization tables. An overall quality rating can be specified that will be used to ...
The MPEG compression standard, mpeg(4), is supported in the Compression Library, CLintro(3dm), with two schemes 1. CL_MPEG1_VIDEO_SOFTWARE video compressor/decompressor 2. CL_MPEG1_AUDIO_SOFTWARE audio compressor/decompressor Each scheme is accessed using the basic CL API and parameter set. This man page describes the features supported by these schemes, as well as the general CL and MPEG-specific parameters that are relevant for their operation. The Compression Library also provides MPEG audio ...
The MVC2 (Motion Video Compressor 2) compression algorithm is implemented as one of the codecs in the Compression Library (CL). Its scheme identifier is CL_MVC2_SOFTWARE, and is accessible through the standard CL API. For an overview of the basic library calls and parameters, see CLintro(3dm). Compression involves a simple block coding heuristic based on various perceptual criteria. The amount of compression is guided by setting the following parameters. In each case, a higher threshold results ...
The MVC3 (Motion Video Compressor 3) compression algorithm is implemented as one of the codecs in the Compression Library (CL). Its scheme identifier is CL_MVC3_SOFTWARE, and is accessible through the standard CL API. For an overview of the basic library calls and parameters, see CLintro(3dm). This algorithm is based on a fast block transform technique. It uses one parameter in addition to the basic CL set....
The client data pointer provides a means for Tcl commands to have data associated with them that is not global to the C program nor included in the Tcl core. Client data is essential in a multi-interpreter environment (where a single program has created and is making use of multiple Tcl interpreters) for the C routines to maintain any permanent Page 5 Command Writing(3Tcl) Command Writing(3Tcl) data they need on a per-interpreter basis. Otherwise there would be reentrancy problems. Tcl solves th...
x expects the x location of the point (in world coordinates) to which you want to move the current character position. y expects the y location of the point (in world coordinates) to which you want to move the current character position. z expects the z location of the point (in world coordinates) to which you want to move the current character position. (This parameter not used by the 2-D subroutines.)...
On INPUT NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. LOW and IGH are integers determined by the balancing subroutine CBAL. If CBAL has not been used, set LOW=1 and IGH equal to the order of the matrix. AR and AI contain the multipliers which were used in the reduction by COMHES in their lower triangles below the subdiagonal. INT contains information on the rows and columns interchanged in the reduction by COMHES....
On INPUT NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix. LOW and IGH ARE integers determined by the balancing subroutine CBAL. If CBAL has not been used, set LOW=1, IGH=N. AR and AI contain the real and imaginary parts, respectively, of the complex input matrix. On OUTPUT AR and AI contain the real and imaginary parts, respectively, of the Hessenberg matrix. The multipliers which were us...
On INPUT NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix. LOW and IGH are integers determined by the balancing subroutine CBAL. If CBAL has not been used, set LOW=1, IGH=N. HR and HI contain the real and imaginary parts, respectively, of the complex upper Hessenberg matrix. Their lower triangles below the subdiagonal contain the multipliers which were used in the reduction by COMHES, if p...
On INPUT NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix. LOW and IGH are integers determined by the balancing subroutine CBAL. If CBAL has not been used, set LOW=1, IGH=N. INT contains information on the rows and columns interchanged in the reduction by COMHES, if performed. Only elements LOW through IGH are used. If the eigenvectors of the HESSEN- BERG matrix are desired, set INT(J)=J f...
This section describes functions and operators found in the C++ Complex Mathematics Library, libcomplex.a. These functions are not automatically loaded by the C++ compiler, CC(1); however, the link editor searches this library under the -lcomplex option. Declarations for these functions may be found in the #include file <complex.h>. When compiling programs using the compl...
On INPUT NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix. LOW and IGH are integers determined by the balancing subroutine CBAL. If CBAL has not been used, set LOW=1, IGH=N. HR and HI contain the real and imaginary parts, respectively, of the complex upper Hessenberg matrix. Their lower triangles below the subdiagonal contain information about the unitary transformations used in the reduct...
On INPUT NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix. LOW and IGH are integers determined by the balancing subroutine CBAL. If CBAL has not been used, set LOW=1, IGH=N. ORTR and ORTI contain information about the unitary trans- formations used in the reduction by CORTH, if performed. Only elements LOW through IGH are used. If the eigenvectors of the Hessenberg matrix are desired, set ...
This command treats each argument as a list and concatenates them into a single list. It also eliminates leading and trailing spaces in the arg's and adds a single separator space between arg's. It permits any number of arguments. For example, the command concat a b {c d e} {f {g h}} will return a b c d e f {g h} as its result. If no args are supplied, the result is an empty string. |
b expects either TRUE or FALSE. TRUE tells the system to expect concave polygons. FALSE tells the system to expect no concave polygons. This is the default.
The Config module contains all the information that was available to the Configure program at Perl build time (over 900 values). Shell variables from the config.sh file (written by Configure) are stored in the readonly-variable %Config, indexed by their names. Values stored in config.sh as 'undef' are returned as undefined values. The perl exists function can be used to check if a named variable exists. myconfig() Returns a textual summary of the major perl configuration values. See also -V in...
Tcl_Interp *interp (in) Interpreter to use for returning error messages. Tk_Window tkwin (in) Window used to represent widget (needed to set up X resources). Tk_ConfigSpec *specs (in) Pointer to table specifying legal configuration options for this widget. int argc (in) Number of arguments in argv. char **argv (in) Command-line options for configuring widget. char *widgRec (in/out) Points to widget record structure. Fields in this structure get modified by Tk_ConfigureWidget to hold configuratio...
Tk_Window tkwin (in) Token for window. unsigned int valueMask (in) OR-ed mask of values like CWX or CWBorderPixel, indicating which fields of *valuePtr or *attsPtr to use. XWindowChanges *valuePtr (in) Points to a structure containing new values for the configuration parameters selected by valueMask. Fields not selected by valueMask are ignored. Page 1 Tk_ConfigureWindow(3Tk) Tk_ConfigureWindow(3Tk) int x (in) New x-coordinate for tkwin's top left pixel (including border, if any) within tkwin'...
confstr copies information relating to the UNIX system on which the process is executing into the buffer pointed to by buf. len is the size of the buffer. The POSIX P1003.1 interface sysconf [see sysconf(2)] provides a similar class of configuration information, but returns an integer rather than a string. The commands available are: _CS_SYSNAME Copy into the array pointed to by buf the string that would be...
conjg returns the complex conjugate of its complex argument. dconjg returns the double-complex conjugate of its double-complex argument. qconjg returns the complex*32 conjugate of its complex*32 argument. Page 1 CONJG(3M) Last changed: 1-6-98
conjg returns the complex conjugate of its complex argument. dconjg returns the double-complex conjugate of its double-complex argument. qconjg returns the complex*32 conjugate of its complex*32 argument. Page 1 CONJG(3M) Last changed: 1-6-98
The parameter s is a socket. If it is of type SOCK_DGRAM, connect() specifies the peer with which the socket is to be associated; this address is the address to which datagrams are to be sent if a receiver is not explicitly designated; it is the only address from which datagrams are to be received. If the socket s is of type SOCK_STREAM, connect() attempts to make a connection to another socket. Th...
This will declare a symbol to be a constant with the given scalar or list value. When you declare a constant such as PI using the method shown above, each machine your script runs upon can have as many digits of accuracy as it can use. Also, your program will be easier to read, more likely to be maintained (and maintained correctly), and far less likely to send a space probe to the wrong planet because nobody noticed the one equation in which you wrote 3.14195....
This command is typically invoked inside the body of a looping command such as for or foreach or while. It returns a TCL_CONTINUE code, which causes a continue exception to occur. The exception causes the current script to be aborted out to the the innermost containing loop command, which then continues with the next iteration of the loop. Catch exceptions are also handled in a few other situations, such as the catch command and the outermost scripts of procedure bodies....
For the C interface two types "complex" and "zomplex" have been defined as structures of two floating point variables ( re, im ). They are equivalent to the "complex" and "double complex" Fortran types. typedef struct { float re; float im; } complex; typedef struct { double re; double im; } zomplex; These types as well as the prototypes of the different functions for convolution and correlations are defined in the "/usr/include/conv.h" header file....
toupper and tolower have as their domain the range of the function getc: all values represented in an unsigned char and the value of the macro EOF as defined in stdio.h. If the argument of toupper represents a lowercase letter, the result is the corresponding uppercase letter. If the argument of tolower represents an uppercase letter, t...
convop the convolution mode: general, separable or off border a token specifying the source for the input data border xksize the size of the kernel width in pixels in the x dimension yksize the size of the kernel width in pixels in the y dimension kernel an array of kernel elements bias a value usually between [-1.0,1.0] to be added to the result of the convolution.
int rootX (in) X-coordinate (in root window coordinates). int rootY (in) Y-coordinate (in root window coordinates). Tk_Window tkwin (in) Token for window that identifies application.
dcopy, scopy, zcopy and ccopy copy a vector x, whose length is n to a vector y. incx and incy specify the increment between two consecutive elements of respectively vector x and y.
copylist copies a list of items from a file into freshly allocated memory, replacing new-lines with null characters. It expects two arguments: a pointer filenm to the name of the file to be copied, and a pointer szptr to a variable where the size of the file will be stored. Upon success, copylist returns a pointer to the memory allocated. Otherwise it returns NULL if it has trouble finding the file, calling malloc, or ...
On INPUT NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. LOW and IGH are integers determined by the balancing subroutine CBAL. If CBAL has not been used, set LOW=1 and IGH equal to the order of the matrix. AR and AI contain information about the unitary transformations used in the reduction by CORTH in their strict lower triangles. ORTR and ORTI contain further information about the transformations used in the reduct...
On INPUT NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix. LOW and IGH are integers determined by the balancing subroutine CBAL. If CBAL has not been used, set LOW=1, IGH=N. AR and AI contain the real and imaginary parts, respectively, of the complex input matrix. On OUTPUT AR and AI contain the real and imaginary parts, respectively, of the Hessenberg matrix. Information about the unitary...
The single-precision and long double-precision routines listed above are only available in the standard math library, -lm, and in -lmx. sin, cos and tan return trigonometric functions of radian arguments x for double data types. fsin, fcos and ftan, and their ANSI-named counterparts sinf, cosf and tanf return trigonometric functions of radian Page 1 TRIG(3M) TRIG(3M) arguments x for float data types. sinl, cosl and tanl do the same for long double data types. The asin routines return the arc sin...
The single-precision and long double-precision routines listed above are only available in the standard math library, -lm, and in -lmx. sin, cos and tan return trigonometric functions of radian arguments x for double data types. fsin, fcos and ftan, and their ANSI-named counterparts sinf, cosf and tanf return trigonometric functions of radian Page 1 TRIG(3M) TRIG(3M) arguments x for float data types. sinl, cosl and tanl do the same for long double data types. The asin routines return the arc sin...
The long double and single-precision routines listed above are only available in the standard math library, -lm and in -lmx. These functions compute the designated hyperbolic functions for double, float, and long double arguments.
pack expects a packed integer containing the RGBA (red, green, blue, alpha) values you want to assign as the current color. Expressed in hexadecimal, the format of the packed integer is 0xaabbggrr, where: aa is the alpha value, bb is the blue value, gg is the green value, and rr is the red value. RGBA component values range from 0 to 0xFF (255).
The CPAN module is designed to automate the make and install of perl modules and extensions. It includes some searching capabilities and knows how to use Net::FTP or LWP (or lynx or an external ftp client) to fetch the raw data from the net. Modules are fetched from one or more of the mirrored CPAN (Comprehensive Perl Archive Network) sites and unpacked in a dedicated directory. The CPAN module also supports the concept of named and versioned 'bundles' of modules. Bundles simplify the handling...
This package has the same functionality as CPAN.pm, but tries to prevent the usage of compiled extensions during it's own execution. It's primary purpose is a rescue in case you upgraded perl and broke binary compatibility somehow.
On Entry ABD COMPLEX(LDA, N) the matrix to be factored. The columns of the upper triangle are stored in the columns of ABD and the diagonals of the upper triangle are stored in the rows of ABD . See the comments below for details. LDA INTEGER the leading dimension of the array ABD . LDA must be .GE. M + 1 . N INTEGER the order of the matrix A . M INTEGER the number of diagonals above the main diagonal. 0 .LE. M .LT. N . On Return ABD an upper triangular matrix R , stored in band form, so that A ...
CPBCON estimates the reciprocal of the condition number (in the 1-norm) of a complex Hermitian positive definite band matrix using the Cholesky factorization A = U**H*U or A = L*L**H computed by CPBTRF. An estimate is obtained for norm(inv(A)), and the reciprocal of the condition number is computed as RCOND = 1 / (ANORM * norm(inv(A))).
On Entry ABD COMPLEX(LDA, N) the output from CPBCO or CPBFA. LDA INTEGER the leading dimension of the array ABD . N INTEGER the order of the matrix A . M INTEGER the number of diagonals above the main diagonal. On Return DET REAL(2) determinant of original matrix in the form determinant = DET(1) * 10.0**DET(2) with 1.0 .LE. DET(1) .LT. 10.0 or DET(1) .EQ. 0.0 . LINPACK. This version dated 08/14/78 . Cleve Moler, University of New Mexico, Argonne National Lab. Subroutines and Functions Fortran RE...
CPBEQU computes row and column scalings intended to equilibrate a Hermitian positive definite band matrix A and reduce its condition number (with respect to the two-norm). S contains the scale factors, S(i) = 1/sqrt(A(i,i)), chosen so that the scaled matrix B with elements B(i,j) = S(i)*A(i,j)*S(j) has ones on the diagonal. This choice of S puts the condition number of B within a factor N of the smallest possible condition number over all possible diagonal scalings....
On Entry ABD COMPLEX(LDA, N) the matrix to be factored. The columns of the upper triangle are stored in the columns of ABD and the diagonals of the upper triangle are stored in the rows of ABD . See the comments below for details. LDA INTEGER the leading dimension of the array ABD . LDA must be .GE. M + 1 . N INTEGER the order of the matrix A . M INTEGER the number of diagonals above the main diagonal. 0 .LE. M .LT. N . On Return ABD an upper triangular matrix R , stored in band form, so that A ...
CPBRFS improves the computed solution to a system of linear equations when the coefficient matrix is Hermitian positive definite and banded, and provides error bounds and backward error estimates for the solution.
On Entry ABD COMPLEX(LDA, N) the output from CPBCO or CPBFA. LDA INTEGER the leading dimension of the array ABD . N INTEGER the order of the matrix A . M INTEGER the number of diagonals above the main diagonal. B COMPLEX(N) the right hand side vector. On Return B the solution vector X . Error Condition A division by zero will occur if the input factor contains a zero on the diagonal. Technically this indicates singularity but it is usually caused by improper subroutine arguments. It will not occ...
CPBSTF computes a split Cholesky factorization of a complex Hermitian positive definite band matrix A. This routine is designed to be used in conjunction with CHBGST. The factorization has the form A = S**H*S where S is a band matrix of the same bandwidth as A and the following structure: S = ( U ) ( M L ) where U is upper triangular of order m = (n+kd)/2, and L is lower triangular of order n-m.
CPBSV computes the solution to a complex system of linear equations A * X = B, where A is an N-by-N Hermitian positive definite band matrix and X and B are N-by-NRHS matrices. The Cholesky decomposition is used to factor A as A = U**H * U, if UPLO = 'U', or A = L * L**H, if UPLO = 'L', where U is an upper triangular band matrix, and L is a lower triangular band matrix, with the same number of superdiagonals or subdiagonals as A. The factored form of A is then used to solve the system of equa...
CPBSVX uses the Cholesky factorization A = U**H*U or A = L*L**H to compute the solution to a complex system of linear equations A * X = B, where A is an N-by-N Hermitian positive definite band matrix and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
CPBTF2 computes the Cholesky factorization of a complex Hermitian positive definite band matrix A. The factorization has the form A = U' * U , if UPLO = 'U', or A = L * L', if UPLO = 'L', where U is an upper triangular matrix, U' is the conjugate transpose of U, and L is lower triangular. This is the unblocked version of the algorithm, calling Level 2 BLAS.
CPBTRF computes the Cholesky factorization of a complex Hermitian positive definite band matrix A. The factorization has the form A = U**H * U, if UPLO = 'U', or A = L * L**H, if UPLO = 'L', where U is an upper triangular matrix and L is lower triangular.
CPBTRS solves a system of linear equations A*X = B with a Hermitian positive definite band matrix A using the Cholesky factorization A = U**H*U or A = L*L**H computed by CPBTRF.
In the following description of the complex error handling routine, - i is of type int and - x is of type c_exception. i = complex_error(x) Invoked by functions in the C++ Complex Mathematics Library when errors are detected. Users may define their own procedures for handling errors, by defining a function named complex_error in their programs. com...
The following math functions are overloaded by the complex library, where: - x, y, and z are of type complex. z = exp(x) Returns ex. z = log(x) Returns the natural logarithm of x. z = pow(x, y) Returns xy. z = sqrt(x) Returns the square root of x, contained in the first or fourth quadrants of the complex plane....
The basic arithmetic operators, comparison operators, and assignment operators are overloaded for complex numbers. The operators have their conventional precedences. In the following descriptions for complex operators, - x, y, and z are of type complex. Arithmetic operators: z = x + y Returns a complex which is the arithmetic sum of complex numbers x and y. z = -x Returns a complex which is the arithm...
The following trigonometric functions are defined for complex, where: - x and y are of type complex. y = sin(x) Returns the sine of x. y = cos(x) Returns the cosine of x. y = sinh(x) Returns the hyperbolic sine of x. y = cosh(x) Returns the hyperbolic cosine of x.
On Entry A COMPLEX(LDA, N) the Hermitian matrix to be factored. Only the diagonal and upper triangle are used. LDA INTEGER the leading dimension of the array A . N INTEGER the order of the matrix A . On Return A an upper triangular matrix R so that A = CTRANS(R)*R where CTRANS(R) is the conjugate transpose. The strict lower triangle is unaltered. If INFO .NE. 0 , the factorization is not complete. RCOND REAL an estimate of the reciprocal condition of A . For the system A*X = B , relative perturb...
CPOCON estimates the reciprocal of the condition number (in the 1-norm) of a complex Hermitian positive definite matrix using the Cholesky factorization A = U**H*U or A = L*L**H computed by CPOTRF. An estimate is obtained for norm(inv(A)), and the reciprocal of the condition number is computed as RCOND = 1 / (ANORM * norm(inv(A))).
On Entry A COMPLEX(LDA, N) the output A from CPOCO or CPOFA or the output X from CQRDC. LDA INTEGER the leading dimension of the array A . N INTEGER the order of the matrix A . JOB INTEGER = 11 both determinant and inverse. = 01 inverse only. = 10 determinant only. On Return A If CPOCO or CPOFA was used to factor A then CPODI produces the upper half of INVERSE(A) . If CQRDC was used to decompose X then CPODI produces the upper half of INVERSE(CTRANS(X)*X) where CTRANS(X) is the conjugate transpo...
CPOEQU computes row and column scalings intended to equilibrate a Hermitian positive definite matrix A and reduce its condition number (with respect to the two-norm). S contains the scale factors, S(i) = 1/sqrt(A(i,i)), chosen so that the scaled matrix B with elements B(i,j) = S(i)*A(i,j)*S(j) has ones on the diagonal. This choice of S puts the condition number of B within a factor N of the smallest possible condition number over all possible diagonal scalings....
On Entry A COMPLEX(LDA, N) the Hermitian matrix to be factored. Only the diagonal and upper triangle are used. LDA INTEGER the leading dimension of the array A . N INTEGER the order of the matrix A . On Return A an upper triangular matrix R so that A = CTRANS(R)*R where CTRANS(R) is the conjugate transpose. The strict lower triangle is unaltered. If INFO .NE. 0 , the factorization is not complete. INFO INTEGER = 0 for normal return. = K signals an error condition. The leading minor of order K is...
CPORFS improves the computed solution to a system of linear equations when the coefficient matrix is Hermitian positive definite, and provides error bounds and backward error estimates for the solution.
On Entry A COMPLEX(LDA, N) the output from CPOCO or CPOFA. LDA INTEGER the leading dimension of the array A . N INTEGER the order of the matrix A . B COMPLEX(N) the right hand side vector. On Return B the solution vector X . Error Condition A division by zero will occur if the input factor contains a zero on the diagonal. Technically this indicates singularity but it is usually caused by improper subroutine arguments. It will not occur if the subroutines are called correctly and INFO .EQ. 0 . To...
CPOSV computes the solution to a complex system of linear equations A * X = B, where A is an N-by-N Hermitian positive definite matrix and X and B are N-by-NRHS matrices. The Cholesky decomposition is used to factor A as A = U**H* U, if UPLO = 'U', or A = L * L**H, if UPLO = 'L', where U is an upper triangular matrix and L is a lower triangular matrix. The factored form of A is then used to solve the system of equations A * X = B....
CPOSVX uses the Cholesky factorization A = U**H*U or A = L*L**H to compute the solution to a complex system of linear equations A * X = B, where A is an N-by-N Hermitian positive definite matrix and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
CPOTF2 computes the Cholesky factorization of a complex Hermitian positive definite matrix A. The factorization has the form A = U' * U , if UPLO = 'U', or A = L * L', if UPLO = 'L', where U is an upper triangular matrix and L is lower triangular. This is the unblocked version of the algorithm, calling Level 2 BLAS.
CPOTRF computes the Cholesky factorization of a complex Hermitian positive definite matrix A. The factorization has the form A = U**H * U, if UPLO = 'U', or A = L * L**H, if UPLO = 'L', where U is an upper triangular matrix and L is lower triangular. This is the block version of the algorithm, calling Level 3 BLAS.
CPOTRI computes the inverse of a complex Hermitian positive definite matrix A using the Cholesky factorization A = U**H*U or A = L*L**H computed by CPOTRF.
CPOTRS solves a system of linear equations A*X = B with a Hermitian positive definite matrix A using the Cholesky factorization A = U**H*U or A = L*L**H computed by CPOTRF.
On Entry AP COMPLEX (N*(N+1)/2) the packed form of a Hermitian matrix A . The columns of the upper triangle are stored sequentially in a one-dimensional array of length N*(N+1)/2 . See comments below for details. N INTEGER the order of the matrix A . On Return AP an upper triangular matrix R , stored in packed form, so that A = CTRANS(R)*R . If INFO .NE. 0 , the factorization is not complete. RCOND REAL an estimate of the reciprocal condition of A . For the system A*X = B , relative perturbation...
CPPCON estimates the reciprocal of the condition number (in the 1-norm) of a complex Hermitian positive definite packed matrix using the Cholesky factorization A = U**H*U or A = L*L**H computed by CPPTRF. An estimate is obtained for norm(inv(A)), and the reciprocal of the condition number is computed as RCOND = 1 / (ANORM * norm(inv(A))).
On Entry AP COMPLEX (N*(N+1)/2) the output from CPPCO or CPPFA. N INTEGER the order of the matrix A . JOB INTEGER = 11 both determinant and inverse. = 01 inverse only. = 10 determinant only. On Return AP the upper triangular half of the inverse . The strict lower triangle is unaltered. DET REAL(2) determinant of original matrix if requested. Otherwise not referenced. Determinant = DET(1) * 10.0**DET(2) with 1.0 .LE. DET(1) .LT. 10.0 or DET(1) .EQ. 0.0 . Error Condition A division by zero will oc...
CPPEQU computes row and column scalings intended to equilibrate a Hermitian positive definite matrix A in packed storage and reduce its condition number (with respect to the two-norm). S contains the scale factors, S(i)=1/sqrt(A(i,i)), chosen so that the scaled matrix B with elements B(i,j)=S(i)*A(i,j)*S(j) has ones on the diagonal. This choice of S puts the condition number of B within a factor N of the smallest possible condition number over all possible diagonal scalings....
On Entry AP COMPLEX (N*(N+1)/2) the packed form of a Hermitian matrix A . The columns of the upper triangle are stored sequentially in a one-dimensional array of length N*(N+1)/2 . See comments below for details. N INTEGER the order of the matrix A . On Return AP an upper triangular matrix R , stored in packed form, so that A = CTRANS(R)*R . INFO INTEGER = 0 for normal return. = K If the leading minor of order K is not positive definite. Packed Storage The following program segment will pack the...
CPPRFS improves the computed solution to a system of linear equations when the coefficient matrix is Hermitian positive definite and packed, and provides error bounds and backward error estimates for the solution.
On Entry AP COMPLEX (N*(N+1)/2) the output from CPPCO or CPPFA. N INTEGER the order of the matrix A . B COMPLEX(N) the right hand side vector. On Return B the solution vector X . Error Condition A division by zero will occur if the input factor contains a zero on the diagonal. Technically this indicates singularity but it is usually caused by improper subroutine arguments. It will not occur if the subroutines are called correctly and INFO .EQ. 0 . To compute INVERSE(A) * C where C is a matrix wi...
CPPSV computes the solution to a complex system of linear equations A * X = B, where A is an N-by-N Hermitian positive definite matrix stored in packed format and X and B are N-by-NRHS matrices. The Cholesky decomposition is used to factor A as A = U**H* U, if UPLO = 'U', or A = L * L**H, if UPLO = 'L', where U is an upper triangular matrix and L is a lower triangular matrix. The factored form of A is then used to solve the system of equations A * X = B....
CPPSVX uses the Cholesky factorization A = U**H*U or A = L*L**H to compute the solution to a complex system of linear equations A * X = B, where A is an N-by-N Hermitian positive definite matrix stored in packed format and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
CPPTRF computes the Cholesky factorization of a complex Hermitian positive definite matrix A stored in packed format. The factorization has the form A = U**H * U, if UPLO = 'U', or A = L * L**H, if UPLO = 'L', where U is an upper triangular matrix and L is lower triangular.
CPPTRI computes the inverse of a complex Hermitian positive definite matrix A using the Cholesky factorization A = U**H*U or A = L*L**H computed by CPPTRF.
CPPTRS solves a system of linear equations A*X = B with a Hermitian positive definite matrix A in packed storage using the Cholesky factorization A = U**H*U or A = L*L**H computed by CPPTRF.
cprod1d and zprod1d compute the product of the Fourier transforms of a complex sequence of N samples with the Fourier transforms of a complex filter. Note, the product of the Fourier transforms of two sequences is equal to the Fourier transform of their convolution.
cprod2d and zprod2d compute the product of the Fourier transforms of 2D complex sequence (size N1xN2) with the Fourier transform of 2D filter. Note, the product of the Fourier transforms of two sequences is equal to the Fourier transform of their convolution.
cprod3d and zprod3d compute the product of the Fourier transforms of 3D complex sequence (size N1xN2xN3) with the Fourier transform of 3D filter. Note, the product of the Fourier transforms of two sequences is equal to the Fourier transform of their convolution.
cprodm1d and zprodm1d compute the product of the Fourier transforms of P complex sequences of N samples with the Fourier transforms of P complex filters. Note, the product of the Fourier transforms of two sequences is equal to the Fourier transform of their convolution.
CPTCON computes the reciprocal of the condition number (in the 1-norm) of a complex Hermitian positive definite tridiagonal matrix using the factorization A = L*D*L**H or A = U**H*D*U computed by CPTTRF. Norm(inv(A)) is computed by a direct method, and the reciprocal of the condition number is computed as RCOND = 1 / (ANORM * norm(inv(A))).
CPTEQR computes all eigenvalues and, optionally, eigenvectors of a symmetric positive definite tridiagonal matrix by first factoring the matrix using SPTTRF and then calling CBDSQR to compute the singular values of the bidiagonal factor. This routine computes the eigenvalues of the positive definite tridiagonal matrix to high relative accuracy. This means that if the eigenvalues range over many orders of magnitude in size, then the small eigenvalues and corresponding eigenvectors will be compute...
CPTRFS improves the computed solution to a system of linear equations when the coefficient matrix is Hermitian positive definite and tridiagonal, and provides error bounds and backward error estimates for the solution.
On Entry N INTEGER is the order of the tridiagonal matrix. D COMPLEX(N) is the diagonal of the tridiagonal matrix. On output D is destroyed. E COMPLEX(N) is the offdiagonal of the tridiagonal matrix. E(1) through E(N-1) should contain the offdiagonal. B COMPLEX(N) is the right hand side vector. On Return B contains the solution. LINPACK. This version dated 08/14/78 . Jack Dongarra, Argonne National Laboratory. No externals Fortran CONJG,MOD PPPPaaaaggggeeee 1111...
CPTSV computes the solution to a complex system of linear equations A*X = B, where A is an N-by-N Hermitian positive definite tridiagonal matrix, and X and B are N-by-NRHS matrices. A is factored as A = L*D*L**H, and the factored form of A is then used to solve the system of equations.
CPTSVX uses the factorization A = L*D*L**H to compute the solution to a complex system of linear equations A*X = B, where A is an N-by-N Hermitian positive definite tridiagonal matrix and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
CPTTRF computes the factorization of a complex Hermitian positive definite tridiagonal matrix A. If the subdiagonal elements of A are supplied in the array E, the factorization has the form A = L*D*L**H, where D is diagonal and L is unit lower bidiagonal; if the superdiagonal elements of A are supplied, it has the form A = U**H*D*U, where U is unit upper bidiagonal.
CPTTRS solves a system of linear equations A * X = B with a Hermitian positive definite tridiagonal matrix A using the factorization A = U**H*D*U or A = L*D*L**H computed by CPTTRF.
The cpusetAllocQueueDef function is used to allocate memory for a cpuset_QueueDef_t structure. This memory can then be released using the function cpusetFreeQueueDef(3x). The count argument indicates the number of CPUs that will be assigned to the cpuset definition structure. The cpuset_QueueDef_t structure is defined as follows: typedef struct { int flags; char *permfile; cpuset_CPUList_t *cpu; } cpuset_QueueDef_t; The flags member is used to specify various control options for the cpuset queue...
The cpusetAttach function is used to attach the current process to the cpuset identified by qname. Every cpuset queue has a file that defines access permissions to the queue. The execute permissions for that file will determine if a process owned by a specific user can attach a process to the cpuset queue. The qname argument is the name of the cpuset to which the current process should be attached....
The cpusetAttachPID function is used to attach a specific process identified by its PID to the cpuset identified by qname. Every cpuset queue has a file that defines access permissions to the queue. The execute permissions for that file will determine if a process owned by a specific user can attach a process to the cpuset queue. The qname argument is the name of the cpuset to which the specified process should be attached....
The cpusetCreate function is used to create a cpuset queue. Only processes running root user ID are allowed to create cpuset queues. The qname argument is the name that will be assigned to the new cpuset. The name of the cpuset must be a three to eight character string. Queue names having one or two characters are reserved for use by IRIX. The qdef argument is a pointer to a cpuset_QueueDef_t structure (defined in ) that defines the attributes of the queue to be created. The memory for...
The cpusetDestroy function is used to destroy the specified cpuset The qname argument is the name of the cpuset that will be destroyed. Only processes running with root user ID are allowed to destroy cpuset queues. A cpuset can only be destroyed if there are no threads currently attached to it.
The cpusetDetachAll function is used to detach all threads currently attached to the specified cpuset. Only a process running with root user ID can successfully execute cpusetDetachAll. The qname argument is the name of the cpuset that the operation will be performed upon.
The cpusetDetachPID function is used to detach a specific process identified by its PID from the cpuset identified by qname. Every cpuset queue has a file that defines access permissions to the queue. The execute permissions for that file will determine if a process owned by a specific user can detach a process from the cpuset queue. The qname argument is the name of the cpuset to which the specified process should be detached....
The cpusetFreeCPUList function is used to release memory used by a cpuset_CPUList_t structure. This function releases all memory associated with the cpuset_CPUList_t structure. The cpu argument is the pointer to the cpuset_CPUList_t structure that will have it's memory released. This function should be used to release the memory allocated during a previous call to the function cpusetGetCPUList(3x)....
The cpusetFreeNameList function is used to release memory used by a cpuset_NameList_t structure. This function releases all memory associated with the cpuset_NameList_t structure. The name argument is the pointer to the cpuset_NameList_t structure that will have it's memory released. This function should be used to release the memory allocated during a previous call to the function cpusetGetNameList(3x) or cpusetGetName(3x)....
The cpusetFreePIDList function is used to release memory used by a cpuset_PIDList_t structure. This function releases all memory associated with the cpuset_PIDList_t structure. The pid argument is the pointer to the cpuset_PIDList_t structure that will have it's memory released. This function should be used to release the memory allocated during a previous call to the function cpusetGetPIDList(3x)....
The cpusetFreeProperties function is used to release memory used by a cpuset_Properties_t structure. This function releases all memory associated with the cpuset_Properties_t structure. The csp argument is the pointer to the cpuset_Properties_t structure that will have its memory released. This function should be used to release the memory allocated during a previous call to the function cpusetGetProperties(3x)....
The cpusetFreeQueueDef function is used to release memory used by a cpuset_QueueDef_t structure. This function releases all memory associated with the cpuset_QueueDef_t structure. The qdef argument is the pointer to the cpuset_QueueDef_t structure that will have it's memory released. This function should be used to release the memory allocated during a previous call to the function cpusetAllocQueueDef(3x)....
The cpusetGetCPUList function is used to obtain the list of the CPUs assigned to the specified cpuset. Only processes running with a user ID or group ID that has read access permissions on the permissions file can successfully execute this function. The qname argument is the name of the specified cpuset. The function returns a pointer to a structure of type cpuset_CPUList_t (defined in ). The function cpusetGetCPUList allocates the memory for the structure and the user is responsible f...
The cpusetGetName function is used to obtain the name of the cpuset to which the specified process has been attached. The pid argument specifies the process ID. Currently, the only valid value for pid is 0, which returns the name of the cpuset to which the current process is attached. The function returns a pointer to a structure of type cpuset_NameList_t (defined in ). The function cpusetGetName allocates the memory for the structure and all of its associated data. The user is respons...
The cpusetGetNameList function is used to obtain a list of the names for all the cpusets on the system. The function returns a pointer to a structure of type cpuset_NameList_t (defined in ). The function cpusetGetNameList allocates the memory for the structure and all of its associated data. The user is responsible for freeing the memory using the function cpusetFreeNameList(3x). The cpuset_NameList_t structure is defined as follows: typedef struct { int count; char **list; int *status...
The cpusetGetPIDList function is used to obtain a list of the PIDs for all processes currently attached to the specified cpuset. Only processes with a user ID or group ID that has read permissions on the permissions file can successfully execute this function. The qname argument is the name of the cpuset to which the current process should be attached. The function returns a pointer to a structure of type cpuset_PIDList_t (defined in ). The function cpusetGetPIDList allocates the memor...
The cpusetGetProperties function is used retrieve various properties identified by qname and returns a pointer to a cpuset_Properties_t structure. Every cpuset queue has a file that defines access permissions to the queue. The read permissions for that file will determine if a process owned by a specific user can retrieve the properties from the cpuset. The qname argument is the name of the cpuset to which the properties should be retrieved....
On Entry X COMPLEX(LDX,P), where LDX .GE. N. X contains the matrix whose decomposition is to be computed. LDX INTEGER. LDX is the leading dimension of the array X. N INTEGER. N is the number of rows of the matrix X. P INTEGER. P is the number of columns of the matrix X. JVPT INTEGER(P). JVPT contains integers that control the selection of the pivot columns. The K-th column X(K) of X is placed in one of three classes according to the value of JVPT(K). If JVPT(K) .GT. 0, then X(K) is an initial co...
On Entry X COMPLEX(LDX,P). X contains the output of CQRDC. LDX INTEGER. LDX is the leading dimension of the array X. N INTEGER. N is the number of rows of the matrix XK. It must have the same value as N in CQRDC. K INTEGER. K is the number of columns of the matrix XK. K must not be greater than (N,P), where P is the same as in the calling sequence to CQRDC. QRAUX COMPLEX(P). QRAUX contains the auxiliary output from CQRDC. Y COMPLEX(N) Y contains an N-vector that is to be manipulated by CQRSL. JO...
Tcl_Interp *interp (in) Interpreter in which to create new command. char *cmdName (in) Name of command. Tcl_CmdProc *proc (in) Implementation of new command: proc will be called whenever cmdName is invoked as a command. ClientData clientData (in) Arbitrary one-word value to pass to proc and deleteProc. Tcl_CmdDeleteProc *deleteProc (in) Procedure to call before cmdName is deleted from the interpreter; allows for command-specific cleanup. If NULL, then no procedure is called before the command is...
Display *display (in) Display whose errors are to be handled. int error (in) Match only error events with this value in the error_code field. If -1, then match any error_code value. int request (in) Match only error events with this value in the request_code field. If -1, then match any request_code value. int minor (in) Match only error events with this value in the minor_code field. If -1, then match any minor_code value. Tk_ErrorProc *proc (in) Procedure to invoke whenever an error event is r...
Tk_GenericProc *proc (in) Procedure to invoke whenever any X event occurs on any display. ClientData clientData (in) Arbitrary one-word value to pass to proc.
Tcl_Interp *interp (out) Tcl interpreter to use for error reporting. If no error occurs, then *interp isn't modified. For Tk_CreateMainWindow, this interpreter is associated permanently with the created window, and Tk-related commands are bound into the interpreter. char *screenName (in) String name of screen on which to create window. Has the form displayName.screenNum, where displayName is the name of a display and screenNum is a screen number. If the dot and screenNum are omitted, the screen...
Tcl_Interp *interp (in) Interpreter in which new function will be defined. char *name (in) Name for new function. int numArgs (in) Number of arguments to new function; also gives size of argTypes array. Tcl_ValueType *argTypes (in) Points to an array giving the permissible types for each argument to function. Tcl_MathProc *proc (in) Procedure that implements the function. ClientData clientData (in) Arbitrary one-word value to pass to proc when it is invoked....
Tcl_Interp *interp (in) Interpreter to use for error reporting. int argc (in) Number of strings in argv array. char **argv (in) Array of strings describing command(s) and I/O redirection. Argv[argc] must be NULL. int **pidArrayPtr (out) The value at *pidArrayPtr is modified to hold a pointer to an array of process identifiers. The array is dynamically allocated and must be freed by the caller. int *inPipePtr (out) If this argument is NULL then standard input for the first command in the pipeline...
Tk_Window tkwin (in) Window for which proc will provide selection information. Atom selection (in) The name of the selection for | which proc will provide | selection information. Atom target (in) Form in which proc can provide the selection (e.g. STRING or FILE_NAME). Corresponds to type arguments in selection commands. Tk_SelectionProc *proc (in) Procedure to invoke whenever the selection is owned by tkwin and the selection contents are requested in the format given by target. ClientData clien...
Tcl_Interp *interp (in) Interpreter containing command to be traced or untraced. int level (in) Only commands at or below this nesting level will be traced. 1 means top-level commands only, 2 means top-level commands or those that are invoked as immediate consequences of executing top-level commands (procedure bodies, bracketed commands, etc.) and so on. Tcl_CmdTraceProc *proc (in) Procedure to call for each command that's executed. See below for details on the calling sequence. ClientData clie...
crypt is the password encryption function. It is based on a one way hashing encryption algorithm with variations intended (among other things) to frustrate use of hardware implementations of a key search. Key is the input string to encrypt, for instance, a user's typed password. Salt is a two-character string chosen from the set [a-zA-Z0- 9./]; this string is used to perturb the hashing algorithm in one of 4096 different ways, after which the password is used as the key to encrypt repeatedly a ...
des_crypt is the password encryption function. It is based on a one way hashing encryption algorithm with variations intended (among other things) to frustrate use of hardware implementations of a key search. Key is a user's typed password. Salt is a two-character string chosen from the set [a-zA-Z0-9./]; this string is used to perturb the hashing algorithm in one of 4096 different ways, after which the password is used as the key to encrypt repeatedly a constant string. The returned value poin...
cscal1d and zscal1d scale a complex sequences of N samples. The Fourier Transforms are not normalized so the succession DirectInverse transform scales the input data by a factor equal to the size of the transform. cscal1d or zscal1d are used to scale back the result.
cscal2d and zscal2d scale a 2D complex sequence of size N1xN2. The Fourier Transforms are not normalized so the succession DirectInverse transform scales the input data by a factor equal to the size of the transform. So cscal2d or zscal2d may be used to scale back the result.
cscal3d and zscal3d scale a 3D complex sequence of size N1xN2xN3. The Fourier Transforms are not normalized so the succession DirectInverse transform scales the input data by a factor equal to the size of the transform. So cscal3d or zscal3d may be used to scale back the result.
cscalm1d and zscalm1d scale the P complex sequences of N samples each. The Fourier Transforms are not normalized so the succession DirectInverse transform scales the input data by a factor equal to the size of the transform. cscalm1d or zscalm1d are used to scale back the result.
csfft1du and zdfft1du compute the real sequence of N samples, from its Fourier transform. The i-th index f(i) of a sequence with Fourier transform F(k) is equal to: f(i) = Sum ( W^(i*k) * F(k) ), for k =0, ..., (N-1) W = exp( (Sign*2*sqrt(-1)*PI) / N ) The Inverse Fourier transform is performed in-place, so the input Fourier transform is overwritten by the final sequence output. As the output sequence has real values, only the first half of the transform is needed. The (N-k)-th sample of the tra...
csfft2du and zdfft2du compute in place the inverse Fourier transform of real 2D sequence of size N1 x N2. The value F{k,l} of the transform of the 2D sequence f{i,j} is equal to: F{k,l} = Sum ( W1^(i*k) * W2^(j*l) * f{i,j} ), for i =0,...,(N1-1), j=0,...,(n2-1) W1 = exp( (Sign*2*sqrt(-1)*PI) / N1 ) W2 = exp( (Sign*2*sqrt(-1)*PI) / N2 )
csfft3du and zdfft3du compute in place the real 3D sequence of size N1 x N2 x N3 from its complex Fourier transform. The value F{j1,j2,j3} of the transform of the 3D sequence f{i1,i2,i3} is equal to: F{j1,j2,j3} = Sum( W1^(i1*j1)*W2^(i2*j2)*W3^(i3*j3)*f{i1,i2,i3} ), for i[123] =0,...,(N[123]-1) W[123] = exp( (Sign*2*sqrt(-1)*PI) / N[123] )
csfftm1du and zdfftm1du compute the P real sequences of N samples each, from their Fourier transform. The i-th index f(i) of a sequence of N samples, with Fourier transform F(k) is equal to: f(i) = Sum ( W^(i*k) * F(k) ), for k =0, ..., (N-1) W = exp( (Sign*2*sqrt(-1)*PI) / N ) The Inverse Fourier transforms are performed in-place, so the input Fourier transform is overwritten by the final sequence output. As the output sequences have real values, only the first half of the transform is needed. ...
On Entry A COMPLEX(LDA, N) the symmetric matrix to be factored. Only the diagonal and upper triangle are used. LDA INTEGER the leading dimension of the array A . N INTEGER the order of the matrix A . On Return A a block diagonal matrix and the multipliers which were used to obtain it. The factorization can be written A = U*D*TRANS(U) where U is a product of permutation and unit upper triangular matrices , TRANS(U) is the transpose of U , and D is block diagonal with 1 by 1 and 2 by 2 blocks. KVP...
On Entry A COMPLEX(LDA,N) the output from CSIFA. LDA INTEGER the leading dimension of the array A . N INTEGER the order of the matrix A . KVPT INTEGER(N) the pivot vector from CSIFA. WORK COMPLEX(N) work vector. Contents destroyed. JOB INTEGER JOB has the decimal expansion AB where If B .NE. 0, the inverse is computed, If A .NE. 0, the determinant is computed, For example, JOB = 11 gives both. On Return Variables not requested by JOB are not used. A contains the upper triangle of the inverse of ...
On Entry A COMPLEX(LDA,N) the symmetric matrix to be factored. Only the diagonal and upper triangle are used. LDA INTEGER the leading dimension of the array A . N INTEGER the order of the matrix A . On Return A a block diagonal matrix and the multipliers which were used to obtain it. The factorization can be written A = U*D*TRANS(U) where U is a product of permutation and unit upper triangular matrices , TRANS(U) is the transpose of U , and D is block diagonal with 1 by 1 and 2 by 2 blocks. KVPT...
On Entry A COMPLEX(LDA,N) the output from CSIFA. LDA INTEGER the leading dimension of the array A . N INTEGER the order of the matrix A . KVPT INTEGER(N) the pivot vector from CSIFA. B COMPLEX(N) the right hand side vector. On Return B the solution vector X . Error Condition A division by zero may occur if CSICO has set RCOND .EQ. 0.0 or CSIFA has set INFO .NE. 0 . To compute INVERSE(A) * C where C is a matrix with P columns CALL CSIFA(A,LDA,N,KVPT,INFO) If (INFO .NE. 0) GO TO ... DO 10 J = 1, P...
On Entry AP COMPLEX (N*(N+1)/2) the packed form of a symmetric matrix A . The columns of the upper triangle are stored sequentially in a one-dimensional array of length N*(N+1)/2 . See comments below for details. N INTEGER the order of the matrix A . On Return AP a block diagonal matrix and the multipliers which were used to obtain it stored in packed form. The factorization can be written A = U*D*TRANS(U) where U is a product of permutation and unit upper triangular matrices , TRANS(U) is the t...
CSPCON estimates the reciprocal of the condition number (in the 1-norm) of a complex symmetric packed matrix A using the factorization A = U*D*U**T or A = L*D*L**T computed by CSPTRF. An estimate is obtained for norm(inv(A)), and the reciprocal of the condition number is computed as RCOND = 1 / (ANORM * norm(inv(A))).
On Entry AP COMPLEX (N*(N+1)/2) the output from CSPFA. N INTEGER the order of the matrix A . KVPT INTEGER(N) the pivot vector from CSPFA. WORK COMPLEX(N) work vector. Contents ignored. JOB INTEGER JOB has the decimal expansion AB where if B .NE. 0, the inverse is computed, if A .NE. 0, the determinant is computed. For example, JOB = 11 gives both. On Return Variables not requested by JOB are not used. AP contains the upper triangle of the inverse of the original matrix, stored in packed form. Th...
On Entry AP COMPLEX (N*(N+1)/2) the packed form of a symmetric matrix A . The columns of the upper triangle are stored sequentially in a one-dimensional array of length N*(N+1)/2 . See comments below for details. N INTEGER the order of the matrix A . On Return AP a block diagonal matrix and the multipliers which were used to obtain it stored in packed form. The factorization can be written A = U*D*TRANS(U) where U is a product of permutation and unit upper triangular matrices , TRANS(U) is the t...
CSPR performs the symmetric rank 1 operation where alpha is a complex scalar, x is an n element vector and A is an n by n symmetric matrix, supplied in packed form.
CSPRFS improves the computed solution to a system of linear equations when the coefficient matrix is symmetric indefinite and packed, and provides error bounds and backward error estimates for the solution.
On Entry AP COMPLEX(N*(N+1)/2) the output from CSPFA. N INTEGER the order of the matrix A . KVPT INTEGER(N) the pivot vector from CSPFA. B COMPLEX(N) the right hand side vector. On Return B the solution vector X . Error Condition A division by zero may occur if CSPCO has set RCOND .EQ. 0.0 or CSPFA has set INFO .NE. 0 . To compute INVERSE(A) * C where C is a matrix with P columns CALL CSPFA(AP,N,KVPT,INFO) IF (INFO .NE. 0) GO TO ... DO 10 J = 1, P CALL CSPSL(AP,N,KVPT,C(1,J)) 10 CONTINUE LINPACK...
CSPSV computes the solution to a complex system of linear equations A * X = B, where A is an N-by-N symmetric matrix stored in packed format and X and B are N-by-NRHS matrices. The diagonal pivoting method is used to factor A as A = U * D * U**T, if UPLO = 'U', or A = L * D * L**T, if UPLO = 'L', where U (or L) is a product of permutation and unit upper (lower) triangular matrices, D is symmetric and block diagonal with 1-by-1 and 2-by-2 diagonal blocks. The factored form of A is then used t...
CSPSVX uses the diagonal pivoting factorization A = U*D*U**T or A = L*D*L**T to compute the solution to a complex system of linear equations A * X = B, where A is an N-by-N symmetric matrix stored in packed format and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
CSPTRF computes the factorization of a complex symmetric matrix A stored in packed format using the Bunch-Kaufman diagonal pivoting method: A = U*D*U**T or A = L*D*L**T where U (or L) is a product of permutation and unit upper (lower) triangular matrices, and D is symmetric and block diagonal with 1-by-1 and 2-by-2 diagonal blocks.
CSPTRI computes the inverse of a complex symmetric indefinite matrix A in packed storage using the factorization A = U*D*U**T or A = L*D*L**T computed by CSPTRF.
CSPTRS solves a system of linear equations A*X = B with a complex symmetric matrix A stored in packed format using the factorization A = U*D*U**T or A = L*D*L**T computed by CSPTRF.
Argument Description N (integer) number of elements in each vector CX (complex array) beginning of one vector INCX (integer) memory spacing of successive elements of vector CX CY (complex array) beginning of the other vector INCY (integer) memory spacing of successive elements of vector CY C (real) cosine term of the rotation S (real) sine term of the rotation. PPPPaaaaggggeeee 1111
CSRSCL multiplies an n-element complex vector x by the real scalar 1/a. This is done without overflow or underflow as long as the final result x/a does not overflow or underflow.
CSTEDC computes all eigenvalues and, optionally, eigenvectors of a symmetric tridiagonal matrix using the divide and conquer method. The eigenvectors of a full or band complex Hermitian matrix can also be found if CHETRD or CHPTRD or CHBTRD has been used to reduce this matrix to tridiagonal form. This code makes very mild assumptions about floating point arithmetic. It will work on machines with a guard digit in add/subtract, or on those binary machines without guard digits which subtract like t...
CSTEIN computes the eigenvectors of a real symmetric tridiagonal matrix T corresponding to specified eigenvalues, using inverse iteration. The maximum number of iterations allowed for each eigenvector is specified by an internal parameter MAXITS (currently set to 5). Although the eigenvectors are real, they are stored in a complex array, which may be passed to CUNMTR or CUPMTR for back transformation to the eigenvectors of a complex Hermitian matrix which was reduced to tridiagonal form....
CSTEQR computes all eigenvalues and, optionally, eigenvectors of a symmetric tridiagonal matrix using the implicit QL or QR method. The eigenvectors of a full or band complex Hermitian matrix can also be found if CHETRD or CHPTRD or CHBTRD has been used to reduce this matrix to tridiagonal form.
On Entry X COMPLEX(LDX,P), where LDX .GE. N. X contains the matrix whose singular value decomposition is to be computed. X is destroyed by CSVDC. LDX INTEGER. LDX is the leading dimension of the array X. N INTEGER. N is the number of columns of the matrix X. P INTEGER. P is the number of rows of the matrix X. LDU INTEGER. LDU is the leading dimension of the array U (see below). LDV INTEGER. LDV is the leading dimension of the array V (see below). WORK COMPLEX(N). WORK is a scratch array. JOB INT...
CSYCON estimates the reciprocal of the condition number (in the 1-norm) of a complex symmetric matrix A using the factorization A = U*D*U**T or A = L*D*L**T computed by CSYTRF. An estimate is obtained for norm(inv(A)), and the reciprocal of the condition number is computed as RCOND = 1 / (ANORM * norm(inv(A))).
CSYRFS improves the computed solution to a system of linear equations when the coefficient matrix is symmetric indefinite, and provides error bounds and backward error estimates for the solution.
CSYSV computes the solution to a complex system of linear equations A * X = B, where A is an N-by-N symmetric matrix and X and B are Nby-NRHS matrices. The diagonal pivoting method is used to factor A as A = U * D * U**T, if UPLO = 'U', or A = L * D * L**T, if UPLO = 'L', where U (or L) is a product of permutation and unit upper (lower) triangular matrices, and D is symmetric and block diagonal with 1-by-1 and 2-by-2 diagonal blocks. The factored form of A is then used to solve the system of...
CSYSVX uses the diagonal pivoting factorization to compute the solution to a complex system of linear equations A * X = B, where A is an N-by-N symmetric matrix and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
CSYTF2 computes the factorization of a complex symmetric matrix A using the Bunch-Kaufman diagonal pivoting method: A = U*D*U' or A = L*D*L' where U (or L) is a product of permutation and unit upper (lower) triangular matrices, U' is the transpose of U, and D is symmetric and block diagonal with 1-by-1 and 2-by-2 diagonal blocks. This is the unblocked version of the algorithm, calling Level 2 BLAS....
CSYTRF computes the factorization of a complex symmetric matrix A using the Bunch-Kaufman diagonal pivoting method. The form of the factorization is A = U*D*U**T or A = L*D*L**T where U (or L) is a product of permutation and unit upper (lower) triangular matrices, and D is symmetric and block diagonal with with 1- by-1 and 2-by-2 diagonal blocks. This is the blocked version of the algorithm, calling Level 3 BLAS....
CSYTRS solves a system of linear equations A*X = B with a complex symmetric matrix A using the factorization A = U*D*U**T or A = L*D*L**T computed by CSYTRF.
CTBCON estimates the reciprocal of the condition number of a triangular band matrix A, in either the 1-norm or the infinity-norm. The norm of A is computed and an estimate is obtained for norm(inv(A)), then the reciprocal of the condition number is computed as RCOND = 1 / ( norm(A) * norm(inv(A)) ).
CTBRFS provides error bounds and backward error estimates for the solution to a system of linear equations with a triangular band coefficient matrix. The solution matrix X must be computed by CTBTRS or some other means before entering this routine. CTBRFS does not do iterative refinement because doing so cannot improve the backward error.
CTBTRS solves a triangular system of the form where A is a triangular band matrix of order N, and B is an N-by-NRHS matrix. A check is made to verify that A is nonsingular.
ctermid generates the path name of the controlling terminal for the current process, and stores it in a string. If s is a NULL pointer, the string is stored in an internal static area, the contents of which are overwritten at the next call to ctermid, and the address of which is returned. Otherwise, s is assumed to point to a character array of at least L_ctermid elements; the path name is placed in this array and the ...
CTGEVC computes some or all of the right and/or left generalized eigenvectors of a pair of complex upper triangular matrices (A,B). The right generalized eigenvector x and the left generalized eigenvector y of (A,B) corresponding to a generalized eigenvalue w are defined by: (A - wB) * x = 0 and y**H * (A - wB) = 0 where y**H denotes the conjugate tranpose of y. If an eigenvalue w is determined by zero diagonal elements of both A and B, a unit vector is returned as the corresponding eigenvector....
CTGSJA computes the generalized singular value decomposition (GSVD) of two complex upper triangular (or trapezoidal) matrices A and B. On entry, it is assumed that matrices A and B have the following forms, which may be obtained by the preprocessing subroutine CGGSVP from a general M-by-N matrix A and P-by-N matrix B: N-K-L K L A = K ( 0 A12 A13 ) if M-K-L >= 0; L ( 0 0 A23 ) M-K-L ( 0 0 0 ) N-K-L K L A = K ( 0 A12 A13 ) if M-K-L < 0; M-K ( 0 0 A23 ) N-K-L K L B = L ( 0 0 B13 ) P-L ( 0 0 0 ) whe...
ctime, ctime_r, localtime, localtime_r, gmtime, and gmtime_r accept arguments of type time_t, pointed to by clock, representing the time in seconds since 00:00:00 UTC, January 1, 1970. ctime and ctime_r return a pointer to a 26-character string as shown below. Time zone and daylight savings corrections are ...
CTPCON estimates the reciprocal of the condition number of a packed triangular matrix A, in either the 1-norm or the infinity-norm. The norm of A is computed and an estimate is obtained for norm(inv(A)), then the reciprocal of the condition number is computed as RCOND = 1 / ( norm(A) * norm(inv(A)) ).
CTPRFS provides error bounds and backward error estimates for the solution to a system of linear equations with a triangular packed coefficient matrix. The solution matrix X must be computed by CTPTRS or some other means before entering this routine. CTPRFS does not do iterative refinement because doing so cannot improve the backward error.
CTPTRS solves a triangular system of the form where A is a triangular matrix of order N stored in packed format, and B is an N-by-NRHS matrix. A check is made to verify that A is nonsingular.
On Entry T COMPLEX(LDT,N) T contains the triangular matrix. The zero elements of the matrix are not referenced, and the corresponding elements of the array can be used to store other information. LDT INTEGER LDT is the leading dimension of the array T. N INTEGER N is the order of the system. JOB INTEGER = 0 T is lower triangular. = nonzero T is upper triangular. On Return RCOND REAL an estimate of the reciprocal condition of T . For the system T*X = B , relative perturbations in T and B of size ...
CTRCON estimates the reciprocal of the condition number of a triangular matrix A, in either the 1-norm or the infinity-norm. The norm of A is computed and an estimate is obtained for norm(inv(A)), then the reciprocal of the condition number is computed as RCOND = 1 / ( norm(A) * norm(inv(A)) ).
On Entry T COMPLEX(LDT,N) T contains the triangular matrix. The zero elements of the matrix are not referenced, and the corresponding elements of the array can be used to store other information. LDT INTEGER LDT is the leading dimension of the array T. N INTEGER N is the order of the system. JOB INTEGER = 010 no det, inverse of lower triangular. = 011 no det, inverse of upper triangular. = 100 det, no inverse. = 110 det, inverse of lower triangular. = 111 det, inverse of upper triangular. On Ret...
CTREVC computes some or all of the right and/or left eigenvectors of a complex upper triangular matrix T. The right eigenvector x and the left eigenvector y of T corresponding to an eigenvalue w are defined by: T*x = w*x, y'*T = w*y' where y' denotes the conjugate transpose of the vector y. If all eigenvectors are requested, the routine may either return the matrices X and/or Y of right or left eigenvectors of T, or the products Q*X and/or Q*Y, where Q is an input unitary matrix. If T was obt...
CTREXC reorders the Schur factorization of a complex matrix A = Q*T*Q**H, so that the diagonal element of T with row index IFST is moved to row ILST. The Schur form T is reordered by a unitary similarity transformation Z**H*T*Z, and optionally the matrix Q of Schur vectors is updated by postmultplying it with Z.
CTRRFS provides error bounds and backward error estimates for the solution to a system of linear equations with a triangular coefficient matrix. The solution matrix X must be computed by CTRTRS or some other means before entering this routine. CTRRFS does not do iterative refinement because doing so cannot improve the backward error.
CTRSEN reorders the Schur factorization of a complex matrix A = Q*T*Q**H, so that a selected cluster of eigenvalues appears in the leading positions on the diagonal of the upper triangular matrix T, and the leading columns of Q form an orthonormal basis of the corresponding right invariant subspace. Optionally the routine computes the reciprocal condition numbers of the cluster of eigenvalues and/or the invariant subspace....
On Entry T COMPLEX(LDT,N) T contains the matrix of the system. The zero elements of the matrix are not referenced, and the corresponding elements of the array can be used to store other information. LDT INTEGER LDT is the leading dimension of the array T. N INTEGER N is the order of the system. B COMPLEX(N). B contains the right hand side of the system. JOB INTEGER JOB specifies what kind of system is to be solved. If JOB is 00 solve T*X = B, T lower triangular, 01 solve T*X = B, T upper triangu...
CTRSNA estimates reciprocal condition numbers for specified eigenvalues and/or right eigenvectors of a complex upper triangular matrix T (or of any matrix Q*T*Q**H with Q unitary).
CTRSYL solves the complex Sylvester matrix equation: op(A)*X + X*op(B) = scale*C or op(A)*X - X*op(B) = scale*C, where op(A) = A or A**H, and A and B are both upper triangular. A is Mby-M and B is N-by-N; the right hand side C and the solution X are M-byN; and scale is an output scale factor, set <= 1 to avoid overflow in X.
CTRTRS solves a triangular system of the form where A is a triangular matrix of order N, and B is an N-by-NRHS matrix. A check is made to verify that A is nonsingular.
These macros classify character-coded integer values. Each is a predicate returning non-zero for true, zero for false. The behavior of these macros, except for isascii, is affected by the current locale [see setlocale(3C)]. To modify the behavior, change the LC_TYPE category in setlocale, that is, setlocale (LC_CTYPE, newlocale). In the C locale, or in a...
CTZRQF reduces the M-by-N ( M<=N ) complex upper trapezoidal matrix A to upper triangular form by means of unitary transformations. The upper trapezoidal matrix A is factored as A = ( R 0 ) * Z, where Z is an N-by-N unitary matrix and R is an M-by-M upper triangular matrix.
CUNG2L generates an m by n complex matrix Q with orthonormal columns, which is defined as the last n columns of a product of k elementary reflectors of order m Q = H(k) . . . H(2) H(1) as returned by CGEQLF.
CUNG2R generates an m by n complex matrix Q with orthonormal columns, which is defined as the first n columns of a product of k elementary reflectors of order m Q = H(1) H(2) . . . H(k) as returned by CGEQRF.
CUNGBR generates one of the complex unitary matrices Q or P**H determined by CGEBRD when reducing a complex matrix A to bidiagonal form: A = Q * B * P**H. Q and P**H are defined as products of elementary reflectors H(i) or G(i) respectively. If VECT = 'Q', A is assumed to have been an M-by-K matrix, and Q is of order M: if m >= k, Q = H(1) H(2) . . . H(k) and CUNGBR returns the first n columns of Q, where m >= n >= k; if m < k, Q = H(1) H(2) . . . H(m-1) and CUNGBR returns Q as an M-by-M matri...
CUNGHR generates a complex unitary matrix Q which is defined as the product of IHI-ILO elementary reflectors of order N, as returned by CGEHRD: Q = H(ilo) H(ilo+1) . . . H(ihi-1).
CUNGL2 generates an m-by-n complex matrix Q with orthonormal rows, which is defined as the first m rows of a product of k elementary reflectors of order n Q = H(k)' . . . H(2)' H(1)' as returned by CGELQF.
CUNGLQ generates an M-by-N complex matrix Q with orthonormal rows, which is defined as the first M rows of a product of K elementary reflectors of order N Q = H(k)' . . . H(2)' H(1)' as returned by CGELQF.
CUNGQL generates an M-by-N complex matrix Q with orthonormal columns, which is defined as the last N columns of a product of K elementary reflectors of order M Q = H(k) . . . H(2) H(1) as returned by CGEQLF.
CUNGQR generates an M-by-N complex matrix Q with orthonormal columns, which is defined as the first N columns of a product of K elementary reflectors of order M Q = H(1) H(2) . . . H(k) as returned by CGEQRF.
CUNGR2 generates an m by n complex matrix Q with orthonormal rows, which is defined as the last m rows of a product of k elementary reflectors of order n Q = H(1)' H(2)' . . . H(k)' as returned by CGERQF.
CUNGRQ generates an M-by-N complex matrix Q with orthonormal rows, which is defined as the last M rows of a product of K elementary reflectors of order N Q = H(1)' H(2)' . . . H(k)' as returned by CGERQF.
CUNGTR generates a complex unitary matrix Q which is defined as the product of n-1 elementary reflectors of order N, as returned by CHETRD: if UPLO = 'U', Q = H(n-1) . . . H(2) H(1), if UPLO = 'L', Q = H(1) H(2) . . . H(n-1).
CUNM2L overwrites the general complex m-by-n matrix C with where Q is a complex unitary matrix defined as the product of k elementary reflectors Q = H(k) . . . H(2) H(1) as returned by CGEQLF. Q is of order m if SIDE = 'L' and of order n if SIDE = 'R'.
CUNM2R overwrites the general complex m-by-n matrix C with where Q is a complex unitary matrix defined as the product of k elementary reflectors Q = H(1) H(2) . . . H(k) as returned by CGEQRF. Q is of order m if SIDE = 'L' and of order n if SIDE = 'R'.
If VECT = 'Q', CUNMBR overwrites the general complex M-by-N matrix C with SIDE = 'L' SIDE = 'R' TRANS = 'N': Q * C C * Q TRANS = 'C': Q**H * C C * Q**H If VECT = 'P', CUNMBR overwrites the general complex M-by-N matrix C with SIDE = 'L' SIDE = 'R' TRANS = 'N': P * C C * P TRANS = 'C': P**H * C C * P**H Here Q and P**H are the unitary matrices determined by CGEBRD when reducing a complex matrix A to bidiagonal form: A = Q * B * P**H. Q and P**H are defined as products of eleme...
CUNMHR overwrites the general complex M-by-N matrix C with TRANS = 'C': Q**H * C C * Q**H where Q is a complex unitary matrix of order nq, with nq = m if SIDE = 'L' and nq = n if SIDE = 'R'. Q is defined as the product of IHI-ILO elementary reflectors, as returned by CGEHRD: Q = H(ilo) H(ilo+1) . . . H(ihi-1).
CUNML2 overwrites the general complex m-by-n matrix C with where Q is a complex unitary matrix defined as the product of k elementary reflectors Q = H(k)' . . . H(2)' H(1)' as returned by CGELQF. Q is of order m if SIDE = 'L' and of order n if SIDE = 'R'.
CUNMLQ overwrites the general complex M-by-N matrix C with TRANS = 'C': Q**H * C C * Q**H where Q is a complex unitary matrix defined as the product of k elementary reflectors Q = H(k)' . . . H(2)' H(1)' as returned by CGELQF. Q is of order M if SIDE = 'L' and of order N if SIDE = 'R'.
CUNMQL overwrites the general complex M-by-N matrix C with TRANS = 'C': Q**H * C C * Q**H where Q is a complex unitary matrix defined as the product of k elementary reflectors Q = H(k) . . . H(2) H(1) as returned by CGEQLF. Q is of order M if SIDE = 'L' and of order N if SIDE = 'R'.
CUNMQR overwrites the general complex M-by-N matrix C with TRANS = 'C': Q**H * C C * Q**H where Q is a complex unitary matrix defined as the product of k elementary reflectors Q = H(1) H(2) . . . H(k) as returned by CGEQRF. Q is of order M if SIDE = 'L' and of order N if SIDE = 'R'.
CUNMR2 overwrites the general complex m-by-n matrix C with where Q is a complex unitary matrix defined as the product of k elementary reflectors Q = H(1)' H(2)' . . . H(k)' as returned by CGERQF. Q is of order m if SIDE = 'L' and of order n if SIDE = 'R'.
CUNMRQ overwrites the general complex M-by-N matrix C with TRANS = 'C': Q**H * C C * Q**H where Q is a complex unitary matrix defined as the product of k elementary reflectors Q = H(1)' H(2)' . . . H(k)' as returned by CGERQF. Q is of order M if SIDE = 'L' and of order N if SIDE = 'R'.
CUNMTR overwrites the general complex M-by-N matrix C with TRANS = 'C': Q**H * C C * Q**H where Q is a complex unitary matrix of order nq, with nq = m if SIDE = 'L' and nq = n if SIDE = 'R'. Q is defined as the product of nq-1 elementary reflectors, as returned by CHETRD: if UPLO = 'U', Q = H(nq-1) . . . H(2) H(1); if UPLO = 'L', Q = H(1) H(2) . . . H(nq-1).
CUPGTR generates a complex unitary matrix Q which is defined as the product of n-1 elementary reflectors H(i) of order n, as returned by CHPTRD using packed storage: if UPLO = 'U', Q = H(n-1) . . . H(2) H(1), if UPLO = 'L', Q = H(1) H(2) . . . H(n-1).
CUPMTR overwrites the general complex M-by-N matrix C with TRANS = 'C': Q**H * C C * Q**H where Q is a complex unitary matrix of order nq, with nq = m if SIDE = 'L' and nq = n if SIDE = 'R'. Q is defined as the product of nq-1 elementary reflectors, as returned by CHPTRD using packed storage: if UPLO = 'U', Q = H(nq-1) . . . H(2) H(1); if UPLO = 'L', Q = H(1) H(2) . . . H(nq-1).
n expects an index into the cursor table created by defcursor. xorign expects the x distance of the origin relative to the lower left corner of the cursor. yorign expects the y distance of the origin relative to the lower left corner of the cursor.
The curses library routines give the user a terminal-independent method of updating character screens with reasonable optimization. A program using these routines must be compiled with the -lcurses option of cc. The curses package allows: overall screen, window and pad manipulation; output to windows and pads; reading terminal input; control over terminal and curses input and output options; environment query rou...
type expects one of five values that describe the cursor: C16X1: the default, a 16x16 bitmap cursor of no more than one color. C16X2: a 16x16 bitmap cursor of no more than three colors. C32X1: a 32x32 bitmap cursor of no more than one color. C32X2: a 32x32 bitmap cursor of no more than three colors. CCROSS: a cross-hair cursor.
The addch, waddch, mvaddch, and mvwaddch routines put the character ch into the window at the current cursor position of the window and advance the position of the window cursor. Their function is similar to that of putchar. At the right margin, an automatic newline is performed. At the bottom of the scrolling region, if scrollok is enabled, the scrolling region is scrolled ...
All of these routines copy chstr directly into the window image structure starting at the current cursor position. The four routines with n as the last argument copy at most n elements, but no more than will fit on the line. If n=-1 then the whole string is copied, to the maximum number that fit on the line. The position of the window cursor is not advanced. These routines work faster than waddnstr because they merely copy chstr into the window image structure. O...
All of these routines write all the characters of the null-terminated character string str on the given window. The effect is similar to calling waddch once for each character in the string. The four routines with n as the last argument write at most n characters. If n is negative, then the entire string will be added.
The addwch, waddwch, mvaddwch, and mvwaddwch routines put the character wch, holding a wchar_t character, into the window at the current cursor position of the window and advance the position of the window cursor. Their function is similar to that of putwchar in the C multibyte library. At the right margin, an automatic newline is performed. At the bottom of the scr...
All of these routines copy wchstr, which points to a string of wchar_t characters, directly into the window image structure starting at the current cursor position. The four routines with n as the last argument copy at most n elements, but no more than will fit on the line. If n=-1 then the whole string is copied, to the maximum number that fit on the line. The position of the window cursor is not advanced. These routines work faster than waddnws
All of these routines write all the characters of the null-terminated wchar_t character string str on the given window. The effect is similar to calling waddwch once for each wchar_t character in the string. The four routines with n as the last argument write at most n wchar_t characters. If n is negative, then the entire string will be added....
All of these routines manipulate the current attributes of the named window. The current attributes of a window are applied to all characters that are written into the window with waddch, waddstr and wprintw. Attributes are a property of the character, and move with the character through any scrolling and insert/delete line/character operations. To the extent possible on the particular terminal, they are displayed as the graphic renditi...
The beep and flash routines are used to signal the terminal user. The routine beep sounds the audible alarm on the terminal, if possible; if that is not possible, it flashes the screen (visible bell), if that is possible. The routine flash flashes the screen, and if that is not possible, sounds the audible signal. If neither signal is possible, nothing happens. Nearly all terminals have an audible signal (bell or beep), but only some can flas...
The bkgdset and wbkgdset routines manipulate the background of the named window. Background is a chtype consisting of any combination of attributes and a character. The attribute part of the background is combined (ORed) with all non-blank characters that are written into the window with waddch. Both the character and attribute parts of the background are combined with the blank characters. The background becomes a ...
With the border, wborder and box routines, a border is drawn around the edges of the window. The argument ls is a character and attributes used for the left side of the border, rs - right side, ts - top side, bs - bottom side, tl - top left-hand corner, tr - top right-hand corner, bl - bottom left-hand corner, and br - bottom right-hand corner. If any of these arguments is zero, then the following default values (defined in curses...
The erase and werase routines copy blanks to every position in the window. The clear and wclear routines are like erase and werase, but they also call clearok, so that the screen is cleared completely on the next call to wrefresh for that window and repainted from scratch. The clrtobot and wclrtobot rout...
Overview curses provides routines that manipulate color on color alphanumeric terminals. To use these routines start_color must be called, usually right after initscr. Colors are always used in pairs (referred to as color-pairs). A color-pair consists of a foreground color (for characters) and a background color (for the field on which the characters are displayed). A programmer initializes a color-pair with the routine i...
With these routines the character under the cursor in the window is deleted; all characters to the right of the cursor on the same line are moved to the left one position and the last character on the line is filled with a blank. The cursor position does not change (after moving to y, x, if specified). (This does not imply use of the hardware delete character feature.)
With the deleteln and wdeleteln routines, the line under the cursor in the window is deleted; all lines below the current line are moved up one line. The bottom line of the window is cleared. The cursor position does not change. (This does not imply use of a hardware delete line feature.) With the insdelln and winsdelln routines, for positive n, insert n lines into the specified window above the...
The getch, wgetch, mvgetch, and mvwgetch routines read a character from the terminal associated with the window. In no-delay mode, if no input is waiting, the value ERR is returned. In delay mode, the program waits until the system passes text through to the program. Depending on the setting of cbreak, this is after one character (cbreak mode), or after the first newline (
The effect of getstr is as though a series of calls to getch were made, until a newline and carriage return is received. The resulting value is placed in the area pointed to by the character pointer str. wgetnstr reads at most n characters, thus preventing a possible overflow of the input buffer. The user's erase and kill characters are interpreted, as well as any special keys (such as function keys, ``home'' key, ``clear'' key, and s...
The getwch, wgetwch, mvgetwch, and mvwgetwch routines read an EUC character from the terminal associated with the window, transform it into a wchar_t character, and return a wchar_t character. In no-delay mode, if no input is waiting, the value ERR is returned. In delay mode, the program waits until the system passes text through to the program. Depending on the ...
The effect of getwstr is as though a series of calls to getwch were made, until a newline and carriage return is received. The resulting value is placed in the area pointed to by the wchar_t pointer str. getnwstr reads at most n wchar_t characters, thus preventing a possible overflow of the input buffer. The user's erase and kill characters are interpreted, as well as any special keys (such as fun...
With the getyx macro, the cursor position of the window is placed in the two integer variables y and x. With the getparyx macro, if win is a subwindow, the beginning coordinates of the subwindow relative to the parent window are placed into two integer variables, y and x. Otherwise, -1 is placed into y and x. Like getyx, the getbegyx and getmaxyx macros store the current beginning coordina...
These routines return the character, of type chtype, at the current position in the named window. If any attributes are set for that position, their values are OR-ed into the value returned. Constants defined in curses.h can be used with the & (logical AND) operator to extract the character or attributes alone.
These routines return a string of type chtype, starting at the current cursor position in the named window and ending at the right margin of the window. The four functions with n as the last argument, return the string at most n characters long. Constants defined in curses.h can be used with the & (logical AND) operator to extract the character or the attribute alone from any position in the chstr [see curs_inch(3X)]....
initscr is almost always the first routine that should be called (the exceptions are slk_init, filter, ripoffline, use_env and, for multipleterminal applications, newterm.) This determines the terminal type and initializes all curses data structures. initscr also causes the first call to refresh to clear the s...
The cbreak and nocbreak routines put the terminal into and out of cbreak mode, respectively. In this mode, characters typed by the user are immediately available to the program, and erase/kill character-processing is not performed. When out of this mode, the tty driver buffers the typed characters until a newline or carriage return is typed. Interrupt and flow control characters are unaffected by this mode. Initially the terminal may or...
These routines insert the character ch before the character under the cursor. All characters to the right of the cursor are moved one space to the right, with the possibility of the rightmost character on the line being lost. The cursor position does not change (after moving to y, x, if specified). (This does not imply use of the hardware insert character feature.)
These routines insert a character string (as many characters as will fit on the line) before the character under the cursor. All characters to the right of the cursor are moved to the right, with the possibility of the rightmost characters on the line being lost. The cursor position does not change (after moving to y, x, if specified). (This does not imply use of the hardware insert character feature.) The four routines with n as the last argument insert at most n characters. If n<=0, then the e...
These routines return the string of characters in str starting at the current cursor position in the named window and ending at the right margin of the window. Attributes are stripped from the characters. The four functions with n as the last argument return the string at most n characters long.
These routines insert the character wch, holding a wchar_t character, before the character under the cursor. All characters to the right of the cursor are moved one space to the right, with the possibility of the rightmost character on the line being lost. The cursor position does not change (after moving to y, x, if specified). (This does not imply use of the hardware insert character feature.)...
These routines insert a wchar_t character string (as many wchar_t characters as will fit on the line) before the character under the cursor. All characters to the right of the cursor are moved to the right, with the possibility of the rightmost characters on the line being lost. The cursor position does not change (after moving to y, x, if specified). (This does not imply use of the hardware insert character feature.) The four routines with n as the last argum...
These routines return the wchar_t character, of type chtype, at the current position in the named window. If any attributes are set for that position, their values are OR-ed into the value returned. Constants defined in <curses.h> can be used with the & (logical AND) operator to extract the character or attributes alone.
These routines return a string of type chtype, holding wchar_t characters, starting at the current cursor position in the named window and ending at the right margin of the window. The four functions with n as the last argument, return the string at most n wchar_t characters long. Constants defined in <curses.h> can be used with the & (logical AND) operator to extract the wchar_t character or...
These routines return the string of wchar_t characters in str starting at the current cursor position in the named window and ending at the right margin of the window. Attributes are stripped from the characters. The four functions with n as the last argument return the string at most n wchar_t characters long.
The following routines give low-level access to various curses functionality. Theses routines typically are used inside library routines. The def_prog_mode and def_shell_mode routines save the current terminal modes as the "program" (in curses) or "shell" (not in curses) state for use by the reset_prog_mode and reset_...
With these routines, the cursor associated with the window is moved to line y and column x. This routine does not move the physical cursor of the terminal until refresh is called. The position specified is relative to the upper left-hand corner of the window, which is (0,0).
These routines set options that deal with output within curses. All options are initially FALSE, unless otherwise stated. It is not necessary to turn these options off before calling endwin. With the clearok routine, if enabled (bf is TRUE), the next call to wrefresh with this window will clear the screen completely and redraw the entire screen from scratch. This is useful when the content...
The overlay and overwrite routines overlay srcwin on top of dstwin. scrwin and dstwin are not required to be the same size; only text where the two windows overlap is copied. The difference is that overlay is non-destructive (blanks are not copied) whereas overwrite is destructive. The copywin routine provides a finer granularity of control over the overlay an...
The newpad routine creates and returns a pointer to a new pad data structure with the given number of lines, nlines, and columns, ncols. A pad is like a window, except that it is not necessarily associated with a viewable part of the screen. Automatic refreshes of pads (e.g., from scrolling or echoing of input) do not occur. It is not legal to call wrefresh with a pad as an argument; the routines prefresh or pnout
The printw, wprintw, mvprintw and mvwprintw routines are analogous to printf [see printf(3S)]. In effect, the string that would be output by printf is output instead as though waddstr were used on the given window. The vwprintw routine is analogous to vprintf [see vprintf...
The refresh and wrefresh routines (or wnoutrefresh and doupdate) must be called to get any output on the terminal, as other routines merely manipulate data structures. The routine wrefresh copies the named window to the physical terminal screen, taking into account what is already there in order to do optimizations. The refresh routine is the same,...
The scanw, wscanw and mvscanw routines correspond to scanf [see scanf(3S)]. The effect of these routines is as though wgetstr were called on the window, and the resulting line used as input for the scan. Fields which do not map to a variable in the fmt field are lost. The vwscanw routine is similar to vwprintw in that it performs a wsca...
With the scroll routine, the window is scrolled up one line. This involves moving the lines in the window data structure. As an optimization, if the scrolling region of the window is the entire screen, the physical screen is scrolled at the same time. With the scrl and wscrl routines, for positive n scroll the window up n lines (line i+n becomes i); otherwise scroll the window down n lines. This involves moving the lines in the window character image ...
With the scr_dump routine, the current contents of the virtual screen are written to the file filename. With the scr_restore routine, the virtual screen is set to the contents of filename, which must have been written using scr_dump. The next call to doupdate restores the screen to the way it looked in the dump file. With the scr_init routine, the contents of filename are read in ...
curses manipulates the set of soft function-key labels that exist on many terminals. For those terminals that do not have soft labels, curses takes over the bottom line of stdscr, reducing the size of stdscr and the variable LINES. curses standardizes on eight labels of up to eight characters each. To use soft labels, the slk_init routine must be called before in...
The baudrate routine returns the output speed of the terminal. The number returned is in bits per second, for example 9600, and is an integer. With the erasechar routine, the user's current erase character is returned. The has_ic routine is true if the terminal has insert- and deletecharacter capabilities. The has_il routine is true if the terminal has insert- and delete-line capabilities, or can simula...
These routines are included as a conversion aid for programs that use the termcap library. Their parameters are the same and the routines are emulated using the terminfo database. These routines are supported at Level 2 and should not be used in new applications. The tgetent routine looks up the termcap entry for name. The emulation ignores the buffer pointer bp. The tgetflag routine gets the boolean entry for id. The tgetnum rout...
These low-level routines must be called by programs that have to deal directly with the terminfo database to handle certain terminal capabilities, such as programming function keys. For all other functionality, curses routines are more suitable and their use is recommended. Initially, setupterm should be called. Note that setupterm is automatically called by initscr and ne
The touchwin and touchline routines throw away all optimization information about which parts of the window have been touched, by pretending that the entire window has been drawn on. This is sometimes necessary when using overlapping windows, since a change to one window affects the other window, but the records of which lines have been changed in the other window do not reflect the change. The routine touchline only p...
The unctrl macro expands to a character string which is a printable representation of the character c. Control characters are displayed in the ^X notation. Printing characters are displayed as is. With the keyname routine, a character string corresponding to the key c is returned. The filter routine, if used, is called before initscr or newterm are called. It makes curses think...
The newwin routine creates and returns a pointer to a new window with the given number of lines, nlines, and columns, ncols. The upper left-hand corner of the window is at line begin_y, column begin_x. If either nlines or ncols is zero, they default to LINES - begin_y and COLS - begin_x. A new full-screen window is created by calling newwin(0,0,0,0). The delwin routine deletes the na...
basid expects the basis identifier of the basis matrix you want to use when drawing a curve. (You must have previously called defbasis to assign a basis identifier to a basis matrix.)
cuserid generates a character-string representation of the login name that the owner of the current process is logged in under. If s is a NULL pointer, this representation is generated in an internal static area, the address of which is returned. Otherwise, s is assumed to point to an array of at least L_cuserid characters; the representation is left in this array. The constant L_cuserid is defined in the st
The getcwd() function re-implements the getcw ) functions in Perl. The fastcwd() function looks the same as getcwd(), but runs faster. It's also more dangerous because it might conceivably chdir() you out of a directory that it can't chdir() you back into. If fastcwd encounters a problem it will return undef but will probably leave you in a different directory. For a measure of extra security, if everything appears to have worked, the fastcwd() function will check that it leaves you in the sam...
duration expects the number of vertical traces before switching to the map named by nxtmap. map expects the number of the map to use before completing the number of vertical sweeps specified by duration. nxtmap expects the number of the map to use after completing the number of vertical sweeps specified by duration.
The _daemonize function does the common work needed ``to put a function into the background,'' or to make it into a ``daemon.'' That generally includes forking a new process, closing most files, and releasing the controlling tty. If flags & _DF_NOFORK is 0, then a new process in a new session is started. Debugging is often easier with flags set to contain _DF_NOFORK. If flags & _DF_NOCHDIR is 0, then the current working directory is changed to /. Otherwise, the current working directory is u...
Data pipes are dynamic connections between two hardware devices that support peer-to-peer data transfers. These connections are created by an application to process a data stream from a source device to a sink device. The purpose is to have minimum system impact during I/O operations. dpipeCreate creates a data pipe between two file descriptors: src_fd is the source file descriptor, and sink_fd is the sink file descriptor. Either file descriptor can refer to a regular file, a special device file...
DBDSQR computes the singular value decomposition (SVD) of a real N-by-N (upper or lower) bidiagonal matrix B: B = Q * S * P' (P' denotes the transpose of P), where S is a diagonal matrix with non-negative diagonal elements (the singular values of B), and Q and P are orthogonal matrices. The routine computes S, and optionally computes U * Q, P' * VT, or Q' * C, for given real input matrices U, VT, and C. See "Computing Small Singular Values of Bidiagonal Matrices With Guaranteed High Relativ...
These functions perform conversion from one data type to another. The function int converts to integer from its integer, real*4, double precision, real*16, complex, double complex, or complex*32 argument. If the argument is real, integer, real*4, double precision, or real*16 int returns the integer whose magnitude is the largest integer that does not exceed the magnitude of the argument and whose sign is the same as the sign of the argument (i.e. truncation). For complex the above rule is applie...
Note: the dbm library has been superseded by ndbm(3B), and is now implemented using ndbm. These functions maintain key/content pairs in a data base. The dbm functions will handle very large (a billion blocks) databases and will access a keyed item in one or two file system accesses. The dbm64 routines are identical to their dbm counterparts except that they can be used to operate on data bases larger than 2 Gigabytes. Page 1 DBM(3B) DBM(3B) Keys and contents are described by the datum typedef. A...
Dbopen is the library interface to database files. The supported file formats are btree, hashed and UNIX file oriented. The btree format is a representation of a sorted, balanced tree structure. The hashed format is an extensible, dynamic hashing scheme. The flat-file format is a byte stream file with fixed or variable length records. The formats and file format specific information are described in detail in their respective manual pages btree(3), hash(3) and recno(3). Dbopen opens file for rea...
DB_File is a module which allows Perl programs to make use of the facilities provided by Berkeley DB version 1.x (if you have a newer version of DB, see the section on Using DB_File with Berkeley DB version 2). It is assumed that you have a copy of the Berkeley DB manual pages at hand when reading this documentation. The interface defined here mirrors the Berkeley DB interface closely. Berkeley DB is a C library which provides a consistent interface to a number of database formats. DB_File provi...
On Entry A DOUBLE PRECISION(LDA,P). A contains the matrix whose decomposition is to be computed. Only the upper half of A need be stored. The lower part of the array A is not referenced. LDA INTEGER. LDA is the leading dimension of the array A. P INTEGER. P is the order of the matrix. WORK DOUBLE PRECISION. WORK is a work array. JPVT INTEGER(P). JPVT contains integers that control the selection of the pivot elements, if pivoting has been requested. Each diagonal element A(K,K) is placed in one o...
On Entry R DOUBLE PRECISION(LDR,P), where LDR .GE. P. R contains the upper triangular matrix that is to be downdated. The part of R below the diagonal is not referenced. LDR INTEGER. LDR is the leading dimension of the array R. P INTEGER. P is the order of the matrix R. Page 1 DCHDD(3F) DCHDD(3F) X DOUBLE PRECISION(P). X contains the row vector that is to be removed from R. X is not altered by DCHDD. Z DOUBLE PRECISION(LDZ,N)Z), where LDZ .GE. P. Z is an array of NZ P-vectors which are to be dow...
On Entry R DOUBLE PRECISION(LDR,P), where LDR .GE. P. R contains the upper triangular factor that is to be updated. Elements of R below the diagonal are not referenced. LDR INTEGER. LDR is the leading dimension of the array R. P INTEGER. P is the order of the matrix R. K INTEGER. K is the first column to be permuted. L INTEGER. L is the last column to be permuted. L must be strictly greater than K. Z DOUBLE PRECISION(LDZ,N)Z), where LDZ .GE. P. Z is an array of NZ P-vectors into which the transf...
On Entry R DOUBLE PRECISION(LDR,P), where LDR .GE. P. R contains the upper triangular matrix that is to be updated. The part of R below the diagonal is not referenced. LDR INTEGER. LDR is the leading dimension of the array R. P INTEGER. P is the order of the matrix R. X DOUBLE PRECISION(P). X contains the row to be added to R. X is not altered by DCHUD. Page 1 DCHUD(3F) DCHUD(3F) Z DOUBLE PRECISION(LDZ,N)Z), where LDZ .GE. P. Z is an array containing NZ P-vectors to be updated with R. LDZ INTEGE...
DDISNA computes the reciprocal condition numbers for the eigenvectors of a real symmetric or complex Hermitian matrix or for the left or right singular vectors of a general m-by-n matrix. The reciprocal condition number is the 'gap' between the corresponding eigenvalue or singular value and the nearest other one. The bound on the error, measured by angle in radians, in the I-th computed vector is given by DLAMCH( 'E' ) * ( ANORM / SEP( I ) ) where ANORM = 2-norm(A) = max( abs( D(j) ) ). SEP(...
id expects the basis matrix identifier you want to assign to the matrix at mat. mat expects the matrix to which you want to assign the basis matrix identifier, id.
n expects the constant you want to assign as a cursor name. By default, an arrow is defined as cursor 0 and cannot be redefined. curs expects the bitmap for the cursor you want to define. The bitmap can be 16x16 or 32x32 and either one or two layers deep. This parameter is ignored for cross-hair cursors.
n expects the value to use as the identifier for this raster font. The default font is a fixed-pitch ASCII font with a height of 15, width of 9, character values 0 through 127 defined, and is specified by a font identifier of 0. Font 0 cannot be redefined. nc expects the number of elements in the chars array. chars expects an array of character description structures of type Lfontchar. One structure is required for each character in the font. The Lfontchar structure is defined in as: t...
n expects the constant that you want to use as an identifier for the linestyle described by ls. This constant is used as an index into a table of linestyles. By default, index 0 contains the pattern 0xFFFF, which draws solid lines and cannot be redefined. ls expects a 16-bit pattern to use as a linestyle. This pattern is stored in the linestyle table at index n. You can define up to 65536 distinct linestyles....
n expects the constant that you want to use as an identifier for the pattern described by mask. This constant is used as an index into a table of patterns. By default, pattern 0 is a 16X16 solid pattern that cannot be changed. size expects the size of the pattern: 16, 32, or 64 for a 16x16-, 32x32-, or 64x64-bit pattern, respectively. mask expects an array of 16-bit integers that form the actual bit pattern. The system stores the pattern in a pattern table at index n. The pattern is described fr...
str expects a pointer to the text that you want to add as a menu item. In addition, you have the option of pairing an ``item type'' flag with each menu item. There are seven menu item type flags: %t marks item text as the menu title string. %F invokes a routine for every selection from this menu except those marked with a %n. You must specify the invoked routine in the arg parameter. The value of the menu item is used as a parameter of the executed routine. Thus, if you select the third menu i...
n expects the constant that you want to use as the identifier for this raster font. This constant is used as an index into a font table. The default font, 0, is a fixed-pitch font with a height of 15 and width of 9. Font 0 cannot be redefined. ht expects the maximum height (in pixels) for a character. nc expects the number of characters in this font. chars expects an array of character description structures of type Fontchar. The Fontchar structure is defined in as: typedef struct { un...
This routine removes entries from the mounted file system description file /etc/mtab. The filep argument is the description file, usually /etc/mtab. The mnt argument is a pointer to an object with the following structure containing the broken-out fields of a line in the filesystem description file, . The fields have meanings described in fstab(4). struct mntent { char *mnt_fsname; /* file system name */ char *mnt_dir; /* file system path prefix */ char *mnt_type; /* dbg, efs, nfs */ ch...
dem and demangle are interfaces for user programs to ``demangle'' the mangled external names that C++ produces for functions, class members, etc.. A description of the C++ mangling scheme is provided on page 122 and following of the Annotated C++ Reference Manual. The simplest interface to the library is to call the demangle() function, as follows: int ret; char inbuf[1024]; char outbuf[MAXDBUF]; if ((ret = demangle(inbuf, outbuf)) < 0) { /* error! */ } The ...
This command deletes the windows given by the window arguments, plus all of their descendants. If a window ``.'' is deleted then the entire application will be destroyed. The windows are destroyed in order, and if an error occurs in destroying a window the command aborts without destroying the remaining windows.
Devel::SelfStubber prints the stubs you need to put in the module before the __DATA__ token (or you can get it to print the entire module with stubs correctly placed). The stubs ensure that if a method is called, it will get loaded. They are needed specifically for inherited autoloaded methods. This is best explained using the following example: Assume four classes, A,B,C & D. A is the root class, B is a subclass of A, C is a subclass of B, and D is another subclass of A. A / \ B D / C If D cal...
DGBBRD reduces a real general m-by-n band matrix A to upper bidiagonal form B by an orthogonal transformation: Q' * A * P = B. The routine computes B, and optionally forms Q or P', or computes Q'*C for a given matrix C.
On Entry ABD DOUBLE PRECISION(LDA, N) contains the matrix in band storage. The columns of the matrix are stored in the columns of ABD and the diagonals of the matrix are stored in rows ML+1 through 2*ML+MU+1 of ABD . See the comments below for details. LDA INTEGER the leading dimension of the array ABD . LDA must be .GE. 2*ML + MU + 1 . N INTEGER the order of the original matrix. ML INTEGER number of diagonals below the main diagonal. 0 .LE. ML .LT. N . MU INTEGER number of diagonals above the m...
DGBCON estimates the reciprocal of the condition number of a real general band matrix A, in either the 1-norm or the infinity-norm, using the LU factorization computed by DGBTRF. An estimate is obtained for norm(inv(A)), and the reciprocal of the condition number is computed as RCOND = 1 / ( norm(A) * norm(inv(A)) ).
On Entry ABD DOUBLE PRECISION(LDA, N) the output from DGBCO or DGBFA. LDA INTEGER the leading dimension of the array ABD . N INTEGER the order of the original matrix. ML INTEGER number of diagonals below the main diagonal. MU INTEGER number of diagonals above the main diagonal. IPVT INTEGER(N) the pivot vector from DGBCO or DGBFA. On Return DET DOUBLE PRECISION(2) determinant of original matrix. Determinant = DET(1) * 10.0**DET(2) with 1.0 .LE. DABS(DET(1)) .LT. 10.0 or DET(1) = 0.0 . LINPACK. T...
DGBEQU computes row and column scalings intended to equilibrate an M-by-N band matrix A and reduce its condition number. R returns the row scale factors and C the column scale factors, chosen to try to make the largest element in each row and column of the matrix B with elements B(i,j)=R(i)*A(i,j)*C(j) have absolute value 1. R(i) and C(j) are restricted to be between SMLNUM = smallest safe number and BIGNUM = largest safe number. Use of these scaling factors is not guaranteed to reduce the condi...
On Entry ABD DOUBLE PRECISION(LDA, N) contains the matrix in band storage. The columns of the matrix are stored in the columns of ABD and the diagonals of the matrix are stored in rows ML+1 through 2*ML+MU+1 of ABD . See the comments below for details. LDA INTEGER the leading dimension of the array ABD . LDA must be .GE. 2*ML + MU + 1 . N INTEGER the order of the original matrix. ML INTEGER number of diagonals below the main diagonal. 0 .LE. ML .LT. N . MU INTEGER number of diagonals above the m...
DGBRFS improves the computed solution to a system of linear equations when the coefficient matrix is banded, and provides error bounds and backward error estimates for the solution.
On Entry ABD DOUBLE PRECISION(LDA, N) the output from DGBCO or DGBFA. LDA INTEGER the leading dimension of the array ABD . N INTEGER the order of the original matrix. ML INTEGER number of diagonals below the main diagonal. MU INTEGER number of diagonals above the main diagonal. IPVT INTEGER(N) the pivot vector from DGBCO or DGBFA. B DOUBLE PRECISION(N) the right hand side vector. JOB INTEGER = 0 to solve A*X = B , = nonzero to solve TRANS(A)*X = B , where TRANS(A) is the transpose. On Return B t...
DGBSV computes the solution to a real system of linear equations A * X = B, where A is a band matrix of order N with KL subdiagonals and KU superdiagonals, and X and B are N-by-NRHS matrices. The LU decomposition with partial pivoting and row interchanges is used to factor A as A = L * U, where L is a product of permutation and unit lower triangular matrices with KL subdiagonals, and U is upper triangular with KL+KU superdiagonals. The factored form of A is then used to solve the system of equat...
DGBSVX uses the LU factorization to compute the solution to a real system of linear equations A * X = B, A**T * X = B, or A**H * X = B, where A is a band matrix of order N with KL subdiagonals and KU superdiagonals, and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
DGBTF2 computes an LU factorization of a real m-by-n band matrix A using partial pivoting with row interchanges. This is the unblocked version of the algorithm, calling Level 2 BLAS.
DGBTRF computes an LU factorization of a real m-by-n band matrix A using partial pivoting with row interchanges. This is the blocked version of the algorithm, calling Level 3 BLAS.
DGEBAK forms the right or left eigenvectors of a real general matrix by backward transformation on the computed eigenvectors of the balanced matrix output by DGEBAL.
DGEBAL balances a general real matrix A. This involves, first, permuting A by a similarity transformation to isolate eigenvalues in the first 1 to ILO-1 and last IHI+1 to N elements on the diagonal; and second, applying a diagonal similarity transformation to rows and columns ILO to IHI to make the rows and columns as close in norm as possible. Both steps are optional. Balancing may reduce the 1-norm of the matrix, and improve the accuracy of the computed eigenvalues and/or eigenvectors....
DGEBD2 reduces a real general m by n matrix A to upper or lower bidiagonal form B by an orthogonal transformation: Q' * A * P = B. If m >= n, B is upper bidiagonal; if m < n, B is lower bidiagonal.
DGEBRD reduces a general real M-by-N matrix A to upper or lower bidiagonal form B by an orthogonal transformation: Q**T * A * P = B. If m >= n, B is upper bidiagonal; if m < n, B is lower bidiagonal.
On Entry A DOUBLE PRECISION(LDA, N) the matrix to be factored. LDA INTEGER the leading dimension of the array A . N INTEGER the order of the matrix A . On Return A an upper triangular matrix and the multipliers which were used to obtain it. The factorization can be written A = L*U where L is a product of permutation and unit lower triangular matrices and U is upper triangular. IPVT INTEGER(N) an INTEGER vector of pivot indices. RCOND DOUBLE PRECISION an estimate of the reciprocal condition of A ...
DGECON estimates the reciprocal of the condition number of a general real matrix A, in either the 1-norm or the infinity-norm, using the LU factorization computed by DGETRF. An estimate is obtained for norm(inv(A)), and the reciprocal of the condition number is computed as RCOND = 1 / ( norm(A) * norm(inv(A)) ).
On Entry A DOUBLE PRECISION(LDA, N) the output from DGECO or DGEFA. LDA INTEGER the leading dimension of the array A . N INTEGER the order of the matrix A . IPVT INTEGER(N) the pivot vector from DGECO or DGEFA. WORK DOUBLE PRECISION(N) work vector. Contents destroyed. JOB INTEGER = 11 both determinant and inverse. = 01 inverse only. = 10 determinant only. On Return A inverse of original matrix if requested. Otherwise unchanged. DET DOUBLE PRECISION(2) determinant of original matrix if requested....
DGEEQU computes row and column scalings intended to equilibrate an M-by-N matrix A and reduce its condition number. R returns the row scale factors and C the column scale factors, chosen to try to make the largest element in each row and column of the matrix B with elements B(i,j)=R(i)*A(i,j)*C(j) have absolute value 1. R(i) and C(j) are restricted to be between SMLNUM = smallest safe number and BIGNUM = largest safe number. Use of these scaling factors is not guaranteed to reduce the condition ...
DGEES computes for an N-by-N real nonsymmetric matrix A, the eigenvalues, the real Schur form T, and, optionally, the matrix of Schur vectors Z. This gives the Schur factorization A = Z*T*(Z**T). Optionally, it also orders the eigenvalues on the diagonal of the real Schur form so that selected eigenvalues are at the top left. The leading columns of Z then form an orthonormal basis for the invariant subspace corresponding to the selected eigenvalues. A matrix is in real Schur form if it is upper ...
DGEESX computes for an N-by-N real nonsymmetric matrix A, the eigenvalues, the real Schur form T, and, optionally, the matrix of Schur vectors Z. This gives the Schur factorization A = Z*T*(Z**T). Optionally, it also orders the eigenvalues on the diagonal of the real Schur form so that selected eigenvalues are at the top left; computes a reciprocal condition number for the average of the selected eigenvalues (RCONDE); and computes a reciprocal condition number for the right invariant subspace co...
DGEEV computes for an N-by-N real nonsymmetric matrix A, the eigenvalues and, optionally, the left and/or right eigenvectors. The right eigenvector v(j) of A satisfies A * v(j) = lambda(j) * v(j) where lambda(j) is its eigenvalue. The left eigenvector u(j) of A satisfies u(j)**H * A = lambda(j) * u(j)**H where u(j)**H denotes the conjugate transpose of u(j). The computed eigenvectors are normalized to have Euclidean norm equal to 1 and largest component real....
DGEEVX computes for an N-by-N real nonsymmetric matrix A, the eigenvalues and, optionally, the left and/or right eigenvectors. Optionally also, it computes a balancing transformation to improve the conditioning of the eigenvalues and eigenvectors (ILO, IHI, SCALE, and ABNRM), reciprocal condition numbers for the eigenvalues (RCONDE), and reciprocal condition numbers for the right eigenvectors (RCONDV). The right eigenvector v(j) of A satisfies A * v(j) = lambda(j) * v(j) where lambda(j) is its e...
On Entry A DOUBLE PRECISION(LDA, N) the matrix to be factored. LDA INTEGER the leading dimension of the array A . N INTEGER the order of the matrix A . On Return A an upper triangular matrix and the multipliers which were used to obtain it. The factorization can be written A = L*U where L is a product of permutation and unit lower triangular matrices and U is upper triangular. IPVT INTEGER(N) an integer vector of pivot indices. INFO INTEGER = 0 normal value. = K if U(K,K) .EQ. 0.0 . This is not ...
DGEGS computes for a pair of N-by-N real nonsymmetric matrices A, B: the generalized eigenvalues (alphar +/- alphai*i, beta), the real Schur form (A, B), and optionally left and/or right Schur vectors (VSL and VSR). (If only the generalized eigenvalues are needed, use the driver DGEGV instead.) A generalized eigenvalue for a pair of matrices (A,B) is, roughly speaking, a scalar w or a ratio alpha/beta = w, such that A - w*B is singular. It is usually represented as the pair (alpha,beta), as ther...
DGEGV computes for a pair of n-by-n real nonsymmetric matrices A and B, the generalized eigenvalues (alphar +/- alphai*i, beta), and optionally, the left and/or right generalized eigenvectors (VL and VR). A generalized eigenvalue for a pair of matrices (A,B) is, roughly speaking, a scalar w or a ratio alpha/beta = w, such that A - w*B is singular. It is usually represented as the pair (alpha,beta), as there is a reasonable interpretation for beta=0, and even for both being zero. A good beginning...
DGELS solves overdetermined or underdetermined real linear systems involving an M-by-N matrix A, or its transpose, using a QR or LQ factorization of A. It is assumed that A has full rank. The following options are provided: 1. If TRANS = 'N' and m >= n: find the least squares solution of an overdetermined system, i.e., solve the least squares problem minimize || B - A*X ||. 2. If TRANS = 'N' and m < n: find the minimum norm solution of an underdetermined system A * X = B. 3. If TRANS = 'T'...
DGELSS computes the minimum norm solution to a real linear least squares problem: Minimize 2-norm(| b - A*x |). using the singular value decomposition (SVD) of A. A is an M-by-N matrix which may be rank-deficient. Several right hand side vectors b and solution vectors x can be handled in a single call; they are stored as the columns of the M-by-NRHS right hand side matrix B and the N-by-NRHS solution matrix X. The effective rank of A is determined by treating as zero those singular values which ...
DGELSX computes the minimum-norm solution to a real linear least squares problem: minimize || A * X - B || using a complete orthogonal factorization of A. A is an M-by-N matrix which may be rank-deficient. Several right hand side vectors b and solution vectors x can be handled in a single call; they are stored as the columns of the M-by-NRHS right hand side matrix B and the N-by-NRHS solution matrix X. The routine first computes a QR factorization with column pivoting: A * P = Q * [ R11 R12 ] [ ...
On Entry A DOUBLE PRECISION(LDA, N) the output from DGECO or DGEFA. LDA INTEGER the leading dimension of the array A . N INTEGER the order of the matrix A . IPVT INTEGER(N) the pivot vector from DGECO or DGEFA. B DOUBLE PRECISION(N) the right hand side vector. JOB INTEGER = 0 to solve A*X = B , = nonzero to solve TRANS(A)*X = B where TRANS(A) is the transpose. On Return B the solution vector X . Error Condition A division by zero will occur if the input factor contains a zero on the diagonal. Te...
DGESV computes the solution to a real system of linear equations A * X = B, where A is an N-by-N matrix and X and B are N-by-NRHS matrices. The LU decomposition with partial pivoting and row interchanges is used to factor A as A = P * L * U, where P is a permutation matrix, L is unit lower triangular, and U is upper triangular. The factored form of A is then used to solve the system of equations A * X = B....
DGESVD computes the singular value decomposition (SVD) of a real M-by-N matrix A, optionally computing the left and/or right singular vectors. The SVD is written A = U * SIGMA * transpose(V) where SIGMA is an M-by-N matrix which is zero except for its min(m,n) diagonal elements, U is an M-by-M orthogonal matrix, and V is an N-by-N orthogonal matrix. The diagonal elements of SIGMA are the singular values of A; they are real and non-negative, and are returned in descending order. The first min(m,n...
DGESVX uses the LU factorization to compute the solution to a real system of linear equations A * X = B, where A is an N-by-N matrix and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
DGETF2 computes an LU factorization of a general m-by-n matrix A using partial pivoting with row interchanges. The factorization has the form A = P * L * U where P is a permutation matrix, L is lower triangular with unit diagonal elements (lower trapezoidal if m > n), and U is upper triangular (upper trapezoidal if m < n). This is the right-looking Level 2 BLAS version of the algorithm.
DGETRF computes an LU factorization of a general M-by-N matrix A using partial pivoting with row interchanges. The factorization has the form A = P * L * U where P is a permutation matrix, L is lower triangular with unit diagonal elements (lower trapezoidal if m > n), and U is upper triangular (upper trapezoidal if m < n). This is the right-looking Level 3 BLAS version of the algorithm.
DGETRI computes the inverse of a matrix using the LU factorization computed by DGETRF. This method inverts U and then computes inv(A) by solving the system inv(A)*L = inv(U) for inv(A).
DGGBAK forms the right or left eigenvectors of a real generalized eigenvalue problem A*x = lambda*B*x, by backward transformation on the computed eigenvectors of the balanced pair of matrices output by DGGBAL.
DGGBAL balances a pair of general real matrices (A,B). This involves, first, permuting A and B by similarity transformations to isolate eigenvalues in the first 1 to ILO$-$1 and last IHI+1 to N elements on the diagonal; and second, applying a diagonal similarity transformation to rows and columns ILO to IHI to make the rows and columns as close in norm as possible. Both steps are optional. Balancing may reduce the 1-norm of the matrices, and improve the accuracy of the computed eigenvalues and/o...
DGGGLM solves a general Gauss-Markov linear model (GLM) problem: minimize || y ||_2 subject to d = A*x + B*y x where A is an N-by-M matrix, B is an N-by-P matrix, and d is a given Nvector. It is assumed that M <= N <= M+P, and rank(A) = M and rank( A B ) = N. Under these assumptions, the constrained equation is always consistent, and there is a unique solution x and a minimal 2-norm solution y, which is obtained using a generalized QR factorization of A and B. In particular, if matrix B is squar...
DGGHRD reduces a pair of real matrices (A,B) to generalized upper Hessenberg form using orthogonal transformations, where A is a general matrix and B is upper triangular: Q' * A * Z = H and Q' * B * Z = T, where H is upper Hessenberg, T is upper triangular, and Q and Z are orthogonal, and ' means transpose. The orthogonal matrices Q and Z are determined as products of Givens rotations. They may either be formed explicitly, or they may be postmultiplied into input matrices Q1 and Z1, so that Q...
DGGLSE solves the linear equality-constrained least squares (LSE) problem: minimize || c - A*x ||_2 subject to B*x = d where A is an M-by-N matrix, B is a P-by-N matrix, c is a given M-vector, and d is a given P-vector. It is assumed that P <= N <= M+P, and rank(B) = P and rank( ( A ) ) = N. ( ( B ) ) These conditions ensure that the LSE problem has a unique solution, which is obtained using a GRQ factorization of the matrices B and A....
DGGQRF computes a generalized QR factorization of an N-by-M matrix A and an N-by-P matrix B: A = Q*R, B = Q*T*Z, where Q is an N-by-N orthogonal matrix, Z is a P-by-P orthogonal matrix, and R and T assume one of the forms: if N >= M, R = ( R11 ) M , or if N < M, R = ( R11 R12 ) N, ( 0 ) N-M N M-N M where R11 is upper triangular, and if N <= P, T = ( 0 T12 ) N, or if N > P, T = ( T11 ) N-P, P-N N ( T21 ) P P where T12 or T21 is upper triangular. In particular, if B is square and nonsingular, the ...
DGGRQF computes a generalized RQ factorization of an M-by-N matrix A and a P-by-N matrix B: A = R*Q, B = Z*T*Q, where Q is an N-by-N orthogonal matrix, Z is a P-by-P orthogonal matrix, and R and T assume one of the forms: if M <= N, R = ( 0 R12 ) M, or if M > N, R = ( R11 ) M-N, N-M M ( R21 ) N N where R12 or R21 is upper triangular, and if P >= N, T = ( T11 ) N , or if P < N, T = ( T11 T12 ) P, ( 0 ) P-N P N-P N where T11 is upper triangular. In particular, if B is square and nonsingular, the G...
DGGSVD computes the generalized singular value decomposition (GSVD) of an M-by-N real matrix A and P-by-N real matrix B: U'*A*Q = D1*( 0 R ), V'*B*Q = D2*( 0 R ) where U, V and Q are orthogonal matrices, and Z' is the transpose of Z. Let K+L = the effective numerical rank of the matrix (A',B')', then R is a K+L-by-K+L nonsingular upper triangular matrix, D1 and D2 are M-by(K+L) and P-by-(K+L) "diagonal" matrices and of the following structures, respectively: If M-K-L >= 0, K L D1 = K ( I...
DGGSVP computes orthogonal matrices U, V and Q such that L ( 0 0 A23 ) M-K-L ( 0 0 0 ) N-K-L K L = K ( 0 A12 A13 ) if M-K-L < 0; M-K ( 0 0 A23 ) N-K-L K L V'*B*Q = L ( 0 0 B13 ) P-L ( 0 0 0 ) where the K-by-K matrix A12 and L-by-L matrix B13 are nonsingular upper triangular; A23 is L-by-L upper triangular if M-K-L >= 0, otherwise A23 is (M-K)-by-L upper trapezoidal. K+L = the effective numerical rank of the (M+P)-by-N matrix (A',B')'. Z' denotes the transpose of Z. This decomposition is the...
sid expects the identifier of the server you want to close. If sid is negative, then all graphics server connections are closed. Server identifiers are returned by dglopen.
svname expects a pointer to the name of the graphics server to which you want to open a connection. For a successful connection, the client host must have permission to connect to the graphics server. Authentication is accomplished via the same mechanisms as for X clients. See xhost(1) for further details. The svname parameter has the following syntax: [[username ]password@]hostname[:server[.screen]] where hostname is an internet host name recognized by gethostname(3N). server and screen are ign...
DGTCON estimates the reciprocal of the condition number of a real tridiagonal matrix A using the LU factorization as computed by DGTTRF. An estimate is obtained for norm(inv(A)), and the reciprocal of the condition number is computed as RCOND = 1 / (ANORM * norm(inv(A))).
DGTRFS improves the computed solution to a system of linear equations when the coefficient matrix is tridiagonal, and provides error bounds and backward error estimates for the solution.
On Entry N INTEGER is the order of the tridiagonal matrix. C DOUBLE PRECISION(N) is the subdiagonal of the tridiagonal matrix. C(2) through C(N) should contain the subdiagonal. On output C is destroyed. D DOUBLE PRECISION(N) is the diagonal of the tridiagonal matrix. On output D is destroyed. E DOUBLE PRECISION(N) is the superdiagonal of the tridiagonal matrix. E(1) through E(N-1) should contain the superdiagonal. On output E is destroyed. B DOUBLE PRECISION(N) is the right hand side vector. On ...
DGTSV solves the equation where A is an N-by-N tridiagonal matrix, by Gaussian elimination with partial pivoting. Note that the equation A'*X = B may be solved by interchanging the order of the arguments DU and DL.
DGTSVX uses the LU factorization to compute the solution to a real system of linear equations A * X = B or A**T * X = B, where A is a tridiagonal matrix of order N and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
DGTTRF computes an LU factorization of a real tridiagonal matrix A using elimination with partial pivoting and row interchanges. The factorization has the form A = L * U where L is a product of permutation and unit lower bidiagonal matrices and U is upper triangular with nonzeros in only the main diagonal and first two superdiagonals.
DHGEQZ implements a single-/double-shift version of the QZ method for finding the generalized eigenvalues B is upper triangular, and A is block upper triangular, where the diagonal blocks are either 1-by-1 or 2-by-2, the 2-by-2 blocks having complex generalized eigenvalues (see the description of the argument JOB.) If JOB='S', then the pair (A,B) is simultaneously reduced to Schur form by applying one orthogonal tranformation (usually called Q) on the left and another (usually called Z) on the...
DHSEIN uses inverse iteration to find specified right and/or left eigenvectors of a real upper Hessenberg matrix H. The right eigenvector x and the left eigenvector y of the matrix H corresponding to an eigenvalue w are defined by: H * x = w * x, y**h * H = w * y**h where y**h denotes the conjugate transpose of the vector y.
DHSEQR computes the eigenvalues of a real upper Hessenberg matrix H and, optionally, the matrices T and Z from the Schur decomposition H = Z T Z**T, where T is an upper quasi-triangular matrix (the Schur form), and Z is the orthogonal matrix of Schur vectors. Optionally Z may be postmultiplied into an input orthogonal matrix Q, so that this routine can give the Schur factorization of a matrix A which has been reduced to the Hessenberg form H by the orthogonal matrix Q: A = Q*H*Q**T = (QZ)*T*(QZ)...
The diagnostics Pragma This module extends the terse diagnostics normally emitted by both the perl compiler and the perl interpeter, augmenting them with the more explicative and endearing descriptions found in the perldiag manpage. Like the other pragmata, it affects the compilation phase of your program rather than merely the execution phase. To use in your program as a pragma, merely invoke use diagnostics; at the start (or near the start) of your program. (Note that this does enable perl's ...
dial returns a file-descriptor for a terminal line open for read/write. The argument to dial is a CALL structure (defined in the header file). When finished with the terminal line, the calling program must invoke undial to release the semaphore that has been set during the allocation of the terminal device. The definition of CALL in the header file is: typedef struct { struct termio *attr; /* pointer to termio attribute struct */ int baud; /* transmission data rate */ int speed...
This procedure is part of the Tk script library. Its arguments describe a dialog box: window Name of top-level window to use for dialog. Any existing window by this name is destroyed. title Text to appear in the window manager's title bar for the dialog. text Message to appear in the top portion of the dialog box. bitmap If non-empty, specifies a bitmap to display in the top portion of the dialog, to the left of the text. If this is an empty string then no bitmap is displayed in the dialog. def...
The inclusion of selects the 4.3BSD versions of these routines. For the System V versions, include . opendir opens the directory named by filename and associates a directory stream with it. opendir returns a pointer to be used to identify the directory stream in subsequent operations. The pointer NULL is returned if filename cannot be accessed, or if it cannot malloc(3) enough memory to hold the whole thing. readdir returns a pointer to the next directory entry. It returns ...
The inclusion of selects the System V versions of these routines. For the 4.3BSD versions, include . The 64-bit interfaces are not present in the 4.3BSD versions. opendir opens the directory named by filename and associates a directory stream with it. opendir returns a pointer to be used to identify the directory stream in subsequent operations. The directory stream is positioned at the first entry. A null pointer is returned if filename cannot be acces...
The DirHandle method provide an alternative interface to the opendir(), closedir(), readdir(), and rewinddir() functions. The only objective benefit to using DirHandle is that it avoids namespace pollution by creating globs to hold directory handles. PPPPaaaaggggeeee 1111
Given a pointer to a null-terminated character string that contains a filesystem pathname, dirname returns a pointer to a static constant string that is the parent directory of that file. In doing this, it sometimes places a null byte in the pathname after the next to last element, so the content of path must be disposable. Trailing ``/'' characters in the path are not counted as part of the path. If path or *path is zero, a pointer to a static constant ``.'' is re...
Three sets of register names which people might want to use: compiler: zero, at, v0, ... hardware: r0, r1, r2, ... assembler: $0, $at, $2,... dis_init, dis_init32, and dis_init64 functions initialize disassembler and set options for disassembly. "addr_format" and "value_format" specify in the style of "printf" the null-terminated formats for printing the address and value of the instruction. If nil, they default to "%#010x"; if they are the empty string, we omit to print these items. "r...
Disassembler disassembles and prints a MIPS machine instruction on stdout. Iadr is the instruction address to be disassembled. Regstyle specifies how registers are named in the disassembly; if the value is 0, compiler names are used; otherwise, hardware names are used. The next four arguments are function pointers, most of which give the caller some flexibility in the appearance of the disassembly. The only function that MUST be provided is get_bytes. All other functions are optional. Get_bytes ...
displacepolygon offsets the z values of rendered pixels for polygons. The term scalefactor*max(abs(dz/dx),abs(dz/dy)) is added to the z values of rendered pixels, where dz/dx and dz/dy are the slopes of the triangle in window coordinates. scalefactor is a signed float value. displacepolygon is effectively disabled by setting scalefactor to 0.0, which is the default. displacepolygon is recommended when rendering a z buffer that is later defined (see texdef) as a texture for generating shadows. It...
div and ldiv compute the quotient and remainder resulting from the division of the integer dividend numer by the integer divisor denom. If the division is inexact, the quotient will be the nearest integer with less magnitude than the algebraic quotient (e.g., div(5/2) yields 2, and div(-5/2) yields -2). div operates on and returns int quantities. ldiv operates on and returns long int quantities. Unless the result cannot be represented, div and ldiv return the result in a structure (div_t for div...
DLABAD takes as input the values computed by SLAMCH for underflow and overflow, and returns the square root of each of these values if the log of LARGE is sufficiently large. This subroutine is intended to identify machines with a large exponent range, such as the Crays, and redefine the underflow and overflow limits to be the square roots of the values computed by DLAMCH. This subroutine is needed because DLAMCH does not compensate for poor arithmetic in the upper half of the exponent range, as...
DLABRD reduces the first NB rows and columns of a real general m by n matrix A to upper or lower bidiagonal form by an orthogonal transformation Q' * A * P, and returns the matrices X and Y which are needed to apply the transformation to the unreduced part of A. If m >= n, A is reduced to upper bidiagonal form; if m < n, to lower bidiagonal form. This is an auxiliary routine called by DGEBRD
DLAE2 computes the eigenvalues of a 2-by-2 symmetric matrix [ A B ] [ B C ]. On return, RT1 is the eigenvalue of larger absolute value, and RT2 is the eigenvalue of smaller absolute value.
DLAEBZ contains the iteration loops which compute and use the function N(w), which is the count of eigenvalues of a symmetric tridiagonal matrix T less than or equal to its argument w. It performs a choice of two types of loops: IJOB=1, followed by IJOB=2: It takes as input a list of intervals and returns a list of sufficiently small intervals whose union contains the same eigenvalues as the union of the original intervals. The input intervals are (AB(j,1),AB(j,2)], j=1,...,MINP. The output inte...
DLAED1 computes the updated eigensystem of a diagonal matrix after modification by a rank-one symmetric matrix. This routine is used only for the eigenproblem which requires all eigenvalues and eigenvectors of a tridiagonal matrix. DLAED7 handles the case in which eigenvalues only or eigenvalues and eigenvectors of a full symmetric matrix (which was reduced to tridiagonal form) are desired. T = Q(in) ( D(in) + RHO * Z*Z' ) Q'(in) = Q(out) * D(out) * Q'(out) where Z = Q'u, u is a vector of le...
DLAED2 merges the two sets of eigenvalues together into a single sorted set. Then it tries to deflate the size of the problem. There are two ways in which deflation can occur: when two or more eigenvalues are close together or if there is a tiny entry in the Z vector. For each such occurrence the order of the related secular equation problem is reduced by one.
DLAED3 finds the roots of the secular equation, as defined by the values in D, W, and RHO, between KSTART and KSTOP. It makes the appropriate calls to DLAED4 and then updates the eigenvectors by multiplying the matrix of eigenvectors of the pair of eigensystems being combined by the matrix of eigenvectors of the K-by-K system which is solved here. This code makes very mild assumptions about floating point arithmetic. It will work on machines with a guard digit in add/subtract, or on those binary...
This subroutine computes the I-th updated eigenvalue of a symmetric rank-one modification to a diagonal matrix whose elements are given in the array d, and that no loss in generality. The rank-one modified system is thus diag( D ) + RHO * Z * Z_transpose. where we assume the Euclidean norm of Z is 1. The method consists of approximating the rational functions in the secular equation by simpler interpolating rational functions....
This subroutine computes the I-th eigenvalue of a symmetric rank-one modification of a 2-by-2 diagonal matrix We also assume RHO > 0 and that the Euclidean norm of the vector Z is one.
DLAED6 computes the positive or negative root (closest to the origin) of z(1) z(2) z(3) f(x) = rho + --------- + ---------- + --------- d(1)-x d(2)-x d(3)-x otherwise it is between d(1) and d(2) This routine will be called by DLAED4 when necessary. In most cases, the root sought is the smallest in magnitude, though it might not be in some extremely rare situations.
DLAED7 computes the updated eigensystem of a diagonal matrix after modification by a rank-one symmetric matrix. This routine is used only for the eigenproblem which requires all eigenvalues and optionally eigenvectors of a dense symmetric matrix that has been reduced to tridiagonal form. DLAED1 handles the case in which all eigenvalues and eigenvectors of a symmetric tridiagonal matrix are desired. T = Q(in) ( D(in) + RHO * Z*Z' ) Q'(in) = Q(out) * D(out) * Q'(out) where Z = Q'u, u is a vect...
DLAED8 merges the two sets of eigenvalues together into a single sorted set. Then it tries to deflate the size of the problem. There are two ways in which deflation can occur: when two or more eigenvalues are close together or if there is a tiny element in the Z vector. For each such occurrence the order of the related secular equation problem is reduced by one.
DLAED9 finds the roots of the secular equation, as defined by the values in D, Z, and RHO, between KSTART and KSTOP. It makes the appropriate calls to DLAED4 and then stores the new matrix of eigenvectors for use in calculating the next level of Z vectors.
DLAEV2 computes the eigendecomposition of a 2-by-2 symmetric matrix [ A B ] [ B C ]. On return, RT1 is the eigenvalue of larger absolute value, RT2 is the eigenvalue of smaller absolute value, and (CS1,SN1) is the unit right eigenvector for RT1, giving the decomposition [ CS1 SN1 ] [ A B ] [ CS1 -SN1 ] = [ RT1 0 ] [-SN1 CS1 ] [ B C ] [ SN1 CS1 ] [ 0 RT2 ].
DLAEXC swaps adjacent diagonal blocks T11 and T22 of order 1 or 2 in an upper quasi-triangular matrix T by an orthogonal similarity transformation. T must be in Schur canonical form, that is, block upper triangular with 1-by-1 and 2-by-2 diagonal blocks; each 2-by-2 diagonal block has its diagonal elemnts equal and its off-diagonal elements of opposite sign.
DLAG2 computes the eigenvalues of a 2 x 2 generalized eigenvalue problem A - w B, with scaling as necessary to avoid over-/underflow. The scaling factor "s" results in a modified eigenvalue equation s A - w B where s is a non-negative scaling factor chosen so that w, w B, and s A do not overflow and, if possible, do not underflow, either.
DLAGTF factorizes the matrix (T - lambda*I), where T is an n by n tridiagonal matrix and lambda is a scalar, as where P is a permutation matrix, L is a unit lower tridiagonal matrix with at most one non-zero sub-diagonal elements per column and U is an upper triangular matrix with at most two non-zero super-diagonal elements per column. The factorization is obtained by Gaussian elimination with partial pivoting and implicit row scaling. The parameter LAMBDA is included in the routine so that DLA...
DLAGTS may be used to solve one of the systems of equations where T is an n by n tridiagonal matrix, for x, following the factorization of (T - lambda*I) as (T - lambda*I) = P*L*U , by routine DLAGTF. The choice of equation to be solved is controlled by the argument JOB, and in each case there is an option to perturb zero or very small diagonal elements of U, this option being intended for use in applications such as inverse iteration....
DLAHQR is an auxiliary routine called by DHSEQR to update the eigenvalues and Schur decomposition already computed by DHSEQR, by dealing with the Hessenberg submatrix in rows and columns ILO to IHI.
DLAHRD reduces the first NB columns of a real general n-by-(n-k+1) matrix A so that elements below the k-th subdiagonal are zero. The reduction is performed by an orthogonal similarity transformation Q' * A * Q. The routine returns the matrices V and T which determine Q as a block reflector I - V*T*V', and also the matrix Y = A * V * T. This is an auxiliary routine called by DGEHRD.
DLAIC1 applies one step of incremental condition estimation in its simplest version: Let x, twonorm(x) = 1, be an approximate singular vector of an j-by-j lower triangular matrix L, such that twonorm(L*x) = sest Then DLAIC1 computes sestpr, s, c such that the vector [ s*x ] xhat = [ c ] is an approximate singular vector of [ L 0 ] Lhat = [ w' gamma ] in the sense that twonorm(Lhat*xhat) = sestpr. Depending on JOB, an estimate for the largest or smallest singular value is computed. Note that [s ...
DLALN2 solves a system of the form (ca A - w D ) X = s B or (ca A' - w D) X = s B with possible scaling ("s") and perturbation of A. (A' means A-transpose.) A is an NA x NA real matrix, ca is a real scalar, D is an NA x NA real diagonal matrix, w is a real or complex value, and X and B are NA x 1 matrices -- real if w is real, complex if w is complex. NA may be 1 or 2. If w is complex, X and B are represented as NA x 2 matrices, the first column of each being the real part and the second bei...
DLAMRG will create a permutation list which will merge the elements of A (which is composed of two independently sorted sets) into a single set which is sorted in ascending order.
DLANGB returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of an n by n band matrix A, with kl sub-diagonals and ku super-diagonals.
DLANGT returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of a real tridiagonal matrix A.
DLANHS returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of a Hessenberg matrix A.
DLANSB returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of an n by n symmetric band matrix A, with k super-diagonals.
DLANSP returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of a real symmetric matrix A, supplied in packed form.
DLANST returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of a real symmetric tridiagonal matrix A.
DLANSY returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of a real symmetric matrix A.
DLANTB returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of an n by n triangular band matrix A, with ( k + 1 ) diagonals.
DLANTP returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of a triangular matrix A, supplied in packed form.
DLANTR returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of a trapezoidal or triangular matrix A.
DLANV2 computes the Schur factorization of a real 2-by-2 nonsymmetric matrix in standard form: [ A B ] = [ CS -SN ] [ AA BB ] [ CS SN ] [ C D ] [ SN CS ] [ CC DD ] [-SN CS ] where either 1) CC = 0 so that AA and DD are real eigenvalues of the matrix, or 2) AA = DD and BB*CC < 0, so that AA + or - sqrt(BB*CC) are complex conjugate eigenvalues.
Given two column vectors X and Y, let The subroutine first computes the QR factorization of A = Q*R, and then computes the SVD of the 2-by-2 upper triangular matrix R. The smaller singular value of R is returned in SSMIN, which is used as the measurement of the linear dependency of the vectors X and Y.
DLAPMT rearranges the columns of the M by N matrix X as specified by the permutation K(1),K(2),...,K(N) of the integers 1,...,N. If FORWRD = .TRUE., forward permutation: X(*,K(J)) is moved X(*,J) for J = 1,2,...,N. If FORWRD = .FALSE., backward permutation: X(*,J) is moved to X(*,K(J)) for J = 1,2,...,N.
DLAQGB equilibrates a general M by N band matrix A with KL subdiagonals and KU superdiagonals using the row and scaling factors in the vectors R and C.
DLAQTR solves the real quasi-triangular system or the complex quasi-triangular systems op(T + iB)*(p+iq) = scale*(c+id), if LREAL = .FALSE. in real arithmetic, where T is upper quasi-triangular. If LREAL = .FALSE., then the first diagonal block of T must be 1 by 1, B is the specially structured matrix B = [ b(1) b(2) ... b(n) ] [ w ] [ w ] [ . ] [ w ] op(A) = A or A', A' denotes the conjugate transpose of matrix A. On input, X = [ c ]. On output, X = [ p ]. [ d ] [ q ] This subroutine is desig...
DLAR2V applies a vector of real plane rotations from both sides to a sequence of 2-by-2 real symmetric matrices, defined by the elements of the vectors x, y and z. For i = 1,2,...,n ( x(i) z(i) ) := ( c(i) s(i) ) ( x(i) z(i) ) ( c(i) -s(i) ) ( z(i) y(i) ) ( -s(i) c(i) ) ( z(i) y(i) ) ( s(i) c(i) )
DLARF applies a real elementary reflector H to a real m by n matrix C, from either the left or the right. H is represented in the form H = I - tau * v * v' where tau is a real scalar and v is a real vector. If tau = 0, then H is taken to be the unit matrix.
DLARFG generates a real elementary reflector H of order n, such that ( x ) ( 0 ) where alpha and beta are scalars, and x is an (n-1)-element real vector. H is represented in the form H = I - tau * ( 1 ) * ( 1 v' ) , ( v ) where tau is a real scalar and v is a real (n-1)-element vector. If the elements of x are all zero, then tau = 0 and H is taken to be the unit matrix. Otherwise 1 <= tau <= 2.
DLARFT forms the triangular factor T of a real block reflector H of order n, which is defined as a product of k elementary reflectors. If DIRECT = 'F', H = H(1) H(2) . . . H(k) and T is upper triangular; If DIRECT = 'B', H = H(k) . . . H(2) H(1) and T is lower triangular. If STOREV = 'C', the vector which defines the elementary reflector H(i) is stored in the i-th column of the array V, and H = I - V * T * V' If STOREV = 'R', the vector which defines the elementary reflector H(i) is sto...
DLARFX applies a real elementary reflector H to a real m by n matrix C, from either the left or the right. H is represented in the form H = I - tau * v * v' where tau is a real scalar and v is a real vector. If tau = 0, then H is taken to be the unit matrix This version uses inline code if H has order < 11.
DLARGV generates a vector of real plane rotations, determined by elements of the real vectors x and y. For i = 1,2,...,n ( c(i) s(i) ) ( x(i) ) = ( a(i) ) ( -s(i) c(i) ) ( y(i) ) = ( 0 )
DLARTG generate a plane rotation so that [ -SN CS ] [ G ] [ 0 ] This is a slower, more accurate version of the BLAS1 routine DROTG, with the following other differences: F and G are unchanged on return. If G=0, then CS=1 and SN=0. If F=0 and (G .ne. 0), then CS=0 and SN=1 without doing any floating point operations (saves work in DBDSQR when there are zeros on the diagonal). If F exceeds G in magnitude, CS will be positive....
DLARTV applies a vector of real plane rotations to elements of the real vectors x and y. For i = 1,2,...,n ( x(i) ) := ( c(i) s(i) ) ( x(i) ) ( y(i) ) ( -s(i) c(i) ) ( y(i) )
DLARUV returns a vector of n random real numbers from a uniform (0,1) distribution (n <= 128). This is an auxiliary routine called by DLARNV and ZLARNV.
DLAS2 computes the singular values of the 2-by-2 matrix [ F G ] [ 0 H ]. On return, SSMIN is the smaller singular value and SSMAX is the larger singular value.
DLASCL multiplies the M by N real matrix A by the real scalar CTO/CFROM. This is done without over/underflow as long as the final result CTO*A(I,J)/CFROM does not over/underflow. TYPE specifies that A may be full, upper triangular, lower triangular, upper Hessenberg, or banded.
DLASQ1 computes the singular values of a real N-by-N bidiagonal matrix with diagonal D and off-diagonal E. The singular values are computed to high relative accuracy, barring over/underflow or denormalization. The algorithm is described in "Accurate singular values and differential qd algorithms," by K. V. Fernando and B. N. Parlett, Numer. Math., Vol-67, No. 2, pp. 191-230,1994. See also "Implementation of differential qd algorithms," by K. V. Fernando and B. N. Parlett, Technical Report, D...
DLASQ2 computes the singular values of a real N-by-N unreduced bidiagonal matrix with squared diagonal elements in Q and squared off-diagonal elements in E. The singular values are computed to relative accuracy TOL, barring over/underflow or denormalization.
DLASQ4 estimates TAU, the smallest eigenvalue of a matrix. This routine improves the input value of SUP which is an upper bound for the smallest eigenvalue for this matrix .
DLASR performs the transformation consisting of a sequence of plane rotations determined by the parameters PIVOT and DIRECT as follows ( z = m when SIDE = 'L' or 'l' and z = n when SIDE = 'R' or 'r' ): When DIRECT = 'F' or 'f' ( Forward sequence ) then P = P( z - 1 )*...*P( 2 )*P( 1 ), and when DIRECT = 'B' or 'b' ( Backward sequence ) then P = P( 1 )*P( 2 )*...*P( z - 1 ), where P( k ) is a plane rotation matrix for the following planes: when PIVOT = 'V' or 'v' ( Variable pi...
Sort the numbers in D in increasing order (if ID = 'I') or in decreasing order (if ID = 'D' ). Use Quick Sort, reverting to Insertion sort on arrays of size <= 20. Dimension of STACK limits N to about 2**32.
DLASSQ returns the values scl and smsq such that where x( i ) = X( 1 + ( i - 1 )*INCX ). The value of sumsq is assumed to be non-negative and scl returns the value scl = max( scale, abs( x( i ) ) ). scale and sumsq must be supplied in SCALE and SUMSQ and scl and smsq are overwritten on SCALE and SUMSQ respectively. The routine makes only one pass through the vector x.
DLASV2 computes the singular value decomposition of a 2-by-2 triangular matrix [ F G ] [ 0 H ]. On return, abs(SSMAX) is the larger singular value, abs(SSMIN) is the smaller singular value, and (CSL,SNL) and (CSR,SNR) are the left and right singular vectors for abs(SSMAX), giving the decomposition [ CSL SNL ] [ F G ] [ CSR -SNR ] = [ SSMAX 0 ] [-SNL CSL ] [ 0 H ] [ SNR CSR ] [ 0 SSMIN ].
DLASY2 solves for the N1 by N2 matrix X, 1 <= N1,N2 <= 2, in where TL is N1 by N1, TR is N2 by N2, B is N1 by N2, and ISGN = 1 or -1. op(T) = T or T', where T' denotes the transpose of T.
DLASYF computes a partial factorization of a real symmetric matrix A using the Bunch-Kaufman diagonal pivoting method. The partial factorization has the form: A = ( I U12 ) ( A11 0 ) ( I 0 ) if UPLO = 'U', or: ( 0 U22 ) ( 0 D ) ( U12' U22' ) A = ( L11 0 ) ( D 0 ) ( L11' L21' ) if UPLO = 'L' ( L21 I ) ( 0 A22 ) ( 0 I ) where the order of D is at most NB. The actual order is returned in the argument KB, and is either NB or NB-1, or N if N <= NB. DLASYF is an auxiliary routine called by DSY...
DLATBS solves one of the triangular systems are n-element vectors, and s is a scaling factor, usually less than or equal to 1, chosen so that the components of x will be less than the overflow threshold. If the unscaled problem will not cause overflow, the Level 2 BLAS routine DTBSV is called. If the matrix A is singular (A(j,j) = 0 for some j), then s is set to 0 and a non-trivial solution to A*x = 0 is returned....
DLATPS solves one of the triangular systems transpose of A, x and b are n-element vectors, and s is a scaling factor, usually less than or equal to 1, chosen so that the components of x will be less than the overflow threshold. If the unscaled problem will not cause overflow, the Level 2 BLAS routine DTPSV is called. If the matrix A is singular (A(j,j) = 0 for some j), then s is set to 0 and a non-trivial solution to A*x = 0 is returned....
DLATRD reduces NB rows and columns of a real symmetric matrix A to symmetric tridiagonal form by an orthogonal similarity transformation Q' * A * Q, and returns the matrices V and W which are needed to apply the transformation to the unreduced part of A. If UPLO = 'U', DLATRD reduces the last NB rows and columns of a matrix, of which the upper triangle is supplied; if UPLO = 'L', DLATRD reduces the first NB rows and columns of a matrix, of which the lower triangle is supplied. This is an au...
DLATRS solves one of the triangular systems triangular matrix, A' denotes the transpose of A, x and b are n-element vectors, and s is a scaling factor, usually less than or equal to 1, chosen so that the components of x will be less than the overflow threshold. If the unscaled problem will not cause overflow, the Level 2 BLAS routine DTRSV is called. If the matrix A is singular (A(j,j) = 0 for some j), then s is set to 0 and a non-trivial solution to A*x = 0 is returned....
DLATZM applies a Householder matrix generated by DTZRQF to a matrix. Let P = I - tau*u*u', u = ( 1 ), ( v ) where v is an (m-1) vector if SIDE = 'L', or a (n-1) vector if SIDE = 'R'. If SIDE equals 'L', let C = [ C1 ] 1 [ C2 ] m-1 n Then C is overwritten by P*C. If SIDE equals 'R', let C = [ C1, C2 ] m 1 n-1 Then C is overwritten by C*P.
DLAUU2 computes the product U * U' or L' * L, where the triangular factor U or L is stored in the upper or lower triangular part of the array A. If UPLO = 'U' or 'u' then the upper triangle of the result is stored, overwriting the factor U in A. If UPLO = 'L' or 'l' then the lower triangle of the result is stored, overwriting the factor L in A. This is the unblocked form of the algorithm, calling Level 2 BLAS....
DLAUUM computes the product U * U' or L' * L, where the triangular factor U or L is stored in the upper or lower triangular part of the array A. If UPLO = 'U' or 'u' then the upper triangle of the result is stored, overwriting the factor U in A. If UPLO = 'L' or 'l' then the lower triangle of the result is stored, overwriting the factor L in A. This is the blocked form of the algorithm, calling Level 3 BLAS....
dlclose disassociates a shared object previously opened by dlopen, sgidladd, or sgidlopen_version from the current process. Once an object has been closed using dlclose, its symbols are no longer available to dlsym or to the program. All objects loaded automatically as a result of invoking dlopen, on the referenced object [see dlopen(3) sgidladd, or sgidlopen_version] are also closed (however no object still open via any dlopen, sgidladd, or sgidlopen_version is closed till the last open handle ...
dlerror returns a null-terminated character string (with no trailing newline) that describes the last error that occurred during dynamic linking processing. If no dynamic linking errors have occurred since the last invocation of dlerror, dlerror returns NULL. Thus, invoking dlerror a second time, immediately following a prior invocation, results in NULL being returned.
dlopen is one of a family of routines that give the user direct access to the dynamic linking facilities. These routines are available in a library which is loaded if the option -lc is used with cc , f77 or ld. dlopen makes a shared object available to a running process. dlopen returns to the process a handle which the process may use on subsequent calls to dlsym and dlclose. This handle should not be interpreted in any way by the process. pathname is the path name of the object to be opened; it...
dlsym allows a process to obtain the address of a symbol defined within a shared object previously opened by dlopen, sgidlopen_version, or sgidladd. handle is a value returned by a call to dlopen; the corresponding shared object must not have been closed using dlclose. name is the symbol's name as a character string. dlsym searchs for the named symbol in all shared objects loaded automatically as a result of loading the object referenced by handle [see dlopen(3)]. The name search is done in the...
converter is a DMaudioconverter handle created by a previous call to the creation method dmACCreate(3dm). inbuffer is a pointer to the buffer containing the audio data to be converted. Its length may need to be determined via the DM_AUDIO_MIN_INPUT_LEN parameter described below. If inbuffer is NULL, the converter will flush its internal buffers (if any) to the output buffer. outbuffer is a pointer to the buffer where the converter will place the converted data. Its length may need to be determin...
converter is a DMaudioconverter handle created by a previous call to the creation method dmACCreate(3dm). outputSize is a integer set to the requested output buffer size. The units will be bytes if compressing, otherwise frames. minInputSize is a pointer to integer which will be set to the minimum allowable input buffer size for the given outputSize. The units will be bytes if decompressing, otherwise frames. inputSize is a integer set to the requested input buffer size. The units will be bytes ...
converter is a DMaudioconverter handle created by a previous call to the creation method dmACCreate(3dm). sourceparams is a DMparams list describing the audio format of the data to be converted. destparams is a DMparams list describing the audio format into which the data is to be converted. Any parameter not specified will default to the input value, with some exceptions (see below). conversionparams is an optional DMparams list describing specific parameters relating to the conversion process ...
handle DMaudiorateconverter structure, created by dmAudioRateConverterCreate(3dm), specifies the signal processing parameters. inbuf pointer to input data buffer. The converter does not alter the contents of this buffer. The data format is currently limited to single channel, 32-bit floating point. outbuf pointer to output data buffer. Ensure that inbuf and outbuf do not overlap. The data format is currently limited to single channel, 32-bit floating point. Sampling rate conversion alters the le...
The converter is initialized with default configuration: Algorithm: Jitter Free Input sampling rate: 44100 Hertz Output samping rate: 22050 Hertz Stop band attenuation: 78 Decibels Transition band width: 20 % The input and output data format is currently limited to single channel, 32-bit floating point. See dmAudioRateConverterSetParams(3dm) for parameter specification.
handle DMaudiorateconverter structure, created by dmAudioRateConverterCreate(3dm). params List of parameters for specification/query. Null (0) value ok.
dmBufferAllocate reserves a DMbuffer in the specified DMbufferpool. The buffer handle is returned to the address specified with buffer. The availability of buffers in the pool is determined with select(2) (See dmBufferGetPoolFD(3dm) ). If no buffers are available this call immediately returns with DM_FAILURE. The buffer remains reserved until its handle is passed to dmBufferFree(3dm). dmBufferAllocateSize is similar to dmBufferAllocate except that a buffer size may be specified which is differen...
These functions are used to create and destroy pools of digital media buffers. The pools and buffers are used for passing data among application programs and for passing data to and from the digital media libraries. When creating a buffer pool, you must make sure that it is compatible with all of the libraries with which it will be used. Different libraries will have different memory allocation constraints, such as alignment constraints, based on the I/O devices that they control. The sequence o...
dmBufferGetPoolFD returns a file descriptor for use in select(2) or poll(2). dmBufferSetPoolSelectSize sets the available byte count at which select(2) or poll(2) reports the pool has space available for allocation. The file descriptor is for use in the writefds argument to select(2).
dmBufferGetGLPoolParams configures the poolParams given the constrains in DM_IMAGE_WIDTH, DM_IMAGE_HEIGHT and DM_IMAGE_PACKING must be set to valid values for the poolParams to be configured properly. The poolParams must also be configured by other subsystems (like dmIC and VL) before or after it has been configured by this call if the buffer pool is to be shared among the various subsystems (See also dmBufferCreatePool(3dm) ). If the poolParams cannot be altered (due to, for example, incompatib...
dmBufferMapData returns a pointer to the memory in buffer. The pointer can be used for reading and writing the contents of the buffer. The pointer remains valid until the buffer is freed with dmBufferFree(3dm). After allocating a digital media buffer with dmBufferAllocate(3dm), the pointer returned dmBufferMapData by can be used to write data into the buffer. However, once the buffer has been sent to one of the digital media libraries, the pointer may be used to read from the buffer, but the con...
dmBufferGetPoolState returns the number of bytes and buffers which can be successfully allocated from the pool before the pool fills up with allocated buffers (causing dmBufferAllocate to fail). Currently, each buffer in a DMbufferpool has a fixed size. Therefore, the number of DMbuffers which can be allocated and the number of bytes which can be allocated are related by a constant factor, which is returned by dmBufferGetAllocSize. This may change in future releases....
dmBufferGetUserData returns size bytes of user data in data. The maximum size of the user data area of buffer is DM_BUFFER_MAX_AUX_DATA_SIZE. The size of valid user data is set by dmBufferSetUserData. dmBufferSetUserData copies size bytes of data pointed to by data into the user data area of buffer. If size is greater than DM_BUFFER_MAX_AUX_DATA_SIZE , DM_FAILURE is returned.
The Color Space Library (CSL) provides a simple, yet powerful, means of converting images between color spaces (models), packings, subsamplings and datatypes and/or performing some operation on the image data, such as adjusting its contrast. The CSL adopts the concept of a "color converter" for which the source and destination images' parameters are specified as well as various conversion parameters. The image parameters are supplied via a DMparams using the calls dmColorSetSrcParams and dmCo...
DMcolorconverter converter The converter upon which the action is to be applied. DMparams *convParams The DMparams which provides/accepts the image conversion parameters.
DMcolorconverter converter The converter upon which the action is to be applied. DMparams *imageParams The DMparams which provides/accepts the image parameters.
handle DMDVaudiodecoder structure, created by dmDVAudioDecoderCreate(3dm), specifies the states of the signal processing parameters. ibuf pointer to input compressed data buffer, which is a complete DIF frame with embedded audio. See dm_dv(3dm) for more information about DIF frames, DV, and DVCPRO. The DIF input buffer size must be either DM_DVAUDIO_NTSC_DIF_FRAMESIZE or DM_DVAUDIO_PAL_DIF_FRAMESIZE. obuf pointer to output sample data buffer. The data format is short (16-bit). The samples are as...
handle DMDVaudioencoder structure, created by dmDVAudioEncoderCreate(3dm), specifies the states of the signal processing parameters. ibuf pointer to input sample data buffer. The data format is short (16-bit). The samples are assumed to be two's complement. Sampling rate can be either 32 kHz or 48 kHz. obuf pointer to output data buffer which is a complete DIF frame. See dm_dv(3dm) for more info about DIF, DV, and DVCPRO. The audio is inserted into the DIF frame without affecting any video that...
handle DMDVaudioencoder structure, created by dmDVAudioEncoderCreate(3dm). params list of parameters to configure the audio encoder. Null (0) value ok.
dif Points to a valid frame of DIF data which contains embedded audio. See dm_dv(3dm) for more info about DIF, DV, and DVCPRO. params This params list is filled out by the function and returns extensive information about the audio in the DIF frame. numSampFrames If this paramater is non-NULL, the number of 16 bit samples embedded inside the DIF frame is returned in this parameter.
handle DMDVIaudiodecoder structure, created by a previous call to dmDVIAudioDecoderCreate(3dm). It contains the state associated with the decoder. ibuf A pointer to the compressed input data buffer. The data format is unsigned char (8-bit). obuf A pointer to the output sample data buffer. The data format is short (16-bit). The samples are assumed to be two's complement. Sampling rate may range from 8 kHz to 48 kHz, but has to be the same as encoder. nsamples The number of samples to be processe...
handle DMDVIaudioencoder structure, created by a previous call to dmDVIAudioEncoderCreate(3dm). It contains the state associated with the encoder. ibuf pointer to input sample data buffer. The data format is short (16-bit). The samples are assumed to be two's complement. Sampling rate could range from 8 kHz to 48 kHz. obuf pointer to output compressed data buffer. The data format is unsigned char (8-bit). nsamples The number of samples to be processed. For the 4:1 algorithm (the only one curren...
A "media stream" is a continuous stream of audio or video data entering or leaving the computer system through the audio/video connectors, or a stream of video data which is displayed through the graphics subsystem. An interlaced video stream consists of alternating even and odd video fields. Each field in the stream is sampled at a different time. Odd fields are vertically offset from even fields by one scan line. A non- interlaced video stream is composed of video frames. A frame may be conv...
handle DMFS1016decoder structure, created by dmFS1016DecoderCreate(3dm), specifies the signal processing parameters. ibuf pointer to input compressed data buffer. The data format is unsigned char (8-bit). This bitstream buffer must consist of a multiple of 18 bytes. obuf pointer to output sample data buffer. The data format is short (16-bit). The samples are assumed to be two's complement. The sampling rate must be 8 kHz. nsamples number of sample in the output buffer to be generated. The value...
handle DMFS1016encoder structure, created by dmFS1016EncoderCreate(3dm), specifies the signal processing parameters. ibuf pointer to input sample data buffer. The data format is short (16-bit). The samples are assumed to be two's complement. The sampling rate must be 8 kHz. obuf pointer to output data buffer. The data format is unsigned char (8-bit). This bitstream buffer must consist of a multiple of 18 bytes. nsamples number of samples in the input buffer to be processed. The value of nsample...
These two parameters are common to all of these functions. The other parameters are described below in the sections on the different functions. Page 1 dmFXDrawPixels(3dm) dmFXDrawPixels(3dm) destination The image buffer into which pixels are copied. source The image buffer from which pixels are copied.
Special effects plugins may have user customizable settings in the form of a dialog box. These dialog boxes may have an image viewer. This class provides an easy way for plugins to display an image.
inputUsage Specifies the modes in which dstFrame will be used as input; says how the image will be read from the buffer and used as input to a plug-in or application. The value is a bitwise combination of one or more of: bufInputDirect, bufInputTexture, bufInputDrawPixels, bufInputMovie. The options set must include all of the different ways in which dstFrame will be used. fieldA The "top-most" field. Scanline 0 of fieldA will be copied to scanline 0 of the destination frame (dstFrame). fieldB...
inputUsage Specifies the modes in which the destination field buffers (fieldA and fieldB) will be used as input; says how the image will be read from the buffers and used as input to a plug-in or application. The value is a bitwise combination of one or more of: bufInputDirect, bufInputTexture, bufInputDrawPixels, bufInputMovie. The options set must include all of the different ways in which fieldA and fieldB will be used. srcFrame The source frame to copy scanlines from. The even numbered scanl...
source The image buffer holding the image to be used as a texture. mipmap If true, a mipmap will be generated so that the mipmapped texture modes can be used.
imageFormat A parameter list that describes the new image size to be stored in the buffer. buffer An image buffer. numberOfBuffers The number of elements in the array buffers. buffers An array of image buffers.
samples pointer to input sample data buffer. The data format is short (16-bit). The samples are assumed to be two's complement. Sampling rate could range from 8 kHz to 48 kHz. mulawdata pointer to output mulaw data buffer. The data format is unsigned char (8-bit). Alawdata pointer to output Alaw data buffer. The data format is unsigned char (8-bit). Page 1 dmG711(3dm) dmG711(3dm) numsamples length of the input and output buffers, in samples....
handle DMG722decoder structure, created by dmG722DecoderCreate(3dm), specifies the signal processing parameters. ibuf pointer to input compressed data buffer. The data format is unsigned char (8-bit). obuf pointer to output sample data buffer. The data format is short (16-bit). The samples are assumed to be two's complement. Sampling rate must be 16 kHz or less. nsamples number of sample in the input buffer to be processed. the value of nsamples passed to the G.722 decode/decode routines must a...
decoder DMG722decoder structure to be allocated. maxsamples maximum of the data samples that can be process by dmG722Decode(3dm) in a single call. The input and output data format for dmG722Decode(3dm) are 8-bit unsigned char and 16-bit short, respectively. decode_mode G.722 decompression mode. They can be 1, 2, or 3, which correspond to 64, 56 or 48 kbit/sec for audio coding and 0, 8 or 16 kbit/sec. for data....
handle DMG722encoder structure, created by dmG722EncoderCreate(3dm), specifies the signal processing parameters. ibuf pointer to input sample data buffer. The data format is short (16-bit). The samples are assumed to be two's complement. Sampling rate must be 16 kHz or less. obuf pointer to output data buffer. The data format is unsigned char (8-bit). nsamples number of samples in the input buffer to be processed. the value of nsamples passed to the G.722 encode/decode routines must always be a...
encoder DMG722encoder structure to be allocated. maxsamples maxmum of the date samples that can be process by dmG722Encode(3dm) in a single call. The input and output data format for dmG722Encode(3dm) are 16-bit short and 8-bit unsigned char respectively.
handle DMG726decoder structure, created by dmG726DecoderCreate(3dm), specifies the signal processing parameters. ibuf pointer to input compressed data buffer, an array of bytes. The data format is unsigned char (8-bit). The input bitstrem buffer consists of a multiple of 1, 3, 1, or 5 bytes, for operations at 16, 24, 32, or 40 kbit/s respectively. obuf pointer to output sample data buffer, an array of short (16 bits) for linear output or unsigned char for A-law or mu-law output. For linear outpu...
handle DMG726encoder structure, created by dmG726EncoderCreate(3dm), specifies the signal processing parameters. ibuf pointer to input sample data buffer, an array of short (16 bits) for linear input or unsigned char for A-law or mu-law input. For linear input, samples are assumed to be two's complement. Data buffer must be a multiple (the same multiple as that of output bitstrem buffer) of 4, 8, 2, or 8 for operations at 16, 24, 32, or 40 kbit/s respectively. This assumes the sampling rate of ...
handle DMG728decoder structure, created by dmG728DecoderCreate(3dm), specifies the signal processing parameters. ibuf pointer to input compressed data buffer. The data format is unsigned char (8-bit). This bitstrem buffer must consist of a multiple of 10 bytes. obuf pointer to output sample data buffer. The data format is short (16-bit). The samples are assumed to be two's complement. The sampling rate must be 8 kHz. nsamples number of sample in the output buffer to be generated. the value of n...
handle DMG728encoder structure, created by dmG728EncoderCreate(3dm), specifies the signal processing parameters. ibuf pointer to input sample data buffer. The data format is short (16-bit). The samples are assumed to be two's complement. The sampling rate must be 8 kHz. obuf pointer to output data buffer. The data format is unsigned char (8-bit). This bitstrem buffer must consist of a multiple of 10 bytes. nsamples number of samples in the input buffer to be processed. the value of nsamples pas...
pid The process id in which to check for an error. In dmGetError(), this defaults to the current pid as returned by getpid(2). errornum A pointer to an integer into which the error number of the current error will be loaded. If errornum is NULL, it will be ignored. error_detail The address of a char array of size DM_MAX_ERROR_DETAIL, allocated in the application's memory space. A detailed description of the error will be loaded into this array, if such a description is available. This string wi...
dmGetUST(3dm) returns a high-resolution, unsigned 64-bit number to processes using libdmedia. The value of UST is the number of nanoseconds since the system was booted. Though the resolution is 1 nanosecond, the actual accuracy may be somewhat lower and varies from system to system. Unlike other representations of time under UNIX, the value from which this timestamp derives is never adjusted; therefore it is guaranteed to be monotonically increasing. Typically, the UST is used as a timestamp; th...
handle DMGSMdecoder structure, created by dmGSMDecoderCreate(3dm), specifies the signal processing parameters. ibuf pointer to input compressed data buffer, an array of a multiple of 33 bytes. The data format is unsigned char (8-bit). obuf pointer to output sample data buffer, an array of size of a multiple of 160. The data format is short (16-bit). The samples are assumed to be two's complement. The sampling rate must be 8 kHz. numSamples number of sample in the output buffer to be generated. ...
handle DMGSMencoder structure, created by dmGSMEncoderCreate(3dm), specifies the signal processing parameters. ibuf pointer to input sample data buffer, an array of size of a multiple of 160. The data format is short (16-bit). The samples are assumed to be two's complement. The sampling rate must be 8 kHz. obuf pointer to output data buffer, an array of a multiple of 33 bytes. The data format is unsigned char (8-bit). numSamples number of sample in the input buffer to be processed. the value of...
pBufferSrc pointer to source image pBufferDst pointer to destination image pParamsSrc pointer to Source parameters that describes the source image. pParamsDst pointer to Destination parameters that describes the destination image, the user indends to convert to. pParamsConv pointer to Conversion parameters that may be used during any color conversion.
dmICChooseConverter returns the index of an image converter which performs the conversion of image data described by src to that described by dst using the conversion control parameters in conv. The number returned is for use in dmICGetDescription and dmICCreate. If no converter could be found, -1 will be returned and an error will be set (see dmSetError(3dm)). If the function succeeds, src, dst and conv can then be used in dmICSetSrcParams, dmICSetDstParams and dmICSetConvParams respectively. I...
The conversion parameters convParams control the image converter's operation. The list of supported conversion parameters vary from converter to converter. dmICGetDefaultConvParams returns the set of supported parameters and their default values. Conversion parameters supported by some converters are:
dmICGetNum returns the number of image converters available.This value may change from invocations to invocations, depending upon whether any image converters has been added or removed from the system since its last invocation. dmICGetDescription returns the description of the indicated converter. The value of the i argument ranges from 0 to one less than the value returned by dmICGetNum. The description consists of the values of the following DMparams parameters: DM_IC_ID Use dmParamsGetInt to ...
dmICCreate creates an image converter context. The actual selection of an image converter is separate from this operation. The i argument specifies the image converter to create and is a value in the range of 0 to one less than the return value of dmICGetNum. The return value of dmICChooseConverter is always valid directly in dmICCreate. NOTE: The i value for a given image converter may change at any time. The converter argument is the address of a caller supplied data structure for for use as a...
The image converters only operate on DMbuffer's allocated from a DMbufferpool (see dmBuffer(3dm)). Prior to setting up a pool for use by an image converter, users must call dmICGetSrcPoolParams and dmICGetDstPoolParams to set up the poolParams used to initialize a pool. If any of the source or destination buffers are to be shared with other subsystems, the Video Library (VL) or the Graphics Library (OpenGL), the application must make the corresponding calls in those libraries to make sure that ...
dmICGetDstQueueFD returns the file descriptor of the output queue, that becomes readable when output becomes available from the image converter. A user may use this in readfds in select(2) or in pollfds in poll(2) in an asynchronous application to receive notification when there is output available from the image converter. dmICGetDstQueueFilled returns the number of output buffers available to be received from the image converter using dmICReceive. dmICGetSrcQueueFilled returns the number of bu...
dmICReceive receives the next available output buffer from the image converter. If it succeeds, dstBuffer will point to an output buffer that contains the output bytes, allocated by the image converter. After dmICReceive returns, the caller is automatically attached to the buffer (see dmBuffer(3dm). When dstBuffer is no longer referenced, dmBufferFree must be called to free up the buffer resource. The contents of dstBuffer should not be modified. After dmICReceive returns, dmICGetSrcParams, dmIC...
This function sends a source buffer together with its reference buffers to the image converter. converter the converter instance srcBuffer the source buffer numRefBuffers the number of reference buffers pointed to by refBuffers refBuffers an array of reference buffers
This function calls into the image converter and has it perform a task (such as a compress or uncompress) on the buffers that have previously been sent to it using dmICSend. converter the converter instance status_flags bit field flags returning information about what transpired during the dmICWork call, especially in the event of an error. Flags include: DM_IC_WORK_NO_STATUS, DM_IC_WORK_ERROR, DM_IC_WORK_NOT_NEEDED, DM_IC_WORK_INSUFFICIENT_INPUT_DATA, and DM_IC_WORK_INSUFFICIENT_OUTPUT_SPACE. n...
These routines provide a mechanism for decoding linear (or longitudinal) time code (LTC). LTC is a mechanism for storing and transferring SMPTE time code as an audio-like waveform. Applications may use LTC to synchronize audio, video, or other events with external devices by decoding an LTC signal connected to an audio input port, or they may parse the LTC code from a previously captured audio or movie file. To decode LTC from an external device, the LTC or time code output of the device should ...
decoder DMMPEG1audiodecoder structure, created by dmMPEG1AudioDecoderCreate(3dm), specifies and stores the signal processing parameters. It describes the kind of decompression to perform, and holds the between-block state of the decompressor. It is initially generated and processed by calls to dmMPEG1AudioDecoderCreate(3dm) and dmMPEG1AudioDecoderSetParams(3dm), and is modified on each call. To get decoder in the proper state for the first call, see DESCRIPTION below. cmpData points to the next ...
encoder DMMPEG1audioencoder structure, created by dmMPEG1AudioEncoderCreate(3dm), specifies and stores the signal processing parameters. It describes the kind of compression to perform, and holds the between-block state of the compressor. It is initially generated and processed by calls to dmMPEG1AudioEncoderCreate(3dm) and dmMPEG1AudioEncoderSetParams(3dm), and is modified on each call. sampBuf pointer to input sample data buffer. The data format is short (16-bit). The samples are assumed to be...
encoder DMMPEG1audioencoder structure, created by dmMPEG1AudioEncoderCreate(3dm). decoder DMMPEG1audiodecoder structure, created by dmMPEG1AudioDecoderCreate(3dm). params List of parameters for specification.
coder either DMMPEG1audioencoder or DMMPEG1audiodecoder structure, from/to which the filter state information is to be saved/restored. filterState DMMPEG1audiofilterstate structure to be used to save or restore the filter state information.
decoder DMMPEG1audiodecoder structure, created by dmMPEG1AudioDecoderCreate(3dm), specifies and stores the signal processing parameters. It describes the kind of decompression to perform, and holds the between-block state of the decompressor. It is initially generated by calls to dmMPEG1AudioDecoderCreate(3dm) and dmMPEG1AudioDecoderSetParams(3dm). dmMPEG1AudioHeaderGetBlockBytes modifies DMMPEG1audiodecoder structure to reflect the header on the compressed data block if one is found; decoder pa...
cmpData points to a block of data bytes presumed to constitute the compressed data stream and start with a MPEG audio header. params List of parameters for specification.
dmNet Library is used by applications that need to transfer DMbuffers between processes on the same host, or on different hosts across a network. dmNet performs marshalling and unmarshalling of DMbuffers, converting timestamps and endianness. dmNet abstracts the underlying transport, and provides maximal throughput across network transports like Ethernet, Striped Hippi and Fibrechannel, by using native protocols whenever possible, thus liberating applications from the task of network-specific pe...
dmNetConnect is the sender side routine which sets up a control connection. It opens a socket descriptor and tries to connect to the specified address. It calls connect and sets appropriate socket options. It requires a port and a hostname, specified through the parameters DMNET_PORT and DMNET_REMOTE_HOSTNAME. dmNetListen and dmNetAccept are the receiver side calls that set up a control connection. dmNetListen opens a socket descriptor for control, sets socket options as appropriate, calls bind ...
dmNetDataFd returns a file descriptor associated with the specified DMNetConnection. This descriptor is suitable for use by select() to signify the availability of incoming data.
dmNetGetParams takes the specified parameter list and modifies and/or adds parameters as appropriate for creating a DMbufferpool for use with the specified DMNetConnection. Applications that send or receive DMbuffers from a DMNetconnection must call this routine before allocating a DMbufferpool.
dmNetOpen Allocates and initializes a DMNetConnection structure which can be used to open a connection to a remote process in order to pass DMbuffers. dmNetClose closes and de-allocates all structures associated with the specified DMNetConnection.
dmNetRegisterPool and dmNetRegisterBuffer are the suite of dmNet memory registration calls, relevant only to the receiver process. One of these two calls must be made before a call to dmNetRecv is made, or dmNetRecv will fail with ENOMEM. dmNetRegisterPool allows an application to specify a buffer pool from which dmNetRecv may allocate memory for incoming DMbuffers. The buffer must be returned to the pool with a call to dmBufferFree after the application is done with it, or dmNetRecv may fail wi...
dmNetSend sends the specified DMbuffer over the open data connection specified by DMnetconnection. dmNetRecv returns a filled DMbuffer from the open data connection specified by DMnetconnection. The DMbuffer is allocated from the DMbufferpool which had been previous registered with the call to dmNetRegisterPool or is pre-allocated and passed into dmNetRecv, after a call to dmNetRegisterBuffer .
Parameter/value lists are used by the Digital Media Libraries to hold configuration information about digital video and movies. There are standard parameters that apply to images (for video and movies) and standard parameters that apply to audio (for movies). The function dmParamsCreate is used to create a new (empty) parameter/value list. This can be filled in one of several ways: (1) using the generic "set" functions such as dmParamsSetInt, (2) using a function to set up the standard paramet...
These functions are used to convert a digital media parameter list into a form that can be written to a file or sent over a network, and then later to reconstruct the parameter list. dmParamsFlatten converts the parameters in sourceParams to a byte string and stores the result in the buffer provided by the caller. There are two ways to use it: to store just one parameter, or to store the entire contents of a parameter list. To store just one parameter, pass the name of the desired parameter in p...
These functions have been obsoleted and are provide only for backward compatibility. New implementations should use dmParamsScan to traverse a parameter/value list, or dmParamsGetType to determine the type of an entry in a list. dmParamsGetElem returns the name of the nth element of a parameter value list. The index given must be from 0 to one less than the number of elements in the list. dmParamsGetElemType returns the type of value stored in an entry in the list. The value returned will be one...
These functions all retrieve values stored in a parameter/value list. They assume that the named parameter is present and is of the specified type; the debugging version of the library asserts that this is the case. The value, or a pointer to it is returned. For strings, binary data, parameter lists, and table-of-contents entries, the pointer returned points into the internal data structure of the parameter list. It should never be freed, and is only guaranteed to remain valid until the next tim...
These functions all retrieve values stored in a parameter/value list. They assume that the named parameter is present and is of the specified type; the debugging version of the library asserts that this is the case. The value, or a pointer to it is returned. The returned array points to the internal data structure of the parameter list, and is owned by the parameter list. It should never be freed, and is only guaranteed to remain valid until the next time the list is changed. In general, if you ...
These functions all retrieve values stored in a parameter/value list. They assume that the named parameter is present and is of the specified type; the debugging version of the library asserts that this is the case. The value, or a pointer to it is returned. The returned range points to the internal data structure of the parameter list, and is owned by the parameter list. It should never be freed, and is only guaranteed to remain valid until the next time the list is changed. In general, if you ...
dmParamsGetNumElems returns the number of elements present in a parameter/value list. The number of elements in a list, and their ordering is guaranteed to remain stable unless the list is changed using one of the "set" functions, by copying an element into it, or by removing an element. dmParamsGetType returns the type of value stored in an entry in the list. The value returned will be one of: DM_TYPE_ENUM, DM_TYPE_INT, DM_TYPE_STRING, DM_TYPE_FLOAT, DM_TYPE_FRACTION, DM_TYPE_PARAMS, or DM_TY...
dmParamsScan scans all of the elements present in a parameter/value list, calling the provided operator function on each entry. This can be used in a program that wants to loop through the contents of a parameter/value list. dmParamsScan applies scanFunc to each element in a parameter/value list, passing the name of the list entry and scanArg as parameters to scanFunc. If scanFunc sets the value of the variable stopScan to DM_TRUE, the parameter/value list scan will be stopped, and the return va...
These functions all store values in a parameter value list. If there is already a value in the list with the given name it will be replaced with the new one. For strings, binary data, parameter lists, and table-ofcontents entries, a copy is made that is owned by the parameter list. DM_SUCCESS is returned if the operation succeeded, DM_FAILURE if there was not enough memory available to hold a copy of the value. Page 1 dmParamsSetInt(3dm) dmParamsSetInt(3dm)...
These functions all store arrays of values in a parameter value list. If there is already a value in the list with the given name it will be replaced with the new one. The contents of the array passed in is copied into the parameter list. This means that the caller can free the array structure after storing it in the parameter list. DM_SUCCESS is returned if the operation succeeded, DM_FAILURE if there was not enough memory available to hold a copy of the array....
These functions all store ranges of values in a parameter value list. If there is already a value in the list with the given name it will be replaced with the new one. The contents of the range passed in is copied into the parameter list. This means that the caller can free the range structure after storing it in the parameter list. DM_SUCCESS is returned if the operation succeeded, DM_FAILURE if there was not enough memory available to hold a copy of the range....
effect A pointer to a DMeffect, which was returned from dmPMCreateEffect. byteStream A placeholder for the byte stream. numBytes The size of the byte stream to be returned.
manager A pointer to a DMplugmgr, which was returned from dmPMCreateManager. plugin A pointer to a DMplugin, which was returned from dmPMInitPlugin. name The name of a plugin from which to create the DMeffect. prefix The prefix of a plugin from which to create the DMeffect; can be NULL. effect A pointer to a DMeffect, which was returned from dmPMCreateEffect or dmPMCreateEffectByName.
manager A pointer to a DMplugmgr, which was returned from dmPMCreateManager. byteStream The byte stream from which to create the DMeffect. numBytes The size of the byte stream.
parent The parent widget to use if the plugin requires a GUI; can be NULL. manager A pointer to a DMplugmgr, which was returned from dmPMCreateManager.
pluginType The plugin type that you want the default path for. pluginType must be exactly one of: DM_VIDEO_FILTER, DM_VIDEO_TRANSITION, DM_AUDIO_FILTER. Note that with this usage of pluginType, you cannot specify more than one plugin type.
manager A pointer to a DMplugmgr, which was returned from dmPMCreateManager. n The index into the plugin list in the plugin-manager. name The name of a plugin to retrieve. prefix The prefix of a plugin to retrieve; can be NULL. pathname The pathname of a plugin to retrieve. effect A pointer to a DMeffect, which was returned from dmPMCreateEffect.
plugin A pointer to a DMplugin, which was created with dmPMInitPlugin or dmPMInitDirectory. property A property to obtain from the plugin. value dmPMGetProperty will fill in the value of the property.
manager A pointer to a DMplugmgr, which was returned from dmPMCreateManager. pathname The pathname of the directory from which to initialize the plugins; can be NULL. typemask The typemask of the plugin type which is a bitwise combination of one or more of: DM_VIDEO_FILTER, DM_VIDEO_TRANSITION, DM_AUDIO_FILTER, or DM_ALL_PLUGIN_TYPES. progressCallback The progressCallback is a pointer to a DMprogresscallback callback. This callback gets triggered periodically during the loading of plugins if and...
manager A pointer to a DMplugmgr, which was returned from dmPMCreateManager. pathname The pathname of a plugin to initialize. plugin A pointer to a DMplugin, which was returned from dmPMInitPlugin.
arrayOfOperations an array of: source movies, filters, and transitions Page 1 dmPMProcessImageClip(3dm) dmPMProcessImageClip(3dm) numberOfOperations The number of DMprocessops in arrayOfOperations. callSetup If true, the setup function (dmPMSetupVideoFilter or dmPMSetupVideoTransition) will be called once for each effect before the movie is processed. frameDuration The fraction frameDuration/timescale is the duration, in seconds, of each frame generated. movieDuration The fraction movieDuration/...
effect A pointer to a DMeffect, which was returned from dmPMCreateEffect. audioCallback A callback for a DMeffect, defined as follows: DMstatus DMaudiocallback( void *clientData, int firstByte, int size, unsigned char *samples); videoCallback A callback for a DMeffect, defined as follows: DMstatus DMvideocallback( void *clientData, int frame, DMplugintrack track, /* DM_TRACK_A or DM_TRACK_B */ int width, int height, int rowBytes, unsigned char *data); clientData The clientData gets passed into t...
effect A pointer to a DMeffect, which was returned from dmPMCreateEffect. src A pointer to the source audio samples. srcParams The source parameter/value list, a pointer to DMparams, can be created with dmParamsCreate. firstByte The first sample byte offset. size The size of src in bytes. total The total byte size of the audio clip. dst A pointer to the destination audio samples. dstParams The destination parameter/value list, a pointer to DMparams, can be created with dmParamsCreate. Page 1 dmP...
effect A pointer to a DMeffect, which was returned from dmPMCreateEffect. src A pointer to the video source image. Page 1 dmPMSetupVideoFilter(3dm) dmPMSetupVideoFilter(3dm) srcParams The source parameter/value list, a pointer to DMparams, can be created with dmParamsCreate. part Goes from 0 to total (inclusive). total The total number of frames. dst A pointer to the video destination image. dstParams The destination parameter/value list, a pointer to DMparams, can be created with dmParamsCreate...
effect A pointer to a DMeffect, which was returned from dmPMCreateEffect. srcA A pointer to the video source image for track A. srcAParams The source (track A) parameter/value list, a pointer to DMparams, can be created with dmParamsCreate. srcB A pointer to the video source image for track B. srcBParams The source (trackB) parameter/value list, a pointer to DMparams, can be created with dmParamsCreate. part Goes from 0 to total (inclusive). total The total number of frames. dst A pointer to the...
dmSetAudioDefaults sets up a parameter list with all of the necessary parameters to describe audio for the digital-media libraries. The parameters that are set and their values are: DM_MEDIUM = DM_AUDIO, DM_AUDIO_WIDTH = width, DM_AUDIO_FORMAT = DM_AUDIO_TWOS_COMPLEMENT, DM_AUDIO_RATE = rate, DM_AUDIO_CHANNELS = channels, DM_AUDIO_COMPRESSION = DM_AUDIO_UNCOMPRESSED. dmSetAudioDefaults returns DM_SUCCESS if there was enough memory available to set up the parameters, and DM_FAILURE if not. dmAudi...
dmSetImageDefaults sets up a parameter list with all of the necessary parameters to describe an image for the digital-media libraries. The parameters that are set and their values are: DM_MEDIUM = DM_IMAGE, DM_IMAGE_WIDTH = width, DM_IMAGE_HEIGHT = height, DM_IMAGE_RATE = 15.0, DM_IMAGE_COMPRESSION = DM_IMAGE_UNCOMPRESSED, DM_IMAGE_INTERLACING = DM_IMAGE_NONINTERLEAVED, DM_IMAGE_PACKING = packing, DM_IMAGE_ORIENTATION = DM_BOTTOM_TO_TOP, DM_IMAGE_PIXEL_ASPECT = 1.0. dmSetImageDefaults returns DM...
DMtimecode A structure containing a representation of SMPTE time code on which certain mathematical and utility functions can be performed. Can be used with: dmTCAddTC(3dm), dmTCAddFrames(3dm), dmTCToString(3dm), dmTCFromSeconds(3dm), dmTCToSeconds(3dm), dmTCFromString(3dm), dmTCFramesPerDay(3dm), and dmTCFramesBetween(3dm). Can also be used with the dmLTC(3dm) and dmVITC(3dm) routines. See also DMtimecode(3dm)....
DMtimecode A structure containing a representation of SMPTE time code on which certain mathematical and utility functions can be performed. Can be used with: dmTCAddTC(3dm), dmTCAddFrames(3dm), dmTCToString(3dm), dmTCFromSeconds(3dm), dmTCToSeconds(3dm), dmTCFromString(3dm), dmTCFramesPerDay(3dm), and dmTCFramesBetween(3dm). Can also be used with the dmLTC(3dm) and dmVITC(3dm) routines. See also DMtimecode(3dm)....
DMtimecode A structure containing a representation of SMPTE time code on which certain mathematical and utility functions can be performed. Can be used with: dmTCAddTC(3dm), dmTCAddFrames(3dm), dmTCToString(3dm), dmTCFromSeconds(3dm), dmTCToSeconds(3dm), dmTCFromString(3dm), dmTCFramesPerDay(3dm), and dmTCFramesBetween(3dm). Can also be used with the dmLTC(3dm) and dmVITC(3dm) routines. See also DMtimecode(3dm)....
DMtimecode A structure containing a representation of SMPTE time code on which certain mathematical and utility functions can be performed. Can be used with: dmTCAddTC(3dm), dmTCAddFrames(3dm), dmTCToString(3dm), dmTCFromSeconds(3dm), dmTCToSeconds(3dm), dmTCFromString(3dm), dmTCFramesPerDay(3dm), and dmTCFramesBetween(3dm). Can also be used with the dmLTC(3dm) and dmVITC(3dm) routines. See also DMtimecode(3dm)....
DMtimecode A structure containing a representation of SMPTE time code on which certain mathematical and utility functions can be performed. Can be used with: dmTCAddTC(3dm), dmTCAddFrames(3dm), dmTCToString(3dm), dmTCFromSeconds(3dm), dmTCToSeconds(3dm), dmTCFromString(3dm), dmTCFramesPerDay(3dm), and dmTCFramesBetween(3dm). Can also be used with the dmLTC(3dm) and dmVITC(3dm) routines.
These routines provide a mechanism for decoding vertical interval time code (VITC). VITC is a mechanism for storing and transferring SMPTE time code in the vertical blanking portion of a video signal. Applications may use VITC to synchronize audio, video, or other events with external devices by decoding VITC from a video source connected to a video input port, or they may parse the VITC code from a previously captured movie file. To decode VITC, a video source with embedded VITC must be connect...
The DV and DVCPRO image and audio compression standards operate with dmIC and dmAC and dmBuffers as described in this man page. The dmIC and dmAC man pages are generic and contain no information about specific compression schemes. This man page describes details of dmIC specific to DV and DVCPRO image compression, and also describes DV and DVCPRO audio compression. This man page describes the difference between DV and DVCPRO compression, and makes recommendations as to when you should use each o...
The JPEG compression standard (ISO/IEC 10918) operates with dmIC and dmBuffers as described in this man page. The dmIC man pages are generic and contain no information about specific compression schemes. This man page describes details of dmIC specific to baseline (DCT-based, Huffmanencoded) JPEG. NOTE: Some previous generation realtime JPEG products are not supported via this interface. Indy Cosmo and Indigo2 Cosmo2 are available only via the Compression Library (CL). See CLintro and cl_jpeg fo...
doconfig is a Service Access Facility library function that interprets the configuration scripts contained in the files /etc/saf/pmtag/_config, /etc/saf/_sysconfig, and /etc/saf/pmtag/svctag. script is the name of the configuration script; fd is a file descriptor that designates the stream to which stream manipulation operation...
int flags (in) This parameter is normally zero. It may be an OR-ed combination of any of the following flag bits: TK_X_EVENTS, TK_FILE_EVENTS, TK_TIMER_EVENTS, TK_IDLE_EVENTS, TK_ALL_EVENTS, or TK_DONT_WAIT. XEvent *eventPtr (in) Pointer to X event to dispatch to relevant handler(s).
DOPGTR generates a real orthogonal matrix Q which is defined as the product of n-1 elementary reflectors H(i) of order n, as returned by DSPTRD using packed storage: if UPLO = 'U', Q = H(n-1) . . . H(2) H(1), if UPLO = 'L', Q = H(1) H(2) . . . H(n-1).
DOPMTR overwrites the general real M-by-N matrix C with TRANS = 'T': Q**T * C C * Q**T where Q is a real orthogonal matrix of order nq, with nq = m if SIDE = 'L' and nq = n if SIDE = 'R'. Q is defined as the product of nq-1 elementary reflectors, as returned by DSPTRD using packed storage: if UPLO = 'U', Q = H(nq-1) . . . H(2) H(1); if UPLO = 'L', Q = H(1) H(2) . . . H(nq-1).
pup expects the identifier of the pop-up menu you want to display. FUNCTION RETURN VALUE The returned value of the function is the value of the item selected from the pop-up menu. If the user makes no menu selection, the returned value of the function is -1.
DORG2L generates an m by n real matrix Q with orthonormal columns, which is defined as the last n columns of a product of k elementary reflectors of order m Q = H(k) . . . H(2) H(1) as returned by DGEQLF.
DORG2R generates an m by n real matrix Q with orthonormal columns, which is defined as the first n columns of a product of k elementary reflectors of order m Q = H(1) H(2) . . . H(k) as returned by DGEQRF.
DORGBR generates one of the real orthogonal matrices Q or P**T determined by DGEBRD when reducing a real matrix A to bidiagonal form: A = Q * B * P**T. Q and P**T are defined as products of elementary reflectors H(i) or G(i) respectively. If VECT = 'Q', A is assumed to have been an M-by-K matrix, and Q is of order M: if m >= k, Q = H(1) H(2) . . . H(k) and DORGBR returns the first n columns of Q, where m >= n >= k; if m < k, Q = H(1) H(2) . . . H(m-1) and DORGBR returns Q as an M-by-M matrix. ...
DORGHR generates a real orthogonal matrix Q which is defined as the product of IHI-ILO elementary reflectors of order N, as returned by DGEHRD: Q = H(ilo) H(ilo+1) . . . H(ihi-1).
DORGL2 generates an m by n real matrix Q with orthonormal rows, which is defined as the first m rows of a product of k elementary reflectors of order n Q = H(k) . . . H(2) H(1) as returned by DGELQF.
DORGLQ generates an M-by-N real matrix Q with orthonormal rows, which is defined as the first M rows of a product of K elementary reflectors of order N Q = H(k) . . . H(2) H(1) as returned by DGELQF.
DORGQL generates an M-by-N real matrix Q with orthonormal columns, which is defined as the last N columns of a product of K elementary reflectors of order M Q = H(k) . . . H(2) H(1) as returned by DGEQLF.
DORGQR generates an M-by-N real matrix Q with orthonormal columns, which is defined as the first N columns of a product of K elementary reflectors of order M Q = H(1) H(2) . . . H(k) as returned by DGEQRF.
DORGR2 generates an m by n real matrix Q with orthonormal rows, which is defined as the last m rows of a product of k elementary reflectors of order n Q = H(1) H(2) . . . H(k) as returned by DGERQF.
DORGRQ generates an M-by-N real matrix Q with orthonormal rows, which is defined as the last M rows of a product of K elementary reflectors of order N Q = H(1) H(2) . . . H(k) as returned by DGERQF.
DORGTR generates a real orthogonal matrix Q which is defined as the product of n-1 elementary reflectors of order N, as returned by DSYTRD: if UPLO = 'U', Q = H(n-1) . . . H(2) H(1), if UPLO = 'L', Q = H(1) H(2) . . . H(n-1).
DORM2L overwrites the general real m by n matrix C with where Q is a real orthogonal matrix defined as the product of k elementary reflectors Q = H(k) . . . H(2) H(1) as returned by DGEQLF. Q is of order m if SIDE = 'L' and of order n if SIDE = 'R'.
DORM2R overwrites the general real m by n matrix C with where Q is a real orthogonal matrix defined as the product of k elementary reflectors Q = H(1) H(2) . . . H(k) as returned by DGEQRF. Q is of order m if SIDE = 'L' and of order n if SIDE = 'R'.
If VECT = 'Q', DORMBR overwrites the general real M-by-N matrix C with SIDE = 'L' SIDE = 'R' TRANS = 'N': Q * C C * Q TRANS = 'T': Q**T * C C * Q**T If VECT = 'P', DORMBR overwrites the general real M-by-N matrix C with SIDE = 'L' SIDE = 'R' TRANS = 'N': P * C C * P TRANS = 'T': P**T * C C * P**T Here Q and P**T are the orthogonal matrices determined by DGEBRD when reducing a real matrix A to bidiagonal form: A = Q * B * P**T. Q and P**T are defined as products of elementary ...
DORMHR overwrites the general real M-by-N matrix C with TRANS = 'T': Q**T * C C * Q**T where Q is a real orthogonal matrix of order nq, with nq = m if SIDE = 'L' and nq = n if SIDE = 'R'. Q is defined as the product of IHI-ILO elementary reflectors, as returned by DGEHRD: Q = H(ilo) H(ilo+1) . . . H(ihi-1).
DORML2 overwrites the general real m by n matrix C with where Q is a real orthogonal matrix defined as the product of k elementary reflectors Q = H(k) . . . H(2) H(1) as returned by DGELQF. Q is of order m if SIDE = 'L' and of order n if SIDE = 'R'.
DORMLQ overwrites the general real M-by-N matrix C with TRANS = 'T': Q**T * C C * Q**T where Q is a real orthogonal matrix defined as the product of k elementary reflectors Q = H(k) . . . H(2) H(1) as returned by DGELQF. Q is of order M if SIDE = 'L' and of order N if SIDE = 'R'.
DORMQL overwrites the general real M-by-N matrix C with TRANS = 'T': Q**T * C C * Q**T where Q is a real orthogonal matrix defined as the product of k elementary reflectors Q = H(k) . . . H(2) H(1) as returned by DGEQLF. Q is of order M if SIDE = 'L' and of order N if SIDE = 'R'.
DORMQR overwrites the general real M-by-N matrix C with TRANS = 'T': Q**T * C C * Q**T where Q is a real orthogonal matrix defined as the product of k elementary reflectors Q = H(1) H(2) . . . H(k) as returned by DGEQRF. Q is of order M if SIDE = 'L' and of order N if SIDE = 'R'.
DORMR2 overwrites the general real m by n matrix C with where Q is a real orthogonal matrix defined as the product of k elementary reflectors Q = H(1) H(2) . . . H(k) as returned by DGERQF. Q is of order m if SIDE = 'L' and of order n if SIDE = 'R'.
DORMRQ overwrites the general real M-by-N matrix C with TRANS = 'T': Q**T * C C * Q**T where Q is a real orthogonal matrix defined as the product of k elementary reflectors Q = H(1) H(2) . . . H(k) as returned by DGERQF. Q is of order M if SIDE = 'L' and of order N if SIDE = 'R'.
DORMTR overwrites the general real M-by-N matrix C with TRANS = 'T': Q**T * C C * Q**T where Q is a real orthogonal matrix of order nq, with nq = m if SIDE = 'L' and nq = n if SIDE = 'R'. Q is defined as the product of nq-1 elementary reflectors, as returned by DSYTRD: if UPLO = 'U', Q = H(nq-1) . . . H(2) H(1); if UPLO = 'L', Q = H(1) H(2) . . . H(nq-1).
ddot, sdot, zdotc, and cdotc compute the dot product of vector x and vector y. dot <--- transpose( x ) . y zdotu, and cdotu compute the hermitian dot product of vector x and vector y. dot <--- transpose( conjg( x ) ) . y incx and incy specify the increment between two consecutive elements of respectively vector x and y.
On Entry ABD DOUBLE PRECISION(LDA, N) the matrix to be factored. The columns of the upper triangle are stored in the columns of ABD and the diagonals of the upper triangle are stored in the rows of ABD . See the comments below for details. LDA INTEGER the leading dimension of the array ABD . LDA must be .GE. M + 1 . N INTEGER the order of the matrix A . M INTEGER the number of diagonals above the main diagonal. 0 .LE. M .LT. N . On Return ABD an upper triangular matrix R , stored in band form, s...
DPBCON estimates the reciprocal of the condition number (in the 1-norm) of a real symmetric positive definite band matrix using the Cholesky factorization A = U**T*U or A = L*L**T computed by DPBTRF. An estimate is obtained for norm(inv(A)), and the reciprocal of the condition number is computed as RCOND = 1 / (ANORM * norm(inv(A))).
On Entry ABD DOUBLE PRECISION(LDA, N) the output from DPBCO or DPBFA. LDA INTEGER the leading dimension of the array ABD . N INTEGER the order of the matrix A . M INTEGER the number of diagonals above the main diagonal. On Return DET DOUBLE PRECISION(2) determinant of original matrix in the form DETERMINANT = DET(1) * 10.0**DET(2) with 1.0 .LE. DET(1) .LT. 10.0 or DET(1) .EQ. 0.0 . LINPACK. This version dated 08/14/78 . Cleve Moler, University of New Mexico, Argonne National Lab. PPPPaaaag...
DPBEQU computes row and column scalings intended to equilibrate a symmetric positive definite band matrix A and reduce its condition number (with respect to the two-norm). S contains the scale factors, S(i) = 1/sqrt(A(i,i)), chosen so that the scaled matrix B with elements B(i,j) = S(i)*A(i,j)*S(j) has ones on the diagonal. This choice of S puts the condition number of B within a factor N of the smallest possible condition number over all possible diagonal scalings....
On Entry ABD DOUBLE PRECISION(LDA, N) the matrix to be factored. The columns of the upper triangle are stored in the columns of ABD and the diagonals of the upper triangle are stored in the rows of ABD . See the comments below for details. LDA INTEGER the leading dimension of the array ABD . LDA must be .GE. M + 1 . N INTEGER the order of the matrix A . M INTEGER the number of diagonals above the main diagonal. 0 .LE. M .LT. N . On Return ABD an upper triangular matrix R , stored in band form, s...
DPBRFS improves the computed solution to a system of linear equations when the coefficient matrix is symmetric positive definite and banded, and provides error bounds and backward error estimates for the solution.
On Entry ABD DOUBLE PRECISION(LDA, N) the output from DPBCO or DPBFA. LDA INTEGER the leading dimension of the array ABD . N INTEGER the order of the matrix A . M INTEGER the number of diagonals above the main diagonal. B DOUBLE PRECISION(N) the right hand side vector. On Return B the solution vector X . Error Condition A division by zero will occur if the input factor contains a zero on the diagonal. Technically this indicates singularity, but it is usually caused by improper subroutine argumen...
DPBSTF computes a split Cholesky factorization of a real symmetric positive definite band matrix A. This routine is designed to be used in conjunction with DSBGST. The factorization has the form A = S**T*S where S is a band matrix of the same bandwidth as A and the following structure: S = ( U ) ( M L ) where U is upper triangular of order m = (n+kd)/2, and L is lower triangular of order n-m.
DPBSV computes the solution to a real system of linear equations A * X = B, where A is an N-by-N symmetric positive definite band matrix and X and B are N-by-NRHS matrices. The Cholesky decomposition is used to factor A as A = U**T * U, if UPLO = 'U', or A = L * L**T, if UPLO = 'L', where U is an upper triangular band matrix, and L is a lower triangular band matrix, with the same number of superdiagonals or subdiagonals as A. The factored form of A is then used to solve the system of equatio...
DPBSVX uses the Cholesky factorization A = U**T*U or A = L*L**T to compute the solution to a real system of linear equations A * X = B, where A is an N-by-N symmetric positive definite band matrix and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
DPBTF2 computes the Cholesky factorization of a real symmetric positive definite band matrix A. The factorization has the form A = U' * U , if UPLO = 'U', or A = L * L', if UPLO = 'L', where U is an upper triangular matrix, U' is the transpose of U, and L is lower triangular. This is the unblocked version of the algorithm, calling Level 2 BLAS.
DPBTRF computes the Cholesky factorization of a real symmetric positive definite band matrix A. The factorization has the form A = U**T * U, if UPLO = 'U', or A = L * L**T, if UPLO = 'L', where U is an upper triangular matrix and L is lower triangular.
DPBTRS solves a system of linear equations A*X = B with a symmetric positive definite band matrix A using the Cholesky factorization A = U**T*U or A = L*L**T computed by DPBTRF.
These library routines provide high level access to a subset of the memory management and control mechanisms of IRIX. Dynamic dplace(1) functionality is provided from within a user's program. The first form takes a filename as an argument and all commands within the file are processed. The second form operates on a single command. Errors are handled in the same way as dplace(1); the program exits and a diagnostic message is printed to standard error. The library can be used with or without usin...
On Entry A DOUBLE PRECISION(LDA, N) the symmetric matrix to be factored. Only the diagonal and upper triangle are used. LDA INTEGER the leading dimension of the array A . N INTEGER the order of the matrix A . On Return A an upper triangular matrix R so that A = TRANS(R)*R where TRANS(R) is the transpose. The strict lower triangle is unaltered. If INFO .NE. 0 , the factorization is not complete. RCOND DOUBLE PRECISION an estimate of the reciprocal condition of A . For the system A*X = B , relativ...
DPOCON estimates the reciprocal of the condition number (in the 1-norm) of a real symmetric positive definite matrix using the Cholesky factorization A = U**T*U or A = L*L**T computed by DPOTRF. An estimate is obtained for norm(inv(A)), and the reciprocal of the condition number is computed as RCOND = 1 / (ANORM * norm(inv(A))).
On Entry A DOUBLE PRECISION(LDA, N) the output A from DPOCO or DPOFA or the output X from DQRDC. LDA INTEGER the leading dimension of the array A . N INTEGER the order of the matrix A . JOB INTEGER = 11 both determinant and inverse. = 01 inverse only. = 10 determinant only. On Return A If DPOCO or DPOFA was used to factor A , then DPODI produces the upper half of INVERSE(A) . If DQRDC was used to decompose X , then DPODI produces the upper half of inverse(TRANS(X)*X) where TRANS(X) is the transp...
DPOEQU computes row and column scalings intended to equilibrate a symmetric positive definite matrix A and reduce its condition number (with respect to the two-norm). S contains the scale factors, S(i) = 1/sqrt(A(i,i)), chosen so that the scaled matrix B with elements B(i,j) = S(i)*A(i,j)*S(j) has ones on the diagonal. This choice of S puts the condition number of B within a factor N of the smallest possible condition number over all possible diagonal scalings....
On Entry A DOUBLE PRECISION(LDA, N) the symmetric matrix to be factored. Only the diagonal and upper triangle are used. LDA INTEGER the leading dimension of the array A . N INTEGER the order of the matrix A . On Return A an upper triangular matrix R so that A = TRANS(R)*R where TRANS(R) is the transpose. The strict lower triangle is unaltered. If INFO .NE. 0 , the factorization is not complete. INFO INTEGER = 0 for normal return. = K signals an error condition. The leading minor of order K is no...
DPORFS improves the computed solution to a system of linear equations when the coefficient matrix is symmetric positive definite, and provides error bounds and backward error estimates for the solution.
On Entry A DOUBLE PRECISION(LDA, N) the output from DPOCO or DPOFA. LDA INTEGER the leading dimension of the array A . N INTEGER the order of the matrix A . B DOUBLE PRECISION(N) the right hand side vector. On Return B the solution vector X . Error Condition A division by zero will occur if the input factor contains a zero on the diagonal. Technically this indicates singularity, but it is usually caused by improper subroutine arguments. It will not occur if the subroutines are called correctly a...
DPOSV computes the solution to a real system of linear equations A * X = B, where A is an N-by-N symmetric positive definite matrix and X and B are N-by-NRHS matrices. The Cholesky decomposition is used to factor A as A = U**T* U, if UPLO = 'U', or A = L * L**T, if UPLO = 'L', where U is an upper triangular matrix and L is a lower triangular matrix. The factored form of A is then used to solve the system of equations A * X = B....
DPOSVX uses the Cholesky factorization A = U**T*U or A = L*L**T to compute the solution to a real system of linear equations A * X = B, where A is an N-by-N symmetric positive definite matrix and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
DPOTF2 computes the Cholesky factorization of a real symmetric positive definite matrix A. The factorization has the form A = U' * U , if UPLO = 'U', or A = L * L', if UPLO = 'L', where U is an upper triangular matrix and L is lower triangular. This is the unblocked version of the algorithm, calling Level 2 BLAS.
DPOTRF computes the Cholesky factorization of a real symmetric positive definite matrix A. The factorization has the form A = U**T * U, if UPLO = 'U', or A = L * L**T, if UPLO = 'L', where U is an upper triangular matrix and L is lower triangular. This is the block version of the algorithm, calling Level 3 BLAS.
DPOTRI computes the inverse of a real symmetric positive definite matrix A using the Cholesky factorization A = U**T*U or A = L*L**T computed by DPOTRF.
DPOTRS solves a system of linear equations A*X = B with a symmetric positive definite matrix A using the Cholesky factorization A = U**T*U or A = L*L**T computed by DPOTRF.
On Entry AP DOUBLE PRECISION (N*(N+1)/2) the packed form of a symmetric matrix A . The columns of the upper triangle are stored sequentially in a one-dimensional array of length N*(N+1)/2 . See comments below for details. N INTEGER the order of the matrix A . On Return AP an upper triangular matrix R , stored in packed form, so that A = TRANS(R)*R . If INFO .NE. 0 , the factorization is not complete. RCOND DOUBLE PRECISION an estimate of the reciprocal condition of A . For the system A*X = B , r...
DPPCON estimates the reciprocal of the condition number (in the 1-norm) of a real symmetric positive definite packed matrix using the Cholesky factorization A = U**T*U or A = L*L**T computed by DPPTRF. An estimate is obtained for norm(inv(A)), and the reciprocal of the condition number is computed as RCOND = 1 / (ANORM * norm(inv(A))).
On Entry AP DOUBLE PRECISION (N*(N+1)/2) the output from DPPCO or DPPFA. N INTEGER the order of the matrix A . JOB INTEGER = 11 both determinant and inverse. = 01 inverse only. = 10 determinant only. On Return AP the upper triangular half of the inverse . The strict lower triangle is unaltered. DET DOUBLE PRECISION(2) determinant of original matrix if requested. Otherwise not referenced. DETERMINANT = DET(1) * 10.0**DET(2) with 1.0 .LE. DET(1) .LT. 10.0 or DET(1) .EQ. 0.0 . Error Condition A div...
DPPEQU computes row and column scalings intended to equilibrate a symmetric positive definite matrix A in packed storage and reduce its condition number (with respect to the two-norm). S contains the scale factors, S(i)=1/sqrt(A(i,i)), chosen so that the scaled matrix B with elements B(i,j)=S(i)*A(i,j)*S(j) has ones on the diagonal. This choice of S puts the condition number of B within a factor N of the smallest possible condition number over all possible diagonal scalings....
On Entry AP DOUBLE PRECISION (N*(N+1)/2) the packed form of a symmetric matrix A . The columns of the upper triangle are stored sequentially in a one-dimensional array of length N*(N+1)/2 . See comments below for details. N INTEGER the order of the matrix A . On Return AP an upper triangular matrix R , stored in packed form, so that A = TRANS(R)*R . INFO INTEGER = 0 for normal return. = K if the leading minor of order K is not positive definite. Packed Storage The following program segment will ...
DPPRFS improves the computed solution to a system of linear equations when the coefficient matrix is symmetric positive definite and packed, and provides error bounds and backward error estimates for the solution.
On Entry AP DOUBLE PRECISION (N*(N+1)/2) the output from DPPCO or DPPFA. N INTEGER the order of the matrix A . B DOUBLE PRECISION(N) the right hand side vector. On Return B the solution vector X . Error Condition A division by zero will occur if the input factor contains a zero on the diagonal. Technically this indicates singularity, but it is usually caused by improper subroutine arguments. It will not occur if the subroutines are called correctly and INFO .EQ. 0 . To compute INVERSE(A) * C whe...
DPPSV computes the solution to a real system of linear equations A * X = B, where A is an N-by-N symmetric positive definite matrix stored in packed format and X and B are N-by-NRHS matrices. The Cholesky decomposition is used to factor A as A = U**T* U, if UPLO = 'U', or A = L * L**T, if UPLO = 'L', where U is an upper triangular matrix and L is a lower triangular matrix. The factored form of A is then used to solve the system of equations A * X = B....
DPPSVX uses the Cholesky factorization A = U**T*U or A = L*L**T to compute the solution to a real system of linear equations A * X = B, where A is an N-by-N symmetric positive definite matrix stored in packed format and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
DPPTRF computes the Cholesky factorization of a real symmetric positive definite matrix A stored in packed format. The factorization has the form A = U**T * U, if UPLO = 'U', or A = L * L**T, if UPLO = 'L', where U is an upper triangular matrix and L is lower triangular.
DPPTRI computes the inverse of a real symmetric positive definite matrix A using the Cholesky factorization A = U**T*U or A = L*L**T computed by DPPTRF.
DPPTRS solves a system of linear equations A*X = B with a symmetric positive definite matrix A in packed storage using the Cholesky factorization A = U**T*U or A = L*L**T computed by DPPTRF.
dprod returns the double precision product of its real arguments. qprod returns the quad precision product of its double precision arguments. PPPPaaaaggggeeee 1111
DPTCON computes the reciprocal of the condition number (in the 1-norm) of a real symmetric positive definite tridiagonal matrix using the factorization A = L*D*L**T or A = U**T*D*U computed by DPTTRF. Norm(inv(A)) is computed by a direct method, and the reciprocal of the condition number is computed as RCOND = 1 / (ANORM * norm(inv(A))).
DPTEQR computes all eigenvalues and, optionally, eigenvectors of a symmetric positive definite tridiagonal matrix by first factoring the matrix using DPTTRF, and then calling DBDSQR to compute the singular values of the bidiagonal factor. This routine computes the eigenvalues of the positive definite tridiagonal matrix to high relative accuracy. This means that if the eigenvalues range over many orders of magnitude in size, then the small eigenvalues and corresponding eigenvectors will be comput...
DPTRFS improves the computed solution to a system of linear equations when the coefficient matrix is symmetric positive definite and tridiagonal, and provides error bounds and backward error estimates for the solution.
On Entry N INTEGER is the order of the tridiagonal matrix. D DOUBLE PRECISION(N) is the diagonal of the tridiagonal matrix. On output D is destroyed. E DOUBLE PRECISION(N) is the offdiagonal of the tridiagonal matrix. E(1) through E(N-1) should contain the offdiagonal. B DOUBLE PRECISION(N) is the right hand side vector. On Return B contains the solution. LINPACK. This version dated 08/14/78 . Jack Dongarra, Argonne National Laboratory. No externals Fortran MOD PPPPaaaaggggeeee 111...
DPTSV computes the solution to a real system of linear equations A*X = B, where A is an N-by-N symmetric positive definite tridiagonal matrix, and X and B are N-by-NRHS matrices. A is factored as A = L*D*L**T, and the factored form of A is then used to solve the system of equations.
DPTSVX uses the factorization A = L*D*L**T to compute the solution to a real system of linear equations A*X = B, where A is an N-by-N symmetric positive definite tridiagonal matrix and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
DPTTRF computes the factorization of a real symmetric positive definite tridiagonal matrix A. If the subdiagonal elements of A are supplied in the array E, the factorization has the form A = L*D*L**T, where D is diagonal and L is unit lower bidiagonal; if the superdiagonal elements of A are supplied, it has the form A = U**T*D*U, where U is unit upper bidiagonal. (The two forms are equivalent if A is real.)...
DPTTRS solves a system of linear equations A * X = B with a symmetric positive definite tridiagonal matrix A using the factorization A = L*D*L**T or A = U**T*D*U computed by DPTTRF. (The two forms are equivalent if A is real.)
On Entry X DOUBLE PRECISION(LDX,P), where LDX .GE. N. X contains the matrix whose decomposition is to be computed. LDX INTEGER. LDX is the leading dimension of the array X. N INTEGER. N is the number of rows of the matrix X. P INTEGER. P is the number of columns of the matrix X. JPVT INTEGER(P). JPVT contains integers that control the selection of the pivot columns. The K-th column X(K) of X is placed in one of three classes according to the value of JPVT(K). If JPVT(K) .GT. 0, then X(K) is an i...
On Entry X DOUBLE PRECISION(LDX,P). X contains the output of DQRDC. LDX INTEGER. LDX is the leading dimension of the array X. N INTEGER. N is the number of rows of the matrix XK. It must have the same value as N in DQRDC. K INTEGER. K is the number of columns of the matrix XK. K must not be greater than MIN(N,P), where P is the same as in the calling sequence to DQRDC. QRAUX DOUBLE PRECISION(P). QRAUX contains the auxiliary output from DQRDC. Y DOUBLE PRECISION(N) Y contains an N-vector that is ...
This family of functions generates pseudo-random numbers using the wellknown linear congruential algorithm and 48-bit integer arithmetic. Functions drand48 and erand48 return non-negative double-precision floating-point values uniformly distributed over the interval [0.0,~1.0) . Functions lrand48 and nrand48 return non-negative long integers uniformly distributed over the 31 interval [0,~2 ). Functions mr
x expects the x coordinate of the point to which you want to draw a line segment. y expects the y coordinate of the point to which you want to draw a line segment. z expects the z coordinate of the point to which you want to draw a line segment. (Not used by 2-D subroutines.)
Tk_Window tkwin (in) Window for which the highlight is being drawn. Used to retrieve the window's dimensions, among other things. GC gc (in) Graphics context to use for drawing the highlight. int width (in) Width of the highlight ring, in pixels. Drawable drawable (in) Drawable in which to draw the highlight; usually an offscreen pixmap for double buffering.
mode expects the identifier of the framebuffer to which GL drawing commands are to be directed: NORMALDRAW, which sets operations for the normal color and z buffer bitplanes. OVERDRAW, which sets operations for the overlay bitplanes. UNDERDRAW, which sets operations for the underlay bitplanes. PUPDRAW, which sets operations for the pop-up bitplanes. CURSORDRAW, which sets operations for the cursor....
DRSCL multiplies an n-element real vector x by the real scalar 1/a. This is done without overflow or underflow as long as the final result x/a does not overflow or underflow.
DSBEVD computes all the eigenvalues and, optionally, eigenvectors of a real symmetric band matrix A. If eigenvectors are desired, it uses a divide and conquer algorithm. The divide and conquer algorithm makes very mild assumptions about floating point arithmetic. It will work on machines with a guard digit in add/subtract, or on those binary machines without guard digits which subtract like the Cray X-MP, Cray Y-MP, Cray C-90, or Cray-2. It could conceivably fail on hexadecimal or decimal machin...
DSBEVX computes selected eigenvalues and, optionally, eigenvectors of a real symmetric band matrix A. Eigenvalues and eigenvectors can be selected by specifying either a range of values or a range of indices for the desired eigenvalues.
DSBGST reduces a real symmetric-definite banded generalized eigenproblem A*x = lambda*B*x to standard form C*y = lambda*y, such that C has the same bandwidth as A. B must have been previously factorized as S**T*S by DPBSTF, using a split Cholesky factorization. A is overwritten by C = X**T*A*X, where X = S**(-1)*Q and Q is an orthogonal matrix chosen to preserve the bandwidth of A.
DSBGV computes all the eigenvalues, and optionally, the eigenvectors of a real generalized symmetric-definite banded eigenproblem, of the form A*x=(lambda)*B*x. Here A and B are assumed to be symmetric and banded, and B is also positive definite.
On Entry A DOUBLE PRECISION(LDA, N) the symmetric matrix to be factored. Only the diagonal and upper triangle are used. LDA INTEGER the leading dimension of the array A . N INTEGER the order of the matrix A . Output A a block diagonal matrix and the multipliers which were used to obtain it. The factorization can be written A = U*D*TRANS(U) where U is a product of permutation and unit upper triangular matrices, TRANS(U) is the transpose of U , and D is block diagonal with 1 by 1 and 2 by 2 blocks...
On Entry A DOUBLE PRECISION(LDA,N) the output from DSIFA. LDA INTEGER the leading dimension of the array A. N INTEGER the order of the matrix A. KPVT INTEGER(N) the pivot vector from DSIFA. WORK DOUBLE PRECISION(N) work vector. Contents destroyed. JOB INTEGER JOB has the decimal expansion ABC where if C .NE. 0, the inverse is computed, if B .NE. 0, the determinant is computed, if A .NE. 0, the inertia is computed. For example, JOB = 111 gives all three. On Return Variables not requested by JOB a...
On Entry A DOUBLE PRECISION(LDA,N) the symmetric matrix to be factored. Only the diagonal and upper triangle are used. LDA INTEGER the leading dimension of the array A . N INTEGER the order of the matrix A . On Return A a block diagonal matrix and the multipliers which were used to obtain it. The factorization can be written A = U*D*TRANS(U) where U is a product of permutation and unit upper triangular matrices, TRANS(U) is the transpose of U , and D is block diagonal with 1 by 1 and 2 by 2 bloc...
On Entry A DOUBLE PRECISION(LDA,N) the output from DSIFA. LDA INTEGER the leading dimension of the array A . N INTEGER the order of the matrix A . KPVT INTEGER(N) the pivot vector from DSIFA. B DOUBLE PRECISION(N) the right hand side vector. On Return B the solution vector X . Error Condition A division by zero may occur if DSICO has set RCOND .EQ. 0.0 or DSIFA has set INFO .NE. 0 . To compute INVERSE(A) * C where C is a matrix with P columns CALL DSIFA(A,LDA,N,KPVT,INFO) IF (INFO .NE. 0) GO TO ...
dsopen returns a NULL pointer on failure. doscsireq returns -1 on absolute failure, and the status byte otherwise. A status byte of 0xff indicates an invalid status byte because the scsi command didn't complete. The RET(dsp) macro returns a result code, which can be consulted for any error or 'unusual' status from the driver; a value of 0 indicates a normal return.
On Entry AP DOUBLE PRECISION (N*(N+1)/2) the packed form of a symmetric matrix A . The columns of the upper triangle are stored sequentially in a one-dimensional array of length N*(N+1)/2 . See comments below for details. N INTEGER the order of the matrix A . Output AP a block diagonal matrix and the multipliers which were used to obtain it stored in packed form. The factorization can be written A = U*D*TRANS(U) where U is a product of permutation and unit upper triangular matrices , TRANS(U) is...
DSPCON estimates the reciprocal of the condition number (in the 1-norm) of a real symmetric packed matrix A using the factorization A = U*D*U**T or A = L*D*L**T computed by DSPTRF. An estimate is obtained for norm(inv(A)), and the reciprocal of the condition number is computed as RCOND = 1 / (ANORM * norm(inv(A))).
On Entry AP DOUBLE PRECISION (N*(N+1)/2) the output from DSPFA. N INTEGER the order of the matrix A. KPVT INTEGER(N) the pivot vector from DSPFA. WORK DOUBLE PRECISION(N) work vector. Contents ignored. JOB INTEGER JOB has the decimal expansion ABC where if C .NE. 0, the inverse is computed, if B .NE. 0, the determinant is computed, if A .NE. 0, the inertia is computed. For example, JOB = 111 gives all three. On Return Variables not requested by JOB are not used. AP contains the upper triangle of...
DSPEVD computes all the eigenvalues and, optionally, eigenvectors of a real symmetric matrix A in packed storage. If eigenvectors are desired, it uses a divide and conquer algorithm. The divide and conquer algorithm makes very mild assumptions about floating point arithmetic. It will work on machines with a guard digit in add/subtract, or on those binary machines without guard digits which subtract like the Cray X-MP, Cray Y-MP, Cray C-90, or Cray-2. It could conceivably fail on hexadecimal or d...
DSPEVX computes selected eigenvalues and, optionally, eigenvectors of a real symmetric matrix A in packed storage. Eigenvalues/vectors can be selected by specifying either a range of values or a range of indices for the desired eigenvalues.
On Entry AP DOUBLE PRECISION (N*(N+1)/2) the packed form of a symmetric matrix A . The columns of the upper triangle are stored sequentially in a one-dimensional array of length N*(N+1)/2 . See comments below for details. N INTEGER the order of the matrix A . Output AP a block diagonal matrix and the multipliers which were used to obtain it stored in packed form. The factorization can be written A = U*D*TRANS(U) where U is a product of permutation and unit upper triangular matrices, TRANS(U) is ...
DSPGST reduces a real symmetric-definite generalized eigenproblem to standard form, using packed storage. If ITYPE = 1, the problem is A*x = lambda*B*x, and A is overwritten by inv(U**T)*A*inv(U) or inv(L)*A*inv(L**T) If ITYPE = 2 or 3, the problem is A*B*x = lambda*x or B*A*x = lambda*x, and A is overwritten by U*A*U**T or L**T*A*L. B must have been previously factorized as U**T*U or L*L**T by DPPTRF....
DSPGV computes all the eigenvalues and, optionally, the eigenvectors of a real generalized symmetric-definite eigenproblem, of the form A*x=(lambda)*B*x, A*Bx=(lambda)*x, or B*A*x=(lambda)*x. Here A and B are assumed to be symmetric, stored in packed format, and B is also positive definite.
DSPRFS improves the computed solution to a system of linear equations when the coefficient matrix is symmetric indefinite and packed, and provides error bounds and backward error estimates for the solution.
On Entry AP DOUBLE PRECISION(N*(N+1)/2) the output from DSPFA. N INTEGER the order of the matrix A . KPVT INTEGER(N) the pivot vector from DSPFA. B DOUBLE PRECISION(N) the right hand side vector. On Return B the solution vector X . Error Condition A division by zero may occur if DSPCO has set RCOND .EQ. 0.0 or DSPFA has set INFO .NE. 0 . To compute INVERSE(A) * C where C is a matrix with P columns CALL DSPFA(AP,N,KPVT,INFO) IF (INFO .NE. 0) GO TO ... DO 10 J = 1, P CALL DSPSL(AP,N,KPVT,C(1,J)) 1...
DSPSV computes the solution to a real system of linear equations A * X = B, where A is an N-by-N symmetric matrix stored in packed format and X and B are N-by-NRHS matrices. The diagonal pivoting method is used to factor A as A = U * D * U**T, if UPLO = 'U', or A = L * D * L**T, if UPLO = 'L', where U (or L) is a product of permutation and unit upper (lower) triangular matrices, D is symmetric and block diagonal with 1-by-1 and 2-by-2 diagonal blocks. The factored form of A is then used to s...
DSPSVX uses the diagonal pivoting factorization A = U*D*U**T or A = L*D*L**T to compute the solution to a real system of linear equations A * X = B, where A is an N-by-N symmetric matrix stored in packed format and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
DSPTRD reduces a real symmetric matrix A stored in packed form to symmetric tridiagonal form T by an orthogonal similarity transformation: Q**T * A * Q = T.
DSPTRF computes the factorization of a real symmetric matrix A stored in packed format using the Bunch-Kaufman diagonal pivoting method: A = U*D*U**T or A = L*D*L**T where U (or L) is a product of permutation and unit upper (lower) triangular matrices, and D is symmetric and block diagonal with 1-by-1 and 2-by-2 diagonal blocks.
DSPTRI computes the inverse of a real symmetric indefinite matrix A in packed storage using the factorization A = U*D*U**T or A = L*D*L**T computed by DSPTRF.
DSPTRS solves a system of linear equations A*X = B with a real symmetric matrix A stored in packed format using the factorization A = U*D*U**T or A = L*D*L**T computed by DSPTRF.
DSTEBZ computes the eigenvalues of a symmetric tridiagonal matrix T. The user may ask for all eigenvalues, all eigenvalues in the half-open interval (VL, VU], or the IL-th through IU-th eigenvalues. To avoid overflow, the matrix must be scaled so that its largest element is no greater than overflow**(1/2) * underflow**(1/4) in absolute value, and for greatest accuracy, it should not be much smaller than that. See W. Kahan "Accurate Eigenvalues of a Symmetric Tridiagonal Matrix", Report CS41, C...
DSTEDC computes all eigenvalues and, optionally, eigenvectors of a symmetric tridiagonal matrix using the divide and conquer method. The eigenvectors of a full or band real symmetric matrix can also be found if DSYTRD or DSPTRD or DSBTRD has been used to reduce this matrix to tridiagonal form. This code makes very mild assumptions about floating point arithmetic. It will work on machines with a guard digit in add/subtract, or on those binary machines without guard digits which subtract like the ...
DSTEIN computes the eigenvectors of a real symmetric tridiagonal matrix T corresponding to specified eigenvalues, using inverse iteration. The maximum number of iterations allowed for each eigenvector is specified by an internal parameter MAXITS (currently set to 5).
DSTEQR computes all eigenvalues and, optionally, eigenvectors of a symmetric tridiagonal matrix using the implicit QL or QR method. The eigenvectors of a full or band symmetric matrix can also be found if DSYTRD or DSPTRD or DSBTRD has been used to reduce this matrix to tridiagonal form.
DSTEVD computes all eigenvalues and, optionally, eigenvectors of a real symmetric tridiagonal matrix. If eigenvectors are desired, it uses a divide and conquer algorithm. The divide and conquer algorithm makes very mild assumptions about floating point arithmetic. It will work on machines with a guard digit in add/subtract, or on those binary machines without guard digits which subtract like the Cray X-MP, Cray Y-MP, Cray C-90, or Cray-2. It could conceivably fail on hexadecimal or decimal machi...
DSTEVX computes selected eigenvalues and, optionally, eigenvectors of a real symmetric tridiagonal matrix A. Eigenvalues and eigenvectors can be selected by specifying either a range of values or a range of indices for the desired eigenvalues.
Tcl_DString *dsPtr (in/out) Pointer to structure that is used to manage a dynamic string. char *string (in) Pointer to characters to add to dynamic string. int length (in) Number of characters from string to add to dynamic string. If -1, add all characters up to null terminating character. int newLength (in) New length for dynamic string, not including null terminating character. Page 1 Tcl_DString(3Tcl) Tcl_DString(3Tcl) Tcl_Interp *interp (in/out) Interpreter whose result is to be set from or ...
On Entry X DOUBLE PRECISION(LDX,P), where LDX .GE. N. X contains the matrix whose singular value decomposition is to be computed. X is destroyed by DSVDC. LDX INTEGER. LDX is the leading dimension of the array X. N INTEGER. N is the number of columns of the matrix X. P INTEGER. P is the number of rows of the matrix X. LDU INTEGER. LDU is the leading dimension of the array U. (See below). LDV INTEGER. LDV is the leading dimension of the array V. (See below). WORK DOUBLE PRECISION(N). WORK is a sc...
DSYCON estimates the reciprocal of the condition number (in the 1-norm) of a real symmetric matrix A using the factorization A = U*D*U**T or A = L*D*L**T computed by DSYTRF. An estimate is obtained for norm(inv(A)), and the reciprocal of the condition number is computed as RCOND = 1 / (ANORM * norm(inv(A))).
DSYEVD computes all eigenvalues and, optionally, eigenvectors of a real symmetric matrix A. If eigenvectors are desired, it uses a divide and conquer algorithm. The divide and conquer algorithm makes very mild assumptions about floating point arithmetic. It will work on machines with a guard digit in add/subtract, or on those binary machines without guard digits which subtract like the Cray X-MP, Cray Y-MP, Cray C-90, or Cray-2. It could conceivably fail on hexadecimal or decimal machines withou...
DSYEVX computes selected eigenvalues and, optionally, eigenvectors of a real symmetric matrix A. Eigenvalues and eigenvectors can be selected by specifying either a range of values or a range of indices for the desired eigenvalues.
DSYGS2 reduces a real symmetric-definite generalized eigenproblem to standard form. If ITYPE = 1, the problem is A*x = lambda*B*x, and A is overwritten by inv(U')*A*inv(U) or inv(L)*A*inv(L') If ITYPE = 2 or 3, the problem is A*B*x = lambda*x or B*A*x = lambda*x, and A is overwritten by U*A*U` or L'*A*L. B must have been previously factorized as U'*U or L*L' by DPOTRF.
DSYGST reduces a real symmetric-definite generalized eigenproblem to standard form. If ITYPE = 1, the problem is A*x = lambda*B*x, and A is overwritten by inv(U**T)*A*inv(U) or inv(L)*A*inv(L**T) If ITYPE = 2 or 3, the problem is A*B*x = lambda*x or B*A*x = lambda*x, and A is overwritten by U*A*U**T or L**T*A*L. B must have been previously factorized as U**T*U or L*L**T by DPOTRF.
DSYGV computes all the eigenvalues, and optionally, the eigenvectors of a real generalized symmetric-definite eigenproblem, of the form A*x=(lambda)*B*x, A*Bx=(lambda)*x, or B*A*x=(lambda)*x. Here A and B are assumed to be symmetric and B is also positive definite.
DSYRFS improves the computed solution to a system of linear equations when the coefficient matrix is symmetric indefinite, and provides error bounds and backward error estimates for the solution.
DSYSV computes the solution to a real system of linear equations A * X = B, where A is an N-by-N symmetric matrix and X and B are Nby-NRHS matrices. The diagonal pivoting method is used to factor A as A = U * D * U**T, if UPLO = 'U', or A = L * D * L**T, if UPLO = 'L', where U (or L) is a product of permutation and unit upper (lower) triangular matrices, and D is symmetric and block diagonal with 1-by-1 and 2-by-2 diagonal blocks. The factored form of A is then used to solve the system of eq...
DSYSVX uses the diagonal pivoting factorization to compute the solution to a real system of linear equations A * X = B, where A is an N-by-N symmetric matrix and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
DSYTF2 computes the factorization of a real symmetric matrix A using the Bunch-Kaufman diagonal pivoting method: A = U*D*U' or A = L*D*L' where U (or L) is a product of permutation and unit upper (lower) triangular matrices, U' is the transpose of U, and D is symmetric and block diagonal with 1-by-1 and 2-by-2 diagonal blocks. This is the unblocked version of the algorithm, calling Level 2 BLAS....
DSYTRF computes the factorization of a real symmetric matrix A using the Bunch-Kaufman diagonal pivoting method. The form of the factorization is A = U*D*U**T or A = L*D*L**T where U (or L) is a product of permutation and unit upper (lower) triangular matrices, and D is symmetric and block diagonal with 1-by-1 and 2-by-2 diagonal blocks. This is the blocked version of the algorithm, calling Level 3 BLAS....
DSYTRS solves a system of linear equations A*X = B with a real symmetric matrix A using the factorization A = U*D*U**T or A = L*D*L**T computed by DSYTRF.
dtp A pointer to the target DTPARSER. type The type of callback being set. DTDATATYPES is an enumerated type defined in dataudio.h containing the following values: dt_audio, dt_pnum, dt_index, dt_ptime, dt_atime, dt_rtime, dt_prortime, dt_mainid, dt_sampfreq, dt_toc, dt_date, dt_catalog, dt_ident, dt_probinary. func A pointer to the function to be called. arg A user supplied argument that is passed to the callback function....
str A pointer to the ASCII string to be converted. h A pointer to the location to store the hours value. m A pointer to the location to store the minutes value. s A pointer to the location to store the seconds value. f A pointer to the location to store the frame value.
tc A pointer to the struct dttimecode in which to place the result. s A pointer to the ASCII string to be converted. The string pointed at by s must be at least 11 bytes long not counting the terminating null.
DTBCON estimates the reciprocal of the condition number of a triangular band matrix A, in either the 1-norm or the infinity-norm. The norm of A is computed and an estimate is obtained for norm(inv(A)), then the reciprocal of the condition number is computed as RCOND = 1 / ( norm(A) * norm(inv(A)) ).
DTBRFS provides error bounds and backward error estimates for the solution to a system of linear equations with a triangular band coefficient matrix. The solution matrix X must be computed by DTBTRS or some other means before entering this routine. DTBRFS does not do iterative refinement because doing so cannot improve the backward error.
DTBTRS solves a triangular system of the form where A is a triangular band matrix of order N, and B is an N-by NRHS matrix. A check is made to verify that A is nonsingular.
Upon successful completion, DTcreateparser returns a pointer to a DTPARSER, an opaque type defined in dataudio.h. Otherwise a value of null (0) is returned.
fr The frame number to be converted. h A pointer to the location to store the hours value. m A pointer to the location to store the minutes value. s A pointer to the location to store the seconds value. f A pointer to the location to store the frame value.
DTGEVC computes some or all of the right and/or left generalized eigenvectors of a pair of real upper triangular matrices (A,B). The right generalized eigenvector x and the left generalized eigenvector y of (A,B) corresponding to a generalized eigenvalue w are defined by: (A - wB) * x = 0 and y**H * (A - wB) = 0 where y**H denotes the conjugate tranpose of y. If an eigenvalue w is determined by zero diagonal elements of both A and B, a unit vector is returned as the corresponding eigenvector. If...
DTGSJA computes the generalized singular value decomposition (GSVD) of two real upper triangular (or trapezoidal) matrices A and B. On entry, it is assumed that matrices A and B have the following forms, which may be obtained by the preprocessing subroutine DGGSVP from a general M-by-N matrix A and P-by-N matrix B: N-K-L K L A = K ( 0 A12 A13 ) if M-K-L >= 0; L ( 0 0 A23 ) M-K-L ( 0 0 0 ) N-K-L K L A = K ( 0 A12 A13 ) if M-K-L < 0; M-K ( 0 0 A23 ) N-K-L K L B = L ( 0 0 B13 ) P-L ( 0 0 0 ) where ...
The Archive Python DAT (Digital Audio Tape) drive has the capability of reading and writing audio tapes compatible with consumer and professional DAT recorders. This man page describes the support for handling audio tapes in the DAT drive. There are two components to the support: the kernel SCSI tape driver and libdataudio. SCSI Tape Driver The kernel tape driver supports both regular data mode and the special audio mode. The driver is switched between modes using the MTIOCTOP ioctl as follows: ...
DTPCON estimates the reciprocal of the condition number of a packed triangular matrix A, in either the 1-norm or the infinity-norm. The norm of A is computed and an estimate is obtained for norm(inv(A)), then the reciprocal of the condition number is computed as RCOND = 1 / ( norm(A) * norm(inv(A)) ).
pno1 The first (most significant) BCD digit of the program number. pno2 The second BCD digit of the program number. pno1 The third (least significant) BCD digit of the program number.
DTPRFS provides error bounds and backward error estimates for the solution to a system of linear equations with a triangular packed coefficient matrix. The solution matrix X must be computed by DTPTRS or some other means before entering this routine. DTPRFS does not do iterative refinement because doing so cannot improve the backward error.
DTPTRS solves a triangular system of the form where A is a triangular matrix of order N stored in packed format, and B is an N-by-NRHS matrix. A check is made to verify that A is nonsingular.
On Entry T DOUBLE PRECISION(LDT,N) T contains the triangular matrix. The zero elements of the matrix are not referenced, and the corresponding elements of the array can be used to store other information. LDT INTEGER LDT is the leading dimension of the array T. N INTEGER N is the order of the system. JOB INTEGER = 0 T is lower triangular. = nonzero T is upper triangular. On Return RCOND DOUBLE PRECISION an estimate of the reciprocal condition of T . For the system T*X = B , relative perturbation...
DTRCON estimates the reciprocal of the condition number of a triangular matrix A, in either the 1-norm or the infinity-norm. The norm of A is computed and an estimate is obtained for norm(inv(A)), then the reciprocal of the condition number is computed as RCOND = 1 / ( norm(A) * norm(inv(A)) ).
On Entry T DOUBLE PRECISION(LDT,N) T contains the triangular matrix. The zero elements of the matrix are not referenced, and the corresponding elements of the array can be used to store other information. LDT INTEGER LDT is the leading dimension of the array T. N INTEGER N is the order of the system. JOB INTEGER = 010 no det, inverse of lower triangular. = 011 no det, inverse of upper triangular. = 100 det, no inverse. = 110 det, inverse of lower triangular. = 111 det, inverse of upper triangula...
dtp A pointer to the target DTPARSER. type The type of callback to remove. DTDATATYPES is an enumerated type defined in dataudio.h containing the following values: dt_audio, dt_pnum, dt_index, dt_ptime, dt_atime, dt_rtime, dt_prortime, dt_mainid, dt_sampfreq, dt_toc, dt_date, dt_catalog, dt_ident, dt_probinary.
DTREVC computes some or all of the right and/or left eigenvectors of a real upper quasi-triangular matrix T. The right eigenvector x and the left eigenvector y of T corresponding to an eigenvalue w are defined by: T*x = w*x, y'*T = w*y' where y' denotes the conjugate transpose of the vector y. If all eigenvectors are requested, the routine may either return the matrices X and/or Y of right or left eigenvectors of T, or the products Q*X and/or Q*Y, where Q is an input orthogonal matrix. If T w...
DTREXC reorders the real Schur factorization of a real matrix A = Q*T*Q**T, so that the diagonal block of T with row index IFST is moved to row ILST. The real Schur form T is reordered by an orthogonal similarity transformation Z**T*T*Z, and optionally the matrix Q of Schur vectors is updated by postmultiplying it with Z. T must be in Schur canonical form (as returned by DHSEQR), that is, block upper triangular with 1-by-1 and 2-by-2 diagonal blocks; each 2-by-2 diagonal block has its diagonal e...
DTRRFS provides error bounds and backward error estimates for the solution to a system of linear equations with a triangular coefficient matrix. The solution matrix X must be computed by DTRTRS or some other means before entering this routine. DTRRFS does not do iterative refinement because doing so cannot improve the backward error.
DTRSEN reorders the real Schur factorization of a real matrix A = Q*T*Q**T, so that a selected cluster of eigenvalues appears in the leading diagonal blocks of the upper quasi-triangular matrix T, and the leading columns of Q form an orthonormal basis of the corresponding right invariant subspace. Optionally the routine computes the reciprocal condition numbers of the cluster of eigenvalues and/or the invariant subspace. T must be in Schur canonical form (as returned by DHSEQR), that is, block u...
On Entry T DOUBLE PRECISION(LDT,N) T contains the matrix of the system. The zero elements of the matrix are not referenced, and the corresponding elements of the array can be used to store other information. LDT INTEGER LDT is the leading dimension of the array T. N INTEGER N is the order of the system. B DOUBLE PRECISION(N). B contains the right hand side of the system. JOB INTEGER JOB specifies what kind of system is to be solved. If JOB is 00 solve T*X=B, T lower triangular, 01 solve T*X=B, T...
DTRSNA estimates reciprocal condition numbers for specified eigenvalues and/or right eigenvectors of a real upper quasi-triangular matrix T (or of any matrix Q*T*Q**T with Q orthogonal). T must be in Schur canonical form (as returned by DHSEQR), that is, block upper triangular with 1-by-1 and 2-by-2 diagonal blocks; each 2-by-2 diagonal block has its diagonal elements equal and its off-diagonal elements of opposite sign....
DTRSYL solves the real Sylvester matrix equation: op(A)*X + X*op(B) = scale*C or op(A)*X - X*op(B) = scale*C, where op(A) = A or A**T, and A and B are both upper quasi- triangular. A is M-by-M and B is N-by-N; the right hand side C and the solution X are M-by-N; and scale is an output scale factor, set <= 1 to avoid overflow in X. A and B must be in Schur canonical form (as returned by DHSEQR), that is, block upper triangular with 1-by-1 and 2-by-2 diagonal blocks; each 2- by-2 diagonal block ha...
DTRTRS solves a triangular system of the form where A is a triangular matrix of order N, and B is an N-by-NRHS matrix. A check is made to verify that A is nonsingular.
s A pointer to a string to store the converted value. The string pointed at by s must be at least count bytes long not counting the terminating null. sb A pointer to an array of six-bit coded characters. count The number of six-bit characters in the sb array.
s A pointer to a string to store the converted value. The string pointed at by s must be at least 11 bytes long not counting the terminating null. tc A pointer to the struct dttimecode to be converted.
DTZRQF reduces the M-by-N ( M<=N ) real upper trapezoidal matrix A to upper triangular form by means of orthogonal transformations. The upper trapezoidal matrix A is factored as A = ( R 0 ) * Z, where Z is an N-by-N orthogonal matrix and R is an M-by-M upper triangular matrix.
fildes is a file descriptor referring to an open file, and fildes2 is a non-negative integer less than the maximum number of open files available. dup2 causes fildes2 to refer to the same file as fildes. If fildes2 already referred to an open file, not fildes, it is closed first. If fildes2 refers to fildes, or if fildes is not a valid open file descriptor, fildes2 will not be closed first. dup2 will fail if one or more of the following are true: EBADF fild...
This document defines a standard generic interface to the dynamic linking mechanisms available on many platforms. Its primary purpose is to implement automatic dynamic loading of Perl modules. This document serves as both a specification for anyone wishing to implement the DynaLoader for a new platform and as a guide for anyone wishing to use the DynaLoader directly in an application. The DynaLoader is designed to be a very simple high-level interface that is sufficiently general to cover the re...
DZSUM1 takes the sum of the absolute values of a complex vector and returns a double precision result. Based on DZASUM from the Level 1 BLAS. The change is to use the 'genuine' absolute value. Contributed by Nick Higham for use with ZLACON.
(Note that the long double routines are only valid for the MIPSpro compilers.) Long double functions have been renamed to be compliant with the ANSI-C standard, however to be backward compatible, they may still be called with the double precision function name prefixed with a q. (Exceptions: ecvtl_r and fcvtl_r can be called with names qecvt_r and qfcvt_r, resp.) ecvt converts value to a null-terminated string of ndigit digits and returns a pointer thereto. The high-order digit is no...
Functions in the ELF access library let a program manipulate ELF (Executable and Linking Format) object files, archive files, and archive members. The header file provides type and function declarations for all library services. Programs communicate with many of the higher-level routines using an ELF descriptor. That is, when the program starts working with a file, elf_begin creates an ELF descriptor through which the program manipulates the structures and information in ...
elf_begin, elf_next, elf_rand, and elf_end work together to process ELF object files, either individually or as members of archives. After obtaining an ELF descriptor from elf_begin, the program may read an existing file, update an existing file, or create a new file. fildes is an open file descriptor that elf_begin uses for reading or writing. The initial file offs...
elf_cntl instructs the library to modify its behavior with respect to an ELF descriptor, elf. As elf_begin(3E) describes, an ELF descriptor can have multiple activations, and multiple ELF descriptors may share a single file descriptor. Generally, elf_cntl commands apply to all activations of elf. Moreover, if the ELF descriptor is associated with an archive file, descriptors for members within the archive will also be affected as ...
A program uses elf_end to terminate an ELF descriptor, elf, and to deallocate data associated with the descriptor. Until the program terminates a descriptor, the data remain allocated. elf should be a value previously returned by elf_begin; a null pointer is allowed as an argument, to simplify error handling. If the program wishes to write data associated with the ELF descriptor to the file, it must use elf_update before callin...
If an ELF library function fails, a program may call elf_errno to retrieve the library's internal error number. As a side effect, this function resets the internal error number to zero, which indicates no error. elf_errmsg takes an error number, err, and returns a null-terminated error message (with no trailing new-line) that describes the problem. A zero err retrieves a message for the most recent error. If no error has occurred, the return va...
Alignment constraints for ELF files sometimes require the presence of ``holes.'' For example, if the data for one section are required to begin on an eight-byte boundary, but the preceding section is too ``short,'' the library must fill the intervening bytes. These bytes are set to the fill character. The library uses zero bytes unless the application supplies a value. See elf_getdata(3E) for more information about these holes....
These functions manipulate the flags associated with various structures of an ELF file. Given an ELF descriptor (elf), a data descriptor (data), or a section descriptor (scn), the functions may set or clear the associated status bits, returning the updated bits. A null descriptor is allowed, to simplify error handling; all functions return zero for this degenerate case. cmd may have the following values. ELF_C_CLR The functions clear the bits that are asserted in flags. Only...
elf32_fsize gives the size in bytes of the 32-bit file representation of count data objects with the given type. The library uses version ver to calculate the size [see elf(3E) and elf_version(3E)]. Constant values are available for the sizes of fundamental types. Elf_Type File Size Memory Size _____________________________________________________ ELF_T_ADDR | ELF32_
elf_getarhdr returns a pointer to an archive member header, if one is available for the ELF descriptor elf. Otherwise, no archive member header exists, an error occurred, or elf was null; elf_getarhdr then returns a null value. The header includes the following members. char *ar_name; time_t ar_date; long ar_uid; long ...
elf_getarsym returns a pointer to the archive symbol table, if one is available for the ELF descriptor elf. Otherwise, the archive doesn't have a symbol table, an error occurred, or elf was null; elf_getarsym then returns a null value. The symbol table is an array of structures that include the following members. char *as_name; size_t as_off; unsi...
elf_getbase returns the file offset of the first byte of the file or archive member associated with elf, if it is known or obtainable, and -1 otherwise. A null elf is allowed, to simplify error handling; the return value in this case is -1. The base offset of an archive member is the beginning of the member's information, not the beginning of the archive member header....
These functions access and manipulate the data associated with a section descriptor, scn. When reading an existing file, a section will have a single data buffer associated with it. A program may build a new section in pieces, however, composing the new data from multiple data buffers. For this reason, ``the'' data for a section should be viewed as a list of buffers, each of which is available through a data descriptor. elf_getdata lets a program step through a se...
For a 32-bit class file, elf32_getehdr returns a pointer to an ELF header, if one is available for the ELF descriptor elf. If no header exists for the descriptor, elf32_newehdr allocates a ``clean'' one, but it otherwise behaves the same as elf32_getehdr. It does not allocate a new header if one exists already. If no header exists (for elf_getehdr), one cann...
As elf(3E) explains, ELF provides a framework for various classes of files, where basic objects may have 32 bits, 64 bits, etc. To accommodate these differences, without forcing the larger sizes on smaller machines, the initial bytes in an ELF file hold identification information common to all file classes. Every ELF header's e_ident has EI_NIDENT bytes with the following interpretation. e_ident Index Value Purpose ___________...
For a 32-bit class file, elf32_getphdr returns a pointer to the program execution header table, if one is available for the ELF descriptor elf. elf32_newphdr allocates a new table with count entries, regardless of whether one existed previously, and sets the ELF_F_DIRTY bit for the table [see elf_flag(3E)]. Specifying a zero count deletes an existing table. Note this behavior d...
These functions provide indexed and sequential access to the sections associated with the ELF descriptor elf. If the program is building a new file, it is responsible for creating the file's ELF header before creating sections; see elf_getehdr(3E). elf_getscn returns a section descriptor, given an index into the file's section header table. Note the first ``real'' section has index 1. Although a program can get a section descriptor for...
For a 32-bit class file, elf32_getshdr returns a pointer to a section header for the section descriptor scn. Otherwise, the file is not a 32- bit class file, scn was null, or an error occurred; elf32_getshdr then returns null. The header includes the following members. Elf32_Word sh_name; Elf32_Word sh_type; Elf32_<...
elf_hash computes a hash value, given a null terminated string, name. The returned hash value, h, can be used as a bucket index, typically after computing h mod x to ensure appropriate bounds. Hash tables may be built on one machine and used on another because elf_hash uses unsigned arithmetic to avoid possible differences in various machines' signed arithmetic. Although name is shown as char* above, elf_hash treats i...
This function returns a value identifying the kind of file associated with an ELF descriptor (elf). Currently defined values appear below. ELF_K_AR The file is an archive [see ar(4)]. An ELF descriptor may also be associated with an archive member, not the archive itself, and then elf_kind identifies the member's type. ELF_K_COFF The file is a COFF object file. COFF object files cannot be processed by this library, and E...
elf_next, elf_rand, and elf_begin manipulate simple object files and archives. elf is an ELF descriptor previously returned from elf_begin. elf_next provides sequential access to the next archive member. That is, having an ELF descriptor, elf, associated with an archive member, elf_next prepares the containing archive to access the following member when the program ...
elf_rand, elf_next, and elf_begin manipulate simple object files and archives. elf is an ELF descriptor previously returned from elf_begin. elf_rand provides random archive processing, preparing elf to access an arbitrary archive member. elf must be a descriptor for the archive itself, not a member within the archive. offset gives the byte offset from the beginning of the archive to the...
elf_rawfile returns a pointer to an uninterpreted byte image of the file. This function should be used only to retrieve a file being read. For example, a program might use elf_rawfile to retrieve the bytes for an archive member. A program may not close or disable [see elf_cntl(3E)] the file descriptor associated with elf before the initial call to elf_rawfile, because elf_r<...
This function converts a string section offset to a string pointer. elf identifies the file in which the string section resides, and section gives the section table index for the strings. elf_strptr normally returns a pointer to a string, but it returns a null pointer when elf is null, section is invalid or is not a section of type SHT_STRTAB, the section data cannot be obtained, offset is invalid, or an error occurs....
elf_update causes the library to examine the information associated with an ELF descriptor, elf, and to recalculate the structural data needed to generate the file's image. cmd may have the following values. ELF_C_NULL This value tells elf_update to recalculate various values, updating only the ELF descriptor's memory structures. Any modified structures are flagged with the ELF_F_DIRTY bit....
As elf(3E) explains, the program, the library, and an object file have independent notions of the ``latest'' ELF version. elf_version lets a program determine the ELF library's internal version. It further lets the program specify what memory types it uses by giving its own working version, ver, to the library. Every program that uses the ELF library must coordinate versions as described below. The header file <libelf.h> sup...
elf32_xlatetom translates various data structures from their 32-bit class file representations to their memory representations; elf32_xlatetof provides the inverse. This conversion is particularly important for cross development environments. src is a pointer to the source buffer that holds the original data; dst is a pointer to a destination buffer that will hold the translated copy. encode gives the byte encoding in ...
On INPUT NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. LOW and IGH are integers determined by the balancing subroutine BALANC. If BALANC has not been used, set LOW=1 and IGH equal to the order of the matrix. A contains the multipliers which were used in the reduction by ELMHES in its lower triangle below the subdiagonal. INT contains information on the rows and columns interchanged in the reduction by ELMHES. Only ...
On INPUT NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix. LOW and IGH are integers determined by the balancing subroutine BALANC. If BALANC has not been used, set LOW=1, IGH=N. A contains the input matrix. On OUTPUT A contains the Hessenberg matrix. The multipliers which were used in the reduction are stored in the remaining triangle under the Hessenberg matrix. INT contains information o...
On INPUT NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix. LOW and IGH are integers determined by the balancing subroutine BALANC. If BALANC has not been used, set LOW=1, IGH=N. A contains the multipliers which were used in the reduction by ELMHES in its lower triangle below the subdiagonal. INT contains information on the rows and columns interchanged in the reduction by ELMHES. only elem...
For the convenience of utilities and other applications which need to access an executable in special ways, ld(1) may create one or more of the special symbols in the list above. Of these, only the symbols _procedure_table _procedure_string_table, _rt_symbol_table and _rt_symbol_string_table, __rld_obj_head, __elf_header, __program_header_table, _lib_version, which are described below, actually have associated data, which is specially created by ld(1). For each of the remaining special symbols i...
buffer expects a buffer into which the system writes the feedback output from the Geometry Pipeline. On the Personal Iris, Iris Entry, Indy, XL, XS, XS24, Elan, Extreme, and VGX, the output consists of 32-bit floating point values; on the other IRIS-4D models, the output consists of 16-bit integer values. Be sure you declare your buffer appropriately. size expects the maximum number of buffer elements into which the system will write feedback output. This must not exceed the number of elements i...
buffer expects a buffer into which to append the contents of the name stack when a drawing routine draws in the picking region. Before writing the contents of the name stack, the system appends the number of entries it is about to append. Thus, if the name stack contains the values, 5, 9, and 17; then endpick appends the values, 3, 5, 9, and 17, to buffer. Because more than one drawing routine may have written in the picking region, it is possible for buffer to contain a number of readings from ...
Vertices specified between bgnqstrip and endqstrip are used to define a strip of quadrilaterals. The graphics pipe maintains three vertex registers. The first, second, and third vertices are loaded into the registers, but no quadrilateral is drawn until the system executes the fourth vertex routine. Upon executing the fourth vertex routine, the system draws a quadrilateral through the vertices, then replaces the two oldest vertices with the third and fourth vertices. For each new pair of vertex ...
buffer expects a buffer into which to write hits. FUNCTION RETURN VALUE The returned function values is the number of hits made while selection mode was active. Each time there is a hit, the system writes the name stack to buffer. If the value returned is negative, the buffer is not large enough to hold all the hits that occurred.
This module provides aliases for the built-in variables whose names no one seems to like to read. Variables with side-effects which get triggered just by accessing them (like $0) will still be affected. For those variables that have an awk version, both long and short English alternatives are provided. For example, the $/ variable can be referred to either $RS or $INPUT_RECORD_SEPARATOR if you are using the English module. See the perlvar manpage for a complete list of these. PPPPaaaaggg...
Tcl_Interp *interp (in) Tcl interpreter from which file is to be accessed. FILE *file (in) Handle for file that is to become accessible in interp. int permissions (in) OR-ed combination of TCL_FILE_READABLE and TCL_FILE_WRITABLE; indicates whether file was opened for reading or writing or both. char *string (in) String identifying file, such as stdin or file4. int write (in) Non-zero means the file will be used for writing, zero means it will be used for reading. int checkUsage (in) If non-zero,...
background highlightBackground insertOnTime selectForeground | borderWidth highlightColor insertWidth takeFocus | cursor highlightThickness justify textVariable exportSelection insertBackground relief xScrollCommand foreground insertBorderWidth selectBackground font insertOffTime selectBorderWidth See the ``options'' manual entry for details on the standard options. WIDGET-SPECIFIC OPTIONS Name: show | Class: Show | Command-Line Switch:-show | If this option is specified, then the true content...
Perl maintains environment variables in a pseudo-hash named %ENV. For when this access method is inconvenient, the Perl module Env allows environment variables to be treated as simple variables. The Env::import() function ties environment variables with suitable names to global Perl variables with the same names. By default it does so with all existing environment variables (keys %ENV). If the import function receives arguments, it takes them to be a list of environment variables to tie; it's o...
Returns 1 if an end-of-file condition has occurred on fileId, 0 otherwise. FileId must have been the return value from a previous call to open, or it may be stdin, stdout, or stderr to refer to one of the standard I/O channels.
ep is the general name for the set of intrinsic functions which return the numeric characteristics of each of the standard numeric types. epbase - returns the base for the type of the argument (for floating point types, epbase returns the base of the mantissa). Currently this is 2. Page 1 EP(3F) EP(3F) epprec - returns the precision (in terms of power of the base) for the type of the argument. The sign bit (if any) is not included in the precision. The assumed bit (see IEEE floating point specif...
erf returns the error function of x, defined as (2 / sqrt(pi)) integral{0 to x} of (e ** -t **2) dt. erfc, which returns 1.0 - erf(x), is provided because of the extreme loss of relative accuracy if erf(x) is called for large x and the result subtracted from 1.0 (e.g., for x = 10, 12 places are lost). The standard math library libm.a, libmx.a, and libm43.a each contain versions of erf and erfc, however the long double-precision routines erfl and erfcl are only available in the standard math libr...
erf returns the error function of x, defined as (2 / sqrt(pi)) integral{0 to x} of (e ** -t **2) dt. erfc, which returns 1.0 - erf(x), is provided because of the extreme loss of relative accuracy if erf(x) is called for large x and the result subtracted from 1.0 (e.g., for x = 10, 12 places are lost). The standard math library libm.a, libmx.a, and libm43.a each contain versions of erf and erfc, however the long double-precision routines erfl and erfcl are only available in the standard math libr...
Returns a TCL_ERROR code, which causes command interpretation to be unwound. Message is a string that is returned to the application to indicate what went wrong. If the info argument is provided and is non-empty, it is used to initialize the global variable errorInfo. errorInfo is used to accumulate a stack trace of what was in progress when an error occurred; as nested commands unwind, the Tcl interpreter adds information to errorInfo. If the info argument is present, it is used to initialize e...
These routines are useful for mapping 48 bit ethernet numbers to their ASCII representations or their corresponding host names, and vice versa. The function ether_ntoa converts a 48-bit ethernet number pointed to by e to its standard ACSII representation; it returns a pointer to the ASCII string. The representation is of the form: ``x:x:x:x:x:x'' where x is a hexadecimal number between 0 and ff. The function ether_aton converts an ASCII string in the standard representation back to a 48 bit et...
These two routines return user and system runtime in seconds for the calling process. Dtime returns the user and system time since the last call to dtime, or the start of execution on the first call. The argument array returns user time in the first element and system time in the second element. The function value is the sum of user and system time. This value approximates the program's elapsed time on a quiet system. The resolution of all timing is 1/HZ. See the system include file param.h in ...
Eval takes one or more arguments, which together comprise a Tcl script containing one or more commands. Eval concatenates all its arguments in the same fashion as the concat command, passes the concatenated string to the Tcl interpreter recursively, and returns the result of that evaluation (or any error generated by it).
Tk_Window tkwin (in) Token for window in which events may occur. unsigned long mask (in) Bit-mask of events (such as ButtonPressMask) for which proc should be called. Tk_EventProc *proc (in) Procedure to invoke whenever an event in mask occurs in the window given by tkwin. ClientData clientData (in) Arbitrary one-word value to pass to proc.
EventMon API is a set of functions for connecting to and communicating with Event Monitor daemon (see eventmond(1M) for more details). (EventMon daemon is a system daemon responsible for intercepting all system events messages from syslog daemon, filtering and buffering them). This API allows different applications to communicate with EventMon daemon in order to do the following: check installed binary image of EventMon daemon in system directory (function emapiIsDaemonInstalled()); check if an ...
NOTE: this version (4.0) of exception handling facility is totally different from the (3.xx) versions. This version extracts information from the .debug_frame section instead of the runtime procedure table as in the prior releases. All the old functions -- exception_dispatcher, find_rpd, set_unhandled_exception and unwind -- are no longer supported. To handle exceptions from UNIX signals and to minimize the cost at runtime until an exception is encountered, the loader collects perprocedure excep...
This command treats its arguments as the specification of one or more subprocesses to execute. The arguments take the form of a standard shell pipeline where each arg becomes one word of a command, and each distinct command becomes a subprocess. If the initial arguments to exec start with - then they are treated as | command-line switches and are not part of the pipeline specification. | The following switches are currently supported: -keepnewline Retains a trailing newline in the pipeline's ou...
The long double and single-precision routines listed above are only available in the standard math library, -lm, and in -lmx. The exp family return the exponential function of x, e**x. The expm1 family return exp(x)-1 accurately even for tiny x. The log functions return the natural logarithm of x. The log10 functions return the base 10 logarithm of x. Page 1 EXP(3M) EXP(3M) The log1p family return log(1+x) accurately even for tiny x. pow(x,y), its single-precision counterpart powf(x,y), and its ...
The long double and single-precision routines listed above are only available in the standard math library, -lm, and in -lmx. The exp family return the exponential function of x, e**x. The expm1 family return exp(x)-1 accurately even for tiny x. The log functions return the natural logarithm of x. The log10 functions return the base 10 logarithm of x. Page 1 EXP(3M) EXP(3M) The log1p family return log(1+x) accurately even for tiny x. pow(x,y), its single-precision counterpart powf(x,y), and its ...
The long double and single-precision routines listed above are only available in the standard math library, -lm, and in -lmx. The exp family return the exponential function of x, e**x. The expm1 family return exp(x)-1 accurately even for tiny x. The log functions return the natural logarithm of x. The log10 functions return the base 10 logarithm of x. Page 1 EXP(3M) EXP(3M) The log1p family return log(1+x) accurately even for tiny x. pow(x,y), its single-precision counterpart powf(x,y), and its ...
These routines access the exported filesystem information in /etc/xtab. setexportent opens the export information file and returns a file pointer to use with getexportent, addexportent, remexportent, and endexportent. getexportent reads the next line from filep and returns a pointer to an object with the following structure containing the broken-out fields of a line in the file, /etc/xtab. The fields have meanings described in exports(4). #define ACCESS_OPT ``access'' /* machines that can moun...
The Exporter module implements a default import method which many modules choose to inherit rather than implement their own. Perl automatically calls the import method when processing a use statement for a module. Modules and use are documented in the perlfunc manpage and the perlmod manpage. Understanding the concept of modules and how the use statement operates is important to understanding the Exporter....
Concatenates arg's (adding separator spaces between them), evaluates the | result as a Tcl expression, and returns the value. The operators permitted in Tcl expressions are a subset of the operators permitted in C expressions, and they have the same meaning and precedence as the corresponding C operators. Expressions almost always yield numeric results (integer or floating-point values). For example, the expression expr 8.2 + 6 evaluates to 14.2. Tcl expressions differ from C expressions in the...
Tcl_Interp *interp (in) Interpreter in whose context to evaluate string. char *string (in) Expression to be evaluated. Must be in writable memory (the expression parser makes temporary modifications to the string during parsing, which it undoes before returning). long *longPtr (out) Pointer to location in which to store the integer value of the expression. int *doublePtr (out) Pointer to location in which to store the floating-point value of the expression. int *booleanPtr (out) Pointer to locat...
The module is used in Win32 port to replace common UNIX commands. Most commands are wrapers on generic modules File::Path and File::Basename. cat Concatenates all files mentioned on command line to STDOUT. eqtime src dst Sets modified time of dst to that of src rm_f files.... Removes directories - recursively (even if readonly) rm_f files.... Removes files (even if readonly) touch files ... Makes files exist, with current timestamp mv source... destination Moves source to destination. Multiple s...
ExtUtils::Embed provides utility functions for embedding a Perl interpreter and extensions in your C/C++ applications. Typically, an application Makefile will invoke ExtUtils::Embed functions while building your application. @EXPORT ExtUtils::Embed exports the following functions: xsinit(), ldopts(), ccopts(), perl_inc(), ccflags(), ccdlflags(), xsi_header(), xsi_protos(), xsi_body()
Both install() and uninstall() are specific to the way ExtUtils::MakeMaker handles the installation and deinstallation of perl modules. They are not designed as general purpose tools. install() takes three arguments. A reference to a hash, a verbose switch and a don't-really-do-it switch. The hash ref contains a mapping of directories: each key/value pair is a combination of directories to be copied. Key is a directory to copy from, value is a directory to copy to. The whole tree below the "fr...
This utility takes a list of libraries in the form -llib1 -llib2 -llib3 and prints out lines suitable for inclusion in an extension Makefile. Extra library paths may be included with the form -L/another/path this will affect the searches for all subsequent libraries. It returns an array of four scalar values: EXTRALIBS, BSLOADLIBS, LDLOADLIBS, and LD_RUN_PATH. Some of these don't mean anything on VMS and Win32. See the details about those platform specifics below. Dependent libraries can be lin...
This utility is designed to write a Makefile for an extension module from a Makefile.PL. It is based on the Makefile.SH model provided by Andy Dougherty and the perl5-porters. It splits the task of generating the Makefile into several subroutines that can be individually overridden. Each subroutine returns the text it wishes to have written to the Makefile. MakeMaker is object oriented. Each directory below the current directory that contains a Makefile.PL. Is treated as a separate object. This ...
Mkmanifest() writes all files in and below the current directory to a file named in the global variable $ExtUtils::Manifest::MANIFEST (which defaults to MANIFEST) in the current directory. It works similar to find . -print but in doing so checks each line in an existing MANIFEST file and includes any comments that are found in the existing MANIFEST file in the new one. Anything between white space and an end of line within a MANIFEST file is considered to be a comment. Filenames and comments are...
This whole module is written when perl itself is built from a script called minimod.PL. In case you want to patch it, please patch minimod.PL in the perl distribution instead. writemain() takes an argument list of directories containing archive libraries that relate to perl modules and should be linked into a new perl binary. It writes to STDOUT a corresponding perlmain.c file that is a plain C file containing all the bootstrap code to make the modules associated with the libraries available fro...
Mkbootstrap typically gets called from an extension Makefile. There is no *.bs file supplied with the extension. Instead a *_BS file which has code for the special cases, like posix for berkeley db on the NeXT. This file will get parsed, and produce a maybe empty @DynaLoader::dl_resolve_using array for the current architecture. That will be extended by $BSLOADLIBS, which was computed by ExtUtils::Liblist::ext(). If this array still is empty, we do nothing, else we write a .bs file with an @DynaL...
ExtUtils::Mksymlists produces files used by the linker under some OSs during the creation of shared libraries for dynamic extensions. It is normally called from a MakeMaker-generated Makefile when the extension is built. The linker option file is generated by calling the function Mksymlists, which is exported by default from ExtUtils::Mksymlists. It takes one argument, a list of key-value pairs, in which the following keys are recognized: NAME This gives the name of the extension (e.g. Tk::Canva...
See ExtUtils::MM_Unix for a documentation of the methods provided there. This package overrides the implementation of these methods, not the semantics. PPPPaaaaggggeeee 1111
The methods provided by this package are designed to be used in conjunction with ExtUtils::MakeMaker. When MakeMaker writes a Makefile, it creates one or more objects that inherit their methods from a package MM. MM itself doesn't provide any methods, but it ISA ExtUtils::MM_Unix class. The inheritance tree of MM lets operating specific packages take the responsibility for all the methods provided by MM_Unix. We are trying to reduce the number of the necessary overrides by defining rather primi...
See ExtUtils::MM_Unix for a documentation of the methods provided there. This package overrides the implementation of these methods, not the semantics.
See ExtUtils::MM_Unix for a documentation of the methods provided there. This package overrides the implementation of these methods, not the semantics. catfile Concatenate one or more directory names and a filename to form a complete path ending with a filename constants (o) Initializes lots of constants and .SUFFIXES and .PHONY static_lib (o) Defines how to produce the *.a (or equivalent) files. dynamic_bs (o) Defines targets for bootstrap files. dynamic_lib (o) Defines how to produce the *.so ...
After an extension has been built and before it is installed it may be desirable to test it bypassing make test. By adding use ExtUtils::testlib; to a test program the intermediate directories used by make are added to @INC. PPPPaaaaggggeeee 1111
FAM monitors files and directories, notifying interested applications of changes. Routines for communicating with the fam(1M) server process are found in ``libfam.a'', which is loaded if the option ``-lfam'' is used with cc(1) or ld(1). The library ``libC.a'' (``-lC'') must also be specified. An application calls routines described here to establish a list of files for fam to monitor. Fam generates events on a socket to communicate with the application. The fam process is started when th...
The fattach routine attaches a STREAMS-based file descriptor to an object in the filesystem name space, effectively associating a name with fildes. fildes must be a valid open file descriptor representing a STREAMS file. path is a pathname of an existing object, and the effective user ID of the calling process must be the owner of the file and have write permissions, or the calling process must have appropriate privilege (P_OWNER). All subsequent operations...
x is the window-relative starting x coordinate of the rectangle in the framebuffer that is being loaded into texture memory. y is the window-relative starting y coordinate of the rectangle in the framebuffer that is being loaded into texture memory. target is the texture target to which the texture we are loading is bound. id is the id of the texture we are loading. s0 is the starting S coordinate of the subtexture to load. s1 is the ending S coordinate of the subtexture to load. t0 is the start...
fclose causes any buffered data waiting to be written for the named stream [see intro(3)] to be written out, and the stream to be closed. If the underlying file pointer is not already at end of file, and the file is one capable of seeking, the file pointer is adjusted so that the next operation on the open file pointer deals with the byte after the last one read from or written to the file being closed. If stream points to an output stream or an update stream on ...
This module is just a translation of the C fnctl.h file. Unlike the old mechanism of requiring a translated fnctl.ph file, this uses the h2xs program (see the Perl source distribution) and your native C compiler. This means that it has a far more likely chance of getting the numbers right.
Fdate returns the current date and time as a 24 character string in the format described under ctime(3). Neither `newline' nor NULL will be included. Fdate can be called either as a function or as a subroutine. If called as a function, the calling routine must define its type and length. For example: character*24 fdate external fdate write(*,*) fdate()
The fdetach routine detaches a STREAMS-based file descriptor from a name in the filesystem. path is the pathname of the object in the filesystem name space, which was previously attached (see fattach(3C)). The user must be the owner of the file or a user with the appropriate privileges. All subsequent operations on path will operate on the filesystem node and not on the STREAMS file. The permissions and status of the node are restored to the state the no...
buffer expects a buffer into which the system writes the feedback output from the Geometry Pipeline. On the Personal Iris, Iris Entry, Indy, XL, XS, XS24, Elan, Extreme, and VGX, the output consists of 32-bit floating point values; on the other IRIS-4D models, the output consists of 16-bit integer values. Be sure you declare your buffer appropriately. size expects the maximum number of buffer elements into which the system will write feedback output. This must not exceed the number of elements i...
ferror returns non-zero when an I/O error has previously occurred reading from or writing to the named stream, otherwise zero. feof returns non-zero when EOF has previously been detected reading the named input stream, otherwise zero. clearerr resets the error indicator and EOF indicator to zero on the named stream. fileno returns the integer file descriptor associated with the named stream (see below for common file descriptors, and open(2) for general information on file descriptors.) The foll...
res_id The handle used by unrelated processes to allocate a reservoir. This is the value returned by atomic_alloc_res_ident(). policy The handle of a policy module created by the user. count The number of atomic variables that will be needed in a reservoir. addr The base address when choosing or getting information about the base address where the variables are allocated. flags The flags indicate whether to set or return the base address of the variables. reservoir The handle for a reservoir fro...
For the C interface two types "complex" and "zomplex" have been defined as structures of two floating point variables ( re, im ). They are equivalent to the "complex" and "double complex" Fortran types. typedef struct { float re; float im; } complex; typedef struct { double re; double im; } zomplex; These types as well as the prototypes of the different functions for FFTs are defined in the "/usr/include/fft.h" header file. In C, Multi Dimensional sequences are actually stored into a 1...
cfft1d and zfft1d compute the Fourier transform of a complex sequence. The k-th index F(k) of the Fourier transform of a real sequence f(i) is equal to: F(k) = Sum ( W^(i*k) * f(i) ), for i =0, ..., (N-1) W = exp( (Sign*2*sqrt(-1)*PI) / N ) The Direct Fourier transform is performed in-place, so the input sequence is overwritten by its Fourier transform.
Initialize the coefficient array which is used in the FFT modules. This array contains the different twiddle factors and the factorization of N into prime numbers. As the FFT modules cfft1d or zfft1d only read the coeff array, it may be reused as long as necessary once it has been initialized. In C, if ptr is NULL, cfft1di or zfft1di returns a pointer to an allocated buffer. CFFT1DI should be used to initialize the coeeficient array before any call to CFFT1D ZFFT1DI should be used to initialize ...
scfft1du and dzfft1du compute the Fourier transform of a real sequence. The k-th index F(k) of the Fourier transform of a real sequence f(i) is equal to: F(k) = Sum ( W^(i*k) * f(i) ), for i =0, ..., (N-1) W = exp( (Sign*2*sqrt(-1)*PI) / N ) The Direct Fourier transform is performed in-place, so the input sequence is overwritten by its Fourier transform. As the input sequence has real values, only the first half of the transform is needed. The (N-k)-th sample of the transform would be the conjug...
Initialize, the coefficient array which is used in the FFT modules. This array contains the different twiddle factors and the factorization of N into prime numbers. As the FFT modules scfft1d or dzfft1d only read the coeff array, it may be reused as long as necessary once it has been initialized. In C, if ptr is NULL, scfft1dui or dzfft1dui returns a pointer to an allocated buffer. SCFFT1DUI should be used to initialize the coefficient array before any call to SCFFT1DU DZFFT1DUI should be used t...
cfft2d and zfft2d compute in place the complex Fourier transform of complex 2D sequence of size N1 x N2. The value F{k,l} of the transform of the 2D sequence f{i,j} is equal to: F{k,l} = Sum ( W1^(i*k) * W2^(j*l) * f{i,j} ), for i =0,...,(N1-1), and j=0,...,(n2-1) W1 = exp( (Sign*2*sqrt(-1)*PI) / N1 ) W2 = exp( (Sign*2*sqrt(-1)*PI) / N2 )
Initialize the coefficient array which is used in the 2D FFT modules. This array contains the different twiddle factors and the factorization of N1 and N2 into prime numbers. As the FFT modules cfft2d or zfft2d only read the coeff array, it may be reused as long as necessary once it has been initialized. In C, if ptr is NULL, cfft2di or zfft2di returns a pointer to an allocated buffer. CFFT2DI should be used to initialize the coefficient array before any call to CFFT2D ZFFT2DI should be used to ...
scfft2du and dzfft2du compute in place the complex Fourier transform of real 2D sequence of size N1 x N2. The value F{k,l} of the transform of the 2D sequence f{i,j} is equal to: F{k,l} = Sum ( W1^(i*k) * W2^(j*l) * f{i,j} ), for i =0,...,(N1-1), j=0,...,(n2-1) W1 = exp( (Sign*2*sqrt(-1)*PI) / N1 ) W2 = exp( (Sign*2*sqrt(-1)*PI) / N2 )
Initialize, the coefficient array which is used in the 2D FFT modules. This array contains the different twiddle factors and the factorization of N1 and N2 into prime numbers. As the FFT modules scfft2d or dzfft2d only read the coeff array, it may be reused as many times as necessary once it has been initialized. In C, if ptr is NULL, scfft2dui or dzfft2dui returns a pointer to an allocated buffer. SCFFT2DUI should be used to initialize the coefficient array before any call to SCFFT2DU DZFFT2DUI...
cfft3d and zfft3d compute in place the complex Fourier transform of complex 3D sequence of size N1xN2xN3. The value F{j1,j2,j3} of the transform of the 3D sequence f{i1,i2,i3} is equal to: F{j1,j2,j3} = Sum(W1^(i1*j1)*W2^(i2*j2)*W3^(i3*j3*f{i1,i2,i3} ), for i[123] =0,...,(N[123]-1) W[123] = exp( (Sign*2*sqrt(-1)*PI) / N[123] )
Initialize the coefficient array which is used in the 3D FFT modules. This array contains the different twiddle factors and the factorization of N1,N2 and N3 into prime numbers. As the FFT modules cfft3d or zfft3d only read the coeff array, it may be reused as many times as necessary once it has been initialized. In C, if ptr is NULL, cfft3di or zfft3di returns a pointer to an allocated buffer. CFFT3DI should be used to initialize the coefficient array before any call to CFFT3D ZFFT3DI should be...
scfft3du and dzfft3du compute in place the complex Fourier transform of real 3D sequence of size N1 x N2 x N3. The value F{j1,j2,j3} of the transform of the 3D sequence f{i1,i2,i3} is equal to: F{j1,j2,j3}=Sum(W1^(i1*j1)*W2^(i2*j2)*W3^(i3*j3)*f{i1,i2,i3}), for i[123] =0,...,(N[123]-1) W[123] = exp( (Sign*2*sqrt(-1)*PI) / N[123] )
Initialize, the coefficient array which is used in the 3D FFT modules. This array contains the different twiddle factors and the factorization of N1, N2 and N3 into prime numbers. As the FFT modules scfft3d or dzfft3d only read the coeff array, it may be reused as many times as necessary once it has been initialized. In C, if ptr is NULL, scfft3dui or dzfft3dui returns a pointer to an allocated buffer. SCFFT3DUI should be used to initialize the coefficient array before any call to SCFFT3DU DZFFT...
On INPUT NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix. T contains the input matrix. Its subdiagonal is stored in the last N-1 positions of the first column, its diagonal in the N positions of the second column, and its superdiagonal in the first N-1 positions of the third column. T(1,1) and T(N,3) are arbitrary. On OUTPUT T is unaltered. D contains the diagonal elements of the symmetri...
On INPUT NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix. T contains the input matrix. Its subdiagonal is stored in the last N-1 positions of the first column, its diagonal in the N positions of the second column, and its superdiagonal in the first N-1 positions of the third column. T(1,1) and T(N,3) are arbitrary. On OUTPUT T is unaltered. D contains the diagonal elements of the symmetri...
This command provides several operations on a file's name or attributes. Name is the name of a file; if it starts with a tilde, then tilde substitution is done before executing the command (see the manual entry for Tcl_TildeSubst for details). Option indicates what to do with the file name. Any unique abbreviation for option is acceptable. The valid options are: file atime name Returns a decimal string giving the time at which file name was last accessed. The time is measured in the standard PO...
These routines allow you to parse file specifications into useful pieces using the syntax of different operating systems. fileparse_set_fstype You select the syntax via the routine fileparse_set_fstype(). If the argument passed to it contains one of the substrings "VMS", "MSDOS", "MacOS", "AmigaOS" or "MSWin32", the file specification syntax of that operating system is used in future calls to fileparse(), basename(), and dirname(). If it contains none of these substrings, UNIX syntax i...
The validate() routine takes a single multiline string consisting of lines containing a filename plus a file test to try on it. (The file test may also be a "cd", causing subsequent relative filenames to be interpreted relative to that directory.) After the file test you may put || die to make it a fatal error if the file test fails. The default is || warn. The file test may optionally have a "!' prepended to test for the opposite condition. If you do a cd and then list some relative filenam...
The File::Compare::compare function compares the contents of two sources, each of which can be a file or a file handle. It is exported from File::Compare by default. File::Compare::cmp is a synonym for File::Compare::compare. It is exported from File::Compare only by request.
The File::Copy module provides two basic functions, copy and move, which are useful for getting the contents of a file from one place to another. o The copy function takes two parameters: a file to copy from and a file to copy to. Either argument may be a string, a FileHandle reference or a FileHandle glob. Obviously, if the first argument is a filehandle of some sort, it will be read from, and if it is a file name it will be opened for reading. Likewise, the second argument will be written to (...
A module that implements DOS-like globbing with a few enhancements. This file is also a portable replacement for perlglob.exe. It is largely compatible with perlglob.exe (the M$ setargv.obj version) in all but one respect--it understands wildcards in directory components. For example, C<<..\\l*b\\file/*glob.p?>> will work as expected (in that it will find something like '..\lib\File/DosGlob.pm' alright). Note that all path components are case-insensitive, and that backslashes and forward...
The wanted() function does whatever verifications you want. $File::Find::dir contains the current directory name, and $_ the current filename within that directory. $File::Find::name contains "$File::Find::dir/$_". You are chdir()'d to $File::Find::dir when the function is called. The function may set $File::Find::prune to prune the tree. File::Find assumes that you don't alter the $_ variable. If you do then make sure you return it to its original value before exiting your function. This li...
The mkpath function provides a convenient way to create directories, even if your mkdir kernel call won't create more than one level of directory at a time. mkpath takes three arguments: o the name of the path to create, or a reference to a list of paths to create, o a boolean value, which if TRUE will cause mkpath to print the name of each directory as it is created (defaults to FALSE), and o the numeric mode to use when creating the directories (defaults to 0777) It returns a list of all dire...
This module's default exports override the core stat() and lstat() functions, replacing them with versions that return "File::stat" objects. This object has methods that return the similarly named structure field name from the stat(2) function; namely, dev, ino, mode, nlink, uid, gid, rdev, size, atime, mtime, ctime, blksize, and blocks. You may also import all the structure fields directly into your namespace as regular variables using the :FIELDS import tag. (Note that this still overrides ...
filebufs specialize streambufs to use a file as a source or sink of characters. Characters are consumed by doing writes to the file, and are produced by doing reads. When the file is seekable, a filebuf allows seeks. At least 4 characters of putback are guaranteed. When the file permits reading and writing, the filebuf permits both storing and fetching. No special action is required between gets and puts (u...
The cacheout function will make sure that there's a filehandle open for writing available as the pathname you give it. It automatically closes and re-opens files if you exceed your system file descriptor maximum.
This command is used to create file event handlers. A file event handler is a binding between a file and a script, such that the script is evaluated whenever the file becomes readable or writable. File event handlers are most commonly used to allow data to be received from a child process on an event-driven basis, so that the receiver can continue to interact with the user while waiting for the data to arrive. If an application invokes gets or read when there is no input data available, the proc...
NOTE: This class is now a front-end to the IO::* classes. FileHandle::new creates a FileHandle, which is a reference to a newly created symbol (see the Symbol package). If it receives any parameters, they are passed to FileHandle::open; if the open fails, the FileHandle object is destroyed. Otherwise, it is returned to the caller. FileHandle::new_from_fd creates a FileHandle like new does. It requires two parameters, which are passed to FileHandle::fdopen; if the fdopen fails, the FileHandle obj...
int id (in) Integer identifier for an open file or device (such as returned by open system call). int mask (in) Conditions under which proc should be called: OR-ed combination of TK_READABLE, TK_WRITABLE, and TK_EXCEPTION. Tk_FileProc *proc (in) Procedure to invoke whenever the file or device indicated by id meets the conditions specified by mask. Tk_FileProc2 *proc2 (in) Procedure to invoke from event loop to check whether fd is ready and, if so, handle it. ClientData clientData (in) Arbitrary ...
Locates the full path to the script bin directory to allow the use of paths relative to the bin directory. This allows a user to setup a directory tree for some software with directories /bin and /lib and then the above example will allow the use of modules in the lib directory without knowing where the software tree is installed. If perl is invoked using the -e option or the perl script is read from STDIN then FindBin sets both $Bin and $RealBin to the current directory....
char *imageName (in) Name of the photo image. Tk_PhotoHandle handle (in) Opaque handle identifying the photo image to be affected. Tk_PhotoImageBlock *blockPtr (in) Specifies the address and storage layout of image data. int x (in) Specifies the X coordinate where the top-left corner of the block is to be placed within the image. int y (in) Specifies the Y coordinate where the top-left corner of the block is to be placed Page 1 Tk_FindPhoto(3Tk) Tk_FindPhoto(3Tk) within the image. int width (in)...
SFIRM1D, DFIRM1D, CFIRM1D and DFIRM1D compute N 1D convolutions in the time domain : h(i,j) = beta * h(i,j) + alpha * Sum[ f(k,j) * g(i-k) ] with j=1,...,N USAGE: 1. Suppose you want to: filter a 2D "image" f(0:449,0:699) along the first dimension , by a 1D filter g(-15:15), put the result in h(0:449,0:699), you can use: call dfirm1d( 700,f(0,0),1,449-0+1,0,449,g(-15),1,-15,15,1.0, $ h(0,0),1,449-0+1,0,449,0.0) 2. Suppose you want to: filter a 2D "image" f(0:449,0:699) along the Second dimen...
Fixade is a bus error handler which fields, corrects, and reports bus errors arising due to misaligned data in Irix programs. The MIPS architecture, for performance reasons, is very restrictive on the alignment of data which can be used with its standard instruction set. Usually, the compilers can guarantee this alignment, however, some situations exist in which this guarantee cannot be made. These misalignments may be necessary to satisfy Fortran equivalence statements, due to mismatched formal...
These Fortran 90 inquiry functions return scalar values which describe the value of x as components of the model of floating point data. The model for real x is defined by section 13.71.1 of the Fortran standard. In each case the argument x is of type real and with the exception of exponent the type and kind type parameter of each result is the same as x. The exponent function returns an integer of default type equal to the base two exponent (e) of x if the argument is non-zero. If zero, the res...
Flock applies or removes an advisory lock on the file associated with the file descriptor fd. A lock is applied by specifying one of the following as an operation parameter: LOCK_SH, LOCK_EX, LOCK_SH|LOCK_NB or LOCK_EX|LOCK_NB. Note that LOCK_NB, if used, must appear in an inclusive OR expression with either LOCK_SH or LOCK_EX. To unlock an existing lock, operation should be LOCK_UN. Advisory locks allow cooperating processes to perform consistent operations on files, but do not guarantee consis...
flockfile, ftrylockfile, and funlockfile provide for explicit locking and unlocking of stdio streams. They may be used by a thread to delineate a sequence of I/O statements to be executed as a critical section. flockfile is used by a thread to acquire exclusive use of file. ftrylockfile is used by a thread to acquire exclusive use of file ...
The fmod, fabs, and trunc functions listed above, as well as the long double and single-precision versions of the remaining functions, are only available in the standard math library, -lm, and in -lmx. Page 1 FLOOR(3M) FLOOR(3M) The floor functions return the largest integer not greater than x. The argument x is double for floor, long double for floorl, and float for ffloor and its ANSI-named equivalent floorf. copysign(x,y) returns the number with the magnitude of x and the sign of y. copysignl...
The fmod, fabs, and trunc functions listed above, as well as the long double and single-precision versions of the remaining functions, are only available in the standard math library, -lm, and in -lmx. Page 1 FLOOR(3M) FLOOR(3M) The floor functions return the largest integer not greater than x. The argument x is double for floor, long double for floorl, and float for ffloor and its ANSI-named equivalent floorf. copysign(x,y) returns the number with the magnitude of x and the sign of y. copysignl...
Flushes any output that has been buffered for fileId. FileId must have been the return value from a previous call to open, or it may be stdout or stderr to access one of the standard I/O streams; it must refer to a file that was opened for writing. The command returns an empty string.
Flushes any output that has been buffered for fileId. FileId must have been the return value from a previous call to open, or it may be stdout or stderr to access one of the standard I/O streams; it must refer to a file that was opened for writing. The command returns an empty string.
Flushes any output that has been buffered for fileId. FileId must have been the return value from a previous call to open, or it may be stdout or stderr to access one of the standard I/O streams; it must refer to a file that was opened for writing. The command returns an empty string.
This function was made obsolete by changes to the IRIS Font Manager. The function was replaced by a stub that does not do anything. What follows is a description of what this function did under the NeWS windowing system. The Font Manager provides font cache flushing by default. To disable automatic flushing of the font cache, call fmcachedisable . The Font Manager continues to keep track of the space fonts occupy, but does nothing to flush the space when it exceeds the font cache limit. You can ...
This function was made obsolete by changes to the IRIS Font Manager. The function was replaced by a stub that does not do anything. What follows is a description of what this function did under the NeWS windowing system. The Font Manager provides font cache flushing by default. You can disable font cache flushing with a call to fmcachedisable. The Font Manager continues to keep track of the space fonts occupy, but does nothing to flush the space when it exceeds the font cache limit. To restart a...
This function was made obsolete by changes to the IRIS Font Manager. The function was replaced by a stub that does not do anything. What follows is a description of what this function did under the NeWS windowing system. The font cache maintains the space reserved for font data. Use fmcachelimit to get the number of Font Manager cache quanta currently set as the upper size limit of the font cache. To calculate the number of bytes reserved for the font cache, multiply the returned value of fmcach...
fmgetchrwidth returns the number of pixels (in the x dimension) by which the current character position moves when you image the specified character. This value is rounded to an integer (for some fonts, characters can have subpixel dimensions). If the specified character glyph does not exist, the width of a space is returned. If a space does not exist, the width of the font is returned.
This function was made obsolete by changes to the IRIS Font Manager. The function was replaced by a stub that does not do anything. What follows is a description of what this function did under the NeWS windowing system. fmgetcomment gets the comment associated with the font fh. This routine writes that comment to the location (array) pointed to by the str character pointer. You must use the slen parameter to tell fmgetcomment the longest string it can write to the str array. fmgetcomment does n...
fmenumerate accepts a callback routine as an argument. It calls the routine once for each font face file in the font directories in the font path, When fmenumerate calls the callback routine, it passes the callback routine a pointer to a character string that contains the name of a font file. For example, the following code prints the name of each "family" to the terminal: void printname(str) char *str; { printf("%s\n", str); } main() { fminit(); fmenumerate(printname); }...
Before you can call fmfindfont, you must startup the Font Manager. (Call fminit.) Once you have initialized the Font Manager, you can call fmfindfont to get a font handle for a type face. The face argument expects a pointer to a character string that specifies a font family. The returned value of the function is the requested font handle. This font handle gives you access to a one point version of the font. Use fmfonthandle much as you would use the findfont operator of PostScript. If fmfindfont...
fmgetfontinfo writes information to the members of the fmfontinfo type structure pointed to by the info parameter. The information written pertains to the whole fh font. If fmgetfontinfo cannot find the fh font, its returned function value is -1. Otherwise the value of the function is 0. The members of fmfontinfo are declared to make it easy for FORTRAN programmers to access and interpret (hence the large number of long declarations). For a listing of the entire fmfontinfo type structure, see
fmgetfontname gets the name of the font associated with the fonthandle in fh. fmgetfontname writes this information to the location (array) pointed to by str. Use slen to tell fmgetfontname the size of the array pointed to by str. fmgetfontname does not write more characters to str than specified by slen. Normally, the returned value of the fmgetfontname function is the length of the string written to str. But if the font does not have a name, or if fmgetfontname cannot find the font, the return...
fmfontpath returns a pointer to a string that describes the current search path for finding font files. The string contains a colonseparated list of directories. The default font path for bitmap fonts for the IRIS Font Manager is "/usr/lib/X11/fonts/100dpi:/usr/lib/X11/fonts/75dpi:/usr/lib/X11/fonts/misc". That font path can be changed by using the environment variable FONTPATH. The default font path for those outline fonts which are in the Type 1 format is "/usr/lib/DPS/outline/base". That ...
fmfprstr sets the current font to a specified font, and then renders a specified character string by using that font. fmfprstr does not perform the subpixel positioning of characters. It returns the length of the rendered character string in pixels. This function can usually render a given character string faster than the function fmprstr. The return value of -1 indicates an error.
fmfreefont frees the storage associated with a font in a given rotation and size (as specified in the font handle fh). Deleting a font also deletes its font handle. To ensure that fmfreefont frees the correct font/rotation/size instance, be sure that the same page matrix is in force as when you first queried or imaged from that font. Because normal usage of the font manager does not involve changing the page matrix, you seldom need to worry about it. But if you find that you cannot delete a font...
This function was made obsolete by changes to the IRIS Font Manager. The function was replaced by a stub that does not do anything. What follows is a description of what this function did under the NeWS windowing system. This routine returns the exact number of bytes used by the font cache. There are no implied multipliers.
Call fminit to initialize the Font Manager. You must call fminit before you can call any other routine in the Font Manager library. It sets the default page matrix that the font scaling and transformation routines use.
fmmakefont concatenates the provided matrix to the matrix associated with this instance of the font, returning a new handle. When the font is imaged, this matrix is inspected to determine the proper scaling, shearing, rotation, or combination of these, for the imaging. This operator is more general than fmscalefont, which applies uniform scaling only.
The argument m points to a 3x2 matrix of doubles, of which you need fill in only the first two rows when loading values. (The third row is reserved for future development and is currently ignored.) This matrix is a two dimensional transformation matrix that you can multiply against the page matrix. (The page matrix is independent of the hardware matrix stack.) You can use this multiplication of the page matrix to scale and rotate text. For more information on two-dimensional transformation matri...
fmoutchar renders a single glyph from the given font. It does not change the current font. If the glyph doesn't exist, it spaces forward the width of a space; if a space doesn't exist, it spaces forward the width of the font. The width used is returned. Note that 'ch' is declared as 'unsigned int' so that characters with code > 256 can be displayed.
fmprintermatch sets a state variable that controls printer font matching. fmprintermatch(0) disables printer font matching, fmprintermatch(1) enables printer font matching. When a font is rendered (imaged), the Font Manager check the state of this variable. If enabled, the Font Manager looks for a printer widths file that corresponds to the font. If the file exists, and the font has not yet been sized, the Font Manager creates a new font and inserts it into the font handle that has widths that c...
fmprstr renders a string using the current font, as set by fmsetfont. It uses subpixel-positioning to assure that rounding errors do not cause aberrant spacing. It also renders rotated characters by inspecting and concatenating the page matrix with the font matrix, then rendering in the resulting coordinate system. If the string is null, or the font does not exist, fmprstr returns -1. Otherwise, it returns 0....
fmfindfont returns a handle to a 1-point-high font in the face specified. fmscalefont applies the provided scale factor to the matrix associated with this instance of the font, returning a new handle. Later, when the font is imaged, this value is used to determine the size of characters to use. Its default coordinate system is in points, so passing a scale of "12" creates a specification of a 12-point font. This is displayresolution independent. Its functionality parallels the scalefont operat...
This function was made obsolete by changes to the IRIS Font Manager. The function was replaced by a stub that does not do anything. What follows is a description of what this function did under the NeWS windowing system. fmsetcachelimit accepts a small integer as an argument, multiplies it by FMCACHE_QUANTUM, and uses the result to reset the upper limit of the font cache data space. If new_limit is less than one, fmsetcachelimit resets it to one before multiplying by FMCACHE_QUANTUM. If new_limi...
fmfindfont returns a handle to a 1-point-high font in the face specified. fmscalefont applies a specified scale factor to that font. fmsetfont makes the scaled font the current font. Its functionality parallels the setfont operator of PostScript.
fmsetpath accepts a pointer to a string that describes the current search path for finding font files. The string should be a colon-separated list of directories. The default font path for bitmap fonts for the IRIS Font Manager is "/usr/lib/X11/fonts/100dpi:/usr/lib/X11/fonts/75dpi:/usr/lib/X11/fonts/misc". That font path can be changed by using the environment variable FONTPATH. The default font path for outline fonts for the IRIS Font Manager is "/usr/lib/DPS/outline/base". That font path ...
fmgetstrwidth returns the number of pixels the string occupies in the x dimension. It uses the subpixel resolution provided in the glyph widths as it accumulates the width. If fmgetstrwidth fails, the return value is set to -1.
Based on a message's classification component, fmtmsg writes a formatted message to stderr, to the console, or to both. fmtmsg can be used instead of the traditional printf interface to display messages to stderr. fmtmsg, in conjunction with gettxt, provides a simple interface for producing language-independent applications. A formatted message consists of up to five sta...
fmgetwholemetrics gets the glyph (character) information associated the font handle fh and writes it to the fmglyphinfo structures pointed to by the elements of the fi array. You should allocate enough space to contain nglyphs*sizeof(fmglyphinfo). fmgetwholemetrics fills only those structures of the fi array that have corresponding glyphs in the font file. Therefore, you should initialize all the fmglyphinfo structures before calling fmgetwhometrics. (For example, you could use calloc to allocat...
fnmatch compares the string specified by the string argument against the pattern specified by the pattern argument. The flags argument modifies the interpretation of pattern and string. It is the bitwise inclusive OR of zero or more of the flags defined in the header <fnmatch.h>. If the FNM_PATHNAME flag is set in flags, then a slash character in string will be explicitly matched by a slash in pattern; it will not be matched by either the ast...
The focus command is used to manage the Tk input focus. At any given | time, one window on each display is designated as the focus window; any | key press or key release events for the display are sent to that window. | It is normally up to the window manager to redirect the focus among the | top-level windows of a display. For example, some window managers | automatically set the input focus to a top-level window whenever the | mouse enters it; others redirect the input focus only when the user...
tk_focusNext is a utility procedure used for keyboard traversal. It returns the ``next'' window after window in focus order. The focus order is determined by the stacking order of windows and the structure of the window hierarchy. Among siblings, the focus order is the same as the stacking order, with the lowest window being first. If a window has children, the window is visited first, followed by its children (recursively), followed by its next sibling. Top-level windows other than window are...
mode expects one of eight valid symbolic constants: FG_VTX_EXP: FG_PIX_EXP: interpret params as a specification for fog density and color. These modes are suited to simulate heavy fog. FG_VTX_EXP2: FG_PIX_EXP2: interpret params as a specification for fog density and color. These modes are suited to simulate distant haze. FG_VTX_LIN: FG_PIX_LIN: interpret params as a specification for eye space distance to start of fog, eye space distance at which fully fogged, and fog color. These modes can be u...
fntnum expects the font identifier, an index into the font table built by defrasterfont. If you specify a font number that is not defined, the system selects font 0.
fopen opens the file named by filename and associates a stream with it. fopen returns a pointer to the FILE structure associated with the stream. filename points to a character string that contains the name of the file to be opened. type is a character string. The initial portion of type must consist of one of the following character sequences: r or rb open for reading w or wb truncate or create for writing a or ab append: open for writing at end of file or create for writing r+,r+b or rb+ open ...
For is a looping command, similar in structure to the C for statement. The start, next, and body arguments must be Tcl command strings, and test is an expression string. The for command first invokes the Tcl interpreter to execute start. Then it repeatedly evaluates test as an expression; if the result is non-zero it invokes the Tcl interpreter on body, then invokes the Tcl interpreter on next, then repeats the loop. The command terminates when test evaluates to 0. If a continue command is invok...
In this command varname is the name of a variable, list is a list of values to assign to varname, and body is a Tcl script. For each element of list (in order from left to right), foreach assigns the contents of the field to varname as if the lindex command had been used to extract the field, then calls the Tcl interpreter to execute body. The break and continue statements may be invoked inside body, with the same effect as in the for command. Foreach returns an empty string....
This command generates a formatted string in the same way as the ANSI C sprintf procedure (it uses sprintf in its implementation). FormatString indicates how to format the result, using % conversion specifiers as in sprintf, and the additional arguments, if any, provide values to be substituted into the result. The return value from format is the formatted string. DETAILS ON FORMATTING The command operates by scanning formatString from left to right. Each character from the format string is appe...
These routines are to get and set the floating-point control registers of MIPS floating-point units. All of these routines take and or return their values as 32 bit integers. The file contains unions for each of the control registers. Each union contains a structure that breaks out the bit fields into the logical parts for each control register. This file also contains constants for fields of the control registers. All implementations of MIPS floating-point have a control and status ...
The SpeedShop Performance Tools contain a floating-point exception tracing library, -lfpe_ss, which provides tracing for floating-point exceptions. The library provides an intercept layer for the call to fpe_trace_option, generated by the standard fpe library. Note that users do not call this routine, rather it is invoked from the standard FPE library. It allows tracing of all FPE's with the SpeedShop performance tools. It is normally not linked or invoked directly; the ssrun(1) command will us...
These routines fetch/set various subfields of the floatingpoint control status register of the floating-point unit. fpgetmask returns the current exception mask. fpgetround returns the current rounding mode. fpgetsticky returns the logged exceptions. fpsetmask sets the exception mask, returning the previous exception mask. Any sticky bit whose corresponding mask bit is being enabl...
(Note that the long double routines are only valid for the MIPSpro compilers.) Long double function fp_class_l has been renamed to be compliant with the ANSI-C standard, however to be backward compatible, it may still be called with the name fp_class_q. These routines are used to determine the class of IEEE or long double floating-point values. They return one of the constants in the file <fp_class.h> and never cause an exception even for signaling NaN's. These ...
borderWidth highlightBackground highlightThickness takeFocus | cursor highlightColor relief See the ``options'' manual entry for details on the standard options. WIDGET-SPECIFIC OPTIONS Name: background | Class: Background | Command-Line Switch:-background | This option is the same as the standard background option except | that its value may also be specified as an empty string. In this | case, the widget will display no background or border, and no colors| will be consumed from its colormap ...
fread copies, into an array pointed to by ptr, up to nitems items of data from the named input stream, where an item of data is a sequence of bytes (not necessarily terminated by a null byte) of length size. fread stops reading bytes if an end-of-file or error condition is encountered while reading stream, or if nitems items have been read. The file pointer associated with stream is positioned following the last byte read, which may be at end-of-file. fread does not change the contents of stream...
Display *display (in) Display for which id was allocated. XID id (in) Identifier of X resource (window, font, pixmap, cursor, graphics context, or colormap) that is no longer in use.
(Note that the long double routines are only valid for the MIPSpro compilers.) Long double functions have been renamed to be compliant with the ANSI-C standard, however to be backward compatible, they may still be called with the double precision function name prefixed with a q. Every non-zero number can be written uniquely as x*2**n, where the ``mantissa'' (fraction) x is in the range 0.5 < |x| < 1.0, and the ``exponent'' n is an integer. frexp returns the mantissa of a doubl...
lunit must refer to an open logical unit. offset is an offset in bytes relative to the position specified by from. Valid values for from are: 0 meaning `beginning of the file' 1 meaning `the current position' 2 meaning `the end of the file' The value returned by fseek will be 0 if successful, a system error code otherwise. (See perror(3F)) Ftell returns the current position of the file associated with the specified logical unit. The value is an offset, in bytes, from the beginning of the file...
fseek sets the file position indicator for the stream pointed to by stream. The new position, measured in bytes from the beginning of the file, is obtained by adding offset to the position specified by whence. SEEK_SET specified starting point is the beginning of the file plus offset. SEEK_CUR starting point is the current value of the file position indicator plus offset. SEEK_END specified starting point is the EOF of the file plus offset. A successful call to fseek clears the end-of-file indic...
Fsetpos and fgetpos save and restore the file position indicated by the value of the object pointed at by pos. The functions fsetpos64 and fgetpos64 are identical to fsetpos and fgetpos respectively, except that they take an fpos64_t * as an argument. This allows for the specification of a file position that is greater that 2 Gigabytes. A call to fgetpos stores the current value of the file position indicator for stream in the object pointed at by pos. The information is encoded in a format whic...
The MIPS floating-point accelerator may raise floating-point exceptions, signal SIGFPE, due to five conditions: FPE_OVERFL(overflow), FPE_UNDERFL(underflow), FPE_DIVZERO(divide-by-zero), FPE_INEXACT(inexact result), or FPE_INVALID(invalid operand, e.g., infinity). Usually these conditions are masked, and do not cause a floating-point exception. Instead, a default value is substituted for the result of the operation, and the program continues silently. This event may be intercepted by Page 1 FSIG...
ifstream, ofstream, and fstream specialize istream, ostream, and iostream, respectively, to files. That is, the associated streambuf will be a filebuf. In the following descriptions, assume - f is any of ifstream, ofstream, or fstream. - pfb is a <...
ftime sets the time and millitm members of the timeb structure pointed to by tp to contain the seconds and milliseconds, respectively, of the current time in seconds since 00:00:00 UTC, January 1, 1970. The contents of the timezone and dstflag members of tp after a call to ftime() are unspecified....
ftw recursively descends the directory hierarchy rooted in path. For each object in the hierarchy, ftw calls the user-defined function fn, passing it a pointer to a null-terminated character string containing the name of the object, a pointer to a stat structure (see stat(2)) containing information about the object, and an integer. Possible values of the integer, defined in the ftw.h header file, are: FTW_F The object is a file...
These functions perform conversion from one data type to another. The function int converts to integer from its integer, real*4, double precision, real*16, complex, double complex, or complex*32 argument. If the argument is real, integer, real*4, double precision, or real*16 int returns the integer whose magnitude is the largest integer that does not exceed the magnitude of the argument and whose sign is the same as the sign of the argument (i.e. truncation). For complex the above rule is applie...
dpy An open connection to an X server. Used to create off-screen render areas for OpenGL. The caller must not close the display connection until all of the DMfxbuffers have been freed. imageFormat A complete image format parameter list (see dmSetImageDefaults(3dm)). This format is used to determine how large the buffers need to be. inputUsage Specifies the modes in which the buffer will be used as input; says how the image will be read from the buffer and used as input to a plug-in or applicatio...
movie The movie that contains the image to be rendered. track The track into which a new image is inserted. time A time within the movie. duration Specifies how long an inserted image will be displayed when the movie is played. Page 1 dmFXMovieRenderImage(3dm) dmFXMovieRenderImage(3dm) timeScale Specifies the units for time and duration. inputUsage Specifies how the image buffer will be used, a combination of bufInputDirect, bufInputTexture, bufInputDrawPixels, and bufInputMovie. destinationBuff...
buffer a special-effects image buffer, allocated with dmFXAllocateImageBuffers. outputUsage Specifies the mode in which the buffer will be used as output; says how the image will be placed into the buffer by a plug-in or application. The value is one of bufOutputDirect, bufOutputOpenGL, bufOutputmovie. No more that one can be set. inputUsage Specifies the modes in which the buffer will be used as input; says how the image will be read from the buffer and used as input to a plug-in or application...
buffer A special-effects image buffer that has been set up for access with dmFXSetupInputImageBuffer or dmFXSetupOutputImageBuffer. returnInfo A PRX_ScanlineBufferRec structure, which will be filled in.
lgamma and gamma return ln|(GAMMA(x))|, where GAMMA is the mathematical gamma function. gammal and lgammal are the long double versions of the log gamma function. gamma and lgamma are identical, as are gammal and lgammal. The external integer signgam returns the sign of GAMMA(x), and the external integer signgaml returns the sign of GAMMAL(x).
r expects an array of 256 elements. Each element contains a setting for the red electron gun. g expects an array of 256 elements. Each element contains a setting for the green electron gun. b expects an array of 256 elements. Each element contains a setting for the blue electron gun.
dgbmv, sgbmv, zgbmv and cgbmv perform one of the matrix-vector operations: y := alpha*A*x + beta*y, or y := alpha*A'*x + beta*y, or y := alpha*conjg( A' )*x + beta*y, where alpha and beta are scalars, x and y are vectors and A is an m by n band matrix, with kl sub-diagonals and ku super-diagonals.
dgemm, sgemm, zgemm and cgemm perform one of the matrix-matrix operations C := alpha*op( A )*op( B ) + beta*C, where op( X ) is one of op( X ) = X or op( X ) = X', alpha and beta are scalars, and A, B and C are matrices, with op( A ) an m by k matrix, op( B ) a k by n matrix and C an m by n matrix.
dgemv , sgemv , dgemv and cgemv perform one of the matrix-vector operations: y := alpha*A*x + beta*y, or y := alpha*A'*x + beta*y, or y := alpha*conjg( A' )*x + beta*y, where alpha and beta are scalars, x and y are vectors and A is an m by n matrix.
Tk_Window tkwin (in) Window for which geometry is being requested. int reqWidth (in) Desired width for tkwin, in pixel units. int reqHeight (in) Desired height for tkwin, in pixel units. int width (in) Space to leave for internal border for tkwin, in pixel units.
dger , sger , zheru and cgeru perform the rank 1 operation A := alpha*x*y' + A, zgerc and cgerc perform the rank 1 operation A := alpha*x*conjg( y' ) + A, where alpha is a scalar, x is an m element vector, y is an n element vector and A is an m by n matrix.
getabi is used to determine whether to use the 32-bit ABI (abi32) or the 64-bit ABI (abi64). First it checks the argv list for "-32" or "-64". If neither of these is given, then it checks the argv list for a "-mips[1- 4]" option. Mips 1 and 2 imply abi32 while mips 3 and 4 imply abi64. If none of the argv options specify the abi, then we check the SGI_ABI environment variable, which can be set to either "-32" or "-64". If SGI_ABI is not in the environment, then we che...
Tcl_Interp *interp (in) Interpreter to use for error reporting. char *string (in) String containing name of anchor point: one of ``n'', ``ne'', ``e'', ``se'', ``s'', ``sw'', ``w'', ``nw'', or ``center''. int *anchorPtr (out) Pointer to location in which to store anchor position corresponding to string. Tk_Anchor anchor (in) Anchor position, e.g. TCL_ANCHOR_CENTER.
getarg returns the i-th command-line argument of the current process. iargc returns the index of the last argument. foo arg1 arg2 arg3 getarg(2, c) would return the string ``arg2'' in the character variable c. iargc would return 3 as the value of the function call.
none FUNCTION RETURN VALUE The returned value for this function is either 0 or 1. 0 indicates that backfacing polygon removal is turned off. 1 indicates that backfacing polygon removal is enabled.
Tcl_Interp *interp (in) Interpreter to use for error reporting. Tk_Window tkwin (in) Token for window in which the bitmap will be used. Tk_Uid id (in) Description of bitmap; see below for possible values. Tk_Uid *nameId (in) Name for new bitmap to be defined. char *source (in) Data for bitmap, in standard bitmap format. Must be stored in static memory whose value will never change. int width (in) Width of bitmap. | int height (in) Height of bitmap. | int *widthPtr (out) Pointer to word to fill i...
none FUNCTION RETURN VALUE Individual bits in the returned value indicate which buffers are enabled. The bits are named: _________________________________ |Symbolic Name | Buffer Enabled | |________________________________| |BCKBUFFER back buffer | |FRNTBUFFER front buffer | |DRAWZBUFFER zbuffer drawing | |________________________________|
num is the device number of the button you want to test. FUNCTION RETURN VALUE There are two possible return values for this function: FALSE indicates that button num is up. TRUE indicates that button num is down. The return value is undefined if there was an error, e.g. num is not a button device.
These routines return the next character from a file associated with a fortran logical unit, bypassing normal fortran I/O. Getc reads from logical unit 5, normally connected to the control terminal input. The value of each function is a system status code. Zero indicates no error occurred on the read; -1 indicates end of file was detected. A positive value will be either a UNIX system error code or an f77 I/O error code. See perror(3F)....
Fgetc and getc return the next character (if it exists) from the named input stream, as an unsigned character converted to an integer. It also moves the file pointer, if defined, ahead one character in stream. getchar is defined as getc(stdin). Each of getc,getchar and fgetc exist as functions in the C library. Getc and getchar are also available as macros in (see below under CAVEATS for important details on the implementation of these macros.) Getw returns the next word (i.e., integer...
Tcl_Interp *interp (in) Interpreter to use for error reporting. char *string (in) String containing name of cap style: one of ```butt'', ``projecting'', or ``round''. int *capPtr (out) Pointer to location in which to store X cap style corresponding to string. int cap (in) Cap style: one of CapButt, CapProjecting, or CapRound.
Tcl_Interp *interp (in) Interpreter to use for error reporting. Tk_Window tkwin (in) Token for window in which colormap will be used. char *string (in) Selects a colormap: either new or the name of a window with the same screen and visual as tkwin. Display *display (in) Display for which colormap was allocated. Colormap colormap (in) Colormap to free; must have been returned by a previous call to Tk_GetColormap or Tk_GetVisual....
none FUNCTION RETURN VALUE There are two possible returned values for this function: TRUE indicates that onemap mode is active. FALSE indicates that multimap mode is active.
Tcl_Interp *interp (in) Interpreter to use for error reporting. Tk_Window tkwin (in) Token for window in which color will be used. Tk_Uid nameId (in) Textual description of desired color. XColor *prefPtr (in) Indicates red, green, and blue intensities of desired color. XColor *colorPtr (in) Pointer to X color information. Must have been allocated by previous call to Tk_GetColor or Tk_GetColorByValue, except when passed to Tk_NameOfColor. Drawable drawable (in) Drawable in which the result graphi...
Tcl_Interp *interp (in) Interpreter to use for error reporting. Tk_Window tkwin (in) Token for window in which color will be used. Tk_Uid nameId (in) Textual description of desired color. XColor *prefPtr (in) Indicates red, green, and blue intensities of desired color. XColor *colorPtr (in) Pointer to X color information. Must have been allocated by previous call to Tk_GetColor or Tk_GetColorByValue, except when passed to Tk_NameOfColor. Drawable drawable (in) Drawable in which the result graphi...
ix expects the pointer to the location at which to write the x coordinate of the current character position. iy expects the pointer to the location at which to write the y coordinate of the current character position.
Tcl_Interp *interp (in) Interpreter to use for error reporting. Tk_Window tkwin (in) Token for window in which the cursor will be used. Tk_Uid nameId (in) Description of cursor; see below for possible values. char *source (in) Data for cursor bitmap, in standard bitmap format. char *mask (in) Data for mask bitmap, in standard bitmap format. int width (in) Width of source and mask. | int height (in) Height of source and mask. | int xHot (in) X-location of cursor hot-spot. | int yHot (in) Y-locati...
Tcl_Interp *interp (in) Interpreter to use for error reporting. Tk_Window tkwin (in) Token for window in which the cursor will be used. Tk_Uid nameId (in) Description of cursor; see below for possible values. char *source (in) Data for cursor bitmap, in standard bitmap format. char *mask (in) Data for mask bitmap, in standard bitmap format. int width (in) Width of source and mask. | int height (in) Height of source and mask. | int xHot (in) X-location of cursor hot-spot. | int yHot (in) Y-locati...
getcwd returns a pointer to the current directory pathname. The value of size must be at least one greater than the length of the pathname to be returned. If buf is not NULL, the pathname will be stored in the space pointed to by buf. If buf is a NULL pointer, getcwd will obtain size bytes of space using malloc(3C). In this case, a subsequent call to free should be made using the pointer returned by g...
getdate The getdate function converts a string representation of a date or time into a broken-down time. The external variable or macro getdate_err is used by getdate() to return error values. Templates are used to parse and interpret the input string. The templates are contained in a text file identified by the environment variable DATEMSK. The DATEMSK variable should be se...
none FUNCTION RETURN VALUE This function can return either of two possible values: FALSE, indicating that the system is not in depth-cue mode. TRUE, indicating that the system is in depth-cue mode.
near expects a pointer to the location into which the system should write the distance of the near clipping plane. far expects a pointer to the location into which the system should write the distance of the far clipping plane.
n expects the number of devices named in the devs array (no more than 128). devs expects an array containing the device identifiers (device number constants, such as MOUSEX, BPADX, LEFTMOUSE, etc.) of the devices you want to read. This array can contain up to 128 devices. vals expects the array into which you want the system to write the values read from the devices listed in the devs array. Each member in the vals array corresponds to a member of the devs array. Thus, the value at vals[3] was r...
The getdfltprojuser function searches the project file for the user name and returns the first project ID associated with that user. The first project in a user's project entry is considered to be their default project for the purposes of login and similar situations. The fgetdfltprojuser function is a variant of getdfltprojuser that uses a PROJ token to make it more efficient for repeated use. Otherwise its operation is identical. For more details on creating a PROJ token, see openproj(3C)....
none FUNCTION RETURN VALUE The returned value for this function tells you which display mode is currently active. ______________________________________________ |Symbolic Name | Display Mode | |_____________________________________________| |DMSINGLE color map single buffer mode | |DMDOUBLE color map double buffer mode | |DMRGB RGB single buffer mode | |DMRGBDOUBLE RGB double buffer mode | |_____________________________________________|...
getdtablehi returns the index of the largest open descriptor for the calling process plus one. The 'plus one' makes getdtablehi an ideal replacement for getdtablesize(2) when the program wishes simply to loop through and act on all open file descriptors, rather than up to the system maximum.
getenv returns the character-string value of the environment variable represented by its first argument into the character variable of its second argument. If no such environment variable exists, all blanks will be returned.
getenv searches the environment list [see environ(5)] for a string of the form name=value and, if the string is present, returns a pointer to the value in the current environment. Otherwise, it returns a null pointer.
Tcl_Interp *interp (in) Interpreter to use for error reporting. Tk_Window tkwin (in) Token for window in which font will be used. Tk_Uid nameId (in) Name of desired font. XFontStruct *fontStructPtr (in) Font structure to return name for or delete.
Tk_Window tkwin (in) Token for window in which the graphics context will be used. unsigned long valueMask (in) Mask of bits (such as GCForeground or GCStipple) indicating which fields of *valuePtr are valid. XGCValues *valuePtr (in) Pointer to structure describing the desired values for the graphics context. Display *display (in) Display for which gc was allocated. GC gc (in) X identifier for graphics context that is no longer needed. Must have been allocated by Tk_GetGC....
buffer is a symbolic constant taken from the list below. It identifies the buffer or state being queried. GC_BITS_CMODE color index size. zero indicates RGB mode. GC_BITS_RED red component size. GC_BITS_GREEN green component size. GC_BITS_BLUE blue component size. GC_BITS_ALPHA alpha component size.
inquiry is a symbolic constant taken from the list below. It identifies the characteristic about which you want to inquire. FUNCTION RETURN VALUE The function returns the value of the requested characteristic, or -1, if the request is invalid or its value cannot be determined.
fx expects a pointer to the location into which you want the system to write the x coordinate of the current graphics position. fy expects a pointer to the location into which you want the system to write the y coordinate of the current graphics position. fz expects a pointer to the location into which you want the system to write the z coordinate of the current graphics position. fw expects a pointer to the location into which you want the system to write the w coordinate of the current graphic...
getgrent, getgrgid and getgrnam and their reentrant counterparts each return pointers to an object with the following structure containing the broken-out fields of a line in the /etc/group file or some other back-end group database. Each line contains a ``group'' structure, defined in the header file. struct group { char *gr_name; /* the name of the group */ char *gr_passwd; /* the encrypted group password */ gid_t gr_gid; /* the numerical group ID */ char **gr_mem; /* vector of pointe...
hist is the destination for the histogram data specified with hgram. Hist must be at least (number of bins per component) x (number of components per pixel) long.
gethostbyname, gethostbyaddr and their reentrant counterpoints each return a pointer to a hostent data structure describing an Internet host referenced by name or by address, respectively. This structure contains either the information obtained from broken-out fields from a line in /etc/hosts. or some other back-end hosts database. struct hostent { char *h_name; /* official name of host */ char **h_aliases; /* alias list */ int h_addrtype; /* host address type */ int h_length; /* length of addre...
Tcl_Interp *interp (in) Place to leave error message. Tk_Window tkwin (in) Window in which image will be used. char *name (in) Name of image. Tk_ImageChangedProc *changeProc (in) Procedure for Tk to invoke whenever image content or size changes. ClientData clientData (in) One-word value for Tk to pass to changeProc. Tk_Image image Token for image instance; must have been returned by a previous call to Tk_GetImage. int imageX (in) X-coordinate of upper-left corner of region of image to redisplay ...
Tcl_Interp *interp (in) Interpreter to use for error reporting. char *string (in) Textual value to be converted. int *intPtr (out) Points to place to store integer value converted from string. double *doublePtr (out) Points to place to store doubleprecision floating-point value converted from string. int *boolPtr (out) Points to place to store boolean value (0 or 1) converted from string.
getinvent returns a pointer to an object with the following structure containing an entry from the system hardware inventory table. Each entry in the table contains an ``inventory'' structure, declared in the header file: typedef struct inventory_s { struct inventory_s *inv_next; int inv_class; int inv_type; char inv_controller; char inv_unit; long inv_state; } inventory_t; Each inventory entry is described by a class and a class-specific type. The remaining fields provide furth...
Tcl_Interp *interp (in) Interpreter to use for error reporting. char *string (in) String containing name of join style: one of ``bevel'', ``miter'', or ``round''. int *joinPtr (out) Pointer to location in which to store X join style corresponding to string. int join (in) Join style: one of JoinBevel, JoinMiter, JoinRound.
Tcl_Interp *interp (in) Interpreter to use for error reporting. char *string (in) String containing name of | justification style (``left'', | ``right'', or ``center''). int *justifyPtr (out) Pointer to location in which to store justify value corresponding to string. Tk_Justify justify (in) Justification style (one of the values listed below).
getlogin returns a pointer to the login name as found in /var/adm/utmp. It may be used in conjunction with getpwnam to locate the correct password file entry when the same user id is shared by several login names. If getlogin is called within a process that is not attached to a terminal, it returns a null pointer. The correct procedure for determining the login name is to call cu<...
i expects an index into the color map r expects a pointer to the location into which you want to copy the red value of the color at the color map index specified by i. g expects a pointer to the location into which you want to copy the green value of the color at the color map index specified by i. b expects a pointer to the location into which you want to copy the blue value of the color at the color map index specified by i....
none FUNCTION RETURN VALUE The returned value of this function is the current matrix mode. There are four possible values for this function. MSINGLE indicates single matrix mode. MPROJECTION indicates projection matrix mode. MVIEWING indicates viewing matrix mode. MTEXTURE indicates texture matrix mode.
These routines replace the getfsent routines for accessing the file system description file /etc/fstab. They are also used to access the mounted file system description file /etc/mtab. Setmntent opens a file system description file and returns a file pointer which can then be used with getmntent, addmntent, getmntany, or endmntent. The type argument is the same as in fopen(3S). Getmntent reads the next line from filep and returns a pointer to an object with the following structure containing the...
none FUNCTION RETURN VALUE The returned value of this function is either TRUE or FALSE. TRUE indicates that multisample is on. FALSE indicates that multisample is off. For systems without the multisample option, this function always returns FALSE.
The five library routines described on this page are part of the UNIX System V Network Selection component. They provide application access to the system network configuration database, /etc/netconfig. In addition to the netconfig database and the routines for accessing it, Network Selection includes the environment variable NETPATH [see environ(5)] and the NETPATH ...
Getnetent, fgetnetent, getnetbyname, getnetbyaddr and each of their reentrant counterparts each return a pointer to an object with the following structure containing the broken-out fields of a line in the network data base file, /etc/networks, or some other back-end networks database. struct netent { char *n_name; /* official name of net */ char **n_aliases; /* alias list */ int n_addrtype; /* net number type */ unsigned long n_net; /* net number */ }; The members of this structure are: n_name T...
Innetgr returns 1 or 0, depending on whether netgroup contains the machine, user, or domain triple as a member. Any of the three strings machine, user, or domain can be NULL, in which case it signifies a wild card. Getnetgrent returns the next member of a network group. After the call, machinep will contain a pointer to a string containing the name of the machine part of the network group member, and similarly for userp and domainp. If any of machinep, userp or domainp is returned as a NULL poin...
The three routines described on this page are part of the UNIX System V Network Selection component. They provide application access to the system network configuration database, /etc/netconfig, as it is ``filtered'' by the NETPATH environment variable [see environ(5)]. Network Selection also includes routines that access the network configuration database directly [see getnetconf<...
property expects the name of the property to be queried. value expects pointer to the location into which the system should write the value of the named property.
none FUNCTION RETURN VALUE The returned value of this function is the object identifier of the currently open object. If no object is now open, the returned value is -1.
getopt returns the next option letter in argv that matches a letter in optstring. It supports all the rules of the command syntax standard [see intro(1)]. Since all new commands are intended to adhere to the command syntax standard, they should use getopts(1), getopt(3C), or getsubopt(3C) to parse positional parameters and check for options that are legal for that command. optstring must contain th...
The Getopt::Long module implements an extended getopt function called GetOptions(). This function adheres to the POSIX syntax for command line options, with GNU extensions. In general, this means that options have long names instead of single letters, and are introduced with a double dash "--". Support for bundling of command line options, as was the case with the more traditional single-letter approach, is provided but not enabled by default. For example, the UNIX "ps" command can be given ...
The getopt() functions processes single-character switches with switch clustering. Pass one argument which is a string containing all switches that take an argument. For each switch found, sets $opt_x (where x is the switch name) to the value of the argument, or 1 if no argument. Switches which take an argument don't care whether there is a space between the switch and the argument. For those of you who don't like additional variables being created, getopt() and getopts() will also accept a ha...
Tk_Window tkwin (in) Token for window. char *name (in) Name of desired option. char *class (in) Class of desired option. Null means there is no class for this option; do lookup based on name only.
x expects a pointer to the location into which the system should copy the x position (in pixels) of the lower left corner of the graphics window. y expects a pointer to the location into which the system should copy the y position (in pixels) of the lower left corner of the graphics window.
getpass reads up to a newline or EOF from the file /dev/tty, after prompting on the standard error output with the null-terminated string prompt and disabling echoing. A pointer is returned to a null-terminated string of at most 8 characters. If /dev/tty cannot be opened, a null pointer is returned. An interrupt will terminate input and send an interrupt signal to the calling program before returning....
getpeername returns the name of the peer connected to socket s. The int pointed to by the namelen parameter should be initialized to indicate the amount of space pointed to by name. On return it contains the actual size of the name returned (in bytes). The name is truncated if the buffer provided is too small.
Tcl_Interp *interp (in) Interpreter to use for error reporting. Tk_Window tkwin (in) Window whose screen geometry determines the conversion between absolute units and pixels. char *string (in) String that specifies a distance on the screen. int *intPtr (out) Pointer to location in which to store converted distance in pixels. double *doublePtr (out) Pointer to location in which to store converted distance in millimeters....
Display *display (in) X display for the pixmap. Drawable d (in) Pixmap or window where the new pixmap will be used for drawing. int width (in) Width of pixmap. int height (in) Height of pixmap. int depth (in) Number of bits per pixel in pixmap. Pixmap pixmap (in) Pixmap to destroy.
The getprojall function stores information about all of the project IDs known to the system into an array of projid_t structs pointed to by buf. A maximum of len entries will be stored. The projid_t struct is defined in and has the following format: #define MAXPROJNAMELEN 32 typedef struct projid { char proj_name[MAXPROJNAMELEN]; /* project name */ prid_t proj_id; /* project ID */ } projid_t; Note that project names that have more than MAXPROJNAMELEN-1 characters will be truncated. The ...
The getprojuser function searches the project file for the user name and stores information about the projects for which name is authorized into an array of projid_t structs. The array is pointed to by buf and is assumed to have room for a maximum of len entries. The projid_t struct is defined in and has the following format: #define MAXPROJNAMELEN 32 typedef struct projid { char proj_name[MAXPROJNAMELEN]; /* project name */ prid_t proj_id; /* project ID */ } projid_t; Note that project...
getprotoent, getprotobyname, and getprotobynumber each return a pointer to an object with the following structure containing the broken-out fields of a line in the network protocol data base file, /etc/protocols, or the NIS protocols map. struct protoent { char *p_name; /* official name of protocol */ char **p_aliases; /* alias list */ int p_proto; /* protocol number */ }; The members of this structure are: p_name The official name of the protocol. p_aliases A zero terminated list of alternate n...
This function finds and allocates a pair of devices making a pseudo-TTY, described in pty(7M). If filedes is not null, then the file descriptor for the master or controlling side of the pty is stored through the pointer. If successful, a pointer to an internal, static area containing the name of the slave device node is returned. The file descriptor is opened with the value oflag, constructed as described in open(2). The access bits of the slave device node are set to mode. The owner of the slav...
getpw searches the password file for a user id number that equals uid, copies the line of the password file in which uid was found into the array pointed to by buf, and returns 0. getpw returns non-zero if uid cannot be found. This routine is included only for compatibility with prior systems and should not be used; see getpwent(3C) for routines to use instead.
getpwent, getpwuid , getpwnam and their reentrant counterparts each return a pointer to an object with the following structure containing the broken-out fields of a line in the /etc/passwd file or some other backend database. Each line in the file contains a ``passwd'' structure, declared in the header file: struct passwd { char *pw_name; char *pw_passwd; uid_t pw_uid; gid_t pw_gid; char *pw_age; char *pw_comment; char *pw_gecos; char *pw_dir; char *pw_shell; }; Page 1 GETPWENT(3C) GET...
Tcl_Interp *interp (in) Interpreter to use for error reporting. char *name (in) String containing relief name (one of ``flat'', ``groove'', ``raised'', ``ridge'', or ``sunken''). int *reliefPtr (out) Pointer to location in which to store relief value corresponding to name. int relief (in) Relief value (one of TK_RELIEF_FLAT, TK_RELIEF_RAISED, TK_RELIEF_SUNKEN, TK_RELIEF_GROOVE, or TK_RELIEF_RIDGE)....
Tk_Window tkwin (in) Token for window. int *xPtr (out) Pointer to location in which to store root-window x-coordinate corresponding to left edge of tkwin's border. int *yPtr (out) Pointer to location in which to store root-window y-coordinate corresponding to top edge of tkwin's border.
Getrpcent, getrpcbyname, getrpcbynumber and their reentrant counterparts each return a pointer to an object with the following structure containing the broken-out fields of a line in the Sun RPC program number data base, /etc/rpc, or some other back-end database. struct rpcent { char *r_name; /* name of server for this rpc program */ char **r_aliases; /* alias list */ long r_number; /* rpc program number */ }; The members of this structure are: r_name The name of the server for this rpc program....
Getrpcport returns the port number for version versnum of the RPC program prognum running on host and using protocol proto. It returns 0 if it cannot contact the portmapper, or if prognum is not registered. If prognum is registered but not with version versnum, it will still return a port number (for some version of the program) indicating that the program is indeed registered. The version mismatch will be detected upon the first call to the service....
Getrusage returns information describing the resources utilized by the current process, or all its terminated child processes. This routine is provided for compatibility with 4.3BSD. The who parameter is one of RUSAGE_SELF or RUSAGE_CHILDREN. The buffer to which rusage points will be filled in with the following structure: struct rusage { struct timeval ru_utime;/* user time used */ struct timeval ru_stime;/* system time used */ long ru_maxrss; long ru_ixrss; /* integral shared memory size */ lo...
This command reads the next line from the file given by fileId and discards the terminating newline character. If varName is specified then the line is placed in the variable by that name and the return value is a count of the number of characters read (not including the newline). If the end of the file is reached before reading any characters then -1 is returned and varName is set to an empty string. If varName is not specified then the return value will be the line (minus the newline character...
gets reads characters from the standard input stream, stdin, into the array pointed to by s, until a new-line character is read or an end-offile condition is encountered. The new-line character is discarded and the string is terminated with a null character. fgets reads characters from the stream into the array pointed to by s, until n-1 characters are read, or a new-line character is read and transferred to s, or an end-of-file condition is encountered. The string is then terminated with a null...
left returns the window coordinate of the left-most pixel drawn while scrbox has been tracking. right returns the window coordinate of the right-most pixel drawn while scrbox has been tracking. bottom returns the window coordinate of the lowest pixel drawn while scrbox has been tracking. top returns the window coordinate of the highest pixel drawn while scrbox has been tracking.
left expects a pointer to a location into which the system should copy the x coordinate (in pixels) of the left side of the current screen mask. right expects a pointer to a location into which the system should copy the x coordinate (in pixels) of the right side of the current screen mask. bottom expects a pointer to a location into which the system should copy the y coordinate (in pixels) of the bottom side of the current screen mask. top expects a pointer to a location into which the system s...
Tcl_Interp *interp (in) Interpreter to use for error reporting. int argc (in) Number of strings in argv array. char *argv[] (in) Argument strings. These represent the entire widget command, of which the first word is typically the widget name and the second word is typically xview or yview. This procedure parses arguments starting with argv[2]. double *dblPtr (out) Filled in with fraction from moveto option, if any. int *intPtr (out) Filled in with line or page count from scroll option, if any. ...
Tcl_Interp *interp (in) Interpreter to use for reporting errors. Tk_Window tkwin (in) Window on whose behalf to retrieve the selection (determines display from which to retrieve). Atom selection (in) The name of the selection to be | retrieved. Atom target (in) Form in which to retrieve selection. Tk_GetSelProc *proc (in) Procedure to invoke to process pieces of the selection as they are retrieved. ClientData clientData (in) Arbitrary one-word value to pass to proc....
getservent, getservbyname, getservbyport and their reentrant counterparts each return a pointer to an object with the following structure containing the broken-out fields of a line in the file /etc/services, or some other back-end database. struct servent { char *s_name; /* official name of service */ char **s_aliases; /* alias list */ int s_port; /* port service resides at */ char *s_proto; /* protocol to use */ }; The members of this structure are: s_name The official name of the service. s_al...
x expects a pointer to the location into which the system should copy the width (in pixels) of a graphics window. y expects a pointer to the location into which the system should copy the height (in pixels) of a graphics window.
none FUNCTION RETURN VALUE The returned value of this function indicates which shading model is now active. There are two possible return values: FLAT the system renders lines and filled polygons in a constant color. GOURAUD the system renders lines and filled polygons with Gouraud shading.
getsockname returns the current name for socket s. The namelen parameter should be initialized to indicate the amount of space pointed to by name. On return it contains the actual size of the name returned (in bytes).
getsockopt and setsockopt manipulate options associated with a socket. Options may exist at multiple protocol levels; they are always present at the uppermost socket level. When manipulating socket options, the level at which the option resides and the name of the option must be specified. To manipulate options at the socket level, level is specified as SOL_SOCKET. To manipulate options at any other level, lev...
The getspent, getspnam and their reentrant counterpart routines each return a pointer to an object with the following structure containing the broken-out fields of a line in the /etc/shadow file, or some other backend database. Each line in the file contains a ``shadow password'' structure, declared in the shadow.h header file: struct spwd{ char ...
getsubopt parses suboptions in a flag argument that was initially parsed by getopt(3C). These suboptions are separated by commas and may consist of either a single token or a token-value pair separated by an equal sign. Since commas delimit suboptions in the option string, they are not allowed to be part of the suboption or the value of a suboption. A command that uses this syntax is mount(1M), which allows the user to specify mount par...
The system's notion of the current time is obtained with the gettimeofday and BSDgettimeofday calls. The time is expressed in seconds and microseconds since midnight (00:00) Coordinated Universal Time (UTC), January 1, 1970. The resolution for (BSD)gettimeofday is never worse than 100 HZ (which equals 10 milliseconds). The actual resolution of (BSD)gettimeofday depends on the timer capability of the underlying hardware(see timers(5)). The difference between the calls gettimeofday(settimeofday) ...
gettxt retrieves a text string from a message file. The arguments to the function are a message identification msgid and a default string dflt_str to be used if the retrieval fails. The text strings are in files created by the mkmsgs utility [see mkmsgs(1)] and installed in directories in /usr/lib/locale/locale/LC_MESSAGES. The directory locale can be viewed as t...
NOTE: these routines are all obsolete and are provided for backward compatibility only. All access to or modification of these files must be done via the getutx(3C) set of interfaces. getutent, getutid, getutline, and pututline each return a pointer to a utmp structure: struct utmp { char ut_user[8...
getutxent, getutxid, and getutxline each return a pointer to a utmpx structure: struct utmpx { char ut_user[32]; /* user login name */ char ut_id[4]; /* /etc/inittab id (usu...
dev expects the identifier of the device (e.g., MOUSEX, BPADX, etc.) from which you want to read. FUNCTION RETURN VALUE The returned value of this function is the value stored at the device named by the dev parameter.
reg expects the name of the register to access. value expects the value which is to be placed into reg. FUNCTION RETURN VALUE The returned value of getvideo is the value read from register reg, or -1. -1 indicates that reg is not a valid register or that you queried a video register on a system without that particular board installed.
left expects a pointer to a location into which the system should copy the x coordinate (in pixels) of the left side of the current view port. right expects a pointer to a location into which the system should copy the x coordinate (in pixels) of the right side of the current view port. bottom expects a pointer to a location into which the system should copy the y coordinate (in pixels) of the bottom side of the current view port. top expects a pointer to a location into which the system should ...
Tcl_Interp *interp (in) Interpreter to use for error reporting. Tk_Window tkwin (in) Token for window in which the visual will be used. char *string (in) String that identifies the desired visual. See below for valid formats. int *depthPtr (out) Depth of returned visual gets stored here. Colormap *colormapPtr (out) If non-NULL then a suitable colormap for visual is found and its identifier is stored here....
Tk_Window tkwin (in) Token for window whose virtual root is to be queried. int xPtr (out) Points to word in which to store xoffset of virtual root. int yPtr (out) Points to word in which to store yoffset of virtual root. int widthPtr (out) Points to word in which to store width | of virtual root. int heightPtr (out) Points to word in which to store height| of virtual root.
getwc transforms the next EUC character from the named input stream into a wchar_t character, and returns it. It also increments the file pointer, if defined, by one EUC character in the stream. getwchar is defined as getwc(stdin). getwc and getwchar are macros. fgetwc behaves like getwc, but is a function....
getwidth reads the character class table generated by chrtbl(1M) or wchrtbl(1M) to get information on supplementary code sets, and puts it in the structure eucwidth_t. The structure eucwidth_t is defined in the header file euc.h as follows: typedef struct { short int _eucw1,_eu...
getws reads EUC characters from stdin, converts them to wchar_t characters, and places them in the wchar_t array pointed to by s. getws reads until a newline character is read or an end-of-file condition is encountered. The newline character is discarded and the wchar_t string is terminated with a wchar_t null character. fgetws reads EUC characters from the strea...
none FUNCTION RETURN VALUE The returned value of this function is either TRUE or FALSE. TRUE indicates that z-buffering is on. FALSE indicates that z-buffering is off. (FALSE is the default.) For systems without the zbuffer option, this function always returns FALSE.
op Specifies the accumulation buffer operation. Symbolic constants GL_ACCUM, GL_LOAD, GL_ADD, GL_MULT, and GL_RETURN are accepted. value Specifies a floating-point value used in the accumulation buffer operation. op determines how value is used.
func Specifies the alpha comparison function. Symbolic constants GL_NEVER, GL_LESS, GL_EQUAL, GL_LEQUAL, GL_GREATER, GL_NOTEQUAL, GL_GEQUAL, and GL_ALWAYS are accepted. The initial value is GL_ALWAYS. ref Specifies the reference value that incoming alpha values are compared to. This value is clamped to the range [0, 1], where 0 represents the lowest possible alpha value and 1 the highest possible value. The initial reference value is 0....
n Specifies the number of textures to be queried. textures Specifies an array containing the names of the textures to be queried. residences Specifies an array in which the texture residence status is returned. The residence status of a texture named by an element of textures is returned in the corresponding element of residences.
n The number of textures to be queried. textures An array containing the names of the textures to be queried. residences An array in which the texture residence status is returned. The residence status of a texture named by an element of textures is returned in the corresponding element of residences.
mode Specifies the primitive or primitives that will be created from vertices presented between glBegin and the subsequent glEnd. Ten symbolic constants are accepted: GL_POINTS, GL_LINES, GL_LINE_STRIP, GL_LINE_LOOP, GL_TRIANGLES, GL_TRIANGLE_STRIP, GL_TRIANGLE_FAN, GL_QUADS, GL_QUAD_STRIP, and GL_POLYGON.
target Specifies the target to which the texture is bound. Must be either GL_TEXTURE_1D, GL_TEXTURE_2D, or GL_TEXTURE_3D. texture Specifies the name of a texture.
target The target to which the texture will be bound. Must be one of GL_TEXTURE_1D, GL_TEXTURE_2D, GL_DETAIL_TEXTURE_2D_SGIS, or GL_TEXTURE_3D_EXT. texture The name of a texture.
width, height Specify the pixel width and height of the bitmap image. xorig, yorig Specify the location of the origin in the bitmap image. The origin is measured from the lower left corner of the bitmap, with right and up being the positive axes. xmove, ymove Specify the x and y offsets to be added to the current raster position after the bitmap is drawn. bitmap Specifies the address of the bitmap image....
mode specifies how source and destination colors are combined. It must be GL_FUNC_ADD, GL_FUNC_SUBTRACT, GL_FUNC_REVERSE_SUBTRACT, GL_MIN, GL_MAX, GL_ALPHA_MIN_SGIX, or GL_ALPHA_MAX_SGIX.
mode specifies how source and destination colors are combined. It must be GL_FUNC_ADD_EXT, GL_FUNC_SUBTRACT_EXT, GL_FUNC_REVERSE_SUBTRACT_EXT, GL_MIN_EXT, GL_MAX_EXT, GL_ALPHA_MIN_SGIX, GL_ALPHA_MAX_SGIX, or GL_LOGIC_OP.
sfactor Specifies how the red, green, blue, and alpha source blending factors are computed. The following symbolic constants are accepted: GL_ZERO, GL_ONE, GL_DST_COLOR, GL_ONE_MINUS_DST_COLOR, GL_SRC_ALPHA, GL_ONE_MINUS_SRC_ALPHA, GL_DST_ALPHA, GL_ONE_MINUS_DST_ALPHA, and GL_SRC_ALPHA_SATURATE. The initial value is GL_ONE. Additionally, if the GL_ARB_imaging extension is supported, the following constants are accepted: GL_CONSTANT_COLOR, GL_ONE_MINUS_CONSTANT_COLOR, GL_CONSTANT_ALPHA, GL_ONE_MI...
n Specifies the number of display lists to be executed. type Specifies the type of values in lists. Symbolic constants GL_BYTE, GL_UNSIGNED_BYTE, GL_SHORT, GL_UNSIGNED_SHORT, GL_INT, GL_UNSIGNED_INT, GL_FLOAT, GL_2_BYTES, GL_3_BYTES, and GL_4_BYTES are accepted. lists Specifies the address of an array of name offsets in the display list. The pointer type is void because the offsets can be bytes, shorts, ints, or floats, depending on the value of type....
When you call glcDeleteGLObjects, GLC issues a sequence of GL commands to delete all GL objects that GLC owns. GLC uses the command glDeleteLists to delete all the GL lists named in GLC_LIST_OBJECT_LIST and uses the commmand glDeleteTexturesEXT to delete all the GL texture objects named in GLC_TEXTURE_OBJECT_LIST. When an execution of glcDeleteGLObjects finishes, both lists are empty. Note that glcDeleteGLObjects deletes only the objects that the current context owns, not all objects in all cont...
glcGetAllContexts returns a zero-terminated array of GLC context IDs. The array contains one entry for each of the client's GLC contexts. GLC uses the C library command malloc to allocate the array. The client should therefore use the C library command free to deallocate the array when it is no longer needed.
inCode Specifies the character to measure. inMetric Specifies the metric to measure, either GLC_BASELINE or GLC_BOUNDS. outVec Specifies a vector in which to store value of inMetric for the specified character.
glcGetError retrieves the value of the issuing thread's GLC error code variable, assigns the value GLC_NONE to that variable, and returns the retrieved value. glcGetError returns the error codes GLC_NONE, GLC_PARAMETER_ERROR, GLC_RESOURCE_ERROR, or GLC_STATE_ERROR. Note that in contrast to the GL function glGetError, glcGetError only returns one error, not a list of errors. PPPPaaaaggggeeee 1111...
inFont Specifies a font. inAttrib Specifies the string list from which a string is requested. inIndex Specifies the offset from the first element of the list associated with inAttrib.
inMaster Specifies the master from which an attribute is needed. inAttrib Specifies the string list that contains the desired attribute. inIndex Specifies the offset from the first element of the list associated with inAttrib.
inMaster Specifies the integer ID of the master from which to select the character. inCode Specifies the integer ID of the character in the master map.
inMetric Specifies the metric to measure, either GLC_BASELINE or GLC_BOUNDS. outVec Specifies a vector in which to store the value of outVec for the specified character.
inIndex Specifies which element in the string to measure. inMetric Specifies the metric to measure, either GLC_BASELINE or GLC_BOUNDS. outVec Specifies a vector in which to store value of inMetric for the specified character.
The OpenGL Character Renderer (GLC) is a subroutine library that provides OpenGL programs with character rendering services. A GLC context is an instantiation of the GLC state machine. A GLC client is a program that uses both OpenGL (henceforth, "GL") and GLC. When a client thread issues a GLC command, the thread's current GLC context executes the command. To render a character, a GLC client issues the command glcRenderChar(GLint inCode); GLC then goes through these steps: 1. GLC finds a font...
mask Bitwise OR of masks that indicate the buffers to be cleared. The four masks are GL_COLOR_BUFFER_BIT, GL_DEPTH_BUFFER_BIT, GL_ACCUM_BUFFER_BIT, and GL_STENCIL_BUFFER_BIT.
plane Specifies which clipping plane is being positioned. Symbolic names of the form GL_CLIP_PLANEi, where i is an integer between 0 and GL_MAX_CLIP_PLANES-1, are accepted. equation Specifies the address of an array of four double-precision floating-point values. These values are interpreted as a plane equation.
inMeasureChars Specifies whether to compute metrics only for the string or for the characters as well. inCount Specifies the number of elements to measure, starting at the first element. inString Specifies the string to be measured.
inMeasureChars Specifies whether to compute metrics only for the string or for the characters as well. inString Specifies a zero-terminated array of characters.
red, green, blue Specify new red, green, and blue values for the current color. alpha Specifies a new alpha value for the current color. Included only in the four-argument glColor4 commands.
red, green, blue, alpha Specify whether red, green, blue, and alpha can or cannot be written into the frame buffer. The initial values are all GL_TRUE, indicating that the color components can be written.
face Specifies whether front, back, or both front and back material parameters should track the current color. Accepted values are GL_FRONT, GL_BACK, and GL_FRONT_AND_BACK. The initial value is GL_FRONT_AND_BACK. mode Specifies which of several material parameters track the current color. Accepted values are GL_EMISSION, GL_AMBIENT, GL_DIFFUSE, GL_SPECULAR, and GL_AMBIENT_AND_DIFFUSE. The initial value is GL_AMBIENT_AND_DIFFUSE....
size Specifies the number of components per color. Must be 3 or 4. The initial value is 4. type Specifies the data type of each color component in the array. Symbolic constants GL_BYTE, GL_UNSIGNED_BYTE, GL_SHORT, GL_UNSIGNED_SHORT, GL_INT, GL_UNSIGNED_INT, GL_FLOAT, and GL_DOUBLE are accepted. The initial value is GL_FLOAT. stride Specifies the byte offset between consecutive colors. If stride is 0 (the initial value), the colors are understood to be tightly packed in the array. The initial val...
size Specifies the number of components per color. It must be 3 or 4. type Specifies the data type of each color component in the array. Symbolic constants GL_BYTE, GL_UNSIGNED_BYTE, GL_SHORT, GL_UNSIGNED_SHORT, GL_INT, GL_UNSIGNED_INT, GL_FLOAT, or GL_DOUBLE_EXT, are accepted. stride Specifies the byte offset between consecutive colors. If stride is zero the colors are understood to be tightly packed in the array. count Specifies the number of colors, counting from the first, that are static. p...
target Must be one of GL_COLOR_TABLE, GL_POST_CONVOLUTION_COLOR_TABLE, or GL_POST_COLOR_MATRIX_COLOR_TABLE. start The starting index of the portion of the color table to be replaced. count The number of table entries to replace. format The format of the pixel data in data. The allowable values are GL_RED, GL_GREEN, GL_BLUE, GL_ALPHA, GL_LUMINANCE, GL_LUMINANCE_ALPHA, GL_RGB, GL_BGR, GL_RGBA, GL_BGRA, and GL_ABGR_EXT. type The type of the pixel data in data. The allowable values are GL_UNSIGNED_B...
target Must be one of GL_COLOR_TABLE, GL_POST_CONVOLUTION_COLOR_TABLE, GL_POST_COLOR_MATRIX_COLOR_TABLE, GL_PROXY_COLOR_TABLE, GL_PROXY_POST_CONVOLUTION_COLOR_TABLE, or GL_PROXY_POST_COLOR_MATRIX_COLOR_TABLE. internalformat The internal format of the color table. The allowable values are GL_ALPHA, GL_ALPHA4, GL_ALPHA8, GL_ALPHA12, GL_ALPHA16, GL_LUMINANCE, GL_LUMINANCE4, GL_LUMINANCE8, GL_LUMINANCE12, GL_LUMINANCE16, GL_LUMINANCE_ALPHA, GL_LUMINANCE4_ALPHA4, GL_LUMINANCE6_ALPHA2, GL_LUMINANCE8_A...
target The target color table. Must be GL_COLOR_TABLE, GL_POST_CONVOLUTION_COLOR_TABLE, or GL_POST_COLOR_MATRIX_COLOR_TABLE. pname The symbolic name of a texture color lookup table parameter. Must be one of GL_COLOR_TABLE_SCALE or GL_COLOR_TABLE_BIAS. params A pointer to an array where the values of the parameters are stored.
target The target color table. Must be GL_COLOR_TABLE_SGI, GL_POST_CONVOLUTION_COLOR_TABLE_SGI, GL_POST_COLOR_MATRIX_COLOR_TABLE_SGI, or GL_TEXTURE_COLOR_TABLE_SGI. pname The symbolic name of a texture color lookup table parameter. Must be one of GL_COLOR_TABLE_SCALE_SGI or GL_COLOR_TABLE_BIAS_SGI. params A pointer to an array where the values of the parameters are stored.
target Must be GL_TEXTURE_COLOR_TABLE_SGI, GL_COLOR_TABLE_SGI, GL_POST_CONVOLUTION_COLOR_TABLE_SGI, GL_POST_COLOR_MATRIX_COLOR_TABLE_SGI, GL_PROXY_TEXTURE_COLOR_TABLE_SGI, GL_PROXY_COLOR_TABLE_SGI, GL_PROXY_POST_CONVOLUTION_COLOR_TABLE_SGI, or GL_PROXY_POST_COLOR_MATRIX_COLOR_TABLE_SGI. internalformat The internal format of the color table. The allowable values are GL_ALPHA, GL_ALPHA4_EXT, GL_ALPHA8_EXT, GL_ALPHA12_EXT, GL_ALPHA16_EXT, GL_LUMINANCE, GL_LUMINANCE4_EXT, GL_LUMINANCE8_EXT, GL_LUMIN...
mode the name of the compatibility mode you want to change. The available modes are: GLC_OLDPOLYGON controls the state of old-style polygon mode. GLC_ZRANGEMAP controls the state of z-range mapping mode. GLC_SOFTATTACH controls whether this program will keep mouse focus when a shift or control key is pressed. GLC_MANAGEBG sets imakebackground windows to be override redirect. GLC_SLOWMAPCOLORS controls whether mapcolor calls are buffered. GLC_INPUTCHANGEBUG controls whether extra INPUTCHANGE even...
target Must be GL_CONVOLUTION_1D. internalformat The internal format of the convolution filter kernel. The allowable values are GL_ALPHA, GL_ALPHA4, GL_ALPHA8, GL_ALPHA12, GL_ALPHA16, GL_LUMINANCE, GL_LUMINANCE4, GL_LUMINANCE8, GL_LUMINANCE12, GL_LUMINANCE16, GL_LUMINANCE_ALPHA, GL_LUMINANCE4_ALPHA4, GL_LUMINANCE6_ALPHA2, GL_LUMINANCE8_ALPHA8, GL_LUMINANCE12_ALPHA4, GL_LUMINANCE12_ALPHA12, GL_LUMINANCE16_ALPHA16, GL_INTENSITY, GL_INTENSITY4, GL_INTENSITY8, GL_INTENSITY12, GL_INTENSITY16, GL_R3_G...
target Must be GL_CONVOLUTION_1D_EXT. internalformat The internal format of the convolution filter kernel. The allowable values are GL_ALPHA, GL_LUMINANCE, GL_LUMINANCE_ALPHA, GL_INTENSITY_EXT, GL_RGB, and GL_RGBA. width The width of the pixel array referenced by image. format The format of the pixel data in image. The allowable values are GL_RGBA, GL_ABGR_EXT, GL_RED, GL_GREEN, GL_BLUE, GL_ALPHA, GL_RGB, GL_LUMINANCE, GL_LUMINANCE_ALPHA and GL_YCRCB_422_SGIX are accepted. type The type of the p...
target Must be GL_CONVOLUTION_2D. internalformat The internal format of the convolution filter kernel. The allowable values are GL_ALPHA, GL_ALPHA4, GL_ALPHA8, GL_ALPHA12, GL_ALPHA16, GL_LUMINANCE, GL_LUMINANCE4, GL_LUMINANCE8, GL_LUMINANCE12, GL_LUMINANCE16, GL_LUMINANCE_ALPHA, GL_LUMINANCE4_ALPHA4, GL_LUMINANCE6_ALPHA2, GL_LUMINANCE8_ALPHA8, GL_LUMINANCE12_ALPHA4, GL_LUMINANCE12_ALPHA12, GL_LUMINANCE16_ALPHA16, GL_INTENSITY, GL_INTENSITY4, GL_INTENSITY8, GL_INTENSITY12, GL_INTENSITY16, GL_R3_G...
target Must be GL_CONVOLUTION_2D_EXT. internalformat The internal format of the convolution filter kernel. The allowable values are GL_ALPHA, GL_LUMINANCE, GL_LUMINANCE_ALPHA, GL_INTENSITY_EXT, GL_RGB, and GL_RGBA. width The width of the pixel array referenced by image. height The height of the pixel array referenced by image. format The format of the pixel data in image. The allowable values are GL_RGBA, GL_ABGR_EXT, GL_RED, GL_GREEN, GL_BLUE, GL_ALPHA, GL_RGB, GL_LUMINANCE, GL_LUMINANCE_ALPHA ...
target The target for the convolution parameter. Must be one of GL_CONVOLUTION_1D, GL_CONVOLUTION_2D, or GL_SEPARABLE_2D. pname The parameter to be set. Must be GL_CONVOLUTION_BORDER_MODE. params The parameter value. Must be one of GL_REDUCE, GL_CONSTANT_BORDER, GL_REPLICATE_BORDER.
target The target for the convolution parameter. Must be one of GL_CONVOLUTION_1D_EXT, GL_CONVOLUTION_2D_EXT, or GL_SEPARABLE_2D_EXT. pname The parameter to be set. Must be GL_CONVOLUTION_BORDER_MODE_EXT. params The parameter value. Must be GL_REDUCE_EXT.
target Must be one of GL_COLOR_TABLE, GL_POST_CONVOLUTION_COLOR_TABLE, or GL_POST_COLOR_MATRIX_COLOR_TABLE. start The starting index of the portion of the color table to be replaced. x, y The window coordinates of the left corner of the row of pixels to be copied. width The number of table entries to replace.
target The color table target. Must be GL_COLOR_TABLE, GL_POST_CONVOLUTION_COLOR_TABLE, or GL_POST_COLOR_MATRIX_COLOR_TABLE. internalformat The internal storage format of the texture image. Must be one of the following symbolic constants: GL_ALPHA, GL_ALPHA4, GL_ALPHA8, GL_ALPHA12, GL_ALPHA16, GL_LUMINANCE, GL_LUMINANCE4, GL_LUMINANCE8, GL_LUMINANCE12, GL_LUMINANCE16, GL_LUMINANCE_ALPHA, GL_LUMINANCE4_ALPHA4, GL_LUMINANCE6_ALPHA2, GL_LUMINANCE8_ALPHA8, GL_LUMINANCE12_ALPHA4, GL_LUMINANCE12_ALPHA...
target The color table target. Must be GL_TEXTURE_COLOR_TABLE_SGI, GL_COLOR_TABLE_SGI, GL_POST_CONVOLUTION_COLOR_TABLE_SGI, or GL_POST_COLOR_MATRIX_COLOR_TABLE_SGI. internalformat The internal storage format of the texture image. Must be one of the following symbolic constants: GL_ALPHA, GL_ALPHA4_EXT, GL_ALPHA8_EXT, GL_ALPHA12_EXT, GL_ALPHA16_EXT, GL_LUMINANCE, GL_LUMINANCE4_EXT, GL_LUMINANCE8_EXT, GL_LUMINANCE12_EXT, GL_LUMINANCE16_EXT, GL_LUMINANCE_ALPHA, GL_LUMINANCE4_ALPHA4_EXT, GL_LUMINANC...
target Must be GL_CONVOLUTION_1D. internalformat The internal format of the convolution filter kernel. The allowable values are GL_ALPHA, GL_ALPHA4, GL_ALPHA8, GL_ALPHA12, GL_ALPHA16, GL_LUMINANCE, GL_LUMINANCE4, GL_LUMINANCE8, GL_LUMINANCE12, GL_LUMINANCE16, GL_LUMINANCE_ALPHA, GL_LUMINANCE4_ALPHA4, GL_LUMINANCE6_ALPHA2, GL_LUMINANCE8_ALPHA8, GL_LUMINANCE12_ALPHA4, GL_LUMINANCE12_ALPHA12, GL_LUMINANCE16_ALPHA16, GL_INTENSITY, GL_INTENSITY4, GL_INTENSITY8, GL_INTENSITY12, GL_INTENSITY16, GL_R3_G...
target Must be GL_CONVOLUTION_1D_EXT. internalformat The internal format of the convolution filter kernel. The allowable values are GL_ALPHA, GL_LUMINANCE, GL_LUMINANCE_ALPHA, GL_INTENSITY_EXT, GL_RGB, and GL_RGBA. x The x coordinate of the lower-left coordinate of the pixel array to copy. y The y coordinate of the lower-left coordinate of the pixel array to copy. width The width of the pixel array to copy....
target Must be GL_CONVOLUTION_2D. internalformat The internal format of the convolution filter kernel. The allowable values are GL_ALPHA, GL_ALPHA4, GL_ALPHA8, GL_ALPHA12, GL_ALPHA16, GL_LUMINANCE, GL_LUMINANCE4, GL_LUMINANCE8, GL_LUMINANCE12, GL_LUMINANCE16, GL_LUMINANCE_ALPHA, GL_LUMINANCE4_ALPHA4, GL_LUMINANCE6_ALPHA2, GL_LUMINANCE8_ALPHA8, GL_LUMINANCE12_ALPHA4, GL_LUMINANCE12_ALPHA12, GL_LUMINANCE16_ALPHA16, GL_INTENSITY, GL_INTENSITY4, GL_INTENSITY8, GL_INTENSITY12, GL_INTENSITY16, GL_R3_G...
target Must be GL_CONVOLUTION_2D_EXT. internalformat The internal format of the convolution filter kernel. The allowable values are GL_ALPHA, GL_LUMINANCE, GL_LUMINANCE_ALPHA, GL_INTENSITY_EXT, GL_RGB, and GL_RGBA. x The x coordinate of the lower-left coordinate of the pixel array to copy. y The y coordinate of the lower-left coordinate of the pixel array to copy. width The width of the pixel array to copy. height The height of the pixel array to copy....
x, y Specify the window coordinates of the lower left corner of the rectangular region of pixels to be copied. width, height Specify the dimensions of the rectangular region of pixels to be copied. Both must be nonnegative. type Specifies whether color values, depth values, or stencil values are to be copied. Symbolic constants GL_COLOR, GL_DEPTH, and GL_STENCIL are accepted.
target Specifies the target texture. Must be GL_TEXTURE_1D. level Specifies the level-of-detail number. Level 0 is the base image level. Level n is the nth mipmap reduction image. internalformat Specifies the internal format of the texture. Must be one of the following symbolic constants: GL_ALPHA, GL_ALPHA4, GL_ALPHA8, GL_ALPHA12, GL_ALPHA16, GL_LUMINANCE, GL_LUMINANCE4, GL_LUMINANCE8, GL_LUMINANCE12, GL_LUMINANCE16, GL_LUMINANCE_ALPHA, GL_LUMINANCE4_ALPHA4, GL_LUMINANCE6_ALPHA2, GL_LUMINANCE8_...
target The target texture. Must be GL_TEXTURE_1D level The level-of-detail number. Level 0 is the base image level. Level n is the nth mipmap reduction image. internalformat The internal storage format of the texture image. Must be one of the following symbolic constants: GL_ALPHA, GL_ALPHA4_EXT, GL_ALPHA8_EXT, GL_ALPHA12_EXT, GL_ALPHA16_EXT, GL_LUMINANCE, GL_LUMINANCE4_EXT, GL_LUMINANCE8_EXT, GL_LUMINANCE12_EXT, GL_LUMINANCE16_EXT, GL_LUMINANCE_ALPHA, GL_LUMINANCE4_ALPHA4_EXT, GL_LUMINANCE6_ALP...
target Specifies the target texture. Must be GL_TEXTURE_2D. level Specifies the level-of-detail number. Level 0 is the base image level. Level n is the nth mipmap reduction image. internalformat Specifies the internal format of the texture. Must be one of the following symbolic constants: GL_ALPHA, GL_ALPHA4, GL_ALPHA8, GL_ALPHA12, GL_ALPHA16, GL_LUMINANCE, GL_LUMINANCE4, GL_LUMINANCE8, GL_LUMINANCE12, GL_LUMINANCE16, GL_LUMINANCE_ALPHA, GL_LUMINANCE4_ALPHA4, GL_LUMINANCE6_ALPHA2, GL_LUMINANCE8_...
target The target texture. Must be GL_TEXTURE_2D or GL_DETAIL_TEXTURE_2D_SGIS. level The level-of-detail number. Level 0 is the base image level. Level n is the nth mipmap reduction image. internalformat The internal storage format of the texture image. Must be one of the following symbolic constants: GL_ALPHA, GL_ALPHA4_EXT, GL_ALPHA8_EXT, GL_ALPHA12_EXT, GL_ALPHA16_EXT, GL_LUMINANCE, GL_LUMINANCE4_EXT, GL_LUMINANCE8_EXT, GL_LUMINANCE12_EXT, GL_LUMINANCE16_EXT, GL_LUMINANCE_ALPHA, GL_LUMINANCE4...
target Specifies the target texture. Must be GL_TEXTURE_1D. level Specifies the level-of-detail number. Level 0 is the base image level. Level n is the nth mipmap reduction image. xoffset Specifies the texel offset within the texture array. x, y Specify the window coordinates of the left corner of the row of pixels to be copied. width Specifies the width of the texture subimage.
target The target texture. Must be GL_TEXTURE_1D level The level-of-detail number. Level 0 is the base image level. Level n is the nth mipmap reduction image. xoffset A texel offset in the x direction within the texture array. x The x coordinate of the lower-left corner of the pixel rectangle to be transferred to the texture array. y The y coordinate of the lower-left corner of the pixel rectangle to be transferred to the texture array. width The width of the pixel rectangle to be transferred to...
target Specifies the target texture. Must be GL_TEXTURE_2D. level Specifies the level-of-detail number. Level 0 is the base image level. Level n is the nth mipmap reduction image. xoffset Specifies a texel offset in the x direction within the texture array. yoffset Specifies a texel offset in the y direction within the texture array. x, y Specify the window coordinates of the lower left corner of the rectangular region of pixels to be copied. width Specifies the width of the texture subimage. he...
target The target texture. Must be GL_TEXTURE_2D or GL_DETAIL_TEXTURE_2D_SGIS. level The level-of-detail number. Level 0 is the base image level. Level n is the nth mipmap reduction image. xoffset A texel offset in the x direction within the texture array. yoffset A texel offset in the y direction within the texture array. x The x coordinate of the lower-left corner of the pixel rectangle to be transferred to the texture array. y The y coordinate of the lower-left corner of the pixel rectangle t...
target Specifies the target texture. Must be GL_TEXTURE_3D level Specifies the level-of-detail number. Level 0 is the base image level. Level n is the nth mipmap reduction image. xoffset Specifies a texel offset in the x direction within the texture array. yoffset Specifies a texel offset in the y direction within the texture array. zoffset Specifies a texel offset in the z direction within the texture array. x, y Specify the window coordinates of the lower left corner of the rectangular region ...
target The target texture. Must be GL_TEXTURE_3D_EXT level The level-of-detail number. Level 0 is the base image level. Level n is the nth mipmap reduction image. xoffset A texel offset in the x direction within the texture array. yoffset A texel offset in the y direction within the texture array. zoffset A texel offset in the z direction within the texture array. x The x coordinate of the lower-left corner of the pixel rectangle to be transferred to the texture array. y The y coordinate of the ...
inCount Specifies the number of elements in the string to be rendered. inString Specifies the array of characters from which to render inCount elements.
mode Specifies whether front- or back-facing facets are candidates for culling. Symbolic constants GL_FRONT, GL_BACK, and GL_FRONT_AND_BACK are accepted. The initial value is GL_BACK.
func Specifies the depth comparison function. Symbolic constants GL_NEVER, GL_LESS, GL_EQUAL, GL_LEQUAL, GL_GREATER, GL_NOTEQUAL, GL_GEQUAL, and GL_ALWAYS are accepted. The initial value is GL_LESS.
flag Specifies whether the depth buffer is enabled for writing. If flag is GL_FALSE, depth buffer writing is disabled. Otherwise, it is enabled. Initially, depth buffer writing is enabled.
near Specifies the mapping of the near clipping plane to window coordinates. The initial value is 0. far Specifies the mapping of the far clipping plane to window coordinates. The initial value is 1.
target The target to which the scaling function will be applied. Must be GL_TEXTURE_2D. n The number of scaling function samples in points. points An array of scaling function samples, each of which is an (LOD, function-value) pair.
mode Specifies what kind of primitives to render. Symbolic constants GL_POINTS, GL_LINE_STRIP, GL_LINE_LOOP, GL_LINES, GL_TRIANGLE_STRIP, GL_TRIANGLE_FAN, GL_TRIANGLES, GL_QUAD_STRIP, GL_QUADS, and GL_POLYGON are accepted. first Specifies the starting index in the enabled arrays. count Specifies the number of indices to be rendered.
mode Specifies what kind of primitives to render. Symbolic constants GL_POINTS, GL_LINE_STRIP, GL_LINE_LOOP, GL_LINES, GL_TRIANGLE_STRIP, GL_TRIANGLE_FAN, GL_TRIANGLES, GL_QUAD_STRIP, GL_QUADS, and GL_POLYGON are accepted. first Specifies the starting index in the enabled arrays. count Specifies the number of indices which should be rendered.
mode Specifies up to four color buffers to be drawn into. Symbolic constants GL_NONE, GL_FRONT_LEFT, GL_FRONT_RIGHT, GL_BACK_LEFT, GL_BACK_RIGHT, GL_FRONT, GL_BACK, GL_LEFT, GL_RIGHT, GL_FRONT_AND_BACK, and GL_AUXi, where i is between 0 and ``GL_AUX_BUFFERS'' -1, are accepted (GL_AUX_BUFFERS is not the upper limit; use glGet to query the number of available aux buffers.) The initial value is GL_FRONT for single-buffered contexts, and GL_BACK for double-buffered contexts....
mode Specifies what kind of primitives to render. Symbolic constants GL_POINTS, GL_LINE_STRIP, GL_LINE_LOOP, GL_LINES, GL_TRIANGLE_STRIP, GL_TRIANGLE_FAN, GL_TRIANGLES, GL_QUAD_STRIP, GL_QUADS, and GL_POLYGON are accepted. count Specifies the number of elements to be rendered. type Specifies the type of the values in indices. Must be one of GL_UNSIGNED_BYTE, GL_UNSIGNED_SHORT, or GL_UNSIGNED_INT. indices Specifies a pointer to the location where the indices are stored....
width, height Specify the dimensions of the pixel rectangle to be written into the frame buffer. format Specifies the format of the pixel data. Symbolic constants GL_COLOR_INDEX, GL_STENCIL_INDEX, GL_DEPTH_COMPONENT, GL_RGB, GL_BGR, GL_RGBA, GL_BGRA, GL_ABGR_EXT, GL_RED, GL_GREEN, GL_BLUE, GL_ALPHA, GL_LUMINANCE, and GL_LUMINANCE_ALPHA are accepted. type Specifies the data type for pixels. Symbolic constants GL_UNSIGNED_BYTE, GL_BYTE, GL_BITMAP, GL_UNSIGNED_SHORT, GL_SHORT, GL_UNSIGNED_INT, GL_I...
mode Specifies what kind of primitives to render. Symbolic constants GL_POINTS, GL_LINE_STRIP, GL_LINE_LOOP, GL_LINES, GL_TRIANGLE_STRIP, GL_TRIANGLE_FAN, GL_TRIANGLES, GL_QUAD_STRIP, GL_QUADS, and GL_POLYGON are accepted. start Specifies the minimum array index contained in indices. end Specifies the maximum array index contained in indices. count Specifies the number of elements to be rendered. type Specifies the type of the values in count. Must be one of GL_UNSIGNED_BYTE, GL_UNSIGNED_SHORT, ...
stride Specifies the byte offset between consecutive edge flags. If stride is 0 (the initial value), the edge flags are understood to be tightly packed in the array. The initial value is 0. pointer Specifies a pointer to the first edge flag in the array. The initial value is zero.
stride Specifies the byte offset between consecutive edge flags. If stride is zero the edge flags are understood to be tightly packed in the array. count Specifies the number of edge flags, counting from the first, that are static. pointer Specifies a pointer to the first edge flag in the array.
array Specifies the capability to enable. Symbolic constants GL_COLOR_ARRAY, GL_EDGE_FLAG_ARRAY, GL_INDEX_ARRAY, GL_NORMAL_ARRAY, GL_TEXTURE_COORD_ARRAY, and GL_VERTEX_ARRAY are accepted.
u Specifies a value that is the domain coordinate u to the basis function defined in a previous glMap1 or glMap2 command. v Specifies a value that is the domain coordinate v to the basis function defined in a previous glMap2 command. This argument is not present in a glEvalCoord1 command.
mode In glEvalMesh1, specifies whether to compute a one-dimensional mesh of points or lines. Symbolic constants GL_POINT and GL_LINE are accepted. i1, i2 Specify the first and last integer values for grid domain variable i.
size Specifies the maximum number of values that can be written into buffer. type Specifies a symbolic constant that describes the information that will be returned for each vertex. GL_2D, GL_3D, GL_3D_COLOR, GL_3D_COLOR_TEXTURE, and GL_4D_COLOR_TEXTURE are accepted. buffer Returns the feedback data.
glFinish does not return until the effects of all previously called GL commands are complete. Such effects include all changes to GL state, all changes to connection state, and all changes to the frame buffer contents. Such effects also include asynchronous GL commands, if the SGIX_async extension is implemented.
Different GL implementations buffer commands in several different locations, including network buffers and the graphics accelerator itself. glFlush empties all of these buffers, causing all issued commands to be executed as quickly as they are accepted by the actual rendering engine. Though this execution may not be completed in any particular time period, it does complete in finite time. Because any GL program might be executed over a network, or on an accelerator that buffers commands, all pro...
Different GL implementations buffer commands in several different locations, including network buffers and the graphics accelerator itself. glFlushRasterSGIX causes all GL commands that preceed glFlushRasterSGIX to complete rasterization before the GL commands that follow begin rasterization. This is essential for some types of performance measurement; see glInstrumentsBufferSGIX. The point in the GL machine that defines the start of rasterization is implementation dependent....
pname Specifies a single-valued fog parameter. GL_FOG_MODE, GL_FOG_DENSITY, GL_FOG_START, GL_FOG_END, and GL_FOG_INDEX are accepted. param Specifies the value that pname will be set to.
n Specifies the number of control points in the custom fog blending function. The initial value is 1. points Specifies an array of control points. Each control point consists of two floating-point values. The first is an eye-space distance, and the second is a fog blending factor in the range [0.0,1.0]. Blending factor 0.0 indicates full fog, and 1.0 indicates no fog. The initial value is (0.0,1.0) (no fog)....
face Specifies whether front, back, or both front and back fragment material parameters should track the current fragment color. Accepted values are GL_FRONT, GL_BACK, and GL_FRONT_AND_BACK. The initial value is GL_FRONT_AND_BACK. mode Specifies which of several fragment material parameters track the current fragment color. Accepted values are GL_EMISSION, GL_AMBIENT, GL_DIFFUSE, GL_SPECULAR, and GL_AMBIENT_AND_DIFFUSE. The initial value is GL_AMBIENT_AND_DIFFUSE....
light Specifies a fragment light. The number of fragment lights depends on the implementation. They are identified by names of the form GL_FRAGMENT_LIGHTi_SGIX where 0 < i < GL_MAX_FRAGMENT_LIGHTS_SGIX. pname Specifies a single-valued fragment light source parameter for light. GL_SPOT_EXPONENT, GL_SPOT_CUTOFF, GL_CONSTANT_ATTENUATION, GL_LINEAR_ATTENUATION, and GL_QUADRATIC_ATTENUATION are accepted. param Specifies the value that parameter pname of fragment light source light will be set to....
pname Specifies a single-valued lighting model parameter. GL_FRAGMENT_LIGHT_MODEL_LOCAL_VIEWER_SGIX, GL_FRAGMENT_LIGHT_MODEL_NORMAL_INTERPOLATION_SGIX, and GL_FRAGMENT_LIGHT_MODEL_TWO_SIDE_SGIX are accepted. param Specifies the value that param will be set to.
face Specifies which face or faces are being updated. Must be one of GL_FRONT, GL_BACK, or GL_FRONT_AND_BACK. pname Specifies the single-valued fragment material parameter of the face or faces that is being updated. Must be GL_SHININESS. param Specifies the value that parameter GL_SHININESS will be set to.
left, right Specify the coordinates for the left and right vertical clipping planes. bottom, top Specify the coordinates for the bottom and top horizontal clipping planes. near, far Specify the distances to the near and far depth clipping planes. Both distances must be positive.
plane Specifies a clipping plane. The number of clipping planes depends on the implementation, but at least six clipping planes are supported. They are identified by symbolic names of the form GL_CLIP_PLANEi where 0 < i < GL_MAX_CLIP_PLANES. equation Returns four double-precision values that are the coefficients of the plane equation of plane in eye coordinates. The initial value is (0, 0, 0, 0).
target Must be GL_COLOR_TABLE, GL_POST_CONVOLUTION_COLOR_TABLE, or GL_POST_COLOR_MATRIX_COLOR_TABLE. format The format of the pixel data in table. The possible values are GL_RED, GL_GREEN, GL_BLUE, GL_ALPHA, GL_LUMINANCE, GL_LUMINANCE_ALPHA, GL_RGB, GL_BGR, GL_RGBA, GL_BGRA, and GL_ABGR_EXT. type The type of the pixel data in table. Symbolic constants GL_UNSIGNED_BYTE, GL_BYTE, GL_BITMAP, GL_UNSIGNED_SHORT, GL_SHORT, GL_UNSIGNED_INT, GL_INT, GL_FLOAT, GL_UNSIGNED_BYTE_3_3_2, GL_UNSIGNED_BYTE_2_3...
target The target color table. Must be GL_COLOR_TABLE, GL_POST_CONVOLUTION_COLOR_TABLE, GL_POST_COLOR_MATRIX_COLOR_TABLE, GL_PROXY_COLOR_TABLE, GL_PROXY_POST_CONVOLUTION_COLOR_TABLE, GL_PROXY_POST_COLOR_MATRIX_COLOR_TABLE. pname The symbolic name of a color lookup table parameter. Must be one of GL_COLOR_TABLE_BIAS, GL_COLOR_TABLE_SCALE, GL_COLOR_TABLE_FORMAT, GL_COLOR_TABLE_WIDTH, GL_COLOR_TABLE_RED_SIZE, GL_COLOR_TABLE_GREEN_SIZE, GL_COLOR_TABLE_BLUE_SIZE, GL_COLOR_TABLE_ALPHA_SIZE, GL_COLOR_T...
target The target color table. Must be GL_TEXTURE_COLOR_TABLE_SGI, GL_COLOR_TABLE_SGI, GL_POST_CONVOLUTION_COLOR_TABLE_SGI, GL_POST_COLOR_MATRIX_COLOR_TABLE_SGI, GL_PROXY_TEXTURE_COLOR_TABLE_SGI, GL_PROXY_COLOR_TABLE_SGI, GL_PROXY_POST_CONVOLUTION_COLOR_TABLE_SGI, GL_PROXY_POST_COLOR_MATRIX_COLOR_TABLE_SGI. pname The symbolic name of a color lookup table parameter. Must be one of GL_COLOR_TABLE_BIAS_SGI, GL_COLOR_TABLE_SCALE_SGI, GL_COLOR_TABLE_FORMAT_SGI, GL_COLOR_TABLE_WIDTH_SGI, GL_COLOR_TABL...
target Must be GL_TEXTURE_COLOR_TABLE_SGI, GL_COLOR_TABLE_SGI, GL_POST_CONVOLUTION_COLOR_TABLE_SGI, or GL_POST_COLOR_MATRIX_COLOR_TABLE_SGI. format The format of the pixel data in table. The possible values are GL_RED, GL_GREEN, GL_BLUE, GL_ALPHA, GL_LUMINANCE, GL_LUMINANCE_ALPHA, GL_RGB, GL_RGBA, and GL_ABGR_EXT. type The type of the pixel data in table. The allowable values are GL_UNSIGNED_BYTE, GL_BYTE, GL_UNSIGNED_SHORT, GL_SHORT, GL_UNSIGNED_INT, GL_INT, GL_FLOAT, GL_UNSIGNED_BYTE_3_3_2_EXT...
target The filter to be retrieved. Must be one of GL_CONVOLUTION_1D or GL_CONVOLUTION_2D. format Format of the output image. Must be one of GL_RED, GL_GREEN, GL_BLUE, GL_ALPHA, GL_RGB, GL_BGR, GL_RGBA, GL_BGRA, GL_ABGR_EXT, GL_LUMINANCE, or GL_LUMINANCE_ALPHA. type Data type of components in the output image. Symbolic constants GL_UNSIGNED_BYTE, GL_BYTE, GL_BITMAP, GL_UNSIGNED_SHORT, GL_SHORT, GL_UNSIGNED_INT, GL_INT, GL_FLOAT, GL_UNSIGNED_BYTE_3_3_2, GL_UNSIGNED_BYTE_2_3_3_REV, GL_UNSIGNED_SHOR...
target The filter to be retrieved. Must be one of GL_CONVOLUTION_1D_EXT or GL_CONVOLUTION_2D_EXT. format Format of the output image. Must be one of GL_RED, GL_GREEN, GL_BLUE, GL_ALPHA, GL_RGB, GL_RGBA, GL_ABGR_EXT, GL_LUMINANCE, or GL_LUMINANCE_ALPHA. type Data type of components in the output image. Must be one of GL_UNSIGNED_BYTE, GL_BYTE, GL_UNSIGNED_SHORT, GL_SHORT, GL_UNSIGNED_INT, GL_INT, GL_FLOAT, GL_UNSIGNED_BYTE_3_3_2_EXT, GL_UNSIGNED_SHORT_4_4_4_4_EXT, GL_UNSIGNED_SHORT_5_5_5_1_EXT, GL...
target The filter whose parameters are to be retrieved. Must be one of GL_CONVOLUTION_1D, GL_CONVOLUTION_2D, or GL_SEPARABLE_2D. pname The parameter to be retrieved. Must be one of GL_CONVOLUTION_BORDER_MODE, GL_CONVOLUTION_BORDER_COLOR, GL_CONVOLUTION_FILTER_SCALE, GL_CONVOLUTION_FILTER_BIAS, GL_CONVOLUTION_FORMAT, GL_CONVOLUTION_WIDTH, GL_CONVOLUTION_HEIGHT, GL_MAX_CONVOLUTION_WIDTH, or GL_MAX_CONVOLUTION_HEIGHT. params Pointer to storage for the parameters to be retrieved....
target The filter whose parameters are to be retrieved. Must be one of GL_CONVOLUTION_1D_EXT, GL_CONVOLUTION_2D_EXT, or GL_SEPARABLE_2D_EXT. pname The parameter to be retrieved. Must be one of GL_CONVOLUTION_BORDER_MODE_EXT, GL_CONVOLUTION_FILTER_SCALE_EXT, GL_CONVOLUTION_FILTER_BIAS_EXT, GL_CONVOLUTION_FORMAT_EXT, GL_CONVOLUTION_WIDTH_EXT, GL_CONVOLUTION_HEIGHT_EXT, GL_MAX_CONVOLUTION_WIDTH_EXT, or GL_MAX_CONVOLUTION_HEIGHT_EXT. params Pointer to storage for the parameters to be retrieved....
target The texture whose detail texture scaling function is to be retrieved. Must be GL_TEXTURE_2D. points A pointer to a floating-point array which receives the retrieved detail texture function. Each pair of elements in the array receives an LOD (level-of-detail) value and a scaling function value.
glGetError returns the value of the error flag. Each detectable error is assigned a numeric code and symbolic name. When an error occurs, the error flag is set to the appropriate error code value. No other errors are recorded until glGetError is called, the error code is returned, and the flag is reset to GL_NO_ERROR. If a call to glGetError returns GL_NO_ERROR, there has been no detectable error since the last call to glGetError, or since the GL was initialized. To allow for distributed impleme...
light Specifies a fragment light source. The number of possible fragment lights depends on the implementation. They are identified by symbolic names of the form GL_FRAGMENT_LIGHTi_SGIX where 0 < i < GL_MAX_FRAGMENT_LIGHTS_SGIX. pname Specifies a fragment light source parameter for light. Accepted symbolic names are GL_AMBIENT, GL_DIFFUSE, GL_SPECULAR, GL_POSITION, GL_SPOT_DIRECTION, GL_SPOT_EXPONENT, GL_SPOT_CUTOFF, GL_CONSTANT_ATTENUATION, GL_LINEAR_ATTENUATION, and GL_QUADRATIC_ATTENUATION. pa...
face Specifies which of the two fragment materials is being queried. GL_FRONT or GL_BACK are accepted, representing the front and back fragment materials, respectively. pname Specifies the fragment material parameter to return. GL_AMBIENT, GL_DIFFUSE, GL_SPECULAR, GL_EMISSION, GL_SHININESS, and GL_COLOR_INDEXES are accepted. params Returns the requested data.
target Must be GL_HISTOGRAM. reset If GL_TRUE, each component counter that is actually returned is reset to zero. (Other counters are unaffected.) If GL_FALSE, none of the counters in the histogram table is modified. format The format of values to be returned in values. Must be one of GL_RED, GL_GREEN, GL_BLUE, GL_ALPHA, GL_RGB, GL_BGR, GL_RGBA, GL_BGRA, GL_ABGR_EXT, GL_LUMINANCE, or GL_LUMINANCE_ALPHA. type The type of values to be returned in values. Symbolic constants GL_UNSIGNED_BYTE, GL_BYT...
target Must be GL_HISTOGRAM_EXT. reset If GL_TRUE, each component counter that is actually returned is reset to zero. (Other counters are unaffected.) If GL_FALSE, none of the counters in the histogram table is modified. format The format of values to be returned in values. Must be one of GL_RED, GL_GREEN, GL_BLUE, GL_ALPHA, GL_RGB, GL_RGBA, GL_ABGR_EXT, GL_LUMINANCE, or GL_LUMINANCE_ALPHA. type The type of values to be returned in values. Must be one of GL_UNSIGNED_BYTE, GL_BYTE, GL_UNSIGNED_SH...
target Must be one of GL_HISTOGRAM or GL_PROXY_HISTOGRAM. pname The name of the parameter to be retrieved. Must be one of GL_HISTOGRAM_WIDTH, GL_HISTOGRAM_FORMAT, GL_HISTOGRAM_RED_SIZE, GL_HISTOGRAM_GREEN_SIZE, GL_HISTOGRAM_BLUE_SIZE, GL_HISTOGRAM_ALPHA_SIZE, GL_HISTOGRAM_LUMINANCE_SIZE, or GL_HISTOGRAM_SINK. params Pointer to storage for the returned values.
target Must be one of GL_HISTOGRAM_EXT or GL_PROXY_HISTOGRAM_EXT. pname The name of the parameter to be retrieved. Must be one of GL_HISTOGRAM_WIDTH_EXT, GL_HISTOGRAM_FORMAT_EXT, GL_HISTOGRAM_RED_SIZE_EXT, GL_HISTOGRAM_GREEN_SIZE_EXT, GL_HISTOGRAM_BLUE_SIZE_EXT, GL_HISTOGRAM_ALPHA_SIZE_EXT, GL_HISTOGRAM_LUMINANCE_SIZE_EXT, or GL_HISTOGRAM_SINK_EXT. params Pointer to storage for the returned values....
light Specifies a light source. The number of possible lights depends on the implementation, but at least eight lights are supported. They are identified by symbolic names of the form GL_LIGHTi where 0 < i < GL_MAX_LIGHTS. pname Specifies a light source parameter for light. Accepted symbolic names are GL_AMBIENT, GL_DIFFUSE, GL_SPECULAR, GL_POSITION, GL_SPOT_DIRECTION, GL_SPOT_EXPONENT, GL_SPOT_CUTOFF, GL_CONSTANT_ATTENUATION, GL_LINEAR_ATTENUATION, and GL_QUADRATIC_ATTENUATION. params Returns t...
list Specifies the integer name of the display list whose parameters are to be retrieved. pname Specifies the symbolic name for display list parameter. Must be GL_LIST_PRIORITY_SGIX. params Specifies a pointer to an array in which parameter values will be stored. If pname is GL_LIST_PRIORITY_SGIX, then the array must have at least one element.
target Specifies the symbolic name of a map. Accepted values are GL_MAP1_COLOR_4, GL_MAP1_INDEX, GL_MAP1_NORMAL, GL_MAP1_TEXTURE_COORD_1, GL_MAP1_TEXTURE_COORD_2, GL_MAP1_TEXTURE_COORD_3, GL_MAP1_TEXTURE_COORD_4, GL_MAP1_VERTEX_3, GL_MAP1_VERTEX_4, GL_MAP2_COLOR_4, GL_MAP2_INDEX, GL_MAP2_NORMAL, GL_MAP2_TEXTURE_COORD_1, GL_MAP2_TEXTURE_COORD_2, GL_MAP2_TEXTURE_COORD_3, GL_MAP2_TEXTURE_COORD_4, GL_MAP2_VERTEX_3, and GL_MAP2_VERTEX_4. query Specifies which parameter to return. Symbolic names GL_CO...
face Specifies which of the two materials is being queried. GL_FRONT or GL_BACK are accepted, representing the front and back materials, respectively. pname Specifies the material parameter to return. GL_AMBIENT, GL_DIFFUSE, GL_SPECULAR, GL_EMISSION, GL_SHININESS, and GL_COLOR_INDEXES are accepted. params Returns the requested data.
target Must be GL_MINMAX. reset If GL_TRUE, all entries in the minmax table that are actually returned are reset to their initial values. (Other entries are unaltered.) If GL_FALSE, the minmax table is unaltered. format The format of the data to be returned in values. Must be one of GL_RED, GL_GREEN, GL_BLUE, GL_ALPHA, GL_RGB, GL_BGR, GL_RGBA, GL_BGRA, GL_ABGR_EXT, GL_LUMINANCE, or GL_LUMINANCE_ALPHA. type The type of the data to be returned in values. Symbolic constants GL_UNSIGNED_BYTE, GL_BYT...
target Must be GL_MINMAX_EXT. reset If GL_TRUE, all entries in the minmax table that are actually returned are reset to their initial values. (Other entries are unaltered.) If GL_FALSE, the minmax table is unaltered. format The format of the data to be returned in values. Must be one of GL_RED, GL_GREEN, GL_BLUE, GL_ALPHA, GL_RGB, GL_RGBA, GL_ABGR_EXT, GL_LUMINANCE, or GL_LUMINANCE_ALPHA. type The type of the data to be returned in values. Must be one of GL_UNSIGNED_BYTE, GL_BYTE, GL_UNSIGNED_SH...
target Must be GL_MINMAX. pname The parameter to be retrieved. Must be one of GL_MINMAX_FORMAT or GL_MINMAX_SINK. params A pointer to storage for the retrieved parameters.
target Must be GL_MINMAX_EXT. pname The parameter to be retrieved. Must be one of GL_MINMAX_FORMAT_EXT or GL_MINMAX_SINK_EXT. params A pointer to storage for the retrieved parameters.
map Specifies the name of the pixel map to return. Accepted values are GL_PIXEL_MAP_I_TO_I, GL_PIXEL_MAP_S_TO_S, GL_PIXEL_MAP_I_TO_R, GL_PIXEL_MAP_I_TO_G, GL_PIXEL_MAP_I_TO_B, GL_PIXEL_MAP_I_TO_A, GL_PIXEL_MAP_R_TO_R, GL_PIXEL_MAP_G_TO_G, GL_PIXEL_MAP_B_TO_B, and GL_PIXEL_MAP_A_TO_A. values Returns the pixel map contents.
pname Specifies the symbolic name of the parameter to be queried. Accepted values are GL_PIXEL_FRAGMENT_RGB_SOURCE_SGIS and GL_PIXEL_FRAGMENT_ALPHA_SOURCE_SGIS. params Returns the pixel texture parameters.
pname Specifies the array or buffer pointer to be returned. Symbolic constants GL_COLOR_ARRAY_POINTER, GL_EDGE_FLAG_ARRAY_POINTER, GL_FEEDBACK_BUFFER_POINTER, GL_INDEX_ARRAY_POINTER, GL_NORMAL_ARRAY_POINTER, GL_TEXTURE_COORD_ARRAY_POINTER, GL_SELECTION_BUFFER_POINTER, and GL_VERTEX_ARRAY_POINTER are accepted. params Returns the pointer value specified by pname.
pname Specifies the pointer to be returned. Symbolic constants GL_VERTEX_ARRAY_POINTER_EXT, GL_NORMAL_ARRAY_POINTER_EXT, GL_COLOR_ARRAY_POINTER_EXT, GL_INDEX_ARRAY_POINTER_EXT, GL_TEXTURE_COORD_ARRAY_POINTER_EXT, GL_EDGE_FLAG_ARRAY_POINTER_EXT, and GL_INSTRUMENT_BUFFER_POINTER_SGIX are accepted. params returns the pointer value specified by pname.
target The separable filter to be retrieved. Must be GL_SEPARABLE_2D. format Format of the output images. Must be one of GL_RED, GL_GREEN, GL_BLUE, GL_ALPHA, GL_RGB, GL_BGR GL_RGBA, GL_BGRA, GL_ABGR_EXT, GL_LUMINANCE, or GL_LUMINANCE_ALPHA. type Data type of components in the output images. Symbolic constants GL_UNSIGNED_BYTE, GL_BYTE, GL_BITMAP, GL_UNSIGNED_SHORT, GL_SHORT, GL_UNSIGNED_INT, GL_INT, GL_FLOAT, GL_UNSIGNED_BYTE_3_3_2, GL_UNSIGNED_BYTE_2_3_3_REV, GL_UNSIGNED_SHORT_5_6_5, GL_UNSIGNE...
target The separable filter to be retrieved. Must be GL_SEPARABLE_2D_EXT. format Format of the output images. Must be one of GL_RED, GL_GREEN, GL_BLUE, GL_ALPHA, GL_RGB, GL_RGBA, GL_ABGR_EXT, GL_LUMINANCE, or GL_LUMINANCE_ALPHA. type Data type of components in the output images. Must be one of GL_UNSIGNED_BYTE, GL_BYTE, GL_UNSIGNED_SHORT, GL_SHORT, GL_UNSIGNED_INT, GL_INT, GL_FLOAT, GL_UNSIGNED_BYTE_3_3_2_EXT, GL_UNSIGNED_SHORT_4_4_4_4_EXT, GL_UNSIGNED_SHORT_5_5_5_1_EXT, GL_UNSIGNED_INT_8_8_8_8_...
target The texture whose sharpen texture scaling function is to be retrieved. Must be GL_TEXTURE_1D, GL_TEXTURE_2D, or GL_TEXTURE_3D_EXT. points A pointer to a floating-point array which receives the retrieved scaling function. Each pair of elements in the array receives an LOD (level-of-detail) value and a scaling function value.
target Specifies a texture environment. Must be GL_TEXTURE_ENV. pname Specifies the symbolic name of a texture environment parameter. Accepted values are GL_TEXTURE_ENV_MODE, GL_TEXTURE_ENV_COLOR, and GL_TEXTURE_ENV_BIAS_SGIX. params Returns the requested data.
target Specifies the target texture whose filtering function weights are to be returned. Must be GL_TEXTURE_1D or GL_TEXTURE_2D. filter Specifies the filter function whose weights are to be returned. Must be GL_FILTER4_SGIS. weights Specifies an array to receive the floating-point weight values.
coord Specifies a texture coordinate. Must be GL_S, GL_T, GL_R, or GL_Q. pname Specifies the symbolic name of the value(s) to be returned. Must be either GL_TEXTURE_GEN_MODE or the name of one of the texture generation plane equations: GL_OBJECT_PLANE or GL_EYE_PLANE. params Returns the requested data.
target Specifies which texture is to be obtained. GL_TEXTURE_1D, GL_TEXTURE_2D, GL_DETAIL_TEXTURE_2D_SGIS, and GL_TEXTURE_3D are accepted. level Specifies the level-of-detail number of the desired image. Level 0 is the base image level. Level n is the nth mipmap reduction image. format Specifies a pixel format for the returned data. The supported formats are GL_RED, GL_GREEN, GL_BLUE, GL_ALPHA, GL_RGB, GL_BGR, GL_RGBA, GL_BGRA, GL_ABGR_EXT, GL_LUMINANCE, and GL_LUMINANCE_ALPHA. type Specifies a ...
target Specifies the symbolic name of the target texture, either GL_TEXTURE_1D, GL_TEXTURE_2D, GL_TEXTURE_3D, GL_PROXY_TEXTURE_1D, GL_PROXY_TEXTURE_2D, GL_PROXY_TEXTURE_3D, or GL_DETAIL_TEXTURE_2D_SGIS. level Specifies the level-of-detail number of the desired image. Level 0 is the base image level. Level n is the nth mipmap reduction image. pname Specifies the symbolic name of a texture parameter. GL_TEXTURE_WIDTH, GL_TEXTURE_HEIGHT, GL_TEXTURE_DEPTH, GL_TEXTURE_INTERNAL_FORMAT, GL_TEXTURE_BORD...
target Specifies the symbolic name of the target texture. GL_TEXTURE_1D, GL_TEXTURE_2D, GL_DETAIL_TEXTURE_2D_SGIS, and GL_TEXTURE_3D_EXT are accepted. pname Specifies the symbolic name of a texture parameter. GL_TEXTURE_MAG_FILTER, GL_TEXTURE_MIN_FILTER, GL_TEXTURE_MIN_LOD, GL_TEXTURE_MAX_LOD, GL_TEXTURE_BASE_LEVEL, GL_TEXTURE_MAX_LEVEL, GL_TEXTURE_WRAP_S, GL_TEXTURE_WRAP_T, GL_TEXTURE_WRAP_R, GL_TEXTURE_BORDER_COLOR, GL_DETAIL_TEXTURE_LEVEL_SGIS, GL_DETAIL_TEXTURE_MODE_SGIS, GL_DETAIL_TEXTURE_F...
target Specifies a symbolic constant indicating the behavior to be controlled. GL_CONVOLUTION_HINT_SGIX, GL_SCALEBIAS_HINT_SGIX, GL_FOG_HINT, GL_LINE_SMOOTH_HINT, GL_PERSPECTIVE_CORRECTION_HINT, GL_POINT_SMOOTH_HINT, GL_POLYGON_SMOOTH_HINT, and GL_VERTEX_PRECLIP_HINT_SGIX are accepted. mode Specifies a symbolic constant indicating the desired behavior. GL_FASTEST, GL_NICEST, and GL_DONT_CARE are accepted....
target The histogram whose parameters are to be set. Must be one of GL_HISTOGRAM or GL_PROXY_HISTOGRAM. width The number of entries in the histogram table. Must be a power of 2. internalformat The format of entries in the histogram table. Must be one of GL_ALPHA, GL_ALPHA4, GL_ALPHA8, GL_ALPHA12, GL_ALPHA16, GL_LUMINANCE, GL_LUMINANCE4, GL_LUMINANCE8, GL_LUMINANCE12, GL_LUMINANCE16, GL_LUMINANCE_ALPHA, GL_LUMINANCE4_ALPHA4, GL_LUMINANCE6_ALPHA2, GL_LUMINANCE8_ALPHA8, GL_LUMINANCE12_ALPHA4, GL_LU...
target The histogram whose parameters are to be set. Must be one of GL_HISTOGRAM_EXT or GL_PROXY_HISTOGRAM_EXT. width The number of entries in the histogram table. Must be a power of 2. internalformat The format of entries in the histogram table. Must be one of GL_ALPHA, GL_ALPHA4_EXT, GL_ALPHA8_EXT, GL_ALPHA12_EXT, GL_ALPHA16_EXT, GL_LUMINANCE, GL_LUMINANCE4_EXT, GL_LUMINANCE8_EXT, GL_LUMINANCE12_EXT, GL_LUMINANCE16_EXT, GL_LUMINANCE_ALPHA, GL_LUMINANCE4_ALPHA4_EXT, GL_LUMINANCE6_ALPHA2_EXT, GL...
type Specifies the data type of each color index in the array. Symbolic constants GL_UNSIGNED_BYTE, GL_SHORT, GL_INT, GL_FLOAT, and GL_DOUBLE are accepted. The initial value is GL_FLOAT. stride Specifies the byte offset between consecutive color indexes. If stride is 0 (the initial value), the color indexes are understood to be tightly packed in the array. The initial value is 0. pointer Specifies a pointer to the first index in the array. The initial value is 0....
type Specifies the data type of each color index in the array. Symbolic constants GL_SHORT, GL_INT, GL_FLOAT, or GL_DOUBLE_EXT, are accepted. stride Specifies the byte offset between consecutive color indexes. If stride is zero the color indexes are understood to be tightly packed in the array. count Specifies the number of indexes, counting from the first, that are static. pointer Specifies a pointer to the first index in the array....
The name stack is used during selection mode to allow sets of rendering commands to be uniquely identified. It consists of an ordered set of unsigned integers. glInitNames causes the name stack to be initialized to its default empty state. The name stack is always empty while the render mode is not GL_SELECT. Calls to glInitNames while the render mode is not GL_SELECT are ignored.
format Specifies the type of array to enable. Symbolic constants GL_V2F, GL_V3F, GL_C4UB_V2F, GL_C4UB_V3F, GL_C3F_V3F, GL_N3F_V3F, GL_C4F_N3F_V3F, GL_T2F_V3F, GL_T4F_V4F, GL_T2F_C4UB_V3F, GL_T2F_C3F_V3F, GL_T2F_N3F_V3F, GL_T2F_C4F_N3F_V3F, and GL_T4F_C4F_N3F_V4F are accepted. stride Specifies the offset in bytes between each aggregate array element.
SGI has implemented the following extensions to OpenGL. Note that the set of supported extensions varies from machine to machine; see below for more information.
light Specifies a light. The number of lights depends on the implementation, but at least eight lights are supported. They are identified by symbolic names of the form GL_LIGHTi where 0 < i < GL_MAX_LIGHTS. pname Specifies a single-valued light source parameter for light. GL_SPOT_EXPONENT, GL_SPOT_CUTOFF, GL_CONSTANT_ATTENUATION, GL_LINEAR_ATTENUATION, and GL_QUADRATIC_ATTENUATION are accepted. param Specifies the value that parameter pname of light source light will be set to....
pname Specifies a single-valued lighting model parameter. GL_LIGHT_MODEL_LOCAL_VIEWER, GL_LIGHT_MODEL_COLOR_CONTROL, and GL_LIGHT_MODEL_TWO_SIDE are accepted. param Specifies the value that param will be set to.
factor Specifies a multiplier for each bit in the line stipple pattern. If factor is 3, for example, each bit in the pattern is used three times before the next bit in the pattern is used. factor is clamped to the range [1, 256] and defaults to 1. pattern Specifies a 16-bit integer whose bit pattern determines which fragments of a line will be drawn when the line is rasterized. Bit zero is used first; the default pattern is all 1's....
list Specifies the integer name of the display list whose parameters are to be set. pname Specifies the symbolic name for a display list parameter. Must be GL_LIST_PRIORITY_SGIX. param Specifies a single value for the selected display list parameter. If pname is GL_LIST_PRIORITY_SGIX, then the value must be a display list priority in the range [0.0, 1.0].
glLoadIdentity replaces the current matrix with the identity matrix. It is semantically equivalent to calling glLoadMatrix with the identity matrix ( ) 1 0 0 0 | | | 0 1 0 0 | | | 0 0 1 0 | | ( 0 0 0 1 ) but in some cases it is more efficient.
opcode Specifies a symbolic constant that selects a logical operation. The following symbols are accepted: GL_CLEAR, GL_SET, GL_COPY, GL_COPY_INVERTED, GL_NOOP, GL_INVERT, GL_AND, GL_NAND, GL_OR, GL_NOR, GL_XOR, GL_EQUIV, GL_AND_REVERSE, GL_AND_INVERTED, GL_OR_REVERSE, and GL_OR_INVERTED. The initial value is GL_COPY.
target Specifies the kind of values that are generated by the evaluator. Symbolic constants GL_MAP1_VERTEX_3, GL_MAP1_VERTEX_4, GL_MAP1_INDEX, GL_MAP1_COLOR_4, GL_MAP1_NORMAL, GL_MAP1_TEXTURE_COORD_1, GL_MAP1_TEXTURE_COORD_2, GL_MAP1_TEXTURE_COORD_3, and GL_MAP1_TEXTURE_COORD_4 are accepted. u1, u2 Specify a linear mapping of u, as presented to glEvalCoord1, to ^, the variable that is evaluated by the equations specified by this command. stride Specifies the number of floats or doubles between t...
target Specifies the kind of values that are generated by the evaluator. Symbolic constants GL_MAP2_VERTEX_3, GL_MAP2_VERTEX_4, GL_MAP2_INDEX, GL_MAP2_COLOR_4, GL_MAP2_NORMAL, GL_MAP2_TEXTURE_COORD_1, GL_MAP2_TEXTURE_COORD_2, GL_MAP2_TEXTURE_COORD_3, and GL_MAP2_TEXTURE_COORD_4 are accepted. u1, u2 Specify a linear mapping of u, as presented to glEvalCoord2, to ^, one of the two variables that are evaluated by the equations specified by this command. Initially, u1 is 0 and u2 is 1. ustride Speci...
un Specifies the number of partitions in the grid range interval [u1, u2]. Must be positive. u1, u2 Specify the mappings for integer grid domain values i = 0 and i = un. vn Specifies the number of partitions in the grid range interval [v1, v2] (glMapGrid2 only). v1, v2 Specify the mappings for integer grid domain values j = 0 and j = vn (glMapGrid2 only).
face Specifies which face or faces are being updated. Must be one of GL_FRONT, GL_BACK, or GL_FRONT_AND_BACK. pname Specifies the single-valued material parameter of the face or faces that is being updated. Must be GL_SHININESS. param Specifies the value that parameter GL_SHININESS will be set to.
mode Specifies which matrix stack is the target for subsequent matrix operations. Three values are accepted: GL_MODELVIEW, GL_PROJECTION, and GL_TEXTURE. The initial value is GL_MODELVIEW. Additionally, if the GL_ARB_imaging extension is supported, GL_COLOR is also accepted.
target The minmax table whose parameters are to be set. Must be GL_MINMAX. internalformat The format of entries in the minmax table. Must be one of GL_ALPHA, GL_ALPHA4, GL_ALPHA8, GL_ALPHA12, GL_ALPHA16, GL_LUMINANCE, GL_LUMINANCE4, GL_LUMINANCE8, GL_LUMINANCE12, GL_LUMINANCE16, GL_LUMINANCE_ALPHA, GL_LUMINANCE4_ALPHA4, GL_LUMINANCE6_ALPHA2, GL_LUMINANCE8_ALPHA8, GL_LUMINANCE12_ALPHA4, GL_LUMINANCE12_ALPHA12, GL_LUMINANCE16_ALPHA16, GL_R3_G3_B2, GL_RGB, GL_RGB4, GL_RGB5, GL_RGB8, GL_RGB10, GL_RG...
target The minmax table whose parameters are to be set. Must be GL_MINMAX_EXT. internalformat The format of entries in the minmax table. Must be one of GL_ALPHA, GL_ALPHA4_EXT, GL_ALPHA8_EXT, GL_ALPHA12_EXT, GL_ALPHA16_EXT, GL_LUMINANCE, GL_LUMINANCE4_EXT, GL_LUMINANCE8_EXT, GL_LUMINANCE12_EXT, GL_LUMINANCE16_EXT, GL_LUMINANCE_ALPHA, GL_LUMINANCE4_ALPHA4_EXT, GL_LUMINANCE6_ALPHA2_EXT, GL_LUMINANCE8_ALPHA8_EXT, GL_LUMINANCE12_ALPHA4_EXT, GL_LUMINANCE12_ALPHA12_EXT, GL_LUMINANCE16_ALPHA16_EXT, GL_...
type Specifies the data type of each coordinate in the array. Symbolic constants GL_BYTE, GL_SHORT, GL_INT, GL_FLOAT, and GL_DOUBLE are accepted. The initial value is GL_FLOAT. stride Specifies the byte offset between consecutive normals. If stride is 0- the initial value-the normals are understood to be tightly packed in the array. The initial value is 0. pointer Specifies a pointer to the first coordinate of the first normal in the array. The initial value is 0....
type Specifies the the data type of each coordinate in the array. Symbolic constants GL_BYTE, GL_SHORT, GL_INT, GL_FLOAT, or GL_DOUBLE_EXT are accepted. stride Specifies the byte offset between consecutive normals. count Specifies the number of normals, counting from the first, that are static. pointer Specifies a pointer to the first coordinate of the first normal in the array.
This command performs file name ``globbing'' in a fashion similar to the csh shell. It returns a list of the files whose names match any of the pattern arguments. If the initial arguments to glob start with - then they are treated as | switches. The following switches are currently supported: -nocomplain Allows an empty list to be returned without error; | without this switch an error is returned if the result | list would be empty. -- Marks the end of switches. The argument following this | o...
The structure type glob_t is defined in the header <glob.h> and includes at least the following members: MemberType MemberName Description _______________________________________________________________ size_t gl_offs Slots to reserve at start of gl_pathv. char ** gl_pathv Pointer to list of matched pathnames. size_t gl_pathc Count of paths matched by pattern. The argument pattern is a pointer to a pathname pattern to be expanded. The glob function matches all...
This command is ignored unless a Tcl procedure is being interpreted. If so then it declares the given varname's to be global variables rather than local ones. For the duration of the current procedure (and only while executing in the current procedure), any reference to any of the varnames will refer to the global variable by the same name.
left, right Specify the coordinates for the left and right vertical clipping planes. bottom, top Specify the coordinates for the bottom and top horizontal clipping planes. near, far Specify the distances to the nearer and farther depth clipping planes. These values are negative if the plane is to be behind the viewer.
map Specifies a symbolic map name. Must be one of the following: GL_PIXEL_MAP_I_TO_I, GL_PIXEL_MAP_S_TO_S, GL_PIXEL_MAP_I_TO_R, GL_PIXEL_MAP_I_TO_G, GL_PIXEL_MAP_I_TO_B, GL_PIXEL_MAP_I_TO_A, GL_PIXEL_MAP_R_TO_R, GL_PIXEL_MAP_G_TO_G, GL_PIXEL_MAP_B_TO_B, or GL_PIXEL_MAP_A_TO_A. mapsize Specifies the size of the map being defined. values Specifies an array of mapsize values.
pname Specifies the symbolic name of the parameter to be set. Twelve values affect the packing of pixel data into memory: GL_PACK_SWAP_BYTES, GL_PACK_LSB_FIRST, GL_PACK_ROW_LENGTH, GL_PACK_IMAGE_HEIGHT, GL_PACK_IMAGE_DEPTH_SGIS, GL_PACK_SKIP_PIXELS, GL_PACK_SKIP_ROWS, GL_PACK_SKIP_IMAGES, GL_PACK_SKIP_VOLUMES_SGIS, GL_PACK_ALIGNMENT, GL_PACK_SUBSAMPLE_RATE_SGIX, and GL_PACK_RESAMPLE_SGIX. Twelve more affect the unpacking of pixel data from memory: GL_UNPACK_SWAP_BYTES, GL_UNPACK_LSB_FIRST, GL_UN...
mode Specifies a mode of generating texture coordinates from pixel groups. Must be one of the following: GL_NONE, GL_RGBA, GL_RGB, GL_ALPHA. GL_PIXEL_TEX_GEN_ALPHA_REPLACE_SGIX, GL_PIXEL_TEX_GEN_ALPHA_NO_REPLACE_SGIX, GL_PIXEL_TEX_GEN_ALPHA_MS_SGIX, or GL_PIXEL_TEX_GEN_ALPHA_LS_SGIX. The default value is GL_NONE.
pname Specifies the symbolic name of the parameter to be set, which must be either GL_PIXEL_FRAGMENT_RGB_SOURCE_SGIS or GL_PIXEL_FRAGMENT_ALPHA_SOURCE_SGIS. param Specifies a symbolic constant, which must be either GL_CURRENT_RASTER_COLOR or GL_PIXEL_GROUP_COLOR_SGIS.
pname Specifies the symbolic name of the pixel transfer parameter to be set. Must be one of the following: GL_MAP_COLOR, GL_MAP_STENCIL, GL_INDEX_SHIFT, GL_INDEX_OFFSET, GL_RED_SCALE, GL_RED_BIAS, GL_GREEN_SCALE, GL_GREEN_BIAS, GL_BLUE_SCALE, GL_BLUE_BIAS, GL_ALPHA_SCALE, GL_ALPHA_BIAS, GL_DEPTH_SCALE, or GL_DEPTH_BIAS. Additionally, if the GL_ARB_imaging extension is supported, the following symbolic names are accepted: GL_POST_COLOR_MATRIX_RED_SCALE, GL_POST_COLOR_MATRIX_GREEN_SCALE, GL_POST_C...
pname The symbolic name of a point parameter. One of GL_POINT_SIZE_MIN_SGIS or GL_POINT_SIZE_MAX_SGIS or GL_POINT_FADE_THRESHOLD_SIZE_SGIS. param The parameter value.
face Specifies the polygons that mode applies to. Must be GL_FRONT for front-facing polygons, GL_BACK for back-facing polygons, or GL_FRONT_AND_BACK for front- and back-facing polygons. mode Specifies how polygons will be rasterized. Accepted values are GL_POINT, GL_LINE, and GL_FILL. The initial value is GL_FILL for both front- and back-facing polygons.
factor Specifies a scale factor that is used to create a variable depth offset for each polygon. The initial value is 0. units Is multiplied by an implementation-specific value to create a constant depth offset. The initial value is 0.
factor specifies a slope scale factor. bias specifies a constant bias. The depth values for each subsequent polygon rendered in GL_FILL mode will be offset by the the slope scale factor times the maximum absolute depth slope of the polygon, plus the bias.
n Specifies the number of textures to be prioritized. textures Specifies an array containing the names of the textures to be prioritized. priorities Specifies an array containing the texture priorities. A priority given in an element of priorities applies to the texture named by the corresponding element of textures.
n The number of textures to be prioritized. textures An array containing the names of the textures to be prioritized. priorities An array containing the texture priorities. A priority given in an element of priorities applies to the texture named by the corresponding element of textures.
mode Specifies a color buffer. Accepted values are GL_FRONT_LEFT, GL_FRONT_RIGHT, GL_BACK_LEFT, GL_BACK_RIGHT, GL_FRONT, GL_BACK, GL_LEFT, GL_RIGHT, and GL_AUXi, where i is between 0 and GL_AUX_BUFFERS -1.
x, y Specify the window coordinates of the first pixel that is read from the frame buffer. This location is the lower left corner of a rectangular block of pixels. width, height Specify the dimensions of the pixel rectangle. width and height of one correspond to a single pixel. format Specifies the format of the pixel data. The following symbolic values are accepted: GL_COLOR_INDEX, GL_STENCIL_INDEX, GL_DEPTH_COMPONENT, GL_RED, GL_GREEN, GL_BLUE, GL_ALPHA, GL_RGB, GL_BGR, GL_RGBA, GL_BGRA, GL_AB...
equation Specifies a four-element array containing the plane equation coefficients of a reference plane which will be used to generate depth values for pixel fragments. The coefficients of x, y, and z are the first three elements of the array, respectively, and the constant term is the fourth. The plane equation is specified in object coordinates. The default is equivalent to (0,0,1,0) in window coordinates....
These resources control the behavior and appearance of the popup menus displayed by defpup(3G). Some IRIX 4.0 programs use menus that look the same, but aren't controlled by exactly the same resources. Two examples of programs with similar-looking, but non-GL, menus would be workspace(1) and wsh(1). menu.overFirst Menu.OverFirst If this resource is specified and is set to "True" then when the popop menu is first drawn, it will be placed so that the first menu item is automatically selected. S...
value Specifies coverage of the modification mask. Clamped to the range [0, 1]; zero implies no coverage, and one implies full coverage. invert GL_FALSE to use the modification mask implied by value; GL_TRUE to use the bitwise inverse of that mask.
pattern A symbolic constant that indicates the sampling pattern to be used when multisampling is enabled. The allowable values are GL_1PASS_SGIS, GL_2PASS_0_SGIS, GL_2PASS_1_SGIS, GL_4PASS_0_SGIS, GL_4PASS_1_SGIS, GL_4PASS_2_SGIS, and GL_4PASS_3_SGIS.
x, y Specify the lower left corner of the scissor box. Initially (0, 0). width, height Specify the width and height of the scissor box. When a GL context is first attached to a window, width and height are set to the dimensions of that window.
target Must be GL_SEPARABLE_2D. internalformat The internal format of the convolution filter kernel. The allowable values are GL_ALPHA, GL_ALPHA4, GL_ALPHA8, GL_ALPHA12, GL_ALPHA16, GL_LUMINANCE, GL_LUMINANCE4, GL_LUMINANCE8, GL_LUMINANCE12, GL_LUMINANCE16, GL_LUMINANCE_ALPHA, GL_LUMINANCE4_ALPHA4, GL_LUMINANCE6_ALPHA2, GL_LUMINANCE8_ALPHA8, GL_LUMINANCE12_ALPHA4, GL_LUMINANCE12_ALPHA12, GL_LUMINANCE16_ALPHA16, GL_INTENSITY, GL_INTENSITY4, GL_INTENSITY8, GL_INTENSITY12, GL_INTENSITY16, GL_R3_G3_...
target Must be GL_SEPARABLE_2D_EXT. internalformat The internal format of the convolution filter kernel. The allowable values are GL_LUMINANCE, GL_LUMINANCE_ALPHA, GL_INTENSITY_EXT, GL_RGB, and GL_RGBA. width The number of elements in the pixel array referenced by row. (This is the width of the separable filter kernel.) height The number of elements in the pixel array referenced by column. (This is the height of the separable filter kernel.) format The format of the pixel data in row and column....
target The target to which the scaling function will be applied. Must be one of GL_TEXTURE_1D, GL_TEXTURE_2D, or GL_TEXTURE_3D_EXT. n The number of scaling function samples in points. points An array of scaling function samples, each of which is a (level- of-detail, function-value) pair.
The GLS API and encodings are subject to change during the OpenGL ARB multivendor standardization process for GLS, which is not yet complete. Due to the multivendor standardization process, the GLS API and binary stream encodings that are supported in this release are NOT compatible with the GLS API and binary stream encodings that were supported in IRIX 6.2. Page 7 glsIntro(3G) OpenGL Stream Codec glsIntro(3G) The GLS text stream encoding supported in this release is compatible with the GLS tex...
pname The parameter to be set. Must be GL_SPRITE_MODE_SGIX. param The parameter value. Must be one of GL_SPRITE_AXIAL_SGIX or GL_SPRITE_OBJECT_ALIGNED_SGIX or GL_SPRITE_EYE_ALIGNED_SGIX.
func Specifies the test function. Eight tokens are valid: GL_NEVER, GL_LESS, GL_LEQUAL, GL_GREATER, GL_GEQUAL, GL_EQUAL, GL_NOTEQUAL, and GL_ALWAYS. The initial value is GL_ALWAYS. ref Specifies the reference value for the stencil test. ref is clamped n to the range [0,2 -1], where n is the number of bitplanes in the stencil buffer. The initial value is 0. mask Specifies a mask that is ANDed with both the reference value and the stored stencil value when the test is done. The initial value is al...
fail Specifies the action to take when the stencil test fails. Six symbolic constants are accepted: GL_KEEP, GL_ZERO, GL_REPLACE, GL_INCR, GL_DECR, and GL_INVERT. The initial value is GL_KEEP. zfail Specifies the stencil action when the stencil test passes, but the depth test fails. zfail accepts the same symbolic constants as fail. The initial value is GL_KEEP. zpass Specifies the stencil action when both the stencil test and the depth test pass, or when the stencil test passes and either there...
When using a multisample buffer on some systems (see Machine Dependencies below), glTagSampleBufferSGIX can be used with some restrictions as a faster alternative to clearing the depth buffer using glClear. On these system, each sample in the multisample buffer carries a tag that can be either set or cleared. glTagSampleBufferSGIX sets the tags of all the samples. When a tag of a sample is set, a depth test against that sample always succeeds. Note, however, that the stencil test (if enabled) st...
size Specifies the number of coordinates per array element. Must be 1, 2, 3 or 4. The initial value is 4. type Specifies the data type of each texture coordinate. Symbolic constants GL_SHORT, GL_INT, GL_FLOAT, or GL_DOUBLE are accepted. The initial value is GL_FLOAT. stride Specifies the byte offset between consecutive array elements. If stride is 0, the array elements are understood to be tightly packed. The initial value is 0. pointer Specifies a pointer to the first coordinate of the first el...
size Specifies the number of coordinates per array element. It must be 1, 2, 3 or 4. type Specifies the data type of each texture coordinate. Symbolic constants GL_SHORT, GL_INT, GL_FLOAT, or GL_DOUBLE_EXT, are accepted. stride Specifies the byte offset between consecutive array elements. If stride is zero the array elements are understood to be tightly packed. count Specifies the number of array elements, counting from the first, that are static. pointer Specifies a pointer to the first coordin...
target Specifies a texture environment. Must be GL_TEXTURE_ENV. pname Specifies the symbolic name of a single-valued texture environment parameter. Must be GL_TEXTURE_ENV_MODE. param Specifies a single symbolic constant, one of GL_MODULATE, GL_DECAL, GL_BLEND, GL_REPLACE, GL_REPLACE_EXT, or GL_ADD.
target Specifies the texture for which filter weights will be defined. The allowable values are GL_TEXTURE_1D and GL_TEXTURE_2D. filter Specifies the filter whose weights will be defined. Must be GL_FILTER4_SGIS. n The number of filter weight values in weights. weights Specifies an array of floating-point values which define the filter weights.
coord Specifies a texture coordinate. Must be one of GL_S, GL_T, GL_R, or GL_Q. pname Specifies the symbolic name of the texture-coordinate generation function. Must be GL_TEXTURE_GEN_MODE. param Specifies a single-valued texture generation parameter, one of GL_OBJECT_LINEAR, GL_EYE_LINEAR, or GL_SPHERE_MAP.
target Specifies the target texture. Must be GL_TEXTURE_1D or GL_PROXY_TEXTURE_1D. level Specifies the level-of-detail number. Level 0 is the base image level. Level n is the nth mipmap reduction image. internalformat Specifies the number of color components in the texture. Must be 1, 2, 3, or 4, or one of the following symbolic constants: GL_ALPHA, GL_ALPHA4, GL_ALPHA8, GL_ALPHA12, GL_ALPHA16, GL_LUMINANCE, GL_LUMINANCE4, GL_LUMINANCE8, GL_LUMINANCE12, GL_LUMINANCE16, GL_LUMINANCE_ALPHA, GL_LUM...
target Specifies the target texture. Must be GL_TEXTURE_2D or GL_PROXY_TEXTURE_2D. level Specifies the level-of-detail number. Level 0 is the base image level. Level n is the nth mipmap reduction image. internalformat Specifies the number of color components in the texture. Must be 1, 2, 3, or 4, or one of the following symbolic constants: GL_ALPHA, GL_ALPHA4, GL_ALPHA8, GL_ALPHA12, GL_ALPHA16, GL_LUMINANCE, GL_LUMINANCE4, GL_LUMINANCE8, GL_LUMINANCE12, GL_LUMINANCE16, GL_LUMINANCE_ALPHA, GL_LUM...
target Specifies the target texture. Must be GL_TEXTURE_3D or GL_PROXY_TEXTURE_3D. level Specifies the level-of-detail number. Level 0 is the th base image level. Level n is the n mipmap reduction image. internalformat Specifies the number of color components in the texture. Must be 1, 2, 3, or 4, or one of the following symbolic constants: GL_ALPHA, GL_ALPHA4, GL_ALPHA8, GL_ALPHA12, GL_ALPHA16, GL_LUMINANCE, GL_LUMINANCE4, GL_LUMINANCE8, GL_LUMINANCE12, GL_LUMINANCE16, GL_LUMINANCE_ALPHA, GL_LU...
target Specifies the target texture. Must be GL_TEXTURE_3D_EXT or GL_PROXY_TEXTURE_3D_EXT. level Specifies the level-of-detail number. Level 0 is the base image level. Level n is the nth mipmap reduction image. internalformat Specifies the internal storage format of the texture image. it must be one of the following symbolic constants: GL_ALPHA, GL_ALPHA4_EXT, GL_ALPHA8_EXT, GL_ALPHA12_EXT, GL_ALPHA16_EXT, GL_LUMINANCE, GL_LUMINANCE4_EXT, GL_LUMINANCE8_EXT, GL_LUMINANCE12_EXT, GL_LUMINANCE16_EXT...
target Specifies the target texture. Must be GL_TEXTURE_4D_SGIS or GL_PROXY_TEXTURE_4D_SGIS. level Specifies the level-of-detail number. Level 0 is the base image level. Level n is the nth mipmap reduction image. internalformat Specifies the internal storage format of the texture image. it must be one of the following symbolic constants: GL_ALPHA, GL_ALPHA4_EXT, GL_ALPHA8_EXT, GL_ALPHA12_EXT, GL_ALPHA16_EXT, GL_LUMINANCE, GL_LUMINANCE4_EXT, GL_LUMINANCE8_EXT, GL_LUMINANCE12_EXT, GL_LUMINANCE16_E...
target Specifies the target texture, which must be either GL_TEXTURE_1D, GL_TEXTURE_2D, GL_DETAIL_TEXTURE_2D_SGIS, or GL_TEXTURE_3D_EXT. GL_TEXTURE_4D_SGIS. pname Specifies the symbolic name of a single-valued texture parameter. pname can be one of the following: GL_TEXTURE_MIN_FILTER, GL_TEXTURE_MAG_FILTER, GL_TEXTURE_MIN_LOD, GL_TEXTURE_MAX_LOD, GL_TEXTURE_BASE_LEVEL, GL_TEXTURE_MAX_LEVEL, GL_TEXTURE_WRAP_S, GL_TEXTURE_WRAP_T, GL_TEXTURE_WRAP_R, GL_TEXTURE_WRAP_Q_SGIS, GL_TEXTURE_PRIORITY, GL_...
target Specifies the target texture. Must be GL_TEXTURE_1D. level Specifies the level-of-detail number. Level 0 is the base image level. Level n is the nth mipmap reduction image. xoffset Specifies a texel offset in the x direction within the texture array. width Specifies the width of the texture subimage. format Specifies the format of the pixel data. The following symbolic values are accepted: GL_COLOR_INDEX, GL_RED, GL_GREEN, GL_BLUE, GL_ALPHA, GL_RGB, GL_BGR, GL_RGBA, GL_BGRA, GL_ABGR_EXT, ...
target Specifies the target texture. Must be GL_TEXTURE_1D. level Specifies the level-of-detail number. Level 0 is the base image level. Level n is the nth mipmap reduction image. xoffset Specifies a texel offset in the x direction within the texture array. width Specifies the width of the texture subimage. format Specifies the format of the pixel data. The following symbolic values are accepted: GL_COLOR_INDEX, GL_RED, GL_GREEN, GL_BLUE, GL_ALPHA, GL_RGB, GL_RGBA, GL_ABGR_EXT, GL_LUMINANCE, and...
target Specifies the target texture. Must be GL_TEXTURE_2D. level Specifies the level-of-detail number. Level 0 is the base image level. Level n is the nth mipmap reduction image. xoffset Specifies a texel offset in the x direction within the texture array. yoffset Specifies a texel offset in the y direction within the texture array. width Specifies the width of the texture subimage. height Specifies the height of the texture subimage. format Specifies the format of the pixel data. The following...
target Specifies the target texture. Must be GL_TEXTURE_2D or GL_DETAIL_TEXTURE_2D_SGIS. level Specifies the level-of-detail number. Level 0 is the base image level. Level n is the nth mipmap reduction image. xoffset Specifies a texel offset in the x direction within the texture array. yoffset Specifies a texel offset in the y direction within the texture array. width Specifies the width of the texture subimage. height Specifies the height of the texture subimage. format Specifies the format of ...
target Specifies the target texture. Must be GL_TEXTURE_3D. level Specifies the level-of-detail number. Level 0 is the base image level. Level n is the nth mipmap reduction image. xoffset Specifies a texel offset in the x direction within the texture array. yoffset Specifies a texel offset in the y direction within the texture array. zoffset Specifies a texel offset in the z direction within the texture array. width Specifies the width of the texture subimage. height Specifies the height of the ...
target Specifies the target texture. Must be GL_TEXTURE_3D_EXT. level Specifies the level-of-detail number. Level 0 is the base image level. Level n is the nth mipmap reduction image. xoffset Specifies a texel offset in the x direction within the texture array. yoffset Specifies a texel offset in the y direction within the texture array. zoffset Specifies a texel offset in the z direction within the texture array. width Specifies the width of the texture subimage. height Specifies the height of ...
target Specifies the target texture. Must be GL_TEXTURE_4D_SGIS. level Specifies the level-of-detail number. Level 0 is the base image level. Level n is the nth mipmap reduction image. xoffset Specifies a texel offset in the x direction within the texture array. yoffset Specifies a texel offset in the y direction within the texture array. zoffset Specifies a texel offset in the z direction within the texture array. woffset Specifies a texel offset in the w direction within the texture array. wid...
red, green, blue, alpha Specify whether red, green, blue, alpha, luminance, or intensity components will or will not be stored when defining a texture image. The initial values are all GL_TRUE, indicating that all color components determined by the internal format of the texture image will be stored.
target Specifies the target texture. Must be GL_TEXTURE_1D. internalFormat Requests the internal storage format of the texture image. Must be 1, 2, 3, or 4 or one of the following symbolic constants: GL_ALPHA, GL_ALPHA4, GL_ALPHA8, GL_ALPHA12, GL_ALPHA16, GL_LUMINANCE, GL_LUMINANCE4, GL_LUMINANCE8, GL_LUMINANCE12, GL_LUMINANCE16, GL_LUMINANCE_ALPHA, GL_LUMINANCE4_ALPHA4, GL_LUMINANCE6_ALPHA2, GL_LUMINANCE8_ALPHA8, GL_LUMINANCE12_ALPHA4, GL_LUMINANCE12_ALPHA12, GL_LUMINANCE16_ALPHA16, GL_INTENSIT...
target Specifies the target texture. Must be GL_TEXTURE_1D. internalFormat Requests the internal storage format of the texture image. Must be 1, 2, 3, 4, or one of the following symbolic constants: GL_ALPHA, GL_ALPHA4, GL_ALPHA8, GL_ALPHA12, GL_ALPHA16, GL_LUMINANCE, GL_LUMINANCE4, GL_LUMINANCE8, GL_LUMINANCE12, GL_LUMINANCE16, GL_LUMINANCE_ALPHA, GL_LUMINANCE4_ALPHA4, GL_LUMINANCE6_ALPHA2, GL_LUMINANCE8_ALPHA8, GL_LUMINANCE12_ALPHA4, GL_LUMINANCE12_ALPHA12, GL_LUMINANCE16_ALPHA16, GL_INTENSITY,...
target Specifies the target texture. Must be GL_TEXTURE_2D. internalFormat Requests the internal storage format of the texture image. Must be 1, 2, 3, 4, or one of the following symbolic constants: GL_ALPHA, GL_ALPHA4, GL_ALPHA8, GL_ALPHA12, GL_ALPHA16, GL_LUMINANCE, GL_LUMINANCE4, GL_LUMINANCE8, GL_LUMINANCE12, GL_LUMINANCE16, GL_LUMINANCE_ALPHA, GL_LUMINANCE4_ALPHA4, GL_LUMINANCE6_ALPHA2, GL_LUMINANCE8_ALPHA8, GL_LUMINANCE12_ALPHA4, GL_LUMINANCE12_ALPHA12, GL_LUMINANCE16_ALPHA16, GL_INTENSITY,...
target Specifies the target texture. Must be GL_TEXTURE_2D. internalFormat Requests the internal storage format of the texture image. Must be 1, 2, 3, 4, or one of the following symbolic constants: GL_ALPHA, GL_ALPHA4, GL_ALPHA8, GL_ALPHA12, GL_ALPHA16, GL_LUMINANCE, GL_LUMINANCE4, GL_LUMINANCE8, GL_LUMINANCE12, GL_LUMINANCE16, GL_LUMINANCE_ALPHA, GL_LUMINANCE4_ALPHA4, GL_LUMINANCE6_ALPHA2, GL_LUMINANCE8_ALPHA8, GL_LUMINANCE12_ALPHA4, GL_LUMINANCE12_ALPHA12, GL_LUMINANCE16_ALPHA16, GL_INTENSITY,...
target Specifies the target texture. Must be GL_TEXTURE_3D. internalFormat Requests the internal storage format of the texture image. Must be 1, 2, 3, 4, or one of the following symbolic constants: GL_ALPHA, GL_ALPHA4, GL_ALPHA8, GL_ALPHA12, GL_ALPHA16, GL_LUMINANCE, GL_LUMINANCE4, GL_LUMINANCE8, GL_LUMINANCE12, GL_LUMINANCE16, GL_LUMINANCE_ALPHA, GL_LUMINANCE4_ALPHA4, GL_LUMINANCE6_ALPHA2, GL_LUMINANCE8_ALPHA8, GL_LUMINANCE12_ALPHA4, GL_LUMINANCE12_ALPHA12, GL_LUMINANCE16_ALPHA16, GL_INTENSITY,...
target Specifies the target texture. Must be GL_TEXTURE_3D. internalFormat Requests the internal storage format of the texture image. Must be 1, 2, 3, 4, or one of the following symbolic constants: GL_ALPHA, GL_ALPHA4, GL_ALPHA8, GL_ALPHA12, GL_ALPHA16, GL_LUMINANCE, GL_LUMINANCE4, GL_LUMINANCE8, GL_LUMINANCE12, GL_LUMINANCE16, GL_LUMINANCE_ALPHA, GL_LUMINANCE4_ALPHA4, GL_LUMINANCE6_ALPHA2, GL_LUMINANCE8_ALPHA8, GL_LUMINANCE12_ALPHA4, GL_LUMINANCE12_ALPHA12, GL_LUMINANCE16_ALPHA16, GL_INTENSITY,...
quad Specifies the quadrics object (created with gluNewQuadric). base Specifies the radius of the cylinder at z = 0. top Specifies the radius of the cylinder at z = height. height Specifies the height of the cylinder. slices Specifies the number of subdivisions around the z axis. stacks Specifies the number of subdivisions along the z axis.
quad Specifies the quadrics object (created with gluNewQuadric). inner Specifies the inner radius of the disk (may be 0). outer Specifies the outer radius of the disk. slices Specifies the number of subdivisions around the z axis. loops Specifies the number of concentric rings about the origin into which the disk is subdivided.
nurb Specifies the NURBS object (created with gluNewNurbsRenderer). property Specifies the property whose value is to be fetched. Valid values are GLU_CULLING, GLU_SAMPLING_TOLERANCE, GLU_DISPLAY_MODE, GLU_AUTO_LOAD_MATRIX, GLU_PARAMETRIC_TOLERANCE, GLU_SAMPLING_METHOD, GLU_U_STEP, GLU_V_STEP and GLU_NURBS_MODE. data Specifies a pointer to the location into which the value of the named property is written....
tess Specifies the tessellation object (created with gluNewTess). which Specifies the property whose value is to be fetched. Valid values are GLU_TESS_WINDING_RULE, GLU_TESS_BOUNDARY_ONLY, and GLU_TESS_TOLERANCE. data Specifies a pointer to the location into which the value of the named property is written.
nurb Specifies the NURBS object (created with gluNewNurbsRenderer). model Specifies a modelview matrix (as from a glGetFloatv call). perspective Specifies a projection matrix (as from a glGetFloatv call). view Specifies a viewport (as from a glGetIntegerv call).
eyeX, eyeY, eyeZ Specifies the position of the eye point. centerX, centerY, centerZ Specifies the position of the reference point. upX, upY, upZ Specifies the direction of the up vector.
gluNewNurbsRenderer creates and returns a pointer to a new NURBS object. This object must be referred to when calling NURBS rendering and control functions. A return value of 0 means that there is not enough memory to allocate the object.
gluNewQuadric creates and returns a pointer to a new quadrics object. This object must be referred to when calling quadrics rendering and control functions. A return value of 0 means that there is not enough memory to allocate the object.
gluNewTess creates and returns a pointer to a new tessellation object. This object must be referred to when calling tessellation functions. A return value of 0 means that there is not enough memory to allocate the object.
tess Specifies the tessellation object (created with gluNewTess). type Specifies the type of the contour being defined. Valid values are GLU_EXTERIOR, GLU_INTERIOR, GLU_UNKNOWN, GLU_CCW, and GLU_CW.
nurb Specifies the NURBS object (created with gluNewNurbsRenderer). which Specifies the callback being defined. Valid values are GLU_NURBS_BEGIN, GLU_NURBS_VERTEX, GLU_NURBS_NORMAL, GLU_NURBS_COLOR, GLU_NURBS_TEXTURE_COORD, GLU_NURBS_END, GLU_NURBS_BEGIN_DATA, GLU_NURBS_VERTEX_DATA, GLU_NURBS_NORMAL_DATA, GLU_NURBS_COLOR_DATA, GLU_NURBS_TEXTURE_COORD_DATA, GLU_NURBS_END_DATA, and GLU_NURBS_ERROR. CallBackFunc Specifies the function that the callback calls....
nurb Specifies the NURBS object (created with gluNewNurbsRenderer). knotCount Specifies the number of knots in knots. knotCount equals the number of control points plus the order. knots Specifies an array of knotCount nondecreasing knot values. stride Specifies the offset (as a number of single-precision floating-point values) between successive curve control points. control Specifies a pointer to an array of control points. The coordinates must agree with type, specified below. order Specifies ...
nurb Specifies the NURBS object (created with gluNewNurbsRenderer). property Specifies the property to be set. Valid values are GLU_SAMPLING_TOLERANCE, GLU_DISPLAY_MODE, GLU_CULLING, GLU_AUTO_LOAD_MATRIX, GLU_PARAMETRIC_TOLERANCE, GLU_SAMPLING_METHOD, GLU_U_STEP, GLU_V_STEP, or GLU_NURBS_MODE. value Specifies the value of the indicated property. It may be a numeric value, or one of GLU_OUTLINE_POLYGON, GLU_FILL, GLU_OUTLINE_PATCH, GL_TRUE, GL_FALSE, GLU_PATH_LENGTH, GLU_PARAMETRIC_ERROR, GLU_DOM...
nurb Specifies the NURBS object (created with gluNewNurbsRenderer). sKnotCount Specifies the number of knots in the parametric u direction. sKnots Specifies an array of sKnotCount nondecreasing knot values in the parametric u direction. tKnotCount Specifies the number of knots in the parametric v direction. tKnots Specifies an array of tKnotCount nondecreasing knot values in the parametric v direction. sStride Specifies the offset (as a number of single-precision floating point values) between s...
left, right Specify the coordinates for the left and right vertical clipping planes. bottom, top Specify the coordinates for the bottom and top horizontal clipping planes.
quad Specifies a quadrics object (created with gluNewQuadric). inner Specifies the inner radius of the partial disk (can be 0). outer Specifies the outer radius of the partial disk. slices Specifies the number of subdivisions around the z axis. loops Specifies the number of concentric rings about the origin into which the partial disk is subdivided. start Specifies the starting angle, in degrees, of the disk portion. sweep Specifies the sweep angle, in degrees, of the disk portion....
fovy Specifies the field of view angle, in degrees, in the y direction. aspect Specifies the aspect ratio that determines the field of view in the x direction. The aspect ratio is the ratio of x (width) to y (height). zNear Specifies the distance from the viewer to the near clipping plane (always positive). zFar Specifies the distance from the viewer to the far clipping plane (always positive).
x, y Specify the center of a picking region in window coordinates. delX, delY Specify the width and height, respectively, of the picking region in window coordinates. viewport Specifies the current viewport (as from a glGetIntegerv call).
objX, objY, objZ Specify the object coordinates. model Specifies the current modelview matrix (as from a glGetDoublev call). proj Specifies the current projection matrix (as from a glGetDoublev call). view Specifies the current viewport (as from a glGetIntegerv call). winX, winY, winZ Return the computed window coordinates.
nurb Specifies the NURBS object (created with gluNewNurbsRenderer). count Specifies the number of points on the curve. data Specifies an array containing the curve points. stride Specifies the offset (a number of single-precision floating-point values) between points on the curve. type Specifies the type of curve. Must be either GLU_MAP1_TRIM_2 or GLU_MAP1_TRIM_3.
quad Specifies the quadrics object (created with gluNewQuadric). which Specifies the callback being defined. The only valid value is GLU_ERROR. CallBackFunc Specifies the function to be called.
quad Specifies the quadrics object (created with gluNewQuadric). draw Specifies the desired draw style. Valid values are GLU_FILL, GLU_LINE, GLU_SILHOUETTE, and GLU_POINT.
quad Specifes the quadrics object (created with gluNewQuadric). normal Specifies the desired type of normals. Valid values are GLU_NONE, GLU_FLAT, and GLU_SMOOTH.
quad Specifies the quadrics object (created with gluNewQuadric). orientation Specifies the desired orientation. Valid values are GLU_OUTSIDE and GLU_INSIDE.
format Specifies the format of the pixel data. The following symbolic values are valid: GL_COLOR_INDEX, GL_STENCIL_INDEX, GL_DEPTH_COMPONENT, GL_RED, GL_GREEN, GL_BLUE, GL_ALPHA, GL_RGB, GL_RGBA, GL_BGR, GL_BGRA, GL_LUMINANCE, and GL_LUMINANCE_ALPHA. wIn, hIn Specify in pixels the width and height, respectively, of the source image. typeIn Specifies the data type for dataIn. Must be one of GL_UNSIGNED_BYTE, GL_BYTE, GL_BITMAP, GL_UNSIGNED_SHORT, GL_SHORT, GL_UNSIGNED_INT, GL_INT, GL_FLOAT, GL_UN...
quad Specifies the quadrics object (created with gluNewQuadric). radius Specifies the radius of the sphere. slices Specifies the number of subdivisions around the z axis (similar to lines of longitude). stacks Specifies the number of subdivisions along the z axis (similar to lines of latitude).
tess Specifies the tessellation object (created with gluNewTess). which Specifies the callback being defined. The following values are valid: GLU_TESS_BEGIN, GLU_TESS_BEGIN_DATA, GLU_TESS_EDGE_FLAG, GLU_TESS_EDGE_FLAG_DATA, GLU_TESS_VERTEX, GLU_TESS_VERTEX_DATA, GLU_TESS_END, GLU_TESS_END_DATA, GLU_TESS_COMBINE, GLU_TESS_COMBINE_DATA, GLU_TESS_ERROR, and GLU_TESS_ERROR_DATA. CallBackFunc Specifies the function to be called....
tess Specifies the tessellation object (created with gluNewTess). valueX Specifies the first component of the normal. valueY Specifies the second component of the normal. valueZ Specifies the third component of the normal.
tess Specifies the tessellation object (created with gluNewTess). which Specifies the property to be set. Valid values are GLU_TESS_WINDING_RULE, GLU_TESS_BOUNDARY_ONLY, GLU_TESS_TOLERANCE. data Specifies the value of the indicated property.
tess Specifies the tessellation object (created with gluNewTess). location Specifies the location of the vertex. data Specifies an opaque pointer passed back to the program with the vertex callback (as specified by gluTessCallback).
winX, winY, winZ Specify the window coordinates to be mapped. model Specifies the modelview matrix (as from a glGetDoublev call). proj Specifies the projection matrix (as from a glGetDoublev call). view Specifies the viewport (as from a glGetIntegerv call). objX, objY, objZ Returns the computed object coordinates.
winX, winY, winZ Specify the window coordinates to be mapped. clipW Specify the clip w coordinate to be mapped. model Specifies the modelview matrix (as from a glGetDoublev call). proj Specifies the projection matrix (as from a glGetDoublev call). view Specifies the viewport (as from a glGetIntegerv call). near, far Specifies the near and far planes (as from a glGetDoublev call). objX, objY, objZ, objW Returns the computed object coordinates....
x, y, z, w Specify x, y, z, and w coordinates of a vertex. Not all parameters are present in all forms of the command. Page 1 glVertex(3G) OpenGL Reference glVertex(3G)
size Specifies the number of coordinates per vertex; must be 2, 3, or 4. The initial value is 4. type Specifies the data type of each coordinate in the array. Symbolic constants GL_SHORT, GL_INT, GL_FLOAT, and GL_DOUBLE are accepted. The initial value is GL_FLOAT. stride Specifies the byte offset between consecutive vertices. If stride is 0, the vertices are understood to be tightly packed in the array. The initial value is 0. pointer Specifies a pointer to the first coordinate of the first vert...
size Specifies the number of coordinates per vertex, must be 2,3, or 4. type Specifies the data type of each coordinate in the array. Symbolic constants GL_SHORT, GL_INT, GL_FLOAT, or GL_DOUBLE_EXT are accepted. stride Specifies the byte offset between consecutive vertices. If stride is 0 the vertices are understood to be tightly packed in the array. count Specifies the number of vertices, counting from the first, that are static. pointer Specifies a pointer to the first coordinate of the first ...
x, y Specify the lower left corner of the viewport rectangle, in pixels. The initial value is (0,0). width, height Specify the width and height of the viewport. When a GL context is first attached to a window, width and height are set to the dimensions of that window.
dpy A connection to an X server. pbuffer The GLX pixel buffer target of the associate operation. params A parameter list that describes the format of the images in the DMbuffer that is to be associated with the pixel buffer. dmbuffer The DMbuffer that will be used as the front left color buffer.
dpy Specifies the connection to the X server. screen Specifies the screen of the X server. channel Specifies the video channel number. window Specifies the window that is to be bound to channel
dpy Specifies the connection to the X server. screen Specifies the screen of the X server. channel Specifies the video channel number. x, y, w, h The origin and size of the area of the window that will be converted to the output resolution of the video channel. (x,y) is relative to the bottom left corner of channel specified by the current video combination.
dpy Specifies the connection to the X server. screen Specifies the screen of the X server. channel Specifies the video channel number. synctype Specifies if video input area is updated on swap buffer or frame boundaries, use one of the following constants GLX_SYNC_SWAP_SGIX GLX_SYNC_FRAME_SGIX
dpy Specifies the connection to the X server. screen Specifies the screen number. attribList Specifies a list of attribute/value pairs. The last attribute must be None. nitems Returns the number of elements in the list returned by glXChooseFBConfig.
dpy Specifies the connection to the X server. screen Specifies the screen number. attrib_list Specifies a list of attribute/value pairs. The last attribute must be None. nitems Returns the number of elements in the list returned by glXChooseFBConfigSGIX.
dpy Specifies the connection to the X server. screen Specifies the screen number. attribList Specifies a list of boolean attributes and integer attribute/value pairs. The last attribute must be None.
dpy Specifies the connection to the X server. src Specifies the source context. dst Specifies the destination context. mask Specifies which portions of src state are to be copied to dst.
dpy Specifies the connection to the X server. vis Specifies the visual that defines the frame buffer resources available to the rendering context. It is a pointer to an XVisualInfo structure, not a visual ID or a pointer to a Visual. shareList Specifies the context with which to share display lists. NULL indicates that no sharing is to take place. direct Specifies whether rendering is to be done with a direct connection to the graphics system if possible (True) or through the X server (False)....
dpy Specifies the connection to the X server. config Specifies the GLX frame buffer configuration that defines the frame buffer resources available to the rendering context. render_type Specifies the type of rendering context desired. Must be one of GLX_RGBA_TYPE_SGIX or GLX_COLOR_INDEX_TYPE_SGIX. share_list Specifies the context with which to share display lists and texture objects. NULL indicates that no sharing is to take place. direct Specifies whether rendering is to be done with a direct c...
dpy Specifies the connection to the X server. config Specifies the GLXFBConfig that defines the configuration of the pixel buffer. width Specifies the width of the pixel buffer. height Specifies the height of the pixel buffer. attrib_list Specifies the attributes for the pixel buffer.
dpy Specifies the connection to the X server. vis Specifies the visual that defines the structure of the rendering area. It is a pointer to an XVisualInfo structure, not a visual ID or a pointer to a Visual. pixmap Specifies the X pixmap that will be used as the front left color buffer of the off-screen rendering area.
dpy Specifies the connection to the X server. config Specifies the GLX frame buffer configuration that defines the structure of the rendering area. pixmap Specifies the X pixmap that will be used as the front left color buffer of the off-screen rendering area.
dpy A connection to an X server. screen The X screen number of the screen on which the GLX video source should be created. svr A connection to a Video Library video server. path A Video Library video transfer path. nodeClass The class of the VLNode specified by node. node A VLNode which must be a VL_DRAIN node on the video transfer path path.
dpy Specifies the connection to the X server. config Specifies the GLXFBConfig structure with the desired attributes for the context. render_type Specifies the type of the context to be created. Must be one of GLX_RGBA_TYPE or GLX_COLOR_INDEX_TYPE. share_list Specifies the context with which to share display lists. NULL indicates that no sharing is to take place. share_list Specifies whether rendering is to be done with a direct connection to the graphics system if possible (True) or through the...
dpy Specifies the connection to the X server. config Specifies a GLXFBConfig structure with the desired attributes for the window. attrib_list Specifies a list of attribute value pairs, which must be terminated with None, or NULL. Accepted attributes are GLX_PBUFFER_WIDTH, GLX_PBUFFER_HEIGHT, GLX_PRESERVED_CONTENTS, and GLX_LARGEST_PBUFFER.
dpy Specifies the connection to the X server. config Specifies a GLXFBConfig structure with the desired attributes for the rendering area. pixmap Specifies the X pixmap to be used as the rendering area. attrib_list Currently unused. This must be set to NULL, or be an empty list (i.e., one in which the first element is None).
dpy Specifies the connection to the X server. config Specifies a GLXFBConfig structure with the desired attributes for the window. win Specifies the X window to be used as the rendering area. attrib_list Currently unused. This must be set to NULL, or be an empty list (i.e. one in which the first element is None).
GLXgetconfig takes the display, screen, and configuration information and returns the data needed to create and render GL into an X window. The "sdesc" input parameter is a null terminated array of "GLXconfig" triples, describing the configuration needed for GL rendering. The return value is a complete description of the actual configuration available. This is useful to check what configuration was available, but it is also needed as an argument to GLXlink(3G). It can be freed with free(3) w...
GLXgetconfig takes the display, screen, and configuration information and returns the data needed to create and render GL into an X window. The "sdesc" input parameter is a null terminated array of "GLXconfig" triples, describing the configuration needed for GL rendering. The return value is a complete description of the actual configuration available. This is useful to check what configuration was available, but it is also needed as an argument to GLXlink(3G). It can be freed with free(3) w...
glXGetCurrentContext returns the current context, as specified by glXMakeCurrent. If there is no current context, NULL is returned. glXGetCurrentContext returns client-side information. It does not make a round trip to the server.
glXGetCurrentDisplay returns the display for the current context. If no context is current, NULL is returned. glXGetCurrentDisplay returns client-side information. It does not make a round-trip to the server, and therefore does not flush any pending events.
If there is no current context glXGetCurrentDisplayEXT returns NULL; otherwise, the display for the current context is returned. The display parameter specifies the X connection for which the context was created. No round trip is forced to the server. Unlike most X calls that return a value, glXGetCurrentDisplayEXT does not flush any pending events.
glXGetCurrentDrawable returns the current drawable, as specified by glXMakeCurrent or by the draw parameter of glXMakeCurrentReadSGI. If there is no current drawable, None is returned. glXGetCurrentDrawable returns client-side information. It does not make a round trip to the server.
glXGetCurrentReadDrawable returns the current read drawable, as specified by read parameter of glXMakeContextCurrent. If there is no current drawable, None is returned. glXGetCurrentReadDrawable returns client-side information. It does not make a round-trip to the server.
dpy Specifies the connection to the X server. config Specifies the GLX frame buffer configuration to be queried. attribute Specifies the attribute to be returned. value Returns the requested value.
dpy Specifies the connection to the X server. config Specifies the GLX frame buffer configuration to be queried. attribute Specifies the attribute to be returned. value Returns the requested value.
dpy Specifies the connection to the X server. vis Specifies the visual that defines the frame buffer resources. It is a pointer to an XVisualInfo structure, not a visual ID or a pointer to a Visual.
dpy Specifies the connection to the X server. drawable Specifies a GLX drawable. Must be a GLX pixel buffer or a window. event_mask Returns the events that are selected for drawable.
dpy Specifies the connection to the X server. drawable Specifies a GLX drawable. Must be a GLX pixel buffer or a window. mask Returns the events which are selected for drawable.
dpy Specifies the connection to the X server. networkId Specifies the physical hyperpipe network id. npipes Specifies the number of pipes in the configuration. cfg An array of participating pipes. hpId Returns the hyperpipe id assigned to this configuration.
Below is a minimal example of creating an RGBA-format, X window that's compatible with OpenGL using GLX 1.3 commands. The window is cleared to yellow when the program runs. The program does minimal error checking; all return values should be checked. #include #include #include #include int singleBufferAttributess[] = { GLX_DRAWABLE_TYPE, GLX_WINDOW_BIT, GLX_RENDER_TYPE, GLX_RGBA_BIT, GLX_RED_SIZE, 1, /* Request a single buffered color buffer */ GLX_GREE...
dpy Specifies the connection to the X server. drawable Specifies the GLX drawable to be added to the swap group. member Specifies a GLX drawable already in the swap group.
Call GLXlink to inform the GL that you intend to render GL into an X window. The "conf" argument should be the same argument which was returned from GLXgetconfig. The entries with "mode" of GLX_WINDOW in the "conf" array must have the value field set to the X window id's of the windows which were created.
dpy Specifies the connection to the X server. draw Specifies a GLX drawable that to render into. Must be an XID representing a GLXWindow, GLXPixmap, or GLXPbuffer. read Specifies a GLX drawable that to read from. Must be an XID representing a GLXWindow, GLXPixmap, or GLXPbuffer. gc Specifies the GLX context to be bound to read and gc.
dpy Specifies the connection to the X server. drawable Specifies a GLX drawable. Must be either an X window ID or a GLX pixmap ID. ctx Specifies a GLX rendering context that is to be attached to drawable.
dpy Specifies the connection to the X server. draw A GLX drawable that receives the results of OpenGL drawing operations. read A GLX drawable that provides pixels for glReadPixels and glCopyPixels operations. gc A GLX rendering context to be attached to draw and read.
dpy Specifies the connection to the X server. screen Specifies the screen of the X server. channel Specifies the video channel number. dx, dy, dw, dh Precision deltas for the origin and size of the area specified by glXChannelRectSGIX
dpy Specifies the connection to the X server. screen Specifies the screen of the X server. channel Specifies the video channel number. x, y, w, h The origin and size of the area of the frame buffer that is being converted to the output resolution of the video channel. (x,y) is relative to the bottom left corner of channel as specified by the current video combination.
dpy Specifies the connection to the X server. ctx Specifies a GLX rendering context. attribute Specifies that a context parameter should be retrieved. Must be one of GLX_FBCONFIG_ID, GLX_RENDER_TYPE, or GLX_SCREEN. value Contains the return value for attribute.
dpy Specifies the connection to the X server. ctx Specifies a GLX rendering context. attribute Specifies the context attribute to be returned. value Returns the requested value.
dpy Specifies the connection to the X server. draw Specifies the GLX drawable to be queried. attribute Specifies the attribute to be returned. value Returns the requested value.
dpy Specifies the connection to the X server. errorBase Returns the base error code of the GLX server extension. eventBase Returns the base event code of the GLX server extension.
dpy Specifies the connection to the X server. pbuf Specifies the GLX pixel buffer to be queried. attribute Specifies the attribute to be returned. value Returns the requested value.
dpy Specifies the connection to the X server. hpId The hyperpipe id to be queried. Hyperpipe ids are assigned incrementally starting from 0. npipes Returns the number of elements in the array GLXHyperpipeConfigSGIX *.
dpy Specifies the connection to the X server. screen Specifies the screen number. name Specifies which string is returned: one of GLX_VENDOR, GLX_VERSION, or GLX_EXTENSIONS.
dpy Specifies the connection to the X server. major Returns the major version number of the GLX server extension. minor Returns the minor version number of the GLX server extension.
dpy Specifies the connection to the X server. drawable Specifies a GLX drawable. Must be a GLX pixel buffer or a window. event_mask Specifies the events to be returned for drawable.
dpy Specifies the connection to the X server. drawable Specifies a GLX drawable. Must be a GLX pixel buffer or a window. mask Specifies the events to returned for drawable.
When GLXlink is called, a certain amount of system resources are allocated to support GL rendering in that window. When all rendering to that window is finished, calling GLXunlink will release those resources. The "xWindow" argument to GLXunlink should be the GLX_NORMAL window. Once the normal window is unlinked, any windows which were also linked to auxiliary (i.e. popup or overlay) GLXunlink is a signal that you never intend to do GL drawing in that window again. If more drawing will be done...
font Specifies the font from which character glyphs are to be taken. first Specifies the index of the first glyph to be taken. count Specifies the number of glyphs to be taken. listBase Specifies the index of the first display list to be generated.
GL rendering calls made prior to glXWaitGL are guaranteed to be executed before X rendering calls made after glXWaitGL. Although this same result can be achieved using glFinish, glXWaitGL does not require a round trip to the server, and it is therefore more efficient in cases where client and server are on separate machines. glXWaitGL is ignored if there is no current GLX context.
divisor remainder glXWaitVideoSyncSGI puts the calling process to sleep until the value of the vertical retrace counter modulo divisor equals remainder. count Pointer to variable which receives the value of the vertical retrace counter when the calling process wakes up.
X rendering calls made prior to glXWaitX are guaranteed to be executed before GL rendering calls made after glXWaitX. Although the same result can be achieved using XSync, glXWaitX does not require a round trip to the server, and it is therefore more efficient in cases where client and server are on separate machines. glXWaitX is ignored if there is no current GLX context.
If GLXwinset succeeds, all subsequent GL rendering calls will occur in "xWindow." If the window is on a remote machine, the DGL will be used to do the drawing. All GL rendering and display list commands will work in the window. gconfig(3G) will have no effect in this window. GLXlink(3G) is used instead to pre-configure the window. drawmode(3G) is also illegal, but by asking for overlay planes with GLXgetconfig(3G), and linking in an overlay window with GLXlink(3G), GLXwinset will draw into the...
gmatch checks whether the null-terminated string str matches the nullterminated pattern string pattern. See the sh(1) section ``File Name Generation'' for a discussion of pattern matching. gmatch returns nonzero if the pattern matches the string, zero if the pattern doesn't. A backslash (`\') is used as an escape character in pattern strings.
This command implements simple pointer and keyboard grabs for Tk. Tk's grabs are different than the grabs described in the Xlib documentation. When a grab is set for a particular window, Tk restricts all pointer events to the grab window and its descendants in Tk's window hierarchy. Whenever the pointer is within the grab window's subtree, the pointer will behave exactly the same as if there had been no grab at all and all events will be reported in the normal fashion. When the pointer is out...
The function grantpt changes the mode and ownership of the slave pseudoterminal device associated with its master pseudo-terminal counter part. fildes is the file descriptor returned from a successful open of the master pseudo-terminal device. A setuid root program [see setuid(2)] is invoked to change the permissions. The user ID of the slave is set to the effective owner of the calling process and the group ID is set to a reserved group. ...
red expects a pointer to the location into which you want the system to copy the current red value. green expects a pointer to the location into which you want the system to copy the current green value. blue expects a pointer to the location into which you want the system to copy the current blue value.
This routine is obsolete. It continues to function only on IRIS-4D B and G models to provide backwards compatibility. All new development should use its replacement, getcursor.
redm expects a pointer to the location into which you want the system to copy the current red writemask value. greenm expects a pointer to the location into which you want the system to copy the current green writemask value. bluem expects a pointer to the location into which you want the system to copy the current blue writemask value.
grio_action_list tries to atomically execute a list of bandwidth reserve/unreserve actions as specified in grior_list. num is the total number of actions in the list. The actions are considered to be atomic in the sense that all the actions in the list are executed together. No other action can interfere with the actions in the list once the first action in the list has been initiated. The contents of the list of structures pointed to by grior_list includes the following members: gr_action The t...
grio_associate_file marks the file indicated by fd so that when the current process accesses the file it will receive the I/O at the rate guaranteed by the grio stream stream_id.
grio_query_fs returns the amount of bandwidth available on the file system specified by fs_dev. This bandwidth is expressed as the number of bytes per second that the file system can provide. This ratio can be used as a quick check to determine if the desired bandwidth will be available from a given file system, before calling grio_reserve_file(3X) or grio_reserve_fs(3X). The ggd daemon is queried about the remaining file system bandwidth....
grio_reserve_file tries to obtain the I/O-rate guarantee specified by the griop structure on the file associated with fd. The contents of the structure pointed to by griop includes the following members: gr_start Start time of the guarantee in seconds since January 1, 1970. gr_duration Duration of the guarantee in seconds. gr_optime The length of the rate guarantee time quantum in microseconds. gr_opsize The amount of data guaranteed to be read/written within the time quantum. gr_stream_id This ...
grio_reserve_fs tries to obtain the I/O-rate guarantee specified by the griorp structure on the file system built on the device specified by fs_dev. The contents of the structure pointed to by griorp includes the following members: gr_start Start time of the guarantee in seconds since January 1, 1970. gr_duration Duration of the guarantee in seconds. gr_optime The length of the rate guarantee time quantum in microseconds. gr_opsize The amount of data guaranteed to be read/written within the time...
buffer expects the buffer into which you want the system to save the contents of the names stack. A name is a 16-bit number, that you load on the name stack just before you called a drawing routine. numname expects the maximum number of names that you want the system to save. This number must not exceed the number of elements in buffer.
v expects a pointer to the location into which to copy a string. Reserve at least a 12 character buffer. FUNCTION RETURN VALUE There is no longer any use for the returned value of this function; it will always be zero.
These functions provide a way to perform certain filesystem operations without using a file descriptor to access filesystem objects. They are intended for use by a limited set of system utilities such as backup programs. They are supported only by the XFS filesystem. Device management capabilities or root privileges are required to use open_by_handle() readlink_by_handle(), attr_multi_by_handle(), attr_list_by_handle(), and fssetdm_by_handle(). Link with the -ldm library to access these function...
The Tcl handle facility provides a way to manage table entries that may be referenced by a textual handle from Tcl code. This is provided for applications that need to create data structures in one command, return a reference (i.e. pointer) to that particular data structure and then access that data structure in other commands. An example application is file handles. Page 1 Handles(3Tcl) Handles(3Tcl) A handle consists of a base name, which is some unique, meaningful name, such as `file' and a ...
Tcl_HashTable *tablePtr (in) Address of hash table structure (for all procedures but Tcl_InitHashTable, this must have been initialized by previous call to Tcl_InitHashTable). int keyType (in) Kind of keys to use for new hash table. Must be either TCL_STRING_KEYS, TCL_ONE_WORD_KEYS, or an integer value greater than 1. Page 1 Tcl_Hash(3Tcl) Tcl_Hash(3Tcl) char *key (in) Key to use for probe into table. Exact form depends on keyType used to create table. int *newPtr (out) The word at *newPtr is se...
Tcl_HashTable *tablePtr (in) Address of hash table structure (for all procedures but Tcl_InitHashTable, this must have been initialized by previous call to Tcl_InitHashTable). int keyType (in) Kind of keys to use for new hash table. Must be either TCL_STRING_KEYS, TCL_ONE_WORD_KEYS, or an integer value greater than 1. Page 1 Tcl_Hash(3Tcl) Tcl_Hash(3Tcl) char *key (in) Key to use for probe into table. Exact form depends on keyType used to create table. int *newPtr (out) The word at *newPtr is se...
zhemm and chemm perform one of the matrix-matrix operations C := alpha*A*B + beta*C, or C := alpha*B*A + beta*C, where alpha and beta are scalars, A is an hermitian matrix and B and C are m by n matrices.
zher2k and cher2k perform one of the hermitian rank 2k operations C := alpha*A*conjg( B' ) + conjg( alpha )*B*conjg( A' ) + beta*C, or C := alpha*conjg( A' )*B + conjg( alpha )*conjg( B' )*A + beta*C, where alpha and beta are scalars with beta real, C is an n by n hermitian matrix and A and B are n by k matrices in the first case and k by n matrices in the second case. Page 1 _HER2K(3F) _HER2K(3F) PARAMETERS uplo On entry, uplo specifies whether the matrix is an upper or lower triangular mat...
zherk and cherk perform one of the matrix-matrix operations C := alpha*A*conjg( A' ) + beta*C, or C := alpha*conjg( A' )*A + beta*C, where alpha and beta are real scalars, C is an n by n hermitian matrix and A is an n by k matrix in the first case and a k by n matrix in the second case. Page 1 _HERK(3F) _HERK(3F)
op one of the symbolic constants: (parameters that affect lrectread, lrectwrite, rectcopy pixel transfers) HIST_ENABLE, default value:0. Enable hgram in lrectread, lrectwrite and rectcopy pixel transfers. Value specifies the number of equally spaced bins in the histogram. Valid values: 1 to 4096. HIST_DISABLE, disable hgram. HIST_CLEAR, clear every histogram bin to value value specifies the number of equally spaced bins in histogram if op is HIST_ENABLE. Valid values: 1 to 4096. specifies the va...
The history command performs one of several operations related to recently-executed commands recorded in a history list. Each of these recorded commands is referred to as an ``event''. When specifying an event to the history command, the following forms may be used: [1] A number: if positive, it refers to the event with that number (all events are numbered starting at 1). If the number is negative, it selects an event relative to the current event (-1 refers to the previous event, -2 to the on...
On INPUT NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix. LOW and IGH are integers determined by the balancing subroutine BALANC. If BALANC has not been used, set LOW=1, IGH=N. H contains the upper Hessenberg matrix. Information about the transformations used in the reduction to Hessenberg form by ELMHES or ORTHES, if performed, is stored in the remaining triangle under the Hessenberg mat...
On INPUT NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix. LOW and IGH are integers determined by the balancing subroutine BALANC. If BALANC has not been used, set LOW=1, IGH=N. H contains the upper Hessenberg matrix. Z contains the transformation matrix produced by ELTRAN after the reduction by ELMHES, or by ORTRAN after the reduction by ORTHES, if performed. If the eigenvectors of the He...
hsearch is a hash-table search routine generalized from Knuth (6.4) Algorithm D. It returns a pointer into a hash table indicating the location at which an entry can be found. The comparison function used by hsearch is strcmp [see string(3C)]. item is a structure of type ENTRY (defined in the search.h header file) containing two pointers: item.key points to the comparison key, and...
On INPUT NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix. A contains information about the unitary transformations used in the reduction by HTRID3. TAU contains further information about the transformations. M IS the number of eigenvectors to be back transformed. ZR contains the eigenvectors to be back transformed in its first M columns. On OUTPUT ZR and ZI contain the real and imaginary ...
On INPUT NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix. AR and AI contain information about the unitary trans- formations used in the reduction by HTRIDI in their full lower triangles except for the diagonal of AR. TAU contains further information about the transformations. M is the number of eigenvectors to be back transformed. ZR contains the eigenvectors to be back transformed in its...
On INPUT NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix. A contains the lower triangle of the complex hermitian input matrix. The real parts of the matrix elements are stored in the full lower triangle of A, and the imaginary parts are stored in the transposed positions of the strict upper triangle of A. No storage is required for the zero imaginary parts of the diagonal elements. On OUT...
On INPUT NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix. AR and AI contain the real and imaginary parts, respectively, of the complex hermitian input matrix. Only the lower triangle of the matrix need be supplied. On OUTPUT AR and AI contain information about the unitary trans- formations used in the reduction in their full lower triangles. Their strict upper triangles and the diagonal o...
The main functions are: glXQueryHyperpipeNetworkSGIX - query the physical hyperpipe network. glXHyperpipeConfigSGIX - configure the hyperpipe network. glXQueryHyperpipeConfigSGIX - query a particular hyperpipe configuration. glXDestroyHyperpipeConfigSGIX - destroy a hyperpipe configuration. glXBindHyperpipeSGIX - bind a process and rendering context to a hyperpipe configuration.
hypot(x,y), fhypot(x,y), hypotf(x,y), hypotl(x,y), cabs(x,y), fcabs(x,y), cabsf(x,y), and cabsl(x,y) return sqrt(x*x+y*y) computed in such a way that overflow will not happen, and underflow occurs only if the final result deserves it. fhypot, hypotf, fcabs, and cabsf are the same functions as hypot and cabs but for the float data type. hypotl, and cabsl are the same functions as hypot and cabs but for the long double data type....
This module provides you with objects that will collate according to your national character set, provided that the POSIX setlocale() function is supported on your system. You can compare $s1 and $s2 above with $s1 le $s2 to extract the data itself, you'll need a dereference: $$s1 This module uses POSIX::setlocale(). The basic collation conversion is done by strxfrm() which terminates at NUL characters being a decent C routine. collate_xfrm() handles embedded NUL characters gracefully. The avai...
bool is the general name for the bit field manipulation intrinsic functions and subroutines from the FORTRAN Military Standard (MIL-STD1753). and, or and xor return the value of the binary operations on their arguments. not is a unary operator returning the one's complement of its argument. ior, iand, not, ieor - return the same results as and, or, not, and xor. lshift and rshift return the value of the first argument shifted left or right, respectively, the number of times specified by the sec...
bool is the general name for the bit field manipulation intrinsic functions and subroutines from the FORTRAN Military Standard (MIL-STD1753). and, or and xor return the value of the binary operations on their arguments. not is a unary operator returning the one's complement of its argument. ior, iand, not, ieor - return the same results as and, or, not, and xor. lshift and rshift return the value of the first argument shifted left or right, respectively, the number of times specified by the sec...
bool is the general name for the bit field manipulation intrinsic functions and subroutines from the FORTRAN Military Standard (MIL-STD1753). and, or and xor return the value of the binary operations on their arguments. not is a unary operator returning the one's complement of its argument. ior, iand, not, ieor - return the same results as and, or, not, and xor. lshift and rshift return the value of the first argument shifted left or right, respectively, the number of times specified by the sec...
bool is the general name for the bit field manipulation intrinsic functions and subroutines from the FORTRAN Military Standard (MIL-STD1753). and, or and xor return the value of the binary operations on their arguments. not is a unary operator returning the one's complement of its argument. ior, iand, not, ieor - return the same results as and, or, not, and xor. lshift and rshift return the value of the first argument shifted left or right, respectively, the number of times specified by the sec...
ICMAX1 finds the index of the element whose real part has maximum absolute value. Based on ICAMAX from Level 1 BLAS. The change is to use the 'genuine' absolute value. Contributed by Nick Higham for use with CLACON.
The iconv() converts a string of characters from one codeset, in a input buffer, into a sequence of corresponding characters in another codeset in a output buffer. The cd is a conversion descriptor that was returned by the preceding iconv_open() function call which specifies the correct codeset converter. The inbuf points to a variable that points to the beginning of the input buffer that has the characters to be converted, and the variable pointed by in...
The iconv_close() function deallocates the conversion descriptor cd. It deallocates all other associated resources allocated by iconv_open() also. If a file descriptor is used to implement the type iconv_t, that file descriptor will be closed. The iconv_close() function may fail under the following conditions and set errno to the suitable value. [EBADF] The...
The iconv_open() function returns a conversion descriptor that points to the suitable codeset converter. It describes a conversion from the codeset specified by the string pointed to by the fromcode argument to the codeset specified by the string pointed to by the tocode argument. A conversion descriptor can be used in a process until that process closes it. If a file descriptor is used to implement conversion descriptors, the FD_CLOEXEC flag...
Idate returns the current date in the variables imon, iday, and iyear. The order is: mon, day, year. Month will be in the range 1-12. Year will be returned as the last two digits. Itime returns the current time in iarray. The order is: hour, minute, second.
bool is the general name for the bit field manipulation intrinsic functions and subroutines from the FORTRAN Military Standard (MIL-STD1753). and, or and xor return the value of the binary operations on their arguments. not is a unary operator returning the one's complement of its argument. ior, iand, not, ieor - return the same results as and, or, not, and xor. lshift and rshift return the value of the first argument shifted left or right, respectively, the number of times specified by the sec...
The if command evaluates expr1 as an expression (in the same way that expr evaluates its argument). The value of the expression must be a boolean (a numeric value, where 0 is false and anything is true, or a | string value such as true or yes for true and false or no for false); if it is true then body1 is executed by passing it to the Tcl interpreter. Otherwise expr2 is evaluated as an expression and if it is true then body2 is executed, and so on. If none of the expressions evaluates to true t...
The Image Format Library characterizes images according to the common attributes described in the following sections. Page 3 IFL(3) Image Format Library C++ Reference Manual IFL(3)
This Image Format Library provides support to read/write image files stored in Windows Bitmap Image File (BMP) format. The default extension for image files in the BMP format is '.bmp'. When you create a file with that extension IFL will assume you want the BMP format, unless you override it with the iflFormat parameter. In addition to all the standard iflFile methods, this format supprts an number of format specific operations via the getItem() and setItem() methods. The tag values supported ...
The iflColorModelChans() function is provided to return the number of channels associated with a color model; it is standalone and is not a member function of any object. Given a color model cm, this function returns the number of channels associated with it. For example, for the iflRGB color model, a value of 3 will be returned; for the iflMinWhite color model a value of 1 will be returned. A value of zero is returned if the color model is iflMultiSpectral. The iflColorModelHasAlpha() function ...
These functions operate on IFL data types and are provided for convenience. Each function is standalone and is not a member function of any object. The data types used in the IFL are specified by the enumerated type, iflType, as defined in . The following IFL data types are valid: iflBit, iflUChar, iflChar, iflUShort, iflShort, iflUInt, iflInt, iflFloat, iflDouble. iflDataClosestType() returns the data type closest to the desired type in the set specified by the mask of data type...
These functions are used to report errors and control how those errors are handled in the IFL environment. These facilities can also be used to generate debugging messages. The routines are grouped into three functional areas: error reporting, error handling, and status code translation.
This FIT image file format is an SGI internally-developed format, it was primarly intended as a programming example, but like most image formats has taken on a life of its own. The FIT format supports the full flexibility of the IFL model: all data types, color models, orders, orientations and page sizes are supported. The FIT format can be especially useful with mutli-spectral imagery with large number of channels as it supports paging in the channel dimension. It can also be a handy format for...
The GeoTIFF file format is an extension to the TIFF format. To minimize the amount of recoding needed for existing GeoTIFF applications, access to the GeoTIFF extensions are made through the GTIF structure supplied by the freeware GeoTIFF library. Therefore, the IFL GeoTIFF support consists only of the capability to create GTIF structures from an open iflFile object. iflGTIFNew() GTIF* iflGTIFNew(iflFile* file) Construct a GTIF structure for file. If file is not a TIFF file, then NULL is returne...
This Image Format Library provides support to read/write image files stored in Compuserve Graphics Image File (GIF) format. The default extension for image files in the GIF format is '.gif'. When you create a file with that extension IFL will assume you want the GIF format, unless you override it with the iflFormat parameter. In addition to all the standard iflFile methods, this format supprts an number of format specific operations via the getItem() and setItem() methods. The tag values suppo...
This IFL format provides support for reading and writing image files with the JFIF format, Version 4. This software is based in part on the work of the Independent JPEG Group. This format implements JPEG image compression and decompression. JPEG is intended for compressing "real-world" scenes; cartoons and other non-realistic images are not its strong suit. JPEG is lossy, meaning that the output image is not necessarily identical to the input image. Hence you must not use JPEG if you have to h...
This header defines a set of simple inline functions to determine the minimum or maximum of two input values. iflMin() returns the minimum of a and b. iflMax() returns the maximum of a and b. There are also overloaded versions that return the min of 3 or 4 paramters. Since these are template function they can be used with any data type that < and > make sense on. PPPPaaaaggggeeee 1111...
Movie files consist of image and audio data, which are stored in parallel tracks. A movie file may consist of multiple tracks of data, and each track may contain either image or audio information. A movie file's multi-track structure is very useful in multi-media applications where visual output in one track has to be synchronized with audio output in another. This structure, which allows related data to be grouped together while remaining in separate and distinct tracks, makes movie files a lo...
The Image Format Library (IFL) provides support for reading and writing image files with the National Imagery Transmission Format (NITF), Version 2.0. The format has been designed for transmitting the contents of a briefing boards from one location to another. As such, it contains support for storing both imagery and its annotations. The IFL interface is used to directly access the imagery sections, while the segment interface, described below, is used to access the remaining objects contained w...
The Image Format Library provides support for reading and writing image files with the Portable Network Graphics format (PNG), revision 0.88. This file format is suitable for archiving multicolor and monochromatic image data. As specified by the PNG Compression field, iflPNG can support several compression algorithms. Currently only the zlib deflate/inflate is defined. Note that it is not possible to specify that no compression should be performed but the degree of compression can be controlled ...
This IFL format provides support for reading and writing image files with the Portable Bitmap format (PPM). This file format is suitable for archiving multicolor and monochromatic image data. It includes the formats PPM, PGM, PBM, PNM, RPPM, RPGM, RPBM, and RPNM. The default extensions for image files in the PPM format are '.ppm', When you create a file with one of these extensions IFL will assume you want the PPM format, unless you override it with the iflFormat parameter. In addition to all ...
The Image Format Library provides support for reading and writing image files with the Tag Image File format (TIFF), Revision 6.0. This file format is suitable for archiving multicolor and monochromatic image data. As specified by the TIFF Compression field, iflTIFF supports several compression algorithms, including: no compression, Group 3 Facsimile compression, Group 4 Facsimile compression, Lemple-Ziv & Welch compression, PackBits compression, and JPEG compression. iflTIFF also uses the follo...
These functions operate on various IFL enumerated type values and are provided for convenience. Each function is stand-alone and is not a member function of any object. The enumerated types used in the IFL are defined in . Any values beyond those defined in the header file will be translated as "unknown". To translate an iflDataType value to it's string equivalent, use iflDataTypeName() The IFL data types will be translated as follows: iflBit bit iflUChar unsigned char iflChar...
This Image Format Library provides support to read/write image files stored in YUV format. Supports 8-bit CCIR-601 NSTC/PAL YUV format in fields/frames. The CCIR601 active video sizes supported are: NTSC 720 pixels x 486 lines (frame format) 720 pixels x 243 lines (field format) PAL 720 pixels x 576 lines (frame format) 720 pixels x 288 lines (field format) When creating YUV formatted files, the file name must specify the particular standard to follow and the format for the output image. The for...
ILAENV is called from the LAPACK routines to choose problem-dependent parameters for the local environment. See ISPEC for a description of the parameters. This version provides a set of parameters which should give good, but not optimal, performance on many of the currently available computers. Users are encouraged to modify this subroutine to set the tuning parameters for their particular machine using the option and problem size information in the arguments. This routine will not function corr...
buffers the number of 12bit-per-component screen-sized buffers requested FUNCTION RETURN VALUE The returned value of the function is the number of buffers granted.
aimag returns the imaginary part of its single-precision complex argument. dimag returns the double-precision imaginary part of its double-complex argument. qimag returns the real*16 imaginary part of its complex*32 argument. The generic form imag may be used with impunity as its argument will determine the type of the returned value. PPPPaaaaggggeeee 1111
The image command is used to create, delete, and query images. It can take several different forms, depending on the option argument. The legal forms are: image create type ?name? ?option value ...? Creates a new image and returns its name. type specifies the type of the image, which must be one of the types currently defined (e.g., bitmap). name specifies the name for the image; if it is omitted then Tk picks a name of the form imagex, where x is an integer. There may be any number of option-va...
Tk_ImageMaster imageMaster (in) Token for image, which was passed to image's createProc when the image was created. int x (in) X-coordinate of upper-left corner of region that needs redisplay (measured from upperleft corner of image). int y (in) Y-coordinate of upper-left corner of region that needs redisplay (measured from upperleft corner of image). int width (in) Width of region that needs to be redrawn, in pixels. int height (in) Height of region that needs to be redrawn, in pixels. int ima...
On INPUT N is the order of the matrix. D contains the diagonal elements of the input matrix. E contains the subdiagonal elements of the input matrix in its last N-1 positions. E(1) is arbitrary. On OUTPUT D contains the eigenvalues in ascending order. If an error exit is made, the eigenvalues are correct and ordered for indices 1,2,...IERR-1, but may not be the smallest eigenvalues. E has been destroyed. IERR is set to ZERO for normal return, J if the J-th eigenvalue has not been determined afte...
On INPUT NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix. D contains the diagonal elements of the input matrix. E contains the subdiagonal elements of the input matrix in its last N-1 positions. E(1) is arbitrary. Z contains the transformation matrix produced in the reduction by TRED2, if performed. If the eigenvectors of the tridiagonal matrix are desired, Z must contain the identity mat...
This subroutine finds the eigenvalues of a SYMMETRIC TRIDIAGONAL matrix by the implicit QL method and associates with them their corresponding submatrix indices. On INPUT N is the order of the matrix. D contains the diagonal elements of the input matrix. E contains the subdiagonal elements of the input matrix in its last N-1 positions. E(1) is arbitrary. E2 contains the squares of the corresponding elements of E. E2(1) is arbitrary. On OUTPUT D and E are unaltered. Elements of E2, corresponding ...
Increments the value stored in the variable whose name is varName. The value of the variable must be an integer. If increment is supplied then its value (which must be an integer) is added to the value of variable varName; otherwise 1 is added to varName. The new value is stored as a decimal string in variable varName and also returned as result.
[incr Tcl] provides object-oriented extensions to Tcl, much as C++ provides object-oriented extensions to C. The emphasis of this work, however, is not to create a whiz-bang object-oriented programming environment. Rather, it is to support more structured programming practices in Tcl without changing the flavor of the language. More than anything else, [incr Tcl] provides a means of encapsulating related procedures together with their shared data in a local namespace that is hidden from the outs...
The result of index is an integer value indicating the position in the first argument of the first substring which is identical to the second argument. The result of index('ABCDEF','CD'), for example, would be 3. If no substring of the first argument matches the second argument, the result is zero. index returns the result type integer*2 if the -i2 compile option is in effect; otherwise, the result type is integer*4. Page 1 INDEX(3I) Last changed: 1-6-98...
The result of index is an integer value indicating the position in the first argument of the first substring which is identical to the second argument. The result of index('ABCDEF','CD'), for example, would be 3. If no substring of the first argument matches the second argument, the result is zero. index returns the result type integer*2 if the -i2 compile option is in effect; otherwise, the result type is integer*4. Page 1 INDEX(3I) Last changed: 1-6-98...
The routines inet_aton, inet_addr and inet_network interpret character strings representing numbers expressed in the Internet standard "." (dot) notation. The inet_aton routine interprets the specified character string as an Internet address, placing the address into the structure provided. It returns 1 if the string was successfully interpreted, or 0 if the string is invalid. The inet_addr and inet_network functions return numbers suitable for use as Internet addresses and Internet network nu...
The routines inet_addr and inet_network each interpret character strings representing numbers expressed in the Internet standard `.' notation, returning numbers suitable for use as Internet addresses and Internet network numbers, respectively. The routine inet_makeaddr takes an Internet network number and a local network address and constructs an Internet address from it. The routines ine...
This command provides information about various internals of the Tcl interpreter. The legal option's (which may be abbreviated) are: info args procname Returns a list containing the names of the arguments to procedure procname, in order. Procname must be the name of a Tcl command procedure. info body procname Returns the body of procedure procname. Procname must be the name of a Tcl command procedure. info cmdcount Returns a count of the total number of commands that have been invoked in this i...
initgroups and BSDinitgroups read through the group file (/etc/group) and set up, using the appropriate version of the setgroups call, the group access list for the user specified in name. The basegid is automatically included in the groups list. Typically this value is the group number from the password file. The difference between initgroups and BSDinitgroups is the type of the basegid parameter. Both of these routines use the sysconf(_SC_NGROUPS_MAX) system call to determine the maximum numbe...
insque and remque manipulate queues built from doubly linked lists. Each element in the queue must be in the following form: struct qelem { struct qelem *q_forw; struct qelem *q_back; char q_data[]; }; insque inserts elem in a queue immediately after pred. If ...
This tells the compiler that it's okay to use integer operations from here to the end of the enclosing BLOCK. On many machines, this doesn't matter a great deal for most computations, but on those without floating point hardware, it can make a big difference. See the section on Pragmatic Modules in the perlmod manpage. PPPPaaaaggggeeee 1111
Tk_Window tkwin (in) Token for window. Used to map atom or name relative to a particular display. char *name (in) String name for which atom is desired. Atom atom (in) Atom for which corresponding string name is desired.
The Tcl_CreateInterp procedure returns a pointer to a Tcl_Interp structure. This pointer is then passed into other Tcl procedures to process commands in the interpreter and perform other operations on the interpreter. Interpreter structures contain many many fields that are used by Tcl, but only three that may be accessed by clients: result, freeProc, and errorLine. The result and freeProc fields are used to return results or error messages from commands. This information is returned by command ...
The C++ iostream package declared in iostream.h and other header files consists primarily of a collection of classes. Although originally intended only to support input/output, the package now supports related activities such as incore formatting. This package is a mostly sourcecompatible extension of the earlier stream I/O package, described in The C++ Programming Language by Bjarne Stroustrup. In the iostream man pages, character refers to a value that can be held...
The C++ iostream package declared in iostream.h and other header files consists primarily of a collection of classes. Although originally intended only to support input/output, the package now supports related activities such as incore formatting. This package is a mostly sourcecompatible extension of the earlier stream I/O package, described in The C++ Programming Language by Bjarne Stroustrup. In the iostream man pages, character refers to a value that can be held...
The C++ iostream package declared in iostream.h and other header files consists primarily of a collection of classes. Although originally intended only to support input/output, the package now supports related activities such as incore formatting. This package is a mostly sourcecompatible extension of the earlier stream I/O package, described in The C++ Programming Language by Bjarne Stroustrup. In the iostream man pages, character refers to a value that can be held...
In the Network Services library, netbuf is a structure used in various TLI functions to send and receive data and information. netbuf is defined in sys/tiuser.h, and includes the following members: struct netbuf { unsigned int maxlen; /* The physical size of the b
These Fortran-callable subroutines perform conversion of data residing in Cray Research systems memory. Conversion subprograms are listed under the following types of routines: * Foreign data conversion * Numeric conversion * ASCII conversion * IEEE conversion * Other conversion For more information regarding foreign data conversion, see the Application Programmer's I/O Guide, publication SG-2168. The USCCTC and USCCTI routines are available on IRIX systems. Both routines are documented on the ...
The Flexible File I/O (FFIO) system lets the user specify a commaseparated list of layers through which I/O data is to be passed. This is done by providing a value for the spec argument to the -F option on the assign(1) command. This specifies a class of processing to be done on the data. The following C routines are used with FFIO: * fffcntl(3C): performs functions on files opened using FFIO * fflistio(3C): initiates a list of I/O requests using FFIO * ffiolock(3C): locks and unlocks function c...
Intrinsic procedures are predefined by the computer programming language. They are invoked in the same way that other procedures are invoked. The Fortran 90 standard defines intrinsic procedures, and the CF90 and MIPSpro 7 Fortran 90 compilers include other intrinsics as extensions to the standard. There are four classes of Fortran intrinsic procedures as defined by the Fortran 90 standard: inquiry functions, elemental functions, transformational functions, and subroutines. Additional intrinsics...
The math routines are listed with the other intrinsic procedures in alphabetical order, usually by generic function name. Generic function names are function calls that cause the compiler to compile automatically the appropriate data type version of a routine, based on the type of the input data. For example, a call to the generic function LOG with a type of input data of complex compiles as CLOG. In general, on UNICOS systems, real functions have no prefix; integer functions are prefixed with I...
The POSIX FORTRAN 77 Language Interfaces Standard IEEE Std 1003.9- 1992 (POSIX.a) defines a standardized interface for accessing the system services of IEEE Std 1003.1-1990 (POSIX.1), and supports routines to access constructs not directly accessible with FORTRAN 77. Only a subset of the routines described in this standard are currently available on Cray Research systems. For some routines, only a portion of the functionality described by the standard is currently implemented. Many of the servic...
C/C++: UNICOS/mk systems and UNICOS systems with IEEE floating-point hardware Fortran: UNICOS/mk systems, IRIX systems, and CRAY T90 systems that support IEEE floating-point arithmetic
On INPUT NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix. A contains the Hessenberg matrix. WR and WI contain the real and imaginary parts, respectively, of the eigenvalues of the matrix. The eigenvalues MUST be stored in a manner IDENTICAL to that of subroutine HQR, which recognizes possible splitting of the matrix. SELECT specifies the eigenvectors to be found. The eigenvector correspon...
IO provides a simple mechanism to load all of the IO modules at one go. Currently this includes: IO::Handle IO::Seekable IO::File IO::Pipe IO::Socket For more information on any of these modules, please see its respective documentation. PPPPaaaaggggeeee 1111
IO::Handle is the base class for all other IO handle classes. It is not intended that objects of IO::Handle would be created directly, but instead IO::Handle is inherited from by several other classes in the IO hierarchy. If you are reading this documentation, looking for a replacement for the FileHandle package, then I suggest you read the documentation for IO::File A IO::Handle object is a reference to a symbol (see the Symbol package)...
IO::Seekable does not have a constuctor of its own as is intended to be inherited by other IO::Handle based objects. It provides methods which allow seeking of the file descriptors. If the C functions fgetpos() and fsetpos() are available, then IO::File::getpos returns an opaque value that represents the current position of the IO::File, and IO::File::setpos uses that value to return to a previously visited position. See the perlfunc manpage for complete descriptions of each of the following sup...
The IO::Select package implements an object approach to the system select function call. It allows the user to see what IO handles, see the IO::Handle manpage, are ready for reading, writing or have an error condition pending.
IO::Socket provides an object interface to creating and using sockets. It is built upon the the IO::Handle manpage interface and inherits all the methods defined by the IO::Handle manpage. IO::Socket only defines methods for those operations which are common to all types of socket. Operations which are specified to a socket in a particular domain have methods defined in sub classes of IO::Socket IO::Socket will export all functions (and constants) defined by the Socket manpage....
bool is the general name for the bit field manipulation intrinsic functions and subroutines from the FORTRAN Military Standard (MIL-STD1753). and, or and xor return the value of the binary operations on their arguments. not is a unary operator returning the one's complement of its argument. ior, iand, not, ieor - return the same results as and, or, not, and xor. lshift and rshift return the value of the first argument shifted left or right, respectively, the number of times specified by the sec...
The stream classes derived from class ios provide a high level interface that supports transferring formatted and unformatted information into and out of streambufs. This manual page describes the operations common to both input and output. Several enumerations are declared in class ios, open_mode, io_state, seek_dir, and format flags, to avoid polluting the global name space. The i<...
The SpeedShop Performance Tools contain an I/O tracing library, -lio_ss, which provides tracing for various I/O system calls. The library provides intercept functions for calls to open, creat, read, write, close, dup, and pipe. The tracing library defines both strong and weak symbols for each of these calls, and, at initialization time, uses dlopen and dlsym to find the standard libc addresses for the real functions. Programs that attempt to provide their own versions for any of these routines m...
The open2() function spawns the given $cmd and connects $rdr for reading and $wtr for writing. It's what you think should work when you try open(HANDLE, "|cmd args|"); The write filehandle will have autoflush turned on. If $rdr is a string (that is, a bareword filehandle rather than a glob or a reference) and it begins with ">&", then the child will send output directly to that file handle. If $wtr is a string that begins with "<&", then WTR will be closed in the parent, and the child wil...
Extremely similar to open2(), open3() spawns the given $cmd and connects RDRFH for reading, WTRFH for writing, and ERRFH for errors. If ERRFH is '', or the same as RDRFH, then STDOUT and STDERR of the child are on the same file handle. The WTRFH will have autoflush turned on. If WTRFH begins with "<&", then WTRFH will be closed in the parent, and the child will read from it directly. If RDRFH or ERRFH begins with ">&", then the child will send output directly to that file handle. In both c...
isencrypt uses heuristics to determine whether a buffer of characters is encrypted. It requires two arguments: a pointer to an array of characters and the number of characters in the buffer. isencrypt assumes that the file is not encrypted if all the characters in the first block are ASCII characters. If there are non-ASCII characters in the first ninbuf characters, isencrypt assumes that the buffer is encrypted if ...
bool is the general name for the bit field manipulation intrinsic functions and subroutines from the FORTRAN Military Standard (MIL-STD1753). and, or and xor return the value of the binary operations on their arguments. not is a unary operator returning the one's complement of its argument. ior, iand, not, ieor - return the same results as and, or, not, and xor. lshift and rshift return the value of the first argument shifted left or right, respectively, the number of times specified by the sec...
bool is the general name for the bit field manipulation intrinsic functions and subroutines from the FORTRAN Military Standard (MIL-STD1753). and, or and xor return the value of the binary operations on their arguments. not is a unary operator returning the one's complement of its argument. ior, iand, not, ieor - return the same results as and, or, not, and xor. lshift and rshift return the value of the first argument shifted left or right, respectively, the number of times specified by the sec...
(Note that the long double routines are only valid for the MIPSpro compilers.) Long double functions have been renamed to be compliant with the ANSI-C standard, however to be backward compatible, they may still be called with the double precision function name prefixed with a q. (Exception: function isnanl may be called with the name isnanq.) isnan, isnand, isnanf, and isnanl return true (1) if the argument dsrc or fsrc is a Na...
obj expects the object identifier that you want to test. FUNCTION RETURN VALUE There are two possible return values for this function: TRUE indicates that object obj exists. FALSE indicates that object obj does not exist.
dev expects the identifier for the device you want to test (e.g., MOUSEX or BPADX). FUNCTION RETURN VALUE The returned value for this function is a boolean value: TRUE indicates that dev is enabled for queueing. FALSE indicates that dev is not enabled for queueing.
t expects the tag identifier that you want to test. FUNCTION RETURN VALUE There are two possible return values for this function: TRUE indicates that tag t exists in the current open object. FALSE indicates that tag t does not exist in the current open object. The return value is undefined if no object is currently open for editing.
target expects the texture resource to which the texture function definition is to be bound. There is one appropriate resource, TX_TEXTURE_0. id expects the id of the texture that is being queried. FUNCTION RETURN VALUE The returned value for this function is either 0 or 1. 0 indicates that the texture is not resident in texture memory. 1 indicates that the texture is resident in texture memory.
istreams support interpretation of characters fetched from an associated streambuf. These are commonly referred to as input or extraction operations. The istream member functions and related functions are described below. In the following descriptions assume that - ins is an istream. - inswa is an istream_withassign. - insp is a istream...
IZMAX1 finds the index of the element whose real part has maximum absolute value. Based on IZAMAX from Level 1 BLAS. The change is to use the 'genuine' absolute value. Contributed by Nick Higham for use with ZLACON.
The list argument must be a valid Tcl list. This command returns the string formed by joining all of the elements of list together with joinString separating each adjacent pair of elements. The joinString argument defaults to a space character.
x expects the horizontal proportion of the aspect ratio. The value must be between 1 and 32767 (0x7fff), inclusive. y expects the vertical proportion of the aspect ratio. The value must be between 1 and 32767 (0x7fff), inclusive.
kill sends the signal sig to a process, specified by the process number pid. Sig may be one of the signals specified in sigvec(3B), or it may be 0, in which case error checking is performed but no signal is actually sent. This can be used to check the validity of pid. The sending and receiving processes must have the same effective user ID, otherwise this call is restricted to the super-user. A single exception is the signal SIGCONT, which may always be sent to any descendant of the current proc...
killpg sends the signal sig to the process group pgrp. See sigvec(3B) for a list of signals. The sending process and members of the process group must have the same effective user ID, or the sender must be the super-user. As a single special case the continue signal SIGCONT may be sent to any process that is a descendant of the current process.
l3tol converts a list of n three-byte integers packed into a character string pointed to by cp into a list of long integers pointed to by lp. ltol3 performs the reverse conversion from long integers (lp) to threebyte integers (cp). These functions are useful for file-system maintenance where the block numbers are three bytes long.
anchor font image takeFocus | background foreground justify text | bitmap highlightBackground padX textVariable | borderWidth highlightColor padY underline | cursor highlightThickness relief wrapLength See the ``options'' manual entry for details on the standard options. WIDGET-SPECIFIC OPTIONS Name: height Class: Height Command-Line Switch:-height Specifies a desired height for the label. If an image or bitmap is being displayed in the label then the value is in screen units (i.e. any of the ...
lamps expects a mask that specifies which lamps to manipulate. The four low-order bits control the lamps labeled L1 through L4. If a bit is set, then the corresponding keyboard lamp is turned on or off.
LAPACK has been funded in part by NSF, DOE, and DARPA, with developmental support from NAG Ltd., Cray Research, and many friends and colleagues around the world. Ed Anderson, Zhao-jun Bai, Chris Bischof, Jim Demmel, Jack Dongarra, Jeremy Du Croz, Anne Greenbaum, Sven Hammarling, Alan McKenney, Susan Ostrouchov, and Danny Sorensen ( l l l l ) ( a -a a -a ) 1/4 * ( p p -p -p ) Page 2 LAPACK(3F) LAPACK(3F) ( a -a -a a ) ( c c -c -c ) ( k -k -k k )...
This command treats the variable given by varName as a list and appends each of the value arguments to that list as a separate element, with spaces between elements. If varName doesn't exist, it is created as a list with elements given by the value arguments. Lappend is similar to append except that the values are appended as list elements rather than raw text. This command provides a relatively efficient way to build up large lists. For example, ``lappend a $b'' is much more efficient than `...
This command is a Tcl procedure provided as part of the Tk script library. It takes as arguments the path names of one or more listbox widgets, or the value Listbox. For each named widget, tk_listboxSingleSelect modifies the bindings of the widget so that only a single element may be selected at a time (the normal configuration allows multiple elements to be selected). If the keyword Listbox is among the window arguments, then the class bindings for listboxes are changed so that all listboxes ha...
str expects a pointer to the memory containing a sequence of character id's. type expects one of the following symbolic constants defined in : STR_B Each character id is represented by a single unsigned byte. STR_2B Each character id is represented by two, consecutive unsigned bytes. STR_3B Each character id is represented by three, consecutive unsigned bytes. STR_4B Each character id is represented by four, consecutive unsigned bytes. STR_16 Each character id is represented by a 16-bi...
If TYPE(ldptr) is the archive file magic number, ldahread reads the archive header of the common object file currently associated with ldptr into the area of memory beginning at arhead. ldahread returns SUCCESS or FAILURE. If TYPE(ldptr) does not represent an archive file or if it cannot read the archive header, ldahread fails. The program must be loaded with the object file access routine library libmld.a....
ldopen(3X) and ldclose provide uniform access to simple object files and object files that are members of archive files. An archive of common object files can be processed as if it is a series of simple common object files. If TYPE(ldptr) does not represent an archive file, ldclose closes the file and frees the memory allocated to the LDFILE structure associated with ldptr. If TYPE(ldptr) is the magic number for an archive file and if archive has more files, ldclose reinitializes OFFSET(ldptr) t...
ldfhread reads the file header of the common object file currently associated with ldptr . It reads the file header into the area of memory beginning at filehead. ldfhread returns SUCCESS or FAILURE. If ldfhread cannot read the file header, it fails. Usually, ldfhread can be avoided by using the macro HEADER(ldptr) defined in (see ldfcn(4)). Note that the information in HEADER is swapped, if necessary. The information in any field, fieldname, of the file header can be accessed using HE...
ldgetaux returns a pointer to an auxiliary table entry associated with iaux. The AUXU is contained in a static buffer. Because the buffer can be overwritten by later calls to ldgetaux, it must be copied by the caller if the aux is to be saved or changed. Note that auxiliary entries are not swapped as this routine cannot detect what manifestation of the AUXU union is retrieved. If LDAUXSWAP(ldptr, ldf) is non-zero, a further call to swap_aux is required. Before calling the swap_aux routine, the c...
ldgetname returns a pointer to the name associated with symbol as a string. The string is contained in a static buffer. Because the buffer can be overwritten by later calls to ldgetname, the caller must copy the buffer if the name is to be saved. If the name cannot be retrieved, ldgetname returns NULL (defined in ) for an object file. This occurs when: o the string table cannot be found o the name's offset into the string table is beyond the end of the string table Typically, ldgetname...
ldgetpd returns a SUCCESS or FAILURE depending on whether the procedure descriptor with index ipd can be accessed. If it can be accessed, the structure pointed to by ppd is filled with the contents of the corresponding procedure descriptor. The isym, iline, and iopt fields of the procedure descriptor are updated to be used in further LD routine calls. The adr field is updated from the symbol referenced by the isym field. The PDR cannot be retrieved when: o The procedure descriptor table cannot b...
ldgetsymstr puts, in the caller-provided buffer, a string with whatever type information is available on the symbol passed in. There is no mechanism to prevent buffer overflow, so it is best to provide a large buffer. 2048 bytes should be 10 or 20 times the size of any reasonable string. The string put in buffer is terminated by a null(0) byte by ldgetsymstr. Both a symbol index (as is supplied to ldtbread ) and a pSYMR pointer pointing to the data for the indexed symbol (previously filled by a ...
ldlread searches the line number entries of the common object file currently associated with ldptr. ldlread begins its search with the line number entry for the beginning of a function and confines its search to the line numbers associated with a single function. The function is identified by fcnindx, which is the index of its local symbols entry in the object file symbol table. ldlread reads the entry with the smallest line number equal to or greater than linenum into linent. ldlinit and ldlite...
ldlseek seeks to the line number entries of the section specified by sectindx of the common object file currently associated with ldptr. ldnlseek seeks to the line number entries of the section specified by sectname. ldlseek and ldnlseek return SUCCESS or FAILURE. NOTE: Line numbers are not associated with sections in the MIPS symbol table; therefore, the second argument is ignored, but maintained for historical purposes. If they cannot seek to the specified line number entries, both routines fa...
ldohseek seeks to the optional file header of the common object file currently associated with ldptr. ldohseek returns SUCCESS or FAILURE. If the object file has no optional header or if it cannot seek to the optional header, ldohseek fails. The program must be loaded with the object file access routine library libmld.a.
ldopen and ldclose(3X) provide uniform access to simple object files and to object files that are members of archive files. An archive of common object files can be processed as if it were a series of simple common object files. If ldptr has the value NULL, ldopen opens filename, allocates and initializes the LDFILE structure, and returns a pointer to the structure to the calling program. If ldptr is valid and TYPE(ldptr) is the archive magic number, ldopen reinitializes the LDFILE structure for...
ldreadst reads in the portions of the symbol table implied by the flags argument. A flags argument of -1 reads in the entire symbol table. Since the other symbol table routines, for example ldtbread, ensure that the relevant portions of the symbol table have been read in, you need not call ldreadst to use the other routines. ldreadst(ldptr,-1) would simply ensure the whole symbol table is read in at once, which is not necessary. ldreadst is useful, however. One can test for the existence of symb...
ldrseek seeks to the relocation entries of the section specified by sectindx of the common object file currently associated with ldptr. ldnrseek seeks to the relocation entries of the section specified by sectname. ldrseek and ldnrseek return SUCCESS or FAILURE. If sectindx is greater than the number of sections in the object file, ldrseek fails; if there is no section name corresponding with sectname, ldnrseek fails. If the specified section has no relocation entries or if it cannot seek to the...
ldshread reads the section header specified by sectindx of the common object file currently associated with ldptr into the area of memory beginning at secthead. ldnshread reads the section header specified by sectname into the area of memory beginning at secthead. ldshread and ldnshread return SUCCESS or FAILURE. If sectindx is greater than the number of sections in the object file, ldshread fails; If there is no section name corresponding with sectname, ldnshread fails. If it cannot read the sp...
ldsseek seeks to the section specified by sectindx of the common object file currently associated with ldptr. ldnsseek seeks to the section specified by sectname. ldsseek and ldnsseek return SUCCESS or FAILURE. If sectindx is greater than the number of sections in the object file, ldsseek fails; if there is no section name corresponding with sectname, ldnsseek fails. If there is no section data for the specified section or if it cannot seek to the specified section, either function fails. NOTE: ...
ldtbindex returns the (long) index of the symbol table entry at the current position of the common object file associated with ldptr. The index returned by ldtbindex can be used in later calls to ldtbread(3X). ldtbindex returns the index of the last ldtbread. If there are no symbols in the object file or if the object file is not positioned at the beginning of a symbol table entry, ldtbindex fails and returns BADINDEX (-1). NOTE: The first symbol in the symbol table has an index of zero. The pro...
ldtbread reads the symbol table entry specified by symindex of the common object file currently associated with ldptr into the area of memory beginning at symbol. ldtbread returns SUCCESS or FAILURE. If symindex is greater than the number of symbols in the object file or if it cannot read the specified symbol table entry, ldtbread fails. The local and external symbols are concatenated into a linear list. Symbols are accessible from symnum zero to SYMHEADER(ldptr).isymMax+SYMHEADER(ldptr).iextMax...
ldtbseek seeks to the symbol table of the object file currently associated with ldptr. ldtbseek returns SUCCESS or FAILURE. If the symbol table has been stripped from the object file or if it cannot seek to the symbol table, ldtbseek fails. The program must be loaded with the object file access routine library libmld.a.
bool is either TRUE or FALSE. TRUE enables updating the left/right buffer. FALSE disables updating the left/right buffer. By default, leftbuffer is TRUE and rightbuffer is FALSE.
Currently unimplemented, this may someday be a compiler directive to make certain trade-offs, such as perhaps use less 'memory'; use less 'CPU'; use less 'fat'; PPPPaaaaggggeeee 1111
lfmt retrieves a format string from a locale-specific message database (unless MM_NOGET is specified) and uses it for printf style formatting of args. The output is displayed on stream. If stream is NULL, no output is displayed. lfmt encapsulates the output in the standard error message format (unless MM_NOSTD is specified, in which case the output is simply printf-like). lf...
These functions return .TRUE. if the inequality holds and .FALSE. otherwise. They return the result type logical*2 if the $log2 compile option is in effect; otherwise, the result type is logical*4. Page 1 LGE(3I) Last changed: 1-6-98
This is a small simple module which simplifies the manipulation of @INC at compile time. It is typically used to add extra directories to perl's search path so that later use or require statements will find modules which are not located on perl's default search path. ADDING DIRECTORIES TO @INC The parameters to use lib are added to the start of the perl search path. Saying use lib LIST; is almost the same as saying BEGIN { unshift(@INC, LIST) } For each directory in LIST (called $dir here) the...
The libexc library provides the functionality for user-level call stack unwind. trace_back_stack is used to unwind the call stack at the time it's called. The first argument sets the number of stack frames to be unwound. If it's set to zero the unwind continues up to main or up to _nsproc/_fork for child processes. The second argument is the array that contains the addresses of the callers in the stack after the unwind is completed. The third argument contains the names of the functions in the...
The libexc library provides the functionality for user-level call stack unwind. trace_back_stack is used to unwind the call stack at the time it's called. The first argument sets the number of stack frames to be unwound. If it's set to zero the unwind continues up to main or up to _nsproc/_fork for child processes. The second argument is the array that contains the addresses of the callers in the stack after the unwind is completed. The third argument contains the names of the functions in the...
KEYWORD MATCHING int pm_keymatch( char* str, char* keyword, int minchars ) Does a case-insensitive match of str against keyword. str can be a leading sunstring of keyword, but at least minchars must be present.
These routines provide simple access to the hardware event counters. The arguments e0 and e1 are int types specifying which events to count. For descriptions of the counters themselves, see the perfex(1) or the r10k_counters(5) man page. The counts are returned in the long long arguments c0 and c1. The print_counters routine prints the counts to standard error. Two events which must be counted on the same hardware counter will cause a conflicting counters error. The arguments e0 and e1 can be ov...
TYPES AND CONSTANTS typedef ... gray; #define PGM_MAXMAXVAL ... extern gray pgm_pbmmaxval; Each gray should contain only the values between 0 and PGM_MAXMAXVAL. pgm_pbmmaxval is the maxval used when a PGM program reads a PBM file. Normally it is 1; however, for some programs, a larger value gives better results. #define PGM_FORMAT ... #define RPGM_FORMAT ... #define PGM_TYPE PGM_FORMAT int PGM_FORMAT_TYPE( int format ) For distinguishing different file formats and types....
TYPES AND CONSTANTS typedef ... pixel; typedef ... pixval; #define PPM_MAXMAXVAL ... extern pixval ppm_pbmmaxval; Each pixel contains three pixvals, each of which should contain only the values between 0 and PPM_MAXMAXVAL. ppm_pbmmaxval is the maxval used when a PPM program reads a PBM file. Normally it is 1; however, for some programs, a larger value gives better results. #define PPM_FORMAT ... #define RPPM_FORMAT ... #define PPM_TYPE PPM_FORMAT int PPM_FORMAT_TYPE( int format ) For distinguish...
Tcl includes a library of Tcl procedures for commonly-needed functions. The procedures defined in the Tcl library are generic ones suitable for use by many different applications. The location of the Tcl library is returned by the info library command. In addition to the Tcl library, each application will normally have its own library of support procedures as well; the location of this library is normally given by the value of the $app_library global variable, where app is the name of the applic...
The Sphere Library renders spheres by issuing GL calls. sphdraw draws a sphere. sphmode sets various attributes that affect the speed and quality of spheres rendered by sphdraw. sphrotmatrix allows you to control the orientation of spheres by providing a rotation matrix. sphgnpolys returns the number of polygons per sphere, in the mode currently selected by sphmode. sphobj operates like sphdraw, except that, instead of immediately rendering a sphere, it creates and returns a GL object, which can...
libt6 constitutes the TSIX Application Program Interface (API). It is a library of routines that an application uses to control attribute transport during trusted interprocess communication. In Trusted IRIX, the functions defined by TSIG for libt6 have been incorporated into libc. The routines in the library are recommended over the underlying system call interfaces for portability because they shield the application from operating system, communication protocol, and I...
libtiff is a library for reading and writing data files encoded with the Tag Image File format, Revision 6.0 (or revision 5.0 or revision 4.0). This file format is suitable for archiving multi-color and monochromatic image data. The library supports several compression algorithms, as indicated by the Compression field, including: no compression (1), CCITT 1D Huffman compression (2), CCITT Group 3 Facsimile compression (3), CCITT Group 4 Facsimile compression (4), Lempel-Ziv & Welch compression (...
This command treats list as a Tcl list and returns the index'th element from it (0 refers to the first element of the list). In extracting the element, lindex observes the same rules concerning braces and quotes and backslashes as the Tcl command interpreter; however, variable substitution and command substitution do not occur. If index is negative or greater than or equal to the number of elements in value, then an empty string is returned. If index has the value end, it refers to the | last e...
mode expects one of two values: SML_OFF, defeats antialiasing of lines (default). SML_ON enables antialiasing of lines. SML_ON can be modified by either or both of two additional symbolic constants: SML_SMOOTHER indicates that a higher quality filter should be used during line drawing. This filter typically requires that more pixels be modified, and therefore potentially reduces the rate at which antialiased lines are rendered. SML_END_CORRECT indicates that the endpoints of antialiased lines sh...
Tcl_Interp *interp (in) Interpreter that contains varName. Also used by Tcl_LinkVar to return error messages. char *varName (in) Name of global variable. char *addr (in) Address of C variable that is to be linked to varName. int type (in) Type of C variable. Must be one of TCL_LINK_INT, TCL_LINK_DOUBLE, TCL_LINK_BOOLEAN, or TCL_LINK_STRING, optionally OR'ed with TCL_LINK_READ_ONLY to make Tcl variable read-only....
The routine link_addr interprets character strings representing linklevel addresses, returning binary information suitable for use in system calls. The routine link_ntoa takes a link-level address and returns a string representing some of the information present, including the link level address itself, and the interface name or number, if present. This facility is experimental and is still subject to change. For link_addr, the string may contain an optional network interface identifier of the f...
This command produces a new list from list by inserting all of the element arguments just before the indexth element of list. Each element argument will become a separate element of the new list. If index is less than or equal to zero, then the new elements are inserted at the beginning of the list. If index has the value end, or if it is greater | than or equal to the number of elements in the list, then the new elements are appended to the list....
The lio_listio function allows the calling process to initiate a list of I/O requests with a single function call. The lio_listio64() function is identical to lio_listio() except that it takes an array of aiocb64_t * (see ). This structure allows for the specification of a file offset greater than 2 Gigabytes. The mode argument takes a value of either LIO_WAIT or LIO_NOWAIT and determines whether the function returns when the I/O operations have been completed, or as soon as the operation...
This command returns a list comprised of all the args, or an empty string| if no args are specified. Braces and backslashes get added as necessary, so that the index command may be used on the result to re-extract the original arguments, and also so that eval may be used to execute the resulting list, with arg1 comprising the command's name and the other args comprising its arguments. List produces slightly different results than concat: concat removes one level of grouping before forming the l...
background font relief takeFocus | borderWidth height selectBackground width | cursor highlightBackground selectBorderWidth xScrollCommand | exportSelection highlightColor selectForeground yScrollCommand | foreground highlightThickness setGrid See the ``options'' manual entry for details on the standard options. WIDGET-SPECIFIC OPTIONS Name: height Class: Height Command-Line Switch:-height Specifies the desired height for the window, in lines. If zero or | less, then the desired height for the...
To accept connections, a socket is first created with socket, a backlog for incoming connections is specified with listen and then the connections are accepted with accept. The listen call applies only to sockets of type SOCK_STREAM or SOCK_SEQPACKET. The backlog parameter defines the maximum length the queue of pending connections may grow to. If a connect...
target expects one of these symbolic constants: MATERIAL, BACKMATERIAL, LIGHT0, LIGHT1, LIGHT2, LIGHT3, LIGHT4, LIGHT5, LIGHT6, LIGHT7, or LMODEL. index expects the name of a material (if target is MATERIAL or BACKMATERIAL), a light source (if target is one of LIGHT0 through LIGHT7), or a lighting model (if target is LMODEL). Name is the index passed to lmdef when the material, light source, or lighting model was defined....
mode the name of the mode to be used. Possible modes are: LMC_COLOR, RGB color commands will set the current color. If a color is the last thing sent before a vertex the vertex will be colored. If a normal is the last thing sent before a vertex the vertex will be lighted. LMC_COLOR is the default mode. LMC_EMISSION, RGB color commands will set the EMISSION color property of the current material. LMC_AMBIENT, RGB color commands will set the AMBIENT color property of the current material. LMC_DIFF...
deftype expects the category in which to create a new definition, or the category of the definition to be modified. There are three categories, each with its own symbolic constants: DEFMATERIAL indicates that a material is being defined or modified. DEFLIGHT indicates that a light source is being defined or modified. DEFLMODEL indicates that a lighting model is being defined or modified. index expects the index into the table of stored definitions. There is a unique definitions table for each ca...
This manual page describes the SGI interface to liblmsgi.a, the SGI extension to Globetrotter Software's FLEXlm library. This library supports the interfaces provided by FLEXlm as well as the functions described here. The SGI interface defines a small set of functions for licensing your software using the FLEXlm, and consists of the following calls: license_init license_chk_out license_chk_in license_timer license_set_attr license_expdate license_errstr license_status license_free get_job When ...
This pragma tells the compiler to enable (or disable) the use of POSIX locales for built-in operations (LC_CTYPE for regular expressions, and LC_COLLATE for string comparison). Each "use locale" or "no locale" affects statements to the end of the enclosing BLOCK. PPPPaaaaggggeeee 1111
localeconv sets the components of an object with type struct lconv (defined in locale.h) with the values appropriate for the formatting of numeric quantities (monetary and otherwise) according to the rules of the current locale [see setlocale(3C)]. The definition of struct lconv is given below (the values for the fields in the C locale are given in...
The lockf command will allow sections of a file to be locked; advisory or mandatory write locks depending on the mode bits of the file [see chmod(2)]. Locking calls from other processes which attempt to lock the locked file section will either return an error value or be put to sleep until the resource becomes unlocked. All the locks for a process are removed when the process terminates. [See fcntl(2) for more information about record locking.] Fildes is an open file descriptor. The file descrip...
The long double and single-precision routines listed above are only available in the standard math library, -lm, and in -lmx. The exp family return the exponential function of x, e**x. The expm1 family return exp(x)-1 accurately even for tiny x. The log functions return the natural logarithm of x. The log10 functions return the base 10 logarithm of x. Page 1 EXP(3M) EXP(3M) The log1p family return log(1+x) accurately even for tiny x. pow(x,y), its single-precision counterpart powf(x,y), and its ...
The long double and single-precision routines listed above are only available in the standard math library, -lm, and in -lmx. The exp family return the exponential function of x, e**x. The expm1 family return exp(x)-1 accurately even for tiny x. The log functions return the natural logarithm of x. The log10 functions return the base 10 logarithm of x. EXP(3M) EXP(3M) The log1p family return log(1+x) accurately even for tiny x. pow(x,y), its single-precision counterpart powf(x,y), and its long do...
opcode expects one of the 16 possible logical operations. Symbol Operation LO_ZERO 0 LO_AND src AND dst LO_ANDR src AND (NOT dst) LO_SRC src LO_ANDI (NOT src) AND dst LO_DST dst LO_XOR src XOR dst LO_OR src OR dst LO_NOR NOT (src OR dst) LO_XNOR NOT (src XOR dst) LO_NDST NOT dst LO_ORR src OR (NOT dst) LO_NSRC NOT src LO_ORI (NOT src) OR dst LO_NAND NOT (src AND dst) LO_ONE 1 Only the lower 4 bits of opcode are used. The values of LO_SRC and LO_DST have been chosen so that expressing an operatio...
vx expects the x coordinate of the viewing point. vy expects the y coordinate of the viewing point. vz expects the z coordinate of the viewing point. px expects the x coordinate of the reference point. py expects the y coordinate of the reference point. pz expects the z coordinate of the reference point. twist expects the angle of rotation.
If the belowThis argument is omitted then the command lowers window so that it is below all of its siblings in the stacking order (it will be obscured by any siblings that overlap it and will not obscure any siblings). If belowThis is specified then it must be the path name of a window that is either a sibling of window or the descendant of a sibling of window. In this case the lower command will insert window into the stacking order just below belowThis (or the ancestor of belowThis that is a s...
List must be a valid Tcl list. This command will return a new list consisting of elements first through last, inclusive. First or last may | be end (or any abbreviation of it) to refer to the last element of the list. If first is less than zero, it is treated as if it were zero. If last is greater than or equal to the number of elements in the list, then it is treated as if it were end. If first is greater than last then an empty string is returned. Note: ``lrange list first first'' does not a...
x1 expects the x coordinate of the lower-left corner of the rectangle that you want to read. y1 expects the y coordinate of the lower-left corner of the rectangle that you want to read. x2 expects the x coordinate of the upper-right corner of the rectangle that you want to read. y2 expects the y coordinate of the upper-right corner of the rectangle that you want to read. parray expects the array to receive the pixels that you want to read. FUNCTION RETURN VALUE The returned value of this functio...
x1 expects the lower-left x coordinate of the rectangular region. y1 expects the lower-left y coordinate of the rectangular region. x2 expects the upper-right x coordinate of the rectangular region. y2 expects the upper-right y coordinate of the rectangular region. parray expects the array which contains the values of the pixels to be drawn. For RGBA values, pack the bits thusly: 0xAABBGGRR, where: AA contains the alpha value, BB contains the blue value, GG contains the green value, and RR conta...
Lreplace returns a new list formed by replacing one or more elements of list with the element arguments. First gives the index in list of the first element to be replaced (0 refers to the first element). If first is less than zero then it refers to the first element of list; the element indicated by first must exist in the list. Last gives the index in list of the last element to be replaced; it must be greater than or equal to first. First or last may be end (or any abbreviation of it) to | ref...
rmin expects the minimum value to be stored in the red bitplanes. gmin expects the minimum value to be stored in the green bitplanes. bmin expects the minimum value to be stored in the blue bitplanes. rmax expects the maximum value to be stored in the red bitplanes. gmax expects the maximum value to be stored in the green bitplanes. bmax expects the maximum value to be stored in the blue bitplanes. znear expects the nearer screen z, to which the maximum colors are mapped. zfar expects the farthe...
LSAMEN tests if the first N letters of CA are the same as the first N letters of CB, regardless of case. LSAMEN returns .TRUE. if CA and CB are equivalent except for case and .FALSE. otherwise. LSAMEN also returns .FALSE. if LEN( CA ) or LEN( CB ) is less than N.
b expects either TRUE or FALSE. TRUE forces the last pixel of a line segment to be colored. FALSE allows the linestyle to depend whether the last pixel of a line segment to be colored.
This command searches the elements of list to see if one of them matches pattern. If so, the command returns the index of the first matching element. If not, the command returns -1. The mode argument indicates | how the elements of the list are to be matched against pattern and it | must have one of the following values: -exact The list element must contain exactly the same string as pattern. | -glob Pattern is a glob-style pattern which is matched against each list | element using the same rule...
lsearch is a linear search routine generalized from Knuth (6.1) Algorithm S. It returns a pointer into a table indicating where a datum may be found. If the datum does not occur, it is added at the end of the table. Key points to the datum to be sought in the table. Base points to the first element in the table. Nmemb points to an integer containing the current number of elements in the table. The integer is incremented if the datum is added to the table. Size is the size of the key in bytes (si...
lowin expects the low-intensity color map index. highin expects the high-intensity color map index. znear expects the nearer screen z, to which highin is mapped. zfar expects the farther screen z, to which lowin is mapped.
This command sorts the elements of list, returning a new list in sorted order. By default ASCII sorting is used with the result returned in increasing order. However, any of the following switches may be | specified before list to control the sorting process (unique | abbreviations are accepted): -ascii Use string comparison with ASCII collation order. | This is the default. -integer Convert list elements to integers and use integer | comparison. -real Convert list elements to floating-point val...
type expects one of the following symbolic constants defined in : STR_B Each character is represented by a single unsigned byte. STR_2B Each character is represented by two, consecutive unsigned bytes. The first byte is most significant. STR_3B Each character is represented by three, consecutive unsigned bytes. The first byte is most significant. The last byte is least significant. STR_4B Each character is represented by four, consecutive unsigned bytes. The first byte is most significa...
mac_cleared and mac_clearedlbl return a value indicating whether the user is cleared for the label pointed to by the input argument lblstr or macp, respectively. The user's clearance range is defined by the structure pointed to by the input argument clp. If the user is cleared, MAC_CLEARED is returned. mac_cleared is equivalent to mac_cleared_ps(clp, lblstr). mac_clearedlbl is equivalent to mac_cleared_pl(clp, macp). mac_cleared_fl checks MAC clearance for setting labels on 'f'iles given a '...
mac_from_msen Return a mac_t constructed from the given msen label, substituting MINT_EQUAL_LABEL for the needed mint component. mac_from_mint Return a mac_t constructed from the given mint label, substituting MSEN_EQUAL_LABEL for the needed msen component. mac_from_msen_mint Return a mac_t constructed from the given msen and mint labels.
mac_get_fd returns a mac_t, a pointer to an allocated struct mac_label associated with the open file referred to by fd. If _POSIX_MAC is in effect, then the process must have MAC read access to the object. mac_set_fd sets the MAC label for the open file referred to by fd from the mac_t pointed to by macp. The effective UID of the process must match the owner of the object or the process must have appropriate privilege to set the access MAC on the object. If _POSIX_CAP is in effect, then the appr...
mac_get_file returns a mac_t, a pointer to an allocated struct mac_label associated with the pathname pointed to by path. If _POSIX_MAC is in effect, then the process must have MAC read access to the object. mac_set_file sets the MAC label of the specified pathname. The MAC label is first checked for validity by mac_valid(3c). The effective UID of the process must match the owner of the object or the process must have appropriate privilege to set the MAC label of path. If _POSIX_CAP is in effect...
mac_get_proc returns a mac_t, a pointer to an allocated struct mac_label which is the MAC label for this process. mac_set_proc sets the MAC label of the process. The MAC label is first checked for validity by mac_valid(3c). The process must have CAP_MAC_RELABEL_SUBJ capability in its effective set to change its MAC label.
mac_valid Check that the format of a MAC label is valid. msen_valid Check that the format of an MSEN label is valid. mint_valid Check that the format of a MINT label is valid.
Tk_Window slave (in) Window whose geometry is to be controlled. Tk_Window master (in) Window relative to which slave's geometry will be controlled. int x (in) Desired x-coordinate of slave in master, measured in pixels from the inside of master's left border to the outside of slave's left border. int y (in) Desired y-coordinate of slave in master, measured in pixels from the inside of master's top border to the outside of slave's top border. int width (in) Desired width for slave, in pixels...
These functions are useful for implementing user-level context switching between multiple threads of control within a process. makecontext modifies the context specified by ucp, which has been initialized using getcontext; when this context is resumed using swapcontext or setcontext [see getcontext(2)], program execution continues by calling ...
The WorkShop Performance Tools contain a malloc library, -lmalloc_cv, which provides tracing and error detection around calls to the various malloc routines. The library provides an intercept layer for calls to malloc, free, realloc, memalign, and valloc; the intercept allows tracing of all calls with the WorkShop performance tools. Calls to malloc, free, and realloc are passed through to whatever memory allocation library the program is linked with. Calls to calloc are actually not intercepted,...
malloc and free provide a simple general-purpose memory allocation package. malloc returns a pointer to a block of at least size bytes suitably aligned for any use. The argument to free is a pointer to a block previously allocated by malloc; after free is performed this space is made available for further allocation, but its contents are left undisturbed. Undefined results will occur if the space allocated by malloc is overrun or if some random value is passed as the argument to free. malloc all...
malloc and free provide a simple general-purpose memory allocation package, which is more flexible than the malloc(3c) package and, depending on an application's usage, may provide better performance. It is found in the library ``libmalloc.so'', and is loaded if the option ``-lmalloc'' is used with cc(1) or ld(1). malloc returns a pointer to a block of at least size bytes suitably aligned for any use. The argument to free is a pointer to a block pre...
The WorkShop Performance Tools contain a malloc library, -lmalloc_cv, which provides tracing and error detection around calls to the various malloc routines. The library provides an intercept layer for calls to malloc, free, realloc, memalign, and valloc; the intercept allows tracing of all calls with the WorkShop performance tools. Calls to malloc, free, and realloc are passed through to whatever memory allocation library the program is linked with. Calls to calloc are actually not intercepted,...
The SpeedShop Performance Tools contain a malloc library, -lmalloc_ss, which provides tracing and error detection around calls to the various malloc routines. The library provides an intercept layer for calls to malloc, free, realloc, memalign, and valloc; the intercept allows tracing of all calls with the SpeedShop performance tools. Calls to malloc, free, and realloc are passed through to whatever memory allocation library the program is linked with. Calls to calloc are actually not intercepte...
Tk_Window tkwin (in) Token for window to be managed. | Tk_GeomMgr *mgrPtr (in) Pointer to data structure | containing information about the| geometry manager, or NULL to | indicate that tkwin's geometry | shouldn't be managed anymore. | The data structure pointed to by| mgrPtr must be static: Tk keeps| a reference to it as long as the| window is managed. ClientData clientData (in) Arbitrary one-word value to pass| to geometry manager callbacks....
Manipulators are values that may be "inserted into" or "extracted from" streams to achieve some effect (other than to insert or extract a value representation), with a convenient syntax. They enable one to embed a function call in an expression containing a series of insertions or extractions. For example, the predefined manipulator for ostreams, flush, can be used as follows: cout << flush to flush cout. Several iostream classes supply manipulators: see ios(3C++), istream(3C++), and ostream...
i expects the index into the color map. red expects an intensity value in the range 0 to 255 for red to be associated with the index. green expects an intensity value in the range 0 to 255 for green to be associated with the index. blue expects an intensity value in the range 0 to 255 for blue to be associated with the index.
vobj expects a viewing object containing the transformations that map the current displayed objects to the screen. sx expects the x coordinate of the screen point to be mapped. sy expects the y coordinate of the screen point to be mapped. wx1 returns the x world coordinate of one endpoint of a line. wy1 returns the y world coordinate of one endpoint of a line. wz1 returns the z world coordinate of one endpoint of a line. wx2 returns the x world coordinate of the remaining endpoint of a line. wy2...
vobj expects the transformations that map the displayed objects to world coordinates. sx expects the x coordinate of the screen point to be mapped. sy expects the y coordinate of the screen point to be mapped. wx returns the corresponding x world coordinate. wy returns the corresponding y world coordinate.
Beginning with IRIX 6.2, libm now supports the following vector intrinsics: /* single precision vector routines */ vacosf( float *x, float *y, long count, long stridex, long stridey ) vasinf( float *x, float *y, long count, long stridex, long stridey ) vatanf( float *x, float *y, long count, long stridex, long stridey ) vcosf( float *x, float *y, long count, long stridex, long stridey ) vexpf( float *x, float *y, long count, long stridex, long stridey ) vlogf( float *x, float *y, long count, lon...
All basic math operations are overloaded if you declare your big floats as $float = new Math::BigFloat "2.123123123123123123123123123123123"; number format canonical strings have the form /[+-]\d+E[+-]\d+/ . Input values can have inbedded whitespace. Error returns 'NaN' An input parameter was "Not a Number" or divide by zero or sqrt of negative number. Division is computed to max($div_scale,length(dividend)+length(divisor)) digits by default. Also used for default sqrt scale....
All basic math operations are overloaded if you declare your big integers as $i = new Math::BigInt '123 456 789 123 456 789'; Canonical notation Big integer value are strings of the form /^[+-]\d+$/ with leading zeros suppressed. Input Input values to these routines may be strings of the form /^\s*[+- ]?[\d\s]+$/. Output Output values always always in canonical form Actual math is done in an internal format consisting of an array whose first element is the sign (/^[+-]$/) and whose remaini...
This package lets you create and manipulate complex numbers. By default, Perl limits itself to real numbers, but an extra use statement brings full complex support, along with a full set of mathematical functions typically associated with and/or extended to complex numbers. If you wonder what complex numbers are, they were invented to be able to solve the following equation: x*x = -1 and by definition, the solution is noted i (engineers use j instead since i usually denotes an intensity, but the...
Math::Trig defines many trigonometric functions not defined by the core Perl which defines only the sin() and cos(). The constant pi is also defined as are a few convenience functions for angle conversions.
matherr is invoked by the following functions in libmx.a when errors are detected: acos acosf acosh asin asinf asinh atan atanf atan2 atan2f atanh cbrt cos cosf cosh coshf drem erf erfc exp expf expm1 expm1f fmod fmodf gamma hypot hypotf j0 j1 jn lgamma log logf log10 log10f log1p log1pf pow powf sin sinf sinh sinhf sqrt sqrtf tan tanf tanh tanhf y0 y1 yn Note that to use matherr, libmx.a needs to be linked with the program. Users may define their own routines for handling errors by including a ...
The maximum-value functions return the largest of their arguments. There may be any number of arguments, but they must all be of the same type. max0 returns the integer form of the maximum value of its integer arguments; amax0, the real form of its integer arguments; max1, the integer form of its real arguments; amax1, the real form of its real arguments; dmax1, the double-precision form of its double-precision arguments; imax1, the integer*2 form of its real*4 arguments; jmax1, the integer*4 fo...
The maximum-value functions return the largest of their arguments. There may be any number of arguments, but they must all be of the same type. max0 returns the integer form of the maximum value of its integer arguments; amax0, the real form of its integer arguments; max1, the integer form of its real arguments; amax1, the real form of its real arguments; dmax1, the double-precision form of its double-precision arguments; imax1, the integer*2 form of its real*4 arguments; jmax1, the integer*4 fo...
x expects the maximum width of a graphics window. The width is measured in pixels. y expects the maximum height of a graphics window. The height is measured in pixels.
Multibyte characters are used to represent characters in an extended character set. This is needed for locales where 8 bits are not enough to represent all the characters in the character set. The multibyte character handling functions provide the means of translating multibyte characters into wide characters and back again. Wide characters have type wchar_t (defined in stdlib.h), which is an integral type whose range of values can represent distinct cod...
mbstowcs converts a sequence of multibyte characters from the array pointed to by s into a sequence of corresponding wide character codes and stores these codes into the array pointed to by pwcs, stopping after n codes are stored or a code with value zero (a converted null character) is stored. If pwcs is a null pointer, mbstowcs returns the length required to convert the entire array regardless of the value of n, but no values are stored. wc...
mclock returns time accounting information about the current process and its child processes. The value returned is the sum of the current process's user time and the user and system times of all child processes.
The mdbm routines are used to store key/content pairs in a high performance mapped hash file. Mdbm databases use fixed size pages, but the page size can be set on first open. The database does per page writer locking, and readers can detect and automaticly deal with writers. This allows for scalable multiple simultaneous readers and writers to be operating on the same mdbm file at the same time. Core functions are built into libc, the rest of them require linking with libmdbm. The functions in l...
mdOpenInPort and mdOpenOutPort create an MDport for a specified interface. An MDport maintains the state of the communications path between the application and a MIDI interface. An MDport is passed as the first argument to most MIDI library routines. The name parameter contains the name of the MIDI interface to which the newly opened port is connected. The mdGetName(3dm) function returns strings which can be used as valid values of name. If NULL is passed in for name, the default MIDI interface ...
mdMalloc and mdFree are pointers to memory allocation functions used by the MIDI library. The default implementations use the amalloc(3P) library to implement an arena separate from the main heap used by malloc(3C). This allows memory performance in the MIDI library to be maintained in the presence of high malloc usage by an application. mdMalloc is used by mdReceive(3dm) to allocate storage for incoming MIDI system exclusive messages. mdFree is used by the application to release that storage. m...
mdGetDefault returns a string containing the name of either the default input or the default output interface. If a value of MD_GET_INPUT is passed in the argument inout, the default input interface name is returned. If the value MD_GET_OUTPUT is passed, the default output interface name is returned. Space for the string is allocated by the function; the caller is responsible for deallocating the string (via free(3)) when finished....
mdGetName returns a pointer to the interface name associated with index. If index does not correspond to a configured MIDI interface, mdGetName returns NULL. The range of valid values for index is dynamic and extends from 0 to one less than number of configured interfaces (which is returned by mdInit(3dm)). The return value of mdGetName can be used as an argument for any routines which expect an interface name, such as mdOpenInPort(3dm) and mdOpenOutPort(3dm). This routine is also commonly used ...
These routines routines are obsolete and are retained only for backwards compatibility. They can be replaced with the following definitions: #define mdGetStatus(msg) (msg[0] & MD_STATUSMASK) #define mdGetChannel(msg) (msg[0] & MD_CHANNELMASK) #define mdGetByte1(msg) (msg[1]) #define mdGetByte2(msg) (msg[2]) #define mdSetStatus(msg,x) (msg[0] = (x) | mdGetChannel(msg)) #define mdSetChannel(msg,x) (msg[0] = mdGetStatus(msg) | (x)) #define mdSetByte1(msg, x) (msg[1] = (x)) #define mdSetByte2(msg, x...
mdInit initializes the MIDI library and returns the current number of configured MIDI interfaces. mdInit must be called before the application calls any other MIDI library routines. mdInit returns 0 if no interfaces are configured. An application may call mdInit multiple times to update the MIDI library's internal list of available ports. Any interfaces configured after the initial call to mdInit will be inaccessible by the application until mdInit is called again; long-running applications whi...
The Silicon Graphics MIDI library (libmd) provides a programming interface for applications which wish to receive and transmit messages through MIDI interfaces. MIDI (an acronym for the Musical Instrument Digital Interface) is an industry-standard mechanism for connecting to and communicating with a variety of devices. Although it was originally designed primarily for use with electronic music instruments (such as synthesizers and drum machines), MIDI is now used in conjunction with a wide varie...
mdPanic is an obsolete routine which sends ALL NOTES OFF and RESET ALL CONTROLLERS messages on all channels. The following program illustrates the prefered method of silencing stuck notes (the code is also available in /usr/share/src/dmedia/midi/simple/panic.c if the MIDI example code is installed). #include #include long long stamp = 0; char *usage = "Usage: panic [-f] [-a | interface name]" /* * Transmit ALL NOTES OFF, ALL SOUND OFF, and RESET ALL CONTROLLERS * mess...
mdPause immediately halts output on a port and discards any queued events. It returns the stamp of the last MIDI message sent (which is the same as the value returned by mdTell(3dm)).
mdPrintEvent can be used to format events in a buffer for printing. buf is a user allocated character into which the formatted string will be written. evbuf points to the array MDevents whose descriptions are to be generated, and count indicates how many of the events should be described. In order to avoid overflowing buf, the programmer should insure that the buffer can accomodate 80 bytes of description per message. The message format is: timestamp : channel : status type (string) : byte 1 : b...
mdReceive reads MIDI events from the MIDI interface associated with port into the evbuf array. evbuf must be allocated by the user and must contain space for count MDevent structures. For most events, the actual MIDI event is stored in the msg array of the MDevent, and the stamp field is set to a stamp value whose format is determined by the port's stamping mode (see mdSetStampMode). In addition, when a system exclusive event is received, the MIDI library allocates a block of memory for the sys...
mdSend writes MIDI events to the interface indicated by port. buf points to a user-allocated array containing at least count MDevent structures. mdSend will always transmit count events; it will block if necessary waiting for the interface event queue to drain. The event structure contains the MIDI message to be transmitted in the msg field (see mdIntro(3dm) for details on the MDevent structure). If the application wishes to transmit a system exclusive message, it should set msg[0] to MD_SYSEX (...
mdSetOrigin sets an Unadjusted System Time or UST (see syssgi(2)) that is used for all time based calculations on the port. By default, the origin time for a port is the time that it was opened. It may be reset with mdSetOrigin. mdSetOrigin takes as an argument a 64 bit UST, which represents the time that you wish to calculate time stamps from. If 0 is used, mdSetOrigin uses the current UST. If the time used is greater than the current system time (eg, in the future where we will all be famous f...
mdSetStampMode controls the interpretation of the stamp field in an MDevent by the port. The available interpretation modes are MD_NOSTAMP, MD_DELTASTAMP, MD_RELATIVESTAMP, MD_RELATIVETICKS and MD_DELTATICKS. If an output port is in MD_NOSTAMP mode, the interface will ignore the stamp and transmit the event immediately. On input, events are stamped with the UST (unadjusted system time) corresponding to the arrival time of the final byte in the message. In MD_DELTASTAMP mode, the stamp contains t...
mdSetStartPoint defines the start point on the MIDI time line. It takes two arguments, a UST time and a midi stamp value. The timeline is defined such that at the specified UST time, the midi stamp is set to the specified value.
mdSetDivision and mdSetTempo specify the conversion from MIDI clock ticks to real time values for the MDport. These functions are only applicable when a port is in one of the tick modes (MD_RELATIVETICK or MD_DELTATICK); they should not be called with ports in the other stamping modes. The following equation expresses relation of tempo, division, temposcale, and tick duration: tempo (usecs/beat) tick duration (usecs/tick) = ---------------------------------- division (ticks/beat) * temposcale md...
mdTell returns the relative stamp or tick of the last message sent on the port. mdTellNow returns a relative stamp or tick corresponding to the current time, regardless of when the last event was transmitted. For both routines, the returned value will be expressed in either ticks or nanoseconds, depending on whether the stamp mode of the port is a TICK or STAMP mode (see mdSetStampMode(3dm)). The value will be relative to the port's origin regardless of whether the stamp mode is DELTA or RELATI...
A pointer to the Tcl interpreter. The filename of the caller of Tcl_ValidateAllMemory. The line number of the caller of Tcl_ValidateAllMemory. File to display list of active memory.
These functions operate as efficiently as possible on memory areas (arrays of bytes bounded by a count, not terminated by a null character). They do not check for the overflow of any receiving memory area. memccpy copies bytes from memory area s2 into s1, stopping after the first occurrence of c (converted to an unsigned char) has been copied, or after n bytes have been copied, whichever comes first. It returns a pointer to the byte after ...
activeBackground background disabledForegroundrelief | activeBorderWidth borderWidth fonttakeFocus activeForeground cursor foreground See the ``options'' manual entry for details on the standard options. WIDGET-SPECIFIC OPTIONS Name: postCommand Class: Command Command-Line Switch:-postcommand If this option is specified then it provides a Tcl command to execute each time the menu is posted. The command is invoked by the post widget command before posting the menu. Name: selectColor Class: Back...
These procedures were used in Tk 3.6 and earlier releases to help manage | pulldown menus and to implement keyboard traversal of menus. In Tk 4.0 | and later releases they are no longer needed. Stubs for these procedures| have been retained for backward compatibility, but they have no effect. | You should remove calls to these procedures from your code, since | eventually the procedures will go away....
activeBackground cursor highlightThickness takeFocus | activeForeground disabledForeground image text | anchor font justify textVariable | background foreground padX underline | bitmap highlightBackground padY wrapLength | borderWidth highlightColor relief See the ``options'' manual entry for details on the standard options. WIDGET-SPECIFIC OPTIONS Name: height Class: Height Command-Line Switch:-height Specifies a desired height for the menubutton. If an image or bitmap is being displayed in t...
anchor font highlightThickness takeFocus | background foreground padX text | borderWidth highlightBackground padY textVariable | cursor highlightColor relief width See the ``options'' manual entry for details on the standard options. WIDGET-SPECIFIC OPTIONS Name: aspect Class: Aspect Command-Line Switch:-aspect Specifies a non-negative integer value indicating desired aspect ratio for the text. The aspect ratio is specified as 100*width/height. 100 means the text should be as wide as it is tal...
migr_range_migrate migrates a range of memory to the node where the MLD specified by mld_handle has been placed. migr_policy_args_init fills a migration parameter structure with default values. migr_range_migrate will fail and memory may not be successfully migrated if one or more of the following are true: EFAULT Arguments could ...
The minimum-value functions return the minimum of their arguments. There may be any number of arguments, but they must all be of the same type. min0 returns the integer form of the minimum value of its integer arguments; amin0, the real form of its integer arguments; min1, the integer form of its real arguments; amin1, the real form of its real arguments; dmin1, the double-precision form of its double-precision arguments; qmin1, the real*16 form of its real*16 arguments; imin1, the integer*2 for...
The minimum-value functions return the minimum of their arguments. There may be any number of arguments, but they must all be of the same type. min0 returns the integer form of the minimum value of its integer arguments; amin0, the real form of its integer arguments; min1, the integer form of its real arguments; amin1, the real form of its real arguments; dmin1, the double-precision form of its double-precision arguments; qmin1, the real*16 form of its real*16 arguments; imin1, the integer*2 for...
On INPUT NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. Note that NM must be at least as large as the maximum of M and N. M is the number of rows of A and B. N is the number of columns of A and the order of V. A contains the rectangular coefficient matrix of the system. IP is the number of columns of B. IP can be zero. B contains the constant column matrix of the system if IP is not zero. Otherwise B is not referenc...
op one of the symbolic constants: (parameters that affect lrectread, lrectwrite, rectcopy pixel transfers) MINMAX_ENABLE enables the computaton of minimum and maximum pixels in lrectread, lrectwrite and rectcopy pixel transfers. Value is ignored. MINMAX_DISABLE disables the collection of minmax data. MINMAX_INIT initializes the minmax data. value is ignored.
x expects the minimum width of a graphics window. The width is measured in pixels. The lowest legal value for this parameter is 1. y expects the minimum height of a graphics window. The height is measured in pixels. The lowest legal value for this parameter is 1.
These routines convert a textual name of a mandatory integrity (MINT) label from/to a mint_t - a pointer to a structure representing the mandatory integrity component of a MAC label. mint_from_text translates a textual description of a MINT label into a mint_t and returns the result. mint_to_text translates a mint_t into a character string describing the MINT label. Both of these routines allocate storage for the information returned. The allocated storage for both can be released when no longer...
mkdirp creates all the missing directories in the given path with the given mode. [See chmod(2) for the values of mode.] rmdirp removes directories in path d. This removal starts at the end of the path and moves back toward the root as far as possible. If an error occurs, the remaining path is stored in d1. rmdirp returns a 0 only if it is able to remove every directory in the path....
Mktemp replaces the contents of the string pointed to by template by a unique file name, and returns the address of template. The string in template should look like a file name with six trailing Xs; mktemp will replace the Xs with a string that can be used to create a unique file name. Mkstemp makes the same replacement to the template but returns a file descriptor for the template file open for reading and writing. Mkstemp avoids the race between testing whether the file exists and opening it ...
mktime converts the time represented by the tm structure pointed to by timeptr into a calendar time (the number of seconds since 00:00:00 UTC, January 1, 1970). The tm structure has the following format. struct tm { int tm_sec; /* seconds after the minute [0, 61] */ int tm_min; /* mi...
mld_create creates a memory locality domain. The argument radius is not currently used and is normally zero. The argument size is a hint specifying approximately how much physical memory in bytes will be required for this MLD. If this argument is set to MLD_DEFAULTSIZE then at the time of mld placement the kernel will make an estimate of the memory to be used based on the current total address space in use by the process and the number of mlds. mld_de...
mldset_create creates a memory locality domain set. mldset_destroy destroys a memory locality domain set. mldset_place places a memory locality domain set mldset_create will fail and no MLD set will not be created if one or more of the following are true: EFAULT Arguments could not be copied into kernel space. EFAULT T...
mlock locks the pages associated with the address range (addr, addr + len) into memory. The super-user can lock as many pages as it wishes, other users are limited to a per process maximum {PLOCK_MAX}. Locks established with mlock are not inherited by a child process after a fork. munlock unlocks the pages associated with the address range (addr, addr + len), regardless of the number of times the pages were locked. Page locks establi...
mlockall locks all pages mapped in the address space of the calling process into memory, including: text, data, stack and mmaped regions. Locked pages are immune to all routine swapping. The value of flags determines whether the pages to be locked are those currently mapped by the address space, those that will be mapped in the future, or both: MCL_CURRENT Lock current mappings MCL_FUTURE Lock future mappings m
m expects a symbolic constant, one of: MSINGLE puts the system into single-matrix mode. In single-matrix mode, all modeling, viewing, and projection transformations are done using a single matrix that combines all these transformations. This is the default matrix mode. MVIEWING puts the system into multi-matrix mode. In this mode, separate ModelView, Projection, and Texture matrices are maintained. The ModelView matrix is modified by all matrix operations, except for perspective, ortho, ortho2, ...
mod returns the integer remainder of its first argument divided by its second argument. imod returns the integer*2 remainder of its two integer*2 arguments. jmod returns the integer*4 remainder of its two integer*4 arguments. amod, dmod, and qmod return, respectively, the real, double-precision, and real*16 whole number remainder of the integer division of their two arguments. The generic version mod will return the data type of its arguments. The result of these intrinsics is undefined when the...
moninfo describes the characteristics of CRT monitors. The information included in this file is used by the XSGIvc X extension for video control; the information allows the extension to determine whether the monitor connected to a video channel has the capability to operate a given video format and to provide responses to general queries. The format of each entry in the moninfo file consists of the monitor type name followed by a series of assignment statements describing monitor characteristics...
NOTE: These functions have been moved from the standard C library to the libprof library. If a program needs to access these routines it must either use the -p option on the compiler/linker or explicitly link with the -lprof linker option. These functions have been changed to work correctly with dynamic shared objects (dsos). Use of the option -p during compilation and linking automatically generates calls to the monitor and moncontrol functions. You need to call these functions explicitly only ...
With these routines, the cursor associated with the window is moved to line y and column x. This routine does not move the physical cursor of the terminal until refresh is called. The position specified is relative to the upper left-hand corner of the window, which is (0,0).
Tk_Window tkwin (in) Token for top-level window to move. int x (in) New x-coordinate for the top-left pixel of tkwin's border, or the top-left pixel of the decorative border supplied for tkwin by the window manager, if there is one. int y (in) New y-coordinate for the top-left pixel of tkwin's border, or the top-left pixel of the decorative border supplied for tkwin by the window manager, if there is one....
These routines give some measure of control over the parallelism used in C programs. They should not be needed by most users, but will help to tune specific applications. Page 2 MP(3C) MP(3C) mp_block puts all slave threads to sleep via blockproc(2). This frees the processors for use by other jobs. This is useful if it is known that the slaves will not be needed for some time, and the machine is being shared by several users. Calls to mp_block may not be nested; a warning is issued if an attempt...
These routines give some measure of control over the parallelism used in C programs. They should not be needed by most users, but will help to tune specific applications. Page 2 MP(3C) MP(3C) mp_block puts all slave threads to sleep via blockproc(2). This frees the processors for use by other jobs. This is useful if it is known that the slaves will not be needed for some time, and the machine is being shared by several users. Calls to mp_block may not be nested; a warning is issued if an attempt...
mpconf provides control/information for miscellaneous multi-processor services. The arguments arg1, arg2, arg3 are provided for commanddependent use. As specified by cmd, the following commands are available: _MIPS_MP_NPROCESSORS Returns the number of processors physically configured. _MIPS_MP_NAPROCESSORS Returns the number of processors that are available to schedule unrestricted processes. _MIPS_MP_ISPROCESSOR_AVAIL The processor number given by arg1, interpreted as an 'int...
Mpool is the library interface intended to provide page oriented buffer management of files. The buffers may be shared between processes. The function mpool_open initializes a memory pool. The key argument is the byte string used to negotiate between multiple processes wishing to share buffers. If the file buffers are mapped in shared memory, all processes using the same key will share the buffers. If key is NULL, the buffers are mapped into private memory. The fd argument is a file descriptor f...
mq_close closes the connection between message queue descriptor, mqd, and its associated queue. The descriptor, mqd, should have been obtained from a prior call to mq_open(3c). No messages are added or removed from the queue. If multiple threads within a common process (i.e., sprocs, pthreads) are sharing mqd, a single call to mq_close will close the message queue for all threads within the calling process. If the process has a notifica...
mq_getattr saves the attributes and status information of the message queue named by mqd into the mq_attr structure at address mqstat. The following fields of the mq_attr structure are updated after a successful call to mq_getattr: long mq_flags; /* message queue flags */ long mq_maxmsg; /* ma
mq_notify registers a message notification request with the message queue named by mqd. A message notification is an asynchronous event which informs a process of a message that has arrived on a previously empty queue. A message queue transition from empty to non-empty will result in a notification delivery to the process that registered the request. There can be only one message notification registered with a queue at any given time. If the sigev_notify member of notific...
mq_open is used to open or to create and open a message queue. It returns a message queue descriptor that is used as the handle for other operations on the queue. mq_name points to a path name that is constructed using the standard filename conventions. The oflag argument is used to specify send, receive or send/receive access to the queue. It is also used to specify creation of the queue. The following oflags may be selected (the first three flags are mutually exclusive): O...
mq_receive removes a message, of size msglen bytes, from the message queue named by the mqd descriptor, and copies it to the buffer at address msgptr. Messages are removed in priority order with higher priority messages removed before the lower priority messages. The larger the numerical value of the priority, the more important the message. If the argument msgprio is not NULL, the priority of the message removed is stored at address msgprio. Messages of equal priority...
mq_send sends the message at address msgptr, of size msglen bytes, to the message queue named by mqd. The message is queued in priority order, as specified by msgprio. The larger the numerical value of the priority, the more important the message. Messages with same priorities are queued in FIFO order. The value of msgprio must be less than {MQ_PRIO_MAX}. A message queue is full when the number of the messages queued equals the value the of mq_maxmsg ...
mq_setattr sets the attributes, specified in the mq_attr structure pointed to by mqstat, of the message queue described by mqd. The attributes of the queue specified by the following fields of the mq_attr structure are updated after a successful call to mq_setattr: mq_flags If the O_NONBLOCK flag is set, then the mq_send and mq_receive functions do not block when operating on t...
mq_unlink removes the message queue named by the pathname, mq_name. If one or more processes has the message queue opened, the queue will be removed after all the processes close the queue. When all the references to the queue are gone the space occupied by the queue is released. After a successful call to unlink, the queue, mq_name, will not be accessible by any process that does not already have access to the queue, by a call to mq_open(3c). mq_<...
mode is a symbolic constant. MSA_MASK and MSA_MASK_ONE indicates that alpha values are to be converted to multisample mask values just prior to the alpha test. MSA_ALPHA indicates that no such conversion is to be done. The default is MSA_ALPHA.
These routines convert a textual name of a mandatory sensitvity (MSEN) label from/to a msen_t - a pointer to a structure representing the mandatory sensitivity component of a MAC label. msen_from_text translates a textual description of a MSEN label into a msen_t and returns the result. msen_to_text translates a msen_t into a character string describing the MSEN label. Both of these routines allocate storage for the information returned. The allocated storage for both can be released when no lon...
mask is a value between 0 and 1 inclusive, indicating what fraction of the multisamples at each pixel are to be updated. The default is 1. inverse specifies whether an inverse mask should be created.
samples is the number of samples to be stored at each framebuffer pixel location. The default is zero. zsize is the number of bits per depth component desired in the multisample buffer. ssize is the number of bits per stencil field desired in the multisample buffer.
fbuf Expects a bitfield comprised of the logical OR of one or more of the following symbols: DUALDRAW indicates that the framebuffers of two pipes are alternately swapped. This is known as Hyper-Pipline or Cyclops mode. NORMALDRAW indicates that the normal framebuffer is to be swapped. OVERDRAW indicates that the overlay framebuffer is to be swapped. UNDERDRAW indicates that the underlay framebuffer is to be swapped....
A movie contains a number of separate, parallel tracks, each of which contains one type of data. A movie may contain any number of tracks. These functions are used to add tracks to newly created movies, remove tracks from existing movies, and find tracks in an existing movie. The type MVid is used both for movies and for tracks so that the generic tag functions (see mvParams(3dm)) can work on movies and tracks. mvAddTrack adds a new track to a movie and returns the MVid for that track. The mediu...
movieid The specified movie instance. dpy The X display on which the movie instance will appear. win The X window in which the movie will appear. ctxt The OpenGL graphics context for the movie.
bool is the general name for the bit field manipulation intrinsic functions and subroutines from the FORTRAN Military Standard (MIL-STD1753). and, or and xor return the value of the binary operations on their arguments. not is a unary operator returning the one's complement of its argument. ior, iand, not, ieor - return the same results as and, or, not, and xor. lshift and rshift return the value of the first argument shifted left or right, respectively, the number of times specified by the sec...
These are the functions that are used to write, close, and destroy movie instances. mvWrite flushes all changes that have been made to a movie and makes sure that they are written to the file. DM_SUCCESS or DM_FAILURE is returned. Note that not all file formats support all editing features. For example, track gaps (also known as "Empty Edits") are currently only supported in QuickTime files. mvWrite will return failure upon attempting to wr...
For information one how to interpret a time, timeScale pair, please see the ``Time and Timescale'' section of mvIntro. mvConvertTime is a convenience function to convert time between time scales. time is passed in with the old time scale (oldScale) and the new time scale (newScale). The value returned is a time, measured in newScale.
These are the functions that are used to create new movie instances. A movie instance is a handle that allows you to read, write, edit, and play a movie file. It contains information about the different tracks (audio and image) in a movie. mvCreateFile, mvCreateFD, and mvCreateMem all create a new empty movie, initialized with the parameters params (see mvSetMovieDefaults(3dm)). The actual parameters set for the movie are returned in paramsUsedOrNULL (see mvParams(3dm)). Any movie that was alrea...
mvSetCurrentTime(3dm) tells the Movie Playback Library what the current time in the movie is. This call causes the playback to jump to that time in the movie. If curTime is less than 0 or greater than the value returned by mvGetEstMovieDuration(timeScale), then DM_FAILURE is returned and the movie errno is set to MV_TIME_OUT_OF_RANGE. mvGetCurrentTime(3dm) returns the current time being played. If the movie is stopped, this is the time corresponding to the currently displayed image. If the movie...
These functions edit tracks. They are medium-neutral and can be used for all tracks. mvDeleteFramesAtTime This function deletes a segment of the track. track is the track id of the track to be edited. time is the time for the beginning of the segment to be deleted. If this time is beyond the track duration, an error is set and DM_FAILURE is returned. duration is the duration of the segment to be deleted. If the end of the segment to be deleted, as indicated by time and...
mvReadFrames reads frameCount frames from the track, starting with frameIndex, and places them in buffer. The value returned is DM_SUCCESS or DM_FAILURE. For image tracks the image returned in the buffer pointed to by buffer are of pixel packing DM_IMAGE_PACKING_XBGR, interlacing DM_IMAGE_NONINTERLACED, and orientation DM_
mvSetEnableAudio(3dm) enables or disables all audio playback for a movie. To play audio, specify DM_TRUE for the onoff parameter; to mute audio, specify DM_FALSE. If the movie has no sound track, or the system does not have audio capability, this call has no effect. The default is DM_TRUE. You may play or mute audio regardless of whether or not the specified movie is currently playing. mvGetEnableAudio(3dm) returns the current audio playba...
mvSetEnableVideo(3dm) enables or disables all video playback for a movie. To play audio, specify DM_TRUE for the onoff parameter; to turn off the video, specify DM_FALSE. If the movie has no IMAGE track, or is not currently bound to a visual port or window, this call has no effect. The default is DM_TRUE. You may disable or enable the video regardless of whether or not the specified movie is currently playing. mvGetEnableVideo(3dm) returns...
These calls initialize and provide access to the Movie Playback Library event queues. There is one queue to which events are sent for all movies. Also, each movie provides an event queue which receives events for only that movie. An application should choose to either use the per/movie event queues or the global event queue. Mixing the use of these is unwise as events are sent to both queues and the application will see events twice. Without exception, in the following, each statement about a gi...
srcMovie The movie that contains the content to be exported. This may be an arbitrarily complex movie, with multiple image tracks and multiple audio tracks. dstFileName The pathname of the output file that will be created. dstFileFormat Specifies what type of file to create (in parameter MV_FILE_FORMAT), plus any format-specific details. Valid MV_FILE_FORMATs include MV_FORMAT_QT, MV_FORMAT_MPEG1, MV_FORMAT_AVI, MV_FORMAT_DIF, and MV_FORMAT_SGI_3. Page 1 mvExportFlattenedFile(3dm) mvExportFlatte...
These functions are used to find tracks in a movie instance. mvFindTrackByIndex returns the track indexed by trackIndex in returnTrack. An application can search for all of the tracks in a movie by first using mvGetNumTracks to find the number of tracks and then calling mvFindTrackByIndex with trackIndex ranging from zero to the number of tracks minus one. The medium of the track can be found by calling mvGetTrackMedium(3dm). mvFindTrackByMedium is used to get a handle for a track of medium medi...
mvGetActualFrameRate(3dm) returns the frame rate which the Movie Playback Library has actually achieved for the specified movie, computed over the last second of playback. The return value of mvGetActualFrameRate(3dm) is always equal to or less than the movie's current speed. The movie's current speed is its natural frame rate, as stored in the movie file, multiplied by the absolute value of the play speed setting. (The return value of mvGetActualFrameRate(3dm) is always >= 0 regardless of the...
All of the data accessed by these functions can also be accessed using mvGetParamsmvGetAudioWidth returns the number of bits used to store each audio sample. The movie library supports 8-bit and 16-bit audio samples. mvGetAudioRate returns the number of samples per second. mvGetAudioChannels returns the number of audio channels, 1 for mono and 2 for stereo. mvGetAudioFormat returns the format used to store each sample: either DM_AUDIO_TWOS_COMPL...
mvGetBitrate returns the bitrate of the track or movie. It is only defined on movies for MPEG movies. If the bitrate is the token for "variable," this function will return 0. For tracks, it returns the bitrate parameter set on the track.
Each track is made up of frames, each of which can be typed. Current frame types supported are key frames (MV_FRAMETYPE_KEY) or delta frames (MV_FRAMETYPE_DELTA). Frames can be grouped into chunks and/or edit atoms. mvGetMovieBoundary and mvGetTrackBoundary allow the user to get at this information. Valid values for MVdirection are: MV_FORWARD and MV_BACKWA...
mvGetErrno(3dm) returns the error code set by the last Movie Library function that returned an error (DM_FAILURE). mvGetErrorStr(3dm) returns an error string corresponding to error. mvClearErrno(3dm) sets the error code stored in the Movie Library to zero. If the value of dmGetErrno(3dm) does not match one of the error codes outlined in moviefile.h, it will match one of the system error codes outlined in . Besides error codes which are returned by Movie Li...
All of the data accessed by these functions can also be accessed using mvGetParamsmvGetFileFormat returns the format in which the movie is stored, which will one of MV_FORMAT_SGI_3 (Silicon Graphics format), MV_FORMAT_QT (QuickTime (tm) format), MV_FORMAT_MPEG1 (MPEG format), or MV_FORMAT_AVI (Microsoft AVI format). mvGetLoopMode gets the default looping mode ...
All of the data accessed by these functions can also be accessed using mvGetParamsmvGetImageWidth returns the x size (in pixels) of the images stored in the track. mvGetImageHeight returns the y size (in pixels) of the images stored in the track. mvGetImageRate returns the number of frames per second that are shown when playing the movie. mvGetImageRate returns the default frequency for key frames when frames are being added and compressed in the movie library using a compression scheme that sup...
When mvRenderMovieToOpenGL is called, the movie library disables some of the unused GL extensions in order to optimize the pixel path for drawing. Between two successive calls to mvRenderMovieToOpenGL, the movie library, by default, goes through the disabling routines to make sure that the pixel path is in the state that it needs to be in while it is drawing and restores the graphics states when it is done drawing . However, the overhead in changing the graphics states can be rather expensive. I...
These functions are used to get and set the volume of a movie or track. mvSetMoviePlayVolume takes a movie id and a float volume between 0 and 1.0. The Movie Playback Library's engine will scale the volume of all the audio tracks in the movie by volume during playback. mvGetMoviePlayVolume returns the current volume of movie. If no volume is set with mvSetMoviePlayVolume the default volume of 1.0 is returned. mvSetTrackPlayVolume takes a track id and a float volume between 0 and 1.0. This funct...
These functions allow certain information about a movie's current time, selection, still ``gallery,'' or movie ``preview'' to be accessed or stored with a movie. The movie current time is a time and timescale stored with a movie so that the next time the movie is opened, the movie can automatically be started at the same location it was at in the previous editing/viewing session. mvGetMovieCurrentTime allows the user to query for a movie's current time (which will be returned in the timeSc...
Function to determine the number of tracks in a movie instance. mvGetNumTracks returns the total number of tracks in the movie. This includes any tracks that existed when the movie was opened and any that have been added since. Whenever a track is added or removed, this number will change.
The data to describe a single image in an image track may be made up of two fields. In a QuickTime file, an auxillary table can be stored in the meta data to describe the sizes and relative positions of these fields. These functions allow users to get at field information. Currently, this feature is only supported on QuickTime files. mvTrackDataHasFieldInfo This function must be called to determine whether a chunk of data has field information. The function returns DM_TRUE if field information i...
For information one how to interpret a time, timeScale pair, please see the ``Time and Timescale'' section of mvIntro(3dm). These function in the movie library are provided to allow the user to get or set information about a movie's time properties, such as a track's duration, and a track's starting time.
Each track in a movie can be enabled or disabled. Most functions that operate on the movie as a whole take this flag into account. Most movie editing functions, like mvDeleteMovieAtTime, take an argument that determines whether to operate on the whole movie or only on the enabled tracks. All rendering functions, like mvRenderMovieToOpenGL, only operate on enabled tracks. When a track is created, it is enabled by default. mvSetTrackEnable This function sets the enable flag for the track passed in...
The ``layer'' value (a signed integer) of a track determines its rendering order with respect to other tracks. For visual tracks (e.g. image tracks), tracks with smaller (ie, more negative) ``layer'' value are rendered on top of (possibly obscuring) tracks with bigger (ie, more positive) ``layer'' value. For aural tracks (e.g. audio tracks), this value is ignored during rendering. If a there is more than one track in a single layer, the tracks are rendered in an order determined by the tra...
All of the data accessed by these functions can also be accessed using mvGetParamsmvGetTrackLength returns the number of frames playable at the frame rate of a track. For some compression schemes, MPEG in particular, a movie file can be opened in one of two modes, with prescan or without prescan. Movies opened without prescan do not have a defined length for their tracks. mvGetScannedLength provides a way to get at the length currently known to the movie library for a certain track. Currently, t...
These are convenience functions to allow applications that are sensitive to memory allocation to preallocate the worst case data size. mvGetTrackMaxDataSize returns in size the maximum data size of all the chunks in the data. mvGetTrackMaxFieldDataSize returns in size the maximum size of a field among all the fields with field information in a track.
For information one how to interpret a time, timeScale pair, please see the ``Time and Timescale'' section of mvIntro. These function in the movie library are provided to allow the user to get or set the default timescale for either a track or a movie. TRACK TIMESCALE AND MOVIE TIMESCALE mvGetTrackTimeScale allows the user to learn what timescale the movie library is using internally to represent track edits. It allows an application to know the finest resolution at which edits can be made to ...
These functions return a pointer to the user data dmParams, which you can then examine and modify using dmParamsGet* and dmParamsSet*. You should not free this pointer, as it is owned by the movie library. The params set in this fashion will be stored in the file when it is written, if the file format supports user data. Note that currently, the QuickTime file format is the only file format that supports user data....
mvGrabOpenGL(3dm) tells the Movie Playback Library that your application wishes to use OpenGL. These functions temporarily suspend display of all movie instances until you call mvReleaseOpenGL(3dm). mvGrabOpenGL(3dm) does not stop playback; instead, it merely suspends the display of images on the workstation screen. Internally, the Movie Playback Library uses the sproc(2) system call to provide asynchronous playback in a separate execution thread. Multiple threads in the same process may have ac...
mvSetMovieHwAcceleration(3dm) should be used to tell the Movie Playback Library to use hardware acceleration when available for a given movie. mvSetMovieHwAcceleration(3dm) must not be called while a movie is currently bound to a window (or port). Calling this routine with a tryHw value of DM_TRUE does NOT insure that hardware acceleration will actually be used. An application can determine whether or not acceleration is actually used by calling mvGetMovieHwAcceleration(3dm). B...
mvInsertFramesAtTime inserts a series of data chunks into the track. time is the time at which the new segment is to be inserted. If the time specified is beyond the duration of the track, an empty segment will first be inserted to cover the time between the duration of the track and the time specified by the user. duration is the duration for which the inserted segment is to last. timescale is the timescale for time and duration. buffer is a pointer to a buffer of uncompressed data to be insert...
While movie data is stored in tracks, there are a few properties that are available on a per-movie basis. For example, mvGetMovieDuration queries for the overall length of the movie. Additionally, there are functions that control how the movie is rendered or played back (see mvGetMovieRect), functions to obtain information about the file (see mvGetFileFormat), and functions to store and retrieve additional information about how to preview a file (eg, mvGetMoviePreviewTime), and textual informati...
mvIsMovieFile, mvIsMovieFD, and mvIsMovieMem test whether a movie instance is present in a file, a file descriptor, or in memory. Only movies in supported formats (SGI, QuickTime, MPEG1, and AVI) are recognized. They return DM_TRUE if a movie is present, and DM_FALSE if not.
In some circumstances an application may not be allowed to read or edit a movie while appending frames to its tracks; this is currently the case for MPEG-1 movies. In general, mvIsAppendOnly should be called after a movie is created to determine whether or not reading and editing calls are allowed. mvIsAppendOnly returns DM_TRUE if the movie is append-only and DM_FALSE if it is not....
In some circumstances an application may not be allowed to modify a movie even if the movie is opened O_RDWR. Reasons for this include incomplete support of certain file formats or lack of necessary compression functionality. The call mvIsReadOnly should be called after a movie has been opened to determine whether or not calls which modify the movie will be allowed. mvIsReadOnly returns DM_TRUE if the movie is read-only and DM_FALSE if it is ...
Different tracks in a movie have different rates of presentation. Frame number 10 of an image track may be presented at the same time as frame number 220500 in an audio track. This function is used to find corresponding frame numbers in different tracks. The tracks are named by fromTrack and toTrack. The frame number of track fromTrack in fromFrameIndex is converted to a frame number for track toTrack and placed in toFrameIndex. The starting times for frames in different tracks may not coincide ...
This set of functions manipulate the 2-dimension matrix associated with each movie and track. MVmatrix2d is a 3 by 3 2-dimensional array. These matrices affects how visual tracks are laid out with respect to each other. It also affects how the movie is laid out on the screen. These matrices have no effects on aural tracks. mvSetMovieMatrix2d sets the movie matrix of movie to matrix. mvSetMovieMatrix2dIdentity is a convenience function that sets the movie matrix of movie to an identity matrix. mv...
These functions edit movies. All of them take the enabledTracksOnly flag as one of the parameters. If enabledTracksOnly == DM_TRUE, only enabled tracks will be affected by the edit. Otherwise, all tracks in the movie will be affected. A track can be enabled/disabled by calling mvSetTrackEnable(3dm), and a track's enable state can be checked by calling mvGetTrackEnable(3dm). Note that not all file formats support writing out movies with edit lists. Currently, the only file form...
An MVrect is defined as: typedef struct { int left, bottom; int right, top; } MVrect; The movie rectangle governs how the movie is to be rendered to the screen when mvRenderMovieToOpenGL is called. The values of the movie rectangle are expressed in screen coordinates. The movie library uses this to set the viewport for the rendering context. The image of the movie library is resized to fit into the movie rect. The bounding rectangle is the rectangle in the movie coordinate space that encloses al...
mvSetNumMoviesHint(3dm) advises the Movie Playback Library of the number of movie instances which you are likely to ever play back at once. If possible, this hint is used by the Movie Playback Library to properly allocate internal system resources. mvSetNumMoviesHint(3dm), if used, must be called before any other Movie Playback Library function. mvGetNumMoviesHint(3dm) returns the number of movies which the Movie Playback Library is likely to be able to play at once. This number is not a guarant...
mvOpenFile, mvOpenFD, and mvOpenMem read an existing movie and create a movie instance in memory that holds information about it. A movie instance is a handle that allows you to read, write, edit, and play a movie file. It contains information about the different tracks in a movie. These operations are defined for three different storage media (file name, file descriptor, and memory). mvOpenFile is used to read files on disk. fileName gives the name of the file to open, and oflag must have eithe...
To play back optimally, the audio data and the image data should be interleaved and stored in a movie file sequentially, so that the file can be read without seeking back and forth. Making changes to a movie can cause the data to be out of order. For example, inserting samples into a track places the new samples at the end of the file, although the header information at the beginning of the file may indicate that the inserted samples are to be played in the middle of the movie. The reason for do...
Basic Program Structure The basic MVP VL application has the following components. All of these calls are described in the following sections with further information available in both the VL manpages and the Digital Media Programmer's Guide. Preliminary path set up: vlOpenVideo open the video server. Page 3 mvp(3dm) mvp(3dm) vlGetDeviceList discover which devices and nodes are connected to this system. vlGetNode get the source and drain nodes. vlCreatePath create a video path with the source a...
mvGetParams returns the parameter list associated with a movie or track. For movies, the parameter list contains the file format, looping mode, etc. For tracks, the parameter list contains information about the format of the data in the track. The parameter list pointer returned points into the internal data structures of the movie. Any values from it that are to be kept should be copied, because the movie library may change the structures if the movie is changed or closed. Do not call dmParamsD...
mvPlay(3dm) begins movie playback. The Movie Playback Library does not change any playback parameters associated with the movie, such as speed and direction of playback. For example, if you change the speed of movie playback, then call mvPlay(3dm), the movie plays at the speed you had just set. If the movie is already playing, mvPlay(3dm) has no effect. mvStop(3dm) stops movie playback. If you have requested MV_EVENT_STOP events, the Movie Playback Library will s...
mvSetPlayEveryFrame(3dm) allows you to decide whether a movie should play in real-time against a clock base, or should play back all frames. To play back every frame in sequence without dropping intervening frames, call mvSetPlayEveryFrame with a value of DM_TRUE for the sync parameter. To play back movies at the current speed, dropping frames if necessary to keep up with the movie's time base, call mvSetPlayEveryFrame(3dm) with a value of DM_FALSE for the...
mvSetPlayLoopMode(3dm) determines whether Movie Playback Library should play the specified movie once, loop repeatedly, or swing forwards and backwards. This call will override, for playback purposes only, any looping information which may be present in the movie file. For file formats which support loop mode information, Movie Playback Library obtains the default setting from the movie file. For other file formats, the default is MV_LOOP_NONE. mvGetPlayLoopMode(3dm...
mvSetPlaySpeed(3dm) changes the movie play speed, expressed as a fraction of the movie's natural image frame rate. This frame rate is stored in the movie file (SGI and QuickTime only) and it may be determined by calling mvGetImageRate(3dm). For example, if you call mvSetPlaySpeed(3dm) with a value of 2.0, the movie plays twice as fast as it normally would. For movies with audio, the Movie Playback Library attempts to resample the audio to match the requested playback speed. This changes the pit...
Generic playback ports provide the application with more direct control over the playback configuration than the mvBindOpenGLWindow(3dm) interface. For example, applications that need to play movies in double-buffered windows should use open and bind an MV_PORT_GFX port while an application that desires to play only the audio from a movie should use an MV_PORT_AUDIO port. Applications that desire to play movies to video-out should open and bind MV_PORT_VIDEO. Page 1 mvPort(3dm) mvPort(3dm) Use m...
mvSetPrimaryAudio(3dm) tells the Movie Playback Library to favor a particular movie's audio sampling rate for playback. The preferred audio sample rate of a movie is the sample rate of the movie's first audio track. You may designate a movie as primary regardless of whether or not it is currently playing. The default value for the primary audio movie is MV_PRIMARY_AUDIO_NOTSET. When the primary audio movie is set to something other th...
querytype is an integer value token representing the type of query being made. arg1,...arg4 are integer value tokens representing the query selectors and/or subtypes. The number of meaningful arguments to the mvQuery routines varies with the querytype.
These functions are similar to the ones in mvEditByFrame(3dm) that read and write frames in a movie track, but these functions read and write the uncompressed data in an image track. This can save on compression/decompression time for applications that deal directly with compressed image data. mvGetCompressedImageSize return the number of bytes that image number frameIndex requires. mvReadCompressedImage reads image number frameIndex into buffer. If the frame number is out of range or if it corr...
Each instance in track time corresponds to a certain block of physical data. For example, an image track is made up of bytes that describe images. The relationship between these two are covered by functions described in mvTrackData(3dm). Functions described in this page allow users to have access to such physical blocks. These are low-level functions that most applications will not need. They are only useful for applications that need to access low-level information like file offsets and raw com...
The data to describe a single image in an image track may be made up of two fields. In a QuickTime file, an auxillary table can be stored in the meta data area to describe the sizes and relative positions of these fields. When field information is available, mvReadTrackDataFields can be used to read each field into its own buffer. mvInsertTrackDataFields may be used to insert field data in separate buffers into a track. This feature is only fully supported for QuickTime files. mvReadTrackDataFie...
mvRenderMovieToAudioBuffer renders the movie's enabled audio tracks starting at time renderTime for renderDuration time ticks in the given scale and direction into the provided memory buffer. If the direction is MV_BACKWARD, the audio frames will be reversed in time, starting at renderTime and ending with renderTime - renderDuration. The buffer will be filled with audio frames in the format specified by formatParams. This parameter list should include DM_A...
The movie and track rendering routines provide a way for applications to access or display the data stored in movies. These routines are intended to replace mvReadFrames(), which is still provided for backwards compatibility. mvRenderMovieToOpenGL This function renders a movie at an instance in time to the current OpenGL/X context. Only enabled tracks are rendered (see also mvSetTrackEnable(3dm)). The position at which the movie is to be drawn is determined by the movie rectangle (which can be s...
mvSetImageDefaults sets up the default image parameters for an image track to be inserted in to a movie of format format. mvSetAudioDefaults sets up the default image parameters for an image track to be inserted in to a movie of format format. These functions should be used in place of dmSetImageDefaults and dmSetAudioDefaults before adding an track to a movie with mvAddTrack.
mvShowCurrentTime(3dm) displays the current movie frame on screen for the specified movie. You should call mvShowCurrentTime(3dm) in response to X Expose events. In addition, if you have disabled Movie Playack Library frame display (see mvSetEnableVideo(3dm)), mvShowCurrentTime(3dm) you should call mvShowCurrentTime(3dm) in response to Movie Playback Library MV_EVENT_FRAME events. You may call mvShowCurrentTime(3dm) for a movie regardless of whether or not the...
mvSetStartFrame(3dm) sets the image frame at which you would like the Movie Playback Library to start playback for the specified movie. The default value for this option is zero (i.e., the first image frame of the movie). mvSetEndFrame(3dm) chooses the image frame at which you would like the Movie Playback Library to stop playback for the specified movie. The default value for this option is the last image frame in the movie. The last image frame is one less than the duration of the movie divide...
The Movie Playback Library playback engine represents synchronization information using the MVsyncInfo structure. The structure describes two times which are synchronous. The ust is an Unadjusted System Time (in nanoseconds) and movieTime (along with its timeScale) typically represents an instant in a movie or some other media to which or from which one is expressing synchronization. The way to read an MVsyncInfo is to say that the given movieTime will be displayed, played, or presented at the g...
Each instance in time correspond to some chunk of data in the file, unless it belongs to an empty segment. Functions in this page provide information about these chunks of data referenced by a track. mvGetNumDataIndex This function returns the number of data chunks referenced by a track. mvGetTrackDataIndexAtTime track is the id of the track. time is the time instance the user wishes to query. timescale is the time scale for time. index contains the returned index. If index==-1, then the time wh...
Each chunk of data in the file is described by a set of DMparams. The following functions allow applications to access these params. To retrieve the index of the DMparams that describes a certain chunk of data, use mvGetTrackDataIndexAtTime(3dm). mvGetTrackNumDataParams returns the number of data params in the list of the track. mvAddTrackDataParams adds a data description parameter to the list of parameters in a track. The function returns an index into the list at which point the new params we...
The Movie Playback Library supports 3 video display modes that specify how movies of non-standard sizes should be displayed on video devices (e.g. when they are bound to MV_PORT_VIDEO).
Because of temporal differences between fields, still frames derived from interlaced video often "shimmer" or "jitter". An application can counter this effect by setting the movie's video still frame to DM_TRUE. When the video still frame is set to DM_TRUE, the Movie Playback Library will send 2 copies of either the first or second field (and zero copies of the other field) for a still frame. The Movie Library chooses which field is sent so as to minimize jitter. When the video still frame ...
mSetViewOffset(3dm) sets the offset for the view for rendering movie frames in an OpenGL window, relative to the origin of the window. You use the glcoordsystem parameter to determine the screen coordinate system for the y offset. If glcoordsystem is DM_TRUE, Movie Playback Library assumes the OpenGL screen coordinate system with (0, 0) in lower left. If it is DM_FALSE, Movie Library assumes the X coordinate system with (0, 0) in upper left. mvQueryViewOffs...
mvSetViewBackground(3dm) sets the color for the background region of a movie instance. The values for each color component can be in the range from 0-255. The default background color is SGI light gray, RGB (170, 170, 170). mvGetViewBackground(3dm) returns the current background color components. You may call these functions for a specified movie instance regardless of whether or not the movie is playing. You may only call these functions for a specified movie while it is bound to a window (see ...
The m_fork routine creates n-1 processes that execute the given func in parallel with the calling process. The processes are created using the sproc(2) system call, and share all attributes (virtual address space, file descriptors, uid, etc.). Once the processes are all created, they each start executing the subprogram func taking up to six arguments as passed to m_fork. The arguments passed must not be larger than pointers in size, i.e. floating point numbers must be passed by reference. The pr...
These functions maintain key/content pairs in a data base. The ndbm functions will handle very large (a billion blocks) databases and will access a keyed item in one or two file system accesses. The ndbm64 functions are identical to the ndbm routines except that they can be used to operate on databases larger than 2 Gigabytes. This package replaces the earlier dbm(3B) library, which managed only a single database. Keys and contents are described by the datum typedef. A datum specifies a string o...
This module's default exports override the core gethostbyname() and gethostbyaddr() functions, replacing them with versions that return "Net::hostent" objects. This object has methods that return the similarly named structure field name from the C's hostent structure from netdb.h; namely name, aliases, addrtype, length, and addr_list. The aliases and addr_list methods return array reference, the rest scalars. The addr method is equivalent to the zeroth element in the addr_list array referenc...
This module's default exports override the core getnetbyname() and getnetbyaddr() functions, replacing them with versions that return "Net::netent" objects. This object has methods that return the similarly named structure field name from the C's netent structure from netdb.h; namely name, aliases, addrtype, and net. The aliases method returns an array reference, the rest scalars. You may also import all the structure fields directly into your namespace as regular variables using the :FIELDS...
This module contains methods to test the reachability of remote hosts on a network. A ping object is first created with optional parameters, a variable number of hosts may be pinged multiple times and then the connection is closed. You may choose one of three different protocols to use for the ping. With the "tcp" protocol the ping() method attempts to establish a connection to the remote host's echo port. If the connection is successfully established, the remote host is considered reachable....
This module's default exports override the core getprotoent(), getprotobyname(), and getnetbyport() functions, replacing them with versions that return "Net::protoent" objects. They take default second arguments of "tcp". This object has methods that return the similarly named structure field name from the C's protoent structure from netdb.h; namely name, aliases, and proto. The aliases method returns an array reference, the rest scalars. You may also import all the structure fields direct...
This module's default exports override the core getservent(), getservbyname(), and getnetbyport() functions, replacing them with versions that return "Net::servent" objects. They take default second arguments of "tcp". This object has methods that return the similarly named structure field name from the C's servent structure from netdb.h; namely name, aliases, port, and proto. The aliases method returns an array reference, the rest scalars. You may also import all the structure fields dire...
These routines provide a generic interface for name-to-address mapping that will work with a all transport protocols. This interface provides a generic way for programs to convert transport specific addresses into common structures and back again. The netdir_getbyname routine maps the machine name and service name in the nd_hostserv structure to a collection of addresses of the type understood by the transport identified ...
newtg expects an identifier for the tag that will be created. oldtg expects an existing tag. It will be used as a reference point for inserting newtg. offst expects the number of positions beyond oldtg where newtg. will be placed.
NOTE: The nlist function has moved to the Elf library (-lelf). Programs that need to use nlist must be linked with the -lelf option (in IRIX4, nlist was in -lmld). nlist examines a section with Elf section type SHT_SYMTAB or SHT_DYNSYM (whichever comes first in the Elf file) in the given Elf file and selectively extracts a list of values. The name list consists of an array of structures containing names, types and values. The list is terminated with a structure containing a NULL (a NULL pointer)...
nl_langinfo returns a pointer to a null-terminated string containing information relevant to a particular language or cultural area defined in the program's locale. The manifest constant names and values of item are defined by langinfo.h. For example: nl_langinfo (ABDAY_1); would return a pointer to the string ``Dim'' if the identified language was French and a French ...
mode expects a symbolic constant. There are two defined constants for this parameter: NAUTO causes normals to be renormalized only if the current ModelView matrix is not orthonormal. (default) NNORMALIZE causes normals to always be renormalized, regardless of the current ModelView matrix.
v expects a valuator. A valuator is a single-value input device. delta expects the number of units of change required before the valuator v can make a new queue entry.
bool is the general name for the bit field manipulation intrinsic functions and subroutines from the FORTRAN Military Standard (MIL-STD1753). and, or and xor return the value of the binary operations on their arguments. not is a unary operator returning the one's complement of its argument. ior, iand, not, ieor - return the same results as and, or, not, and xor. lshift and rshift return the value of the first argument shifted left or right, respectively, the number of times specified by the sec...
DNRM2, SNRM2, ZDNRM2, CSNRM2 compute the Euclidean norm of the vector X of length N and increment INCX. nrm2 <--- Sqrt ( Sum( X(i)**2 ) ) DNRM2 and SNRM2 nrm2 <--- Sqrt ( Sum( conjg( X(i) ) * X(i) ) ) DZNRM2 and SCNRM2
ns_lookup, ns_list and ns_close are part of the public interface to the UNS name service daemon, nsd(1M). Ordinarily they are called through name service library routines such as getpwnam(3C) and gethostbyname(3N). When ns_lookup is called with a particular domain, table and key, it first will mmap in a global shared cache database corresponding to the table name and attempt to look up the key. The mdbm database cache information is stored in the passed map structure. If the lookup fails then th...
These Fortran 90 inquiry functions return scalar values that describe parameters of a model which represents numbers of the type and type parameters of argument x; the value of the argument need not be defined, if a pointer it may be disassociated, if an array it need not be allocated. It must be of integer or real type. The digits function returns an integer with the number of significant digits in the model for x. The epsilon function returns the difference between 1 and the next nearest repre...
knot_count number of knots in knot_list. knot_count equals the number of control points plus the order. knot_list array of knot_count non-decreasing knot values. offset offset (in bytes) between successive curve control points. ctlarray pointer to an array of control points. The coordinates must agree with the type specified below. order order of the NURBS curve. order equals degree + 1, hence, a cubic curve has an order of 4. The maximum order is given by getgdesc (GD_NURBS_ORDER). type type of...
s_knot_count expects the number of knots in the parametric s direction. s_knot expects an array of s_knot_count non-decreasing knot values in the parametric s direction. t_knot_count expects the number of knots in the parametric t direction. t_knot expects an array of t_knot_count non-decreasing knot values in the parametric t direction. s_offset expects the offset (in bytes) between successive control points in the parametric s direction in ctlarray. t_offset expects the offset (in bytes) betwe...
Perl code is always compiled into an internal format before execution. Evaluating perl code (e.g. via "eval" or "do 'file'") causes the code to be compiled into an internal format and then, provided there was no error in the compilation, executed. The internal format is based on many distinct opcodes. By default no opmask is in effect and any code can be compiled. The Opcode module allow you to define an operator mask to be in effect when perl next compiles any code. Attempting to compile ...
This command opens a file and returns an identifier that may be used in future invocations of commands like read, puts, and close. FileName gives the name of the file to open; if it starts with a tilde then tilde substitution is performed as described for Tcl_TildeSubst. If the first character of fileName is ``|'' then the remaining characters of fileName are treated as a command pipeline to invoke, in the same style as for exec. In this case, the identifier returned by open may be used to wri...
The opendir function is used to create a PROJ token. The closedir function is used to destroy it when it is no longer needed. The getprojuser family of functions (including projid, projname, getprojall, getprojuser, getdfltprojuser and validateproj) is used to extract information from the project and projid files. Because these functions open, read, and close the project and projid files, they can be inefficient if it is necessary to use them repeatedly in the same program. Therefore, a second s...
Since the ops pragma currently has an irreversable global effect, it is only of significant practical use with the -M option on the command line. See the the Opcode manpage module for information about opcodes, optags, opmasks and important information about safety.
The option command allows you to add entries to the Tk option database or to retrieve options from the database. The add form of the command adds a new option to the database. Pattern contains the option being specified, and consists of names and/or classes separated by asterisks or dots, in the usual X format. Value contains a text string to associate with pattern; this is the value that will be returned in calls to Tk_GetOption or by invocations of the option get command. If priority is specif...
This procedure creates an option menubutton whose name is w, plus an associated menu. Together they allow the user to select one of the values given by the value arguments. The current value will be stored in the global variable whose name is given by varName and it will also be displayed as the label in the option menubutton. The user can click on the menubutton to display a menu containing all of the values and thereby select a new value. Once a new value is selected, it will be stored in the ...
bool is the general name for the bit field manipulation intrinsic functions and subroutines from the FORTRAN Military Standard (MIL-STD1753). and, or and xor return the value of the binary operations on their arguments. not is a unary operator returning the one's complement of its argument. ior, iand, not, ieor - return the same results as and, or, not, and xor. lshift and rshift return the value of the first argument shifted left or right, respectively, the number of times specified by the sec...
On INPUT NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. LOW and IGH are integers determined by the balancing subroutine BALANC. If BALANC has not been used, set LOW=1 and IGH equal to the order of the matrix. A contains information about the orthogonal trans- formations used in the reduction by ORTHES in its strict lower triangle. ORT contains further information about the trans- formations used in the reduction by ...
On INPUT NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix. LOW and IGH are integers determined by the balancing subroutine BALANC. If BALANC has not been used, set LOW=1, IGH=N. A contains the input matrix. On OUTPUT A contains the Hessenberg matrix. Information about the orthogonal transformations used in the reduction is stored in the remaining triangle under the Hessenberg matrix. ORT c...
left expects the coordinate for the left vertical clipping plane. right expects the coordinate for the right vertical clipping plane. bottom expects the coordinate for the bottom horizontal clipping plane. top expects the coordinate for the top horizontal clipping plane. near expects the distance to the nearer depth clipping plane. far expects the distance to the farther depth clipping plane.
On INPUT NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix. LOW and IGH are integers determined by the balancing subroutine BALANC. If BALANC has not been used, set LOW=1, IGH=N. A contains information about the orthogonal trans- formations used in the reduction by ORTHES in its strict lower triangle. ORT contains further information about the trans- formations used in the reduction by ORTH...
Most system calls and many system library functions set a global error value errno when they encounter an error. For single threaded applications a global is sufficient. For multi-threaded applications a global error value loses much of its meaning, since multiple threads may be updating the same value at the same time. When a process turns multi-threaded (by calling sproc(2)) a per-thread location to store the error value is created. sproc(2) and intr
ostreams support insertion (storing) into a streambuf. These are commonly referred to as output operations. The ostream member functions and related functions are described below. In the following descriptions, assume: - outs is an ostream. - outswa is an ostream_withassign. - outsp is an ostream*. - c is a char. - ptr is...
The overlay and overwrite routines overlay srcwin on top of dstwin. scrwin and dstwin are not required to be the same size; only text where the two windows overlap is copied. The difference is that overlay is non-destructive (blanks are not copied) whereas overwrite is destructive. The copywin routine provides a finer granularity of control over the overlay an...
Overloading of operators is a subject not to be taken lightly. Neither its precise implementation, syntax, nor semantics are 100% endorsed by Larry Wall. So any of these may be changed at some point in the future.
Tk_Window tkwin (in) Window that is to become new selection owner. Atom selection (in) The name of the selection to be | owned, such as XA_PRIMARY. Tk_LostSelProc *proc (in) Procedure to invoke when tkwin loses selection ownership later. ClientData clientData (in) Arbitrary one-word value to pass to proc.
p2open forks and execs a shell running the command line pointed to by cmd. On return, fp[0] points to a FILE pointer to write the command's standard input and fp[1] points to a FILE pointer to read from the command's standard output. In this way the program has control over the input and output of the command. The function returns 0 if successful; otherwise it returns -1. p2close is used to close the file pointers...
The pack command is used to communicate with the packer, a geometry manager that arranges the children of a parent by packing them in order around the edges of the parent. The pack command can have any of several forms, depending on the option argument: pack slave ?slave ...? ?options? If the first argument to pack is a window name (any value starting with ``.''), then the command is processed in the same way as pack configure. pack configure slave ?slave ...? ?options? The arguments consist o...
The pack command is used to communicate with the packer, a geometry manager that arranges the children of a parent by packing them in order around the edges of the parent. The pack command can have any of several forms, depending on the option argument: pack slave ?slave ...? ?options? If the first argument to pack is a window name (any value starting with ``.''), then the command is processed in the same way as pack configure. pack configure slave ?slave ...? ?options? The arguments consist o...
Note: this manual entry describes the syntax for the pack command as it existed before Tk version 3.3. Although this syntax continues to be supported for backward compatibility, it is obsolete and should not be used anymore. At some point in the future it may cease to be supported. The packer is a geometry manager that arranges the children of a parent by packing them in order around the edges of the parent. The first child is placed against one side of the window, occupying the entire span of t...
The tk_setPalette procedure changes the color scheme for Tk. It does this by modifying the colors of existing widgets and by changing the option database so that future widgets will use the new color scheme. If tk_setPalette is invoked with a single argument, the argument is the name of a color to use as the normal background color; tk_setPalette will compute a complete color palette from this background color. Alternatively, the arguments to tk_setPalette may consist of any number of name-value...
Tcl_Interp *interp (in) Interpreter to use for returning error messages. Tk_Window tkwin (in) Window to use when arguments specify Tk options. If NULL, then no Tk options will be processed. int argcPtr (in/out) Pointer to number of arguments in argv; gets modified to hold number of unprocessed arguments that remain after the call. char **argv (in/out) Command line arguments passed to main program. Modified to hold unprocessed arguments that remain after the call. Tk_ArgvInfo *argTable (in) Array...
token expects an integer which is used to mark specific sections in input data so that when it is returned from the feedback buffer the data is easier to decipher.
geomx expects the 4x4 matrix which contains the x coordinates of the 16 control points of the patch. geomy expects the 4x4 matrix which contains the y coordinates of the 16 control points of the patch. geomz expects the 4x4 matrix which contains the z coordinates of the 16 control points of the patch.
uid expects the basis that defines how the control points determine the shape of the patch in the "u" direction. vid expects the basis that defines how the control points determine the shape of the patch in the "v" direction.
ucurves expects the number of curve segments that will be drawn in the "u" direction. vcurves expects the number of curve segments that will be drawn in the "v" direction.
usegs expects the number of line segments used to draw a curve in the "u" direction. vsegs expects the number of line segments used to draw a curve in the "v" direction.
pathfind searches the directories named in path for the file name. The directories named in path are separated by colons. mode is a string of option letters chosen from the set rwxfbcdpugks: Letter Meaning __________________________ r readable w writable x executable f normal file b block special c character special d directory p FIFO (pipe) u set user ID bit g set group ID bit k sticky bit s size non...
pcreate in all its forms creates a new process and runs the requested program. These routines are equivalent to a fork(2) and exec(2) pair except that the caller incurs only a small logical swap space penalty compared to fork. pcreate (using sproc(2)) requires that the calling process have enough virtual space left (see setrlimit(2)) to create a temporary 32K stack for the new ...
x expects the x coordinate of the next defining point for the polygon. y expects the y coordinate of the next defining point for the polygon. z expects the z coordinate of the next defining point for the polygon.
Perror will write a message to fortran logical unit 0 appropriate to the last detected system error. String will be written preceding the standard error message. Gerror returns the system error message in character variable string. Gerror may be called either as a subroutine or as a function. Ierrno will return the error number of the last detected system error. This number is updated only when an error actually occurs. Most routines and I/O statements that might generate such errors return an e...
perror produces a message on the standard error output (file descriptor 2), describing the last error encountered during a call to a system or library function. The argument string s is printed first, then a colon and a blank, then the message and a newline. (However, if s is a null pointer or points to a null string, the colon is not printed.) To be of most use, the argument string should include the name of the program that incurred the error. The error number is taken from t...
fovy expects the field-of-view angle in the y direction. The field of view is the range of the area that is being viewed. fovy must be > 2 or an error results. aspect expects the aspect ratio which determines the field of view in the x direction. The aspect ratio is the ratio of x (width) to y (height). near expects the distance from the viewer to the closest clipping plane (always positive). far expects the distance from the viewer to the farthest clipping plane (always positive)....
pfmt pfmt uses a format string for printf style formatting of args. The output is displayed on stream. pfmt encapsulates the output in the standard error message format. If the environment variable NOMSGLABEL is set it will turn off message labels. Another environment variable NOMSGSEVERITY will also turn off message severity. These two variable can be set to turn off part of pfmt's er...
A photo is an image whose pixels can display any color or be transparent. A photo image is stored internally in full color (24 bits per pixel), and is displayed using dithering if necessary. Image data for a photo image can be obtained from a file or a string, or it can be supplied from C code through a procedural interface. At present, only GIF and PPM/PGM formats are supported, but an interface exists to allow additional image file formats to be added easily. A photo image is transparent in re...
buffer expects the array to use for storing names. numnames expects the maximum number of names to store. This must not exceed the number of elements in buffer.
If the fileId argument is given then it should normally refer to a process pipeline created with the open command. In this case the pid command will return a list whose elements are the process identifiers of all the processes in the pipeline, in order. The list will be empty if fileId refers to an open file that isn't a process pipeline. If no fileId argument is given then pid returns the process identifier of the current process. All process identifiers are returned as decimal strings....
map specifies a symbolic map name. Must be one of the following: MAP_I_TO_I, MAP_I_TO_R, MAP_I_TO_G, MAP_I_TO_B, MAP_I_TO_A, MAP_R_TO_R, MAP_G_TO_G, MAP_B_TO_B, MAP_A_TO_A size expects the size of the map, valid sizes are 256 or 4096. values the LUT itself.
mode One of the symbolic constants: (parameters that affect read, write, and copy transfers) PM_SHIFT, default value: 0. Number of bit positions that pixel data are to be shifted. Positive shifts are left for write and copy, right for read. Valid values: 0, +-1, +-4, +-8, +-12, +- 16, +-24 PM_EXPAND, default value: 0. Enable (1) or disable (0) expansion of single-bit pixel data to one of two 32-bit pixel values. Valid values: 0, 1 PM_C0, default value: 0. Expansion value (32-bit packed color) ch...
The placer is a geometry manager for Tk. It provides simple fixed placement of windows, where you specify the exact size and location of one window, called the slave, within another window, called the master. The placer also provides rubber-sheet placement, where you specify the size and location of the slave in terms of the dimensions of the master, so that the slave changes size and location in response to changes in the size of the master. Lastly, the placer allows you to mix these styles of ...
pm_create creates a policy module. pm_create_simple creates a policy module with some predefined defaults. pm_filldefault fills a policy_set with predefined default values. pm_destroy destroys a policy module. pm_attach connects a policy module to a virtual address space range. pm_setdefault sets the defaul...
The above two interfaces can be used to get placement information of a process's address space. It has to be done from the context of that process. __pm_get_page_info takes an address range in terms of base_addr and length. pginfo_buf is an array of pm_pginfo_t structures passed by the caller. On completion of the system call pginfo_buf contains the placement information for every page in the address range that has been faulted in. The vaddr field of pm_pg...
x expects the x coordinate of the first point if a polygon. y expects the y coordinate of the first point of a polygon. z expects the z coordinate of the first point of a polygon.
x expects the x coordinate of the point to be drawn. y expects the y coordinate of the point to be drawn. z expects the z coordinate of the point to be drawn.
mode expects one of two values: SMP_OFF defeats antialiasing of points (default). SMP_ON enables antialiasing of points. It can be modified by an optional symbolic constant: SMP_SMOOTHER indicates that a higher quality filter should be used during point drawing. This filter typically requires that more pixels be modified, and therefore potentially reduces the rate at which antialiased points are rendered. The constant SMP_SMOOTHER is specified by bitwise ORing it, or by adding it, to SMP_ON. For...
Converts files from pod format (see the perlpod manpage) to HTML format. It can automatically generate indexes and cross-references, and it keeps a cache of things it knows how to cross-reference.
Pod::Text is a module that can convert documentation in the POD format (such as can be found throughout the Perl distribution) into formatted ASCII. Termcap is optionally supported for boldface/underline, and can enabled via $Pod::Text::termcap=1. If termcap has not been enabled, then backspaces will be used to simulate bold and underlined text. A separate pod2text program is included that is primarily a wrapper for Pod::Text. The single function pod2text() can take the optional options -a for a...
dist expects the distance from the viewpoint to the world space origin. azim expects the azimuthal angle in the x-y plane, measured from the y axis. The azimuth angle is the viewing angle of the observer. inc expects the angle of incidence in the y-z plane, measured from the z axis. The incidence angle is the angle of the viewport relative to the z axis. twist expects the amount that the viewpoint is to be rotated around the line of sight using the right-hand rule....
mode Expects one of the symbolic constants: PYM_POINT, draw only points at the vertices. PYM_LINE, draw lines from vertex to vertex. PYM_FILL, fill the polygon interior. PYM_HOLLOW, fill only interior pixels at the boundaries.
mode Expects one of the symbolic constants: PYSM_OFF: do not antialias polygons. (default) PYSM_ON: compute coverage values for all perimeter polygon pixels in such a way as to not change the size of the polygon. PYSM_SHRINK: Compute coverage values for all perimeter polygon pixels in such a way as to shrink the polygon slightly.
popen creates a pipe between the calling program and the command to be executed. The arguments to popen are pointers to null-terminated strings. Command consists of a shell command line. Type is an I/O mode, either r for reading or w for writing. The value returned is a stream pointer such that one can write to the standard input of the command, if the I/O mode is w, by writing to the file stream; and one can read from the standard output of the command, if the I/O mode is r, by reading from the...
This procedure posts a menu at a given position on the screen and configures Tk so that the menu and its cascaded children can be traversed with the mouse or the keyboard. Menu is the name of a menu widget and x and y are the root coordinates at which to display the menu. If entry is omitted or an empty string, the menu's upper left corner is positioned at the given point. Otherwise entry gives the index of an entry in menu and the menu will be positioned so that the entry is positioned over th...
The POSIX module permits you to access all (or nearly all) the standard POSIX 1003.1 identifiers. Many of these identifiers have been given Perl-ish interfaces. Things which are #defines in C, like EINTR or O_NDELAY, are automatically exported into your namespace. All functions are only exported if you ask for them explicitly. Most likely people will prefer to use the fully-qualified function names. This document gives a condensed list of the features available in the POSIX module. Consult your ...
x1 expects the x coordinate position (in pixels) of the point at which one corner of the window is to be. x2 expects the x coordinate position (in pixels) of the point at which the opposite corner of the window is to be. y1 expects the y coordinate position (in pixels) of the point at which one corner of the window is to be. y2 expects the y coordinate position (in pixels) of the point at which the opposite corner of the window is to be....
x expects the width of the graphics window. The width is measured in pixels. y expects the height of the graphics window. The height is measured in pixels.
ClientData clientData (in) Token describing structure to be freed or reallocated. Usually a pointer to memory for structure. Tk_FreeProc *freeProc (in) Procedure to invoke to free clientData.
Tcl_Interp *interp (in) Interpreter that controls the conversion. double value (in) Floating-point value to be converted. char *dst (out) Where to store string representing value. Must have at least TCL_DOUBLE_SPACE characters of storage.
printf places output on the standard output stream stdout. fprintf places output on strm. sprintf places output, followed by a null character (\0), in consecutive bytes starting at s. It is the user's responsibility to ensure that enough storage is available. snprintf places output, followed by a null character (\0), in consecutive bytes starting at s. If more than len by...
prioSetBandwidth tries to allocate bandwidth: bytesec in bytes per second on a file descriptor fd. mode specifies the allocation direction, which can be one of PRIO_READ_ALLOCATE, PRIO_WRITE_ALLOCATE, PRIO_READWRITE_ALLOCATE. The allocation mode must match the file opening mode. If a read direction allocation is requested, the file must have been opened for read; if a write direction allocation is requested, the file must have been opened for write. Otherwise, prioSetBandwidth will fail. If anot...
The proc command creates a new Tcl procedure named name, replacing any existing command or procedure there may have been by that name. Whenever the new command is invoked, the contents of body will be executed by the Tcl interpreter. Args specifies the formal arguments to the procedure. It consists of a list, possibly empty, each of whose elements specifies one argument. Each argument specifier is also a list with either one or two fields. If there is only a single field in the specifier then it...
The projid, projname and getprojall functions are used to obtain information from the projid file. The projid function searches the projid file for the project name and returns the corresponding numeric project ID. The projname function searches the projid file for the project ID prid and stores the corresponding ASCII name in the buffer buf, up to a maximum of len-1 characters. The resulting string will always be null-terminated. The fprojid and fprojname functions are variants of projid and pr...
psignal and psiginfo produce messages on the standard error output describing a signal. sig is a signal that may have been passed as the first argument to a signal handler. pinfo is a pointer to a siginfo structure that may have been passed as the second argument to an enhanced signal handler [see sigaction(2)]. The argument string s is printed first, then a colon and a blank, then the message and a newl...
void PSLDLT_Preprocess ( int token, int n, int pointers[], int indices[], int *nonz, double *ops ); void PSLDLT_Factor ( int token, int n, int pointers[], int indices[], double values[] ); void PSLDLT_Solve ( int token, double x[], double b[] ); Page 3 PSLDLT(3F) PSLDLT(3F) void PSLDLT_Destroy ( int token ); void PSLDLT_Ordering ( int token, int method );
void PSLDU_Preprocess ( int token, int n, int pointers[], int indices[], int *nonz, double *ops ); void PSLDU_Factor ( int token, int n, int pointers[], int indices[], double values[] ); void PSLDU_Solve ( int token, double x[], Page 3 PSLDU(3F) PSLDU(3F) double b[] ); void PSLDU_Destroy ( int token ); void PSLDU_Ordering ( int token, int method );
The pthread_atfork() function registers three functions which are invoked when any thread calls fork(). If prepare is not NULL it must be a function that will be called prior to the actual fork() in the parent context. Similarly, parent and child, if not NULL, will be called after fork() in the contexts of the parent and child respectively. Multiple calls to pthread_atfork() are possible; prepare handlers are run in the opposite order to which they were registered and parent and child handlers i...
A thread attributes object is a collection of values which specify how a thread is created [see pthread_create()]. Changes to the attribute values of the object do not affect threads already created using the object. Size and location of the stack may be specified as well as the detached state [see pthread_detach()] and scheduling attributes [see pthread_attr_setscope() and pthread_attr_setinheritsched(3P)]. The pthread_attr_init() function initializes the thread attributes object specified by a...
The guardsize attribute controls the size of the guard area for the created thread's stack. The guardsize attribute provides protection against overflow of the stack pointer. If a thread's stack is created with guard protection, the implementation allocates extra memory at the overflow end of the stack as a buffer against stack overflow of the stack pointer. If an application overflows into this buffer an error results (possibly in a SIGSEGV signal being delivered to the thread). The guardsize...
By default, a newly created thread has its scheduling attributes initialized from the attributes object used to create it (or from defaults if none is specified) [see pthread_create()]. As an alternative, the new thread may inherit the current scheduling attributes from the thread which creates it. The scheduling attributes which may be inherited are the scheduling policy [see pthread_attr_setschedpolicy()] and scheduling parameters [see pthread_attr_setschedparam()]. The pthread_attr_setinherit...
Scheduling parameters exist to implement scheduling policies [see pthread_attr_setschedpolicy()]. The sched_priority member of the sched_param structure is a positive integer number (higher values indicate greater importance). Priority limits should be retrieved using the interfaces sched_get_priority_min() and sched_get_priority_max(). The default scheduling priority is the minimum for the policy. A portable application should not assume more than 32 distinct priorities. The pthread_attr_setsch...
A scheduling policy defines how threads are selected to run and for how long they run before an alternative thread may be chosen to run. There are four policies: SCHED_FIFO (first-in-first-out), SCHED_RR (roundrobin), SCHED_TS (time-share) and SCHED_OTHER. The default scheduling policy attribute value for POSIX threads is SCHED_RR. Each policy uses thread priorities [see pthread_attr_setschedparam()] as part of their selection criteria. Scheduling scope [see pthread_attr_setscope()] determines t...
The pthread_attr_setscope() function sets the thread scheduling scope attribute in the object attr to the value scope. Possible values for scope are PTHREAD_SCOPE_SYSTEM, PTHREAD_SCOPE_BOUND_NP and PTHREAD_SCOPE_PROCESS. The scheduling scope for the attribute object attr, is returned via the oscope parameter of pthread_attr_getscope(). The default scheduling scope is PTHREAD_SCOPE_PROCESS. Threads created with system scope have a direct effect on scheduling by the kernel [see pthread_attr_setsch...
The pthread_cancel() function requests that the thread identified by thread be cancelled. Cancellation state [see pthread_setcancelstate()] and type [see pthread_setcanceltype()] determine whether the request is acted upon immediately or at some time in the future; pthread_cancel() does not wait, it merely issues the request. When thread does act on the request, it will terminate as if it had called pthread_exit() with a return status of PTHREAD_CANCELED....
A thread may register cleanup handlers which are automatically called on behalf of the thread when it terminates either through cancellation [see pthread_cancel()], explicitly exiting [see pthread_exit()] or by returning from its start function [see pthread_create()]. Handlers are run in order: most recently registered first. Handlers have strict scoping rules: the push and pop must be in the same C lexical scope; that is, the pop operation must match the push operation in the same C statement b...
The function pthread_condattr_init() initializes the condition variable attribute object referenced by attr to the default attribute values. The default sharing value is PTHREAD_PROCESS_PRIVATE. Once a condition variable attribute object is used to initialize one or more mutexes, any function that affects the attribute object will not affect the previously initialized mutexes. pthread_condattr_destroy() uninitializes the condition variable attribute structure referenced by attr. This may include...
The pthread_condattr_getpshared() function obtains the value of the process-shared attribute from the attributes object referenced by attr. The pthread_condattr_setpshared() function is used to set the process- shared attribute in an initialized attributes object referenced by attr. The process-shared attribute is set to PTHREAD_PROCESS_SHARED to permit a condition variable to be operated upon by any thread that has access to the memory where the condition variable is allocated, even if the cond...
Condition variables provide high performance synchronization primitives to wait for or wake up threads waiting for certain conditions to be satisfied. Functions are provided to wait on a condition variable and to wake up (signal) threads that are waiting on the condition variable.
The pthread_create() function creates a thread with the attributes specified by attr, starting execution at the function named start with the argument value arg. A null value of attr causes the thread to be created with default attributes. The thread identity is saved in the location pointed to by the thread argument. A new thread inherits its per-thread signal mask from its creator. No signals are pending on the thread when it starts. The thread runs until it returns from its start function, ca...
The pthread_detach() function causes the thread identified by thread to be detached. This means that storage created by the library on behalf of the thread will be reclaimed when the thread terminates. A detached thread cannot be the target of pthread_join(). A thread can be created in detached state using pthread_attr_setdetachstate(). It can also be implicitly detached using pthread_join().
The pthread_exit() function terminates the calling thread. If the thread is not detached, then the value retval may be retrieved by pthread_join(). If a thread returns from its start function [see pthread_create()] it acts as if it had called pthread_exit() with retval as the value returned. A thread implicitly exits when it acts on a cancellation request [see pthread_cancel()]. When a thread exits it pops and executes any cancellation handlers which are still active [see pthread_cleanup_push()]...
The pthread_join() function waits for the thread identified by thread to terminate. If retval is not zero, then it will be set to the exit value of the thread [see pthread_exit(), pthread_cancel()]. Only one thread may wait for another at one time. A detached thread [see pthread_detach()] may not be joined. A successful join will automatically detach the target thread. However, pthread_join() is a cancellation point and if the joiner is cancelled, the target thread remains undetached and can be ...
The pthread_key_create() function creates a key that can be used by all threads in the process to get and set thread-specific data. The newly created key is returned in the memory pointed to by key. After a new key is created, all active threads have the value NULL associated with that key. After a new thread is created, the value NULL is associated with all keys for that thread. An optional destructor function may be associated with each key. Upon thread exit [see pthread_exit()], if a key has ...
The pthread_key_delete() function deletes a key that was previously returned by pthread_key_create(). When key is deleted, the associated destructor (if any) is not called by pthread_key_delete() nor will it be called upon thread exit [see pthread_exit()]. It is the responsibility of the user program to free up any storage that is referenced by key. The use of key after the call to pthread_key_delete() will result in undefined behavior....
The pthread_kill() function is used to request that a signal be sent to the specified thread. If sig is zero, error checking is performed, but no signal is actually sent.
The function pthread_mutexattr_init() initializes the mutex attribute object referenced by attr to the default attribute values. The default sharing value is PTHREAD_PROCESS_PRIVATE. The default priority protocol is PTHREAD_PRIO_NONE. The default mutex type is PTHREAD_MUTEX_DEFAULT. Once a mutex attribute object is used to initialize one or more mutexes, any function that affects the attribute object will not affect the previously initialized mutexes. pthread_mutexattr_destroy() uninitializes th...
These functions manipulate a mutex attribute object referenced by attr which has been previously created by pthread_mutexattr_init(). The function pthread_mutexattr_setprotocol() defines the thread priority protocol to be followed when acquiring and holding mutexes. The protocol value may be one of PTHREAD_PRIO_NONE, PTHREAD_PRIO_INHERIT, or PTHREAD_PRIO_PROTECT. The function pthread_mutexattr_getprotocol() stores into the memory referenced by oprotocol the thread priority protocol associated wi...
The pthread_mutexattr_getpshared() function obtains the value of the process-shared attribute from the attributes object referenced by attr. The pthread_mutexattr_setpshared() function is used to set the process- shared attribute in an initialized attributes object referenced by attr. The process-shared attribute is set to PTHREAD_PROCESS_SHARED to permit a mutex to be operated upon by any thread that has access to the memory where the mutex is allocated, even if the mutex is allocated in memory...
These functions manipulate a mutex attribute object referenced by attr which has been previously created by pthread_mutexattr_init(). The function pthread_mutexattr_settype() defines the type of mutex. The type value may be one of PTHREAD_MUTEX_NORMAL, PTHREAD_MUTEX_ERRORCHECK, PTHREAD_MUTEX_RECURSIVE, PTHREAD_MUTEX_SPINBLOCK_NP, or PTHREAD_MUTEX_DEFAULT. The function pthread_mutexattr_gettype() stores into the memory referenced by type the mutex type associated with the named mutex attribute ob...
Mutual exclusion locks (mutexes) are used to serialize the execution of threads through critical sections of code which access shared data. A successful call for a mutex lock via pthread_mutex_lock() or pthread_mutex_trylock() will cause another thread that tries to acquire the same mutex via pthread_mutex_lock() to wait until the owning thread calls pthread_mutex_unlock(). The wait could mean that the thread is blocked immediately or if the mutex type is PTHREAD_MUTEX_SPINBLOCK_NP, the thread w...
The pthread_mutex_getprioceiling() function returns the current priority ceiling of the named mutex. The pthread_mutex_setprioceiling() function acquires the named mutex, then changes the mutex's priority ceiling and releases the mutex. The value of prioceiling must be between the values returned by sched_get_priority_min() and sched_get_priority_max(), inclusive. If successful, the previous value of the mutex priority ceiling is returned in old_ceiling....
The pthread_once() function ensures that the function init is called exactly once for all callers using the once initialization variable. This variable is initialized with the constant PTHREAD_ONCE_INIT. While init is being executed all callers of pthread_once() will wait. If a thread is cancelled while executing the init function [see pthread_setcancelstate()], then pthread_once() will permit another thread (possibly waiting) to make the call....
The function pthread_rwlockattr_init() initializes the read-write lock attribute object referenced by attr to the default attribute values. The default sharing value is PTHREAD_PROCESS_PRIVATE. Once a read-write lock attribute object is used to initialize one or more read-write locks, any function that affects the attribute object will not affect the previously initialized read-write locks. pthread_rwlockattr_destroy() uninitializes the read-write lock attribute structure referenced by attr....
These functions manipulate the initialized read-write lock attribute object attr [see pthread_rwlockattr_init()]. The function pthread_rwlockattr_setpshared() sets the process-shared attribute value of the read-write lock. The attribute value may be PTHREAD_PROCESS_PRIVATE or PTHREAD_PROCESS_SHARED. The function pthread_rwlockattr_getpshared() returns the process-shared attribute value of attr via opshared. The default value is PTHREAD_PROCESS_PRIVATE. A read-write lock with a process-shared att...
Read-write locks may be initialized either dynamically, by calling pthread_rwlock_init(), or statically, via the macro PTHREAD_RWLOCK_INITIALIZER. The personality of the read-write lock is determined by the attribute structure attr passed with the call to pthread_rwlock_init(). These attributes are set by calls to pthread_rwlockattr_init() and the various pthread read-write lock attribute functions. If attr is null (or the read-write lock is statically initialized), the default attributes are us...
Read-write locks allow a thread to exclusively lock some shared data while updating that data, or allow any number of threads to have simultaneous read-only access to the data. The pthread_rwlock_rdlock() and pthread_rwlock_tryrdlock() functions apply a read lock to the readwrite lock object referenced by rwlock. The calling thread will only acquire the lock if a writer does not own the lock. A thread that calls pthread_rwlock_rdlock() will block until it can gain the read-write lock for reading...
Read-write locks allow a thread to exclusively lock some shared data while updating that data, or allow any number of threads to have simultaneous read-only access to the data. The pthread_rwlock_unlock() function releases a read or write lock held on the read-write lock object referenced by rwlock. If this function is called to release a read lock and there are other read locks currently held on the lock object, the lock object remains in the read locked state. If this function is called to rel...
Read-write locks allow a thread to exclusively lock some shared data while updating that data, or allow any number of threads to have simultaneous read-only access to the data. The pthread_rwlock_wrlock() and pthread_rwlock_trywrlock() functions apply a write lock to the readwrite lock object referenced by rwlock. The calling thread will only acquire the lock if no other thread (reader or writer) holds the lock. A thread that calls pthread_rwlock_wrlock() will block until it can gain the read-wr...
The cancelability of a thread determines when, if ever, it acts upon cancellation requests [see pthread_cancel(), and pthread_exit()]. Cancellation state may be either PTHREAD_CANCEL_ENABLE or PTHREAD_CANCEL_DISABLE. If it is PTHREAD_CANCEL_DISABLE, then cancellation requests are blocked (held pending) indefinitely. If the state is PTHREAD_CANCEL_ENABLE, the cancellation type is the governing factor. Cancellation type may be either PTHREAD_CANCEL_ASYNCHRONOUS or PTHREAD_CANCEL_DEFERRED. The type...
Threads which are created with the PTHREAD_SCOPE_PROCESS attribute (which is the default) [see pthread_attr_setscope()], are scheduled on a number of kernel execution vehicles. By default the number of execution vehicles used is adjusted by the library as the application runs and is called the concurrency level. This is different from the traditional notion of concurrency because it includes any threads blocked by the application in the kernel (for example to do IO). The library raises or lowers...
Executing threads run on the most eligible CPU determined by the kernel. This choice may be changed for threads with the PTHREAD_SCOPE_SYSTEM or PTHREAD_SCOPE_BOUND_NP attribute using the pthread_setrunon_np() interface. This interface requests that the calling thread execute exclusively on the named cpu. The CPU should be chosen in the same way as for sysmp() interface with the MP_MUSTRUN command. To further control execution the MP_RESTRICT and MP_ISOLATE sysmp() commands can be used as usual....
The pthread_setschedparam() function changes the scheduling policy and parameters of the thread identified by thread to the values specified by policy and param. Changing the scheduling characteristics of an existing thread is similar to creating the thread with those attributes [see pthread_attr_setschedpolicy() and pthread_attr_setschedparam()]. Only the assigned thread priority is changed - a temporary priority elevation obtained by acquiring a mutex is not affected [see pthread_mutexattr_set...
The pthread_setspecific() function associates a thread-specific value with key. Different threads may bind different values to the same key. The pthread_getspecific() function returns the calling thread's value that is bound to the specified key. The affect of calling either of these functions using a value for key not obtained from a pthread_key_create() call or after key has been deleted with pthread_key_delete() is undefined....
The pthread_sigmask() function manipulates the set of signals which are blocked from delivery to the calling thread. A non-NULL set specifies the set of signals to use in modifying the currently active set. The incoming signals may be added to, deleted from or completely replace the active set, as specified by the operation parameter which may have the following values: SIG_BLOCK Add specified signals to those in current mask. SIG_UNBLOCK Remove the specified signals from the current mask. SIG_S...
The function ptsname() returns the name of the slave pseudo-terminal device associated with a master pseudo-terminal device. fildes is a file descriptor returned from a successful open of the master device.
getpublickey and getsecretkey get public and secret keys for netname from the publickey(4) database. getsecretkey has an extra argument, passwd, used to decrypt the encrypted secret key stored in the database. Both routines return 1 if they are successful in finding the key, 0 otherwise. The keys are returned as NULL-terminated, hexadecimal strings. If the ...
These funtions write a character to the file associated with a fortran logical unit bypassing normal fortran I/O. Putc writes to logical unit 6, normally connected to the control terminal output. The value of each function will be zero unless some error occurred; a system error code otherwise. See perror(3F).
Fputc and putc write the character c onto the output stream indicated by stream at the position indicated by the associated file pointer (if defined), advancing this pointer to the next character position. For files which cannot be positioned, or which have been opened in append mode (see fopen(3s)), the character is appended to the output stream. putchar(c) is defined as putc(c, stdout). Each of these functions is available in the C library. In addition, putc and putchar are macros defined in <...
String contains a character string in the form name=value. Putenv makes the value of the environment variable name equal to value by altering or creating an environment variable.
string points to a string of the form ``name=value.'' putenv makes the value of the environment variable name equal to value by altering an existing variable or creating a new one. In either case, the string pointed to by string becomes part of the environment, so altering the string will change the environment. The space used by string is no longer used once a new string-defining name is passed to putenv. Because of this limitation, string should be decl...
putpwent is the inverse of getpwent(3C). Given a pointer to a passwd structure created by getpwent (or getpwuid or getpwnam), putpwent writes a line on the stream f, which matches the format of /etc/passwd.
Writes the characters given by string to the file given by fileId. FileId must have been the return value from a previous call to open, or it may be stdout or stderr to refer to one of the standard I/O channels; it must refer to a file that was opened for writing. If no fileId is specified then it defaults to stdout. Puts normally outputs a newline character after string, but this feature may be suppressed by specifying the -nonewline switch. Output to files is buffered internally by Tcl; the fl...
puts writes the null-terminated string pointed to by s ,followed by a new-line character, to the standard output stream stdout. fputs writes the null-terminated string pointed to by s to the named output stream. Neither function writes the terminating null character.
The putspent routine is the inverse of getspent. Given a pointer to a spwd structure created by the getspent routine (or the getspnam routine), the putspent routine writes a line on the stream fp, which matches the format of /etc/shadow. If the sp_min, sp_max, sp_lstchg, sp_...
putwc transforms the wchar_t character c into EUC, and writes it to the output stream (at the position where the file pointer, if defined, is pointing). The putwchar(c) is defined as putwc(c, stdout). putwc and putwchar are macros. fputwc behaves like putwc, but is a function rather than a macro....
putws transforms the wchar_t null-terminated wchar_t string pointed to by s into a byte string in EUC, and writes the string followed by a newline character to stdout. fputws transforms the wchar_t null-terminated wchar_t string pointed to by s into a byte string in EUC, and writes the string to the named output stream. Neither function writes the terminating wch...
n expects the number of points on the curve data_array expects an array containing the curve points byte_size expects the offset (in bytes) between points on the curve type expects a value indicating the point type. Currently, the only data type supported is N_ST, corresponding to pairs of s-t coordinates. The offset parameter is used in case the curve points are part of an array of larger structure elements. pwlcurve searches for the n-th coordinate pair beginning at data_array + n * byte_size....
Routines for interpreting and recording query and reply messages with Internet domain name servers. p_class returns an alphanumeric mnemonic for a given class value. Similarly, p_type returns a mnemonic for the given type value. p_time returns a human-readable string for a given ttl (time-to-live.) p_rr prints a resource record in human-readable form. The resource record, cp , is contained in the message msg. p_cdname is a wrapper for dn_expand(3). It will uncompress and print a compressed domai...
cmd specifies which operation to perform. icnt expects the number of elements in idata. If the operation only returns data, set icnt to zero. idata expects an array containing the data to be used by cmd. If icnt is zero, then idata can be NULL. ocnt expects the number of elements in odata. If the operation does not return data, set ocnt to zero. odata expects the array into which you want the system to write the values returned by cmd. If ocnt is zero, then odata can be NULL. FUNCTION RETURN VAL...
none FUNCTION RETURN VALUE The returned function value is the read file descriptor associated with the event queue. If there is an error, the returned value is a negative integer whose absolute value is an error value defined in .
data expects a pointer to the location that is to receive the data the event queue. FUNCTION RETURN VALUE The returned function value is the identifier for the device read.
One dimensional array contains the elements to be sorted. len is the number of elements in the array. isize is the size of an element, typically - 4 for integer and real 8 for double precision or complex 16 for double complex (length of character object) for character arrays Compar is the name of a user supplied integer*2 function that will determine the sorting order. This function will be called with 2 arguments that will be elements of array. The function must return - negative if arg 1 is co...
qsort is an implementation of the quicker-sort algorithm. It sorts a table of data in place. The contents of the table are sorted in ascending order according to the user-supplied comparison function. base points to the element at the base of the table. nel is the number of elements in the table. width specifies the size of each element in bytes. compar is the name of the comparison function, which is called with two arguments that point to the elements being compared. The functio...
This subroutine accepts a pair of REAL GENERAL matrices and reduces one of them to upper Hessenberg form and the other to upper triangular form using orthogonal transformations. It is usually followed by QZIT, QZVAL and, possibly, QZVEC. On Input NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrices. A contains a real general matrix. B contains a real general matrix. MATZ should be set to .TR...
This subroutine accepts a pair of REAL matrices, one of them in upper Hessenberg form and the other in upper triangular form. It reduces the Hessenberg matrix to quasi-triangular form using orthogonal transformations while maintaining the triangular form of the other matrix. It is usually preceded by QZHES and followed by QZVAL and, possibly, QZVEC. On Input NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the or...
On Input This subroutine accepts a pair of REAL matrices, one of them in quasi-triangular form and the other in upper triangular form. It reduces the quasi-triangular matrix further, so that any remaining 2-by-2 blocks correspond to pairs of complex eigenvalues, and returns quantities whose ratios give the generalized eigenvalues. It is usually preceded by QZHES and QZIT and may be followed by QZVEC. NM must be set to the row dimension of two-dimensional array parameters as declared in the calli...
This subroutine accepts a pair of REAL matrices, one of them in quasitriangular form (in which each 2-by-2 block corresponds to a pair of complex eigenvalues) and the other in upper triangular form. It computes the eigenvectors of the triangular problem and transforms the results back to the original coordinate system. It is usually preceded by QZHES, QZIT, and QZVAL. On Input NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension sta...
activeBackground cursor highlightThickness takeFocus | activeForeground disabledForeground image text | anchor font justify textVariable | background foreground padX underline | bitmap highlightColor padY wrapLength | borderWidth highlightBackground relief See the ``options'' manual entry for details on the standard options. WIDGET-SPECIFIC OPTIONS Name: command Class: Command Command-Line Switch:-command Specifies a Tcl command to associate with the button. This command is typically invoked w...
If the aboveThis argument is omitted then the command raises window so that it is above all of its siblings in the stacking order (it will not be obscured by any siblings and will obscure any siblings that overlap it). If aboveThis is specified then it must be the path name of a window that is either a sibling of window or the descendant of a sibling of window. In this case the raise command will insert window into the stacking order just above aboveThis (or the ancestor of aboveThis that is a s...
ran generates successive pseudo-random numbers in the range from 0 to 1. ran uses its integer argument calculate the return value. The argument is modified by ran so that successive invocations of ran with the same integer variable will yield different values. It is not recommended to invoke ran with a constant since the storage area holding the constant will be modified.
ran generates successive pseudo-random numbers in the range from 0 to 1. ran uses its integer argument calculate the return value. The argument is modified by ran so that successive invocations of ran with the same integer variable will yield different values. It is not recommended to invoke ran with a constant since the storage area holding the constant will be modified.
Irand generates successive pseudo-random integers in the range from 0 to 2**15-1. rand generates pseudo-random numbers distributed in [0, 1.0]. Srand uses its integer argument to re-initialize the seed for successive invocations of irand and rand.
rand uses a multiplicative congruent random-number generator with period 2^32 that returns successive pseudo-random numbers in the range from 0 to (2^15)-1. The function srand uses the argument seed as a seed for a new sequence of pseudo-random numbers to be returned by subsequent calls to the function rand. If the function srand is then called with the same seed value, the sequence of pseudo-random numbers will be repeated. If the function <...
The Fortran 90 subroutine random_number returns a sequence of pseudorandom numbers in harvest. The argument must be of real type and of intent out. It can be a scalar or an array variable, and is set to contain pseudorandom numbers from a uniform distribution in the range greater than or equal to zero and less than one. The random_seed subroutine allows an inquiry to be made about the size or value of the seed array, and also allows the seed to be reset. Its optional arguments have the following...
Random uses a non-linear additive feedback random number generator employing a default table of size 31 long integers to return successive pseudo-random numbers in the range from 0 to (2**31)-1. The period of this random number generator is very large, approximately 16*((2**31)-1). Random/srandom have (almost) the same calling sequence and initialization properties as rand/srand. The difference is that rand(3C) produces a much less random sequence - in fact, the low dozen bits generated by rand ...
On Input N is the order of the matrix. EPS1 is a theoretical absolute error tolerance for the computed eigenvalues. If the input EPS1 is non-positive, or indeed smaller than its default value, it is reset at each iteration to the respective default value, namely, the product of the relative machine precision and the magnitude of the current eigenvalue iterate. The theoretical absolute error in the K-th eigenvalue is usually not greater than K times EPS1. D contains the diagonal elements of the i...
Rcmd is a routine used by the super-user to execute a command on a remote machine using an authentication scheme based on reserved port numbers. Rresvport is a routine which returns a descriptor to a socket with an address in the privileged port space. Ruserok is a routine used by servers to authenticate clients requesting service with rcmd. All three functions are present in the same file and are used by the rshd(1M) server (among others). Rcmd looks up the host *ahost using gethostbyname(3N), ...
dx expects the distance from the x coordinate of the current graphics position to the x coordinate of the new point. dy expects the distance from the y coordinate of the current graphics position to the y coordinate of the new point. dz expects the distance from the z coordinate of the current graphics position to the z coordinate of the new point.
In the first form, all of the remaining bytes are read from the file given by fileId; they are returned as the result of the command. If the -nonewline switch is specified then the last character of the file is discarded if it is a newline. In the second form, the extra argument specifies how many bytes to read; exactly this many bytes will be read and returned, unless there are fewer than numBytes bytes left in the file; in this case, all the remaining bytes are returned. FileId must be stdin o...
src expects a symbolic constant that identifies the pixel component that is to be used: RC_ABGR Indicates that all 4 frame buffer components, ABGR should be transferred. This is the default. RC_ALPHA selects the alpha channel of the current framebuffer selected by readsource. RC_BLUE selects the blue channel of the current framebuffer selected by readsource. RC_GREEN selects the green channel of the current framebuffer selected by readsource. RC_RED selects the red channel of the current framebu...
x1 expects the x screen coordinate of one corner of the rectangle. y1 expects the y screen coordinate of one corner of the rectangle. x2 expects the x screen coordinate of the opposite corner of the rectangle. y2 expects the y screen coordinate of the opposite corner of the rectangle. These coordinates are relative to the lower-left pixel on the screen, whose coordinates are 0,0. It does not matter whether x1 is greater than or less than x2, nor y1 greater than or less than y2. The rectangle spe...
n expects the number of pixels to be read by the function. colors expects the array in which the pixel values are to be stored. FUNCTION RETURN VALUE The returned value of this function is the number of pixels actually read. A returned function value of 0 indicates an error, that the starting point is not a valid character position.
n expects the number of pixels to be read by the function. red expects the array in which the pixel red values will be stored. green expects the array in which the pixel green values will be stored. blue expects the array in which the pixel blue values will be stored. FUNCTION RETURN VALUE The returned value of this function is the number of pixels actually read. A returned function value of 0 indicates an error, namely, that the starting point is not a valid character position....
src expects a symbolic constant that identifies the pixel source that is to be used: SRC_AUTO selects the front color buffer when the current framebuffer, as specified by drawmode, is in single buffer mode. It selects the back color buffer when the current framebuffer is in double buffer mode. This is the default. SRC_FRONT selects the front color buffer of the current framebuffer, as specified by drawmode. This source is valid for both single buffer and double buffer operation. SRC_BACK selects...
These functions perform conversion from one data type to another. The function int converts to integer from its integer, real*4, double precision, real*16, complex, double complex, or complex*32 argument. If the argument is real, integer, real*4, double precision, or real*16 int returns the integer whose magnitude is the largest integer that does not exceed the magnitude of the argument and whose sign is the same as the sign of the argument (i.e. truncation). For complex the above rule is applie...
realpath resolves all links, symbolic links, and references to ``.'' and ``..'' in file_name and stores it in resolved_name. It can handle both relative and absolute path names. For absolute path names and the relative names whose resolved name cannot be expressed relatively (for example, ../../reldir), it returns the resolved absolute name. resolved_name should point to a buffer (MAXPATHLEN) bytes in l...
On Input NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix system. B contains information about the similarity transformation (Cholesky decomposition) used in the reduction by REDUC in its strict lower triangle. DL contains further information about the transformation. M is the number of eigenvectors to be back transformed. Z contains the eigenvectors to be back transformed in its first M c...
On Input NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix system. B contains information about the similarity transformation (cholesky decomposition) used in the reduction by REDUC2 in its strict lower triangle. DL contains further information about the transformation. M is the number of eigenvectors to be back transformed. Z contains the eigenvectors to be back transformed in its first M ...
The routine dbopen is the library interface to database files. One of the supported file formats is record number files. The general description of the database access methods is in dbopen(3), this manual page describes only the recno specific information. The record number data structure is either variable or fixed-length records stored in a flat-file format, accessed by the logical record number. The existence of record number five implies the existence of records one through four, and the del...
Tcl_Interp *interp (in) Tcl interpreter in which to evaluate command. char *cmd (in) Command (or sequence of commands) to execute. int flags (in) An OR'ed combination of flag bits. | TCL_NO_EVAL means record the command | but don't evaluate it. TCL_EVAL_GLOBAL| means evaluate the command at global | level instead of the current stack | level.
x1 expects the x coordinate of one of the corners of the rectangle. y1 expects the y coordinate of one of the corners of the rectangle. x2 expects the x coordinate of the opposite corner of the rectangle. y2 expects the y coordinate of the opposite corner of the rectangle.
x1 expects the x coordinate of one corner of the rectangle. y1 expects the y coordinate of one corner of the rectangle. x2 expects the x coordinate of the opposite corner of the rectangle. y2 expects the y coordinate of the opposite corner of the rectangle. newx expects the x coordinate of the lower-left corner of the new position of the rectangle. newy expects the y coordinate of the lower-left corner of the new position of the rectangle....
x1 expects the x coordinate of one corner of the rectangle that is to be drawn. y1 expects the y coordinate of one corner of the rectangle that is to be drawn. x2 expects the x coordinate of the opposite corner of the rectangle that is to be drawn. y2 expects the y coordinate of the opposite corner of the rectangle that is to be drawn.
x1 expects the x coordinate of the lower-left corner of the rectangle that you want to read. y1 expects the y coordinate of the lower-left corner of the rectangle that you want to read. x2 expects the x coordinate of the upper-right corner of the rectangle that you want to read. y2 expects the y coordinate of the upper-right corner of the rectangle that you want to read. parray expects the array to receive the pixels that you want to read. FUNCTION RETURN VALUE The returned value of this functio...
x1 expects the lower-left x coordinate of the rectangular region. y1 expects the lower-left y coordinate of the rectangular region. x2 expects the upper-right x coordinate of the rectangular region. y2 expects the upper-right y coordinate of the rectangular region. parray expects the array which contains the values of the pixels to be drawn. For RGBA values, pack the bits thusly: 0xAABBGGRR, where: AA contains the alpha value, BB contains the blue value, GG contains the green value, and RR conta...
s is a socket created with socket. recv, recvfrom, and recvmsg are used to receive messages from another socket. recv may be used only on a connected socket [see connect(3N)], while recvfrom and recvmsg may be used to receive data on a socket whether it is in a connected state or not. If from is not a NULL pointer, the source address...
On Input NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrices A and B. If the Cholesky factor L of B is already available, N should be prefixed with a minus sign. A and B contain the real symmetric input matrices. Only the full upper triangles of the matrices need be supplied. If N is negative, the strict lower triangle of B contains, instead, the strict lower triangle of its Cholesky factor...
On Input NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrices A and B. If the Cholesky factor L of B is already available, N should be prefixed with a minus sign. A AND B contain the real symmetric input matrices. Only the full upper triangles of the matrices need be supplied. If N is negative, the strict lower triangle of B contains, instead, the strict lower triangle of its Cholesky factor...
regcmp compiles a regular expression (consisting of the concatenated arguments) and returns a pointer to the compiled form. malloc(3C) is used to create space for the compiled form. It is the user's responsibility to free unneeded space so allocated. A NULL return from regcmp indicates an incorrect argument. regcmp(1) has been written to generally preclude the need for this routine at execution time. re...
The structure type regex_t contains the following members: MEMBER MEANING _____________________________________________________________ int re_magic RE magic number size_t re_nsub number of parenthesized subexpressions const char *re_endp end pointer for REG_PEND struct re_guts *re_g internal RE data structure The structure type regmatch_t contains the following members: MEMBER MEANING ___________________________________________________________ regoff_t rm_so Byte offset from start of string to ...
Determines whether the regular expression exp matches part or all of string and returns 1 if it does, 0 if it doesn't. If additional arguments are specified after string then they are treated as the names of variables in which to return information about which part(s) of string matched exp. MatchVar will be set to the range of string that matched all of exp. The first subMatchVar will contain the characters in string that matched the leftmost parenthesized subexpression within exp, the next sub...
These routines are used to compile regular expressions and match the compiled expressions against lines. The regular expressions compiled are in the form used by ed. The syntax of the compile routine is as follows: compile (instring, expbuf, endbuf) The parameter instring is a null-terminated string representing the regular expression. The parameter expbuf points to the place w...
Re_comp compiles a string into an internal form suitable for pattern matching. Re_exec checks the argument string against the last string passed to re_comp. Re_comp returns 0 if the string s was compiled successfully; otherwise a string containing an error message is returned. If re_comp is passed 0 or a null string, it returns without changing the currently compiled regular expression. Re_exec returns 1 if the string s matches the last compiled regular expression, 0 if the string s failed to ma...
Tcl_Interp *interp (in) Interpreter to register in display associated with tkwin. Also used to return errors if registration failed. char *name (in) Name under which to register interpreter. Must be unique among all registered interpreters for tkwin's display. May not contain the character ``|''. Tk_Window tkwin (in) Token for window. Used only to find a display in which to register interp.
Registerinethost sends an internet address allocation request to registrar(1M) on NIS master via the yp_update(3R) call. This routine should be used only when NIS is enabled in the network. The arguments for the routine are: name The host name to be registered. This name must be unique in the NIS domain. network The internet network number to be used in the allocation. If the netmask is supplied, this argument should be an internet address so that the netmask can be applied on. netmask The inter...
This command matches the regular expression exp against string, and it | copies string to the variable whose name is given by varName. If there | is a match, then while copying string to varName the portion of string | that matched exp is replaced with subSpec. If subSpec contains a ``&'' or ``\0'', then it is replaced in the substitution with the portion of string that matched exp. If subSpec contains a ``\n'', where n is a digit between 1 and 9, then it is replaced in the substitution ...
remove causes the file or empty directory whose name is the string pointed to by path to be no longer accessible by that name. A subsequent attempt to open that file using that name will fail, unless the file is created anew. For files, remove is identical to unlink. For directories, remove is identical to rmdir. See rmdir(2) and unlink(2) for a detailed list of failure conditi...
Rename the command that used to be called oldName so that it is now called newName. If newName is an empty string then oldName is deleted. The rename command returns an empty string as result.
Rename the command that used to be called oldName so that it is now called newName. If newName is an empty string then oldName is deleted. The rename command returns an empty string as result.
Renamehost sends an host rename request to registrar(1M) on NIS master via the yp_update(3R) call. The result is that the new host name will be associated with the original internet address. This routine should be used only when NIS is enabled in the network. This function call can not only change the hostname, but also modify the aliases. The arguments for the routine are: oldname The original host name. newname The new host name for the internet address. This new name should not be already use...
b expects either TRUE or FALSE. TRUE causes the linestyle to be reset at the beginning of each line segment. FALSE causes the linestyle to be continued across the segments of a line.
These routines are used for making, sending, and interpreting query and reply messages with Internet domain name servers. Global configuration and state information that is used by the resolver routines is kept in the structure _res. Most of the values have reasonable defaults and can be ignored. Options stored in _res.options are defined in resolv.h and are as follows. Options are stored as a simple bit mask containing the bitwise ``or'' of the options enabled. RES_INIT True if the initial na...
Tk_Window tkwin (in) Token for window to restack. int aboveBelow (in) Indicates new position of tkwin relative to other; must be Above or Below. Tk_Window other (in) Tkwin will be repositioned just above or below this window. Must be a sibling of tkwin or a descendant of a sibling. If NULL then tkwin is restacked above or below all siblings.
Tk_RestrictProc *proc (in) Predicate procedure to call to filter incoming X events. NULL means do not restrict events at all. char *arg (in) Arbitrary argument to pass to proc. char **prevArgPtr (in/out) Pointer to place to save argument to previous restrict procedure.
Helper functions that determine the validity of a few types of nameservice related records. Functions return 1 for valid, 0 for invalid. res_hnok determines if the given argument is a valid hostname. res_ownok is similar, but allows for "*" in the first label. For example: *.sgi.com. This is appropriate for A or MX record owners. res_mailok allows for any printable characters in the first label. The rest of the name must look like a valid hostname. Useful for SOA RNAMEs and RP RNAMEs. Finally,...
Helper functions for resolver code development. res_isourserver returns 1 if argument appears in current list of the clients name servers, returns 0 if not. res_nameinquery looks for (name, type, class) in the query section of packet (buf, eom). Returns: -1 format error, 0 not found, or >0 found. res_queriesmatch looks for a 1:1 mapping of (name, type, class) in packets (buf1, eom1) and (buf2, eom2). Returns: -1 format error, 0 not a 1:1 mapping, and >0 is a 1:1 mapping. res_querydomain performs...
res_send_setqhook , ( res_send_setrhook ) allow for a function hook to be implemented at the beginning (end) of the resolution query process, res_send(3). The hook function takes the form: res_sendhookact proc(struct sockaddr_in **nsap, char **buf, int *buflen, char *ans, int anssiz, int *resplen) where res_sendhookact is a typedef: (see /usr/include/resolv.h) typedef enum { res_goahead, res_nextns, res_modified, res_done, res_error } res_sendhookact; The resolver library will walk through the c...
Return immediately from the current procedure (or top-level command or source command), with string as the return value. If string is not specified then an empty string will be returned as result.
Rexec looks up the host *ahost using gethostbyname(3N), returning -1 if the host does not exist. Otherwise *ahost is set to the standard name of the host. If a username and password are both specified, then these are used to authenticate to the foreign host; otherwise the environment and then the user's .netrc file in his home directory are searched for appropriate information. If all this fails, the user is prompted for the information. The port inport specifies which well-known DARPA Internet...
On Input NM must be set to the row dimension of the two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix A. A contains the real general matrix. MATZ is an integer variable set equal to zero if only eigenvalues are desired. Otherwise it is set to any non-zero integer for both eigenvalues and eigenvectors. On Output WR and WI contain the real and imaginary parts, respectively, of the eigenvalues. Complex conjugate pairs of eigenvalue...
red expects the value indicating the intensity of the red component. green expects the value indicating the intensity of the green component. blue expects the value indicating the intensity of the blue component.
This routine is obsolete. It continues to function only on IRIS-4D B and G models to provide backwards compatibility. All new development should use its replacement, setcursor.
rmin expects the minimum value to be stored in the red bitplanes. gmin expects the minimum value to be stored in the green bitplanes. bmin expects the minimum value to be stored in the blue bitplanes. rmax expects the maximum value to be stored in the red bitplanes. gmax expects the maximum value to be stored in the green bitplanes. bmax expects the maximum value to be stored in the blue bitplanes. z1 expects the minimum z value that is to be used as criteria for linear mapping. z2 expects the m...
planes is the number of bit planes requested to be configured as color planes for each single-color component. Only positive values are accepted. The default is machine dependent, usually 8 or 12.
red expects the mask for the corresponding red bitplanes. green expects the mask for the corresponding green bitplanes. blue expects the mask for the corresponding blue bitplanes.
On Input NM must be set to the row dimension of the two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrices A and B. A contains a real general matrix. B contains a real general matrix. MATZ is an integer variable set equal to zero if only eigenvalues are desired. Otherwise it is set to any non-zero integer for both eigenvalues and eigenvectors. On Output ALFR and ALFI contain the real and imaginary parts, respectively, of the numera...
bool is either TRUE or FALSE. TRUE enables updating the left/right buffer. FALSE disables updating the left/right buffer. By default, leftbuffer is TRUE and rightbuffer is FALSE.
Rmtops provides a simple means of transparently accessing tape drives on remote machines over a network, via rsh(1) and rmt(1M). This version of the library expects the remote rmt program to be version 2, which is fairly widespread. These routines are used like their corresponding system calls, but allow the user to open up a tape drive on a remote system on which he or she has an account and the appropriate remote permissions. rmtaccess() always returns 0 in the remote case, since the protocol ...
dx expects the distance from the x coordinate of the current graphics position to the x coordinate of the new graphics position. dy expects the distance from the y coordinate of the current graphics position to the y coordinate of the new graphics position. dz expects the distance from the z coordinate of the current graphics position to the z coordinate of the new graphics position.
Rnusers returns the number of users logged on to host (-1 if it cannot determine that number). Rusers fills the utmpidlearr structure with data about host, and returns 0 if successful. The relevant structures are: struct utmparr { /* RUSERSVERS_ORIG */ struct utmp **uta_arr; int uta_cnt }; struct utmpidle { struct utmp ui_utmp; unsigned ui_idle; }; struct utmpidlearr { /* RUSERSVERS_IDLE */ struct utmpidle **uia_arr; int uia_cnt };...
DROTG and SROTG compute C and S, the Cosine and Sine of the rotation, given the coordinates of a transformed vector (da, db) or (sa, sb). DROT and SROT apply a plane rotation (Cosine = C, Sine = S) to N points whose coordinates are defined by the DX (SX) and DY (SY) vectors.
a expects the angle of rotation. axis expects the relative axis of rotation. There are three character literal values for this parameter: 'x' indicates the x-axis. 'y' indicates the y-axis. 'z' indicates the z-axis.
n (input) Number of planar points to be rotated. If n<=0, the routine returns without any computattion. x (input/output) On input, x contains the x-coordinate of each planar point to be rotated. On output, x contains the x-coordinate of each rotated planar point. incx (input) Increment between elemnents of x. If incx=0, the results will be unpredictable. y (input/output) On input, y contains the y-coordinate of each planer point to be rotated. On output, y contains the y-coordinate of each rotat...
d1 (input/output) On input, this value is the first diagonal element of the scaling matrix D. On first call to DROTMG or SROTMG, this value is typically 1.0. Subsequent calls typically use the value from the previous call. On output, this value is the first diagonal element of the updated scaling matrix D'. d2 (input/output) On input, this value is the second diagonal element of the scaling matrix D. On first call to DROTMG or SROTMG, this value is typically 1.0. Subsequent calls typically use ...
anint returns the nearest whole real number to its real argument (i.e., int(a+0.5) if a > 0, int(a-0.5) otherwise). dnint does the same for its double-precision argument, qnint does the same for its real*16 argument. anint is the generic form of anint, dnint, and qnint, performing the same operation and returning the data type of its argument. Page 1 ROUND(3F) ROUND(3F) nint returns the nearest integer to its real argument. inint returns the nearest integer*2 to its real*4 argument. jnint return...
geomx expects a 4x4 matrix containing the x coordinates of the 16 control points of the patch. geomy expects a 4x4 matrix containing the y coordinates of the 16 control points of the patch. geomz expects a 4x4 matrix containing the z coordinates of the 16 control points of the patch. geomw expects a 4x4 matrix containing the w coordinates of the 16 control points of the patch.
dx expects the distance from the x coordinate of the current graphics position to the x coordinate of the next corner of the polygon. dy expects the distance from the y coordinate of the current graphics position to the y coordinate of the next corner of the polygon. dz expects the distance from the z coordinate of the current graphics position to the z coordinate of the next corner of the polygon....
dx expects the distance from the x coordinate of the current graphics position to the x coordinate of the first point in a polygon. dy expects the distance from the y coordinate of the current graphics position to the y coordinate of the first point in a polygon. dz expects the distance from the z coordinate of the current graphics position to the z coordinate of the first point in a polygon.
On Input NM must be set to the row dimension of the two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix A. A contains the real symmetric matrix. MATZ is an integer variable set equal to zero if only eigenvalues are desired. Otherwise it is set to any non-zero integer for both eigenvalues and eigenvectors. On Output W contains the eigenvalues in ascending order. Z contains the eigenvectors if MATZ is not zero. IERR is an integer ou...
On Input NM must be set to the row dimension of the two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix A. MB is the half band width of the matrix, defined as the number of adjacent diagonals, including the principal diagonal, required to specify the non-zero portion of the lower triangle of the matrix. A contains the lower triangle of the real symmetric band matrix. Its lowest subdiagonal is stored in the last N+1-MB positions of...
On Input NM must be set to the row dimension of the two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrices A and B. A contains a real symmetric matrix. B contains a positive definite real symmetric matrix. MATZ is an integer variable set equal to zero if only eigenvalues are desired. Otherwise it is set to any non-zero integer for both eigenvalues and eigenvectors. On Output W contains the eigenvalues in ascending order. Z contains...
On Input NM must be set to the row dimension of the two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrices A and B. A contains a real symmetric matrix. B contains a positive definite real symmetric matrix. MATZ is an integer variable set equal to zero if only eigenvalues are desired. Otherwise it is set to any non-zero integer for both eigenvalues and eigenvectors. On Output W contains the eigenvalues in ascending order. Z contains...
On Input NM must be set to the row dimension of the two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrices A and B. A contains a real symmetric matrix. B contains a positive definite real symmetric matrix. MATZ is an integer variable set equal to zero if only eigenvalues are desired. Otherwise it is set to any non-zero integer for both eigenvalues and eigenvectors. On Output W contains the eigenvalues in ascending order. Z contains...
ON INPUT NM MUST BE SET TO THE ROW DIMENSION OF THE TWO-DIMENSIONAL ARRAY PARAMETERS AS DECLARED IN THE CALLING PROGRAM DIMENSION STATEMENT. N IS THE ORDER OF THE MATRIX A. A CONTAINS THE REAL SYMMETRIC MATRIX. M THE EIGENVECTORS CORRESPONDING TO THE FIRST M EIGENVALUES ARE TO BE COMPUTED. IF M = 0 THEN NO EIGENVECTORS ARE COMPUTED. IF M = N THEN ALL OF THE EIGENVECTORS ARE COMPUTED. ON OUTPUT W CONTAINS ALL N EIGENVALUES IN ASCENDING ORDER. Z CONTAINS THE ORTHONORMAL EIGENVECTORS ASSOCIATED WIT...
On Input NM must be set to the row dimension of the two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix A. NV is an integer variable set equal to the dimension of the array A as specified for A in the calling program. NV must not be less than N*(N+1)/2. A contains the lower triangle of the real symmetric packed matrix stored row-wise. MATZ is an integer variable set equal to zero if only eigenvalues are desired. Otherwise it is se...
On Input NM must be set to the row dimension of the two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix. W contains the diagonal elements of the real symmetric tridiagonal matrix. E contains the subdiagonal elements of the matrix in its last N-1 POSITIONS. E(1) is arbitrary. MATZ is an integer variable set equal to zero if only eigenvalues are desired. Otherwise it is set to any non-zero integer for both eigenvalues and eigenvecto...
On Input NM must be set to the row dimension of the two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix A. A contains the special real tridiagonal matrix in its first three columns. The subdiagonal elements are stored in the last N-1 positions of the first column, the diagonal elements in the second column, and the superdiagonal elements in the first N-1 positions of the third column. elements A(1,1) and A(N,3) are arbitrary. MATZ...
This function is available with -lrtmon or -lrtmonstubs. Linking with rtmonstubs will cause this call to have no effect. rtmon_log_user_tstamp(evt, qual1, qual2, qual3, qual4) logs event evt. event_t is an unsigned short allowing 64K events. All events logged by users with rtmon_log_user_tstamp are offset by 40000. The range 60000- 64K is reserved for kernel events providing 20K events for user logging. As an example: if a user logs event 17 with rtmon_log_user_tstamp(17, value1, value2, 0, 0), ...
The Safe extension module allows the creation of compartments in which perl code can be evaluated. Each compartment has a new namespace The "root" of the namespace (i.e. "main::") is changed to a different package and code evaluated in the compartment cannot refer to variables outside this namespace, even with run-time glob lookups and other tricks. Code which is compiled outside the compartment can choose to place variables into (or share variables with) the compartment's namespace and onl...
sat_eventtostr returns a human-readable string which represents the audit event passed to it in event. The value returned points to a static character array. event must be a positive integer less than SAT_NTYPES (defined in ). sat_strtoevent returns a machine-readable event index which represents the string passed to it in evstr. The string returned by sat_eventtostr and passed to sat_strtoevent is a member of the set of known event names. For a complete list of known event names, run...
sat_intrp_pathname takes a pointer to a buffer (buf) containing the disk image of a sat_pathname structure. It unpacks the variable length portions of the struct from buf and returns them in the specified arguments. A pointer to the data following the pathname information is returned in buf. The sat_pathname structure includes the following fields: ino_t sat_inode; /* inode number of file */ dev_t sat_device; /* device no. of mounted file system */ uid_t sat_fileown; /* file owner */ gid_t sat_f...
sat_read_file_info reads an audit file header into a convenient struct for examining its contents. Translation from older versions of audit files is handled transparently by the library routines. The file header is read from file descriptor in and processed into the fheader struct. If out is non-NULL, the data read from in is written back to out. The data written is the disk image, not a processed struct. The sat_file_info structure pointed to by fheader includes the following fields: int sat_ma...
sat_read_header_info reads an audit record header into a convenient struct for examining its contents (the disk format is neither convenient nor obvious). Translation from older versions of audit files is handled transparently by the library routines. The record header is read from file descriptor in and processed into the struct pointed to by header. The file_major, file_minor are the file version to translate from, obtained from the file header using the sat_read_file_info(3C) call. The sat_hd...
sat_write_filehdr writes an audit file header to the file referenced by fd . sat_close_filehdr writes out the close time to the audit file referenced by fd .
SBDSQR computes the singular value decomposition (SVD) of a real N-by-N (upper or lower) bidiagonal matrix B: B = Q * S * P' (P' denotes the transpose of P), where S is a diagonal matrix with non-negative diagonal elements (the singular values of B), and Q and P are orthogonal matrices. The routine computes S, and optionally computes U * Q, P' * VT, or Q' * C, for given real input matrices U, VT, and C. See "Computing Small Singular Values of Bidiagonal Matrices With Guaranteed High Relativ...
dsbmv , ssbmv , dhbmv and chbmv perform the matrix-vector operation y := alpha*A*x + beta*y, where alpha and beta are scalars, x and y are n element vectors and A is an n by n symmetric/hermitian band matrix, with k super-diagonals.
x1 expects the x coordinate of a corner of the box. y1 expects the y coordinate of a corner of the box. x2 expects the x coordinate of the opposite corner of the box. y2 expects the y coordinate of the opposite corner of the box.
x1 expects the x coordinate of a corner of the filled box. y1 expects the y coordinate of a corner of the filled box. x2 expects the x coordinate of the opposite corner of the filled box. y2 expects the y coordinate of the opposite corner of the filled box.
streambufs implement the buffer abstraction described in sbuf.pub(3C++). However, the streambuf class itself contains only basic members for manipulating the characters and normally a class derived from streambuf will be used. This man page describes the interface needed by programmers who are coding a derived class. Broadly speaking there are two kinds of member functions described here. The...
The streambuf class supports buffers into which characters can be inserted (put) or from which characters can be fetched (gotten). Abstractly, such a buffer is a sequence of characters together with one or two pointers (a get and/or a put pointer) that define the location at which characters are to be inserted or fetched. The pointers should be thought of as pointing between characters rather than at them. This makes it easier to understand the boundary conditions (a p...
dscal, sscal, zscal, cscal, zdscal, and csscal scale the vector x of length n and increment incx by the constant a. For dscal, sscal, zscal and cscal the constant a is of the same type as the vector x. zdscal and csscal scale a "complex" vector by "real" constant.
activeBackground font highlightThickness repeatInterval| background foreground orient takeFocus | borderWidth highlightBackground relief troughColor | cursor highlightColor repeatDelay See the ``options'' manual entry for details on the standard options. WIDGET-SPECIFIC OPTIONS Name: bigIncrement Class: BigIncrement Command-Line Switch:-bigincrement Some interactions with the scale cause its value to change by | ``large'' increments; this option specifies the size of the large | increments. ...
activeBackground font highlightThickness repeatInterval| background foreground orient takeFocus | borderWidth highlightBackground relief troughColor | cursor highlightColor repeatDelay See the ``options'' manual entry for details on the standard options. WIDGET-SPECIFIC OPTIONS Name: bigIncrement Class: BigIncrement Command-Line Switch:-bigincrement Some interactions with the scale cause its value to change by | ``large'' increments; this option specifies the size of the large | increments. ...
activeBackground font highlightThickness repeatInterval| background foreground orient takeFocus | borderWidth highlightBackground relief troughColor | cursor highlightColor repeatDelay See the ``options'' manual entry for details on the standard options. WIDGET-SPECIFIC OPTIONS Name: bigIncrement Class: BigIncrement Command-Line Switch:-bigincrement Some interactions with the scale cause its value to change by | ``large'' increments; this option specifies the size of the large | increments. ...
This command parses fields from an input string in the same fashion as the ANSI C sscanf procedure and returns a count of the number of | conversions performed, or -1 if the end of the input string is reached | before any conversions have been performed. String gives the input to be parsed and format indicates how to parse it, using % conversion specifiers as in sscanf. Each varName gives the name of a variable; when a field is scanned from string the result is converted back into a string and a...
This command parses fields from an input string in the same fashion as the ANSI C sscanf procedure and returns a count of the number of | conversions performed, or -1 if the end of the input string is reached | before any conversions have been performed. String gives the input to be parsed and format indicates how to parse it, using % conversion specifiers as in sscanf. Each varName gives the name of a variable; when a field is scanned from string the result is converted back into a string and a...
The inclusion of selects the System V versions of these routines. For the 4.3BSD versions, include . Scandir reads the directory dirname and builds an array of pointers to directory entries using malloc(3C). It returns the number of entries in the array and a pointer to the array through namelist. The select parameter is a pointer to a user-supplied subroutine which is called by scandir to select which entries are to be included in the array. The select routine is passed a ...
scanf reads from the standard input stream, stdin. fscanf reads from the stream strm. sscanf reads from the character string s. Each function reads characters, interprets them according to a format, and stores the results in its arguments. Each expects, as arguments, a control string, format, described below and a set of pointer arguments indicating where the converted input should be stored. If there are insufficient arguments fo...
scfftm1du and dzfftm1du compute the complex Fourier transform of P real sequences of N samples each. The k-th index F(k) of the Transform of an N sample sequence f(i) is equal to: F(k) = Sum ( W^(i*k) * f(i) ), for i =0, ..., (N-1) W = exp( (Sign*2*sqrt(-1)*PI) / N ) The Fourier transforms are computed in-place so the input sequence is overwritten by the Fourier transform output. As the input sequences have real values, only half of the results are computed since the (N-k)-th sample of the trans...
Initialize, the coefficient array which is used in the Multiple 1D FFT modules. This array contains the different twiddle factors and the factorization of N into prime numbers. As the FFT modules scfftm1d or dzfftm1d only read the coeff array, it may be reused as long as necessary once it has been initialized. In C, if ptr is NULL, scfftm1dui or dzfftm1dui returns a pointer to an allocated buffer. SCFFTM1DUI should be used to initialize the coefficient array before any call to SCFFTM1DU DZFFTM1D...
On Entry A REAL(LDA,P). A contains the matrix whose decomposition is to be computed. Only the upper half of A need be stored. The lower part of the array A is not referenced. LDA INTEGER. LDA is the leading dimension of the array A. P INTEGER. P is the order of the matrix. WORK REAL. WORK is a work array. JPVT INTEGER(P). JPVT contains integers that control the selection of the pivot elements, if pivoting has been requested. Each diagonal element A(K,K) is placed in one of three classes accordin...
On Entry R REAL(LDR,P), where LDR .GE. P. R contains the upper triangular matrix that is to be downdated. The part of R below the diagonal is not referenced. LDR INTEGER. LDR is the leading dimension of the array R. P INTEGER. P is the order of the matrix R. Page 1 SCHDD(3F) SCHDD(3F) X REAL(P). X contains the row vector that is to be removed from R. X is not altered by SCHDD. Z REAL(LDZ,NZ), where LDZ .GE. P. Z is an array of NZ P-vectors which are to be downdated along with R. LDZ INTEGER. LDZ...
On Entry R REAL(LDR,P), where LDR .GE. P. R contains the upper triangular factor that is to be updated. Elements of R below the diagonal are not referenced. LDR INTEGER. LDR is the leading dimension of the array R. P INTEGER. P is the order of the matrix R. K INTEGER. K is the first column to be permuted. L INTEGER. L is the last column to be permuted. L must be strictly greater than K. Z REAL(LDZ,NZ), where LDZ.GE.P. Z is an array of NZ P-vectors into which the transformation U is multiplied. Z...
On Entry R REAL(LDR,P), where LDR .GE. P. R contains the upper triangular matrix that is to be updated. The part of R below the diagonal is not referenced. LDR INTEGER. LDR is the leading dimension of the array R. P INTEGER. P is the order of the matrix R. X REAL(P). X contains the row to be added to R. X is not altered by SCHUD. Page 1 SCHUD(3F) SCHUD(3F) Z REAL(LDZ,NZ), where LDZ .GE. P. Z is an array containing NZ P-vectors to be updated with R. LDZ INTEGER. LDZ is the leading dimension of th...
arg Expects one of the symbolic constants: SB_RESET: initialize screen box limits and disable the updating of screen box limits. (default) SB_TRACK: track scan-converted geometry and characters and update the scrbox limits accordingly. SB_HOLD: disable update of screen box limits; hold current values.
left expects the window coordinate of the left-most pixel column within the mask region. right expects the window coordinate of the right-most pixel column within the mask region. bottom expects the window coordinate of the lowest pixel row within the mask region. top expects the window coordinate of the highest pixel row within the mask region.
gsnr expects a screen number or the symbolic constant, INFOCUSSCRN. FUNCTION RETURN VALUE The function returns the screen that previously had input focus, or -1 if there was an error (e.g., gsnr is not a valid screen number).
gsnr expects the number of a screen controlled by the currently selected graphics server. FUNCTION RETURN VALUE The function returns the previously selected screen, or -1 if there was an error (e.g., gsnr is not a valid screen number).
activeBackground highlightBackground orient takeFocus | background highlightColor relief troughColor | borderWidth highlightThickness repeatDelay | cursor jump repeatInterval See the ``options'' manual entry for details on the standard options. WIDGET-SPECIFIC OPTIONS Name: activeRelief Class: ActiveRelief Command-Line Switch:-activerelief Specifies the relief to use when displaying the element that is | active, if any. Elements other than the active element are always | displayed with a raise...
mode Specify whether and how lines and polygons are to be subdivided. Options are: SS_OFF: do not subdivide. (default) SS_DEPTH: subdivide based on z values in screen-coordinates. params Expects an array that contains parameter specifications for the subdivision mode that has been selected. The values provided in the params array are ignored when the mode is SS_OFF. SS_DEPTH expects three values in the params array: maxz, minsize, and maxsize. maxz specifies the distance, in screencoordinates, b...
SCSUM1 takes the sum of the absolute values of a complex vector and returns a single precision result. Based on SCASUM from the Level 1 BLAS. The change is to use the 'genuine' absolute value. Contributed by Nick Higham for use with CLACON.
DFFT1DU and SFFT1DU compute the 1 dimensional Fourier transform of a real periodic sequence. NOTE: These routines are provided only for compatibility with previous releases of complib.
SFFT1DUI and DFFT1DUI initialize the array WORKSPACE which is used in SFFT1DU and DFFT1DU. The prime factorization of N, together with a tabulation of the trigonometric functions are computed and stored in WORKSPACE. NOTE: These routines are provided only for compatibility with previous releases of complib.
DFFT2DU and SFFT2DU compute the 2 dimensional complex Fourier transform of a real periodic sequence. NOTE: These routines are provided only for compatibility with previous releases of complib.
SFFT2DUI and DFFT2DUI initialize the array WORKSPACE which is used in SFFT2DU and DFFT2DU. The prime factorizations of N1 and N2, together with a tabulation of the trigonometric functions are computed and stored in WORKSPACE. NOTE: These routines are provided only for compatibility with previous releases of complib.
JOB - INTEGER On entry specifies whether to perform a forward or backward Fast Fourier Transform: JOB = -1, forward FFT JOB = 1, backward FFT Unchanged on exit. N1 - INTEGER. On entry, N1 specifies the number of elements in the first dimension of the sequence. Unchanged on exit. N2 - INTEGER. On entry, N2 specifies the number of elements in the second dimension of the sequence. Unchanged on exit. N3 - INTEGER. On entry, N3 specifies the number of elements in the third dimension of the sequence. ...
SFFT3DUI and DFFT3DUI initialize the array WORKSPACE which is used in SFFT3DU and DFFT3DU. The prime factorizations of N1, N2 and N3, together with a tabulation of the trigonometric functions are computed and stored in WORKSPACE. NOTE: These routines are provided only for compatibility with previous releases of complib.
DFFTM1DU and SFFTM1DU compute the complex Fourier transform of P real periodic sequences of N samples each. NOTE: These routines are provided only for compatibility with previous releases of complib.
SFFTM1DUI and DFFTM1DUI initialize the array WORKSPACE which is used in SFFTM1DU and DFFTM1DU. The prime factorization of N, together with a tabulation of the trigonometric functions, are computed and stored in WORKSPACE. NOTE: These routines are provided only for compatibility with previous releases of complib.
SDISNA computes the reciprocal condition numbers for the eigenvectors of a real symmetric or complex Hermitian matrix or for the left or right singular vectors of a general m-by-n matrix. The reciprocal condition number is the 'gap' between the corresponding eigenvalue or singular value and the nearest other one. The bound on the error, measured by angle in radians, in the I-th computed vector is given by SLAMCH( 'E' ) * ( ANORM / SEP( I ) ) where ANORM = 2-norm(A) = max( abs( D(j) ) ). SEP(...
Sets file position in FILEHANDLE to be first line greater than or equal (stringwise) to $key. Returns the new file position, or -1 if an error occurs. The flags specify dictionary order and case folding: If $dict is true, search by dictionary order (ignore anything but word characters and whitespace). If $fold is true, ignore case. PPPPaaaaggggeeee 1111
RPC library routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the server calls a dispatch routine to perform the requested service, and then sends back a reply. RPC supports various authentication flavors. Among them are: AUTH_NONE (none) no authentication. AUTH_SYS Traditional UNIXr-style authentication. AU<...
Change the current access position for fileId. FileId must have been the return value from a previous call to open, or it may be stdin, stdout, or stderr to refer to one of the standard I/O channels. The offset and origin arguments specify the position at which the next read or write will occur for fileId. Offset must be an integer (which may be negative) and origin must be one of the following: start The new access position will be offset bytes from the start of the file. current The new access...
The Fortran 90 transformational function selected_int_kind returns the kind type parameter of an integer type that can represent the range of values n such that -10**r < n < 10**r. If no such kind exists, the result is -1. If more than one kind meets the criteria, the result is the kind type parameter of the kind with the smallest decimal exponent range. Both r and the result are scalars of integer type. The selected_real_kind function is similar, but returns the kind type parameter of a real ty...
This command provides a Tcl interface to the X selection mechanism and implements the full selection functionality described in the X InterClient Communication Conventions Manual (ICCCM). The first argument to selection determines the format of the rest of the arguments and the behavior of the command. The following forms are currently supported: selection clear ?-displayof window? ?-selection selection? If selection exists anywhere on window's display, clear it so that | no window owns the sel...
A SelectSaver object contains a reference to the file handle that was selected when it was created. If its new method gets an extra parameter, then that parameter is selected; otherwise, the selected file handle remains unchanged. When a SelectSaver is destroyed, it re-selects the file handle that was selected when it was created. PPPPaaaaggggeeee 1111
This module tells its users that functions in the FOOBAR package are to be autoloaded from after the __DATA__ token. See also the section on Autoloading in the perlsub manpage.
sem_close closes the connection to the named semaphore located at address sem. The address sem may reside anywhere in the calling processes address space, but the process must have read and write access to sem. If multiple threads within a common process (i.e., sprocs, pthreads) are sharing sem, a single call to sem_close will close the named semaphore for all threads within the calling process. Once a named semaphore has been closed, subsequent op...
sem_destroy deinitializes the unnamed semaphore located at address sem. The address sem may reside anywhere in the calling processes address space, but the process must have read and write access to sem. Once an unnamed semaphore has been deinitialized, semaphore operations performed on it will fail until the semaphore has been reinitialized. sem_destroy will fail if one or more of the following are true: [EINVAL] The semaphore located ...
sem_getvalue obtains the current value of the semaphore located at address sem, and stores it at address value. The returned value should be viewed as a snapshot only, useful for debugging. If the number stored at value is positive, then the semaphore is available. If the number stored at value is zero, then the semaphore is not available. If the number stored at value is negative, then the semaphore is not available and the absolute value of the number represent...
sem_init initializes the unnamed semaphore located at address sem. The address sem may reside anywhere in the calling processes address space, but if the semaphore is intended to be shared across process boundaries, sem must reside in shared memory. The pshared argument is used to specify whether the semaphore is intended to be shared across process boundaries or only used locally by threads of execution within a common process. If pshared is set to zero, then the semaphore ...
sem_mode is used to change the operation mode of the specified POSIX unnamed semaphore sem. Changing a semaphore's default operation mode allows applications to enable two levels of debug tracing, and apply retry spinning. Semaphore types other than POSIX unnamed semaphores are not supported by this function. sem_mode is an IRIX extension to the POSIX interfaces and is not part of the IEEE 1003.1b Standard. The operation mode is selected by setting cmd ...
sem_open opens a semaphore named by the character string at address name. The oflag parameter is used when creating a semaphore, supporting the following bit flags: O_CREAT If the semaphore already exists, this flag has no effect, except as noted under O_EXCL below. Otherwise, the semaphore is created. The initial value of the semaphore may be specified by value, where value is any non-negative number less than {SEM_VALUE_MAX} [see sy
sem_post atomically increments the value of the semaphore located at address sem. If any processes are blocked on the semaphore, the highest priority process waiting the longest is unblocked and made runnable. The address sem may reside anywhere in the calling processes address space, but the process must have read and write access to sem. sem_post will fail if the following is true: [EINVAL] The semaphore located at address sem is not a valid posix name...
sem_print obtains all the semaphore state of sem and writes it as a formatted string to fd. The string is prefixed with a user specified label. Semaphore types other than shared POSIX unnamed semaphores are not supported by this function. sem_print is an IRIX extension to the POSIX interfaces and is not part of the IEEE 1003.1b Standard. sem_print will fail if one or more of the following are true: [EINVAL] The specified sem...
sem_unlink deletes the semaphore, named by the character string at address name, from the file namespace. The named semaphore and its state will persist after the call to sem_unlink, if one or more processes still reference the semaphore. Once the last reference has been dropped, the semaphore ceases to exist [see sem_close(2)]. sem_unlink will fail if one or more of the following are true: [...
sem_wait atomically decrements the value of the semaphore located at address sem. If the semaphore's value is less than zero after the decrement, the calling process blocks on the semaphore. Otherwise, the calling process continues without blocking. A process blocked on a semaphore remains blocked until either another process posts the semaphore via sem_post, or the sem_wait operation is interrupted by a signal. sem_t...
This command arranges for cmd (and args) to be executed in the application named by app. It returns the result or error from that command execution. App may be the name of any application whose main window is on the display containing the sender's main window; it need not be within the same process. If no arg arguments are present, then the command to be executed is contained entirely within the cmd argument. If one or more args are present, they are concatenated to form the command to be execu...
s is a socket created with socket. send, sendto, and sendmsg are used to transmit a message to another socket. send may be used only when the socket is in a connected state, while sendto and sendmsg may be used at any time. The address of the target is given by to with tolen specifying its size. The length of the message is given by len. If the message is too long to pass atomi...
Returns the value of variable varName. If value is specified, then set the value of varName to value, creating a new variable if one doesn't already exist, and return its value. If varName contains an open parenthesis and ends with a close parenthesis, then it refers to an array element: the characters before the first open parenthesis are the name of the array, and the characters between the parentheses are the index within the array. Otherwise varName refers to a scalar variable. If no proced...
Tk_Window tkwin (in) Token for window in application. Used only to select a particular application. char *name (in) Name under which to register the application.
The three types of buffering available are unbuffered, fully buffered, and line buffered. When an output stream unit is unbuffered, information appears on the destination file or terminal as soon as written; when it is fully buffered many characters are saved up and written as a block; when it is line buffered characters are saved up until a newline is encountered or input is read from stdin. Fflush(3S) flush(3F) may be used to force the block out early. By default, output to a terminal is line ...
The routine setcat defines the default message catalog to be used by subsequent calls to gettxt, lfmt, or pfmt that do not explicitly specify a message catalog. catalog must be limited to 14 characters. These characters must be selected from a set of all characters values, excluding \0 (null) and the ASCII codes for / (slash) and : (colon). setcat assumes that the catalog exists. No checking is done on the...
seteuid (setegid) sets the effective user ID (group ID) of the current process. setruid (setrgid) sets the real user ID (group ID) of the current process. These calls are only permitted to the super-user or if the argument is the real or effective ID.
Tk_Window tkwin (in) Token for window. int reqWidth (in) Width in grid units that corresponds to the pixel dimension tkwin has requested via Tk_GeometryRequest. int reqHeight (in) Height in grid units that corresponds to the pixel dimension tkwin has requested via Tk_GeometryRequest. int widthInc (in) Width of one grid unit, in pixels. int heightInc (in) Height of one grid unit, in pixels.
The gethostbyname(3N) and gethostbyaddr(3N) routines can access three types of host-address databases: o the hosts file, /etc/hosts, o Sun's network information service (NIS) and o the Berkeley Internet Name Domain service ("BIND name server"). sethostresorder allows a program to specify the order of services to resolve Internet addresses and hostnames from these databases. sethostresorder should be called before the first time gethostbyname and gethostbyaddr are called. The order argument is...
These functions are useful for dealing with errors and interrupts encountered in a low-level subroutine of a program. All varieties of setjmp save their stack environment in env (whose type, jmp_buf, is defined in the header file) for later use by all varieties of longjmp. If the return is from a direct invocation, all setjmps return the value 0. If the return is from a call to any of the longjmps, all setjmp routines return a nonzero value. All longjmps restore the environment saved ...
The routine setlabel defines the label for messages produced in standard format by subsequent calls to lfmt, vlfmt, pfmt, and vpfmt. label is a character string no more than 25 characters in length. No label is defined before setlabel is called. A null pointer or an empty string passed as argument will reset the definition of the label....
setlocale selects the appropriate piece of the program's locale as specified by the category and locale arguments. The category argument may have the following values: LC_CTYPE, LC_NUMERIC, LC_TIME, LC_COLLATE, LC_MONETARY, LC_MESSAGES and LC_ALL. These names are defined in the l...
mtype expects a symbolic constant that identifies the video format to be provided. There are several constants defined for this parameter: HZ30 selects a 30Hz interlaced video format. HZ30_SG selects a 30 Hz interlaced with sync on green video format. HZ50 selects a 50 Hz noninterlaced video format. HZ60 selects a 60 Hz noninterlaced video format. HZ70 selects a 70 Hz noninterlaced video format. HZ72 selects a 72 Hz noninterlaced video format. HZ76 selects a 76 Hz noninterlaced video format. IRI...
pup expects the menu identifier of the menu whose entries you want to change. The menu identifier is the returned function value of the menu creation call to either newpup or defpup. entry expects the position of the entry in the menu, indexed from 1. mode expects a symbolic constant that indicates the display characteristics you want to apply to the chosen entry. You can specify more than one at a time by adding or logically or-ing these values together. For this parameter there are four define...
Tcl_Interp *interp (in) Interpreter whose recursion limit is to be set. Must be greater than zero. int depth (in) New limit for nested calls to Tcl_Eval for interp.
Tcl_Interp *interp (out) Interpreter whose result is to be modified. char *string (in) String value to become result for interp or to be appended to existing result. Tcl_FreeProc *freeProc (in) Address of procedure to call to release storage at string, or TCL_STATIC, TCL_DYNAMIC, or TCL_VOLATILE.
v expects the device number for the valuator being set. init expects the initial value to be assigned to the valuator. vmin expects the minimum value that the device can assume. vmax expects the maximum value that the device can assume.
Tcl_Interp *interp (in) Interpreter containing variable. char *varName (in) Name of variable. May refer to a scalar variable or an element of an array variable. If the name | references an element of an array, | then it must be in writable memory: | Tcl will make temporary modifications | to it while looking up the name. char *newValue (in) New value for variable. int flags (in) OR-ed combination of bits providing additional information for operation. See below for valid values. char *name1 (in)...
reg expects the name of the register to access. value expects the value which is to be placed into reg. FUNCTION RETURN VALUE The returned value of getvideo is the value read from register reg, or -1. -1 indicates that reg is not a valid register or that you queried a video register on a system without that particular board installed.
Tk_Window tkwin (in) Token for window. Visual *visual (in) New visual type to use for tkwin. int depth (in) Number of bits per pixel desired for tkwin. Colormap colormap (in) New colormap for tkwin, which must be compatible with visual and depth.
SGBBRD reduces a real general m-by-n band matrix A to upper bidiagonal form B by an orthogonal transformation: Q' * A * P = B. The routine computes B, and optionally forms Q or P', or computes Q'*C for a given matrix C.
On Entry ABD REAL(LDA, N) contains the matrix in band storage. The columns of the matrix are stored in the columns of ABD and the diagonals of the matrix are stored in rows ML+1 through 2*ML+MU+1 of ABD . See the comments below for details. LDA INTEGER the leading dimension of the array ABD . LDA must be .GE. 2*ML + MU + 1 . N INTEGER the order of the original matrix. ML INTEGER number of diagonals below the main diagonal. 0 .LE. ML .LT. N . MU INTEGER number of diagonals above the main diagonal...
SGBCON estimates the reciprocal of the condition number of a real general band matrix A, in either the 1-norm or the infinity-norm, using the LU factorization computed by SGBTRF. An estimate is obtained for norm(inv(A)), and the reciprocal of the condition number is computed as RCOND = 1 / ( norm(A) * norm(inv(A)) ).
On Entry ABD REAL(LDA, N) the output from SBGCO or SGBFA. LDA INTEGER the leading dimension of the array ABD . N INTEGER the order of the original matrix. ML INTEGER number of diagonals below the main diagonal. MU INTEGER number of diagonals above the main diagonal. IPVT INTEGER(N) the pivot vector from SBGCO or SGBFA. On Return DET REAL(2) determinant of original matrix. Determinant = DET(1) * 10.0**DET(2) with 1.0 .LE. ABS(DET(1)) .LT. 10.0 or DET(1) = 0.0 . LINPACK. This version dated 08/14/7...
SGBEQU computes row and column scalings intended to equilibrate an M-by-N band matrix A and reduce its condition number. R returns the row scale factors and C the column scale factors, chosen to try to make the largest element in each row and column of the matrix B with elements B(i,j)=R(i)*A(i,j)*C(j) have absolute value 1. R(i) and C(j) are restricted to be between SMLNUM = smallest safe number and BIGNUM = largest safe number. Use of these scaling factors is not guaranteed to reduce the condi...
On Entry ABD REAL(LDA, N) contains the matrix in band storage. The columns of the matrix are stored in the columns of ABD and the diagonals of the matrix are stored in rows ML+1 through 2*ML+MU+1 of ABD . See the comments below for details. LDA INTEGER the leading dimension of the array ABD . LDA must be .GE. 2*ML + MU + 1 . N INTEGER the order of the original matrix. ML INTEGER number of diagonals below the main diagonal. 0 .LE. ML .LT. N . MU INTEGER number of diagonals above the main diagonal...
SGBRFS improves the computed solution to a system of linear equations when the coefficient matrix is banded, and provides error bounds and backward error estimates for the solution.
On Entry ABD REAL(LDA, N) the output from SBGCO or SGBFA. LDA INTEGER the leading dimension of the array ABD . N INTEGER the order of the original matrix. ML INTEGER number of diagonals below the main diagonal. MU INTEGER number of diagonals above the main diagonal. IPVT INTEGER(N) the pivot vector from SBGCO or SGBFA. B REAL(N) the right hand side vector. JOB INTEGER = 0 to solve A*X = B , = nonzero to solve TRANS(A)*X = B , where TRANS(A) is the transpose. On Return B the solution vector X . E...
SGBSV computes the solution to a real system of linear equations A * X = B, where A is a band matrix of order N with KL subdiagonals and KU superdiagonals, and X and B are N-by-NRHS matrices. The LU decomposition with partial pivoting and row interchanges is used to factor A as A = L * U, where L is a product of permutation and unit lower triangular matrices with KL subdiagonals, and U is upper triangular with KL+KU superdiagonals. The factored form of A is then used to solve the system of equat...
SGBSVX uses the LU factorization to compute the solution to a real system of linear equations A * X = B, A**T * X = B, or A**H * X = B, where A is a band matrix of order N with KL subdiagonals and KU superdiagonals, and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
SGBTF2 computes an LU factorization of a real m-by-n band matrix A using partial pivoting with row interchanges. This is the unblocked version of the algorithm, calling Level 2 BLAS.
SGBTRF computes an LU factorization of a real m-by-n band matrix A using partial pivoting with row interchanges. This is the blocked version of the algorithm, calling Level 3 BLAS.
SGEBAK forms the right or left eigenvectors of a real general matrix by backward transformation on the computed eigenvectors of the balanced matrix output by SGEBAL.
SGEBAL balances a general real matrix A. This involves, first, permuting A by a similarity transformation to isolate eigenvalues in the first 1 to ILO-1 and last IHI+1 to N elements on the diagonal; and second, applying a diagonal similarity transformation to rows and columns ILO to IHI to make the rows and columns as close in norm as possible. Both steps are optional. Balancing may reduce the 1-norm of the matrix, and improve the accuracy of the computed eigenvalues and/or eigenvectors....
SGEBD2 reduces a real general m by n matrix A to upper or lower bidiagonal form B by an orthogonal transformation: Q' * A * P = B. If m >= n, B is upper bidiagonal; if m < n, B is lower bidiagonal.
SGEBRD reduces a general real M-by-N matrix A to upper or lower bidiagonal form B by an orthogonal transformation: Q**T * A * P = B. If m >= n, B is upper bidiagonal; if m < n, B is lower bidiagonal.
On Entry A REAL(LDA, N) the matrix to be factored. LDA INTEGER the leading dimension of the array A . N INTEGER the order of the matrix A . On Return A an upper triangular matrix and the multipliers which were used to obtain it. The factorization can be written A = L*U , where L is a product of permutation and unit lower triangular matrices and U is upper triangular. IPVT INTEGER(N) an integer vector of pivot indices. RCOND REAL an estimate of the reciprocal condition of A . For the system A*X =...
SGECON estimates the reciprocal of the condition number of a general real matrix A, in either the 1-norm or the infinity-norm, using the LU factorization computed by SGETRF. An estimate is obtained for norm(inv(A)), and the reciprocal of the condition number is computed as RCOND = 1 / ( norm(A) * norm(inv(A)) ).
On Entry A REAL(LDA, N) the output from SGECO or SGEFA. LDA INTEGER the leading dimension of the array A . N INTEGER the order of the matrix A . IPVT INTEGER(N) the pivot vector from SGECO or SGEFA. WORK REAL(N) work vector. Contents destroyed. JOB INTEGER = 11 both determinant and inverse. = 01 inverse only. = 10 determinant only. On Return A inverse of original matrix if requested. Otherwise unchanged. DET REAL(2) determinant of original matrix if requested. Otherwise not referenced. Determina...
SGEEQU computes row and column scalings intended to equilibrate an M-by-N matrix A and reduce its condition number. R returns the row scale factors and C the column scale factors, chosen to try to make the largest element in each row and column of the matrix B with elements B(i,j)=R(i)*A(i,j)*C(j) have absolute value 1. R(i) and C(j) are restricted to be between SMLNUM = smallest safe number and BIGNUM = largest safe number. Use of these scaling factors is not guaranteed to reduce the condition ...
SGEES computes for an N-by-N real nonsymmetric matrix A, the eigenvalues, the real Schur form T, and, optionally, the matrix of Schur vectors Z. This gives the Schur factorization A = Z*T*(Z**T). Optionally, it also orders the eigenvalues on the diagonal of the real Schur form so that selected eigenvalues are at the top left. The leading columns of Z then form an orthonormal basis for the invariant subspace corresponding to the selected eigenvalues. A matrix is in real Schur form if it is upper ...
SGEESX computes for an N-by-N real nonsymmetric matrix A, the eigenvalues, the real Schur form T, and, optionally, the matrix of Schur vectors Z. This gives the Schur factorization A = Z*T*(Z**T). Optionally, it also orders the eigenvalues on the diagonal of the real Schur form so that selected eigenvalues are at the top left; computes a reciprocal condition number for the average of the selected eigenvalues (RCONDE); and computes a reciprocal condition number for the right invariant subspace co...
SGEEV computes for an N-by-N real nonsymmetric matrix A, the eigenvalues and, optionally, the left and/or right eigenvectors. The right eigenvector v(j) of A satisfies A * v(j) = lambda(j) * v(j) where lambda(j) is its eigenvalue. The left eigenvector u(j) of A satisfies u(j)**H * A = lambda(j) * u(j)**H where u(j)**H denotes the conjugate transpose of u(j). The computed eigenvectors are normalized to have Euclidean norm equal to 1 and largest component real....
SGEEVX computes for an N-by-N real nonsymmetric matrix A, the eigenvalues and, optionally, the left and/or right eigenvectors. Optionally also, it computes a balancing transformation to improve the conditioning of the eigenvalues and eigenvectors (ILO, IHI, SCALE, and ABNRM), reciprocal condition numbers for the eigenvalues (RCONDE), and reciprocal condition numbers for the right eigenvectors (RCONDV). The right eigenvector v(j) of A satisfies A * v(j) = lambda(j) * v(j) where lambda(j) is its e...
On Entry A REAL(LDA, N) the matrix to be factored. LDA INTEGER the leading dimension of the array A . N INTEGER the order of the matrix A . On Return A an upper triangular matrix and the multipliers which were used to obtain it. The factorization can be written A = L*U , where L is a product of permutation and unit lower triangular matrices and U is upper triangular. IPVT INTEGER(N) an integer vector of pivot indices. INFO INTEGER = 0 normal value. = K if U(K,K) .EQ. 0.0 . This is not an error c...
SGEGS computes for a pair of N-by-N real nonsymmetric matrices A, B: the generalized eigenvalues (alphar +/- alphai*i, beta), the real Schur form (A, B), and optionally left and/or right Schur vectors (VSL and VSR). (If only the generalized eigenvalues are needed, use the driver SGEGV instead.) A generalized eigenvalue for a pair of matrices (A,B) is, roughly speaking, a scalar w or a ratio alpha/beta = w, such that A - w*B is singular. It is usually represented as the pair (alpha,beta), as ther...
SGEGV computes for a pair of n-by-n real nonsymmetric matrices A and B, the generalized eigenvalues (alphar +/- alphai*i, beta), and optionally, the left and/or right generalized eigenvectors (VL and VR). A generalized eigenvalue for a pair of matrices (A,B) is, roughly speaking, a scalar w or a ratio alpha/beta = w, such that A - w*B is singular. It is usually represented as the pair (alpha,beta), as there is a reasonable interpretation for beta=0, and even for both being zero. A good beginning...
SGELS solves overdetermined or underdetermined real linear systems involving an M-by-N matrix A, or its transpose, using a QR or LQ factorization of A. It is assumed that A has full rank. The following options are provided: 1. If TRANS = 'N' and m >= n: find the least squares solution of an overdetermined system, i.e., solve the least squares problem minimize || B - A*X ||. 2. If TRANS = 'N' and m < n: find the minimum norm solution of an underdetermined system A * X = B. 3. If TRANS = 'T'...
SGELSS computes the minimum norm solution to a real linear least squares problem: Minimize 2-norm(| b - A*x |). using the singular value decomposition (SVD) of A. A is an M-by-N matrix which may be rank-deficient. Several right hand side vectors b and solution vectors x can be handled in a single call; they are stored as the columns of the M-by-NRHS right hand side matrix B and the N-by-NRHS solution matrix X. The effective rank of A is determined by treating as zero those singular values which ...
SGELSX computes the minimum-norm solution to a real linear least squares problem: minimize || A * X - B || using a complete orthogonal factorization of A. A is an M-by-N matrix which may be rank-deficient. Several right hand side vectors b and solution vectors x can be handled in a single call; they are stored as the columns of the M-by-NRHS right hand side matrix B and the N-by-NRHS solution matrix X. The routine first computes a QR factorization with column pivoting: A * P = Q * [ R11 R12 ] [ ...
On Entry A REAL(LDA, N) the output from SGECO or SGEFA. LDA INTEGER the leading dimension of the array A . N INTEGER the order of the matrix A . IPVT INTEGER(N) the pivot vector from SGECO or SGEFA. B REAL(N) the right hand side vector. JOB INTEGER = 0 to solve A*X = B , = nonzero to solve TRANS(A)*X = B where TRANS(A) is the transpose. On Return B the solution vector X . Error Condition A division by zero will occur if the input factor contains a zero on the diagonal. Technically, this indicate...
SGESV computes the solution to a real system of linear equations A * X = B, where A is an N-by-N matrix and X and B are N-by-NRHS matrices. The LU decomposition with partial pivoting and row interchanges is used to factor A as A = P * L * U, where P is a permutation matrix, L is unit lower triangular, and U is upper triangular. The factored form of A is then used to solve the system of equations A * X = B....
SGESVD computes the singular value decomposition (SVD) of a real M-by-N matrix A, optionally computing the left and/or right singular vectors. The SVD is written A = U * SIGMA * transpose(V) where SIGMA is an M-by-N matrix which is zero except for its min(m,n) diagonal elements, U is an M-by-M orthogonal matrix, and V is an N-by-N orthogonal matrix. The diagonal elements of SIGMA are the singular values of A; they are real and non-negative, and are returned in descending order. The first min(m,n...
SGESVX uses the LU factorization to compute the solution to a real system of linear equations A * X = B, where A is an N-by-N matrix and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
SGETF2 computes an LU factorization of a general m-by-n matrix A using partial pivoting with row interchanges. The factorization has the form A = P * L * U where P is a permutation matrix, L is lower triangular with unit diagonal elements (lower trapezoidal if m > n), and U is upper triangular (upper trapezoidal if m < n). This is the right-looking Level 2 BLAS version of the algorithm.
SGETRF computes an LU factorization of a general M-by-N matrix A using partial pivoting with row interchanges. The factorization has the form A = P * L * U where P is a permutation matrix, L is lower triangular with unit diagonal elements (lower trapezoidal if m > n), and U is upper triangular (upper trapezoidal if m < n). This is the right-looking Level 3 BLAS version of the algorithm.
SGETRI computes the inverse of a matrix using the LU factorization computed by SGETRF. This method inverts U and then computes inv(A) by solving the system inv(A)*L = inv(U) for inv(A).
SGGBAK forms the right or left eigenvectors of a real generalized eigenvalue problem A*x = lambda*B*x, by backward transformation on the computed eigenvectors of the balanced pair of matrices output by SGGBAL.
SGGBAL balances a pair of general real matrices (A,B). This involves, first, permuting A and B by similarity transformations to isolate eigenvalues in the first 1 to ILO$-$1 and last IHI+1 to N elements on the diagonal; and second, applying a diagonal similarity transformation to rows and columns ILO to IHI to make the rows and columns as close in norm as possible. Both steps are optional. Balancing may reduce the 1-norm of the matrices, and improve the accuracy of the computed eigenvalues and/o...
SGGGLM solves a general Gauss-Markov linear model (GLM) problem: minimize || y ||_2 subject to d = A*x + B*y x where A is an N-by-M matrix, B is an N-by-P matrix, and d is a given Nvector. It is assumed that M <= N <= M+P, and rank(A) = M and rank( A B ) = N. Under these assumptions, the constrained equation is always consistent, and there is a unique solution x and a minimal 2-norm solution y, which is obtained using a generalized QR factorization of A and B. In particular, if matrix B is squar...
SGGHRD reduces a pair of real matrices (A,B) to generalized upper Hessenberg form using orthogonal transformations, where A is a general matrix and B is upper triangular: Q' * A * Z = H and Q' * B * Z = T, where H is upper Hessenberg, T is upper triangular, and Q and Z are orthogonal, and ' means transpose. The orthogonal matrices Q and Z are determined as products of Givens rotations. They may either be formed explicitly, or they may be postmultiplied into input matrices Q1 and Z1, so that Q...
SGGLSE solves the linear equality-constrained least squares (LSE) problem: minimize || c - A*x ||_2 subject to B*x = d where A is an M-by-N matrix, B is a P-by-N matrix, c is a given M-vector, and d is a given P-vector. It is assumed that P <= N <= M+P, and rank(B) = P and rank( ( A ) ) = N. ( ( B ) ) These conditions ensure that the LSE problem has a unique solution, which is obtained using a GRQ factorization of the matrices B and A....
SGGQRF computes a generalized QR factorization of an N-by-M matrix A and an N-by-P matrix B: A = Q*R, B = Q*T*Z, where Q is an N-by-N orthogonal matrix, Z is a P-by-P orthogonal matrix, and R and T assume one of the forms: if N >= M, R = ( R11 ) M , or if N < M, R = ( R11 R12 ) N, ( 0 ) N-M N M-N M where R11 is upper triangular, and if N <= P, T = ( 0 T12 ) N, or if N > P, T = ( T11 ) N-P, P-N N ( T21 ) P P where T12 or T21 is upper triangular. In particular, if B is square and nonsingular, the ...
SGGRQF computes a generalized RQ factorization of an M-by-N matrix A and a P-by-N matrix B: A = R*Q, B = Z*T*Q, where Q is an N-by-N orthogonal matrix, Z is a P-by-P orthogonal matrix, and R and T assume one of the forms: if M <= N, R = ( 0 R12 ) M, or if M > N, R = ( R11 ) M-N, N-M M ( R21 ) N N where R12 or R21 is upper triangular, and if P >= N, T = ( T11 ) N , or if P < N, T = ( T11 T12 ) P, ( 0 ) P-N P N-P N where T11 is upper triangular. In particular, if B is square and nonsingular, the G...
SGGSVD computes the generalized singular value decomposition (GSVD) of an M-by-N real matrix A and P-by-N real matrix B: U'*A*Q = D1*( 0 R ), V'*B*Q = D2*( 0 R ) where U, V and Q are orthogonal matrices, and Z' is the transpose of Z. Let K+L = the effective numerical rank of the matrix (A',B')', then R is a K+L-by-K+L nonsingular upper triangular matrix, D1 and D2 are M-by(K+L) and P-by-(K+L) "diagonal" matrices and of the following structures, respectively: If M-K-L >= 0, K L D1 = K ( I...
SGGSVP computes orthogonal matrices U, V and Q such that L ( 0 0 A23 ) M-K-L ( 0 0 0 ) N-K-L K L = K ( 0 A12 A13 ) if M-K-L < 0; M-K ( 0 0 A23 ) N-K-L K L V'*B*Q = L ( 0 0 B13 ) P-L ( 0 0 0 ) where the K-by-K matrix A12 and L-by-L matrix B13 are nonsingular upper triangular; A23 is L-by-L upper triangular if M-K-L >= 0, otherwise A23 is (M-K)-by-L upper trapezoidal. K+L = the effective numerical rank of the (M+P)-by-N matrix (A',B')'. Z' denotes the transpose of Z. This decomposition is the...
sgidladd is a facility for dynamically loading shared objects. Unlike dlopen(3)(without RTLD_GLOBAL), the shared object loaded (and all it's dependent shared objects), are added to the list of shared objects just as if they had been specified at the time the program had been linked, or as if the _RLD_LIST (see rld(1)) envariable had been used. That is to say, all the names in the shared object become available to satisfy references in shared objects during lazy text resolution (the DSOs are glo...
sgidlopen_version is a facility for dynamically loading shared objects similar to dlopen (3). However, unlike dlopen, the interface version of the shared object is specified so that the dynamic linker tries to map in the shared object with matching interface version. Please See ld(1) and dso(5) "How are multiple versions of DSOs supported?" for information on the version string. flags must be either LL_NONE or LL_EXACT_MATCH. LL_EXACT_MATCH means that only the exact version mentioned in versio...
sgigetdsoversion returns a pointer to the the interface version string of the shared object with the -soname the same as the argument pathname. If there is no shared object with that soname sgigetdsoversion returns 0 (NULL). The returned string pointer is valid until the shared object named by pathname is dlclose(3)d. The string space pointed to by the return value must not be free(3)ed. Link with -lc to use this function. Version strings are described in detail in dso(5) in the answer to the qu...
Many of the routines in complib.sgimath are available from: netlib@research.att.com. mail netlib@research.att.com send index The Internet address "netlib@research.att.com" refers to a gateway machine, 192.20.225.2, at AT&T Bell Labs in Murray Hill, New Jersey. This address should be understood on all the major networks. For systems having only uucp connections, use uunet!research!netlib. In this case, someone will be paying for long distance 1200bps phone calls, so keep Page 1 COMPLIB.SGIMATH(...
Return the default and allowed capability sets for the user name. The routine uses the NIS map capability.byname if NIS is active, otherwise it uses the local capabilities file, /etc/capability.
Return the default and allowed mac label ranges for the user name. The routine uses the NIS map clearance.byname if NIS is active, otherwise it uses the local clearance file, /etc/clearance.
SGTCON estimates the reciprocal of the condition number of a real tridiagonal matrix A using the LU factorization as computed by SGTTRF. An estimate is obtained for norm(inv(A)), and the reciprocal of the condition number is computed as RCOND = 1 / (ANORM * norm(inv(A))).
SGTRFS improves the computed solution to a system of linear equations when the coefficient matrix is tridiagonal, and provides error bounds and backward error estimates for the solution.
On Entry N INTEGER is the order of the tridiagonal matrix. C REAL(N) is the subdiagonal of the tridiagonal matrix. C(2) through C(N) should contain the subdiagonal. On output, C is destroyed. D REAL(N) is the diagonal of the tridiagonal matrix. On output, D is destroyed. E REAL(N) is the superdiagonal of the tridiagonal matrix. E(1) through E(N-1) should contain the superdiagonal. On output, E is destroyed. B REAL(N) is the right hand side vector. On Return B is the solution vector. INFO INTEGER...
SGTSV solves the equation where A is an N-by-N tridiagonal matrix, by Gaussian elimination with partial pivoting. Note that the equation A'*X = B may be solved by interchanging the order of the arguments DU and DL.
SGTSVX uses the LU factorization to compute the solution to a real system of linear equations A * X = B or A**T * X = B, where A is a tridiagonal matrix of order N and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
SGTTRF computes an LU factorization of a real tridiagonal matrix A using elimination with partial pivoting and row interchanges. The factorization has the form A = L * U where L is a product of permutation and unit lower bidiagonal matrices and U is upper triangular with nonzeros in only the main diagonal and first two superdiagonals.
model expects one of two possible flags: FLAT, tells the system to assign the same color to each pixel of lines and polygons during scan conversion. GOURAUD, tells the system to interpolate color from vertex to vertex when scan converting lines, and to interpolate color throughout the area of filled polygons when they are scan converted. This is the default shading model.
lowin expects the low-intensity color map index. highin expects the high-intensity color map index. z1 expects the low z value to be mapped to. z2 expects the high z value to be mapped to.
Date: Thu, 22 Sep 94 16:18:16 -0700 Message-Id: <9409222318.AA17072@scalpel.netlabs.com> To: perl5-porters@isu.edu From: Larry Wall Subject: a new module I just wrote Here's one that'll whack your mind a little out. #!/usr/bin/perl use Shell; $foo = echo("howdy", "", "world"); print $foo; $passwd = cat("
SHGEQZ implements a single-/double-shift version of the QZ method for finding the generalized eigenvalues B is upper triangular, and A is block upper triangular, where the diagonal blocks are either 1-by-1 or 2-by-2, the 2-by-2 blocks having complex generalized eigenvalues (see the description of the argument JOB.) If JOB='S', then the pair (A,B) is simultaneously reduced to Schur form by applying one orthogonal tranformation (usually called Q) on the left and another (usually called Z) on the...
SHSEIN uses inverse iteration to find specified right and/or left eigenvectors of a real upper Hessenberg matrix H. The right eigenvector x and the left eigenvector y of the matrix H corresponding to an eigenvalue w are defined by: H * x = w * x, y**h * H = w * y**h where y**h denotes the conjugate transpose of the vector y.
SHSEQR computes the eigenvalues of a real upper Hessenberg matrix H and, optionally, the matrices T and Z from the Schur decomposition H = Z T Z**T, where T is an upper quasi-triangular matrix (the Schur form), and Z is the orthogonal matrix of Schur vectors. Optionally Z may be postmultiplied into an input orthogonal matrix Q, so that this routine can give the Schur factorization of a matrix A which has been reduced to the Hessenberg form H by the orthogonal matrix Q: A = Q*H*Q**T = (QZ)*T*(QZ)...
The shutdown call shuts down all or part of a full-duplex connection on the socket associated with s. If how is 0, then further receives will be disallowed. If how is 1, then further sends will be disallowed. If how is 2, then further sends and receives will be disallowed.
sigblock causes the signals specified in mask to be added to the set of signals currently being blocked from delivery. Signals are blocked if the corresponding bit in mask is a 1 (numbering the bits from 1 to 32); the macro sigmask is provided to construct the mask for a given signum. It is not possible to block SIGKILL, SIGSTOP, or SIGCONT; this restriction is imposed silently by the system.
The floating-point accelerator may raise floating-point exceptions, signal SIGFPE, due to five conditions: _OVERFL(overflow), _UNDERFL(underflow), _DIVZERO(divide-by-zero), _INEXACT(inexact result), or _INVALID(invalid operand, e.g., infinity). Usually these conditions are masked, and do not cause a floating-point exception. Instead, a default value is substituted for the result of the operation, and the program continues silently. This event may be intercepted by causing an exception to be rais...
isign returns the magnitude of its first argument with the sign of its second argument. It accepts either integer*2 or integer*4 arguments and the result is the same type. iisign and jisign take integer*2 and integer*4 arguments, respectively. sign, dsign, and qsign are isign's real, double-precision, and real*16 counterparts, respectively. If the value of the first argument of isign, sign, dsign, or qsign is zero, the result is zero. The generic version is sign and will devolve to the appropri...
signal is a simplified interface to the more general sigvec(3B) facility. A signal is generated by some abnormal event, initiated by a user at a terminal (quit, interrupt, stop), by a program error (bus error, etc.), by request of another program (kill), or when a process is stopped because it wishes to access its control terminal while in the background (see termio(7)). Signals are optionally generated when a process resumes after being stopped, when the status of child processes changes, or wh...
sigpause assigns mask to the set of masked signals and then waits for a signal to arrive; upon return the original set of masked signals is restored after executing the handler(s) (if any) installed for the awakening signal(s). mask is usually 0 to indicate that no signals are now to be blocked. The macro sigmask is provided to construct the mask for a given signal number. Sigpause always terminates by being interrupted, returning -1 with the global integer errno set to EINTR. In normal usage, a...
The function sigqueue() causes the signal specified by signo to be sent with the value specified by value to the process specified by pid. If signo is zero (the null signal), error checking is performed, but no signal is actually sent. The null signal can be used to check the validity of pid. The conditions required for a process to have permission to queue a signal to another process are the same as for the kill(2) function. If the signal specified in signo is currently blocked for the receivin...
sigsetmask sets the current signal mask (those signals that are blocked from delivery). Signals are blocked if the corresponding bit in mask is a 1 (numbering the bits from 1 to 32); the macro sigmask is provided to construct the mask for a given signum. The system quietly disallows SIGKILL, SIGSTOP, or SIGCONT to be blocked.
These library calls modify or return information about the disposition of the signal mask pointed to by set. The system defines a set of signals that may be delivered to a process. Signal delivery resembles the occurrence of a hardware interrupt: the signal is blocked from further occurrence, the current process context is saved, and a new one is built. A global signal mask defines the set of signals currently blocked from delivery to a process; it may be changed with a sigprocmask(2) call. The ...
The sigtrap pragma is a simple interface to installing signal handlers. You can have it install one of two handlers supplied by sigtrap itself (one which provides a Perl stack trace and one which simply die()s), or alternately you can supply your own handler for it to install. It can be told only to install a handler for signals which are either untrapped or ignored. It has a couple of lists of signals to trap, plus you can supply your own list of signals. The arguments passed to the use stateme...
sigvec specifies and reports on the way individual signals are to be handled in the calling process. If vec is non-zero, it alters the way the signal will be treated - default behavior, ignored, or handled via a routine - and the signal mask to be used when delivering the signal if a handler is installed. If ovec is non-zero, the previous handling information for the signal is returned to the user. In this way (a NULL vec and a non-NULL ovec) the user can inquire as to the current handling of a ...
The sigwait() function selects a pending signal from set and returns it in the storage pointed to by sig. If multiple signals from set are pending, then the one with the lowest numerical value is selected. If no signals in set are pending then the call will block until one becomes pending, The signals defined by set must be blocked at the time of the call to sigwait() in order to avoid conflicts with installed signal handlers. If the signals in set are not blocked then the system will either del...
The single-precision and long double-precision routines listed above are only available in the standard math library, -lm, and in -lmx. sin, cos and tan return trigonometric functions of radian arguments x for double data types. fsin, fcos and ftan, and their ANSI-named counterparts sinf, cosf and tanf return trigonometric functions of radian Page 1 TRIG(3M) TRIG(3M) arguments x for float data types. sinl, cosl and tanl do the same for long double data types. The asin routines return the arc sin...
The single-precision and long double-precision routines listed above are only available in the standard math library, -lm, and in -lmx. sin, cos and tan return trigonometric functions of radian arguments x for double data types. fsin, fcos and ftan, and their ANSI-named counterparts sinf, cosf and tanf return trigonometric functions of radian Page 1 TRIG(3M) TRIG(3M) arguments x for float data types. sinl, cosl and tanl do the same for long double data types. The asin routines return the arc sin...
The long double and single-precision routines listed above are only available in the standard math library, -lm and in -lmx. These functions compute the designated hyperbolic functions for double, float, and long double arguments.
The long double and single-precision routines listed above are only available in the standard math library, -lm and in -lmx. These functions compute the designated hyperbolic functions for double, float, and long double arguments.
SLABAD takes as input the values computed by SLAMCH for underflow and overflow, and returns the square root of each of these values if the log of LARGE is sufficiently large. This subroutine is intended to identify machines with a large exponent range, such as the Crays, and redefine the underflow and overflow limits to be the square roots of the values computed by SLAMCH. This subroutine is needed because SLAMCH does not compensate for poor arithmetic in the upper half of the exponent range, as...
SLABRD reduces the first NB rows and columns of a real general m by n matrix A to upper or lower bidiagonal form by an orthogonal transformation Q' * A * P, and returns the matrices X and Y which are needed to apply the transformation to the unreduced part of A. If m >= n, A is reduced to upper bidiagonal form; if m < n, to lower bidiagonal form. This is an auxiliary routine called by SGEBRD
SLAE2 computes the eigenvalues of a 2-by-2 symmetric matrix [ A B ] [ B C ]. On return, RT1 is the eigenvalue of larger absolute value, and RT2 is the eigenvalue of smaller absolute value.
SLAEBZ contains the iteration loops which compute and use the function N(w), which is the count of eigenvalues of a symmetric tridiagonal matrix T less than or equal to its argument w. It performs a choice of two types of loops: IJOB=1, followed by IJOB=2: It takes as input a list of intervals and returns a list of sufficiently small intervals whose union contains the same eigenvalues as the union of the original intervals. The input intervals are (AB(j,1),AB(j,2)], j=1,...,MINP. The output inte...
SLAED1 computes the updated eigensystem of a diagonal matrix after modification by a rank-one symmetric matrix. This routine is used only for the eigenproblem which requires all eigenvalues and eigenvectors of a tridiagonal matrix. SLAED7 handles the case in which eigenvalues only or eigenvalues and eigenvectors of a full symmetric matrix (which was reduced to tridiagonal form) are desired. T = Q(in) ( D(in) + RHO * Z*Z' ) Q'(in) = Q(out) * D(out) * Q'(out) where Z = Q'u, u is a vector of le...
SLAED2 merges the two sets of eigenvalues together into a single sorted set. Then it tries to deflate the size of the problem. There are two ways in which deflation can occur: when two or more eigenvalues are close together or if there is a tiny entry in the Z vector. For each such occurrence the order of the related secular equation problem is reduced by one.
SLAED3 finds the roots of the secular equation, as defined by the values in D, W, and RHO, between KSTART and KSTOP. It makes the appropriate calls to SLAED4 and then updates the eigenvectors by multiplying the matrix of eigenvectors of the pair of eigensystems being combined by the matrix of eigenvectors of the K-by-K system which is solved here. This code makes very mild assumptions about floating point arithmetic. It will work on machines with a guard digit in add/subtract, or on those binary...
This subroutine computes the I-th updated eigenvalue of a symmetric rank-one modification to a diagonal matrix whose elements are given in the array d, and that no loss in generality. The rank-one modified system is thus diag( D ) + RHO * Z * Z_transpose. where we assume the Euclidean norm of Z is 1. The method consists of approximating the rational functions in the secular equation by simpler interpolating rational functions....
This subroutine computes the I-th eigenvalue of a symmetric rank-one modification of a 2-by-2 diagonal matrix We also assume RHO > 0 and that the Euclidean norm of the vector Z is one.
SLAED6 computes the positive or negative root (closest to the origin) of z(1) z(2) z(3) f(x) = rho + --------- + ---------- + --------- d(1)-x d(2)-x d(3)-x otherwise it is between d(1) and d(2) This routine will be called by SLAED4 when necessary. In most cases, the root sought is the smallest in magnitude, though it might not be in some extremely rare situations.
SLAED7 computes the updated eigensystem of a diagonal matrix after modification by a rank-one symmetric matrix. This routine is used only for the eigenproblem which requires all eigenvalues and optionally eigenvectors of a dense symmetric matrix that has been reduced to tridiagonal form. SLAED1 handles the case in which all eigenvalues and eigenvectors of a symmetric tridiagonal matrix are desired. T = Q(in) ( D(in) + RHO * Z*Z' ) Q'(in) = Q(out) * D(out) * Q'(out) where Z = Q'u, u is a vect...
SLAED8 merges the two sets of eigenvalues together into a single sorted set. Then it tries to deflate the size of the problem. There are two ways in which deflation can occur: when two or more eigenvalues are close together or if there is a tiny element in the Z vector. For each such occurrence the order of the related secular equation problem is reduced by one.
SLAED9 finds the roots of the secular equation, as defined by the values in D, Z, and RHO, between KSTART and KSTOP. It makes the appropriate calls to SLAED4 and then stores the new matrix of eigenvectors for use in calculating the next level of Z vectors.
SLAEV2 computes the eigendecomposition of a 2-by-2 symmetric matrix [ A B ] [ B C ]. On return, RT1 is the eigenvalue of larger absolute value, RT2 is the eigenvalue of smaller absolute value, and (CS1,SN1) is the unit right eigenvector for RT1, giving the decomposition [ CS1 SN1 ] [ A B ] [ CS1 -SN1 ] = [ RT1 0 ] [-SN1 CS1 ] [ B C ] [ SN1 CS1 ] [ 0 RT2 ].
SLAEXC swaps adjacent diagonal blocks T11 and T22 of order 1 or 2 in an upper quasi-triangular matrix T by an orthogonal similarity transformation. T must be in Schur canonical form, that is, block upper triangular with 1-by-1 and 2-by-2 diagonal blocks; each 2-by-2 diagonal block has its diagonal elemnts equal and its off-diagonal elements of opposite sign.
SLAG2 computes the eigenvalues of a 2 x 2 generalized eigenvalue problem A - w B, with scaling as necessary to avoid over-/underflow. The scaling factor "s" results in a modified eigenvalue equation s A - w B where s is a non-negative scaling factor chosen so that w, w B, and s A do not overflow and, if possible, do not underflow, either.
SLAGTF factorizes the matrix (T - lambda*I), where T is an n by n tridiagonal matrix and lambda is a scalar, as where P is a permutation matrix, L is a unit lower tridiagonal matrix with at most one non-zero sub-diagonal elements per column and U is an upper triangular matrix with at most two non-zero super-diagonal elements per column. The factorization is obtained by Gaussian elimination with partial pivoting and implicit row scaling. The parameter LAMBDA is included in the routine so that SLA...
SLAGTS may be used to solve one of the systems of equations where T is an n by n tridiagonal matrix, for x, following the factorization of (T - lambda*I) as (T - lambda*I) = P*L*U , by routine SLAGTF. The choice of equation to be solved is controlled by the argument JOB, and in each case there is an option to perturb zero or very small diagonal elements of U, this option being intended for use in applications such as inverse iteration....
SLAHQR is an auxiliary routine called by SHSEQR to update the eigenvalues and Schur decomposition already computed by SHSEQR, by dealing with the Hessenberg submatrix in rows and columns ILO to IHI.
SLAHRD reduces the first NB columns of a real general n-by-(n-k+1) matrix A so that elements below the k-th subdiagonal are zero. The reduction is performed by an orthogonal similarity transformation Q' * A * Q. The routine returns the matrices V and T which determine Q as a block reflector I - V*T*V', and also the matrix Y = A * V * T. This is an auxiliary routine called by SGEHRD.
SLAIC1 applies one step of incremental condition estimation in its simplest version: Let x, twonorm(x) = 1, be an approximate singular vector of an j-by-j lower triangular matrix L, such that twonorm(L*x) = sest Then SLAIC1 computes sestpr, s, c such that the vector [ s*x ] xhat = [ c ] is an approximate singular vector of [ L 0 ] Lhat = [ w' gamma ] in the sense that twonorm(Lhat*xhat) = sestpr. Depending on JOB, an estimate for the largest or smallest singular value is computed. Note that [s ...
SLALN2 solves a system of the form (ca A - w D ) X = s B or (ca A' - w D) X = s B with possible scaling ("s") and perturbation of A. (A' means A-transpose.) A is an NA x NA real matrix, ca is a real scalar, D is an NA x NA real diagonal matrix, w is a real or complex value, and X and B are NA x 1 matrices -- real if w is real, complex if w is complex. NA may be 1 or 2. If w is complex, X and B are represented as NA x 2 matrices, the first column of each being the real part and the second bei...
SLAMRG will create a permutation list which will merge the elements of A (which is composed of two independently sorted sets) into a single set which is sorted in ascending order.
SLANGB returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of an n by n band matrix A, with kl sub-diagonals and ku super-diagonals.
SLANGT returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of a real tridiagonal matrix A.
SLANHS returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of a Hessenberg matrix A.
SLANSB returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of an n by n symmetric band matrix A, with k super-diagonals.
SLANSP returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of a real symmetric matrix A, supplied in packed form.
SLANST returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of a real symmetric tridiagonal matrix A.
SLANSY returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of a real symmetric matrix A.
SLANTB returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of an n by n triangular band matrix A, with ( k + 1 ) diagonals.
SLANTP returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of a triangular matrix A, supplied in packed form.
SLANTR returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of a trapezoidal or triangular matrix A.
SLANV2 computes the Schur factorization of a real 2-by-2 nonsymmetric matrix in standard form: [ A B ] = [ CS -SN ] [ AA BB ] [ CS SN ] [ C D ] [ SN CS ] [ CC DD ] [-SN CS ] where either 1) CC = 0 so that AA and DD are real eigenvalues of the matrix, or 2) AA = DD and BB*CC < 0, so that AA + or - sqrt(BB*CC) are complex conjugate eigenvalues.
Given two column vectors X and Y, let The subroutine first computes the QR factorization of A = Q*R, and then computes the SVD of the 2-by-2 upper triangular matrix R. The smaller singular value of R is returned in SSMIN, which is used as the measurement of the linear dependency of the vectors X and Y.
SLAPMT rearranges the columns of the M by N matrix X as specified by the permutation K(1),K(2),...,K(N) of the integers 1,...,N. If FORWRD = .TRUE., forward permutation: X(*,K(J)) is moved X(*,J) for J = 1,2,...,N. If FORWRD = .FALSE., backward permutation: X(*,J) is moved to X(*,K(J)) for J = 1,2,...,N.
SLAQGB equilibrates a general M by N band matrix A with KL subdiagonals and KU superdiagonals using the row and scaling factors in the vectors R and C.
SLAQTR solves the real quasi-triangular system or the complex quasi-triangular systems op(T + iB)*(p+iq) = scale*(c+id), if LREAL = .FALSE. in real arithmetic, where T is upper quasi-triangular. If LREAL = .FALSE., then the first diagonal block of T must be 1 by 1, B is the specially structured matrix B = [ b(1) b(2) ... b(n) ] [ w ] [ w ] [ . ] [ w ] op(A) = A or A', A' denotes the conjugate transpose of matrix A. On input, X = [ c ]. On output, X = [ p ]. [ d ] [ q ] This subroutine is desig...
SLAR2V applies a vector of real plane rotations from both sides to a sequence of 2-by-2 real symmetric matrices, defined by the elements of the vectors x, y and z. For i = 1,2,...,n ( x(i) z(i) ) := ( c(i) s(i) ) ( x(i) z(i) ) ( c(i) -s(i) ) ( z(i) y(i) ) ( -s(i) c(i) ) ( z(i) y(i) ) ( s(i) c(i) )
SLARF applies a real elementary reflector H to a real m by n matrix C, from either the left or the right. H is represented in the form H = I - tau * v * v' where tau is a real scalar and v is a real vector. If tau = 0, then H is taken to be the unit matrix.
SLARFG generates a real elementary reflector H of order n, such that ( x ) ( 0 ) where alpha and beta are scalars, and x is an (n-1)-element real vector. H is represented in the form H = I - tau * ( 1 ) * ( 1 v' ) , ( v ) where tau is a real scalar and v is a real (n-1)-element vector. If the elements of x are all zero, then tau = 0 and H is taken to be the unit matrix. Otherwise 1 <= tau <= 2.
SLARFT forms the triangular factor T of a real block reflector H of order n, which is defined as a product of k elementary reflectors. If DIRECT = 'F', H = H(1) H(2) . . . H(k) and T is upper triangular; If DIRECT = 'B', H = H(k) . . . H(2) H(1) and T is lower triangular. If STOREV = 'C', the vector which defines the elementary reflector H(i) is stored in the i-th column of the array V, and H = I - V * T * V' If STOREV = 'R', the vector which defines the elementary reflector H(i) is sto...
SLARFX applies a real elementary reflector H to a real m by n matrix C, from either the left or the right. H is represented in the form H = I - tau * v * v' where tau is a real scalar and v is a real vector. If tau = 0, then H is taken to be the unit matrix This version uses inline code if H has order < 11.
SLARGV generates a vector of real plane rotations, determined by elements of the real vectors x and y. For i = 1,2,...,n ( c(i) s(i) ) ( x(i) ) = ( a(i) ) ( -s(i) c(i) ) ( y(i) ) = ( 0 )
SLARTG generate a plane rotation so that [ -SN CS ] [ G ] [ 0 ] This is a slower, more accurate version of the BLAS1 routine SROTG, with the following other differences: F and G are unchanged on return. If G=0, then CS=1 and SN=0. If F=0 and (G .ne. 0), then CS=0 and SN=1 without doing any floating point operations (saves work in SBDSQR when there are zeros on the diagonal). If F exceeds G in magnitude, CS will be positive....
SLARTV applies a vector of real plane rotations to elements of the real vectors x and y. For i = 1,2,...,n ( x(i) ) := ( c(i) s(i) ) ( x(i) ) ( y(i) ) ( -s(i) c(i) ) ( y(i) )
SLARUV returns a vector of n random real numbers from a uniform (0,1) distribution (n <= 128). This is an auxiliary routine called by SLARNV and CLARNV.
SLAS2 computes the singular values of the 2-by-2 matrix [ F G ] [ 0 H ]. On return, SSMIN is the smaller singular value and SSMAX is the larger singular value.
SLASCL multiplies the M by N real matrix A by the real scalar CTO/CFROM. This is done without over/underflow as long as the final result CTO*A(I,J)/CFROM does not over/underflow. TYPE specifies that A may be full, upper triangular, lower triangular, upper Hessenberg, or banded.
SLASQ1 computes the singular values of a real N-by-N bidiagonal matrix with diagonal D and off-diagonal E. The singular values are computed to high relative accuracy, barring over/underflow or denormalization. The algorithm is described in "Accurate singular values and differential qd algorithms," by K. V. Fernando and B. N. Parlett, Numer. Math., Vol-67, No. 2, pp. 191-230,1994. See also "Implementation of differential qd algorithms," by K. V. Fernando and B. N. Parlett, Technical Report, D...
SLASQ2 computes the singular values of a real N-by-N unreduced bidiagonal matrix with squared diagonal elements in Q and squared off-diagonal elements in E. The singular values are computed to relative accuracy TOL, barring over/underflow or denormalization.
SLASQ4 estimates TAU, the smallest eigenvalue of a matrix. This routine improves the input value of SUP which is an upper bound for the smallest eigenvalue for this matrix .
SLASR performs the transformation consisting of a sequence of plane rotations determined by the parameters PIVOT and DIRECT as follows ( z = m when SIDE = 'L' or 'l' and z = n when SIDE = 'R' or 'r' ): When DIRECT = 'F' or 'f' ( Forward sequence ) then P = P( z - 1 )*...*P( 2 )*P( 1 ), and when DIRECT = 'B' or 'b' ( Backward sequence ) then P = P( 1 )*P( 2 )*...*P( z - 1 ), where P( k ) is a plane rotation matrix for the following planes: when PIVOT = 'V' or 'v' ( Variable pi...
Sort the numbers in D in increasing order (if ID = 'I') or in decreasing order (if ID = 'D' ). Use Quick Sort, reverting to Insertion sort on arrays of size <= 20. Dimension of STACK limits N to about 2**32.
SLASSQ returns the values scl and smsq such that where x( i ) = X( 1 + ( i - 1 )*INCX ). The value of sumsq is assumed to be non-negative and scl returns the value scl = max( scale, abs( x( i ) ) ). scale and sumsq must be supplied in SCALE and SUMSQ and scl and smsq are overwritten on SCALE and SUMSQ respectively. The routine makes only one pass through the vector x.
SLASV2 computes the singular value decomposition of a 2-by-2 triangular matrix [ F G ] [ 0 H ]. On return, abs(SSMAX) is the larger singular value, abs(SSMIN) is the smaller singular value, and (CSL,SNL) and (CSR,SNR) are the left and right singular vectors for abs(SSMAX), giving the decomposition [ CSL SNL ] [ F G ] [ CSR -SNR ] = [ SSMAX 0 ] [-SNL CSL ] [ 0 H ] [ SNR CSR ] [ 0 SSMIN ].
SLASY2 solves for the N1 by N2 matrix X, 1 <= N1,N2 <= 2, in where TL is N1 by N1, TR is N2 by N2, B is N1 by N2, and ISGN = 1 or -1. op(T) = T or T', where T' denotes the transpose of T.
SLASYF computes a partial factorization of a real symmetric matrix A using the Bunch-Kaufman diagonal pivoting method. The partial factorization has the form: A = ( I U12 ) ( A11 0 ) ( I 0 ) if UPLO = 'U', or: ( 0 U22 ) ( 0 D ) ( U12' U22' ) A = ( L11 0 ) ( D 0 ) ( L11' L21' ) if UPLO = 'L' ( L21 I ) ( 0 A22 ) ( 0 I ) where the order of D is at most NB. The actual order is returned in the argument KB, and is either NB or NB-1, or N if N <= NB. SLASYF is an auxiliary routine called by SSY...
SLATBS solves one of the triangular systems are n-element vectors, and s is a scaling factor, usually less than or equal to 1, chosen so that the components of x will be less than the overflow threshold. If the unscaled problem will not cause overflow, the Level 2 BLAS routine STBSV is called. If the matrix A is singular (A(j,j) = 0 for some j), then s is set to 0 and a non-trivial solution to A*x = 0 is returned....
SLATPS solves one of the triangular systems transpose of A, x and b are n-element vectors, and s is a scaling factor, usually less than or equal to 1, chosen so that the components of x will be less than the overflow threshold. If the unscaled problem will not cause overflow, the Level 2 BLAS routine STPSV is called. If the matrix A is singular (A(j,j) = 0 for some j), then s is set to 0 and a non-trivial solution to A*x = 0 is returned....
SLATRD reduces NB rows and columns of a real symmetric matrix A to symmetric tridiagonal form by an orthogonal similarity transformation Q' * A * Q, and returns the matrices V and W which are needed to apply the transformation to the unreduced part of A. If UPLO = 'U', SLATRD reduces the last NB rows and columns of a matrix, of which the upper triangle is supplied; if UPLO = 'L', SLATRD reduces the first NB rows and columns of a matrix, of which the lower triangle is supplied. This is an au...
SLATRS solves one of the triangular systems triangular matrix, A' denotes the transpose of A, x and b are n-element vectors, and s is a scaling factor, usually less than or equal to 1, chosen so that the components of x will be less than the overflow threshold. If the unscaled problem will not cause overflow, the Level 2 BLAS routine STRSV is called. If the matrix A is singular (A(j,j) = 0 for some j), then s is set to 0 and a non-trivial solution to A*x = 0 is returned....
SLATZM applies a Householder matrix generated by STZRQF to a matrix. Let P = I - tau*u*u', u = ( 1 ), ( v ) where v is an (m-1) vector if SIDE = 'L', or a (n-1) vector if SIDE = 'R'. If SIDE equals 'L', let C = [ C1 ] 1 [ C2 ] m-1 n Then C is overwritten by P*C. If SIDE equals 'R', let C = [ C1, C2 ] m 1 n-1 Then C is overwritten by C*P.
SLAUU2 computes the product U * U' or L' * L, where the triangular factor U or L is stored in the upper or lower triangular part of the array A. If UPLO = 'U' or 'u' then the upper triangle of the result is stored, overwriting the factor U in A. If UPLO = 'L' or 'l' then the lower triangle of the result is stored, overwriting the factor L in A. This is the unblocked form of the algorithm, calling Level 2 BLAS....
SLAUUM computes the product U * U' or L' * L, where the triangular factor U or L is stored in the upper or lower triangular part of the array A. If UPLO = 'U' or 'u' then the upper triangle of the result is stored, overwriting the factor U in A. If UPLO = 'L' or 'l' then the lower triangle of the result is stored, overwriting the factor L in A. This is the blocked form of the algorithm, calling Level 3 BLAS....
The current thread is suspended from execution for the number of seconds specified by the argument. The actual suspension time may be less than that requested because any caught signal will terminate the sleep following execution of that signal's catching routine. Also, the suspension time may be longer than requested by an arbitrary amount due to the scheduling of other activity in the system. The value returned by sleep will be the ``unslept'' amount (the requested time minus the time actua...
This module is just a translation of the C socket.h file. Unlike the old mechanism of requiring a translated socket.ph file, this uses the h2xs program (see the Perl source distribution) and your native C compiler. This means that it has a far more likely chance of getting the numbers right. This includes all of the commonly used pound-defines like AF_INET, SOCK_STREAM, etc. In addition, some structure manipulation functions are available: inet_aton HOSTNAME Takes a string giving the name of a h...
socket creates an endpoint for communication and returns a descriptor. The domain parameter specifies a communications domain within which communication will take place; this selects the protocol family which should be used. The protocol family generally is the same as the address family for the addresses supplied in later operations on the socket. These families are defined in the include file sys/socket.h. There must be an entry in the n...
The socketpair library call creates an unnamed pair of connected sockets in the specified address family d, of the specified type, and using the optionally specified protocol. The descriptors used in referencing the new sockets are returned in sv[0] and sv[1]. The two sockets are indistinguishable.
SOPGTR generates a real orthogonal matrix Q which is defined as the product of n-1 elementary reflectors H(i) of order n, as returned by SSPTRD using packed storage: if UPLO = 'U', Q = H(n-1) . . . H(2) H(1), if UPLO = 'L', Q = H(1) H(2) . . . H(n-1).
SOPMTR overwrites the general real M-by-N matrix C with TRANS = 'T': Q**T * C C * Q**T where Q is a real orthogonal matrix of order nq, with nq = m if SIDE = 'L' and nq = n if SIDE = 'R'. Q is defined as the product of nq-1 elementary reflectors, as returned by SSPTRD using packed storage: if UPLO = 'U', Q = H(nq-1) . . . H(2) H(1); if UPLO = 'L', Q = H(1) H(2) . . . H(nq-1).
SORG2L generates an m by n real matrix Q with orthonormal columns, which is defined as the last n columns of a product of k elementary reflectors of order m Q = H(k) . . . H(2) H(1) as returned by SGEQLF.
SORG2R generates an m by n real matrix Q with orthonormal columns, which is defined as the first n columns of a product of k elementary reflectors of order m Q = H(1) H(2) . . . H(k) as returned by SGEQRF.
SORGBR generates one of the real orthogonal matrices Q or P**T determined by SGEBRD when reducing a real matrix A to bidiagonal form: A = Q * B * P**T. Q and P**T are defined as products of elementary reflectors H(i) or G(i) respectively. If VECT = 'Q', A is assumed to have been an M-by-K matrix, and Q is of order M: if m >= k, Q = H(1) H(2) . . . H(k) and SORGBR returns the first n columns of Q, where m >= n >= k; if m < k, Q = H(1) H(2) . . . H(m-1) and SORGBR returns Q as an M-by-M matrix. ...
SORGHR generates a real orthogonal matrix Q which is defined as the product of IHI-ILO elementary reflectors of order N, as returned by SGEHRD: Q = H(ilo) H(ilo+1) . . . H(ihi-1).
SORGL2 generates an m by n real matrix Q with orthonormal rows, which is defined as the first m rows of a product of k elementary reflectors of order n Q = H(k) . . . H(2) H(1) as returned by SGELQF.
SORGLQ generates an M-by-N real matrix Q with orthonormal rows, which is defined as the first M rows of a product of K elementary reflectors of order N Q = H(k) . . . H(2) H(1) as returned by SGELQF.
SORGQL generates an M-by-N real matrix Q with orthonormal columns, which is defined as the last N columns of a product of K elementary reflectors of order M Q = H(k) . . . H(2) H(1) as returned by SGEQLF.
SORGQR generates an M-by-N real matrix Q with orthonormal columns, which is defined as the first N columns of a product of K elementary reflectors of order M Q = H(1) H(2) . . . H(k) as returned by SGEQRF.
SORGR2 generates an m by n real matrix Q with orthonormal rows, which is defined as the last m rows of a product of k elementary reflectors of order n Q = H(1) H(2) . . . H(k) as returned by SGERQF.
SORGRQ generates an M-by-N real matrix Q with orthonormal rows, which is defined as the last M rows of a product of K elementary reflectors of order N Q = H(1) H(2) . . . H(k) as returned by SGERQF.
SORGTR generates a real orthogonal matrix Q which is defined as the product of n-1 elementary reflectors of order N, as returned by SSYTRD: if UPLO = 'U', Q = H(n-1) . . . H(2) H(1), if UPLO = 'L', Q = H(1) H(2) . . . H(n-1).
SORM2L overwrites the general real m by n matrix C with where Q is a real orthogonal matrix defined as the product of k elementary reflectors Q = H(k) . . . H(2) H(1) as returned by SGEQLF. Q is of order m if SIDE = 'L' and of order n if SIDE = 'R'.
SORM2R overwrites the general real m by n matrix C with where Q is a real orthogonal matrix defined as the product of k elementary reflectors Q = H(1) H(2) . . . H(k) as returned by SGEQRF. Q is of order m if SIDE = 'L' and of order n if SIDE = 'R'.
If VECT = 'Q', SORMBR overwrites the general real M-by-N matrix C with SIDE = 'L' SIDE = 'R' TRANS = 'N': Q * C C * Q TRANS = 'T': Q**T * C C * Q**T If VECT = 'P', SORMBR overwrites the general real M-by-N matrix C with SIDE = 'L' SIDE = 'R' TRANS = 'N': P * C C * P TRANS = 'T': P**T * C C * P**T Here Q and P**T are the orthogonal matrices determined by SGEBRD when reducing a real matrix A to bidiagonal form: A = Q * B * P**T. Q and P**T are defined as products of elementary ...
SORMHR overwrites the general real M-by-N matrix C with TRANS = 'T': Q**T * C C * Q**T where Q is a real orthogonal matrix of order nq, with nq = m if SIDE = 'L' and nq = n if SIDE = 'R'. Q is defined as the product of IHI-ILO elementary reflectors, as returned by SGEHRD: Q = H(ilo) H(ilo+1) . . . H(ihi-1).
SORML2 overwrites the general real m by n matrix C with where Q is a real orthogonal matrix defined as the product of k elementary reflectors Q = H(k) . . . H(2) H(1) as returned by SGELQF. Q is of order m if SIDE = 'L' and of order n if SIDE = 'R'.
SORMLQ overwrites the general real M-by-N matrix C with TRANS = 'T': Q**T * C C * Q**T where Q is a real orthogonal matrix defined as the product of k elementary reflectors Q = H(k) . . . H(2) H(1) as returned by SGELQF. Q is of order M if SIDE = 'L' and of order N if SIDE = 'R'.
SORMQL overwrites the general real M-by-N matrix C with TRANS = 'T': Q**T * C C * Q**T where Q is a real orthogonal matrix defined as the product of k elementary reflectors Q = H(k) . . . H(2) H(1) as returned by SGEQLF. Q is of order M if SIDE = 'L' and of order N if SIDE = 'R'.
SORMQR overwrites the general real M-by-N matrix C with TRANS = 'T': Q**T * C C * Q**T where Q is a real orthogonal matrix defined as the product of k elementary reflectors Q = H(1) H(2) . . . H(k) as returned by SGEQRF. Q is of order M if SIDE = 'L' and of order N if SIDE = 'R'.
SORMR2 overwrites the general real m by n matrix C with where Q is a real orthogonal matrix defined as the product of k elementary reflectors Q = H(1) H(2) . . . H(k) as returned by SGERQF. Q is of order m if SIDE = 'L' and of order n if SIDE = 'R'.
SORMRQ overwrites the general real M-by-N matrix C with TRANS = 'T': Q**T * C C * Q**T where Q is a real orthogonal matrix defined as the product of k elementary reflectors Q = H(1) H(2) . . . H(k) as returned by SGERQF. Q is of order M if SIDE = 'L' and of order N if SIDE = 'R'.
SORMTR overwrites the general real M-by-N matrix C with TRANS = 'T': Q**T * C C * Q**T where Q is a real orthogonal matrix of order nq, with nq = m if SIDE = 'L' and nq = n if SIDE = 'R'. Q is defined as the product of nq-1 elementary reflectors, as returned by SSYTRD: if UPLO = 'U', Q = H(nq-1) . . . H(2) H(1); if UPLO = 'L', Q = H(1) H(2) . . . H(nq-1).
Read file fileName and pass the contents to the Tcl interpreter as a script to evaluate in the normal fashion. The return value from source is the return value of the last command executed from the file. If an error occurs in evaluating the contents of the file then the source command will return that error. If a return command is invoked from within the file then the remainder of the file will be skipped and the source command will return normally with the result from the return command. If fil...
On Entry ABD REAL(LDA, N) the matrix to be factored. The columns of the upper triangle are stored in the columns of ABD and the diagonals of the upper triangle are stored in the rows of ABD . See the comments below for details. LDA INTEGER the leading dimension of the array ABD . LDA must be .GE. M + 1 . N INTEGER the order of the matrix A . M INTEGER the number of diagonals above the main diagonal. 0 .LE. M .LT. N . On Return ABD an upper triangular matrix R , stored in band form, so that A = T...
SPBCON estimates the reciprocal of the condition number (in the 1-norm) of a real symmetric positive definite band matrix using the Cholesky factorization A = U**T*U or A = L*L**T computed by SPBTRF. An estimate is obtained for norm(inv(A)), and the reciprocal of the condition number is computed as RCOND = 1 / (ANORM * norm(inv(A))).
On Entry ABD REAL(LDA, N) the output from SPBCO or SPBFA. LDA INTEGER the leading dimension of the array ABD . N INTEGER the order of the matrix A . M INTEGER the number of diagonals above the main diagonal. On Return DET REAL(2) determinant of original matrix in the form Determinant = DET(1) * 10.0**DET(2) with 1.0 .LE. DET(1) .LT. 10.0 or DET(1) .EQ. 0.0 . LINPACK. This version dated 08/14/78 . Cleve Moler, University of New Mexico, Argonne National Lab. PPPPaaaaggggeeee 1111...
SPBEQU computes row and column scalings intended to equilibrate a symmetric positive definite band matrix A and reduce its condition number (with respect to the two-norm). S contains the scale factors, S(i) = 1/sqrt(A(i,i)), chosen so that the scaled matrix B with elements B(i,j) = S(i)*A(i,j)*S(j) has ones on the diagonal. This choice of S puts the condition number of B within a factor N of the smallest possible condition number over all possible diagonal scalings....
On Entry ABD REAL(LDA, N) the matrix to be factored. The columns of the upper triangle are stored in the columns of ABD and the diagonals of the upper triangle are stored in the rows of ABD . See the comments below for details. LDA INTEGER the leading dimension of the array ABD . LDA must be .GE. M + 1 . N INTEGER the order of the matrix A . M INTEGER the number of diagonals above the main diagonal. 0 .LE. M .LT. N . On Return ABD an upper triangular matrix R , stored in band form, so that A = T...
SPBRFS improves the computed solution to a system of linear equations when the coefficient matrix is symmetric positive definite and banded, and provides error bounds and backward error estimates for the solution.
On Entry ABD REAL(LDA, N) the output from SPBCO or SPBFA. LDA INTEGER the leading dimension of the array ABD . N INTEGER the order of the matrix A . M INTEGER the number of diagonals above the main diagonal. B REAL(N) the right hand side vector. On Return B the solution vector X . Error Condition A division by zero will occur if the input factor contains a zero on the diagonal. Technically, this indicates singularity, but it is usually caused by improper subroutine arguments. It will not occur i...
SPBSTF computes a split Cholesky factorization of a real symmetric positive definite band matrix A. This routine is designed to be used in conjunction with SSBGST. The factorization has the form A = S**T*S where S is a band matrix of the same bandwidth as A and the following structure: S = ( U ) ( M L ) where U is upper triangular of order m = (n+kd)/2, and L is lower triangular of order n-m.
SPBSV computes the solution to a real system of linear equations A * X = B, where A is an N-by-N symmetric positive definite band matrix and X and B are N-by-NRHS matrices. The Cholesky decomposition is used to factor A as A = U**T * U, if UPLO = 'U', or A = L * L**T, if UPLO = 'L', where U is an upper triangular band matrix, and L is a lower triangular band matrix, with the same number of superdiagonals or subdiagonals as A. The factored form of A is then used to solve the system of equatio...
SPBSVX uses the Cholesky factorization A = U**T*U or A = L*L**T to compute the solution to a real system of linear equations A * X = B, where A is an N-by-N symmetric positive definite band matrix and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
SPBTF2 computes the Cholesky factorization of a real symmetric positive definite band matrix A. The factorization has the form A = U' * U , if UPLO = 'U', or A = L * L', if UPLO = 'L', where U is an upper triangular matrix, U' is the transpose of U, and L is lower triangular. This is the unblocked version of the algorithm, calling Level 2 BLAS.
SPBTRF computes the Cholesky factorization of a real symmetric positive definite band matrix A. The factorization has the form A = U**T * U, if UPLO = 'U', or A = L * L**T, if UPLO = 'L', where U is an upper triangular matrix and L is lower triangular.
SPBTRS solves a system of linear equations A*X = B with a symmetric positive definite band matrix A using the Cholesky factorization A = U**T*U or A = L*L**T computed by SPBTRF.
params a 4-element array of floats containing the size and location of a sphere. The first 3 elements are the x, y and z coordinates of the sphere center, followed by the sphere radius. FUNCTION RETURN VALUE This function returns -1 if an error occurs, otherwise 0.
attribute the sphere attribute to set value the value to which the attribute is to be set FUNCTION RETURN VALUE Returns -1 if an invalid attribute or value is specified, 0 otherwise.
n expects the number of vertices in the polygon. There can be no more than 256 vertices in a single polygon. parray expects an array containing the vertices of a polygon. iarray expects the array containing the color map indices which determine the intensities of the vertices of the polygon
Returns a list created by splitting string at each character that is in the splitChars argument. Each element of the result list will consist of the characters from string that lie between instances of the characters in splitChars. Empty list elements will be generated if string contains adjacent characters in splitChars, or if the first or last character of string is in splitChars. If splitChars is an empty string then each character of string becomes a separate element of the result list. Spli...
Tcl_Interp *interp (out) Interpreter to use for error | reporting. If NULL, then no error | message is left. char *list (in) Pointer to a string with proper list structure. int *argcPtr (out) Filled in with number of elements in list. char ***argvPtr (out) *argvPtr will be filled in with the address of an array of pointers to the strings that are the extracted elements of list. There will be *argcPtr valid entries in the array, followed by a NULL entry. int argc (in) Number of elements in argv. ...
dspmv , sspmv , dhpmv and chpmv perform matrix-vector operation y := alpha*A*x + beta*y, where alpha and beta are scalars, x and y are n element vectors and A is an n by n symmetric/hermitian matrix, supplied in packed form.
On Entry A REAL(LDA, N) the symmetric matrix to be factored. Only the diagonal and upper triangle are used. LDA INTEGER the leading dimension of the array A . N INTEGER the order of the matrix A . On Return A an upper triangular matrix R so that A = TRANS(R)*R where TRANS(R) is the transpose. The strict lower triangle is unaltered. If INFO .NE. 0 , the factorization is not complete. RCOND REAL an estimate of the reciprocal condition of A . For the system A*X = B , relative perturbations in A and...
SPOCON estimates the reciprocal of the condition number (in the 1-norm) of a real symmetric positive definite matrix using the Cholesky factorization A = U**T*U or A = L*L**T computed by SPOTRF. An estimate is obtained for norm(inv(A)), and the reciprocal of the condition number is computed as RCOND = 1 / (ANORM * norm(inv(A))).
On Entry A REAL(LDA, N) the output A from SPOCO or SPOFA or the output X from SQRDC. LDA INTEGER the leading dimension of the array A . N INTEGER the order of the matrix A . JOB INTEGER = 11 both determinant and inverse. = 01 inverse only. = 10 determinant only. On Return A If SPOCO or SPOFA was used to factor A , then SPODI produces the upper half of INVERSE(A) . If SQRDC was used to decompose X , then SPODI produces the upper half of INVERSE(TRANS(X)*X), where TRANS(X) is the transpose. Elemen...
SPOEQU computes row and column scalings intended to equilibrate a symmetric positive definite matrix A and reduce its condition number (with respect to the two-norm). S contains the scale factors, S(i) = 1/sqrt(A(i,i)), chosen so that the scaled matrix B with elements B(i,j) = S(i)*A(i,j)*S(j) has ones on the diagonal. This choice of S puts the condition number of B within a factor N of the smallest possible condition number over all possible diagonal scalings....
On Entry A REAL(LDA, N) the symmetric matrix to be factored. Only the diagonal and upper triangle are used. LDA INTEGER the leading dimension of the array A . N INTEGER the order of the matrix A . On Return A an upper triangular matrix R so that A = TRANS(R)*R where TRANS(R) is the transpose. The strict lower triangle is unaltered. If INFO .NE. 0 , the factorization is not complete. INFO INTEGER = 0 for normal return. = K signals an error condition. The leading minor of order K is not positive d...
SPORFS improves the computed solution to a system of linear equations when the coefficient matrix is symmetric positive definite, and provides error bounds and backward error estimates for the solution.
On Entry A REAL(LDA, N) the output from SPOCO or SPOFA. LDA INTEGER the leading dimension of the array A . N INTEGER the order of the matrix A . B REAL(N) the right hand side vector. On Return B the solution vector X . Error Condition A division by zero will occur if the input factor contains a zero on the diagonal. Technically, this indicates singularity, but it is usually caused by improper subroutine arguments. It will not occur if the subroutines are called correctly and INFO .EQ. 0 . To com...
SPOSV computes the solution to a real system of linear equations A * X = B, where A is an N-by-N symmetric positive definite matrix and X and B are N-by-NRHS matrices. The Cholesky decomposition is used to factor A as A = U**T* U, if UPLO = 'U', or A = L * L**T, if UPLO = 'L', where U is an upper triangular matrix and L is a lower triangular matrix. The factored form of A is then used to solve the system of equations A * X = B....
SPOSVX uses the Cholesky factorization A = U**T*U or A = L*L**T to compute the solution to a real system of linear equations A * X = B, where A is an N-by-N symmetric positive definite matrix and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
SPOTF2 computes the Cholesky factorization of a real symmetric positive definite matrix A. The factorization has the form A = U' * U , if UPLO = 'U', or A = L * L', if UPLO = 'L', where U is an upper triangular matrix and L is lower triangular. This is the unblocked version of the algorithm, calling Level 2 BLAS.
SPOTRF computes the Cholesky factorization of a real symmetric positive definite matrix A. The factorization has the form A = U**T * U, if UPLO = 'U', or A = L * L**T, if UPLO = 'L', where U is an upper triangular matrix and L is lower triangular. This is the block version of the algorithm, calling Level 3 BLAS.
SPOTRI computes the inverse of a real symmetric positive definite matrix A using the Cholesky factorization A = U**T*U or A = L*L**T computed by SPOTRF.
SPOTRS solves a system of linear equations A*X = B with a symmetric positive definite matrix A using the Cholesky factorization A = U**T*U or A = L*L**T computed by SPOTRF.
On Entry AP REAL (N*(N+1)/2) the packed form of a symmetric matrix A . The columns of the upper triangle are stored sequentially in a one-dimensional array of length N*(N+1)/2 . See comments below for details. N INTEGER the order of the matrix A . On Return AP an upper triangular matrix R , stored in packed form, so that A = TRANS(R)*R . If INFO .NE. 0 , the factorization is not complete. RCOND REAL an estimate of the reciprocal condition of A . For the system A*X = B , relative perturbations in...
SPPCON estimates the reciprocal of the condition number (in the 1-norm) of a real symmetric positive definite packed matrix using the Cholesky factorization A = U**T*U or A = L*L**T computed by SPPTRF. An estimate is obtained for norm(inv(A)), and the reciprocal of the condition number is computed as RCOND = 1 / (ANORM * norm(inv(A))).
On Entry AP REAL (N*(N+1)/2) the output from SPPCO or SPPFA. N INTEGER the order of the matrix A . JOB INTEGER = 11 both determinant and inverse. = 01 inverse only. = 10 determinant only. On Return AP the upper triangular half of the inverse . The strict lower triangle is unaltered. DET REAL(2) determinant of original matrix if requested. Otherwise not referenced. Determinant = DET(1) * 10.0**DET(2) with 1.0 .LE. DET(1) .LT. 10.0 or DET(1) .EQ. 0.0 . Error Condition A division by zero will occur...
SPPEQU computes row and column scalings intended to equilibrate a symmetric positive definite matrix A in packed storage and reduce its condition number (with respect to the two-norm). S contains the scale factors, S(i)=1/sqrt(A(i,i)), chosen so that the scaled matrix B with elements B(i,j)=S(i)*A(i,j)*S(j) has ones on the diagonal. This choice of S puts the condition number of B within a factor N of the smallest possible condition number over all possible diagonal scalings....
On Entry AP REAL (N*(N+1)/2) the packed form of a symmetric matrix A . The columns of the upper triangle are stored sequentially in a one-dimensional array of length N*(N+1)/2 . See comments below for details. N INTEGER the order of the matrix A . On Return AP an upper triangular matrix R , stored in packed form, so that A = TRANS(R)*R . INFO INTEGER = 0 for normal return. = K if the leading minor of order K is not positive definite. Packed Storage The following program segment will pack the upp...
SPPRFS improves the computed solution to a system of linear equations when the coefficient matrix is symmetric positive definite and packed, and provides error bounds and backward error estimates for the solution.
On Entry AP REAL (N*(N+1)/2) the output from SPPCO or SPPFA. N INTEGER the order of the matrix A . B REAL(N) the right hand side vector. On Return B the solution vector X . Error Condition A division by zero will occur if the input factor contains a zero on the diagonal. Technically, this indicates singularity, but it is usually caused by improper subroutine arguments. It will not occur if the subroutines are called correctly and INFO .EQ. 0 . To compute INVERSE(A) * C where C is a matrix with P...
SPPSV computes the solution to a real system of linear equations A * X = B, where A is an N-by-N symmetric positive definite matrix stored in packed format and X and B are N-by-NRHS matrices. The Cholesky decomposition is used to factor A as A = U**T* U, if UPLO = 'U', or A = L * L**T, if UPLO = 'L', where U is an upper triangular matrix and L is a lower triangular matrix. The factored form of A is then used to solve the system of equations A * X = B....
SPPSVX uses the Cholesky factorization A = U**T*U or A = L*L**T to compute the solution to a real system of linear equations A * X = B, where A is an N-by-N symmetric positive definite matrix stored in packed format and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
SPPTRF computes the Cholesky factorization of a real symmetric positive definite matrix A stored in packed format. The factorization has the form A = U**T * U, if UPLO = 'U', or A = L * L**T, if UPLO = 'L', where U is an upper triangular matrix and L is lower triangular.
SPPTRI computes the inverse of a real symmetric positive definite matrix A using the Cholesky factorization A = U**T*U or A = L*L**T computed by SPPTRF.
SPPTRS solves a system of linear equations A*X = B with a symmetric positive definite matrix A in packed storage using the Cholesky factorization A = U**T*U or A = L*L**T computed by SPPTRF.
dspr and sspr perform the symmetric rank 1 operation A := alpha*x*x' + A, zhpr and chpr perform the hermitian rank 1 operation A := alpha*x*conjg( x' ) + A, where alpha is a real/complex scalar, x is an n element vector and A is an n by n symmetric/hermitian matrix, supplied in packed form.
dspr2 and sspr2 perform the symmetric rank 2 operation A := alpha*x*y' + alpha*y*x' + A, zhpr2 and chpr2 perform the hermitian rank 2 operation A := alpha*x*conjg( y' ) + conjg( alpha )*y*conjg( x' ) + A, where alpha is a real/complex scalar, x is an n element vector and A is an n by n symmetric/hermitian matrix, supplied in packed form.
The spray protocol sends packets to a given machine to test the speed and reliability of communications with that machine. The spray protocol is not a C function interface, per se, but can be accessed using the generic remote procedure calling interface clnt_call() [see rpc_clnt_calls(3N)]. The protocol sends a packet to the called host. The host acknowledges receipt of the packet. The protocol counts the number of acknowledgments and c...
sprod1du and dprod1du compute the product of the Fourier transforms of a real sequence of N samples with the Fourier transforms of a real filter. Note, the product of the Fourier transforms of two sequences is equal to the Fourier transform of their convolution.
sprod2du and dprod2du compute the product of the Fourier transforms of 2D real sequence (size N1xN2) with the Fourier transform of 2D real filter. Note, the product of the Fourier transforms of two sequences is equal to the Fourier transform of their convolution.
sprod3du and dprod3du compute the product of the Fourier transforms of 3D real sequence (size N1xN2xN3) with the Fourier transform of 3D real filter. Note, the product of the Fourier transforms of two sequences is equal to the Fourier transform of their convolution.
sprodm1du and dprodm1du compute the product of the Fourier transforms of P real sequences of N samples with the Fourier transforms of P real filters. Note, the product of the Fourier transforms of two sequences is equal to the Fourier transform of their convolution.
SPTCON computes the reciprocal of the condition number (in the 1-norm) of a real symmetric positive definite tridiagonal matrix using the factorization A = L*D*L**T or A = U**T*D*U computed by SPTTRF. Norm(inv(A)) is computed by a direct method, and the reciprocal of the condition number is computed as RCOND = 1 / (ANORM * norm(inv(A))).
SPTEQR computes all eigenvalues and, optionally, eigenvectors of a symmetric positive definite tridiagonal matrix by first factoring the matrix using SPTTRF, and then calling SBDSQR to compute the singular values of the bidiagonal factor. This routine computes the eigenvalues of the positive definite tridiagonal matrix to high relative accuracy. This means that if the eigenvalues range over many orders of magnitude in size, then the small eigenvalues and corresponding eigenvectors will be comput...
SPTRFS improves the computed solution to a system of linear equations when the coefficient matrix is symmetric positive definite and tridiagonal, and provides error bounds and backward error estimates for the solution.
On Entry N INTEGER is the order of the tridiagonal matrix. D REAL(N) is the diagonal of the tridiagonal matrix. On output, D is destroyed. E REAL(N) is the offdiagonal of the tridiagonal matrix. E(1) through E(N-1) should contain the offdiagonal. B REAL(N) is the right hand side vector. On Return B contains the solution. LINPACK. This version dated 08/14/78 . Jack Dongarra, Argonne National Laboratory. No externals Fortran MOD PPPPaaaaggggeeee 1111...
SPTSV computes the solution to a real system of linear equations A*X = B, where A is an N-by-N symmetric positive definite tridiagonal matrix, and X and B are N-by-NRHS matrices. A is factored as A = L*D*L**T, and the factored form of A is then used to solve the system of equations.
SPTSVX uses the factorization A = L*D*L**T to compute the solution to a real system of linear equations A*X = B, where A is an N-by-N symmetric positive definite tridiagonal matrix and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
SPTTRF computes the factorization of a real symmetric positive definite tridiagonal matrix A. If the subdiagonal elements of A are supplied in the array E, the factorization has the form A = L*D*L**T, where D is diagonal and L is unit lower bidiagonal; if the superdiagonal elements of A are supplied, it has the form A = U**T*D*U, where U is unit upper bidiagonal. (The two forms are equivalent if A is real.)...
SPTTRS solves a system of linear equations A * X = B with a symmetric positive definite tridiagonal matrix A using the factorization A = L*D*L**T or A = U**T*D*U computed by SPTTRF. (The two forms are equivalent if A is real.)
On Entry X REAL(LDX,P), where LDX .GE. N. X contains the matrix whose decomposition is to be computed. LDX INTEGER. LDX is the leading dimension of the array X. N INTEGER. N is the number of rows of the matrix X. P INTEGER. P is the number of columns of the matrix X. JPVT INTEGER(P). JPVT contains integers that control the selection of the pivot columns. The K-th column X(K) of X is placed in one of three classes according to the value of JPVT(K). If JPVT(K) .GT. 0, then X(K) is an initial colum...
On Entry X REAL(LDX,P) X contains the output of SQRDC. LDX INTEGER LDX is the leading dimension of the array X. N INTEGER N is the number of rows of the matrix XK. It must have the same value as N in SQRDC. K INTEGER K is the number of columns of the matrix XK. K must not be greater than MIN(N,P), where P is the same as in the calling sequence to SQRDC. QRAUX REAL(P) QRAUX contains the auxiliary output from SQRDC. Y REAL(N) Y contains an N-vector that is to be manipulated by SQRSL. JOB INTEGER J...
The single-precision and long double-precision routines listed above are only available in the standard math library, -lm, and in -lmx. The sqrt functions return the nonnegative square root of their single argument x. The function sqrt both accepts and returns values of type double. The functions fsqrt and sqrtf accept and return float values. The function sqrtl both accepts and returns values of type long double. A fast version of sqrt and fsqrt which are slightly less accurate are available in...
The single-precision and long double-precision routines listed above are only available in the standard math library, -lm, and in -lmx. The sqrt functions return the nonnegative square root of their single argument x. The function sqrt both accepts and returns values of type double. The functions fsqrt and sqrtf accept and return float values. The function sqrtl both accepts and returns values of type long double. A fast version of sqrt and fsqrt which are slightly less accurate are available in...
The single-precision and long double-precision routines listed above are only available in the standard math library, -lm, and in -lmx. The sqrt functions return the nonnegative square root of their single argument x. The function sqrt both accepts and returns values of type double. The functions fsqrt and sqrtf accept and return float values. The function sqrtl both accepts and returns values of type long double. A fast version of sqrt and fsqrt which are slightly less accurate are available in...
SRSCL multiplies an n-element real vector x by the real scalar 1/a. This is done without overflow or underflow as long as the final result x/a does not overflow or underflow.
The SpeedShop Performance Tools work by invoking functions in the SpeedShop runtime library. This library may be explicitly linked with a user program, in which case the following named routines above may be invoked explicitly. To explicitly link with the SpeedShop runtime, add the option -lss to the link line used to build the program. Doing so will load the two SpeedShop libraries, libss.so and libssrt.so into the executable. ssrt_caliper_point is used to record a caliper point in the experime...
The SpeedShop Performance Tools work by invoking functions in the SpeedShop runtime library. This library may be explicitly linked with a user program, in which case the following named routines above may be invoked explicitly. To explicitly link with the SpeedShop runtime, add the option -lss to the link line used to build the program. Doing so will load the two SpeedShop libraries, libss.so and libssrt.so into the executable. ssrt_caliper_point is used to record a caliper point in the experime...
SSBEVD computes all the eigenvalues and, optionally, eigenvectors of a real symmetric band matrix A. If eigenvectors are desired, it uses a divide and conquer algorithm. The divide and conquer algorithm makes very mild assumptions about floating point arithmetic. It will work on machines with a guard digit in add/subtract, or on those binary machines without guard digits which subtract like the Cray X-MP, Cray Y-MP, Cray C-90, or Cray-2. It could conceivably fail on hexadecimal or decimal machin...
SSBEVX computes selected eigenvalues and, optionally, eigenvectors of a real symmetric band matrix A. Eigenvalues and eigenvectors can be selected by specifying either a range of values or a range of indices for the desired eigenvalues.
SSBGST reduces a real symmetric-definite banded generalized eigenproblem A*x = lambda*B*x to standard form C*y = lambda*y, such that C has the same bandwidth as A. B must have been previously factorized as S**T*S by SPBSTF, using a split Cholesky factorization. A is overwritten by C = X**T*A*X, where X = S**(-1)*Q and Q is an orthogonal matrix chosen to preserve the bandwidth of A.
SSBGV computes all the eigenvalues, and optionally, the eigenvectors of a real generalized symmetric-definite banded eigenproblem, of the form A*x=(lambda)*B*x. Here A and B are assumed to be symmetric and banded, and B is also positive definite.
A strstreambuf is a streambuf that uses an array of bytes (a string) to hold the sequence of characters. Given the convention that a char* should be interpreted as pointing just before the char it really points at, the mapping between the abstract get/put pointers (see sbuf.pub(3C++)) and char* pointers is direct. Moving the pointers corresponds exactly to incrementing...
sscal1d and dscal1d scale a 1D real sequence of N samples. The Fourier Transforms are not normalized so the succession DirectInverse transform scales the input data by a factor equal to the size of the transform. sscal1d or dscal1d may be used to scale back the result.
sscal2d and dscal2d scale the 2D real sequence of N1xN2 sample. The Fourier Transforms are not normalized so the succession DirectInverse transform scales the input data by a factor equal to the size of the transform. So sscal2d or dscal2d may be used to scale back the result.
sscal3d and dscal3d scale the 3D real sequence of N1xN2xN3 samples. The Fourier Transforms are not normalized so the succession DirectInverse transform scales the input data by a factor equal to the size of the transform. So sscal3d or dscal3d may be used to scale back the result.
sscalm1d and dscalm1d scale the P real sequences of N samples each. The Fourier Transforms are not normalized so the succession DirectInverse transform scales the input data by a factor equal to the size of the transform. Often sscalm1d or dscalm1d are used to scale back the result.
The ssdi_get_config_and_load function provides the means for an application to load the dynamic shared object (DSO) corresponding to a source for a given system database. A database is a collection of information related to users, groups, networks, etc. that the operating system expects to be maintained by user-level libraries. For example, information relating to users is encapsulated by the passw...
On Entry A REAL(LDA, N) the symmetric matrix to be factored. Only the diagonal and upper triangle are used. LDA INTEGER the leading dimension of the array A . N INTEGER the order of the matrix A . Output A a block diagonal matrix and the multipliers which were used to obtain it. The factorization can be written A = U*D*TRANS(U) where U is a product of permutation and unit upper triangular matrices , TRANS(U) is the transpose of U , and D is block diagonal with 1 by 1 and 2 by 2 blocks. KPVT INTE...
On Entry A REAL(LDA,N) the output from SSIFA. LDA INTEGER the leading dimension of the array A. N INTEGER the order of the matrix A. KPVT INTEGER(N) the pivot vector from SSIFA. WORK REAL(N) work vector. Contents destroyed. JOB INTEGER JOB has the decimal expansion ABC where If C .NE. 0, the inverse is computed, If B .NE. 0, the determinant is computed, If A .NE. 0, the inertia is computed. For example, JOB = 111 gives all three. On Return Variables not requested by JOB are not used. A contains ...
On Entry A REAL(LDA,N) the symmetric matrix to be factored. Only the diagonal and upper triangle are used. LDA INTEGER the leading dimension of the array A . N INTEGER the order of the matrix A . On Return A a block diagonal matrix and the multipliers which were used to obtain it. The factorization can be written A = U*D*TRANS(U) where U is a product of permutation and unit upper triangular matrices , TRANS(U) is the transpose of U , and D is block diagonal with 1 by 1 and 2 by 2 blocks. KPVT IN...
ssignal and gsignal implement a software facility similar to signal(2). This facility is used by the Standard C Library to enable users to indicate the disposition of error conditions, and is also made available to users for their own purposes. Software signals made available to users are associated with integers in the inclusive range 1 through 16. A call to ssignal associates a procedure, action, with the software signal sig; the software signal, sig, is raised by a call to gsignal. Raising a ...
On Entry A REAL(LDA,N) the output from SSIFA. LDA INTEGER the leading dimension of the array A . N INTEGER the order of the matrix A . KPVT INTEGER(N) the pivot vector from SSIFA. B REAL(N) the right hand side vector. On Return B the solution vector X . Error Condition A division by zero may occur if SSICO has set RCOND .EQ. 0.0 or SSIFA has set INFO .NE. 0 . To compute INVERSE(A) * C where C is a matrix with P columns CALL SSIFA(A,LDA,N,KPVT,INFO) IF (INFO .NE. 0) GO TO ... DO 10 J = 1, P CALL ...
On Entry AP REAL (N*(N+1)/2) the packed form of a symmetric matrix A . The columns of the upper triangle are stored sequentially in a one-dimensional array of length N*(N+1)/2 . See comments below for details. N INTEGER the order of the matrix A . Output AP a block diagonal matrix and the multipliers which were used to obtain it stored in packed form. The factorization can be written A = U*D*TRANS(U) where U is a product of permutation and unit upper triangular matrices , TRANS(U) is the transpo...
SSPCON estimates the reciprocal of the condition number (in the 1-norm) of a real symmetric packed matrix A using the factorization A = U*D*U**T or A = L*D*L**T computed by SSPTRF. An estimate is obtained for norm(inv(A)), and the reciprocal of the condition number is computed as RCOND = 1 / (ANORM * norm(inv(A))).
On Entry AP REAL (N*(N+1)/2) the output from SSPFA. N INTEGER the order of the matrix A. KPVT INTEGER(N) the pivot vector from SSPFA. WORK REAL(N) work vector. Contents ignored. JOB INTEGER JOB has the decimal expansion ABC where If C .NE. 0, the inverse is computed, If B .NE. 0, the determinant is computed, If A .NE. 0, the inertia is computed. For example, JOB = 111 gives all three. On Return Variables not requested by JOB are not used. AP contains the upper triangle of the inverse of the orig...
SSPEVD computes all the eigenvalues and, optionally, eigenvectors of a real symmetric matrix A in packed storage. If eigenvectors are desired, it uses a divide and conquer algorithm. The divide and conquer algorithm makes very mild assumptions about floating point arithmetic. It will work on machines with a guard digit in add/subtract, or on those binary machines without guard digits which subtract like the Cray X-MP, Cray Y-MP, Cray C-90, or Cray-2. It could conceivably fail on hexadecimal or d...
SSPEVX computes selected eigenvalues and, optionally, eigenvectors of a real symmetric matrix A in packed storage. Eigenvalues/vectors can be selected by specifying either a range of values or a range of indices for the desired eigenvalues.
On Entry AP REAL (N*(N+1)/2) the packed form of a symmetric matrix A . The columns of the upper triangle are stored sequentially in a one-dimensional array of length N*(N+1)/2 . See comments below for details. N INTEGER the order of the matrix A . Output AP a block diagonal matrix and the multipliers which were used to obtain it stored in packed form. The factorization can be written A = U*D*TRANS(U) where U is a product of permutation and unit upper triangular matrices , TRANS(U) is the transpo...
SSPGST reduces a real symmetric-definite generalized eigenproblem to standard form, using packed storage. If ITYPE = 1, the problem is A*x = lambda*B*x, and A is overwritten by inv(U**T)*A*inv(U) or inv(L)*A*inv(L**T) If ITYPE = 2 or 3, the problem is A*B*x = lambda*x or B*A*x = lambda*x, and A is overwritten by U*A*U**T or L**T*A*L. B must have been previously factorized as U**T*U or L*L**T by SPPTRF....
SSPGV computes all the eigenvalues and, optionally, the eigenvectors of a real generalized symmetric-definite eigenproblem, of the form A*x=(lambda)*B*x, A*Bx=(lambda)*x, or B*A*x=(lambda)*x. Here A and B are assumed to be symmetric, stored in packed format, and B is also positive definite.
SSPRFS improves the computed solution to a system of linear equations when the coefficient matrix is symmetric indefinite and packed, and provides error bounds and backward error estimates for the solution.
On Entry AP REAL(N*(N+1)/2) the output from SSPFA. N INTEGER the order of the matrix A . KPVT INTEGER(N) the pivot vector from SSPFA. B REAL(N) the right hand side vector. On Return B the solution vector X . Error Condition A division by zero may occur if SSPCO has set RCOND .EQ. 0.0 or SSPFA has set INFO .NE. 0 . To compute INVERSE(A) * C where C is a matrix with P columns CALL SSPFA(AP,N,KPVT,INFO) IF (INFO .NE. 0) GO TO ... DO 10 J = 1, P CALL SSPSL(AP,N,KPVT,C(1,J)) 10 CONTINUE LINPACK. This...
SSPSV computes the solution to a real system of linear equations A * X = B, where A is an N-by-N symmetric matrix stored in packed format and X and B are N-by-NRHS matrices. The diagonal pivoting method is used to factor A as A = U * D * U**T, if UPLO = 'U', or A = L * D * L**T, if UPLO = 'L', where U (or L) is a product of permutation and unit upper (lower) triangular matrices, D is symmetric and block diagonal with 1-by-1 and 2-by-2 diagonal blocks. The factored form of A is then used to s...
SSPSVX uses the diagonal pivoting factorization A = U*D*U**T or A = L*D*L**T to compute the solution to a real system of linear equations A * X = B, where A is an N-by-N symmetric matrix stored in packed format and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
SSPTRD reduces a real symmetric matrix A stored in packed form to symmetric tridiagonal form T by an orthogonal similarity transformation: Q**T * A * Q = T.
SSPTRF computes the factorization of a real symmetric matrix A stored in packed format using the Bunch-Kaufman diagonal pivoting method: A = U*D*U**T or A = L*D*L**T where U (or L) is a product of permutation and unit upper (lower) triangular matrices, and D is symmetric and block diagonal with 1-by-1 and 2-by-2 diagonal blocks.
SSPTRI computes the inverse of a real symmetric indefinite matrix A in packed storage using the factorization A = U*D*U**T or A = L*D*L**T computed by SSPTRF.
SSPTRS solves a system of linear equations A*X = B with a real symmetric matrix A stored in packed format using the factorization A = U*D*U**T or A = L*D*L**T computed by SSPTRF.
SSTEBZ computes the eigenvalues of a symmetric tridiagonal matrix T. The user may ask for all eigenvalues, all eigenvalues in the half-open interval (VL, VU], or the IL-th through IU-th eigenvalues. To avoid overflow, the matrix must be scaled so that its largest element is no greater than overflow**(1/2) * underflow**(1/4) in absolute value, and for greatest accuracy, it should not be much smaller than that. See W. Kahan "Accurate Eigenvalues of a Symmetric Tridiagonal Matrix", Report CS41, C...
SSTEDC computes all eigenvalues and, optionally, eigenvectors of a symmetric tridiagonal matrix using the divide and conquer method. The eigenvectors of a full or band real symmetric matrix can also be found if SSYTRD or SSPTRD or SSBTRD has been used to reduce this matrix to tridiagonal form. This code makes very mild assumptions about floating point arithmetic. It will work on machines with a guard digit in add/subtract, or on those binary machines without guard digits which subtract like the ...
SSTEIN computes the eigenvectors of a real symmetric tridiagonal matrix T corresponding to specified eigenvalues, using inverse iteration. The maximum number of iterations allowed for each eigenvector is specified by an internal parameter MAXITS (currently set to 5).
SSTEQR computes all eigenvalues and, optionally, eigenvectors of a symmetric tridiagonal matrix using the implicit QL or QR method. The eigenvectors of a full or band symmetric matrix can also be found if SSYTRD or SSPTRD or SSBTRD has been used to reduce this matrix to tridiagonal form.
SSTEVD computes all eigenvalues and, optionally, eigenvectors of a real symmetric tridiagonal matrix. If eigenvectors are desired, it uses a divide and conquer algorithm. The divide and conquer algorithm makes very mild assumptions about floating point arithmetic. It will work on machines with a guard digit in add/subtract, or on those binary machines without guard digits which subtract like the Cray X-MP, Cray Y-MP, Cray C-90, or Cray-2. It could conceivably fail on hexadecimal or decimal machi...
SSTEVX computes selected eigenvalues and, optionally, eigenvectors of a real symmetric tridiagonal matrix A. Eigenvalues and eigenvectors can be selected by specifying either a range of values or a range of indices for the desired eigenvalues.
On Entry X REAL(LDX,P), where LDX .GE. N. X contains the matrix whose singular value decomposition is to be computed. X is destroyed by SSVDC. LDX INTEGER LDX is the leading dimension of the array X. N INTEGER N is the number of columns of the matrix X. P INTEGER P is the number of rows of the matrix X. LDU INTEGER LDU is the leading dimension of the array U. (See below). LDV INTEGER LDV is the leading dimension of the array V. (See below). WORK REAL(N) work is a scratch array. JOB INTEGER JOB c...
SSYCON estimates the reciprocal of the condition number (in the 1-norm) of a real symmetric matrix A using the factorization A = U*D*U**T or A = L*D*L**T computed by SSYTRF. An estimate is obtained for norm(inv(A)), and the reciprocal of the condition number is computed as RCOND = 1 / (ANORM * norm(inv(A))).
SSYEVD computes all eigenvalues and, optionally, eigenvectors of a real symmetric matrix A. If eigenvectors are desired, it uses a divide and conquer algorithm. The divide and conquer algorithm makes very mild assumptions about floating point arithmetic. It will work on machines with a guard digit in add/subtract, or on those binary machines without guard digits which subtract like the Cray X-MP, Cray Y-MP, Cray C-90, or Cray-2. It could conceivably fail on hexadecimal or decimal machines withou...
SSYEVX computes selected eigenvalues and, optionally, eigenvectors of a real symmetric matrix A. Eigenvalues and eigenvectors can be selected by specifying either a range of values or a range of indices for the desired eigenvalues.
SSYGS2 reduces a real symmetric-definite generalized eigenproblem to standard form. If ITYPE = 1, the problem is A*x = lambda*B*x, and A is overwritten by inv(U')*A*inv(U) or inv(L)*A*inv(L') If ITYPE = 2 or 3, the problem is A*B*x = lambda*x or B*A*x = lambda*x, and A is overwritten by U*A*U` or L'*A*L. B must have been previously factorized as U'*U or L*L' by SPOTRF.
SSYGST reduces a real symmetric-definite generalized eigenproblem to standard form. If ITYPE = 1, the problem is A*x = lambda*B*x, and A is overwritten by inv(U**T)*A*inv(U) or inv(L)*A*inv(L**T) If ITYPE = 2 or 3, the problem is A*B*x = lambda*x or B*A*x = lambda*x, and A is overwritten by U*A*U**T or L**T*A*L. B must have been previously factorized as U**T*U or L*L**T by SPOTRF.
SSYGV computes all the eigenvalues, and optionally, the eigenvectors of a real generalized symmetric-definite eigenproblem, of the form A*x=(lambda)*B*x, A*Bx=(lambda)*x, or B*A*x=(lambda)*x. Here A and B are assumed to be symmetric and B is also positive definite.
SSYRFS improves the computed solution to a system of linear equations when the coefficient matrix is symmetric indefinite, and provides error bounds and backward error estimates for the solution.
SSYSV computes the solution to a real system of linear equations A * X = B, where A is an N-by-N symmetric matrix and X and B are Nby-NRHS matrices. The diagonal pivoting method is used to factor A as A = U * D * U**T, if UPLO = 'U', or A = L * D * L**T, if UPLO = 'L', where U (or L) is a product of permutation and unit upper (lower) triangular matrices, and D is symmetric and block diagonal with 1-by-1 and 2-by-2 diagonal blocks. The factored form of A is then used to solve the system of eq...
SSYSVX uses the diagonal pivoting factorization to compute the solution to a real system of linear equations A * X = B, where A is an N-by-N symmetric matrix and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
SSYTF2 computes the factorization of a real symmetric matrix A using the Bunch-Kaufman diagonal pivoting method: A = U*D*U' or A = L*D*L' where U (or L) is a product of permutation and unit upper (lower) triangular matrices, U' is the transpose of U, and D is symmetric and block diagonal with 1-by-1 and 2-by-2 diagonal blocks. This is the unblocked version of the algorithm, calling Level 2 BLAS....
SSYTRF computes the factorization of a real symmetric matrix A using the Bunch-Kaufman diagonal pivoting method. The form of the factorization is A = U*D*U**T or A = L*D*L**T where U (or L) is a product of permutation and unit upper (lower) triangular matrices, and D is symmetric and block diagonal with 1-by-1 and 2-by-2 diagonal blocks. This is the blocked version of the algorithm, calling Level 3 BLAS....
SSYTRS solves a system of linear equations A*X = B with a real symmetric matrix A using the factorization A = U*D*U**T or A = L*D*L**T computed by SSYTRF.
Auxiliary entries are unions with a fixed length of four bytes per entry. Much information is packed within the auxiliaries. Rather than have the compiler front-ends handle each type of auxiliary entry directly, the following set of routines provide a high-level scalar interface to the auxiliaries: st_auxbtadd Adds a type information record (TIR) to the auxiliaries. It sets the basic type (bt) to the argument and all other fields to zero. The index to this auxiliary entry is returned. st_auxbtsi...
STBCON estimates the reciprocal of the condition number of a triangular band matrix A, in either the 1-norm or the infinity-norm. The norm of A is computed and an estimate is obtained for norm(inv(A)), then the reciprocal of the condition number is computed as RCOND = 1 / ( norm(A) * norm(inv(A)) ).
STBRFS provides error bounds and backward error estimates for the solution to a system of linear equations with a triangular band coefficient matrix. The solution matrix X must be computed by STBTRS or some other means before entering this routine. STBRFS does not do iterative refinement because doing so cannot improve the backward error.
STBTRS solves a triangular system of the form where A is a triangular band matrix of order N, and B is an N-by NRHS matrix. A check is made to verify that A is nonsingular.
The stcu routines provide an interface to objects that occur once per object rather than once per file descriptor (for example, external symbols, strings, and dense numbers). The routines provide access to the current chdr (compile time hdr), which represents the symbol table in running processes with pointers to symbol table sections rather than indices and offsets used in the disk file representation. A new symbol table can be created with st_cuinit. This routine creates and initializes a CHDR...
The functions described in the entries of sub-class 3S of this manual constitute an efficient, user-level I/O buffering scheme. The in-line macros get handle characters quickly. The macros getchar and putchar, and the higher-level routines fgetc, fgets, fprintf, fputc, fputs, fread, fscanf, fwrite, gets, getw, printf, puts, putw, and scanf all use or act as if they use getc and putc; they can be freely intermixed. A file with associated buffering is called a stream and is declared to be a pointe...
Operations on a stdiobuf are reflected on the associated FILE. A stdiobuf is constructed in unbuffered mode, which causes all operations to be reflected immediately in the FILE. seekg()s and seekp()s are translated into fseek()s. setbuf() has its usual meaning; if it supplies a reserve area, buffering will be turned back on....
All interprocess communication facilities require the user to supply a key to be used by the msgget(2), semget(2), and shmget(2) system calls to obtain interprocess communication identifiers. One suggested method for forming a key is to use the ftok subroutine described below. Another way to compose keys is to include the project ID in the most significant byte and to use the remaining portion as a sequence number. There are many ...
enable expects either TRUE or FALSE, enabling or disabling stencil operation. When stencil operation is disabled (the default), the values of the subsequent six parameters are ignored, ref expects a reference value used by the stencil compare function. func expects one of eight flags specifying the stencil comparison function. These flags are SF_NEVER, SF_LESS, SF_EQUAL, SF_LEQUAL, SF_GREATER, SF_NOTEQUAL, SF_GEQUAL, and SF_ALWAYS. mask expects a mask specifying which stencil bitplanes are signi...
xunit expects the amount of change per unit in the x direction. The amount is measured in pixels. yunit expects the amount of change per unit in the y direction. The amount is measured in pixels.
The stfd routines provide an interface to objects handled on a per file descriptor (or fd) level (for example, local symbols, auxiliaries, local strings, line numbers, optimization entries, procedure descriptor entries, and the file descriptors). These routines constitute a group because they deal with objects corresponding to fields in the FDR structure. Page 1 STFD(3X) STFD(3X) A fd can be activated by reading an existing one into memory or by creating a new one. The compilation unit routines ...
The stfe routines provide a high-level interface to the symbol table based on common needs of the compiler front-ends. st_filebegin Takes a file name and calls st_fdadd (see the stfd manual page). If it's a new file, a symbol is added to the symbol table for it and the user supplied routine, st_feinit, is called. This allows special once per file things to be initialized (for example, the C front-end adds basic type auxiliaries to each file's aux table so that all variables of that type can re...
STGEVC computes some or all of the right and/or left generalized eigenvectors of a pair of real upper triangular matrices (A,B). The right generalized eigenvector x and the left generalized eigenvector y of (A,B) corresponding to a generalized eigenvalue w are defined by: (A - wB) * x = 0 and y**H * (A - wB) = 0 where y**H denotes the conjugate tranpose of y. If an eigenvalue w is determined by zero diagonal elements of both A and B, a unit vector is returned as the corresponding eigenvector. If...
STGSJA computes the generalized singular value decomposition (GSVD) of two real upper triangular (or trapezoidal) matrices A and B. On entry, it is assumed that matrices A and B have the following forms, which may be obtained by the preprocessing subroutine SGGSVP from a general M-by-N matrix A and P-by-N matrix B: N-K-L K L A = K ( 0 A12 A13 ) if M-K-L >= 0; L ( 0 0 A23 ) M-K-L ( 0 0 0 ) N-K-L K L A = K ( 0 A12 A13 ) if M-K-L < 0; M-K ( 0 0 A23 ) N-K-L K L B = L ( 0 0 B13 ) P-L ( 0 0 0 ) where ...
The CHDRR structure (see and the stcu manual page) represents a symbol table in memory. A new CHDRR can be created by reading a symbol table in from disk. St_readbinary and st_readst read a symbol table in from disk. St_readbinary takes the file name of the symbol table and assumes the symbol table header (HDRR in ) occurs at the beginning of the file. St_readst assumes that its file number references a file positioned at the beginning of the symbol table header and t...
STPCON estimates the reciprocal of the condition number of a packed triangular matrix A, in either the 1-norm or the infinity-norm. The norm of A is computed and an estimate is obtained for norm(inv(A)), then the reciprocal of the condition number is computed as RCOND = 1 / ( norm(A) * norm(inv(A)) ).
STPRFS provides error bounds and backward error estimates for the solution to a system of linear equations with a triangular packed coefficient matrix. The solution matrix X must be computed by STPTRS or some other means before entering this routine. STPRFS does not do iterative refinement because doing so cannot improve the backward error.
The stprint routines and arrays provide an easy way to print the MIPS symbol table. (using st_current pchdr().) The arrays map constants to their ASCII equivalents. The constants can be found in symconst.h and represent languages (lang), symbol types (st), storage classes (sc), basic types (bt), and type qualifiers (tq). The st_dump routine prints an ASCII version of the symbol. If fd is NULL, the routine prints file fd and stdout. The flags can be a mask of a section of symbol table specified b...
STPTRS solves a triangular system of the form where A is a triangular matrix of order N stored in packed format, and B is an N-by-NRHS matrix. A check is made to verify that A is nonsingular.
strfind returns the offset of the second string, as2, if it is a substring of string as1. strrspn returns a pointer to the first character in the string to be trimmed (all characters from the first character to the end of string are in tc). strtrns transforms str and copies it into result. Any character that appears in old is replaced with the character in the same position in new. The new result is returned....
strccpy copies the input string, up to a null byte, to the output string, compressing the C-language escape sequences (for example, \n, \001) to the equivalent character. A null byte is appended to the output. The output argument must point to a space big enough to accommodate the result. If it is as big as the space pointed to by input it is guaranteed to be big enough. strccpy returns the output argument. strcad...
These functions return .TRUE. if the inequality holds and .FALSE. otherwise. They return the result type logical*2 if the $log2 compile option is in effect; otherwise, the result type is logical*4. Page 1 string(3C) string(3C)
On Entry T REAL(LDT,N) T contains the triangular matrix. The zero elements of the matrix are not referenced, and the corresponding elements of the array can be used to store other information. LDT INTEGER LDT is the leading dimension of the array T. N INTEGER N is the order of the system. JOB INTEGER = 0 T is lower triangular. = nonzero T is upper triangular. On Return RCOND REAL an estimate of the reciprocal condition of T . For the system T*X = B , relative perturbations in T and B of size EPS...
strcoll returns an integer greater than, equal to, or less than zero in direct correlation to whether string s1 is greater than, equal to, or less than the string s2. The comparison is based on strings interpreted as appropriate to the program's locale for category LC_COLLATE [see setlocale(3C)]. Both strcoll and strxfrm provide for locale-specific string sorting. str...
STRCON estimates the reciprocal of the condition number of a triangular matrix A, in either the 1-norm or the infinity-norm. The norm of A is computed and an estimate is obtained for norm(inv(A)), then the reciprocal of the condition number is computed as RCOND = 1 / ( norm(A) * norm(inv(A)) ).
On Entry T REAL(LDT,N) T contains the triangular matrix. The zero elements of the matrix are not referenced, and the corresponding elements of the array can be used to store other information. LDT INTEGER LDT is the leading dimension of the array T. N INTEGER N is the order of the system. JOB INTEGER = 010 no det, inverse of lower triangular. = 011 no det, inverse of upper triangular. = 100 det, no inverse. = 110 det, inverse of lower triangular. = 111 det, inverse of upper triangular. On Return...
strerror maps the error number in errnum to an error message string, and returns a pointer to that string. strerror uses the same set of error messages as perror. The returned string should not be overwritten.
STREVC computes some or all of the right and/or left eigenvectors of a real upper quasi-triangular matrix T. The right eigenvector x and the left eigenvector y of T corresponding to an eigenvalue w are defined by: T*x = w*x, y'*T = w*y' where y' denotes the conjugate transpose of the vector y. If all eigenvectors are requested, the routine may either return the matrices X and/or Y of right or left eigenvectors of T, or the products Q*X and/or Q*Y, where Q is an input orthogonal matrix. If T w...
STREXC reorders the real Schur factorization of a real matrix A = Q*T*Q**T, so that the diagonal block of T with row index IFST is moved to row ILST. The real Schur form T is reordered by an orthogonal similarity transformation Z**T*T*Z, and optionally the matrix Q of Schur vectors is updated by postmultiplying it with Z. T must be in Schur canonical form (as returned by SHSEQR), that is, block upper triangular with 1-by-1 and 2-by-2 diagonal blocks; each 2-by-2 diagonal block has its diagonal e...
strfmon places characters into the array pointed to by s as controlled by the string pointed to by format. No more than maxsize bytes are placed into the array. The format is a character string that contains two types of objects: plain characters, which are simply copied to the output stream, and conversion specifications, each of which results in the fetching of zero or more arguments which are converted and formatted. The results are undefined if there are insufficient arg...
strftime, ascftime, and cftime place characters into the array pointed to by s as controlled by the string pointed to by format. The format string consists of zero or more directives and ordinary characters. All ordinary characters (including the terminating null character) are copied unchanged into the array. For strftime, no more than maxsize characters are placed into the array. If format is (char *)0...
If no import list is supplied, all possible restrictions are assumed. (This is the safest mode to operate in, but is sometimes too strict for casual programming.) Currently, there are three possible things to be strict about: "subs", "vars", and "refs". strict refs This generates a runtime error if you use symbolic references (see the perlref manpage). use strict 'refs'; $ref = \$foo; print $$ref; # ok $ref = "foo"; print $$ref; # runtime error; normally ok strict vars This generates ...
Performs one of several string operations, depending on option. The legal options (which may be abbreviated) are: string compare string1 string2 Perform a character-by-character comparison of strings string1 and string2 in the same way as the C strcmp procedure. Return -1, 0, or 1, depending on whether string1 is lexicographically less than, equal to, or greater than string2. string first string1 string2 Search string2 for a sequence of characters that exactly match the characters in string1. If...
The arguments s, s1, and s2 point to strings (arrays of characters terminated by a null character). The functions strcat, strncat, strcpy, strncpy, strtok_r, and strtok, all alter s1. These functions do not check for overflow of the array pointed to by s1, or for overlap between s1 and s2. If overflow of s1 occurs, or copying takes place when s1 and s2 overlap, the behavior is und...
strptime converts the character string pointed to by buf to values which are stored in the tm structure pointed to by tm, using the format specified by format. The format string consists of zero or more directives and ordinary characters. Each directive is composed of one of the following: one or more white-space characters (as specified by isspace(); an ordinary character (neither % nor a white-space character); or a conversion specification. Each conversion specificatio...
STRRFS provides error bounds and backward error estimates for the solution to a system of linear equations with a triangular coefficient matrix. The solution matrix X must be computed by STRTRS or some other means before entering this routine. STRRFS does not do iterative refinement because doing so cannot improve the backward error.
STRSEN reorders the real Schur factorization of a real matrix A = Q*T*Q**T, so that a selected cluster of eigenvalues appears in the leading diagonal blocks of the upper quasi-triangular matrix T, and the leading columns of Q form an orthonormal basis of the corresponding right invariant subspace. Optionally the routine computes the reciprocal condition numbers of the cluster of eigenvalues and/or the invariant subspace. T must be in Schur canonical form (as returned by SHSEQR), that is, block u...
On Entry T REAL(LDT,N) T contains the matrix of the system. The zero elements of the matrix are not referenced, and the corresponding elements of the array can be used to store other information. LDT INTEGER LDT is the leading dimension of the array T. N INTEGER N is the order of the system. B REAL(N). B contains the right hand side of the system. JOB INTEGER JOB specifies what kind of system is to be solved. If JOB is 00 solve T*X=B, T lower triangular, 01 solve T*X=B, T upper triangular, 10 so...
STRSNA estimates reciprocal condition numbers for specified eigenvalues and/or right eigenvectors of a real upper quasi-triangular matrix T (or of any matrix Q*T*Q**T with Q orthogonal). T must be in Schur canonical form (as returned by SHSEQR), that is, block upper triangular with 1-by-1 and 2-by-2 diagonal blocks; each 2-by-2 diagonal block has its diagonal elements equal and its off-diagonal elements of opposite sign....
strstream specializes iostream for ``incore'' operations, that is, storing and fetching from arrays of bytes. The streambuf associated with a strstream is a strstreambuf (see ssbuf(3C++)). In the following descriptions assume: - ss is a strstream. - iss is an istrstream. - oss is an <...
STRSYL solves the real Sylvester matrix equation: op(A)*X + X*op(B) = scale*C or op(A)*X - X*op(B) = scale*C, where op(A) = A or A**T, and A and B are both upper quasi- triangular. A is M-by-M and B is N-by-N; the right hand side C and the solution X are M-by-N; and scale is an output scale factor, set <= 1 to avoid overflow in X. A and B must be in Schur canonical form (as returned by SHSEQR), that is, block upper triangular with 1-by-1 and 2-by-2 diagonal blocks; each 2- by-2 diagonal block ha...
(Note that the long double routines are only valid for the MIPSpro compilers.) strtod returns as a double-precision floating-point number the value represented by the character string pointed to by nptr. Similarly, strtold returns as a long double-precision floating-point number the value represented by the character string pointed to by nptr. Each function scans the string up to the first unrecognized character. strtod and str...
strtol returns as a long integer the value represented by the character string pointed to by str. The string is scanned up to the first character inconsistent with the base. Leading ``white-space'' characters [as defined by isspace in ctype(3C)] are ignored. If the value of ptr is not (char **)NULL, a pointer to the character terminating the scan is returned in the location pointed to by ptr. If ...
STRTRS solves a triangular system of the form where A is a triangular matrix of order N, and B is an N-by-NRHS matrix. A check is made to verify that A is nonsingular.
type expects the type of this string. See the man page for charstr for a description of the type argument. str expects the pointer to the string to be measured.
strxfrm transforms the string s2 and places the resulting string into the array s1. The transformation is such that if strcmp is applied to two transformed strings, it returns a value greater than, equal to, or less than zero, corresponding to the result of the strcoll function applied to the same two original strings. The transformation is based on the program's locale for category LC_COLLATE [see se
STZRQF reduces the M-by-N ( M<=N ) real upper trapezoidal matrix A to upper triangular form by means of orthogonal transformations. The upper trapezoidal matrix A is factored as A = ( R 0 ) * Z, where Z is an N-by-N orthogonal matrix and R is an M-by-M upper triangular matrix.
This will predeclare all the subroutine whose names are in the list, allowing you to use them without parentheses even before they're declared. Unlike pragmas that affect the $^H hints variable, the use vars and use subs declarations are not BLOCK-scoped. They are thus effective for the entire file in which they appear. You may not rescind such declarations with no vars or no subs. See the section on Pragmatic Modules in the perlmod manpage and the section on strict subs in the strict manpage. ...
This command performs variable substitutions, command substitutions, and backslash substitutions on its string argument and returns the fullysubstituted result. The substitutions are performed in exactly the same way as for Tcl commands. As a result, the string argument is actually substituted twice, once by the Tcl parser in the usual fashion for Tcl commands, and again by the subst command. If any of the -nobackslashes, -nocommands, or -novariables are specified, then the corresponding substit...
target is the texture target to which the texture we are loading is bound. Currently this must be TX_TEXTURE_0. id is the id of the texture we are loading. s0 is the starting S coordinate of the subtexture to load. s1 is the ending S coordinate of the subtexture to load. t0 is the starting T coordinate of the subtexture to load. t1 is the ending T coordinate of the subtexture to load. nt is number of words in the subtexture array. texture is the long word aligned array of texels to load. flags i...
On Input NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. Note that NM must be at least as large as the maximum of M and N. M is the number of rows of A (and U). N is the number of columns of A (and U) and the order of V. A contains the rectangular input matrix to be decomposed. MATU should be set to .TRUE. if the U matrix in the decomposition is desired, and to .FALSE. otherwise. MATV should be set to .TRUE. if the V...
swab copies nbytes bytes pointed to by from to the array pointed to by to, exchanging adjacent even and odd bytes. Nbytes should be even and non-negative. If nbytes is odd and positive swab uses nbytes-1 instead. If nbytes is negative, swab does nothing. PPPPaaaaggggeeee 1111
dswap, sswap, zswap and cswap interchange n values of vector x and vector y. incx and incy specify the increment between two consecutive elements of respectively vector x and y.
parent expects the GID (graphics window identifier) of the window (or subwindow) in which you want to open a subwindow. The GID is the returned function value of a previous call to either swinopen or winopen. FUNCTION RETURN VALUE The returned value of this function is either a -1 or the graphics window identifier for the subwindow just created. Use this value to identify this subwindow to other graphics routines. A returned function value of -1 indicates that the system cannot create any more g...
The switch command matches its string argument against each of the pattern arguments in order. As soon as it finds a pattern that matches string it evaluates the following body argument by passing it recursively to the Tcl interpreter and returns the result of that evaluation. If the last pattern argument is default then it matches anything. If no pattern argument matches string and no default is given, then the switch command returns an empty string. If the initial arguments to switch start wit...
mask expects a mask whose least-significant bits are used to control writing of the stencil bitplanes. Bitplanes corresponding to 1's in the mask can be written, those corresponding to 0's are readonly.
sybconnect login-name password ?server? ?appname? Connect to a Sybase server using login-name and password. If server is specified, then an attempt will be made to login to the named Sybase server. If server is not specified, then the environment variable DSQUERY is used to determine a server; if DSQUERY is not set, sybconnect will try to connect to the Sybase server named SYBASE. If an appname is specified, then that value is passed to the server to display during a process list. A handle is re...
Symbol::gensym creates an anonymous glob and returns a reference to it. Such a glob reference can be used as a file or directory handle. For backward compatibility with older implementations that didn't support anonymous globs, Symbol::ungensym is also provided. But it doesn't do anything. Symbol::qualify turns unqualified symbol names into qualified variable names (e.g. "myvar" -> "MyPackage::myvar"). If it is given a second parameter, qualify uses it as the default package; otherwise, it...
dsymm, ssymm, zsymm and csymm perform one of the matrix-matrix operations C := alpha*A*B + beta*C, or C := alpha*B*A + beta*C, where alpha and beta are scalars, A is a symmetric matrix and B and C are m by n matrices.
dsymv , ssymv , dhemv and chemv perform the matrix-vector operation y := alpha*A*x + beta*y, where alpha and beta are scalars, x and y are n element vectors and A is an n by n symmetric/hermitian matrix.
The intrinsics described here provide a variety of primitive synchronization operations. Besides performing the particular synchronization operation, each of these intrinsics has two key properties: The function performed is guaranteed to be atomic (typically achieved by implementing the operation using a sequence of load-linked/storeconditional instructions in a loop). Associated with each instrinsic are certain memory barrier properties that restrict the movement of memory references to visibl...
The intrinsics described here provide a variety of primitive synchronization operations. Besides performing the particular synchronization operation, each of these intrinsics has two key properties: The function performed is guaranteed to be atomic (typically achieved by implementing the operation using a sequence of load-linked/storeconditional instructions in a loop). Associated with each instrinsic are certain memory barrier properties that restrict the movement of memory references to visibl...
dsyr and ssyr perform the symmetric rank 1 operation A := alpha*x*x' + A, zher and cher perform the hermitian rank 1 operation A := alpha*x*conjg( x' ) + A, where alpha is a real/complex scalar, x is an n element vector and A is an n by n symmetric/hermitian matrix.
dsyr2 and ssyr2 perform the symmetric rank 2 operation A := alpha*x*y' + alpha*y*x' + A, zher2 and cher2 perform the hermitian rank 2 operation A := alpha*x*conjg( y' ) + conjg( alpha )*y*conjg( x' ) + A, where alpha is a scalar, x and y are n element vectors and A is an n by n symmetric/hermitian matrix.
dsyr2k , ssyr2k , zsyr2k and csyr2k perform one of the matrix-matrix operations C := alpha*A*B' + alpha*B*A' + beta*C, or C := alpha*A'*B + alpha*B'*A + beta*C, where alpha and beta are scalars, C is an n by n symmetric matrix and A and B are n by k matrices in the first case and k by n matrices in the second case.
dsyrk , ssyrk , zsyrk and csyrk perform one of the matrix-matrix operations C := alpha*A*A' + beta*C, or C := alpha*A'*A + beta*C, where alpha and beta are scalars, C is an n by n symmetric matrix and A is an n by k matrix in the first case and a k by n matrix in the second case.
Attempts several methods of getting the system hostname and then caches the result. It tries syscall(SYS_gethostname), `hostname`, `uname -n`, and the file /com/host. If all that fails it croaks. All nulls, returns, and newlines are removed from the result.
Sys::Syslog is an interface to the UNIX syslog(3) program. Call syslog() with a string priority and a list of printf() args just like syslog(3). Syslog provides the functions: openlog $ident, $logopt, $facility $ident is prepended to every message. $logopt contains one or more of the words pid, ndelay, cons, nowait. $facility specifies the part of the system syslog $priority, $format, @args If $priority permits, logs ($format, @args) printed as by printf(3V), with the addition that %m is replace...
The sysconf function provides a method for an application to determine the current value of a configurable system limit or option (variable). By using this function, applications can be more portable across different operating systems. The name argument represents the system variable to be queried. Some of the limits have a minimal value defined by POSIX or XPG4 which may have a higher value under IRIX. Some limits are fixed in the system and some may be altered by the syste...
The sysctl function retrieves system information. The information available from sysctl consists of integers, strings, and tables, and is a small subset of that available from the function of the same name in 4.4BSD-Lite. Unless explicitly noted below, sysctl returns a consistent snapshot of the data requested. Consistency is obtained by locking the destination buffer into memory so that the data may be copied out without blocking. The state is described using a ``Management Information Base''...
sysid provides a pseudo-unique system identifier that is generated from the true unique system identifier. If id is non-NULL, an ASCII representation of the identifier is placed in the array pointed to by id. This function is provided for backward compatibility.
Syslog arranges to write message onto the system log maintained by syslogd(1M). The message is tagged with priority. The message looks like a printf(3S) string except that %m is replaced by the current error message (collected from errno). A trailing newline is added if needed. This message will be read by syslogd(1M) and written to the system console, log files, or forwarded to syslogd on another host as appropriate. Vsyslog is like syslog except that instead of being called with a variable num...
system causes its character argument to be given to sh(1) as input, as if the string had been typed at a terminal. The current process waits until the shell has completed.
system causes the string to be given to the shell [see sh(1)] as input, as if the string had been typed as a command at a terminal. The current process waits until the shell has completed, then returns the exit status of the shell in the format specified by waitpid(2). If string is a NULL pointer, system checks if /sbin/sh exists and is executable. If /sbin/sh is available, ...
vector is a 2, 3, or 4 element array depending on whether you call the t2, t3, or t4 version of the routine. The elements of the array are the s, t, r and q texture coordinates in this order. The default for r is 0. The default for q is 1.
t6attr_alloc allocates a control block and set all of the mask attributes defined by the TSIX(RE) 1.1 SAMP specification. Also note that t6attr_alloc(void) is equivalent to t6alloc_blk(T6M_ALL_ATTRS).
t6cmp_attrs compares a set of attributes specified by attr1 to the attributes in attr2. Also note that t6cmp_attrs(attr1, attr2) is equivalent to t6cmp_blk(attr1, attr2), and if the attributes T6_IL and T6_PROC_ATTR are used in comparing attribute blocks they will be ignored as they are not implemented.
t6cmp_blk compares the two sets of attributes in set1 and set2. Also note that if the attributes T6_IL and T6_PROC_ATTR are used in comparing attribute blocks they will be ignored as they are not implemented.
t6copy_attr copies a set of attributes specified by attr1 into the buffers controlled by attr2. (Both attr1 and attr2 should have already been allocated by t6alloc_blk). See man pages for t6alloc_blk (3N) for more details. Also note that t6copy_attr(src, dest) is equivalent to t6copy_blk(src, dest).
t6copy_blk copies a set of attributes specified by attr1 into the buffers controlled by attr2. (Both attr1 and attr2 should have already been allocated by t6create_attr or t6attr_alloc.) See the man page t6alloc_blk(3N) for more details.
t6create_attr creates a control block according to the attributes specified by mask. Also note that t6create_attr(mask) is equivalent to t6alloc_blk(mask).
t6dup_attr allocates a new t6attr_t control structure and buffer space large enough to hold the set of security attributes in the t6attr_t control structure src which is passed in as an argument. It then copies that set of attributes specified by src into the newly allocated structure. Upon successful completion, the newly created t6attr_t handle is returned. Also note that t6dup_attr(src) is equivalent to t6dup_blk(src)....
t6dup_blk allocates a new t6attr_t control structure and buffer space large enough to hold the set of security attributes in the t6attr_t control structure src which is passed in as an argument. It then copies that set of attributes specified by src into the newly allocated structure. Upon successful completion, the newly created t6attr_t handle is returned.
t6ext_attr turns on extended security operations on the trusted IPC mechanism. fd is the descriptor associated with the IPC mechanism, and cmd must be ON to turn on extended operations, or OFF to turn them off. When first created, the trusted IPC mechanism appears the same as an untrusted IPC mechanism. It can be used in the same way to send and receive data as long as communications do not violate the security policies of the system. Between systems that support mandatory access control, for ex...
t6get_attr() takes a control structure, t6ctl, and attribute type, attr_type, and returns a pointer to the requested attribute value (type) from the opaque control structure t6ctl. attr_type contains a number defined in that specifies what type of attribute that the caller is interested in getting. Only one type can be specified per call. Returned value by t6get_attr() should be type cast to the standard type that represents the type indicated by attr_type. t6set_attr() replaces ...
The security extensions on the communication endpoint include a set of default security attributes that may be applied to outgoing data and an attribute mask that designates which attributes are taken from the endpoint's default attributes and which are taken from the process's effective attributes. By default, data written to an endpoint has associated with it the security attributes of the process that wrote the data. However, a privileged process may change the value of the default attribut...
t6mls_socket marks a socket associated with file descriptor fd as trusted. By default, all sockets are untrusted. If the value of state is T6_ON, the socket is marked as trusted, meaning that security policy is not enforced on data being read by that socket. If the value of state is T6_OFF, the socket is marked as untrusted, meaning that security policy will again be enforced on data read by that socket....
t6peek_attr allows a process to peek ahead at the security attributes of the next byte of data. fd is the descriptor of the trusted endpoint, attr_ptr specifies a structure in which to store those attributes the caller wishes to retrieve. new_attrs points to a mask that indicates which attributes were actually retrieved on return from t6peek_attr t6last_attr allows a process to retrieve the attributes of the last byte of data read from the indicated file descriptor. Its parameters are identical ...
t6recvfrom receives data and its associated security attributes from a communication endpoint. The from and fromlen parameters are only used if you wish to receive the source address for the data. This may not be applicable for some trusted endpoints. If not used, these fields should be set to 0. If from is not a NULL pointer, the source address of the message is filled in. fromlen is a value-result parameter, initialized to the size of the buffer associated with from, and modified on return to ...
t6sendto() allows a privileged process to specify the security attributes to send with an IPC message. A process may only specify those attributes for which it possesses the appropriate override privilege and need not specify a full set. Any unspecified attributes are supplied by the kernel. fd is a socket created with socket(3N). The address of the target is given by to with tolen specifying its size. The length of the message is given by len. The to pointer and to_len parameters are only used ...
t6size_attr returns the size of an attribute indicated by attr_type. If the t6attr_t control structure t6ctl is a NULL pointer, it returns either the size of a fixed-size attribute or the maximum size of a variable size attribute. If the attr_type is invalid, it returns 0. If the t6attr_t control structure t6ctl is not NULL, it either returns the size of a fixed-size attribute or the actual size occupied by a variable size attribute in the control structure t6ctl. If the attr_type is invalid or ...
The single-precision and long double-precision routines listed above are only available in the standard math library, -lm, and in -lmx. sin, cos and tan return trigonometric functions of radian arguments x for double data types. fsin, fcos and ftan, and their ANSI-named counterparts sinf, cosf and tanf return trigonometric functions of radian TRIG(3M) TRIG(3M) arguments x for float data types. sinl, cosl and tanl do the same for long double data types. The asin routines return the arc sine in th...
The long double and single-precision routines listed above are only available in the standard math library, -lm and in -lmx. These functions compute the designated hyperbolic functions for double, float, and long double arguments.
tapeio is the general name for the set of I/O functions that operate on a tape device. topen, tclose, trewin, tskipf, and tstate return -1 on error, 0 if successful. tread and twrite return -1 on error, the number of bytes read (or written) on success. topen opens a tape unit for I/O. devnam is the name of the tape device. labled should be .true. if the tape is labeled. tlu is set to the logical unit number of the tape device used for subsequent calls. tclose closes a tape unit previously opened...
These routines provide a complete set of blocking/unblocking capabilities for tasks. Blocking is implemented via a counting semaphore in the system. Each call to taskblock decrements the count and, if it goes negative, the task is suspended. When taskunblock is called, the count is incremented, and if it goes positive (or zero), the task is restarted. This provides both a simple, race free synchronization ability between two tasks, as well as a much more powerful capability to synchronize multip...
Taskcreate causes a new task to be created for the calling process/task. The new task is created via the sproc(2) system call, requesting that all attributes (e.g. open files, current directory, uid, etc.) be shared. The new task differs from the calling task as described in sproc(2). The new task will be invoked as follows: entry(arg) void *arg; The sched parameter is currently unused and should be set to 0. No implicit synchronization is implied between tasks - they are free to run on any proc...
Taskdestroy causes the named task to be destroyed. Any task within a process can destroy any other task in that process. Taskdestroy will fail and no task will be destroyed if the following is true: [EINVAL] The tid specified is not a valid task id for the calling process.
dtbmv, stbmv, ztbmv and ctbmv perform one of the matrix-vector operations x := A*x, or x := A'*x, or x := conjg( A' )*x, where x is an n element vector and A is an n by n unit, or non-unit, upper or lower triangular band matrix, with ( k + 1 ) diagonals. dtbsv, stbsv, ztbsv and ctbsv solve one of the systems of equations A*x = b, or A'*x = b, or conjg( A' )*x = b, where b and x are n element vectors and A is an n by n unit, or non-unit, upper or lower triangular band matrix, with ( k + 1 ) d...
This system is based on Tk for the style of widget programming. This was because it provides a good model, but it also allows the Tcl programmer to move relatively easily between Tk and Motif programming. An alternative style of binding to Motif is used in the WKSH system, which performs a similar sort of role for the Korn Shell. The WKSH is much closer to the C API for Xt than is Tk. An intermediate style is provided by the Wafe binding of Xt-based widgets to tcl. The documentation is incomplet...
libtclObjSrv.so is a Tcl shared library with extensions for accessing the object server. It supports the get, set, create, remove, verify, search and DSsearch operations, as well as an info pseudo-op that returns information about the database. For each object class there is a command defined; the command name is the class name prefixed by a dot (.) character. The first parameter to the object commands is an option, one of: get, set, create, remove, verify, search, DSsearch, or info. For example...
These commands provide access to many basic Unix facilities, including process handling, date and time processing, signal handling and the executing commands via the shell. alarm seconds Instructs the system to send a SIGALRM signal in the specified number of seconds. This is a floating point number, so fractions of a section may be specified. If seconds is 0.0, any previous alarm request is canceled. Only one alarm at a time may be active; the command returns the number of seconds left in the p...
These functions are used to initialize Extended Tcl and applications based on Extended Tcl. IMPORTANT NOTE: libtclx.a must be specified on the link command line before libtcl.a. If the order is reversed, incorrect command line parsing code will be used. tclAppName The application name to be returned by the infox command. This should be a short mnemonic. This value maybe altered from the default by the application. tclAppLongname The application long name to be returned by the infox command. This...
int argc (in) Number of elements in argv. char *argv[] (in) Array of strings containing command-line arguments. Tcl_AppInitProc *appInitProc (in) Address of an applicationspecific initialization procedure. The value for this argument is usually Tcl_AppInit.
Returns a decimal string giving the current access position in fileId. FileId must have been the return value from a previous call to open, or it may be stdin, stdout, or stderr to refer to one of the standard I/O channels.
filedes is a file descriptor returned from a creat, open, dup, fcntl, pipe, or ioctl, system call. tell and tell64 return the file pointer associated with filedes. The two differ in that tell returns an off_t and tell64 returns an off64_t. The 64-bit offset returned by tell64 is useful for 32 bit applications working with 64 bit files. This i...
These are low-level functions to extract and use capabilities from a terminal capability (termcap) database. The Tgetent function extracts the entry of the specified terminal type TERM (defaults to the environment variable TERM) from the database. It will look in the environment for a TERMCAP variable. If found, and the value does not begin with a slash, and the terminal type name is the same as the environment string TERM, the TERMCAP string is used instead of reading a termcap file. If it does...
This routine provides word completion on the list of words in the array (or array ref). The tty driver is put into raw mode using the system command stty raw -echo and restored using stty -raw echo. The following command characters are defined: Attempts word completion. Cannot be changed. ^D Prints completion list. Defined by $Term::Complete::complete. ^U Erases the current input. Defined by $Term::Complete::kill. , Erases one character. Defined by $Term::Complete::erase1 and $Te...
This package is just a front end to some other packages. At the moment this description is written, the only such package is Term-ReadLine, available on CPAN near you. The real target of this stub package is to set up a common interface to whatever Readline emerges with time. Minimal set of supported functions All the supported functions should be called as methods, i.e., either as $term = new Term::ReadLine 'name'; or as $term->addhistory('row'); where $term is a return value of Term::ReadL...
These functions describe a general terminal interface for controlling asynchronous communications ports. A more detailed overview of the terminal interface can be found in termio(7), which also describes an ioctl(2) interface that provides the same functionality. However, the function interface described here is the preferred user interface. Many of the functions described here have a termios_p argument that is a pointer to a termios structur...
Perl test scripts print to standard output "ok N" for each single test, where N is an increasing sequence of integers. The first line output by a standard test script is "1..M" with M being the number of tests that should be run within the test script. Test::Harness::runtests(@tests) runs all the testscripts named as arguments and checks standard output for the expected "ok N" strings. After all tests have been performed, runtests() prints some performance statistics that are computed by t...
test_and_set atomically reads the unsigned long pointed to by the first argument and updates the location with the value specified in the second argument. The read value is returned. test_then_and atomically reads the unsigned long pointed to by the first argument and updates the location with the value specified in the second argument bit-wise and'ed with the read value. The read value is returned. test_then...
target expects the texture resource to which the environment definition is to be bound. There is only one appropriate resource, TV_ENV0. index expects the name of the texture environment that is being bound. Name is the index passed to tevdef when the environment was defined.
index expects the name of the environment being defined. Index 0 is reserved as a null definition, and cannot be redefined. np expects the number of symbols and floating point values in props, including the termination symbol TV_NULL. If np is zero, it is ignored. Operation over network connections is more efficient when np is correctly specified, however. props expects the array of floating point symbols and values that define the texture environment. props must contain a sequence of symbols, e...
target expects the texture resource to which the texture function definition is to be bound. There are three appropriate resources, TX_TEXTURE_0 , TX_TEXTURE_DETAIL and TX_TEXTURE_IDLE. index expects the name of the texture function that is being bound. Name is the index passed to texdef2d when the texture function was defined.
index expects the name of the texture function being defined. Index 0 is reserved as a null definition, and cannot be redefined. nc expects the number of components per image pixel. 1, 2, 3, and 4 component textures and 8-bit and 16-bit components are supported. width expects the width of image in pixels. height expects the height of image in pixels. depth expects the depth of image in pixels. (texdef3d only). image expects a long-word-aligned array containing the pixel data. This texture image ...
index expects the name of the texture function being defined. Index 0 is reserved as a null definition, and cannot be redefined. nc expects the number of components per image pixel. 1, 2, 3, and 4 component textures and 8-bit and 16-bit components are supported. width expects the width of image in pixels. height expects the height of image in pixels. depth expects the depth of image in pixels. (texdef3d only). image expects a long-word-aligned array containing the pixel data. This texture image ...
index expects the name of the texture function being defined. Index 0 is reserved as a null definition, and cannot be redefined. nc expects the number of components per image pixel. 1, 2, 3, and 4 component textures and 8-bit and 16-bit components are supported. width expects the width of image in pixels. height expects the height of image in pixels. depth expects the depth of image in pixels. (texdef3d only). image expects a long-word-aligned array containing the pixel data. This texture image ...
coord Expects the name of the texture coordinate whose generation is to be defined, enabled, or disabled. One of: TX_S: The s texture coordinate TX_T: The t texture coordinate TX_R: The r texture coordinate TX_Q: The q texture coordinate mode Expects the mode of generation to be specified, or an indication that generation is to be either enabled or disabled. One of the symbolic constants: TG_CONTOUR: Use the plane equation specified in params to define a plane in eye-coordinates. Generate a text...
Stores all unambiguous truncations of each element of LIST as keys key in the associative array referenced to by $hashref. The values are the original list elements.
"ewords() accepts a delimiter (which can be a regular expression) and a list of lines and then breaks those lines up into a list of words ignoring delimiters that appear inside quotes. The $keep argument is a boolean flag. If true, the quotes are kept with each word, otherwise quotes are stripped in the splitting process. $keep also defines whether unprotected backslashes are retained. A &shellwords() replacement is included to demonstrate the new package. This version differs from the origi...
This module implements the soundex algorithm as described by Donald Knuth in Volume 3 of The Art of Computer Programming. The algorithm is intended to hash words (in particular surnames) into a small space using a simple model which approximates the sound of the word when spoken by an English speaker. Each word is reduced to a four character string, the first character being an upper case letter and the remaining three being digits. If there is no soundex code representation for a string then th...
Text::Tabs does about what the unix utilities expan do. Given a line with tabs in it, expand will replace the tabs with the appropriate number of spaces. Given a line with or without tabs in it, unexpand will add tabs when it can save bytes by doing so. Invisible compression with plain ascii!
Text::Wrap::wrap() is a very simple paragraph formatter. It formats a single paragraph at a time by breaking lines at word boundries. Indentation is controlled for the first line ($initial_tab) and all subsquent lines ($subsequent_tab) independently. $Text::Wrap::columns should be set to the full width of your output device.
left expects x screen coordinate for the left side of the textport. right expects x screen coordinate for the right side of the textport. bottom expects y screen coordinate for the bottom of the textport. top expects y screen coordinate for the top of the textport.
This module provides some skeletal methods for hash-tying classes. See the perltie manpage for a list of the functions required in order to tie a hash to a package. The basic Tie::Hash package provides a new method, as well as methods TIEHASH, EXISTS and CLEAR. The Tie::StdHash package provides most methods required for hashes in the perltie manpage. It inherits from Tie::Hash, and causes tied hashes to behave exactly like standard hashes, allowing for selective overloading of methods. The new m...
This module provides the ability to use references as hash keys if you first tie the hash variable to this module. It is implemented using the standard perl TIEHASH interface. Please see the tie entry in perlfunc(1) and perltie(1) for more information.
This module provides some skeletal methods for scalar-tying classes. See the perltie manpage for a list of the functions required in tying a scalar to a package. The basic Tie::Scalar package provides a new method, as well as methods TIESCALAR, FETCH and STORE. The Tie::StdScalar package provides all the methods specified in the perltie manpage. It inherits from Tie::Scalar and causes scalars tied to it to behave exactly like the built-in scalars, allowing for selective overloading of methods. T...
The Tie::SubstrHash package provides a hash-table-like interface to an array of determinate size, with constant key size and record size. Upon tying a new hash to this package, the developer must specify the size of the keys that will be used, the size of the value fields that the keys will index, and the size of the overall table (in terms of key-value pairs, not size in hard memory). These values will not change for the duration of the tied hash. The newly-allocated hash table may now have dat...
The following routines are provided for client-control of the I/O buffers used by the library. Applications need never use these routines; they are provided only for ``intelligent clients'' that wish to optimize memory usage and/or eliminate potential copy operations that can occur when working with images that have data stored without compression. TIFFReadBufferSetup sets up the data buffer used to read raw (encoded) data from a file. If the specified pointer is NULL (zero), then a buffer of ...
TIFFClose closes a file that was previously opened with TIFFOpen(3T). Any buffered data are flushed to the file, including the contents of the current directory (if modified); and all resources are reclaimed.
libtiff supports a variety of compression schemes implemented by software codecs. Each codec adheres to a modular interface that provides for the decoding and encoding of image data; as well as some other methods for initialization, setup, cleanup, and the control of default strip and tile sizes. Codecs are identified by the associated value of the TIFF Compression tag; e.g. 5 for LZW compression. The TIFFRegisterCODEC routine can be used to augment or override the set of codecs available to an ...
TIFFError invokes the library-wide error handling function to (normally) write an error message to the stderr. The fmt parameter is a printf(3S) format string, and any number arguments can be supplied. The module parameter, if non-zero, is printed before the message; it typically is used to identify the software module in which an error is detected. Applications that desire to capture control in the event of an error should use TIFFSetErrorHandler to override the default error handler. A NULL (0...
TIFFFlush causes any pending writes for the specified file (including writes for the current directory) to be done. In normal operation this call is never needed- the library automatically does any flushing required. TIFFFlushData flushes any pending image data for the specified file to be written out; directory-related data are not flushed. In normal operation this call is never needed- the library automatically does any flushing required....
TIFFGetField returns the value of a tag or pseudo-tag associated with the the current directory of the open TIFF file tif. (A pseudo-tag is a parameter that is used to control the operation of the TIFF library but whose value is not read or written to the underlying file.) The file must have been previously opened with TIFFOpen(3T). The tag is identified by tag, one of the values defined in the include file tiff.h (see also the table below). The type and number of values returned is dependent on...
These routines are provided for writing portable software that uses libtiff; they hide any memory-management related issues, such as dealing with segmented architectures found on 16-bit machines. _TIFFmalloc and _TIFFrealloc are used to dynamically allocate and reallocate memory used by libtiff; such as memory passed into the I/O routines. Memory allocated through these interfaces is released back to the system using the _TIFFfree routine. Memory allocated through one of the above interfaces can...
TIFFOpen opens a TIFF file whose name is filename and returns a handle to be used in subsequent calls to routines in libtiff. If the open operation fails, then zero is returned. The mode parameter specifies if the file is to be opened for reading (``r''), writing (``w''), or appending (``a'') and, optionally, whether to override certain default aspects of library operation (see below). When a file is opened for appending, existing data will not be touched; instead new data will be written ...
TIFFPrintDirectory prints a description of the current directory in the specified TIFF file to the standard I/O output stream fd. The flags parameter is used to control the level of detail of the printed information; it is a bit-or of the flags defined in tiffio.h: #define TIFFPRINT_NONE 0x0 /* no extra info */ #define TIFFPRINT_STRIPS 0x1 /* strips/tiles info */ #define TIFFPRINT_CURVES 0x2 /* color/gray response curves */ #define TIFFPRINT_COLORMAP 0x4 /* colormap */ #define TIFFPRINT_JPEGQTAB...
The following routines return status information about an open TIFF file. TIFFCurrentDirectory returns the index of the current directory (directories are numbered starting at 0). This number is suitable for use with the TIFFSetDirectory routine. TIFFLastDirectory returns a non-zero value if the current directory is the last directory in the file; otherwise zero is returned. TIFFCurrentRow, TIFFCurrentStrip, and TIFFCurrentTile, return the current row, strip, and tile, respectively, that is bein...
Read the next directory in the specified file and make it the current directory. Applications only need to call TIFFReadDirectory to read multiple subfiles in a single TIFF file- the first directory in a file is automatically read when TIFFOpen is called.
Read the contents of the specified strip into the (user supplied) data buffer. Note that the value of strip is a ``raw strip number.'' That is, the caller must take into account whether or not the data is organized in separate planes (PlanarConfiguration=2). To read a full strip of data the data buffer should typically be at least as large as the number returned by TIFFStripSize.
Read the contents of the specified tile into the (user supplied) data buffer. Note that the value of tile is a ``raw tile number.'' That is, the caller must take into account whether or not the data is organized in separate planes (PlanarConfiguration=2). TIFFComputeTile automatically does this when converting an (x,y,z,sample) coordinate quadruple to a tile number. To read a full tile of data the data buffer should typically be at least as large as the value returned by TIFFTileSize....
TIFFReadRGBAImage reads a strip- or tile-based image into memory, storing the result in the user supplied raster. The raster is assumed to be an array of width times height 32-bit entries, where width must be less than or equal to the width of the image (height may be any non-zero size). If the raster dimensions are smaller than the image, the image data is cropped to the raster bounds. If the raster height is greater than that of the image, then the image data are placed in the lower part of th...
Read the data for the specified row into the (user supplied) data buffer buf. The data are returned decompressed and, in the native byte- and bit-ordering, but are otherwise packed (see further below). The buffer must be large enough to hold an entire scanline of data. Applications should call the routine TIFFScanlineSize to find out the size (in bytes) of a scanline buffer. The row parameter is always used by TIFFReadScanline; the sample parameter is used only if data are organized in separate ...
Return the data for the tile containing the specified coordinates. The data placed in buf are returned decompressed and, typically, in the native byte- and bit-ordering, but are otherwise packed (see further below). The buffer must be large enough to hold an entire tile of data. Applications should call the routine TIFFTileSize to find out the size (in bytes) of a tile buffer. The x and y parameters are always used by TIFFReadTile. The z parameter is used if the image is deeper than 1 slice (Ima...
The routines described here provide a high-level interface through which TIFF images may be read into memory. Images may be strip- or tile-based and have a variety of different characteristics: bits/sample, samples/pixel, photometric, etc. Decoding state is encapsulated in a TIFFRGBAImage structure making it possible to capture state for multiple images and quickly switch between them. The target raster format can be customized to a particular application's needs by installing custom routines t...
TIFFSetDirectory changes the current directory and reads its contents with TIFFReadDirectory. The parameter dirnum specifies the subfile/directory as an integer number, with the first directory numbered zero. TIFFSetSubDirectory acts like TIFFSetDirectory, except the directory is specified as a file offset instead of an index; this is required for accessing subdirectories linked through a SubIFD tag....
TIFFSetField sets the value of a field or pseudo-tag in the current directory associated with the open TIFF file tif. (A pseudo-tag is a parameter that is used to control the operation of the TIFF library but whose value is not read or written to the underlying file.) The file must have been previously opened for writing with TIFFOpen(3T). The field is identified by tag, one of the values defined in the include file tiff.h (see also the table below). The actual value is specified using a variabl...
TIFFScanlineSize returns the size in bytes of a row of data as it would be returned in a call to TIFFReadScanline, or as it would be expected in a call to TIFFWriteScanline. TIFFRasterScanlineSize returns the size in bytes of a complete decoded and packed raster scanline. Note that this value may be different from the value returned by TIFFScanlineSize if data is stored as separate planes.
TIFFDefaultStripSize returns the number of rows for a reasonable-sized strip according to the current settings of the ImageWidth, BitsPerSample, SamplesPerPixel, tags and any compression-specific requirements. If the estimate parameter, if non-zero, then it is taken as an estimate of the desired strip size and adjusted according to any compression-specific requirements. The value returned by this function is typically used to define the RowsPerStrip tag. In lieu of any unusual requirements TIFFD...
The following routines are used by the library to swap 16- and 32-bit data and to reverse the order of bits in bytes. TIFFSwabShort and TIFFSwabLong swap the bytes in a single 16-bit and 32- bit item, respectively. TIFFSwabArrayOfShort and TIFFSwabArrayOfLong swap the bytes in an array of 16-bit and 32-bit items, respectively. TIFFReverseBits replaces each byte in data with the equivalent bitreversed value. This operation is done with a lookup table, TIFFBitRevTable which is declared public. A s...
TIFFDefaultTileSize returns the pixel width and height of a reasonablesized tile; suitable for setting up the TileWidth and TileLength tags. If the tw and th values passed in are non-zero, then they are adjusted to reflect any compression-specific requirements. The returned width and height are constrained to be a multiple of 16 pixels to conform with the TIFF specification. TIFFTileSize returns the equivalent size for a tile of data as it would be returned in a call to TIFFReadTile or as it wou...
TIFFWarning invokes the library-wide warning handler function to (normally) write a warning message to the stderr. The fmt parameter is a printf(3S) format string, and any number arguments can be supplied. The module parameter is interpreted as a string that, if non-zero, should be printed before the message; it typically is used to identify the software module in which a warning is detected. Applications that desire to capture control in the event of a warning should use TIFFSetWarningHandler t...
Write the contents of the current directory to the file and setup to create a new subfile in the same file. Applications only need to call TIFFWriteDirectory when writing multiple subfiles to a single TIFF file. TIFFWriteDirectory is automatically called by TIFFClose and TIFFFlush to write a modified directory if the file is open for writing.
Compress size bytes of raw data from buf and write the result to the specified strip; replacing any previously written data. Note that the value of strip is a ``raw strip number.'' That is, the caller must take into account whether or not the data are organized in separate places (PlanarConfiguration=2).
Compress size bytes of raw data from buf and append the result to the end of the specified tile. Note that the value of tile is a ``raw tile number.'' That is, the caller must take into account whether or not the data are organized in separate places (PlanarConfiguration=2). TIFFComputeTile automatically does this when converting an (x,y,z,sample) coordinate quadruple to a tile number.
Write data to a file at the specified row. The sample parameter is used only if data are organized in separate planes (PlanarConfiguration=2). The data are assumed to be uncompressed and in the native bit- and byteorder of the host machine. The data written to the file is compressed according to the compression scheme of the current TIFF directory (see further below). If the current scanline is past the end of the current subfile, the ImageLength field is automatically increased to include the s...
Tcl_Interp *interp (in) Interpreter in which to report an error, if any. char *name (in) File name, which may start with a ``~''. Tcl_DString *bufferPtr If needed, this dynamic string is | used to store the new file name. At| the time of the call it should be | uninitialized or empty. The caller | must eventually call Tcl_DStringFree| to free up anything stored here.
This command will call the Tcl interpreter count times to evaluate script (or once if count isn't specified). It will then return a string of the form 503 microseconds per iteration which indicates the average amount of time required per iteration, in microseconds. Time is measured in elapsed time, not CPU time.
This command will call the Tcl interpreter count times to evaluate script (or once if count isn't specified). It will then return a string of the form 503 microseconds per iteration which indicates the average amount of time required per iteration, in microseconds. Time is measured in elapsed time, not CPU time.
This module's default exports override the core gmtime() function, replacing it with a version that returns "Time::tm" objects. This object has methods that return the similarly named structure field name from the C's tm structure from time.h; namely sec, min, hour, mday, mon, year, wday, yday, and isdst. You may also import all the structure fields directly into your namespace as regular variables using the :FIELDS import tag. (Note that this still overrides your core functions.) Access the...
These routines are quite efficient and yet are always guaranteed to agree with localtime() and gmtime(). We manage this by caching the start times of any months we've seen before. If we know the start time of the month, we can always calculate any time within the month. The start times themselves are guessed by successive approximation starting at the current time, since most dates seen in practice are close to the current date. Unlike algorithms that do a binary search (calling gmtime once for...
This module's default exports override the core localtime() function, replacing it with a version that returns "Time::tm" objects. This object has methods that return the similarly named structure field name from the C's tm structure from time.h; namely sec, min, hour, mday, mon, year, wday, yday, and isdst. You may also import all the structure fields directly into your namespace as regular variables using the :FIELDS import tag. (Note that this still overrides your core functions.) Access ...
This module is used internally as a base class by Time::localtime And Time::gmtime functions. It creates a Time::tm struct object which is addressable just like's C's tm structure from time.h; namely with sec, min, hour, mday, mon, year, wday, yday, and isdst. This class is an internal interface only.
int milliseconds (in) How many milliseconds to wait before invoking proc. Tk_TimerProc *proc (in) Procedure to invoke after milliseconds have elapsed. ClientData clientData (in) Arbitrary one-word value to pass to proc. Tk_TimerToken token (in) Token for previously-created timer handler (the return value from some previous call to Tk_CreateTimerHandler).
timer_create creates an interval timer for the calling process based on the clock named by clock_id. The new timer ID is recorded at the memory address timerid, and is unique for the calling process until the timer is deleted. A process may create up to {TIMER_MAX} posix timers [see sysconf(3C)]. Supported clocks for clock_id are: CLOCK_REALTIME The system's notion of the current...
timer_delete deletes the posix timer named by timerid, which was previously created by a call to timer_create. If the timer was already started, it is disarmed and no signals related to timerid will be delivered to the process. timer_delete will fail if the following is true: [EINVAL] The timerid does not name a valid posix timer....
timer_getoverrun returns the current expiration notification overrun count for the posix timer named by timerid. An overrun count is the number of timer expiration notifications which were not delivered to the process due to an already pending signal from timerid. This overrun condition may occur because a given posix timer can only queue one signal to the process at any point in time. If the returned overrun count is positive, then the count represen...
timer_gettime retrieves the time remaining before the posix timer named by timerid expires, as well as, the periodic timer interval between expirations and stores the information at memory address value. The it_value field of value contains the time remainder, while the it_interval field contains the periodic timer interval. If it_value contains zero after a successful return, then the tim...
timer_settime sets the expiration time for the posix timer named by timerid. The timespec_t it_value field of value is used to specify the desired timer expiration time. If the timer was previously set and has not expired, then the timer is reset to the specified it_value. In the event it_value is set to zero, the timer is disarmed. By default, posix timers interpret spec...
On Input NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix. D contains the diagonal elements of the input matrix. E contains the subdiagonal elements of the input matrix in its last N-1 positions. E(1) is arbitrary. E2 contains the squares of the corresponding elements of E, with zeros corresponding to negligible elements of E. E(I) is considered negligible if it is not larger than the prod...
The tk command provides access to miscellaneous elements of Tk's internal state. Most of the information manipulated by this command pertains to the application as a whole, or to a screen or display, rather than to a particular window. The command can take any of a number of different forms depending on the option argument. The legal forms are: tk appname ?newName? If newName isn't specified, this command returns the name of the | application (the name that may be used in send commands to | co...
The tkerror command doesn't exist as built-in part of Tk. Instead, individual applications or users can define a tkerror command (e.g. as a Tcl procedure) if they wish to handle background errors. A background error is one that occurs in a command that didn't originate with the application. For example, if an error occurs while executing a command specified with a bind of after command, then it is a background error. For a non-background error, the error can simply be returned up through neste...
The tkwait command waits for one of several things to happen, then it returns without taking any other actions. The return value is always an empty string. If the first argument is variable (or any abbreviation of it) then the second argument is the name of a global variable and the command waits for that variable to be modified. If the first argument is visibility (or any abbreviation of it) then the second argument is the name of a window and the tkwait command waits for a change in its visibi...
int argc (in) Number of elements in argv. char *argv[] (in) Array of strings containing command-line arguments. Tcl_AppInitProc *appInitProc (in) Address of an applicationspecific initialization procedure. The value for this argument is usually Tcl_AppInit.
Tk_Window tkwin (in) Token for window. Tcl_Interp *interp (out) Interpreter to use for error reporting. char *pathName (in) Character string containing path name of window.
target expects the texture resource to which the texture function definition is to be bound. There is one appropriate resource TL_TLUT_0. index expects the name of the texture function that is being bound. Name is the index passed to texdef2d when the texture function was defined.
index expects the name of the texture look-up table being defined. Index 0 is reserved as a null definition, and cannot be redefined. nc expects the number of components per table entry. len expects the length of table in table entries. table expects a long-word aligned array of packed nc, 8-bit, component table entries. np expects the number of symbols and floating point values in props, including the termination symbol TL_NULL. If np is zero, it is ignored. Operation over network connections i...
tmpfile creates a temporary file, and returns a corresponding FILE pointer. The file is created on the temporary directory indicated by the string P_tmpdir in . However, if the variable TMPDIR is provided in the user's environment, the variable's value is the name of the desired temporary-file directory. If the directory specified by the variable TMPDIR is not accessible, the directory specified by the string P_tmpdir in will be used. If the file cannot be opened, a NULL poi...
These functions generate file names that can safely be used for a temporary file. tmpnam always generates a file name using the path-prefix defined as P_tmpdir in the <stdio.h> header file. If s is NULL, tmpnam leaves its result in an internal static area and returns a pointer to that area. The next call to tmpnam will destroy the contents of the area. If s is not NULL, i...
Motif uses a data type known as XmString. This is a compound string format, containing rendition information such as direction and font. XmStrings are used in a number of places, most notably in the label of a Label widget. In the conversion of a string to an XmString, the following format rules are applied: The string is treated as a list of words. Words in the list are concatenated with a single space between them, no matter what the original white space between them. Individual words may be q...
The extra methods supported for handling UIL files are mrmOpenHierarchy mrmCloseHierarchy mrmFetchWidget mrmFetchWidgetOverride mrmOpenHierarchy file_list This takes a list of files that are compiled UIL files (UID files) and opens the widget hierarchy. At most one widget hierarchy can be opened. This method is only available to the toplevel widget ``.'' mrmCloseHierarchy This closes the widget hierarchy opened by mrmOpenHierarchy. This method is only available to the toplevel widget ``.'' m...
This is a set of tcl variables with version information tmVersion the current tclMotif version XmVERSION the major version number of Motif XmREVISION the revision number of Motif XmVersion the combined major and revision number, made by XmVERSION*1000 + XmREVISION.
borderWidth highlightBackground highlightThickness takeFocus | cursor highlightColor relief See the ``options'' manual entry for details on the standard options. WIDGET-SPECIFIC OPTIONS Name: background | Class: Background | Command-Line Switch:-background | This option is the same as the standard background option except | that its value may also be specified as an empty string. In this | case, the widget will display no background or border, and no colors| will be consumed from its colormap ...
uplo On entry, uplo specifies whether the matrix is an upper or lower triangular matrix as follows: FORTRAN uplo = 'U' or 'u' A is an upper triangular matrix. uplo = 'L' or 'l' A is a lower triangular matrix. C uplo = UpperTriangle A is an upper triangular matrix. uplo = LowerTriangle A is a lower triangular matrix. Unchanged on exit. trans On entry, trans specifies the operation to be FORTRAN trans = 'N' or 'n' x := A*x / A*x = b. trans = 'T' or 't' x := A'*x / A'*x = b. trans...
On Input N is the order of the matrix. D contains the diagonal elements of the input matrix. E contains the subdiagonal elements of the input matrix in its last N-1 positions. E(1) is arbitrary. On Output D contains the eigenvalues in ascending order. If an error exit is made, the eigenvalues are correct and ordered for indices 1,2,...IERR-1, but may not be the smallest eigenvalues. E has been destroyed. IERR is set to Zero for normal return, J if the J-th eigenvalue has not been determined afte...
On Input NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix. D contains the diagonal elements of the input matrix. E contains the subdiagonal elements of the input matrix in its last N-1 positions. E(1) is arbitrary. Z contains the transformation matrix produced in the reduction by TRED2, if performed. If the eigenvectors of the tridiagonal matrix are desired, Z must contain the identity mat...
On Input N is the order of the matrix. D contains the diagonal elements of the input matrix. E2 contains the squares of the subdiagonal elements of the input matrix in its last N-1 positions. E2(1) is arbitrary. On Output D contains the eigenvalues in ascending order. If an error exit is made, the eigenvalues are correct and ordered for indices 1,2,...IERR-1, but may not be the smallest eigenvalues. E2 has been destroyed. IERR is set to Zero for normal return, J if the J-th eigenvalue has not be...
This command causes Tcl commands to be executed whenever certain operations are invoked. At present, only variable tracing is implemented. The legal option's (which may be abbreviated) are: trace variable name ops command Arrange for command to be executed whenever variable name is accessed in one of the ways given by ops. Name may refer to a normal variable, an element of an array, or to an array as a whole (i.e. name may be just the name of an array, with no parenthesized index). If name refe...
Tcl_Interp *interp (in) Interpreter containing variable. char *varName (in) Name of variable. May refer to a scalar variable, to an array variable with no index, or to an array variable with a parenthesized index. If | the name references an | element of an array, then | it must be in writable | memory: Tcl will make | temporary modifications to | it while looking up the | name. int flags (in) OR-ed combination of the values TCL_TRACE_READS, TCL_TRACE_WRITES, and TCL_TRACE_UNSETS, and TCL_GLOBAL...
On Input NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix. A contains information about the orthogonal trans- formations used in the reduction by TRED1 in its strict lower triangle. E contains the subdiagonal elements of the tridiagonal matrix in its last N-1 positions. E(1) is arbitrary. M is the number of eigenvectors to be back transformed. Z contains the eigenvectors to be back transfo...
On Input NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix. NV must be set to the dimension of the array parameter A as declared in the calling program dimension statement. A contains information about the orthogonal transformations used in the reduction by TRED3 in its first N*(N+1)/2 positions. M is the number of eigenvectors to be back transformed. Z contains the eigenvectors to be back ...
On Input NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix. A contains the real symmetric input matrix. Only the lower triangle of the matrix need be supplied. On Output A contains information about the orthogonal trans- formations used in the reduction in its strict lower triangle. The full upper triangle of A is unaltered. D contains the diagonal elements of the tridiagonal matrix. E cont...
On Input NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix. A contains the real symmetric input matrix. Only the lower triangle of the matrix need be supplied. On Output D contains the diagonal elements of the tridiagonal matrix. E contains the subdiagonal elements of the tridiagonal matrix in its last N-1 positions. E(1) is set to zero. Z contains the orthogonal transformation matrix produ...
On Input n is the order of the matrix. NV must be set to the dimension of the array parameter A as declared in the calling program dimension statement. A contains the lower triangle of the real symmetric input matrix, stored row-wise as a one-dimensional array, in its first N*(N+1)/2 positions. On Output A contains information about the orthogonal transformations used in the reduction. D contains the diagonal elements of the tridiagonal matrix. E contains the subdiagonal elements of the tridiago...
On Input N is the order of the matrix. EPS1 is an absolute error tolerance for the computed eigenvalues. If the input EPS1 is non-positive, it is reset for each submatrix to a default value, namely, minus the product of the relative machine precision and the 1-norm of the submatrix. D contains the diagonal elements of the input matrix. E contains the subdiagonal elements of the input matrix in its last N-1 positions. E(1) is arbitrary. E2 contains the squares of the corresponding elements of E. ...
The single-precision and long double-precision routines listed above are only available in the standard math library, -lm, and in -lmx. sin, cos and tan return trigonometric functions of radian arguments x for double data types. fsin, fcos and ftan, and their ANSI-named counterparts sinf, cosf and tanf return trigonometric functions of radian Page 1 TRIG(3M) TRIG(3M) arguments x for float data types. sinl, cosl and tanl do the same for long double data types. The asin routines return the arc sin...
dtrmm, strmm, ztrmm and ctrmm perform one of the matrix-matrix operations B := alpha*op( A )*B, or B := alpha*B*op( A ) where alpha is a scalar, B is an m by n matrix, A is a unit, or non-unit, upper or lower triangular matrix and op( A ) is one of op( A ) = A or op( A ) = A' or op( A ) = conjg( A' ).
dtrmv, strmv, ztrmv and ctrmv perform one of the matrix-vector operations x := A*x, or x := A'*x, or x := conjg( A' )*x, where x is an n element vector and A is an n by n unit, or non-unit, upper or lower triangular matrix. dtrsv, strsv, ztrsv and ctrsv solve one of the systems of equations A*x = b, or A'*x = b, or conjg( A' )*x = b, where b and x are n element vectors and A is an n by n unit, or non-unit, upper or lower triangular matrix. No test for singularity or nearsingularity is includ...
dtrsm, strsm, ztrsm and ctrsm solve one of the matrix equations op( A )*X = alpha*B, or X*op( A ) = alpha*B, where alpha is a scalar, X and B are m by n matrices, A is a unit, or non-unit, upper or lower triangular matrix and op( A ) is one of op( A ) = A or op( A ) = A' or op( A ) = conjg( A' ). The matrix X is overwritten on B.
tsearch, tfind, tdelete, and twalk are routines for manipulating binary search trees. They are generalized from Knuth (6.2.2) Algorithms T and D. All comparisons are done with a user-supplied routine. This routine is called with two arguments, the pointers to the elements being compared. It returns an integer less than, equal to, or greater than 0, according to whether the first argument is to be considered less than, equal to or greater than the second argument. The comparison function need not...
The tserialio library provides millisecond accurate, timestamped access to a serial port. An application can measure the time at which each input byte arrived at a serial port to within plus or minus one millisecond. An application can also schedule bytes to go out a serial Page 1 TSERIALIO(3) TSERIALIO(3) port at a specified time in the future. The operating system will output each byte at the specified time with an accuracy of plus or minus one millisecond. Times are specified on the UST timel...
tsix_get_mac retrieves the MAC label associated with data incoming on fd, which must be associated with a socket. If tsix_get_mac is successful, that MAC label will be pointed to by lbl. The caller should call mac_free on the mac_t argument lbl, which was passed to tsix_get_mac. If _SC_IP_SECOPTS is not in effect, tsix_get_mac always returns success.
tsix_get_solabel retrieves the MAC label of an Internet-domain socket represented by fd. If tsix_get_solabel is successful, that MAC label will be pointed to by lbl. The caller should call mac_free on the mac_t argument lbl, which was passed to tsix_get_solabel. If _SC_IP_SECOPTS is not in effect, tsix_get_solabel always returns success.
tsix_get_uid retrieves the User ID associated with data incoming on fd, which must be associated with a socket. If tsix_get_uid is successful, that User ID will be contained in the object pointed to by uidp. If _SC_IP_SECOPTS is not in effect, tsix_get_uid always returns success.
tsix_off disables trusted operation on file descriptor fd, which must be associated with a socket. This causes the socket to be subject to normal system security policy regarding incoming data. This is the normal default for all sockets.
tsix_on enables trusted operation on file descriptor fd, which must be associated with a socket. This causes the socket to ignore normal system security policy regarding incoming data.
tsix_recvfrom_mac receives a message from a socket, additionally returning the MAC label associated with the data just received. tsix_recvfrom_mac is otherwise identical to recvfrom(2). If tsix_recvfrom_mac is successful, that MAC label will be pointed to by lbl.
tsix_sendto_mac transmits a message to another socket, temporarily overriding the default MAC label associated with that message with the MAC label pointed to by lbl. tsix_sendto_mac is otherwise identical to sendto(2).
tsix_set_mac_byrhost sets the MAC label of all outgoing communication on fd, which must be associated with a socket, to the default MAC label for that host. If lbl is not NULL, lbl will point to that MAC label upon successful execution of tsix_set_mac_byrhost.
On Input NM must be set to the row dimension of two-dimensional array parameters as declared in the calling program dimension statement. N is the order of the matrix. EPS1 is an absolute error tolerance for the computed eigenvalues. It should be chosen commensurate with relative perturbations in the matrix elements of the order of the relative machine precision. If the input EPS1 is non-positive, it is reset for each submatrix to a default value, namely, minus the product of the relative machine...
Ttynam returns a blank padded path name of the terminal device associated with logical unit lunit. MAXLEN is the maximum length of the path name for the terminal device. Isatty returns .true. if lunit is associated with a terminal device, .false. otherwise.
ttyname returns a pointer to a string containing the null-terminated path name of the terminal device associated with file descriptor fildes. ttyname_r is a reentrant version of ttyname where buf and buflen give the location and maximum size of where the resultant string should be placed. The maximum length of the terminal name is {TTY_NAME_MAX}. sysconf(3C) may be used to determine this value. isa...
ttyslot returns the index of the current user's entry in the /var/adm/utmp file. This is accomplished by calling ttyname(3C) to determine which device the calling program has associated with the standard input, the standard output, or the error output (0, 1 or 2). This device name is then searched for in the /var/adm/utmp file.
This function is issued by a transport user to accept a connect request. fd identifies the local transport endpoint where the connect indication arrived, resfd specifies the local transport endpoint where the connection is to be established, and call contains information required by the transport provider to complete the connection. call points to a t_call structure that contains the following members: struct ne<...
The t_alloc function dynamically allocates memory for the various transport function argument structures as specified below. This function will allocate memory for the specified structure, and will also allocate memory for buffers referenced by the structure. The structure to allocate is specified by struct_type, and can be one of the following: T_BIND struct t_bind T_CALL str<...
This function associates a protocol address with the transport endpoint specified by fd and activates that transport endpoint. In connection mode, the transport provider may begin accepting or requesting connections on the transport endpoint. In connectionless mode, the transport user may send or receive data units through the transport endpoint. The req and ret arguments point to a t_bind structure containing the following members: struct...
The t_close function informs the transport provider that the user is finished with the transport endpoint specified by fd, and frees any local library resources associated with the endpoint. In addition, t_close closes the file associated with the transport endpoint. t_close should be called from the T_UNBND state [see t_getstate(3N)]. However, this function does not check state information, ...
This function enables a transport user to request a connection to the specified destination transport user. fd identifies the local transport endpoint where communication will be established, while sndcall and rcvcall point to a t_call structure that contains the following members: struct netbuf addr; struct netbuf opt; stru...
t_error produces a message on the standard error output which describes the last error encountered during a call to a transport function. The argument string errmsg is a user-supplied error message that gives context to the error. t_error prints the user-supplied error message followed by a colon and the standard transport function error message for the current value contained in t_errno. If t_errno is T...
The t_free function frees memory previously allocated by t_alloc. This function will free memory for the specified structure, and will also free memory for buffers referenced by the structure. ptr points to one of the six structure types described for t_alloc, and struct_type identifies the type of that structure, which can be one of the following: T_BIND struct t_b...
This function returns the current characteristics of the underlying transport protocol associated with file descriptor fd. The info structure is used to return the same information returned by t_open. This function enables a transport user to access this information during any phase of communication. This argument points to a t_info structure, which contains the following members: long addr;/* max size of the transport pr...
The t_getprotaddr() function returns local and remote protocol addresses currently associated with the transport endpoint specified by fd. In boundaddr and peeraddr the user specified maxlen, which is the maximum size of the address buffer, and buf which points to the buffer where the address is to be placed. On return, the buf field of bounda
The t_getstate function returns the current state of the provider associated with the transport endpoint specified by fd. This function resides within both the X/Open compliant libxnet and the SVR4 compliant libnsl Network Services libraries. Network Services applications which require X/Open compliance must link-load with -lxnet. Network Services applications which require SVR4 compliance must linkload wit...
This function listens for a connect request from a calling transport user. fd identifies the local transport endpoint where connect indications arrive, and on return, call contains information describing the connect indication. call points to a t_call structure, which contains the following members: struct netbuf addr; truct netbuf opt; struc...
This function returns the current event on the transport endpoint specified by fd. This function enables a transport provider to notify a transport user of an asynchronous event when the user is issuing functions in synchronous mode. Certain events require immediate notification of the user and are indicated by a specific error, TLOOK, on the current or next function to be executed. This function also enables a transport user to poll a transport endpoint periodically for asy...
t_open must be called as the first step in the initialization of a transport endpoint. This function establishes a transport endpoint by opening a UNIX file that identifies a particular transport provider (that is, transport protocol) and returning a file descriptor that identifies that endpoint. For example, opening the file /dev/iso_cots identifies an OSI connection-oriented transport layer protocol as the transport provider. path ...
The t_optmgmt function enables a transport user to retrieve, verify, or negotiate protocol options with the transport provider. fd identifies a bound transport endpoint. The req and ret arguments point to a t_optmgmt structure containing the following members: struct netbuf opt; long flags; The opt field identifies protocol options and the...
This function receives either normal or expedited data. fd identifies the local transport endpoint through which data will arrive, buf points to a receive buffer where user data will be placed, and nbytes specifies the size of the receive buffer. flags may be set on return from t_rcv and specifies optional flags as described below. By default, t_rcv operates in synchronous mode and will wait for data to arrive if none is cur...
This function enables a calling transport user to determine the status of a previously sent connect request and is used in conjunction with t_connect to establish a connection in asynchronous mode. The connection will be established on successful completion of this function. fd identifies the local transport endpoint where communication will be established, and call contains information associated with the newly established connection. call p...
This function is used to identify the cause of a disconnect, and to retrieve any user data sent with the disconnect. fd identifies the local transport endpoint where the connection existed, and discon points to a t_discon structure containing the following members: struct netbuf udata; int reason; int sequence; netbu
This function is used to acknowledge receipt of an orderly release indication. fd identifies the local transport endpoint where the connection exists. After receipt of this indication, the user should not attempt to receive more data because such an attempt will block forever. However, the user may continue to send data over the connection if t_sndrel has not been issued by the user. This function is an optional service of the transport provider, and is only supported ...
This function is used in connectionless mode to receive a data unit from another transport user. fd identifies the local transport endpoint through which data will be received, unitdata holds information associated with the received data unit, and flags is set on return to indicate that the complete data unit was not received. unitdata points to a t_unitdata structure containing the following members:...
This function is used in connectionless mode to receive information concerning an error on a previously sent data unit, and should be issued only after a unit data error indication. It informs the transport user that a data unit with a specific destination address and protocol options produced an error. fd identifies the local transport endpoint through which the error report will be received, and uderr points to a t_uderr structure containing the following...
This function is used to send either normal or expedited data. fd identifies the local transport endpoint over which data should be sent, buf points to the user data, nbytes specifies the number of bytes of user data to be sent, and flags specifies any optional flags described below. By default, t_snd operates in synchronous mode and may wait if flow control restrictions prevent the data from being accepted by the local transport provid...
This function is used to initiate an abortive release on an already established connection or to reject a connect request. fd identifies the local transport endpoint of the connection, and call specifies information associated with the abortive release. call points to a t_call structure that contains the following members: struct netbuf addr; struct netbuf op<...
This function is used to initiate an orderly release of a transport connection and indicates to the transport provider that the transport user has no more data to send. fd identifies the local transport endpoint where the connection exists. After issuing t_sndrel, the user may not send any more data over the connection. However, a user may continue to receive data if an orderly release indication has not been received. This function is an optional service of the transp...
This function is used in connectionless mode to send a data unit to another transport user. fd identifies the local transport endpoint through which data will be sent, and unitdata points to a t_unitdata structure containing the following members: struct netbuf addr; struct netbuf opt; struct netbuf u...
t_strerror maps the error number in errnum that corresponds to an XTI error to a language-dependent error message string and returns a pointer to the string. The string pointed to will not be modified by the program, but may be overwritten by a subsequent call to the t_strerror function. The string is not terminated by a newline character. The language for error message strings written by t_strerro...
For the transport endpoint specified by fd, t_sync synchronizes the data structures managed by the transport library with information from the underlying transport provider. In doing so, it can convert a raw file descriptor [obtained via open(2), dup(2), or as a result of a fork(2) and exec(2)] to an initialized transport endpoint, assuming that file descriptor referenced a transport provider. This function also allows two coopera...
The t_unbind function disables the transport endpoint specified by fd which was previously bound by t_bind(3N). On completion of this call, no further data or events destined for this transport endpoint will be accepted by the transport provider. This function resides within both the X/Open compliant libxnet and the SVR4 compliant libnsl Network Services libraries. Network Services applications which require X/Open ...
The ualarm() function causes the SIGALRM signal to be generated for the calling process after the number of real-time microseconds specified by the useconds argument has elapsed. When the interval argument is nonzero, repeated timeout notification occurs with a period in microseconds specified by the interval argument. If the notification signal, SIGALRM, is not caught or ignored, the calling process is terminated. The ualarm() function returns the number of microseconds remaining from the previ...
On Challenge and Onyx systems, These routines form the basis for a simplified interface to DMA engines, usrdma(7m) devices. These routines are included in a program by compiling with the -ludma option. Currently, the only supported DMA engine is for VME on the Challenge/Onyx series. As DMA engines become available for other hardware platforms, support will be provided through this interface. An application would use the routines dma_open and dma_close to allocate and deallocate access to a DMA e...
ufmCloseTypeface closes an open typeface. Once a typeface is closed, you can no longer use the handle that was assigned to that typeface. typefaceHandle is a typeface handle that was returned by ufmOpenTypeface. That must be the handle of an open typeface.
ufmFree frees the data the pointer ufmPointer points to. You must use the function ufmFree to free any objects that were allocated by the Universal Font Manager (UFM), unless an alternate UFM function is explicitly specified for the object. For example, your program should call ufmFree if it wants to free the memory allocated for a font path by ufmGetFontPath. If it wants to free character bi...
ufmFreeBitmap frees the memory ufmGetBitmap allocated for one or more data structures of the type ufmBitmap. When ufmGetBitmap allocates an array of one or more data structures of the type ufmBitmap, it returns the number of allocated data structures (nCharBitmaps) and the address of that array (charBitmaps). When you are finished with that array, you can free it by calling ufm...
ufmFreeCharMetrics frees the memory ufmGetCharMetrics allocated for one or more data structures of the type ufmCharMetrics. When ufmGetCharMetrics allocates an array of one or more data structures of the type ufmCharMetrics, it returns the number of allocated data structures (nCharMetrics) and the address of that array (charMetrics). When you...
ufmFreeExactOutline frees the memory ufmGetExactOutline allocated for one or more data structures of the type ufmExactOutline. When ufmGetExactOutline allocates an array of one or more data structures of the type ufmExactOutline, it returns the number of allocated data structures (nOutlines) and the address of that array (outlines). ...
ufmFreeFontInfo frees the memory ufmGetFontInfo allocated for a data structure of the type ufmFont. When ufmGetFontInfo allocates a data structure of the type ufmFont, it returns the address of that data structure (font). When you are finished with that data structure, you can free it by calling ufmFreeFontInfo with the addr...
ufmFreeTypefaceInfo frees the memory ufmGetTypefaceInfo allocated for a data structure of the type ufmTypeface. When ufmGetTypefaceInfo allocates a data structure of the type ufmTypeface, it returns the address of that data structure (typeface). When you are finished with that data structure, you can free it by calling ufm
ufmFreeTypefaceList frees the memory ufmGetTypefaceList allocated for an array of the data structures of the type ufmTypeface. When ufmGetTypefaceList allocates an array of the data structures of the type ufmTypeface, it returns the number of allocated data structures (nTypefaces) and the address of that data structure (typefaces). W...
ufmFreeTypefaceMetrics frees the memory ufmGetTypefaceMetrics allocated for a data structure of the type ufmTypefaceMetrics. When ufmGetTypefaceMetrics allocates a data structure of the type ufmTypefaceMetrics, it returns the address of that data structure (typefaceMetrics). When you are finished with that ...
ufmFreeVectorOutline frees the memory ufmGetVectorOutline allocated for one or more data structures of the type ufmVectorOutline. When ufmGetVectorOutline allocates an array of one or more data structures of the type ufmVectorOutline, it returns the number of allocated data structures (nOutlines) and the address of that arra...
ufmGetBitmap gets bitmaps for specified characters. You can get a character bitmap only for those typefaces for which bitmap or outline font files were found, that is, those typefaces which have the bit ufmTypefaceBitmaps set to 1 in their data structures of the type ufmTypeface. nTypefaceHandles specifies the number of entries (typeface handles) in the array typefaceHandles. typefaceHandles specifies one or more handles for open typefaces. Use the function
ufmGetCharMetrics gets the scalable metrics for specified character codes from font metric files. If ufmGetCharMetrics does not find the metrics for a specified character code, it returns the metrics for the default character. Set nCharCodes to 0 if you want to get character metrics for all characters in a specified typeface. You can get scalable character metrics only for those typefaces which ...
ufmGetCharMetricsByName gets the scalable metrics for specified character names or CID codes (character id codes for CID-keyed fonts) from font metric files. You can get scalable character metrics only for those typefaces which have the flag scalableMetrics set to 1 in their ufmTypeface data structures, that is, for those typefaces for which font metric files were found. nTypefaceHandles specifies the number of entries (typefac...
ufmGetExactOutline gets exact outlines for specified characters. You can get a character outline only for those typefaces which have the flag scalableMetrics set to 1 in their ufmTypeface data structures, that is, for those typefaces for which outline font files were found. nTypefaceHandles specifies the number of entries (typeface handles) in the array typefaceHandles. typefaceHandles is an array of handles for open typefaces. That array mus...
ufmGetFontInfo gets the information for a specified font. typefaceHandle specifies the handle for an open typeface. Use the function ufmOpenTypeface to open a typeface, and get a handle for that typeface. pixelSize specifies a font size in pixels. If you want to get the information for the outline font in a specified typeface, then specify 0 for the font pixel size. ufmGetFontI...
ufmGetFontPath gets the current Universal Font Manager (UFM) font path. ufmGetFontPath uses the argument fontPath to return a pointer to a nullterminated character string that represents the current UFM font path. That path is used by UFM to find font files. If an error is detected, ufmGetFontPath sets that pointer to NULL. The UFM font path contains one or more full-path...
ufmGetTransformedBitmap gets transformed bitmaps for specified characters. You can get a character bitmap only for those typefaces for which bitmap or outline font files were found, that is, those typefaces which have the bit ufmTypefaceBitmaps set to 1 in their data structures of the type ufmTypeface. nTypefaceHandles specifies the number of entries (typeface handles) in the array typefaceHandles. typefaceHandles specifies one...
ufmGetTypefaceInfo gets the information for a specified typeface or font family, such as Helvetica. typefaceHandle specifies the handle for an open typeface. Use the function ufmOpenTypeface to open a typeface, and get a handle for that typeface. ufmGetTypefaceInfo uses the argument typeface to return a pointer to a data structure of the type uf...
ufmGetTypefaceList gets a list of available typefaces that satisfy specified requirements. By default, ufmGetTypefaceList gets a list of all available typefaces. propertiesMask has a bit flag for each property that can be used to select typefaces, such as the ufmFoundry, ufmFamilyName and ufmRelativeWeight properties. This mask is used to specify which properties should be used to produce ...
ufmGetTypefaceMetrics gets scalable metrics for a specified typeface from a font metric file. You can get scalable metrics for only those typefaces that have the flag scalableMetrics set to 1 in their typeface data structures, that is, for only those typefaces for which metric files were found. typefaceHandle specifies the handle for an open typeface. Use the function ufmOpenTypeface to op...
ufmGetVectorOutline gets vector outlines for specified characters. You can get a character outline only for those typefaces which have the flag scalableMetrics set to 1 in their ufmTypeface data structures, that is, for those typefaces for which outline font files were found. nTypefaceHandles specifies the number of entries (typeface handles) in the array typefaceHandles. typefaceHandles is an array of handles for open typefaces. That arra...
ufmGetVersion returns the major and minor version numbers of the Universal Font Manager (UFM). These numbers can be used to check whether a particular UFM feature is available. Since a program can be dynamically linked with various versions of UFM, it should check whether the UFM version numbers are sufficiently high to provide a function that was not supported in Version 1.0 of UFM. ufmGetVersion uses the argument maj...
ufmOpenTypeface opens a specified typeface, and returns a handle for that typeface. When you are finished with that typeface, use the function ufmCloseTypeface to close it. typefaceName specifies the name of a typeface. If you are not sure what to specify, get a list of name of available typefaces by calling the function ufmGetTypefaceList. ufmOpenTypeface use...
ufmSetFontPath specifies a new value for the Universal Font Manager (UFM) font path in the form of a null-terminated string of characters. If you specify a character string of length zero or a null pointer, ufmSetFontPath will set the UFM font path to its default value. Specify either a null-terminated string of characters or a null pointer for the argument fontPath. You must specify full-path names of font direc...
ungetc inserts the character c into the buffer associated with an input stream. Pushed-back characters will be returned by subsequent reads on that stream in the reverse order of their pushing. A successful intervening call (with the stream pointed to by stream) to a file positioning function (fseek(3S), fsetpos(3S) or rewind(3S)), discards any pushed-back characters. The external storage corresponding to the stream is unchanged. A successful call to ungetc clears the end-of-file indicator for t...
ungetwc inserts the wchar_t character c into the buffer associated with the input stream. That character, c, will be returned by the next getwc call on that stream. ungetwc returns c. One character of pushback is guaranteed, provided something has already been read from the stream and the stream is actually buffered. If c equals (wchar_t)EOF, ungetwc does nothing to th...
UNIVERSAL is the base class which all bless references will inherit from, see the perlobj manpage UNIVERSAL provides the following methods isa ( TYPE ) isa returns true if REF is blessed into package TYPE or inherits from package TYPE. isa can be called as either a static or object method call. can ( METHOD ) can checks if the object has a method called METHOD. If it does then a reference to the sub is returned. If it does not then undef is returned. can can be called as either a static or objec...
This command doesn't actually exist as part of Tcl, but Tcl will invoke it if it does exist. If the Tcl interpreter encounters a command name for which there is not a defined command, then Tcl checks for the existence of a command named unknown. If there is no such command, then the interpreter returns an error. If the unknown command exists, then it is invoked with arguments consisting of the fully-substituted name and arguments for the original non-existent command. The unknown command typica...
The function unlockpt() clears a lock flag associated with the slave pseudo-terminal device associated with its master pseudo-terminal counterpart so that the slave pseudo-terminal device can be opened. fildes is a file descriptor returned from a successful open of a master pseudo-terminal device.
Unregisterhost sends an host name unregister request to registrar(1M) on NIS master via the yp_update(3R) call. After successfully completed, the host name will no longer be in the NIS hosts database and its Internet address is freed. This routine should be used only when NIS is enabled in the network. The arguments for the routine are: name The host name of the entry to be deleted. passwd The root password of NIS master. If the NIS master does not have root password, simply pass a NULL. Unregis...
This command removes one or more variables. Each name is a variable name, specified in any of the ways acceptable to the set command. If a name refers to an element of an array then that element is removed without affecting the rest of the array. If a name consists of an array name with no parenthesized index, then the entire array is deleted. The unset command returns an empty string as result. An error occurs if any of the variables doesn't exist, and any variables after the non-existent one ...
This command is used to bring the entire application world ``up to date.'' It flushes all pending output to the display, waits for the server to process that output and return errors or events, handles all pending events of any sort (including when-idle handlers), and repeats this set of operations until there are no pending events, no pending when-idle handlers, no pending output to the server, and no operations still outstanding at the server. If the idletasks keyword is specified as an argu...
All of the arg arguments are concatenated as if they had been passed to concat; the result is then evaluated in the variable context indicated by level. Uplevel returns the result of that evaluation. If level is an integer then it gives a distance (up the procedure calling stack) to move before executing the command. If level consists of # followed by a number then the number gives an absolute level number. If level is omitted then it defaults to 1. Level cannot be defaulted if the first command...
This command arranges for one or more local variables in the current procedure to refer to variables in an enclosing procedure call or to global variables. Level may have any of the forms permitted for the uplevel command, and may be omitted if the first letter of the first otherVar isn't # or a digit (it defaults to 1). For each otherVar argument, upvar makes the variable by that name in the procedure frame given by level (or at global level, if level is #0) accessible in the current procedure...
uscas emulates a hardware compare and swap instruction. It works on both single and multi-processor machines. The exact algorithm used depends on the chip and system type. uscas checks that the contents of destp are equal to old and if they are, atomically changes the contents of destp to new. If the contents are not the same, a zero is returned and the operation may be repeated. Note that even with one process performing this algorithm, the compare and swap operation may fail, so the caller mus...
usclosepollsema detaches the file descriptor associated with sema. In addition to closing the caller's file descriptor, it invalidates and closes any file descriptors used by other processes using the same semaphore and in the same share group as the caller (assuming of course that the share group is sharing file descriptors). usclosepollsema will fail if one or more of the following are true: [EBADF] The file descriptor for the semaphore has somehow been already invalidated. This implies a cor...
usconfig is used to configure the use of semaphores and locks. Some of these options set configurable parameters to be used on the next usinit(3P), others give back information about a particular arena. In the discussion below, arguments to usconfig are numbered starting from 1, thus the first argument refers to cmd. Many of the options require an arena pointer which is the value returned by a successful call to usin
uscpsema attempts to acquire the semaphore specified by sema. If the semaphore is not available (its count is less than zero), uscpsema returns immediately with an indication that the semaphore is not available.
usctllock provides a variety of lock control operations as specified by cmd. Metering and debugging information is available only for locks allocated from an arena with a lock type of either US_DEBUG or US_DEBUGPLUS (see usconfig(3P)). Some cmds take a third argument referred to below as arg. The following cmds are available: CL_METERFETCH Fills the lockmeter_t structure pointed to by arg with the metering data associated with lock. CL_METERRESET Reinitializes the lockmeter_t structure associate...
usctlsema provides a variety of semaphore control operations as specified by cmd. The following cmds are available: CS_METERON Enable metering for the semaphore specified by sema. The metering information gathered consists of the number of uspsema and uscpsema calls, the number of times the semaphore could immediately be acquired, the number of usvsema calls, the number of times usvsema was called and no process was queued waiting, the current number of processes waiting on the semaphore, and th...
usdumplock dumps information about lock in a readable form. This information is written to the file descriptor given by fd. The information printed includes where in memory the lock resides, whether it is locked or free, and the metering and debugging information (see usctllock(3P)). The argument str is simply printed as a string, and can be used to aid in identifying where usdumplock was called from....
usdumpsema dumps information about sema in a readable form. This information is written to the file descriptor given by fd. The information printed includes where in memory the semaphore resides, what its count is, and the metering and debugging information (see usctlsema(3P)). The argument str is simply printed as a string, and can be used to aid in identifying where usdumpsema was called from.
This module's default exports override the core getgrent(), getgruid(), and getgrnam() functions, replacing them with versions that return "User::grent" objects. This object has methods that return the similarly named structure field name from the C's passwd structure from grp.h; namely name, passwd, gid, and members (not mem). The first three return scalars, the last an array reference. You may also import all the structure fields directly into your namespace as regular variables using the ...
This module's default exports override the core getpwent(), getpwuid(), and getpwnam() functions, replacing them with versions that return "User::pwent" objects. This object has methods that return the similarly named structure field name from the C's passwd structure from pwd.h; namely name, passwd, uid, gid, quota, comment, gecos, dir, and shell. You may also import all the structure fields directly into your namespace as regular variables using the :FIELDS import tag. (Note that this stil...
usfreepollsema frees the previously allocated pollable semaphore (via usnewpollsema(3P)) specified by sema. Before freeing a pollable semaphore all the file descriptors acquired for the semaphore must be closed. For processes in a single share group, all of which are sharing file descriptors, if one process calls usclospollsema(3P), all the file descriptors for all processes will be closed. If there are processes in the share group that are not sharing f...
usfreesema frees the previously allocated semaphore (via usnewsema(3P)) specified by sema. Semaphores allocated via usnewpollsema(3P) should be freed using usfreespollsema(3P).
When unrelated processes decide to share an arena, it is often useful to be able to initially communicate the location of various data structures within the arena. A single word (doubleword in 64 bit mode) communication area is available inside the arena header block, accessible via the functions usgetinfo and usputinfo. Thus, a process that sets up the arena can initialize various locks, semaphores, and common data structures, and place a single pointer that any process that joins the arena can...
usinit is used to initialize a shared arena from which related or unrelated processes may allocate and share semaphores, locks and memory. Locks, semaphores and memory can then be allocated using the usptr_t returned by usinit. More than one call can be made to usinit to create separate arenas of locks and semaphores. In fact, calls to usinit may be made on behalf of a process: when sproc(2) is called, an aren...
usinitlock initializes the lock specified by lock. All previous information associated with the lock (metering, debugging) is reinitialized. usinitlock should only be used for previously allocated locks. Locks are allocated using usnewlock(3P). usinitlock will cause unpredictable results if lock does not point to a valid lock.
usinitsema initializes the semaphore specified by sema. The count of the semaphore is set to the value specified by val. A value of 0 implies no available resources, and the first process that attempts a 'P' operation (via uspsema) will block. This can be viewed as a synchronizing semaphore, since the goal is to always have a process block until another has completed an operation that the first process requires. Positive values for val can be used for tracking a collection of resources. The si...
The usleep() function suspends the current thread from execution for the number of microseconds specified by the seconds argument. Because of other activity, or because of the time spent in processing the call, the actual suspension time may be longer than the amount of time specified. The seconds argument must be less than 1,000,000. If the value of seconds is 0, the call has no effect. The usleep() function uses the high resolution sleep function: nanosleep() to suspend execution of a thread....
These routines provide a simple general-purpose memory allocation package that allows the user to allocate from a shared arena (see usinit(3P)). All these functions are MP safe, multiple threads/processes may access them simultaneously and are guaranteed correct behavior. More than one call can be made to usinit(3P) to set up separate malloc arenas. The file name passed to usinit(3P) is used as a key to allow shared arenas to be created for use amongst unrelated processes. Once the arena is set ...
usnewlock allocates a lock from the arena designated by handle (returned from usinit(3P)) and initializes it and all associated data. There are different types of locks; by default the fastest lock type for the class of machine the process is running on is allocated. See usconfig(3P) for other specifiable lock types. Metering and debugging are only enabled if the locks are of the debugging type (see usconfig(3P). There is a limit of a maximum of 4096 locks per shared area (for hardware supported...
usnewpollsema allocates a semaphore and initializes its count to the value specified by val. Initially, metering and debugging are off (and can be turned on through a call to usctlsema(3P)) and the history logging mechanism is set according to the global setting (see usconfig(3P)). The semaphore is allocated from the shared arena designated by handle as returned from usinit(3P). Pollable semaphores never block the caller. If the semaphore is unavailable when uspsema(3P) is called, the caller is ...
usnewsema allocates a semaphore and initializes its count to the value specified by val. Initially, metering and debugging are off (and can be turned on through a call to usctlsema(3P)) and the history logging mechanism is set according to the global setting (see usconfig(3P)). The semaphore is allocated from the shared arena designated by handle as returned from usinit(3P). A semaphore allocated via usnewsema is a blocking semaphore - if the semaphore is unavailable, the caller will block. A po...
usopenpollsema attaches a file descriptor to a pollable semaphore. The returned file descriptor is used when calling poll(2) or select(2) to acquire the semaphore after an unsuccessful uspsema(3P). If the caller is the first process to call usopenpollsema on sema then a new semaphore device is allocated (see usema(7M)). The user and group id of the semaphore device take on the effective user/group id of the caller. The access mode is set to acc(see chmod(2)). Calls to usopenpollsema on the same ...
uspsema decrements the count of the previously allocated semaphore specified by sema. If the count is then negative, the semaphore will logically block the calling process until the count is incremented due to a usvsema(3P) call made by another process. The count can be interpreted in the following way: if it is greater than zero, there are 'count' resources available, namely 'count' processes can call uspsema and not block; if the count is negative then the absolute value of count is the nu...
This set of routines provide a standard test and set facility. If the lock is free then it is atomically locked, and control is returned to the caller. If the lock is already locked, the caller either spins waiting for the lock or gets queued. The locks are based in user address space thus avoiding any system call overhead in the case where the lock is available. The actual algorithm used to implement these functions depends on whether the system is a multiprocessor or a single processor. In the...
This set of routines provide a standard test and set facility. If the lock is free then it is atomically locked, and control is returned to the caller. If the lock is already locked, the caller either spins waiting for the lock or gets queued. The locks are based in user address space thus avoiding any system call overhead in the case where the lock is available. The actual algorithm used to implement these functions depends on whether the system is a multiprocessor or a single processor. In the...
usvsema increments the count associated with sema. If there are any processes queued waiting for the semaphore the first one is awakened. usvsema uses the usema(7M) device to reactivate a suspended process. If the process to be awoken is no longer alive, usvsema will automatically attempt to awaken the next process waiting for the semaphore. In order to use a semaphore, the caller must have joined the shared arena out of which the semaphore is allocated (via usinit(3P)), and have a file descript...
The utimes call uses the "accessed" and "updated" times in that order from the tvp vector to set the corresponding recorded times for file. The caller must be the owner of the file or the super-user. The "inodechanged" time of the file is set to the current time. This routine emulates the 4.3BSD utimes system call.
Universal Unique Identifiers are bit strings that may be generated independently on separate nodes (hosts) such that globally unique strings result without requiring the hosts to be in communication with each other to ensure uniqueness. They are a component of DCE that have been independently reimplemented in IRIX, but is in accordance with the DCE specification. This implementation is API compatible with the DCE implementation. The status parameter in all functions is set to uuid_s_ok if the fu...
vector expects a 2, 3, or 4 element array, depending on whether you call the v2, v3, or v4 version of the routine. The elements of the array are the coordinates of the vertex (point) that you want to transfer to the graphics pipe. Put the x coordinate in element 0, the y coordinate in element 1, the z coordinate in element 2 (for v3 and v4), and the w coordinate in element 3 (for v4).
The validateproj function checks to see if user user is authorized for project proj. If so, the project ID corresponding to proj is returned. The fvalidateproj function is a variant of validateproj that uses a PROJ token to make it more efficient for repeated use. Otherwise its operation is identical. For more details on creating a PROJ token, see openproj(3C).
These utilities are used to provide f77 support for subroutines with variable number of arguments. In order to use these utilities, all variable argument subroutines must be declared in each source file before they are referenced or defined. This is done by adding a $varargs compiler directive at the beginning of the source file. For example: $varargs vasub1 vasub2 vasub3 where vasub1, vasub2, and vasub3 are the names of the variable argument subroutines which are referenced or defined in the cu...
This will predeclare all the variables whose names are in the list, allowing you to use them under "use strict", and disabling any typo warnings. Unlike pragmas that affect the $^H hints variable, the use vars and use subs declarations are not BLOCK-scoped. They are thus effective for the entire file in which they appear. You may not rescind such declarations with no vars or no subs. Packages such as the AutoLoader and SelfLoader that delay loading of subroutines within packages can create pro...
cmd expects a command value which initiates a command transfer sequence on a video peripheral. The valid command tokens are: VP_INITNTSC_COMP initialize the Live Video Digitizer for a composite NTSC video source. VP_INITNTSC_RGB initialize the Live Video Digitizer for a RGB NTSC video source. VP_INITPAL_COMP initialize the Live Video Digitizer for a composite PAL video source. VP_INITPAL_RGB initialize the Live Video Digitizer for a RGB PAL video source....
The IRIS Video Library (VL) provides a software interface for working with video devices and image data. It provides a programming interface to the various SGI video products.
In various libraries on SGI systems such as the Video Library (VL), Unadjusted System Times (USTs) are used to indicate the time at which video fields or frames cross a jack (electrical input or output of the machine). Those USTs label a single point in time, yet the video field or frame occupies a sizeable range of time. Therefore, we must define a point, within the video waveform, which a video UST labels. This point is known as the video "synchronization point." The following rules define t...
left is the x coordinate of the viewport left side. right is the x coordinate of the viewport right side. bottom is the y coordinate of the viewport bottom. top is the y coordinate of the viewport top.
#include PUBLIC PROTOCOL SUMMARY Constructor/Destructor VkColorChooserDialog(const char*); virtual ~VkColorChooserDialog(void); Manipulating the Colors XColor* getXColor(void); void setXColor(unsigned short, unsigned short, unsigned short); void setCurrentXColor(unsigned short, unsigned short, unsigned short); void setStoredXColor(unsigned short, unsigned short, unsigned short); The following functions do not follow the X model. They accept and return rgb values in th...
This abstract base class manages a list of cursors and supports functions for cycling through the list. It is used as the basis of VkBusyCursor, which provides a sequence of animated busy cursors. To add alternate busy cursors to a ViewKit application, one can subclass VkCursorList, provide the desired sequence of Cursors, and install the new class with the VkApp object.
EZ& operator=(int); EZ& operator=(float); EZ& operator=(const char *); Assignment operators assign integer, floating point, and character values to a widget. For example: EZ(text) = 12345; This example displays the integer 12345 in a text field. The following list describes the behavior of the integer assignment operator for each widget that supports it. XmToggle, XmToggleButtonGadget If the specified value is zero, turns the toggle off; if the specified value is non-zero, turns the toggle on Xm...
VkFormat passes its arguments to vsprintf, which writes to a buffer that is owned by VkFormat. What is written must not exceed BUFSIZ, as defined by stdio.h. The caller must not attempt to free the buffer returned by VkFormat. The buffer contents remain valid only until the next call to VkFormat. In particular, the buffer will remain valid across function calls only as long as those functions, and anything they call, do not also use VkFormat. (libvk uses its own internal ...
if an application wants to provide help its own way, everything is still automatic if the application is linked with a library that provides entry points that match the SGI help library. The help entry points are weak symbols in libvk, and must not be weak symbols in the application's help library. Because of the way the loader works (9/96), you must be careful that your help routines actually get loaded: o If your help library is a DSO, there is not problem. o If your help library is an archiv...
VkListSearch is a utility class for implementing incremental search within a Motif scrolled list (XmScrolledList or SgScrolledList) or within a custom list-like widget. It takes a Motif text widget and a Motif list, and transparently implements the search behavior.
VkMsgClient is the normal way application code interacts with the message facility. There are methods for sending and receiving messages, installing message actions, and registering interest in message patterns.
VkNameList provides a convenient way to maintain a list of character strings. Strings can be added or removed individually, the list can be sorted or reversed, duplications can be removed, the best completion of a substring can be found, the most common occurrence can be computed, and so on. The list can also be automatically converted to a XmStringTable, making this a useful class for use with Motif widgets that require a list of compound strings. Some of the VkNameList operators allocate memor...
The VkOlNode is an utility class for VkOutline, VkOutlineASB components. In addition to being helpful as a node in the outline tree, it provides ways for outline components to manage opening, closing, display attribute setting and searching. Some public methods documented here can be used by derived class implementors for VkOutline, VkOutlineASB. They can also be helpful to users of VkOutline::walkAllKeywords. A VkOlNode has a display string (name), a key used in searching and a hook - user defi...
Widget w -- used by libXpm to derive necessary visual information. char **xpmPixmapDesc, **xpmInsensitivePixmapDesc -- is an xpm programmatic description. char *xpmBufferOrFile, *xpmInsensitiveBufferOrFile -- is a character string that is an xpm description in a buffer, or else a file name. char **resources -- specifies the resource to be set, such as XmNlabelPixmap or XmNselectPixmap. The default is XmNlabelPixmap....
This package is a set of functions that can be used to generate time-stamped traces from within ViewKit applications. Traces are normal ASCII files, intended for human perusal. For normal VkApp applications, the user must insert all calls into the source, including initialization from within the application. For VkMsgApp applications, initialization, and some calls are already present. GLOBAL VARIABLE CONTROLS Tracing is controlled by global variables that should be set as early as possible with...
Dealing with the interaction between widgets and X11 visuals can get complicated. Some applications either get it wrong, or else stick with the default visual when another would be more appropriate. Code, even library code, that assumes default visual attributes is commonplace. Such an assumption is especially bad in a library, because libraries must work with applications that use non-default visuals. VkVisual() makes it easy for an application to set up the X11 visual information it needs. Usi...
The VkWidgetList class provides a convenient way to maintain and manipulate lists of widgets. Widgets can be added and removed from the list, or accessed by index. The VkWidgetList adds a destroyCallback to each added widget to maintain the integrity of the list when widgets are destroyed.
svr Specifies the server handle. path Specifies the path handle. node Specifies the node handle. buffer Specifies the buffer handle. advice Specifies the advice for the buffer.
svr Specifies the video server. fd a file descriptor that can be used with select(2). handler Pointer to a function to handle data valid on the file descriptor. pendingFunc Pointer to a function that will tell whether there is data that has been read from the file descriptor, but not passed to a handler function. If this is null, no data will be checked for before entering select(2). clientData Data for the use of the client callback. path The path for which a callback will be invoked, of VL_ANY...
vlCreateBuffer creates and returns a handle to a buffer which can then be registered with a path and used to send or receive video data. A VLBuffer consists of a list of frame-sized regions of memory each with an associated header block. Buffers are needed for transferring data to or from memory nodes. To receive a frame, the reader calls one of vlGetNextValid or vlGetLatestValid , and to free that frame calls vlPutFree. To send a frame, the writer calls vlGetNextFree, copies the data to be sent...
svr Specifies the server handle. vlDev Specifies the device handle. path Specifies the path handle. source Specifies the source node. drain Specifies the drain node.
vlDMBufferGetValid returns a valid DMbuffer containing video data from the specified node and path. This call is used in video capture-type applications where a path is set up to route image data from a source video device node to drain memory node. The buffer that is returned contains one video image, either a field or a frame. dmBufferMapData can be used to get a pointer to the image in the buffer. The contents of the buffer should not be modified. vlDMBufferPutValid takes a valid DMbuffer and...
vlDMBufferSend puts the DMbuffer on the specified paths output drain queue. Care must be taken not to overflow this queue by adding buffers faster than the video library can dequeue them and send them out. This call should be synchronized with VLTransferComplete events from the path which indicates a buffer has been sent out.
vlDMGetParams queries the video subsystem for a list of parameters describing the characteristics of a specified node and path. This parameter list is required to create a DMbufferpool which can be used for video transfers on the same path and memory node. vlDMGetParams should be called after dmBufferSetPoolDefaults(3dm) and before dmBufferCreatePool(3dm).
vlDMPoolGetParams queries the video library for the parameters required to create a DMbufferpool which can be used for video transfers on the specified path and memory node. This routine should be called after dmBufferSetPoolDefaults(3dm) and before dmBufferCreatePool(3dm). vlDMPoolRegister associates the DMbufferpool with the given path and node. This is only necessary for paths where video is the source and memory is the drain. This call should be made before any transfer has begun on the spec...
vlPathGetFD returns the file descriptor associated with the specified path. This FD can be used in conjuction with a select(2) call for notification that events are available for the path. vlEventRecv returns the next event queued on the specified path. If no event is available vlEventRecv returns -1 and sets vlErrno to VLAgain. If the event is a VLTransferComplete event from a video source to a memory drain, the event will have a DMBuffer associated with it. This buffer must be obtained and rel...
svr Specifies the server handle. path Specifies the path handle. node Specifies the node to get connection information from. port Specifies the port to get connection information from. nodelist portlist On return, (nodelist[i], portlist[i]) specify the source or target connections to (node, port). n On entry, n points to an integer value specifying the size of the nodelist and portlist arrays. On exit, n is updated to reflect the actual number of connections returned....
svr The handle for the video server to use. path Specifies a handle to the path. node Specifies the node on which the control resides (VL_ANY specifies any node) value Specifies a pointer the control's values or return values. type Specifies the control type, as defined in
svr Specifies the video server handle. path Specifies the path of interest. node Specifies the source or drain of interest. May be VL_ANY if either a source or drain control is acceptable, or if the control is not associated with either a source or drain. type Specifies the control type of interest. info Specifies a pointer to a VLControlInfo structure which was previously allocated by vlGetControlInfo....
svr Specifies the server. path Specifies the path. list Specifies a pointer to a VLControlList structure which was previously allocated by vlGetControlList.
If vlGetDeviceList is supplied with a pointer to a VLDevList struct, it fills in the struct with a list of available devices. The device information includes the number of devices available, and an array of VLDevice structs, each of which describes a device. The VLDevice struct contains the index of that device, the device name, the number of nodes available and a list of VLNodeInfo structs, describing the available nodes. The device names returned may be mapped to video products as follows: vin...
server expects the VL server to use path expects the VLPath for which you want a filled count node expects the VL_MEM VLNode on the path buffer expects the VLBuffer on the VLPath for which you want a filled count
server expects the VL server to use path expects the VLPath for which you want a frontier MSC memNode expects the VL_MEM VLNode on the VLPath for which you want a frontier MSC
vlGetActiveRegion returns a pointer to the video frame data. The region is determined by the settings of the VL_OFFSET controls. The default is the region of valid video data. vlGetDMediaInfo returns a pointer to a DMediaInfo struct containing general information. vlGetImageInfo returns a pointer to a DMImageInfo struct containing image specific info. vlGetLatestValid returns the info struct of the most recently received frame. vlGetNextFree returns the info struct of the next free buffer. vlGet...
vlGetNode returns a handle to a VL node with the specified characteristics. The node handle can be used in subsequent calls to vlCreatePath(3dm) or vlSetControl(3dm). Nodes are used to construct paths which tell the system how to interconnect video data streams. The source and drain of a video stream, as well as intermediate filters affecting data flowing between them, are types of nodes. A path may have multiple drain nodes, and in some cases, multiple source nodes. Nodes have various controls ...
server expects the VL server to use path expects the VLPath for which you want a path delay node1 expects the VLNode (usually a VL_VIDEO or VL_SCREEN node) representing the first jack in which you are interested port1 VLPort for that node (VL_ANY for default port) node2 same, for second jack in which you are interested port2 VLPort for that node (VL_ANY for default port)
vlGetString returns a pointer to a static string describing some aspect of the current VL connection. This string must be free'd by the caller. The name parameter must be the following: VL_EXTENSIONS Returns a space-separated list of supported extensions to VL.
server expects the VL server to use path expects the VL path containing the jack in which you are interested jackNode expects the VLNode (usually a VL_VIDEO or VL_SCREEN node) representing the jack in which you are interested. jackPort VLPort for that node (VL_ANY for default port) memNode expects the VL_MEM VLNode representing the buffer for which you want a UST/MSC pair. returnedPair expects a pointer to memory in which to return a UST/MSC pair...
server expects the VL server to use path expects the VLPath for which you want ust_per_msc memNode expects the VL_MEM VLNode for which you want ust_per_msc
given Specifies the fraction to be checked. In the case of vlMatchFloat it is a double, and in the others it is a pointer to a fraction. ranges Specifies the fraction range list to be compared against. nranges Specifies the number of fraction ranges in the list. lower Returns the nearest lower or equivalent fraction in the range. Page 1 VLMATCHFLOAT(3dm) VLMATCHFLOAT(3dm) higher Returns the nearest higher or equivalent fraction in the range. index_return Returns the index of lower....
vlRegisterBuffer associates the buffer with the given path and node. This should be done before any transfer is begun on a node that requires a ring buffer. vlDeregisterBuffer removes a registered buffer from the specified node and frees any resources associated with it. A buffer must not be deregistered while a transfer using it is in progress, as this will terminate the transfer and may have undesirable side effects....
svr Specifies the server handle. path Specifies the path handle. srcnode Specifies the source node. srcport Specified the port on the source node drnnode Specifies the drain node. drnport Specifies the port on the drain node preempt Specifies whether paths may be preempted to establish the connection
svr The handle for the video server to use. path Specifies a handle to the path. targetNode Specifies the node on which the control resides (VL_ANY specifies any node) triggerType Specifies the type of trigger used to trigger the control change. triggerData Specifies data specific to the given triggerType used to trigger the control change. refNode Specifies the memory node which provides the source of video fields type Specifies the control type, as defined in value Specifies a po...
svr Specifies the server. paths Specifies paths. count Specifies number of paths. ctrlUsage Specifies usage of controls. streamUsage Specifies usage of streams.
svr Specifies the video server. path Specifies the path. count Specifies the number of transfer descriptors in the array passed. If count = 0 then the continuous mode transfer operations are used. Transfers will continue using ring buffers, if necessary, until vlEndTransfer is called. xferDesc If count is non-zero, then xferDesc is an array of transfer descriptors. Each element of the array can specify a discrete, continuous, or automatic transfer. The contents of a descriptor are described belo...
This API has been supplanted by a cross-platform API for video and DMbuffers. It is supported for backwards compatibility only. Please see vlintro(3dm). The VL Event Receive extension provides a mechanism for video applications to send and receive DMbuffers on the O2 system. These buffers can be used to move images between software subsystems, such as dmIC and OpenGL (see glIntro(3G)), without copying any data. The VL Event Receive extension consists of the following function calls: vlPathGetFD(...
vl_camera.h header file provides a machine independent interface to basic video camera controls. These controls can be used via the video library using the vlGetControl and vlSetControl function calls. Cameras currently supported are the IndyCam and DVC1. VL_CAMERA_VENDOR_ID (Vendor ID) This read-only controls returns the vendor ID string for the camera. The "SGI Digital Video Camera" string is prepended to all SGI cameras. VL_CAMERA_VERSION (Camera Version) Returns the Camera Version number. ...
These routines form the API for accessing the DMA engine on the VMEbus service provider. These routines are included in a program by compiling with the -ludma option. Currently, the API is supported on Origin and Onyx2 systems. vme_dma_engine_handle_alloc() allocates a handle of the DMA engine by the given pathname. If users specify VME_DMA_ENGINE_DEBUG in the flags field, more integrity checking will be done in the operations on the DMA engine. If the call is successful, the handle of the DMA e...
vprintf, vfprintf, vsnprintf, and vsprintf are the same as printf, fprintf, snprintf, and sprintf respectively, except that instead of being called with a variable number of arguments, they are called with an argument list, arg, as defined by stdarg(5). The arg parameter must be initialized by the va_start macro (and possibly subsequent va_arg calls). The vprintf, vfprintf, vsnprintf, and vsprintf functions do not invoke the va_end macro....
These two routines are fully described in wait(2). When BSD compatibility mode is enabled (via the definition of _BSD_COMPAT) the only change is in the prototype declaration of these routines in sys/wait.h. Historically, many BSD derived programs pass as the status pointer, a pointer to a union wait, rather than a pointer to int. Since these programs would not properly compile if prototyping was in effect, when BSD compatibility mode is enabled, no prototypes are declared....
If the argument to towupper represents a lowercase letter of the ASCII or supplementary code sets, the result is the corresponding uppercase letter. If the argument to towlower represents an uppercase letter of the ASCII or supplementary code sets, the result is the corresponding lowercase letter. In the case of all other arguments, the return value is unchanged. The table used for translation is generated by wchrtbl(1M)....
wcsftime places wide-character codes into the array pointed to by wcs as controlled by the string pointed to by format. The format string consists of zero or more directives and ordinary characters. All ordinary characters (including the terminating null character) are copied unchanged into the array. For wcsftime, no more than maxsize characters are placed into the array. This function behaves as if the character string generated by str
wcstod returns as a double-precision floating-point number the value represented by the wide-character string pointed to by nptr. This function scans the string up to the first unrecognized character. wcstod recognizes an optional string of ``white-space'' characters [as defined by iswspace in wctype(3S)], then an optional sign, then a string of digits optionally containing a decimal-point character [as specified by ...
The wcstol, wcstoul, wcstoll, and wcstoull functions convert the initial portion of the wide character string pointed to by nptr to long int, unsigned long int, long long int, and unsigned long long int representation, respectively. First these functions decom...
The arguments s1, s2, and s point to wchar_t strings (that is, arrays of wchar_t characters terminated by a wchar_t null character). The functions wcscat, wscat, wcsncat, wsncat, wcscpy, wscpy, wcsncpy and wsncpy all modify s1. These functions do not check for an overflow condition of the array pointe...
These functions classify character-coded wchar_t values by table lookup. Each is a predicate returning nonzero for true, zero for false. The lookup table is generated by wchrtbl(1M). Each of these functions operates on both ASCII and supplementary code sets unless otherwise indicated. iswalpha(c) c is an English letter. iswupper(c) c is an English uppercase letter. iswlower<...
The while command evaluates test as an expression (in the same way that expr evaluates its argument). The value of the expression must a proper boolean value; if it is a true value then body is executed by passing it to the Tcl interpreter. Once body has been executed then test is evaluated again, and the process repeats until eventually test evaluates to a false boolean value. Continue commands may be executed inside body to terminate the current iteration of the loop, and break commands may be...
The functions that the multibyte character library provides for wchar_t string operations correspond to those provided by stdio(3S) as shown in the table below: _____________________________________________________________ character-based byte-based character- and function function byte-based _____________________________________________________________ character I/O getwc getc getwchar getchar fgetwc fgetc ungetwc ungetc putwc putc putwchar putchar fputwc fputc ...
gwid expects the window identifier for the window you want to test. FUNCTION RETURN VALUE The returned value of this function is a number that you can use to determine that stacking order of windows on the screen.
left expects x coordinate of left side of viewing volume. right expects x coordinate of right side of viewing volume. bottom expects y coordinate of bottom of viewing volume. top expects y coordinate of top of viewing volume. -near expects the z coordinate of the near clipping plane. -far expects the z coordinate of the far clipping plane.
The winfo command is used to retrieve information about windows managed by Tk. It can take any of a number of different forms, depending on the option argument. The legal forms are: winfo atom ?-displayof window? name Returns a decimal string giving the integer identifier for the atom whose name is name. If no atom exists with the name name then a new one is created. If the -displayof option is given then the atom is | looked up on the display of window; otherwise it is looked up on | the displa...
orgx expects the x coordinate of the location to which you want to move the current graphics window. orgy expects the y coordinate of the location to which you want to move the current graphics window.
name expects the window title that is displayed on the left hand side of the title bar for the window. If you do not want a title, pass a zero-length string. FUNCTION RETURN VALUE The returned value for this function is the graphics server and window identifier for the window just created. Use this value to identify the graphics window to other windowing functions. Only the lower 16 bits are significant, since a graphics window identifier is the value portion of a REDRAW event queue entry. If no...
x1 expects the x screen coordinate (in pixels) of the first corner of the new location for the current graphics window. The first corner of the new window is the corner diagonally opposite the second corner. x2 expects the x screen coordinate (in pixels) of the second corner of the new location for the current graphics window. y1 expects the y screen coordinate (in pixels) of the first corner of the new location for the current graphics window. y2 expects the y screen coordinate (in pixels) of t...
The wm command is used to interact with window managers in order to control such things as the title for a window, its geometry, or the increments in terms of which it may be resized. The wm command can take any of a number of different forms, depending on the option argument. All of the forms expect at least one additional argument, window, which must be the path name of a top-level window. The legal forms for the wm command are: wm aspect window ?minNumer minDenom maxNumer maxDenom? If minNume...
pack expects a packed integer containing the RGBA (red, green, blue, alpha) values you want to assign as the current write mask. Expressed in hexadecimal, the format of the packed integer is 0xaabbggrr, where: aa is the alpha value, bb is the blue value, gg is the green value, and rr is the red value. RGBA component values range from 0 to 0xFF (255).
wordexp performs word expansions and places the list of expanded words into the structure pointed to by pwordexp. The words argument is a pointer to a string containing one or more words to be expanded. The expansions will be the same as would be performed by the shell if words were the part of a command line representing the arguments to a utility. Therefore, words must not contain an unquoted newline or any of the unquoted shell special characters: | & ; < > except in the ...
wtm expects a mask whose bits control which bitplanes are available for drawing and which are read only. The mask contains one bit per available bitplane. If a bit is set in the writemask, the system writes the current color index into the corresponding bitplane. If a bit is set to zero in the writemask, the corresponding bitplane is read-only.
n expects the number of pixels you want to paint. colors expects an array of color indices. The system reads n elements from this array and writes a pixel of the appropriate color for each.
n expects the number of pixels that you want to paint. red expects an array containing red values for the pixels you paint. You need a red value for each pixel you paint. green expects an array containing green values for the pixels you paint. You need a green value for each pixel you paint. blue expects an array containing blue values for the pixels you paint. You need a blue value for each pixel you paint....
These functions are general purpose internationalized regular expression matching routines to be used in programs that perform regular expression matching. These functions are defined by the wsregexp.h header file. The function wsrecompile takes as input an internationalized regular expression as defined below (apart from the normal regular expressions as defined by regexp) and produces a compiled expression that ca...
The arguments s1, s2, and s point to wchar_t strings (that is, arrays of wchar_t characters terminated by a wchar_t null character). wssize returns the number of wchar_t characters in s, not including the terminating wchar_t null character. wstok treats the wchar_t string s1 as a sequence of zero or more text tokens, separated by spans of one or more w
XERBLA is an error handler for the LAPACK routines. It is called by an LAPACK routine if an input parameter has an invalid value. A message is printed and execution stops. Installers may consider modifying the STOP statement in order to call system-specific exception-handling facilities.
x expects the x coordinate of a point. y expects the y coordinate of a point. z expects the z coordinate of a point. Used only by the 3-D and 4-D versions of the routines; 0.0 is assumed by the others. w expects the w coordinate of a point Used only by the 4-D version of the routines; 1.0 is assumed by the others.
xlate_address does the address translation needed by tools such as dbx(1) and dis(1). If address_in is an address that does not exist in the translation table the identity translation is returned through the pointers and XLATE_TB_STATUS_NO_ERROR is returned by the function. The data structure xlate_block is defined to contain Elf64_Addr xe_new_address; Elf64_Xword x...
These are useful for programs like elfdump(1) to show the actual contents of the register location expressions. These are otherwise very useful. The functions and the values returned throught the pointers are identical except that xlate_reg_instr2 has an extra field in the definition. The extra field, sr_instr_offset, is the byte offset in the register instruction stream of the first byte of the particular register instruction. Aside from the additional field in the structure the functions are i...
This is used to close a handle on an Elf section containing translation information. consumer_table_ptr must be a valid open handle on an xlate consumer section. This releases all memory allocated by the xlate functions for this xlate_table_con (except as documented in calls that certain things must be free(3)d explicitly by the application)....
xlate_get_info is used to get basic values from the xlate section. con_table_ptr must be a valid open translate table handle. The other arguments are pointers passed in and the pointers are used to put values from the translation table header into the pointed-to data objects. See for the header field declarations. The memory that is pointed to by the pointer is what is actually changed. Other than con_table_ptr any of the pointers passed in may be the null pointer (0). xlate_get...
This is used by debuggers to find the pixie(1) shadow registers: registers which in the original non-pixied code were used but the which are now used by pixie. The original registers are now located in memory and the information here lets an app (debugger) find the original register values. The registers referred to here are, at this time, only the integer registers. The cost of calling xlate_get_reg_rule once is approximately the same as of calling xlate_get_all_reg_rules once so it is clearly ...
These are used to get (open) a handle on an Elf section containing translation information. The handle allows one to call any of the consumer functions. it is unspecified which xlate_init_fd takes as arguments: fd is an IRIX file-descriptor which must be open(2) for reading on an Elf object file. open_debug_table indicates which translation section to open. If XLATE_OPEN_STD_TABLE (0), then the first section with sh_type SHT_MIPS_XLATE is opened. If XLATE_OPEN_STD_TABLE (1), then the first secti...
xlate_pro_add_info is used to set values into the xlate data stream. pro_table_ptr must be a valid open producer translate table handle. These values cannot be calculated by the library but must be supplied by the application. If xlate_pro_add_info is not called, 0 will be used as a default value for the corresponding fields of the xlate header in the created byte stream. data_moved Pass in the number of bytes the data section was moved (normally only pixie(1) moves data sections). The value is ...
xlate_pro_add_range is used to put the translation ranges into the xlate data stream. pro_table_ptr must be a valid open producer translate table handle. new_address The low address in a range of text instructions in the output (post-transformation) text. new_range The number of bytes in the range. All byte counts must be a multiple of 4. old_address The low address in a range of text instructions in the input (pre-transformation) text. old_range The number of bytes in the range. All byte counts...
xlate_pro_add_reg_info is used to put register information into the xlate data stream. The register information normally specifies how a debugger or other tool can get to registers which have been copied into shadow register locations so a transforming tool (pixie(1) normally) can use the registers for its own purposes. pro_table_ptr must be a valid open producer translate table handle. op Pass in an frame operation code in the set allowed. An example is DW_CFA_offset_extended. Makes no differen...
This function gets the total size and the number-of-blocks of either the standard or debug stream of data. Following this one calls xlate_pro_disk_block number-of-blocks times to get pointers the blocks of actual data bytes of the byte stream. The library does not write anything to disk. It is up to the application calling the library to write the information to disk (or to do whatever else is appropriate with the byte stream). xlate_pro_disk_header gets the size of the net translation table dat...
This function gets pointers to the blocks making up the stream of data. The xlate functions do not write the stream to disk. Typically the transformation-tool will use libelf to write the bytes to disk. xlate_pro_disk_next_block gets the contents and size of the next block thru the pointer arguments. pro_table_ptr must be a valid open producer translate table handle and xlate_pro_disk_header must have been called to create the byte stream and count the number of blocks.. It is essential that if ...
This is used to close a handle on translation information data. producer_table_ptr must be a valid open xlate producer handle. This releases all memory allocated by xlate routines for this xlate_table_con (except as documented in xlate calls that certain things must be free(3)d explicitly by the application).
These are used to get (open) a handle which assists in producing a translation table section. The functions available do not themselves write anything to disk. Instead they create a byte stream which the calling application can write to an Elf file as appropriate. The handle allows one to call any of the producer functions. xlate_pro_init takes as arguments: returned_table_pointer is a pointer to a producer table handle. If the call to xlate_pro_init is successful, the handle pointed to is set a...
The XTIFFClose() function closes a previously opened extended TIFF file. This function should be called instead of TIFFClose() to close a TIFF object opened with XTIFFOpen() or XTIFFFdOpen().
The XTIFFOpen() and XTIFFFdOpen() open a given TIFF file. For XTIFFOpen(), the file to open is given by filename. Like XTIFFOpen(), XTIFFdOpen() requires the name of the underlying file in filename, but assumes that the file has already been opened by the caller. The descriptor for this opened file is given by fd. The file can be opened for reading, writing or appending as given by mode values of 'r', 'w' or 'a' respectively. The XTIFFOpen() and XTIFFFdOpen() functions differ from their TI...
This package of functions provides an interface to the network information service (NIS) lookup service. The package can be loaded from the library, /usr/lib/libc.so.1. Refer to ypfiles(4) and ypserv(1M) for an overview of the NIS, including the definitions of map and domain , and a description of the various servers, databases, and commands that comprise the NIS. All input parameters names begin with in. Output parameters begin with out. Output parameters of type char ** should be addresses of ...
yp_update() is used to make changes to the NIS database. The syntax is the same as that of yp_match() except for the extra parameter ypop which may take on one of four values. If it is YPOP_CHANGE, then the data associated with the key will be changed to the new value. If the key is not found in the database, then yp_update() will return YPERR_KEY. If ypop has the value YPOP_INSERT, then the key-value pair will be inserted into the database. The error YPERR_KEY is returned if the key already exi...
ZBDSQR computes the singular value decomposition (SVD) of a real N-by-N (upper or lower) bidiagonal matrix B: B = Q * S * P' (P' denotes the transpose of P), where S is a diagonal matrix with non-negative diagonal elements (the singular values of B), and Q and P are orthogonal matrices. The routine computes S, and optionally computes U * Q, P' * VT, or Q' * C, for given complex input matrices U, VT, and C. See "Computing Small Singular Values of Bidiagonal Matrices With Guaranteed High Rela...
planes is the number of bit planes requested to be configured as Z buffer planes. Only positive values are accepted. The default is machine dependent, usually 24 or 32.
ZDRSCL multiplies an n-element complex vector x by the real scalar 1/a. This is done without overflow or underflow as long as the final result x/a does not overflow or underflow.
func expects one of eight possible flags used when comparing z values. The available flags are: ZF_NEVER, the z-buffer function never passes. ZF_LESS, the z-buffer function passes if the incoming pixel z value is less than the z value stored in the z-buffer bitplanes. ZF_EQUAL, the z-buffer function passes if the incoming pixel z value is equal to the z value stored in the z-buffer bitplanes. ZF_LEQUAL, the z-buffer function passes if the incoming pixel z value is less than or equal to the z val...
ZGBBRD reduces a complex general m-by-n band matrix A to real upper bidiagonal form B by a unitary transformation: Q' * A * P = B. The routine computes B, and optionally forms Q or P', or computes Q'*C for a given matrix C.
ZGBCON estimates the reciprocal of the condition number of a complex general band matrix A, in either the 1-norm or the infinity-norm, using the LU factorization computed by ZGBTRF. An estimate is obtained for norm(inv(A)), and the reciprocal of the condition number is computed as RCOND = 1 / ( norm(A) * norm(inv(A)) ).
ZGBEQU computes row and column scalings intended to equilibrate an M-by-N band matrix A and reduce its condition number. R returns the row scale factors and C the column scale factors, chosen to try to make the largest element in each row and column of the matrix B with elements B(i,j)=R(i)*A(i,j)*C(j) have absolute value 1. R(i) and C(j) are restricted to be between SMLNUM = smallest safe number and BIGNUM = largest safe number. Use of these scaling factors is not guaranteed to reduce the condi...
ZGBRFS improves the computed solution to a system of linear equations when the coefficient matrix is banded, and provides error bounds and backward error estimates for the solution.
ZGBSV computes the solution to a complex system of linear equations A * X = B, where A is a band matrix of order N with KL subdiagonals and KU superdiagonals, and X and B are N-by-NRHS matrices. The LU decomposition with partial pivoting and row interchanges is used to factor A as A = L * U, where L is a product of permutation and unit lower triangular matrices with KL subdiagonals, and U is upper triangular with KL+KU superdiagonals. The factored form of A is then used to solve the system of eq...
ZGBSVX uses the LU factorization to compute the solution to a complex system of linear equations A * X = B, A**T * X = B, or A**H * X = B, where A is a band matrix of order N with KL subdiagonals and KU superdiagonals, and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
ZGBTF2 computes an LU factorization of a complex m-by-n band matrix A using partial pivoting with row interchanges. This is the unblocked version of the algorithm, calling Level 2 BLAS.
ZGBTRF computes an LU factorization of a complex m-by-n band matrix A using partial pivoting with row interchanges. This is the blocked version of the algorithm, calling Level 3 BLAS.
ZGBTRS solves a system of linear equations A * X = B, A**T * X = B, or A**H * X = B with a general band matrix A using the LU factorization computed by ZGBTRF.
ZGEBAK forms the right or left eigenvectors of a complex general matrix by backward transformation on the computed eigenvectors of the balanced matrix output by ZGEBAL.
ZGEBAL balances a general complex matrix A. This involves, first, permuting A by a similarity transformation to isolate eigenvalues in the first 1 to ILO-1 and last IHI+1 to N elements on the diagonal; and second, applying a diagonal similarity transformation to rows and columns ILO to IHI to make the rows and columns as close in norm as possible. Both steps are optional. Balancing may reduce the 1-norm of the matrix, and improve the accuracy of the computed eigenvalues and/or eigenvectors....
ZGEBD2 reduces a complex general m by n matrix A to upper or lower real bidiagonal form B by a unitary transformation: Q' * A * P = B. If m >= n, B is upper bidiagonal; if m < n, B is lower bidiagonal.
ZGEBRD reduces a general complex M-by-N matrix A to upper or lower bidiagonal form B by a unitary transformation: Q**H * A * P = B. If m >= n, B is upper bidiagonal; if m < n, B is lower bidiagonal.
ZGECON estimates the reciprocal of the condition number of a general complex matrix A, in either the 1-norm or the infinity-norm, using the LU factorization computed by ZGETRF. An estimate is obtained for norm(inv(A)), and the reciprocal of the condition number is computed as RCOND = 1 / ( norm(A) * norm(inv(A)) ).
ZGEEQU computes row and column scalings intended to equilibrate an M-by-N matrix A and reduce its condition number. R returns the row scale factors and C the column scale factors, chosen to try to make the largest element in each row and column of the matrix B with elements B(i,j)=R(i)*A(i,j)*C(j) have absolute value 1. R(i) and C(j) are restricted to be between SMLNUM = smallest safe number and BIGNUM = largest safe number. Use of these scaling factors is not guaranteed to reduce the condition ...
ZGEES computes for an N-by-N complex nonsymmetric matrix A, the eigenvalues, the Schur form T, and, optionally, the matrix of Schur vectors Z. This gives the Schur factorization A = Z*T*(Z**H). Optionally, it also orders the eigenvalues on the diagonal of the Schur form so that selected eigenvalues are at the top left. The leading columns of Z then form an orthonormal basis for the invariant subspace corresponding to the selected eigenvalues. A complex matrix is in Schur form if it is upper tria...
ZGEESX computes for an N-by-N complex nonsymmetric matrix A, the eigenvalues, the Schur form T, and, optionally, the matrix of Schur vectors Z. This gives the Schur factorization A = Z*T*(Z**H). Optionally, it also orders the eigenvalues on the diagonal of the Schur form so that selected eigenvalues are at the top left; computes a reciprocal condition number for the average of the selected eigenvalues (RCONDE); and computes a reciprocal condition number for the right invariant subspace correspon...
ZGEEV computes for an N-by-N complex nonsymmetric matrix A, the eigenvalues and, optionally, the left and/or right eigenvectors. The right eigenvector v(j) of A satisfies A * v(j) = lambda(j) * v(j) where lambda(j) is its eigenvalue. The left eigenvector u(j) of A satisfies u(j)**H * A = lambda(j) * u(j)**H where u(j)**H denotes the conjugate transpose of u(j). The computed eigenvectors are normalized to have Euclidean norm equal to 1 and largest component real....
ZGEEVX computes for an N-by-N complex nonsymmetric matrix A, the eigenvalues and, optionally, the left and/or right eigenvectors. Optionally also, it computes a balancing transformation to improve the conditioning of the eigenvalues and eigenvectors (ILO, IHI, SCALE, and ABNRM), reciprocal condition numbers for the eigenvalues (RCONDE), and reciprocal condition numbers for the right eigenvectors (RCONDV). The right eigenvector v(j) of A satisfies A * v(j) = lambda(j) * v(j) where lambda(j) is it...
DGEGS computes for a pair of N-by-N complex nonsymmetric matrices A, B: the generalized eigenvalues (alpha, beta), the complex Schur form (A, B), and optionally left and/or right Schur vectors (VSL and VSR). (If only the generalized eigenvalues are needed, use the driver ZGEGV instead.) A generalized eigenvalue for a pair of matrices (A,B) is, roughly speaking, a scalar w or a ratio alpha/beta = w, such that A - w*B is singular. It is usually represented as the pair (alpha,beta), as there is a r...
ZGEGV computes for a pair of N-by-N complex nonsymmetric matrices A and B, the generalized eigenvalues (alpha, beta), and optionally, the left and/or right generalized eigenvectors (VL and VR). A generalized eigenvalue for a pair of matrices (A,B) is, roughly speaking, a scalar w or a ratio alpha/beta = w, such that A - w*B is singular. It is usually represented as the pair (alpha,beta), as there is a reasonable interpretation for beta=0, and even for both being zero. A good beginning reference ...
ZGELS solves overdetermined or underdetermined complex linear systems involving an M-by-N matrix A, or its conjugate-transpose, using a QR or LQ factorization of A. It is assumed that A has full rank. The following options are provided: 1. If TRANS = 'N' and m >= n: find the least squares solution of an overdetermined system, i.e., solve the least squares problem minimize || B - A*X ||. 2. If TRANS = 'N' and m < n: find the minimum norm solution of an underdetermined system A * X = B. 3. If ...
ZGELSS computes the minimum norm solution to a complex linear least squares problem: Minimize 2-norm(| b - A*x |). using the singular value decomposition (SVD) of A. A is an M-by-N matrix which may be rank-deficient. Several right hand side vectors b and solution vectors x can be handled in a single call; they are stored as the columns of the M-by-NRHS right hand side matrix B and the N-by-NRHS solution matrix X. The effective rank of A is determined by treating as zero those singular values whi...
ZGELSX computes the minimum-norm solution to a complex linear least squares problem: minimize || A * X - B || using a complete orthogonal factorization of A. A is an M-by-N matrix which may be rank-deficient. Several right hand side vectors b and solution vectors x can be handled in a single call; they are stored as the columns of the M-by-NRHS right hand side matrix B and the N-by-NRHS solution matrix X. The routine first computes a QR factorization with column pivoting: A * P = Q * [ R11 R12 ]...
ZGESV computes the solution to a complex system of linear equations A * X = B, where A is an N-by-N matrix and X and B are N-by-NRHS matrices. The LU decomposition with partial pivoting and row interchanges is used to factor A as A = P * L * U, where P is a permutation matrix, L is unit lower triangular, and U is upper triangular. The factored form of A is then used to solve the system of equations A * X = B....
ZGESVD computes the singular value decomposition (SVD) of a complex Mby-N matrix A, optionally computing the left and/or right singular vectors. The SVD is written A = U * SIGMA * conjugate-transpose(V) where SIGMA is an M-by-N matrix which is zero except for its min(m,n) diagonal elements, U is an M-by-M unitary matrix, and V is an N-by-N unitary matrix. The diagonal elements of SIGMA are the singular values of A; they are real and non-negative, and are returned in descending order. The first m...
ZGESVX uses the LU factorization to compute the solution to a complex system of linear equations A * X = B, where A is an N-by-N matrix and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
ZGETF2 computes an LU factorization of a general m-by-n matrix A using partial pivoting with row interchanges. The factorization has the form A = P * L * U where P is a permutation matrix, L is lower triangular with unit diagonal elements (lower trapezoidal if m > n), and U is upper triangular (upper trapezoidal if m < n). This is the right-looking Level 2 BLAS version of the algorithm.
ZGETRF computes an LU factorization of a general M-by-N matrix A using partial pivoting with row interchanges. The factorization has the form A = P * L * U where P is a permutation matrix, L is lower triangular with unit diagonal elements (lower trapezoidal if m > n), and U is upper triangular (upper trapezoidal if m < n). This is the right-looking Level 3 BLAS version of the algorithm.
ZGETRI computes the inverse of a matrix using the LU factorization computed by ZGETRF. This method inverts U and then computes inv(A) by solving the system inv(A)*L = inv(U) for inv(A).
ZGETRS solves a system of linear equations A * X = B, A**T * X = B, or A**H * X = B with a general N-by-N matrix A using the LU factorization computed by ZGETRF.
ZGGBAK forms the right or left eigenvectors of a complex generalized eigenvalue problem A*x = lambda*B*x, by backward transformation on the computed eigenvectors of the balanced pair of matrices output by ZGGBAL.
ZGGBAL balances a pair of general complex matrices (A,B). This involves, first, permuting A and B by similarity transformations to isolate eigenvalues in the first 1 to ILO$-$1 and last IHI+1 to N elements on the diagonal; and second, applying a diagonal similarity transformation to rows and columns ILO to IHI to make the rows and columns as close in norm as possible. Both steps are optional. Balancing may reduce the 1-norm of the matrices, and improve the accuracy of the computed eigenvalues an...
ZGGGLM solves a general Gauss-Markov linear model (GLM) problem: minimize || y ||_2 subject to d = A*x + B*y x where A is an N-by-M matrix, B is an N-by-P matrix, and d is a given Nvector. It is assumed that M <= N <= M+P, and rank(A) = M and rank( A B ) = N. Under these assumptions, the constrained equation is always consistent, and there is a unique solution x and a minimal 2-norm solution y, which is obtained using a generalized QR factorization of A and B. In particular, if matrix B is squar...
ZGGHRD reduces a pair of complex matrices (A,B) to generalized upper Hessenberg form using unitary transformations, where A is a general matrix and B is upper triangular: Q' * A * Z = H and Q' * B * Z = T, where H is upper Hessenberg, T is upper triangular, and Q and Z are unitary, and ' means conjugate transpose. The unitary matrices Q and Z are determined as products of Givens rotations. They may either be formed explicitly, or they may be postmultiplied into input matrices Q1 and Z1, so th...
ZGGLSE solves the linear equality-constrained least squares (LSE) problem: minimize || c - A*x ||_2 subject to B*x = d where A is an M-by-N matrix, B is a P-by-N matrix, c is a given M-vector, and d is a given P-vector. It is assumed that P <= N <= M+P, and rank(B) = P and rank( ( A ) ) = N. ( ( B ) ) These conditions ensure that the LSE problem has a unique solution, which is obtained using a GRQ factorization of the matrices B and A....
ZGGQRF computes a generalized QR factorization of an N-by-M matrix A and an N-by-P matrix B: A = Q*R, B = Q*T*Z, where Q is an N-by-N unitary matrix, Z is a P-by-P unitary matrix, and R and T assume one of the forms: if N >= M, R = ( R11 ) M , or if N < M, R = ( R11 R12 ) N, ( 0 ) N-M N M-N M where R11 is upper triangular, and if N <= P, T = ( 0 T12 ) N, or if N > P, T = ( T11 ) N-P, P-N N ( T21 ) P P where T12 or T21 is upper triangular. In particular, if B is square and nonsingular, the GQR fa...
ZGGRQF computes a generalized RQ factorization of an M-by-N matrix A and a P-by-N matrix B: A = R*Q, B = Z*T*Q, where Q is an N-by-N unitary matrix, Z is a P-by-P unitary matrix, and R and T assume one of the forms: if M <= N, R = ( 0 R12 ) M, or if M > N, R = ( R11 ) M-N, N-M M ( R21 ) N N where R12 or R21 is upper triangular, and if P >= N, T = ( T11 ) N , or if P < N, T = ( T11 T12 ) P, ( 0 ) P-N P N-P N where T11 is upper triangular. In particular, if B is square and nonsingular, the GRQ fac...
ZGGSVD computes the generalized singular value decomposition (GSVD) of an M-by-N complex matrix A and P-by-N complex matrix B: U'*A*Q = D1*( 0 R ), V'*B*Q = D2*( 0 R ) where U, V and Q are unitary matrices, and Z' means the conjugate transpose of Z. Let K+L = the effective numerical rank of the matrix (A',B')', then R is a (K+L)-by-(K+L) nonsingular upper triangular matrix, D1 and D2 are M-by-(K+L) and P-by-(K+L) "diagonal" matrices and of the following structures, respectively: If M-K-L...
ZGGSVP computes unitary matrices U, V and Q such that L ( 0 0 A23 ) M-K-L ( 0 0 0 ) N-K-L K L = K ( 0 A12 A13 ) if M-K-L < 0; M-K ( 0 0 A23 ) N-K-L K L V'*B*Q = L ( 0 0 B13 ) P-L ( 0 0 0 ) where the K-by-K matrix A12 and L-by-L matrix B13 are nonsingular upper triangular; A23 is L-by-L upper triangular if M-K-L >= 0, otherwise A23 is (M-K)-by-L upper trapezoidal. K+L = the effective numerical rank of the (M+P)-by-N matrix (A',B')'. Z' denotes the conjugate transpose of Z. This decomposition...
ZGTCON estimates the reciprocal of the condition number of a complex tridiagonal matrix A using the LU factorization as computed by ZGTTRF. An estimate is obtained for norm(inv(A)), and the reciprocal of the condition number is computed as RCOND = 1 / (ANORM * norm(inv(A))).
ZGTRFS improves the computed solution to a system of linear equations when the coefficient matrix is tridiagonal, and provides error bounds and backward error estimates for the solution.
ZGTSV solves the equation where A is an N-by-N tridiagonal matrix, by Gaussian elimination with partial pivoting. Note that the equation A'*X = B may be solved by interchanging the order of the arguments DU and DL.
ZGTSVX uses the LU factorization to compute the solution to a complex system of linear equations A * X = B, A**T * X = B, or A**H * X = B, where A is a tridiagonal matrix of order N and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
ZGTTRF computes an LU factorization of a complex tridiagonal matrix A using elimination with partial pivoting and row interchanges. The factorization has the form A = L * U where L is a product of permutation and unit lower bidiagonal matrices and U is upper triangular with nonzeros in only the main diagonal and first two superdiagonals.
ZGTTRS solves one of the systems of equations A * X = B, A**T * X = B, or A**H * X = B, with a tridiagonal matrix A using the LU factorization computed by ZGTTRF.
ZHBEVD computes all the eigenvalues and, optionally, eigenvectors of a complex Hermitian band matrix A. If eigenvectors are desired, it uses a divide and conquer algorithm. The divide and conquer algorithm makes very mild assumptions about floating point arithmetic. It will work on machines with a guard digit in add/subtract, or on those binary machines without guard digits which subtract like the Cray X-MP, Cray Y-MP, Cray C-90, or Cray-2. It could conceivably fail on hexadecimal or decimal mac...
ZHBEVX computes selected eigenvalues and, optionally, eigenvectors of a complex Hermitian band matrix A. Eigenvalues and eigenvectors can be selected by specifying either a range of values or a range of indices for the desired eigenvalues.
ZHBGST reduces a complex Hermitian-definite banded generalized eigenproblem A*x = lambda*B*x to standard form C*y = lambda*y, such that C has the same bandwidth as A. B must have been previously factorized as S**H*S by ZPBSTF, using a split Cholesky factorization. A is overwritten by C = X**H*A*X, where X = S**(-1)*Q and Q is a unitary matrix chosen to preserve the bandwidth of A.
ZHBGV computes all the eigenvalues, and optionally, the eigenvectors of a complex generalized Hermitian-definite banded eigenproblem, of the form A*x=(lambda)*B*x. Here A and B are assumed to be Hermitian and banded, and B is also positive definite.
ZHECON estimates the reciprocal of the condition number of a complex Hermitian matrix A using the factorization A = U*D*U**H or A = L*D*L**H computed by ZHETRF. An estimate is obtained for norm(inv(A)), and the reciprocal of the condition number is computed as RCOND = 1 / (ANORM * norm(inv(A))).
ZHEEVD computes all eigenvalues and, optionally, eigenvectors of a complex Hermitian matrix A. If eigenvectors are desired, it uses a divide and conquer algorithm. The divide and conquer algorithm makes very mild assumptions about floating point arithmetic. It will work on machines with a guard digit in add/subtract, or on those binary machines without guard digits which subtract like the Cray X-MP, Cray Y-MP, Cray C-90, or Cray-2. It could conceivably fail on hexadecimal or decimal machines wit...
ZHEEVX computes selected eigenvalues and, optionally, eigenvectors of a complex Hermitian matrix A. Eigenvalues and eigenvectors can be selected by specifying either a range of values or a range of indices for the desired eigenvalues.
ZHEGS2 reduces a complex Hermitian-definite generalized eigenproblem to standard form. If ITYPE = 1, the problem is A*x = lambda*B*x, and A is overwritten by inv(U')*A*inv(U) or inv(L)*A*inv(L') If ITYPE = 2 or 3, the problem is A*B*x = lambda*x or B*A*x = lambda*x, and A is overwritten by U*A*U` or L'*A*L. B must have been previously factorized as U'*U or L*L' by ZPOTRF.
ZHEGST reduces a complex Hermitian-definite generalized eigenproblem to standard form. If ITYPE = 1, the problem is A*x = lambda*B*x, and A is overwritten by inv(U**H)*A*inv(U) or inv(L)*A*inv(L**H) If ITYPE = 2 or 3, the problem is A*B*x = lambda*x or B*A*x = lambda*x, and A is overwritten by U*A*U**H or L**H*A*L. B must have been previously factorized as U**H*U or L*L**H by ZPOTRF.
ZHEGV computes all the eigenvalues, and optionally, the eigenvectors of a complex generalized Hermitian-definite eigenproblem, of the form A*x=(lambda)*B*x, A*Bx=(lambda)*x, or B*A*x=(lambda)*x. Here A and B are assumed to be Hermitian and B is also positive definite.
ZHERFS improves the computed solution to a system of linear equations when the coefficient matrix is Hermitian indefinite, and provides error bounds and backward error estimates for the solution.
ZHESV computes the solution to a complex system of linear equations A * X = B, where A is an N-by-N Hermitian matrix and X and B are Nby-NRHS matrices. The diagonal pivoting method is used to factor A as A = U * D * U**H, if UPLO = 'U', or A = L * D * L**H, if UPLO = 'L', where U (or L) is a product of permutation and unit upper (lower) triangular matrices, and D is Hermitian and block diagonal with 1-by-1 and 2-by-2 diagonal blocks. The factored form of A is then used to solve the system of...
ZHESVX uses the diagonal pivoting factorization to compute the solution to a complex system of linear equations A * X = B, where A is an N-by-N Hermitian matrix and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
ZHETF2 computes the factorization of a complex Hermitian matrix A using the Bunch-Kaufman diagonal pivoting method: A = U*D*U' or A = L*D*L' where U (or L) is a product of permutation and unit upper (lower) triangular matrices, U' is the conjugate transpose of U, and D is Hermitian and block diagonal with 1-by-1 and 2-by-2 diagonal blocks. This is the unblocked version of the algorithm, calling Level 2 BLAS....
ZHETRF computes the factorization of a complex Hermitian matrix A using the Bunch-Kaufman diagonal pivoting method. The form of the factorization is A = U*D*U**H or A = L*D*L**H where U (or L) is a product of permutation and unit upper (lower) triangular matrices, and D is Hermitian and block diagonal with 1-by-1 and 2-by-2 diagonal blocks. This is the blocked version of the algorithm, calling Level 3 BLAS....
ZHETRS solves a system of linear equations A*X = B with a complex Hermitian matrix A using the factorization A = U*D*U**H or A = L*D*L**H computed by ZHETRF.
ZHGEQZ implements a single-shift version of the QZ method for finding the generalized eigenvalues w(i)=ALPHA(i)/BETA(i) of the equation A are then ALPHA(1),...,ALPHA(N), and of B are BETA(1),...,BETA(N). If JOB='S' and COMPQ and COMPZ are 'V' or 'I', then the unitary transformations used to reduce (A,B) are accumulated into the arrays Q and Z s.t.: Q(in) A(in) Z(in)* = Q(out) A(out) Z(out)* Q(in) B(in) Z(in)* = Q(out) B(out) Z(out)* Ref: C.B. Moler & G.W. Stewart, "An Algorithm for Genera...
ZHPCON estimates the reciprocal of the condition number of a complex Hermitian packed matrix A using the factorization A = U*D*U**H or A = L*D*L**H computed by ZHPTRF. An estimate is obtained for norm(inv(A)), and the reciprocal of the condition number is computed as RCOND = 1 / (ANORM * norm(inv(A))).
ZHPEVD computes all the eigenvalues and, optionally, eigenvectors of a complex Hermitian matrix A in packed storage. If eigenvectors are desired, it uses a divide and conquer algorithm. The divide and conquer algorithm makes very mild assumptions about floating point arithmetic. It will work on machines with a guard digit in add/subtract, or on those binary machines without guard digits which subtract like the Cray X-MP, Cray Y-MP, Cray C-90, or Cray-2. It could conceivably fail on hexadecimal o...
ZHPEVX computes selected eigenvalues and, optionally, eigenvectors of a complex Hermitian matrix A in packed storage. Eigenvalues/vectors can be selected by specifying either a range of values or a range of indices for the desired eigenvalues.
ZHPGST reduces a complex Hermitian-definite generalized eigenproblem to standard form, using packed storage. If ITYPE = 1, the problem is A*x = lambda*B*x, and A is overwritten by inv(U**H)*A*inv(U) or inv(L)*A*inv(L**H) If ITYPE = 2 or 3, the problem is A*B*x = lambda*x or B*A*x = lambda*x, and A is overwritten by U*A*U**H or L**H*A*L. B must have been previously factorized as U**H*U or L*L**H by ZPPTRF....
ZHPGV computes all the eigenvalues and, optionally, the eigenvectors of a complex generalized Hermitian-definite eigenproblem, of the form A*x=(lambda)*B*x, A*Bx=(lambda)*x, or B*A*x=(lambda)*x. Here A and B are assumed to be Hermitian, stored in packed format, and B is also positive definite.
ZHPRFS improves the computed solution to a system of linear equations when the coefficient matrix is Hermitian indefinite and packed, and provides error bounds and backward error estimates for the solution.
ZHPSV computes the solution to a complex system of linear equations A * X = B, where A is an N-by-N Hermitian matrix stored in packed format and X and B are N-by-NRHS matrices. The diagonal pivoting method is used to factor A as A = U * D * U**H, if UPLO = 'U', or A = L * D * L**H, if UPLO = 'L', where U (or L) is a product of permutation and unit upper (lower) triangular matrices, D is Hermitian and block diagonal with 1-by-1 and 2-by-2 diagonal blocks. The factored form of A is then used t...
ZHPSVX uses the diagonal pivoting factorization A = U*D*U**H or A = L*D*L**H to compute the solution to a complex system of linear equations A * X = B, where A is an N-by-N Hermitian matrix stored in packed format and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
ZHPTRD reduces a complex Hermitian matrix A stored in packed form to real symmetric tridiagonal form T by a unitary similarity transformation: Q**H * A * Q = T.
ZHPTRF computes the factorization of a complex Hermitian packed matrix A using the Bunch-Kaufman diagonal pivoting method: A = U*D*U**H or A = L*D*L**H where U (or L) is a product of permutation and unit upper (lower) triangular matrices, and D is Hermitian and block diagonal with 1-by-1 and 2-by-2 diagonal blocks.
ZHPTRI computes the inverse of a complex Hermitian indefinite matrix A in packed storage using the factorization A = U*D*U**H or A = L*D*L**H computed by ZHPTRF.
ZHPTRS solves a system of linear equations A*X = B with a complex Hermitian matrix A stored in packed format using the factorization A = U*D*U**H or A = L*D*L**H computed by ZHPTRF.
ZHSEIN uses inverse iteration to find specified right and/or left eigenvectors of a complex upper Hessenberg matrix H. The right eigenvector x and the left eigenvector y of the matrix H corresponding to an eigenvalue w are defined by: H * x = w * x, y**h * H = w * y**h where y**h denotes the conjugate transpose of the vector y.
ZHSEQR computes the eigenvalues of a complex upper Hessenberg matrix H, and, optionally, the matrices T and Z from the Schur decomposition H = Z T Z**H, where T is an upper triangular matrix (the Schur form), and Z is the unitary matrix of Schur vectors. Optionally Z may be postmultiplied into an input unitary matrix Q, so that this routine can give the Schur factorization of a matrix A which has been reduced to the Hessenberg form H by the unitary matrix Q: A = Q*H*Q**H = (QZ)*T*(QZ)**H....
ZLABRD reduces the first NB rows and columns of a complex general m by n matrix A to upper or lower real bidiagonal form by a unitary transformation Q' * A * P, and returns the matrices X and Y which are needed to apply the transformation to the unreduced part of A. If m >= n, A is reduced to upper bidiagonal form; if m < n, to lower bidiagonal form. This is an auxiliary routine called by ZGEBRD
Using the divide and conquer method, ZLAED0 computes all eigenvalues of a symmetric tridiagonal matrix which is one diagonal block of those from reducing a dense or band Hermitian matrix and corresponding eigenvectors of the dense or band matrix.
ZLAED7 computes the updated eigensystem of a diagonal matrix after modification by a rank-one symmetric matrix. This routine is used only for the eigenproblem which requires all eigenvalues and optionally eigenvectors of a dense or banded Hermitian matrix that has been reduced to tridiagonal form. T = Q(in) ( D(in) + RHO * Z*Z' ) Q'(in) = Q(out) * D(out) * Q'(out) where Z = Q'u, u is a vector of length N with ones in the CUTPNT and CUTPNT + 1 th elements and zeros elsewhere. The eigenvectors...
ZLAED8 merges the two sets of eigenvalues together into a single sorted set. Then it tries to deflate the size of the problem. There are two ways in which deflation can occur: when two or more eigenvalues are close together or if there is a tiny element in the Z vector. For each such occurrence the order of the related secular equation problem is reduced by one.
ZLAESY computes the eigendecomposition of a 2-by-2 symmetric matrix ( ( A, B );( B, C ) ) provided the norm of the matrix of eigenvectors is larger than some threshold value. RT1 is the eigenvalue of larger absolute value, and RT2 of smaller absolute value. If the eigenvectors are computed, then on return ( CS1, SN1 ) is the unit eigenvector for RT1, hence [ CS1 SN1 ] . [ A B ] . [ CS1 -SN1 ] = [ RT1 0 ] [ -SN1 CS1 ] [ B C ] [ SN1 CS1 ] [ 0 RT2 ]...
ZLAEV2 computes the eigendecomposition of a 2-by-2 Hermitian matrix [ A B ] [ CONJG(B) C ]. On return, RT1 is the eigenvalue of larger absolute value, RT2 is the eigenvalue of smaller absolute value, and (CS1,SN1) is the unit right eigenvector for RT1, giving the decomposition [ CS1 CONJG(SN1) ] [ A B ] [ CS1 -CONJG(SN1) ] = [ RT1 0 ] [- SN1 CS1 ] [ CONJG(B) C ] [ SN1 CS1 ] [ 0 RT2 ].
ZLAGS2 computes 2-by-2 unitary matrices U, V and Q, such that if ( UPPER ) then ( -CONJG(SNU) CSU ) ( -CONJG(SNV) CSV ) Q = ( CSQ SNQ ) ( -CONJG(SNQ) CSQ ) Z' denotes the conjugate transpose of Z. The rows of the transformed A and B are parallel. Moreover, if the input 2-by-2 matrix A is not zero, then the transformed (1,1) entry of A is not zero. If the input matrices A and B are both not zero, then the transformed (2,2) element of B is not zero, except when the first rows of input A and B are...
ZLAHEF computes a partial factorization of a complex Hermitian matrix A using the Bunch-Kaufman diagonal pivoting method. The partial factorization has the form: A = ( I U12 ) ( A11 0 ) ( I 0 ) if UPLO = 'U', or: ( 0 U22 ) ( 0 D ) ( U12' U22' ) A = ( L11 0 ) ( D 0 ) ( L11' L21' ) if UPLO = 'L' ( L21 I ) ( 0 A22 ) ( 0 I ) where the order of D is at most NB. The actual order is returned in the argument KB, and is either NB or NB-1, or N if N <= NB. Note that U' denotes the conjugate trans...
ZLAHQR is an auxiliary routine called by ZHSEQR to update the eigenvalues and Schur decomposition already computed by ZHSEQR, by dealing with the Hessenberg submatrix in rows and columns ILO to IHI.
ZLAHRD reduces the first NB columns of a complex general n-by-(n-k+1) matrix A so that elements below the k-th subdiagonal are zero. The reduction is performed by a unitary similarity transformation Q' * A * Q. The routine returns the matrices V and T which determine Q as a block reflector I - V*T*V', and also the matrix Y = A * V * T. This is an auxiliary routine called by ZGEHRD.
ZLAIC1 applies one step of incremental condition estimation in its simplest version: Let x, twonorm(x) = 1, be an approximate singular vector of an j-by-j lower triangular matrix L, such that twonorm(L*x) = sest Then ZLAIC1 computes sestpr, s, c such that the vector [ s*x ] xhat = [ c ] is an approximate singular vector of [ L 0 ] Lhat = [ w' gamma ] in the sense that twonorm(Lhat*xhat) = sestpr. Depending on JOB, an estimate for the largest or smallest singular value is computed. Note that [s ...
ZLANGB returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of an n by n band matrix A, with kl sub-diagonals and ku super-diagonals.
ZLANGT returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of a complex tridiagonal matrix A.
ZLANHB returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of an n by n hermitian band matrix A, with k super-diagonals.
ZLANHE returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of a complex hermitian matrix A.
ZLANHP returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of a complex hermitian matrix A, supplied in packed form.
ZLANHS returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of a Hessenberg matrix A.
ZLANHT returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of a complex Hermitian tridiagonal matrix A.
ZLANSB returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of an n by n symmetric band matrix A, with k super-diagonals.
ZLANSP returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of a complex symmetric matrix A, supplied in packed form.
ZLANSY returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of a complex symmetric matrix A.
ZLANTB returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of an n by n triangular band matrix A, with ( k + 1 ) diagonals.
ZLANTP returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of a triangular matrix A, supplied in packed form.
ZLANTR returns the value of the one norm, or the Frobenius norm, or the infinity norm, or the element of largest absolute value of a trapezoidal or triangular matrix A.
Given two column vectors X and Y, let The subroutine first computes the QR factorization of A = Q*R, and then computes the SVD of the 2-by-2 upper triangular matrix R. The smaller singular value of R is returned in SSMIN, which is used as the measurement of the linear dependency of the vectors X and Y.
ZLAPMT rearranges the columns of the M by N matrix X as specified by the permutation K(1),K(2),...,K(N) of the integers 1,...,N. If FORWRD = .TRUE., forward permutation: X(*,K(J)) is moved X(*,J) for J = 1,2,...,N. If FORWRD = .FALSE., backward permutation: X(*,J) is moved to X(*,K(J)) for J = 1,2,...,N.
ZLAQGB equilibrates a general M by N band matrix A with KL subdiagonals and KU superdiagonals using the row and scaling factors in the vectors R and C.
ZLAR2V applies a vector of complex plane rotations with real cosines from both sides to a sequence of 2-by-2 complex Hermitian matrices, defined by the elements of the vectors x, y and z. For i = 1,2,...,n ( x(i) z(i) ) := ( conjg(z(i)) y(i) ) ( c(i) conjg(s(i)) ) ( x(i) z(i) ) ( c(i) -conjg(s(i)) ) ( -s(i) c(i) ) ( conjg(z(i)) y(i) ) ( s(i) c(i) )
ZLARF applies a complex elementary reflector H to a complex M-by-N matrix C, from either the left or the right. H is represented in the form H = I - tau * v * v' where tau is a complex scalar and v is a complex vector. If tau = 0, then H is taken to be the unit matrix. To apply H' (the conjugate transpose of H), supply conjg(tau) instead tau.
ZLARFG generates a complex elementary reflector H of order n, such that ( x ) ( 0 ) where alpha and beta are scalars, with beta real, and x is an (n-1)- element complex vector. H is represented in the form H = I - tau * ( 1 ) * ( 1 v' ) , ( v ) where tau is a complex scalar and v is a complex (n-1)-element vector. Note that H is not hermitian. If the elements of x are all zero and alpha is real, then tau = 0 and H is taken to be the unit matrix. Otherwise 1 <= real(tau) <= 2 and abs(tau-1) <= 1...
ZLARFT forms the triangular factor T of a complex block reflector H of order n, which is defined as a product of k elementary reflectors. If DIRECT = 'F', H = H(1) H(2) . . . H(k) and T is upper triangular; If DIRECT = 'B', H = H(k) . . . H(2) H(1) and T is lower triangular. If STOREV = 'C', the vector which defines the elementary reflector H(i) is stored in the i-th column of the array V, and H = I - V * T * V' If STOREV = 'R', the vector which defines the elementary reflector H(i) is ...
ZLARFX applies a complex elementary reflector H to a complex m by n matrix C, from either the left or the right. H is represented in the form H = I - tau * v * v' where tau is a complex scalar and v is a complex vector. If tau = 0, then H is taken to be the unit matrix This version uses inline code if H has order < 11.
ZLARGV generates a vector of complex plane rotations with real cosines, determined by elements of the complex vectors x and y. For i = 1,2,...,n ( c(i) s(i) ) ( x(i) ) = ( a(i) ) ( -conjg(s(i)) c(i) ) ( y(i) ) = ( 0 )
ZLARTG generates a plane rotation so that [ -SN CS ] [ G ] [ 0 ] This is a faster version of the BLAS1 routine ZROTG, except for the following differences: F and G are unchanged on return. If G=0, then CS=1 and SN=0. If F=0 and (G .ne. 0), then CS=0 and SN=1 without doing any floating point operations.
ZLARTV applies a vector of complex plane rotations with real cosines to elements of the complex vectors x and y. For i = 1,2,...,n ( x(i) ) := ( c(i) s(i) ) ( x(i) ) ( y(i) ) ( -conjg(s(i)) c(i) ) ( y(i) )
ZLASCL multiplies the M by N complex matrix A by the real scalar CTO/CFROM. This is done without over/underflow as long as the final result CTO*A(I,J)/CFROM does not over/underflow. TYPE specifies that A may be full, upper triangular, lower triangular, upper Hessenberg, or banded.
ZLASR performs the transformation consisting of a sequence of plane rotations determined by the parameters PIVOT and DIRECT as follows ( z = m when SIDE = 'L' or 'l' and z = n when SIDE = 'R' or 'r' ): When DIRECT = 'F' or 'f' ( Forward sequence ) then P = P( z - 1 )*...*P( 2 )*P( 1 ), and when DIRECT = 'B' or 'b' ( Backward sequence ) then P = P( 1 )*P( 2 )*...*P( z - 1 ), where P( k ) is a plane rotation matrix for the following planes: when PIVOT = 'V' or 'v' ( Variable pi...
ZLASSQ returns the values scl and ssq such that where x( i ) = abs( X( 1 + ( i - 1 )*INCX ) ). The value of sumsq is assumed to be at least unity and the value of ssq will then satisfy 1.0 .le. ssq .le. ( sumsq + 2*n ). scale is assumed to be non-negative and scl returns the value scl = max( scale, abs( real( x( i ) ) ), abs( aimag( x( i ) ) ) ), i scale and sumsq must be supplied in SCALE and SUMSQ respectively. SCALE and SUMSQ are overwritten by scl and ssq respectively. The routine makes only...
ZLASYF computes a partial factorization of a complex symmetric matrix A using the Bunch-Kaufman diagonal pivoting method. The partial factorization has the form: A = ( I U12 ) ( A11 0 ) ( I 0 ) if UPLO = 'U', or: ( 0 U22 ) ( 0 D ) ( U12' U22' ) A = ( L11 0 ) ( D 0 ) ( L11' L21' ) if UPLO = 'L' ( L21 I ) ( 0 A22 ) ( 0 I ) where the order of D is at most NB. The actual order is returned in the argument KB, and is either NB or NB-1, or N if N <= NB. Note that U' denotes the transpose of U....
ZLATBS solves one of the triangular systems with scaling to prevent overflow, where A is an upper or lower triangular band matrix. Here A' denotes the transpose of A, x and b are n-element vectors, and s is a scaling factor, usually less than or equal to 1, chosen so that the components of x will be less than the overflow threshold. If the unscaled problem will not cause overflow, the Level 2 BLAS routine ZTBSV is called. If the matrix A is singular (A(j,j) = 0 for some j), then s is set to 0 a...
ZLATPS solves one of the triangular systems with scaling to prevent overflow, where A is an upper or lower triangular matrix stored in packed form. Here A**T denotes the transpose of A, A**H denotes the conjugate transpose of A, x and b are n-element vectors, and s is a scaling factor, usually less than or equal to 1, chosen so that the components of x will be less than the overflow threshold. If the unscaled problem will not cause overflow, the Level 2 BLAS routine ZTPSV is called. If the matri...
ZLATRD reduces NB rows and columns of a complex Hermitian matrix A to Hermitian tridiagonal form by a unitary similarity transformation Q' * A * Q, and returns the matrices V and W which are needed to apply the transformation to the unreduced part of A. If UPLO = 'U', ZLATRD reduces the last NB rows and columns of a matrix, of which the upper triangle is supplied; if UPLO = 'L', ZLATRD reduces the first NB rows and columns of a matrix, of which the lower triangle is supplied. This is an aux...
ZLATRS solves one of the triangular systems with scaling to prevent overflow. Here A is an upper or lower triangular matrix, A**T denotes the transpose of A, A**H denotes the conjugate transpose of A, x and b are n-element vectors, and s is a scaling factor, usually less than or equal to 1, chosen so that the components of x will be less than the overflow threshold. If the unscaled problem will not cause overflow, the Level 2 BLAS routine ZTRSV is called. If the matrix A is singular (A(j,j) = 0 ...
ZLATZM applies a Householder matrix generated by ZTZRQF to a matrix. Let P = I - tau*u*u', u = ( 1 ), ( v ) where v is an (m-1) vector if SIDE = 'L', or a (n-1) vector if SIDE = 'R'. If SIDE equals 'L', let C = [ C1 ] 1 [ C2 ] m-1 n Then C is overwritten by P*C. If SIDE equals 'R', let C = [ C1, C2 ] m 1 n-1 Then C is overwritten by C*P.
ZLAUU2 computes the product U * U' or L' * L, where the triangular factor U or L is stored in the upper or lower triangular part of the array A. If UPLO = 'U' or 'u' then the upper triangle of the result is stored, overwriting the factor U in A. If UPLO = 'L' or 'l' then the lower triangle of the result is stored, overwriting the factor L in A. This is the unblocked form of the algorithm, calling Level 2 BLAS....
ZLAUUM computes the product U * U' or L' * L, where the triangular factor U or L is stored in the upper or lower triangular part of the array A. If UPLO = 'U' or 'u' then the upper triangle of the result is stored, overwriting the factor U in A. If UPLO = 'L' or 'l' then the lower triangle of the result is stored, overwriting the factor L in A. This is the blocked form of the algorithm, calling Level 3 BLAS....
ZPBCON estimates the reciprocal of the condition number (in the 1-norm) of a complex Hermitian positive definite band matrix using the Cholesky factorization A = U**H*U or A = L*L**H computed by ZPBTRF. An estimate is obtained for norm(inv(A)), and the reciprocal of the condition number is computed as RCOND = 1 / (ANORM * norm(inv(A))).
ZPBEQU computes row and column scalings intended to equilibrate a Hermitian positive definite band matrix A and reduce its condition number (with respect to the two-norm). S contains the scale factors, S(i) = 1/sqrt(A(i,i)), chosen so that the scaled matrix B with elements B(i,j) = S(i)*A(i,j)*S(j) has ones on the diagonal. This choice of S puts the condition number of B within a factor N of the smallest possible condition number over all possible diagonal scalings....
ZPBRFS improves the computed solution to a system of linear equations when the coefficient matrix is Hermitian positive definite and banded, and provides error bounds and backward error estimates for the solution.
ZPBSTF computes a split Cholesky factorization of a complex Hermitian positive definite band matrix A. This routine is designed to be used in conjunction with ZHBGST. The factorization has the form A = S**H*S where S is a band matrix of the same bandwidth as A and the following structure: S = ( U ) ( M L ) where U is upper triangular of order m = (n+kd)/2, and L is lower triangular of order n-m.
ZPBSV computes the solution to a complex system of linear equations A * X = B, where A is an N-by-N Hermitian positive definite band matrix and X and B are N-by-NRHS matrices. The Cholesky decomposition is used to factor A as A = U**H * U, if UPLO = 'U', or A = L * L**H, if UPLO = 'L', where U is an upper triangular band matrix, and L is a lower triangular band matrix, with the same number of superdiagonals or subdiagonals as A. The factored form of A is then used to solve the system of equa...
ZPBSVX uses the Cholesky factorization A = U**H*U or A = L*L**H to compute the solution to a complex system of linear equations A * X = B, where A is an N-by-N Hermitian positive definite band matrix and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
ZPBTF2 computes the Cholesky factorization of a complex Hermitian positive definite band matrix A. The factorization has the form A = U' * U , if UPLO = 'U', or A = L * L', if UPLO = 'L', where U is an upper triangular matrix, U' is the conjugate transpose of U, and L is lower triangular. This is the unblocked version of the algorithm, calling Level 2 BLAS.
ZPBTRF computes the Cholesky factorization of a complex Hermitian positive definite band matrix A. The factorization has the form A = U**H * U, if UPLO = 'U', or A = L * L**H, if UPLO = 'L', where U is an upper triangular matrix and L is lower triangular.
ZPBTRS solves a system of linear equations A*X = B with a Hermitian positive definite band matrix A using the Cholesky factorization A = U**H*U or A = L*L**H computed by ZPBTRF.
ZPOCON estimates the reciprocal of the condition number (in the 1-norm) of a complex Hermitian positive definite matrix using the Cholesky factorization A = U**H*U or A = L*L**H computed by ZPOTRF. An estimate is obtained for norm(inv(A)), and the reciprocal of the condition number is computed as RCOND = 1 / (ANORM * norm(inv(A))).
ZPOEQU computes row and column scalings intended to equilibrate a Hermitian positive definite matrix A and reduce its condition number (with respect to the two-norm). S contains the scale factors, S(i) = 1/sqrt(A(i,i)), chosen so that the scaled matrix B with elements B(i,j) = S(i)*A(i,j)*S(j) has ones on the diagonal. This choice of S puts the condition number of B within a factor N of the smallest possible condition number over all possible diagonal scalings....
ZPORFS improves the computed solution to a system of linear equations when the coefficient matrix is Hermitian positive definite, and provides error bounds and backward error estimates for the solution.
ZPOSV computes the solution to a complex system of linear equations A * X = B, where A is an N-by-N Hermitian positive definite matrix and X and B are N-by-NRHS matrices. The Cholesky decomposition is used to factor A as A = U**H* U, if UPLO = 'U', or A = L * L**H, if UPLO = 'L', where U is an upper triangular matrix and L is a lower triangular matrix. The factored form of A is then used to solve the system of equations A * X = B....
ZPOSVX uses the Cholesky factorization A = U**H*U or A = L*L**H to compute the solution to a complex system of linear equations A * X = B, where A is an N-by-N Hermitian positive definite matrix and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
ZPOTF2 computes the Cholesky factorization of a complex Hermitian positive definite matrix A. The factorization has the form A = U' * U , if UPLO = 'U', or A = L * L', if UPLO = 'L', where U is an upper triangular matrix and L is lower triangular. This is the unblocked version of the algorithm, calling Level 2 BLAS.
ZPOTRF computes the Cholesky factorization of a complex Hermitian positive definite matrix A. The factorization has the form A = U**H * U, if UPLO = 'U', or A = L * L**H, if UPLO = 'L', where U is an upper triangular matrix and L is lower triangular. This is the block version of the algorithm, calling Level 3 BLAS.
ZPOTRI computes the inverse of a complex Hermitian positive definite matrix A using the Cholesky factorization A = U**H*U or A = L*L**H computed by ZPOTRF.
ZPOTRS solves a system of linear equations A*X = B with a Hermitian positive definite matrix A using the Cholesky factorization A = U**H*U or A = L*L**H computed by ZPOTRF.
ZPPCON estimates the reciprocal of the condition number (in the 1-norm) of a complex Hermitian positive definite packed matrix using the Cholesky factorization A = U**H*U or A = L*L**H computed by ZPPTRF. An estimate is obtained for norm(inv(A)), and the reciprocal of the condition number is computed as RCOND = 1 / (ANORM * norm(inv(A))).
ZPPEQU computes row and column scalings intended to equilibrate a Hermitian positive definite matrix A in packed storage and reduce its condition number (with respect to the two-norm). S contains the scale factors, S(i)=1/sqrt(A(i,i)), chosen so that the scaled matrix B with elements B(i,j)=S(i)*A(i,j)*S(j) has ones on the diagonal. This choice of S puts the condition number of B within a factor N of the smallest possible condition number over all possible diagonal scalings....
ZPPRFS improves the computed solution to a system of linear equations when the coefficient matrix is Hermitian positive definite and packed, and provides error bounds and backward error estimates for the solution.
ZPPSV computes the solution to a complex system of linear equations A * X = B, where A is an N-by-N Hermitian positive definite matrix stored in packed format and X and B are N-by-NRHS matrices. The Cholesky decomposition is used to factor A as A = U**H* U, if UPLO = 'U', or A = L * L**H, if UPLO = 'L', where U is an upper triangular matrix and L is a lower triangular matrix. The factored form of A is then used to solve the system of equations A * X = B....
ZPPSVX uses the Cholesky factorization A = U**H*U or A = L*L**H to compute the solution to a complex system of linear equations A * X = B, where A is an N-by-N Hermitian positive definite matrix stored in packed format and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
ZPPTRF computes the Cholesky factorization of a complex Hermitian positive definite matrix A stored in packed format. The factorization has the form A = U**H * U, if UPLO = 'U', or A = L * L**H, if UPLO = 'L', where U is an upper triangular matrix and L is lower triangular.
ZPPTRI computes the inverse of a complex Hermitian positive definite matrix A using the Cholesky factorization A = U**H*U or A = L*L**H computed by ZPPTRF.
ZPPTRS solves a system of linear equations A*X = B with a Hermitian positive definite matrix A in packed storage using the Cholesky factorization A = U**H*U or A = L*L**H computed by ZPPTRF.
ZPTCON computes the reciprocal of the condition number (in the 1-norm) of a complex Hermitian positive definite tridiagonal matrix using the factorization A = L*D*L**H or A = U**H*D*U computed by ZPTTRF. Norm(inv(A)) is computed by a direct method, and the reciprocal of the condition number is computed as RCOND = 1 / (ANORM * norm(inv(A))).
ZPTEQR computes all eigenvalues and, optionally, eigenvectors of a symmetric positive definite tridiagonal matrix by first factoring the matrix using DPTTRF and then calling ZBDSQR to compute the singular values of the bidiagonal factor. This routine computes the eigenvalues of the positive definite tridiagonal matrix to high relative accuracy. This means that if the eigenvalues range over many orders of magnitude in size, then the small eigenvalues and corresponding eigenvectors will be compute...
ZPTRFS improves the computed solution to a system of linear equations when the coefficient matrix is Hermitian positive definite and tridiagonal, and provides error bounds and backward error estimates for the solution.
ZPTSV computes the solution to a complex system of linear equations A*X = B, where A is an N-by-N Hermitian positive definite tridiagonal matrix, and X and B are N-by-NRHS matrices. A is factored as A = L*D*L**H, and the factored form of A is then used to solve the system of equations.
ZPTSVX uses the factorization A = L*D*L**H to compute the solution to a complex system of linear equations A*X = B, where A is an N-by-N Hermitian positive definite tridiagonal matrix and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
ZPTTRF computes the factorization of a complex Hermitian positive definite tridiagonal matrix A. If the subdiagonal elements of A are supplied in the array E, the factorization has the form A = L*D*L**H, where D is diagonal and L is unit lower bidiagonal; if the superdiagonal elements of A are supplied, it has the form A = U**H*D*U, where U is unit upper bidiagonal.
ZPTTRS solves a system of linear equations A * X = B with a Hermitian positive definite tridiagonal matrix A using the factorization A = U**H*D*U or A = L*D*L**H computed by ZPTTRF.
src expects one of two possible values: ZSRC_DEPTH, z-buffering is done by depth comparison (default). ZSRC_COLOR, z-buffering is done by color comparison.
ZSPCON estimates the reciprocal of the condition number (in the 1-norm) of a complex symmetric packed matrix A using the factorization A = U*D*U**T or A = L*D*L**T computed by ZSPTRF. An estimate is obtained for norm(inv(A)), and the reciprocal of the condition number is computed as RCOND = 1 / (ANORM * norm(inv(A))).
ZSPR performs the symmetric rank 1 operation where alpha is a complex scalar, x is an n element vector and A is an n by n symmetric matrix, supplied in packed form.
ZSPRFS improves the computed solution to a system of linear equations when the coefficient matrix is symmetric indefinite and packed, and provides error bounds and backward error estimates for the solution.
ZSPSV computes the solution to a complex system of linear equations A * X = B, where A is an N-by-N symmetric matrix stored in packed format and X and B are N-by-NRHS matrices. The diagonal pivoting method is used to factor A as A = U * D * U**T, if UPLO = 'U', or A = L * D * L**T, if UPLO = 'L', where U (or L) is a product of permutation and unit upper (lower) triangular matrices, D is symmetric and block diagonal with 1-by-1 and 2-by-2 diagonal blocks. The factored form of A is then used t...
ZSPSVX uses the diagonal pivoting factorization A = U*D*U**T or A = L*D*L**T to compute the solution to a complex system of linear equations A * X = B, where A is an N-by-N symmetric matrix stored in packed format and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
ZSPTRF computes the factorization of a complex symmetric matrix A stored in packed format using the Bunch-Kaufman diagonal pivoting method: A = U*D*U**T or A = L*D*L**T where U (or L) is a product of permutation and unit upper (lower) triangular matrices, and D is symmetric and block diagonal with 1-by-1 and 2-by-2 diagonal blocks.
ZSPTRI computes the inverse of a complex symmetric indefinite matrix A in packed storage using the factorization A = U*D*U**T or A = L*D*L**T computed by ZSPTRF.
ZSPTRS solves a system of linear equations A*X = B with a complex symmetric matrix A stored in packed format using the factorization A = U*D*U**T or A = L*D*L**T computed by ZSPTRF.
CDRSCL multiplies an n-element complex vector x by the real scalar 1/a. This is done without overflow or underflow as long as the final result x/a does not overflow or underflow.
ZSTEDC computes all eigenvalues and, optionally, eigenvectors of a symmetric tridiagonal matrix using the divide and conquer method. The eigenvectors of a full or band complex Hermitian matrix can also be found if ZHETRD or ZHPTRD or ZHBTRD has been used to reduce this matrix to tridiagonal form. This code makes very mild assumptions about floating point arithmetic. It will work on machines with a guard digit in add/subtract, or on those binary machines without guard digits which subtract like t...
ZSTEIN computes the eigenvectors of a real symmetric tridiagonal matrix T corresponding to specified eigenvalues, using inverse iteration. The maximum number of iterations allowed for each eigenvector is specified by an internal parameter MAXITS (currently set to 5). Although the eigenvectors are real, they are stored in a complex array, which may be passed to ZUNMTR or ZUPMTR for back transformation to the eigenvectors of a complex Hermitian matrix which was reduced to tridiagonal form....
ZSTEQR computes all eigenvalues and, optionally, eigenvectors of a symmetric tridiagonal matrix using the implicit QL or QR method. The eigenvectors of a full or band complex Hermitian matrix can also be found if ZHETRD or ZHPTRD or ZHBTRD has been used to reduce this matrix to tridiagonal form.
ZSYCON estimates the reciprocal of the condition number (in the 1-norm) of a complex symmetric matrix A using the factorization A = U*D*U**T or A = L*D*L**T computed by ZSYTRF. An estimate is obtained for norm(inv(A)), and the reciprocal of the condition number is computed as RCOND = 1 / (ANORM * norm(inv(A))).
ZSYRFS improves the computed solution to a system of linear equations when the coefficient matrix is symmetric indefinite, and provides error bounds and backward error estimates for the solution.
ZSYSV computes the solution to a complex system of linear equations A * X = B, where A is an N-by-N symmetric matrix and X and B are Nby-NRHS matrices. The diagonal pivoting method is used to factor A as A = U * D * U**T, if UPLO = 'U', or A = L * D * L**T, if UPLO = 'L', where U (or L) is a product of permutation and unit upper (lower) triangular matrices, and D is symmetric and block diagonal with 1-by-1 and 2-by-2 diagonal blocks. The factored form of A is then used to solve the system of...
ZSYSVX uses the diagonal pivoting factorization to compute the solution to a complex system of linear equations A * X = B, where A is an N-by-N symmetric matrix and X and B are N-by-NRHS matrices. Error bounds on the solution and a condition estimate are also provided.
ZSYTF2 computes the factorization of a complex symmetric matrix A using the Bunch-Kaufman diagonal pivoting method: A = U*D*U' or A = L*D*L' where U (or L) is a product of permutation and unit upper (lower) triangular matrices, U' is the transpose of U, and D is symmetric and block diagonal with 1-by-1 and 2-by-2 diagonal blocks. This is the unblocked version of the algorithm, calling Level 2 BLAS....
ZSYTRF computes the factorization of a complex symmetric matrix A using the Bunch-Kaufman diagonal pivoting method. The form of the factorization is A = U*D*U**T or A = L*D*L**T where U (or L) is a product of permutation and unit upper (lower) triangular matrices, and D is symmetric and block diagonal with with 1- by-1 and 2-by-2 diagonal blocks. This is the blocked version of the algorithm, calling Level 3 BLAS....
ZSYTRS solves a system of linear equations A*X = B with a complex symmetric matrix A using the factorization A = U*D*U**T or A = L*D*L**T computed by ZSYTRF.
ZTBCON estimates the reciprocal of the condition number of a triangular band matrix A, in either the 1-norm or the infinity-norm. The norm of A is computed and an estimate is obtained for norm(inv(A)), then the reciprocal of the condition number is computed as RCOND = 1 / ( norm(A) * norm(inv(A)) ).
ZTBRFS provides error bounds and backward error estimates for the solution to a system of linear equations with a triangular band coefficient matrix. The solution matrix X must be computed by ZTBTRS or some other means before entering this routine. ZTBRFS does not do iterative refinement because doing so cannot improve the backward error.
ZTBTRS solves a triangular system of the form where A is a triangular band matrix of order N, and B is an N-by-NRHS matrix. A check is made to verify that A is nonsingular.
ZTGEVC computes some or all of the right and/or left generalized eigenvectors of a pair of complex upper triangular matrices (A,B). The right generalized eigenvector x and the left generalized eigenvector y of (A,B) corresponding to a generalized eigenvalue w are defined by: (A - wB) * x = 0 and y**H * (A - wB) = 0 where y**H denotes the conjugate tranpose of y. If an eigenvalue w is determined by zero diagonal elements of both A and B, a unit vector is returned as the corresponding eigenvector....
ZTGSJA computes the generalized singular value decomposition (GSVD) of two complex upper triangular (or trapezoidal) matrices A and B. On entry, it is assumed that matrices A and B have the following forms, which may be obtained by the preprocessing subroutine ZGGSVP from a general M-by-N matrix A and P-by-N matrix B: N-K-L K L A = K ( 0 A12 A13 ) if M-K-L >= 0; L ( 0 0 A23 ) M-K-L ( 0 0 0 ) N-K-L K L A = K ( 0 A12 A13 ) if M-K-L < 0; M-K ( 0 0 A23 ) N-K-L K L B = L ( 0 0 B13 ) P-L ( 0 0 0 ) whe...
ZTPCON estimates the reciprocal of the condition number of a packed triangular matrix A, in either the 1-norm or the infinity-norm. The norm of A is computed and an estimate is obtained for norm(inv(A)), then the reciprocal of the condition number is computed as RCOND = 1 / ( norm(A) * norm(inv(A)) ).
ZTPRFS provides error bounds and backward error estimates for the solution to a system of linear equations with a triangular packed coefficient matrix. The solution matrix X must be computed by ZTPTRS or some other means before entering this routine. ZTPRFS does not do iterative refinement because doing so cannot improve the backward error.
ZTPTRS solves a triangular system of the form where A is a triangular matrix of order N stored in packed format, and B is an N-by-NRHS matrix. A check is made to verify that A is nonsingular.
ZTRCON estimates the reciprocal of the condition number of a triangular matrix A, in either the 1-norm or the infinity-norm. The norm of A is computed and an estimate is obtained for norm(inv(A)), then the reciprocal of the condition number is computed as RCOND = 1 / ( norm(A) * norm(inv(A)) ).
ZTREVC computes some or all of the right and/or left eigenvectors of a complex upper triangular matrix T. The right eigenvector x and the left eigenvector y of T corresponding to an eigenvalue w are defined by: T*x = w*x, y'*T = w*y' where y' denotes the conjugate transpose of the vector y. If all eigenvectors are requested, the routine may either return the matrices X and/or Y of right or left eigenvectors of T, or the products Q*X and/or Q*Y, where Q is an input unitary matrix. If T was obt...
ZTREXC reorders the Schur factorization of a complex matrix A = Q*T*Q**H, so that the diagonal element of T with row index IFST is moved to row ILST. The Schur form T is reordered by a unitary similarity transformation Z**H*T*Z, and optionally the matrix Q of Schur vectors is updated by postmultplying it with Z.
ZTRRFS provides error bounds and backward error estimates for the solution to a system of linear equations with a triangular coefficient matrix. The solution matrix X must be computed by ZTRTRS or some other means before entering this routine. ZTRRFS does not do iterative refinement because doing so cannot improve the backward error.
ZTRSEN reorders the Schur factorization of a complex matrix A = Q*T*Q**H, so that a selected cluster of eigenvalues appears in the leading positions on the diagonal of the upper triangular matrix T, and the leading columns of Q form an orthonormal basis of the corresponding right invariant subspace. Optionally the routine computes the reciprocal condition numbers of the cluster of eigenvalues and/or the invariant subspace....
ZTRSNA estimates reciprocal condition numbers for specified eigenvalues and/or right eigenvectors of a complex upper triangular matrix T (or of any matrix Q*T*Q**H with Q unitary).
ZTRSYL solves the complex Sylvester matrix equation: op(A)*X + X*op(B) = scale*C or op(A)*X - X*op(B) = scale*C, where op(A) = A or A**H, and A and B are both upper triangular. A is Mby-M and B is N-by-N; the right hand side C and the solution X are M-byN; and scale is an output scale factor, set <= 1 to avoid overflow in X.
ZTRTRS solves a triangular system of the form where A is a triangular matrix of order N, and B is an N-by-NRHS matrix. A check is made to verify that A is nonsingular.
ZTZRQF reduces the M-by-N ( M<=N ) complex upper trapezoidal matrix A to upper triangular form by means of unitary transformations. The upper trapezoidal matrix A is factored as A = ( R 0 ) * Z, where Z is an N-by-N unitary matrix and R is an M-by-M upper triangular matrix.
ZUNG2L generates an m by n complex matrix Q with orthonormal columns, which is defined as the last n columns of a product of k elementary reflectors of order m Q = H(k) . . . H(2) H(1) as returned by ZGEQLF.
ZUNG2R generates an m by n complex matrix Q with orthonormal columns, which is defined as the first n columns of a product of k elementary reflectors of order m Q = H(1) H(2) . . . H(k) as returned by ZGEQRF.
ZUNGBR generates one of the complex unitary matrices Q or P**H determined by ZGEBRD when reducing a complex matrix A to bidiagonal form: A = Q * B * P**H. Q and P**H are defined as products of elementary reflectors H(i) or G(i) respectively. If VECT = 'Q', A is assumed to have been an M-by-K matrix, and Q is of order M: if m >= k, Q = H(1) H(2) . . . H(k) and ZUNGBR returns the first n columns of Q, where m >= n >= k; if m < k, Q = H(1) H(2) . . . H(m-1) and ZUNGBR returns Q as an M-by-M matri...
ZUNGHR generates a complex unitary matrix Q which is defined as the product of IHI-ILO elementary reflectors of order N, as returned by ZGEHRD: Q = H(ilo) H(ilo+1) . . . H(ihi-1).
ZUNGL2 generates an m-by-n complex matrix Q with orthonormal rows, which is defined as the first m rows of a product of k elementary reflectors of order n Q = H(k)' . . . H(2)' H(1)' as returned by ZGELQF.
ZUNGLQ generates an M-by-N complex matrix Q with orthonormal rows, which is defined as the first M rows of a product of K elementary reflectors of order N Q = H(k)' . . . H(2)' H(1)' as returned by ZGELQF.
ZUNGQL generates an M-by-N complex matrix Q with orthonormal columns, which is defined as the last N columns of a product of K elementary reflectors of order M Q = H(k) . . . H(2) H(1) as returned by ZGEQLF.
ZUNGQR generates an M-by-N complex matrix Q with orthonormal columns, which is defined as the first N columns of a product of K elementary reflectors of order M Q = H(1) H(2) . . . H(k) as returned by ZGEQRF.
ZUNGR2 generates an m by n complex matrix Q with orthonormal rows, which is defined as the last m rows of a product of k elementary reflectors of order n Q = H(1)' H(2)' . . . H(k)' as returned by ZGERQF.
ZUNGRQ generates an M-by-N complex matrix Q with orthonormal rows, which is defined as the last M rows of a product of K elementary reflectors of order N Q = H(1)' H(2)' . . . H(k)' as returned by ZGERQF.
ZUNGTR generates a complex unitary matrix Q which is defined as the product of n-1 elementary reflectors of order N, as returned by ZHETRD: if UPLO = 'U', Q = H(n-1) . . . H(2) H(1), if UPLO = 'L', Q = H(1) H(2) . . . H(n-1).
ZUNM2L overwrites the general complex m-by-n matrix C with where Q is a complex unitary matrix defined as the product of k elementary reflectors Q = H(k) . . . H(2) H(1) as returned by ZGEQLF. Q is of order m if SIDE = 'L' and of order n if SIDE = 'R'.
ZUNM2R overwrites the general complex m-by-n matrix C with where Q is a complex unitary matrix defined as the product of k elementary reflectors Q = H(1) H(2) . . . H(k) as returned by ZGEQRF. Q is of order m if SIDE = 'L' and of order n if SIDE = 'R'.
If VECT = 'Q', ZUNMBR overwrites the general complex M-by-N matrix C with SIDE = 'L' SIDE = 'R' TRANS = 'N': Q * C C * Q TRANS = 'C': Q**H * C C * Q**H If VECT = 'P', ZUNMBR overwrites the general complex M-by-N matrix C with SIDE = 'L' SIDE = 'R' TRANS = 'N': P * C C * P TRANS = 'C': P**H * C C * P**H Here Q and P**H are the unitary matrices determined by ZGEBRD when reducing a complex matrix A to bidiagonal form: A = Q * B * P**H. Q and P**H are defined as products of eleme...
ZUNMHR overwrites the general complex M-by-N matrix C with TRANS = 'C': Q**H * C C * Q**H where Q is a complex unitary matrix of order nq, with nq = m if SIDE = 'L' and nq = n if SIDE = 'R'. Q is defined as the product of IHI-ILO elementary reflectors, as returned by ZGEHRD: Q = H(ilo) H(ilo+1) . . . H(ihi-1).
ZUNML2 overwrites the general complex m-by-n matrix C with where Q is a complex unitary matrix defined as the product of k elementary reflectors Q = H(k)' . . . H(2)' H(1)' as returned by ZGELQF. Q is of order m if SIDE = 'L' and of order n if SIDE = 'R'.
ZUNMLQ overwrites the general complex M-by-N matrix C with TRANS = 'C': Q**H * C C * Q**H where Q is a complex unitary matrix defined as the product of k elementary reflectors Q = H(k)' . . . H(2)' H(1)' as returned by ZGELQF. Q is of order M if SIDE = 'L' and of order N if SIDE = 'R'.
ZUNMQL overwrites the general complex M-by-N matrix C with TRANS = 'C': Q**H * C C * Q**H where Q is a complex unitary matrix defined as the product of k elementary reflectors Q = H(k) . . . H(2) H(1) as returned by ZGEQLF. Q is of order M if SIDE = 'L' and of order N if SIDE = 'R'.
ZUNMQR overwrites the general complex M-by-N matrix C with TRANS = 'C': Q**H * C C * Q**H where Q is a complex unitary matrix defined as the product of k elementary reflectors Q = H(1) H(2) . . . H(k) as returned by ZGEQRF. Q is of order M if SIDE = 'L' and of order N if SIDE = 'R'.
ZUNMR2 overwrites the general complex m-by-n matrix C with where Q is a complex unitary matrix defined as the product of k elementary reflectors Q = H(1)' H(2)' . . . H(k)' as returned by ZGERQF. Q is of order m if SIDE = 'L' and of order n if SIDE = 'R'.
ZUNMRQ overwrites the general complex M-by-N matrix C with TRANS = 'C': Q**H * C C * Q**H where Q is a complex unitary matrix defined as the product of k elementary reflectors Q = H(1)' H(2)' . . . H(k)' as returned by ZGERQF. Q is of order M if SIDE = 'L' and of order N if SIDE = 'R'.
ZUNMTR overwrites the general complex M-by-N matrix C with TRANS = 'C': Q**H * C C * Q**H where Q is a complex unitary matrix of order nq, with nq = m if SIDE = 'L' and nq = n if SIDE = 'R'. Q is defined as the product of nq-1 elementary reflectors, as returned by ZHETRD: if UPLO = 'U', Q = H(nq-1) . . . H(2) H(1); if UPLO = 'L', Q = H(1) H(2) . . . H(nq-1).
ZUPGTR generates a complex unitary matrix Q which is defined as the product of n-1 elementary reflectors H(i) of order n, as returned by ZHPTRD using packed storage: if UPLO = 'U', Q = H(n-1) . . . H(2) H(1), if UPLO = 'L', Q = H(1) H(2) . . . H(n-1).
ZUPMTR overwrites the general complex M-by-N matrix C with TRANS = 'C': Q**H * C C * Q**H where Q is a complex unitary matrix of order nq, with nq = m if SIDE = 'L' and nq = n if SIDE = 'R'. Q is defined as the product of nq-1 elementary reflectors, as returned by ZHPTRD using packed storage: if UPLO = 'U', Q = H(nq-1) . . . H(2) H(1); if UPLO = 'L', Q = H(1) H(2) . . . H(nq-1).
mask expects a mask indicating which z-buffer bitplanes are read only and which can be written to. Z-buffer bitplanes that correspond to zeros in the mask are read only. Z-buffer bitplanes that correspond to ones in the mask can be written.
These routines decode leb128 numbers into the integers they encode. The leb128 format is a variable-length encoding extensively used in the DWARF debugging information format and is described in the DWARF documentation. The caller must know if the leb128 number data in hand is 32 or 64 bit and if it is signed or unsigned: nothing in the leb128 format makes it possible to determine this from the input data itself. If a data points to a number which fits in 32 bits either the 32bit or 64bit decodi...
These routines encode integers into the leb128 format. The leb128 format is a variable-length encoding extensively used in the DWARF debugging information format and is described in the DWARF documentation. The encoded number is placed into buffer and the number of bytes of buffer used to encode the number is returned. Link with the option -lelfutil to link in these routines. The arguments are as follows: number is the input number to be converted to leb128 format. buffer is a buffer provided by...
Files produced as a result of calling acct(2) have records in the form defined by sys/acct.h, whose contents are: typedef ushort_t comp_t; /* "floating point" */ /* 13-bit fraction, 3-bit exponent */ struct acct <...
Access Control Lists (ACLs) are supported on XFS file systems only. ACLs provide a mechanism for finer grained access control than the traditional UNIX discretionary access control mechanism. An ACL is a list of users and/or groups and their access rights, which is associated with a file or directory. ACLs are optional. In addition to the ACL used to mediate access, a directory may have a second ACL which defines the default initial ACL for files created in that directory. Files have only the si...
The acl_db file is used by various Xinet programs to grant (or deny) access to various subsystems. It consists of a series of named ``Access Control Lists'' that specify AppleTalk and/or IP addresses and User Accounts that are allowed to use a service. As of this writing, ACLs are used to control access to AppleShare Volumes and the configuration GUI. The file consists of a sequence of text lines, one list per line, where each line looks like: ACL_name:flags:list_item_1[,list_item_N] where ACL...
The Audio File Library currently supports 13 of the commonly found audio file formats, i.e., is able to recognize, read, and write sample data and header information to and from files in these formats. It is important not to confuse sample or audio data formats with file formats. The former refers to the bit-wise organization of the sound samples in the file, i.e., whether the format is 8-bit integer or 16-bit unsigned, etc. Audio file format refers to the structure of the audio file header, the...
This file describes user ID aliases used by /usr/sbin/sendmail. The file resides in /etc and is formatted as a series of lines of the form name: name_1, name2, name_3, . . . The name is the name to alias, and the name_n are the aliases for that name. Lines beginning with white space are continuation lines. Lines beginning with `#' are comments. Aliasing occurs only on local names. Loops can not occur, since no message will be sent to any person more than once. After aliasing has been done, loca...
The archive command ar combines several files into one. Archives are used mainly as libraries to be searched by the link-editor ld. A file produced by ar has a magic string at the start, followed by the constituent files, each preceded by a file header. The magic number and header layout as described in the include file are: #define ARMAG "!\n" #define SARMAG 8 #define ARFMAG "`\n" struct ar_hdr { char ar_name[16]; char ar_date[12]; char ar_uid[6]; char ar_gid[6]; char ar_mode[8]; ch...
The arrayd.conf and arrayd.auth files are used to describe the configuration of one or more arrays to the array services daemon. The default configuration files are "/usr/lib/array/arrayd.conf" and "/usr/lib/array/arrayd.auth", although the system administrator can override this or specify additional files. Every machine running an array services daemon (which should be every machine that is part of an array) must have its own configuration file or files. The configuration files contain info...
The file at_log is a database of error messages logged by the K-Talk library. These messages give clues about the nature of error conditions encountered by the library routines. Messages are printed one per line and are created using the at_log(3) routine.
/etc/autologin is an ASCII file containing the login user name to be used when autologin is enabled. The file is used by xdm(1) and clogin(1) when automatically initiating a terminal session on the graphics console. /etc/autologin.TTYLINE is like /etc/autologin except it is used by getty(1m) when initiating a terminal session for the device named by TTYLINE. For example /etc/autologin.ttyd1 will control the login processes on /dev/ttyd1....
The Audio File Library currently supports 13 of the commonly found audio file formats, i.e., is able to recognize, read, and write sample data and header information to and from files in these formats. It is important not to confuse sample or audio data formats with file formats. The former refers to the bit-wise organization of the sound samples in the file, i.e., whether the format is 8-bit integer or 16-bit unsigned, etc. Audio file format refers to the structure of the audio file header, the...
The Audio File Library currently supports 13 of the commonly found audio file formats, i.e., is able to recognize, read, and write sample data and header information to and from files in these formats. It is important not to confuse sample or audio data formats with file formats. The former refers to the bit-wise organization of the sound samples in the file, i.e., whether the format is 8-bit integer or 16-bit unsigned, etc. Audio file format refers to the structure of the audio file header, the...
The bootparams file contains the list of client entries that diskless clients use for booting. For each diskless client the entry should contain the following information: name of client a list of keys, names of servers, and pathnames. The first item of each entry is the name of the diskless client. The subsequent item is a list of keys, names of servers, and pathnames. Items are separated by TAB or SPACE characters. Any text after the # character is ignored....
The boot_cpuset.so library provides a method for putting init(1M) into a cpuset(4). Since all "standard" processes are descendents of init, this means that all standard processes on the system (daemons, interactive, etc.) will be confined to that cpuset. The cpuset is named boot. The boot_cpuset.so library is normally installed on SGI ccNUMA systems. If it is found in /lib32 by init, it will be loaded and executed. The behaviour of the library is controlled by /etc/config/boot_cpuset and /etc/...
front file system This is the local file system on which cached data is stored. back file system This is the file system which contains the definitive copy of the data. Data is retrieved from this file system and cached on the front file system. cnode This is the internal data structure used by cachefs to manage its files. There is one cnode for each open file. Each cnode occupies 128 bytes on a 32 bit system and 256 bytes on a 64 bit system. In addition, each cnode points to a dynamically alloc...
The capability mechanism provides fine grained control over the privileges of a process. As a process attribute, a capability allows the process to perform a specific set of restricted operations, without granting general override of the system's protection scheme. A process can possess multiple capabilities. Collectively, all defined capabilities comprise the set of abilities that are traditionally associated with the root user. Defined capabilities are: CAP_ACCT_MGT Privilege to use accountin...
Here is a sample /etc/capability file: root:all+eip:all+eip sysadm:all=:all= cmwlogin:all+eip:all+eip diag:all=:all= daemon:all=:all= bin:all=:all= uucp:all=:all= sys:all=:all= adm:all=:all= lp:all=:all= nuucp:all=:all= auditor:CAP_AUDIT_WRITE,CAP_AUDIT_CONTROL,CAP_KILL+eip:CAP_AUDIT_WRITE,CAP_AUDIT_CONTROL,CAP_KILL+eip dbadmin:all=:all= xserver:all=:all= demos:all=:all= tutor:all=:all= guest:all=:all= jenny:all=:CAP_DAC_READ_SEARCH+eip Page 1 capability(4) capability(4) In this example, there a...
Audio on Compact Discs (CD) is blocked into frames. The CD has 75 frames each second. One frame of data contains both audio and non-audio data (known as subcodes). These frames are frequently referred to as subcode-frames because it takes one complete frame to assemble all the bits of a chunk of subcode. A program reading a CD in audio mode must read a minimum of one CD frame. This is enforced by the function CDreadda(3) in libcdaudio. The cdframe structure, describing the content of a frame of ...
/lib/cftime/usa_english Jan Feb ... January February ... Sun Mon ... Sunday Monday ... %H:%M:%S %m/%d/%y %a %b %d %T %Z %Y AM PM Page 1 CFTIME(4) CFTIME(4)
Here is a example /etc/clearance file : Betty:adminlabel midlabel...highlabel lowlabel Bubba:lowlabel midlabel adminlabel Bubbles:lowlabel...midlabel highlabel...adminlabel Betty is cleared for lowlabel, the label range from midlabel to highlabel, and adminlabel. Bubba is cleared for lowlabel, midlabel and adminlabel only (notice no clearance ranges). Bubbles is cleared for the security ranges between lowlabel to midlabel and highlabel to adminlabel. duck:userlow:userlow dblow...dblow bill:userl...
The IRIX system writes out a core image of a terminated process when any of various errors occur. See signal(2) for the list of reasons; the most common are memory violations, illegal instructions, bus errors, and user-generated quit signals. The core image is called core and is written in the process's working directory (provided it can be; normal access controls apply). A process with an effective user ID different from the real user ID does not produce a core image. The format of the core im...
Lines beginning with # are comments. Blank lines are also allowed. A task line begins with the task name, followed immediately by a colon. The remainder of the line is cvp arguments, exactly as they would be specified to cvp, except that the -T argument is silently ignored.
Converts a function key code(KeySym) generated by XLookupString() to a one-byte character(Wnn code) according to preset data. Coding format: [ KeySym-entry Wnn-code ] Lines that start with a semicolon (;) are comments. Code notation: 0?? ---> Octal 0x?? or 0X?? ---> Hexadecimal ?? ---> Decimal
Converts a meta key code(KeySym) generated by XLookupString() to a one-byte character(Wnn code) according to preset data. Coding format: [ KeySym-entry Wnn-code ] Lines that start with a semicolon (;) are comments. Code notation: 0?? ---> Octal 0x?? or 0X?? ---> Hexadecimal ?? ---> Decimal
Converts a key code(KeySym) generated by XLookupString() to a one-byte character(Wnn code) according to preset data. Coding format: [ State-or-KeySym Wnn-code ] State-or-KeySym = [States]KeySym-name States = State-name'|'[States] Lines that start with a semicolon (;) are comments. KeySym-name is a string declared in keysymdef.h (except the prefix "XA_"). State-name is one between the following string. "Shift" ---> means ShiftMask "Ctrl" ---> means ControlMask "Meta" -...
The Digital Audio Tape (DAT) recorder system is very complex. This man page gives the most useful and relevant information for DAT use in professional systems. It is by no means comprehensive. Conflicts and questions must be resolved by reference to the definitive DAT Conference specification referenced below. Audio on Digital Audio Tapes (DAT) is blocked into frames. A DAT recording has 33.33 frames every second. One frame of data contains both audio and non-audio data (known as subcodes). A pr...
The files in /var/sysadm/defaultPrivileges should not be edited directly. Use the addpriv(1M) and rmpriv(1M) commands to administer default privileges.
A directory behaves exactly like an ordinary file, save that no user may write into a directory. The fact that a file is a directory is indicated by a bit in the flag word of its i-node entry [see inode(4)]. The EFS directory format supports variable length names of up to 255 characters.
Different file system types may have different directory entries. The dirent structure defines a file system independent directory entry, which contains information common to directory entries in different file system types. A set of these structures is returned by the getdents(2) system call. The dirent structure is defined below. struct dirent { ino_t d_ino; off_t d_off; unsigned short d_reclen; char d_name[1]; }; The d_ino is a number which is unique for each file in the file system. The fiel...
The DMbufferpool and DMbuffer data types and operations on them implement the Digital Media data transport subsystem. This subsystem is for sharing and exchanging time sensitive visual data between compression devices and algorithms, video input/output, graphics rendering and texturing, and the host processor(s). An overview of the DMbufferpool and DMbuffer data types is presented here along with brief descriptions of their defined operations within the data transport subsystem as well as in the...
The DMimageconverter data type and its operations implement the Digital Media image converter subsystem. This is a framework which supports a variety of compression and decompression devices and algorithms video rate JPEG and MPEG. NOTE: Some realtime compression devices are available only as extra optional products. The DMimageconverter data type represents an image converter context which performs a specific image conversion. The image conversion is principally a specific compression or decomp...
DWARF is a format for the information generated by compilers, assemblers, and linkage editors that is necessary for source-level debugging. It allows a compact representation of programs in many languages and is easily extended to handle additional languages and individual compiler/debugger requirements. Consumers reading DWARF information they do not understand are able to easily skip past that information, meaning that older consumers are not broken by the addition of new features. DWARF itsel...
An Extent File System can reside on a regular disk partition or on a logical volume; see lv(1M). The disk partition or volume is divided into a certain number of 512-byte sectors, also called basic blocks. The current maximum size limit of an Extent File System is 16777214 blocks, equivalent to 8 gigabytes. The Extent File System imposes a common format for certain vital information on its underlying storage medium. Basic block 0 is unused and is available to contain a bootstrap program or other...
The file name a.out is the default ELF-format output file name from the link editor ld(1). The link editor will make an a.out executable if there were no errors and no unresolved external references. Programs that manipulate ELF files may use the library described in elf(3E). An overview of the file format follows. For more complete information, see the references given below. Linking View Execution View ELF header ELF header Program header table Program header table (optional) Section 1 Segment...
The file /etc/exports describes the filesystems that are being exported to NFS clients. It is created by the system administrator using a text editor It is processed by exportfs(1M) at system startup and by the mount request daemon, mountd(1M), each time a mount request is received. exportfs should be re-executed after making changes to the file. The file consists of a list of filesystems, the netgroup(4) or machine names allowed to remote mount each filesystem and possibly a list of options. Th...
The nfs and kfs filesystems are optional products. Support for iso9660 filesystems is in the optional subsystem eoe.sw.cdrom. IRIX implements dos, hfs, iso9660, and kfs filesystems as user mode NFS daemons. In some cases errors detected by these daemons are reported as NFS errors. Although NFS is a product option, support for these filesystem types is not dependent on the installation of NFS. Page 2 filesystems(4) filesystems(4)...
The katype(1) and ksd(1m) commands identify the type of a file using, among other tests, a test for whether the file begins with a certain magic number. The file /usr/adm/appletalk/filetype specifies the magic numbers and other test being applied. The tests determine the proper type of the native UNIX files for the Macintosh AFP client. Each line of the file specifies a test to be performed. A test compares the data starting at a particular offset in the file with a 1-byte, 2-byte, or 4-byte num...
The /etc/fsd.auto file below causes mediad to do the following on system startup: check the floppy at /dev/rdsk/fds0d3.3.5hi for floppy insertions once every 2 seconds and hardware floppy ejects once every 60 seconds; check the CDROM at /dev/scsi/sc0d4l0 at the default intervals; and do not check the tape device at /dev/tape. /dev/rdsk/fds0d3.3.5hi /floppy mediad rw,inschk=2,rmvchk=60 0 0 /dev/scsi/sc0d4l0 /CDROM mediad ro 0 0 /dev/tape /tape mediad mon=off 0 0...
An /etc/fsd.auto file that shows mediad is running for the floppy at /dev/rdsk/fds0d3.3.5hi and the cdrom at /dev/scsi/sc0d4l0 but not for the device at /dev/tape would look like the following. /dev/rdsk/fds0d3.3.5hi /flop dos rw,sock=/tmp/.mediada001UI 0 0 /dev/scsi/sc0d4l0 /CDROM iso9660 ro,sock=/tmp/.mediada001UI 0 0
The filesystem types nfs2, nfs3, and nfs3pref are accepted for compatibility with earlier releases. nfs2 is equivalent to vers=2. nfs3 is equivalent to vers=3. nfs3pref is equivalent to nfs with no vers= option. Options used by the mount(1M) command on normal filesystems are ignored when applied to the root filesystem, since the fstab file cannot be read before mounting the root filesystem. These options include rw and ro (the root filesystem cannot be mounted read-only), grpid, quota and qnoenf...
The owner of the .rhosts file must be the super-user (i.e., root) or the user in whose home directory it resides. The contents of a user's .rhosts file will be disregarded if it is owned by another user or if its permissions allow anyone who is not the owner to modify the file. Use the chmod(1) command to add the proper protection: chmod 600 .rhosts Likewise, /etc/hosts.equiv must be owned by and writable only by the super-user. HOSTS.EQUIV(4) HOSTS.EQUIV(4) If the user's home directory is NFS...
The owner of the .rhosts file must be the super-user (i.e., root) or the user in whose home directory it resides. The contents of a user's .rhosts file will be disregarded if it is owned by another user or if its permissions allow anyone who is not the owner to modify the file. Use the chmod(1) command to add the proper protection: chmod 600 .rhosts Likewise, /etc/hosts.equiv must be owned by and writable only by the super-user. Page 2 HOSTS.EQUIV(4) HOSTS.EQUIV(4) If the user's home directory...
The internal hardware graph is exported to user-level through a pseudofile system (similar to /proc(4)). The hwgfs file system represents the collection of all interesting hardware and pseudo-devices as a file system tree of special files and directories. It is mounted at /hw by the kernel during system boot, and can be re-mounted using /etc/mnthwgfs. In order to represent the directed graph as a Unix file system tree, hwgfs imposes an artificial hierarchy on the hardware graph, and it uses hard...
The Audio File Library currently supports 13 of the commonly found audio file formats, i.e., is able to recognize, read, and write sample data and header information to and from files in these formats. It is important not to confuse sample or audio data formats with file formats. The former refers to the bit-wise organization of the sound samples in the file, i.e., whether the format is 8-bit integer or 16-bit unsigned, etc. Audio file format refers to the structure of the audio file header, the...
An inode is the volume data structure used by the Extent File System (EFS) to implement the abstraction of a file. (This is not to be confused with the in-core inode used by the operating system to manage memory-resident EFS files.) An inode contains the type (for example, plain file, directory, symbolic link, or device file) of the file; its owner, group, and public access permissions; the owner and group ID numbers; its size in bytes; the number of links (directory references) to the file; and...
This file controls the behavior of the Lightweight Directory Access Protocol (LDAP) client implementation for nsd. It is read by the initialization routine of the ldap(7P) library when the nsd daemon is started, or sent the SIGHUP signal. This file contains information about remote LDAP daemons database schemas, and format rules. The file is made up of comment lines, table entries, server entries and the domain command. Comment lines begin with either a '#' or a ';' character, and are ignore...
Because the dwarf version 2 debugging information format uses several techniques to offer descriptive power and flexibility while retaining a compact representation, reading and writing the data is not simple. Consequently two C interfaces are provided. A consumer interface that allows easy reading of all the data, hiding representation details while providing all the data in the debugging information. See A Consumer Library Interface to DWARF, which is in troff in libdwarf2.1.mm and PostScript ...
The header files and is a list of various limits on resources that IRIX imposes on applications. The limits in these headers fall into 3 main categories. Numerical limits These specify the maximum and minimum representable numbers for the fundamental "C" types (integer, float, etc.). Minimum resource limits These specify the minimum limits on certain resources. These are usually specified by either the POSIX or XPG standards. Many of these have higher actual limits that ar...
The cc(1), f77(1), pc(1), and pl1(1) commands generate an entry in the object file for each source line on which a breakpoint is possible [when any of the commands are invoked with the -g option]. Users can then reference line numbers when using dbx (see dbx(1)). The structure of these line number entries is described in the Assembly Language Programmer's Guide.
A sample master file for a shared memory module is named shm. The module is an optional loadable software module that can only be specified once. The module prefix is shm, and it has no major number associated with it. In addition, another module named ipc is necessary for the correct operation of this module. *FLAG PREFIX SOFT #DEV DEPENDENCIES ox shm - - ipc shmsys(){nosys} shmexec(){} shmexit(){} shmfork(){} shmslp(){true} shmtext(){} $ #define SHMMAX 131072 #define SHMMIN 1 #define SHMMNI 10...
The miser configuration file is a list of the queue names and the location of each queue definition file. QUEUE system /usr/local/miser/config.system QUEUE physics /usr/local/miser/config.physics
An example resource schedule list for an application that requires 10 CPUs, 100 megabytes of memory, and 100 minutes of wall clock time: #resource schedule SEGMENT TIME 100m NCPUS 10 MEMORY 100m
1. Loadable modules must not have any dependencies on loadable modules, other than library modules. When a module is loaded, it is linked against the kernel symbol table and any loaded library modules' symbol tables, but it is not linked against other modules' symbol tables. Page 8 mload(4) mload(4) 2. Only character, block and streams device drivers, streams modules and library modules are supported as loadable modules at this time. 3. Old style drivers (devflag set to D_OLD) are not loadable...
The MPEG compression format is supported by several developer and enduser products. Current support is limited to MPEG-1, Layers I/II audio, and systems streams with one audio track and one video track.
/var/sysgen/mtune/* default system tunable parameters /var/sysgen/stune local settings for system tunable parameters /var/sysgen/system/* master system configuration files
The names_table file is created and maintained by the Name Binding Protocol daemon (nbpd(1m) (Reg.)contains the names of named AppleTalk services registered by the host users of the Name Binding Protocol services of the K-TALK/Host libraries. It should be removed whenever nbpd(1m) is restarted, for example, with the -S option of nbpd(1m). This file is not meant to be humanly readable, but its contents are decoded by the atservers(1) command....
nbp_pid is the file which contains the process ID of the Name Binding Protocol daemon, nbpd(1m). It should be removed whenever nbpd(1m) is restarted, for example, with the -S option of nbpd(1m). The file contains a single integer.
The network configuration database, /etc/netconfig, is a system file used to store information about networks connected to the system and available for use. The netconfig database and the routines that access it [see getnetconfig(3N)] are part of the UNIX System V Network Selection component. The Network Selection component also includes the environment variable NETPATH a...
The netgroup data is used only when the nsd(1M) daemon is running. It is supported in any of the protocol libraries included with Irix, but only one protocol may be used. Listing multiple protocols on the netgroups line in nsswitch.conf(4) is not well defined. Page 1 NETGROUP(4) NETGROUP(4)
The Audio File Library currently supports 13 of the commonly found audio file formats, i.e., is able to recognize, read, and write sample data and header information to and from files in these formats. It is important not to confuse sample or audio data formats with file formats. The former refers to the bit-wise organization of the sound samples in the file, i.e., whether the format is 8-bit integer or 16-bit unsigned, etc. Audio file format refers to the structure of the audio file header, the...
This file controls the behavior of the name service daemon nsd(1M). It is read by the daemon on startup and is used to build a filesystem maintained by nsd typically mounted on /ns. The paths are of the format /ns/domain/table/protocol/key. Each nsswitch.conf file results in a domain directory under /ns. The /etc/nsswitch.conf file corresponds to /ns/.local, while each file in /var/ns/domains/DOMAINNAME/nsswitch.conf will result in a directory /ns/DOMAINNAME. The file contains a list of maps sup...
This manual page gives definitions for the bitmask of debugging options that programs like opi(1m), fpod(1m) or imagetox(1) require when being run from the UNIX commandline. Most users will be able to turn on debugging for most FullPress programs from the GUI interfaces and can safely ignore this list. While all the FullPress programs will accept any of these bits (and any others not declared here), some of the bits are not applicable to certain programs. Hex bit The debug item it enables 000000...
If the NFS option is installed, the passwd file can also have lines beginning with a `+' (plus sign) which means to incorporate entries from the NIS. There are three styles of + entries in this file: + Means to insert the entire contents of the NIS password file at that point. +name Means to insert the entry (if any) for name from the NIS at that point. Page 2 passwd(4) passwd(4) +@netgroup Means to insert the entries for all members of the network group netgroup at that point. If a + entry has...
This file controls the behavior of the peer_encaps(1M) daemon. It contains information about each SNMP version one subagent that runs on the local system. The peer_encaps daemon registers each subtree with the peer_snmpd master daemon, then for each request converts the possibly version two protocol request into version one packets and forwards it to the encapsulated subagent. Each response is then converted back into the requesting version and sent back. The format of this file is: [AGENT [ON H...
This file controls the behavior of the peer_snmpd(1M) daemon. It contains information about manager applications, SNMPv1 community definitions, and SNMPv2 party definitions. For information on the format of v2 party definitions, please rfer to the section SNMPv2 CONFIGURATION. The general format is: MANAGER [ON TRANSPORT ] [SEND [ALL | NO | traplist] TRAPS [TO PORT <#> ] [WITH COMMUNITY ]] COMMUNITY ALLOW op [,op]...
/proc is a filesystem that provides access to the image of each active process in the system. This was historically mounted as /debug. /proc does not consume any disk resources. This interface provides a richer set of functionality and replaces the now obsolete dbg(4), debug(4) interface. The "files" of this filesystem are of the form /proc/nnnnn and /proc/pinfo/nnnnn, where nnnnn is a decimal number corresponding to the process-ID. These files actually consume no disk space, and are only conv...
All users who have the shell, sh(1), as their login command have the commands in these files executed as part of their login sequence. /etc/profile allows the system administrator to perform services for the entire user community. Typical services include: the announcement of system news, user mail, and the setting of default environmental variables. It is not unusual for /etc/profile to execute special actions for the root login or the su(1M) command. The file $HOME/.profile is used for setting...
When a job is submitted to at(1) or batch(1), the job is constructed as a shell script. First, a prologue is constructed, consisting of: o A header whether the job is an at job or a batch job (actually, at jobs submitted to all queues other than queue a, not just to the batch queue b, are listed as batch jobs); the header will be : at job for an at job, and : batch job for a batch job. o A set of Bourne shell commands to make the environment (see environ(5)) for the at job the same as the curren...
The queuedefs file describes the characteristics of the queues managed by cron(1M). Each non-comment line in this file describes one queue. The format of the lines are as follows: q.[njobj][nicen][nwaitw] The fields in this line are: q The name of the queue. a is the default queue for jobs started by at(1); b is the default queue for jobs started by batch(1); c is the default queue for jobs run from a crontab file. The name must be a lower case letter. njob The maximum number of jobs that can be...
Author: Walter F. Tichy, Purdue University, West Lafayette, IN, 47907. Revision Number: 5.7; Release Date: 1998/01/12. Copyright c 1982, 1988, 1989 by Walter F. Tichy. Copyright c 1990, 1991, 1992, 1993, 1994, 1995 by Paul Eggert.
This file controls the behavior of then resolver(3N) routines in the C library. It is read by these routines the first time they are invoked by a process. The file is designed to be human readable and contains a list of keywords with values that provide various types of resolver information. The keyword and value must appear on a single line, and the keyword (for example, nameserver) must start the line. The value follows the keyword, separated by white space. This file is not necessary if there...
IRIS image files are used to store 1,2 and 3 dimensional arrays of pixel values that contain either 1 or 2 bytes per pixel. Pixel values are signed integers that cover the range 0..255 or -32768..32767 (i.e. 1 or 2 bytes). Image files are currently used to store rgb screen dumps, black and white images, color index images, as well as colormaps. The image library provides tools to manipulate these files. To include the image library place the token -limage on the compile line for your program. Al...
The rpc file contains user readable names that can be used in place of Sun RPC program numbers. Each line has the following information: name of server for the RPC program RPC program number aliases Items are separated by any number of blanks and/or tab characters. A ``#'' indicates the beginning of a comment; characters up to the end of the line are not interpreted by routines which search the file. Here is an excerpt of the /etc/rpc file on IRIX: # # rpc 1.10 87/04/10 # portmapper 100000 por...
/var/sysadm/salog System administration log. /var/sysadm/oldsalog Old system administration log. /var/sysadm/salog.conf System administration log configuration file.
An audit file consists of an Audit File Header followed by a number of AUDIT RECORDS. A new audit record is created for each auditable event. An Audit Record consists of an Audit Record Header Token followed by a number of Audit Tokens. An Audit Token consists of an Audit Token Header followed by token data which is specific to each token. The Audit Token Header consists of an unsigned 16 bit token identifier and an unsigned 16 bit token size field. The contents of the Audit File Header are: ___...
The curses(3X) function scr_dump() will copy the contents of the screen into a file. The format of the screen image is as described below. The name of the tty is 20 characters long and the modification time (the mtime of the tty that this is an image of) is of the type time_t. All other numbers and characters are stored as chtype (see ). No newlines are stored between fields. for e...
The Audio File Library currently supports eight of the commonly found audio file formats, i.e., is able to recognize, read, and write sample data and header information to and from files in these formats. It is important not to confuse sample or audio data formats with file formats. The former refers to the bit-wise organization of the sound samples in the file, i.e., whether the format is 8-bit integer or 16-bit unsigned, etc. Audio file format refers to the structure of the audio file header, ...
The /etc/securenets file lists networks and hosts that may participate in the NIS protocol with this host. This file is used by both the NIS server library nisserv(7p). This file contains any number of netmask/address pairs, one per line separated by white space. The netmask controls which bits in an address are contained in the match. It should contain all ones followed by all zeros in binary. A netmask of 255.255.255.255 (all ones in binary) would require an exact match of the address. An exam...
It is sometimes useful to be able to determine which processes are using a particular port. This can be accomplished using the fuser(1M) command. For example, in order to see which processes are listening on TCP port 25, the command fuser 25/tcp can be used. Note that fuser only accepts service names in their numeric form; symbolic names such as ``smtp'' cannot be used.
The Audio File Library currently supports 13 of the commonly found audio file formats, i.e., is able to recognize, read, and write sample data and header information to and from files in these formats. It is important not to confuse sample or audio data formats with file formats. The former refers to the bit-wise organization of the sound samples in the file, i.e., whether the format is 8-bit integer or 16-bit unsigned, etc. Audio file format refers to the structure of the audio file header, the...
The Audio File Library currently supports 13 of the commonly found audio file formats, i.e., is able to recognize, read, and write sample data and header information to and from files in these formats. It is important not to confuse sample or audio data formats with file formats. The former refers to the bit-wise organization of the sound samples in the file, i.e., whether the format is 8-bit integer or 16-bit unsigned, etc. Audio file format refers to the structure of the audio file header, the...
This file controls the behavior of accesses to standard system databases, such as the passwd and group databases. Normally, each database has its own set of standard access routines. For example, the passwd database routines are defined by getpwent(3C). When such a routine is called, the requested information is iteratively searched through various sources. Usually, all database routines support a standard source which are compiled-in along with them. For example, the standard source for passwd ...
/var/statmon/sm and /var/statmon/sm.bak are directories generated by statd. Each entry in /var/statmon/sm represents the name of a machine to be monitored by statd. Each entry in /var/statmon/sm.bak represents the name of a machine to be notified of statd's recovery. /var/statmon/state is a file generated by statd to record its version number. This version number is incremented each time a crash or recovery takes place....
Here are the contents of /usr/lib/locale/C/LC_TIME: Jan Feb ... January February ... Sun Mon ... Sunday Monday Page 1 strftime(4) strftime(4) ... %H:%M:%S %m/%d/%y %a %b %e %H:%M:%S ...
The following information applies to the IRIX 4 COFF symbol table and, for now, the .mdebug section found in 32-bit objects on IRIX 6. In a future IRIX release, the .mdebug section will be replaced. The MIPS symbol table departs from the standard COFF symbol table. The symbol table consists of many tables unbundling information usually found in the one COFF symbol table. The symbol table should be viewed as a hand-crafted, network-style database designed for space and access efficiency. The foll...
The current midi synthesizer identifies preset files via a string which must be used as the first line of the file. Following this is the word PRESET in all capital letters, on its own line: #Synth Preset v1.0
Compiled terminfo(4) descriptions are placed under the directory /usr/share/lib/terminfo. In order to avoid a linear search of a huge UNIX system directory, a two-level scheme is used: /usr/share/lib/terminfo/c/name where name is the name of the terminal, and c is the first character of name. Thus, att4425 can...
terminfo is a database produced by tic that describes the capabilities of devices such as terminals and printers. Devices are described in terminfo source files by specifying a set of capabilities, by quantifying certain aspects of the device, and by specifying character sequences that effect particular results. This database is often used by screen oriented applications such as vi and curses programs, as well as by...
This file sets the time zone environmental variable TZ. This file is read by init(1) after system boot up and all subsequent processes inherit TZ in their environment. Other variables than TZ may also be set in this file, for programs that are run from init. Some programs started by init reset all or part their environment, and therefore these variables may not be seen by all programs. The form of the variables is TZ =value Lines that are too long are ignored; in practice...
The tape support configuration file is ts.config. This file defines the location of the personality-daemon binaries and the options available for executing the tsdaemon(1M) command. The tape support configuration file consists of statements and comments (optional). A comment begins with the # symbol and continues to the end of line. A statement consists of a name followed by a list of keyword parameters. The following statements are supported: o...
The header file lists the symbolic constants and structures not already defined or declared in some other header file. /* Symbolic constants for the "access" routine: */ #define R_OK 4 /*Test for Read permission */ #define W_OK 2 /*Test for Write permission */ #define X_OK 1 /*Test for eXecute permission */ #define F_OK 0 /*Test for existence of File */ #define F_ULOCK 0/*Unlock a previously locked region */ #define F_LOCK 1/*Lock a region for exclusive use */ #define F_TLOCK 2/*Tes...
The file /var/yp/updaters is a makefile (see make(1)) which is used for updating NIS databases. Each entry in the file is a make target for a particular NIS database. For example, if there is a NIS database named passwd.byname that can be updated, there should be a make target named passwd.byname in the updaters file with the command to update the file. The information necessary to make the update is passed to the update command through standard input. The information passed is described below (...
These files, which hold user and accounting information for such commands as who, last, write, and login, contain entries with the following structure, defined in utmp.h: #define UTMP_FILE "/var/adm/utmp" #define WTMP_FILE "/var/adm/wtmp" #d...
utmpx and wtmpx files are extended versions of utmp and wtmp, resp., containing records of type struct utmpx. The utmpx struct is a superset of the utmp struct, containing both additional fields and larger array allocation for several existing fields. utmpx's most significant addition is the ut_host field, which identifies the host from which the ent...
The Audio File Library currently supports 13 of the commonly found audio file formats, i.e., is able to recognize, read, and write sample data and header information to and from files in these formats. It is important not to confuse sample or audio data formats with file formats. The former refers to the bit-wise organization of the sound samples in the file, i.e., whether the format is 8-bit integer or 16-bit unsigned, etc. Audio file format refers to the structure of the audio file header, the...
The Audio File Library currently supports 13 of the commonly found audio file formats, i.e., is able to recognize, read, and write sample data and header information to and from files in these formats. It is important not to confuse sample or audio data formats with file formats. The former refers to the bit-wise organization of the sound samples in the file, i.e., whether the format is 8-bit integer or 16-bit unsigned, etc. Audio file format refers to the structure of the audio file header, the...
ximconf contains the information regarding the configurations of xwnmo, such as, environments of each supported languages(the relation between internal locale and external locale, CSWIDTH(code set width), whether use conversion server or not and etc.), default locale and locale for world environment. Lines that start with a semicolon (;) are comments. Coding format: {ext_locale}[|{ext_locale}|...] {lang} {internal_locale} {cswidth} {using_server} {code_trans} or setdefaultlocale {def_locale} or ...
The ximrc file sets up the environment for the xwnmo. Individual settings can be specified for each user. Duplicate entries will be overwritten. Lines that start with a semicolon (;) are comments. Xwnmo will search this file as follows: 1. Resource "ximrcName" 2. $HOME/.ximrc 3. /usr/lib/wnn/ximrc (Default) The following settings are specified in this file. Any setting which is not specified will use the default value. setuumrc Specifie...
An address translation section is created by commands such as pixie(1), and cord(1) to allow other tools such as dbx(1) and dis(1) to accurately display information about the program text. There can be a maximum of two address translation sections (one of each section type (see below)) in a given a.out or DSO. Translation information is held in ELF sections with sh_type SHT_MIPS_XLATE (section name .MIPS.Xlate), SHT_MIPS_XLATE_DEBUG (not currently generated by cord or pixie), or SHT_MIPS_XLATE_O...
The file /var/yp/binding/DOMAINNAME/ypservers contains a static list of available NIS servers for the domain DOMAINNAME. If this file exists, then only the servers listed in it are eligible to act as NIS servers for this client. The file contains a whitespace separated list of host names or IP addresses. If a name is given then an entry for this host must exist in the local hosts file /etc/hosts. An example file would be: 128.1.2.1 bigserver 192.0.1.1 150.166.2.3 This file lists four hosts which...
This man page is a quick reference for the three Application Binary Interfaces (ABI) that are supported by IRIX. GENERAL INFORMATION An ABI defines a system interface for executing compiled programs. It defines which Instruction Set Architectures (ISA) it supports as well as defining object file formats and calling conventions. IRIX supports three ABIs: o32 The old 32-bit ABI which was standard on IRIX 5 systems. n64 The 64-bit ABI which was introduced on IRIX 6.0 systems. n32 The new high perfo...
In general, users should never have any direct interaction with the array services daemon. Instead, all interaction with the array services daemon is done through the array services library, libarray. libarray provides functions for dealing with global ASH's, describing the current array configuration, and executing array commands. There are a number of libarray functions, all of which are documented in chapter 3X man pages. Some of the libarray functions include: ASH Functions asal...
Parallelization is the process of analyzing sequential programs for parallelism so that they may be restructured to run efficiently on multiprocessor systems. The goal is to minimize the overall computation time by distributing the computational work load among the available processors. Parallelization can be automatic or manual. During automatic parallelization, the MIPSpro Automatic Parallelization Option, hereafter called the auto-parallelizer, analyzes and structures the program with little ...
Once availmon is installed, "registration" is required before availmon reports are automatically distributed, and if desired, other options may also be configured. Registration of a system can normally be accomplished simply by enabling the flag autoemail using amconfig autoemail on. The default distribution of email reports is to send a diagnosis report to availmon@csd.sgi.com, which enters the report into the SGI Availmon Database. Further adjustments of Email distribution are described in t...
Aware scalable MPEG (Motion Pictures Experts Group) compression software provides advanced psychoacoustic processing for compression of high quality audio (up to 48 kHz sampling rate) in authoring, publishing, and large audio database applications. Real-time operation encodes audio while recording and provides moderate compression ratios. Non-real-time operation invokes advanced psychoacoustic modeling for high compression ratios. Encoding bit-rates range from 32 kbits/second to 448 kbits per se...
compose is a mechanism for inputting accented international Latin characters through an international keyboard. A US keyboard with ASCII or compose specification can also be utilized for the international key input by using xmodmap(1) to assign the Right-Alt key or dead-key. To enter a composed character (consisting of a plain character and combining accent character) or a special symbol such as "copyright" through a keyboard, the following two methods are supported: +
composetable is a list of all valid key sequences that can be used with the compose mechanism as described in compose(5). The list covers code points 0xA0 through 0xFF and several additional characters of the Unicode Latin 1 code page. The valid KEYSYMNAME (key map definition name) for the xmodmap(1) command is enclosed in less-than/greater-than signs (e.g., ). Note the distinction between an accent key such as and a dead-key such as . The Character Name indicates the ...
The cpuset command is used to create and destroy cpusets, to retrieve information about existing cpusets, and to attach a process and all of its children to a cpuset. The cpuset command uses a cpuset configuration file and a name (see cpuset(4) for a definition of the file format). The cpuset configuration file is used to define the CPUs that are members of the cpuset. It also contains additional parameters required to define the cpuset. A cp...
Each datapool item, when compiled, will be turned into a separate external symbol so it can be correctly associated with the same symbol declared in other program units without being affected by its relative order in the datapool. In one blockdata subprogram, and in only one, a datapool must be defined as to its exact number of items, sizes, and relative order. This will be used as the basis for sharing the datapool with other processes wishing to access the same data. Each blockdata can contain...
/usr/share/src/gnutools/diff Directory of sources for port of DIFF version 1.15 to Silicon Graphics systems. This source is part of the eoe.src.gnutools subsystem.
On systems with mandatory access control (MAC) enabled, the set of all possible Mandatory Access Control (MAC) labels constitutes a lattice, where a lattice is defined to be a partially ordered set for which there exists, for every pair of elements in the set, a greatest lower bound (GLB) and a least upper bound (LUB). A partial ordering over a set is defined by a relation that has the following three properties: reflexive, antisymmetric, transitive. The reflexive property states that every elem...
An example placement file describing two memories and two threads might look like: # placement specification file # set up 2 memories which are close memories 2 in topology cube # set up 2 threads threads 2 # run the first thread on the 2nd memory run thread 0 on memory 1 # run the 2nd thread on the first memory run thread 1 on memory 0 This specification, when used for initial placement, would request 2 nearby memories from the operating system. At creation, the threads are requested to run on ...
This man page describes Dynamic Shared Objects (DSOs). It is divided into the following 4 sections: * Overview * Linking and building DSOs * Performance considerations * Frequently asked questions
Tapes used by dump and restore(1M) contain: a header record two groups of bit map records a group of records describing directories a group of records describing files The format of the header record and of the first record of each description as given in the include file is: #define TP_BSIZE 1024 #define NTREC 10 #define LBLSIZE 16 #define NAMELEN 64 #define TS_TAPE 1 #define TS_INODE 2 #define TS_BITS 3 #define TS_ADDR 4 #define TS_END 5 #define TS_CLRI 6 #define MAGI...
It is often desirable to specify the exact layout of an executable file. Some of the uses of this might be embedded systems, thread-local data layout, reducing cache conflicts, reducing false sharing, reducing memory utilization. The current linker allows exact specification of layout via the ELF Layout Specification language.
In order to reduce potential security breaches that ESP may cause, SGI asked RSA Security, Inc. to perform an evaluation of ESP. Pursuant to the evaluation, SGI implemented a wide range of recommendations from RSA Security, including: o Validating user permissions of process for proactive actions and disabling actions by root o Implementing reverse DNS lookup for both the Web server and ESP SGM o HMAC/MD5 digital signature of all data transfers to the ESP SGM o Disabling of login attempts with t...
The following steps are required to set up session or extended process accounting: * Enable session and/or extended process accounting in the kernel by using the systune(1M) utility to set the do_sessacct and/or do_extpacct parameters to non-zero values. Page 2 extacct(5) extacct(5) * Use the inst(1M) utility to install the eoe.sw.audit subsystem from your IRIX distribution media. This will add the special components required for the system audit trail facility to your system. It will be necessa...
The fcntl.h header defines the following requests and arguments for use by the functions fcntl (see fcntl(2)) and open (see open(2)). Values for cmd used by fcntl (the following values are unique): F_DUPFD Duplicate file descriptor F_GETFD Get file descriptor flags F_SETFD Set file descriptor flags F_GETFL Get file status flags F_SETFL Set file status flags F_GETLK Get record locking information F_SETLK Set record locking information F_SETLKW Set record locking information; wait if blocked F_ALL...
GP overflow is reported by the linker with one of several error messages: GP-relative sections overflow by 0x??? bytes. Please recompile with a smaller -G value. GOT overflow: please relink with -multigot. GOT unreachable: please relink with -multigot. These messages all indicate that the code being linked contains more than 64KB of GP-relative data area (see the next section), and attempts to reference it with a signed 16-bit displacement from the GP register. In the past we recommended recompi...
The example in this section describes a method of laying out the disks, filesystem, and real-time file that enables the greatest number of processes to obtain guarantees on a single file concurrently. It is not necessary to construct a file in this manner in order to use GRIO, however fewer processes can obtain rate guarantees on the file as a result. It is also not necessary to use a real-time file, however guarantees obtained on non-real time files can only be considered to be "soft" guarant...
For the conversion of ISO 646de to ISO 8859-1 all characters not in the following table are mapped unchanged. Page 1 iconv(5) iconv(5) _________________________ |Conversions Performed | |_______________________| |ISO 646de | ISO 8859-1 | |__________|____________| |100 | 247 | |133 | 304 | |134 | 326 | |135 | 334 | |173 | 344 | |174 | 366 | |175 | 374 | |176 | 337 | |__________|____________|
IPA is controlled from the command line with two option groups. -INLINE:... controls inlining by the standalone inliner. It should be used on your compile command line. -IPA:... controls general IPA choices. If you use separate compile and link steps (i.e. using -c when you compile and then linking the .o files produced with a separate cc(1), f77(1), or ld(1) command), then you need to use -IPA for the compile step, with or without individual options described below, and also for the link step w...
This header file contains the constants used to identify items of langinfo data. The mode of items is given in nl_types(5). DAY_1 Locale's equivalent of ``sunday'' DAY_2 Locale's equivalent of ``monday'' DAY_3 Locale's equivalent of ``tuesday'' DAY_4 Locale's equivalent of ``wednesday'' DAY_5 Locale's equivalent of ``thursday'' DAY_6 Locale's equivalent of ``friday...
This library is a collection of functions which are perhaps best thought of as three groups: the xlate functions used to create and access the .MIPS.xlate and related sections, the leb128 functions, and a disassembly function (undocumented). The following is a description of the xlate routines. The xlate routines are used to create and access addresses translation data as described in xlate(4). Calls used to create address translation data are called "producer" calls. Calls used to create appl...
A license file consists of the following sections: Optional license-server section, with information about node where the SERVER (or redundant SERVERs) are running, along with a list of all vendor-specific DAEMON(s) that the SERVER needs to run. This section is required if any features are counted. Features section, consisting of any combination of FEATURE, INCREMENT, UPGRADE, USE_SERVER or PACKAGE lines. This section is required. Optional FEATURESET section, consisting of at most one FEATURESET...
The license.opt file contains optional information supplied by the system administrator at the end-user site. This information can be used to tailor the behavior of the license daemons. The options file can contain the following information: reserved license information logfile control options license timeout control license access control Lines beginning with an pound sign (#) are ignored, and can be used as comments. In version 4.0, the maximum length for a line is 2048 characters with backsla...
This file is part of the Samba suite. lmhosts is the Samba NetBIOS name to IP address mapping file. It is very similar to the /etc/hosts file format, except that the hostname component must correspond to the NetBIOS naming format.
The MIPS R4000 processor contains many instruction set extensions to the MIPS1 instruction set that was defined by the MIPS R2000/R3000. A subset of these instruction set extensions defines the MIPS2 instruction set and is accessible with the -mips2 option. The MIPS3 instruction set includes the remaining extensions and is described in mips3(5). The -mips2 option is supported when compiling C, C++, Fortran, Pascal or Assembly language source files. It instructs the code generation phase to gener...
The MIPS3 extensions to the MIPS instruction set, introduced in the R4000 processors, are primarily to support 64-bit addresses and arithmetic and a larger floating point register set. The 64-bit addressing features are only supported on machines running a 64-bit kernel. The 64-bit arithmetic features are supported on all machines running IRIX 6.2 and later releases (R4K and later CPUs). The MIPS3 instruction set extensions provide the following features: o 64-bit integer registers, with a compl...
The MIPS4 instruction set extensions consist of a backward compatible superset of the MIPS3 instruction set. The MIPS4 extensions are intended primarily to provide better performance in floating point numeric processing. These features are currently supported under IRIX 6.2 and later releases running on machines with the R8000, R10000, or R5000 microprocessors. The MIPS4 instruction set extensions provide the following features: o A new set of multiply-add instructions takes advantage of the fac...
This header file contains the following definitions: nl_catd used by the message catalog functions catopen, catgets and catclose to identify a catalog nl_item used by nl_langinfo to identify items of langinfo data. Values for objects of type nl_item are defined in langinfo.h NL_SE...
This man page describes environment variables used when developing and running MIPSpro 7 Fortran 90 programs on IRIX systems. The environment variables are grouped by function and platform.
The directory /usr/share/data/sounds/prosonus contains a collection of music and sound files created by Prosonus especially for your Silicon Graphics IRIS Indigo, Indigo^2, Indy, Personal IRIS 4D/35 or 4D/30 computer system. These files are a small sampling of the music, sound effects and instrument samples that will be available on CD-ROM through Silicon Graphics Software Express and Prosonus. For more information concerning Prosonus CD-ROM products, call SGI Software Express at 1 (800) 800-744...
The R10000 processor supplies two performance counters for counting certain hardware events. Each counter can track one event at a time and there are a choice of sixteen events per counter. There are also two associated control registers which are used to specify which event the relevant counter is counting. The R12000 and R14000 processors supply two performance counters for counting hardware events. Each counter can track one event at a time, and you can choose among 32 events per counter. Usi...
Author: Walter F. Tichy, Purdue University, West Lafayette, IN, 47907. Copyright c 1982, 1988, 1989 by Walter F. Tichy. Copyright c 1990, 1991, 1992, 1993, 1994, 1995 by Paul Eggert
Hardware Reference Counters Origin 2000 and Origin 200 systems provide a set of counters for every 4 KB hardware page of memory. The number of counters per set depends on the number of nodes in the system: for systems with less than 64 nodes (that is 128 processors) a counter set has one counter per node, and for systems with more than 64 nodes a counter set has one counter for every 8 nodes. For systems with 64 or less nodes, each counter in a counter set counts the numbers of references from e...
BREs Matching a Single Character or Collating Element A BRE ordinary character, a special character preceded by a backslash or a period matches a single character. A bracket expression matches a single character or a single collating element. BRE Ordinary Characters An ordinary character is a BRE t...
These functions are general purpose regular expression matching routines to be used in programs that perform regular expression matching. These functions are defined by the regexp.h header file. The functions step and advance do pattern matching given a character string and a compiled regular expression as input. The function compile takes as input a regular expression as defined below and produces a compiled expressio...
If a process is catching a signal, it may request information that tells why the system generated that signal (see sigaction(2)). If a process is monitoring its children, it may receive information that tells why a child changed state (see waitid(2)). In either case, the system returns the information in a structure of type siginfo_t, which includes the following information: int si_signo /* signal number */ int si_errno /* err...
A signal is an asynchronous notification of an event. A signal is said to be generated for (or sent to) a process or a thread when the event associated with that signal first occurs. Examples of such events include hardware faults, timer expiration and terminal activity, as well as the invocation of the kill(2), sigqueue(3) or sigsend(2) system calls. In some circumstances, the same event generates signals for multiple processes. A process...
Each section in the configuration file (except for the [global] section) describes a shared resource (known as a "share"). The section name is the name of the shared resource and the parameters within the section define the Page 1 (printed 2/13/04) SMB.CONF(5) UNIX System V (14 March 2003) SMB.CONF(5) shares attributes. There are three special sections, [global], [homes] and [printers], which are described under special sections. The following notes apply to ordinary section descriptions. A sh...
This tool is part of the Samba suite. smbpasswd is the Samba encrypted password file. It contains the username, Unix user id and the SMB hashed passwords of the user, as well as account flag information and the time the password was last changed. This file format has been evolving with Samba and has had several different formats in the past.
The system calls stat, lstat and fstat return data in a stat structure, which is defined in stat.h and includes the following members: dev_t st_dev; ino_t st_ino; mode_t st_mode; nlink_t st_nlink; uid_t st_uid; gid_t st_gid; d<...
The system calls stat64, lstat64 and fstat64 return data in a stat64 structure, which is defined in stat.h and includes the following members: dev_t st_dev; ino64_t st_ino; mode_t st_mode; nlink_t st_nlink; uid_t st_uid; gi<...
This set of macros provides a means of writing portable procedures that accept variable argument lists. Routines having variable argument lists (such as printf(3)) that do not use stdarg are inherently nonportable, since different machines use different argument passing conventions. The stdarg facility is similar to varargs(5), but is based on the ANSI Standard for C. A variable argument list contains one or more parameters. The rightmost parameter plays a special role, and is designated ParmN i...
The timing facilities under IRIX consist of interval timers, event timing, process execution time accounting, and time of day reporting. Interval timers consist of POSIX timers (see timer_create (3c)), and itimers that were introduced in BSD4.2 (see getitimer(2)). Use of the POSIX timers is strongly recommended for new applications. The IRIXunique BSD4.2 itimers are supported only to provide compatibility for older applications. On Silicon Graphics machines there are two independent timers per p...
The data types defined in types.h are used in UNIX System code. Some data of these types are accessible to user code: typedef struct { int r[1]; } *physadr; typedef long clock_t; typedef long daddr_t; typedef long pgno_t; typedef char * addr_t; typedef char * caddr_t; typedef unsigned char unchar; typedef unsigned short ushort; typedef unsigned int uint; typedef unsigned long ulong; typedef unsigned long ino_t; typedef long uid_t; typedef long gid_t; typedef unsigned long nl...
The ucontext structure defines the context of a thread of control within an executing process. This structure includes at least the following members: ucontext_t *uc_link sigset_t uc_sigmask stack_t uc_stack mcontext_t uc_mcontext uc_link is a pointer to the context that is to be resumed when this context returns. If uc_link is equal to 0, then this context is the main context, and the process exits when this context returns. The u
This file contains a set of manifest constants, conditionally defined for particular processor architectures. The model assumed for integers is binary representation (one's or two's complement), where the sign is represented by the value of the high-order bit. BITS(type) The number of bits in a specified type (e.g., int). HIBITS The value of a short integer with only the high-order bit set (in most implementations, 0x8000). HIBITL The value of a long integer with only the high-order bit set (i...
This set of macros provides a means of writing portable procedures that accept variable argument lists. Routines having variable argument lists (such as printf(3)) that do not use varargs are inherently nonportable, since different machines use different argument passing conventions. PLEASE NOTE: varargs is being supplanted by stdarg(5). Users should reference that man page for the recommended method of passing variable argument lists. va_alist is used in a function header to declare a variable ...
When a process waits for status from its children via either the wait or waitpid function, the status returned may be evaluated with the following macros, defined in sys/wait.h. These macros evaluate to integral expressions. The stat argument to these macros is the integer value returned from wait or waitpid. WIFEXITED(stat) Evaluates to a non-zero value if status was ...
amesh computes an estimation of the spectrum of an audio input every frame and displays a 3D graph of the last 25 frames in a window. The frequencies range from 0 Hz on the left to half the input sampling rate on the right. The audio source should be selected using the audio control panel, and the input gain should be adjusted to get a reasonable input level. amesh does not copy the audio input to the output. Holding down the middle mouse button acts as a track-ball interface to change the viewi...
bgpaste works in one of two distinct ways: either feed it one image, which by default is automatically centered (or explicitly specify the image's origin), or feed it a list of one or more images preceeded by their respective x/y origins to be painted as a composite in the root window. In the first case, bgpaste centers and pastes inimage onto the root window regardless of inimage's size. You can override the "centering" default and explicitly position your own image manually by using the -o...
blast is an interactive 3D game where the user destroys asteroids to gain points. There are several large asteroids in orbit around a small protoplanet. From your space station base, you must venture out and shoot these asteroids to break them into smaller pieces without colliding into either the asteroids or the proto-planet. Watch out for the alien ship that fires back at you! Destroy this ship before it destroys you. (All divestments, embargoes, blockades, economic sanctions, and other politi...
Buttonfly is a user reconfigurable, hierarchical, graphical menu system. Buttonfly opens up a window and displays one or more buttons, each with its own title. Moving the mouse pointer over a button and pressing the left mouse button selects that button, and will cause it to either execute UNIX commands (such as running a program) or fly forward and flip over, exposing one or more new buttons. Each of the newly exposed buttons may also be selected to either execute UNIX commands or expose a new ...
Bz is a tank game allowing users to play against several players in a networked environment or against the computer in a solitaire mode. The view displays the cockpit and a view of the outside world. The world is made up of a playing field that contains several obstacles and a forcefield boundary. In multi-player mode, four types of tanks are currently available. You can select a tank upon startup and whenever you are killed. Each tank has a different point value associated with it. You are awar...
is a multi-player tank battle game that allows users to play against each other in a networked environment. There are five teams: red, green, blue, purple and rogue (rogue tanks are black). Destroying a player on another team scores a win, while being destroyed or destroying a teammate scores a loss. Individual and team scores are tallied and displayed whenever you are dead or paused. Your score and your team's score are always displayed on the control panel. Rogues have no teammates (not even ...
Bzfs is the server for bzflag, and it must be running to play. It can be run on any system on the network (including a player's system or one without graphics). Terminating the server terminates the game in progress.
Bzlogo converts an SGI RGB image file to a format that bz(6D) can load. The stepsize option allows some control over the refinement of the result. The default value is 2. If the program fails, try increasingly higher values until it succeeds. The left and right options indicate that the logo should appear as is on the left and right side of the tank, respectively, and should be flipped on the opposite side. This allows logos to be built that have a preferred direction with respect to the front o...
Bzwho listens to the port used by bz(6D) for a few seconds and then prints out a list of the current players and games. The games are grouped according to the flag and key settings (see the man page for bz(6D) for a description). Player data includes the team type, score, and host
The frame buffer of the IRIS contains values which are translated into RGB values by a color map for applications in color map mode. Cedit changes the mapping of any color index. Three sliders are displayed, along with a sample patch of the color being edited. Normal operation is to establish input focus by placing the cursor within the cedit window then press and hold the Alt key down. While continuing to hold the Alt key down move the cursor outside of the cedit window and click the left butto...
Clock is a window manager graphics program which shows the current (machine) time. The current machine time is set after you boot up the system, when you go into multi-user mode. If the argument "dot" is used when invoking the clock (typing "clock dot"), a small, decorative dot covers the middle of the clock face. Selecting the Calendar menu button invokes the ical (1) program. Selecting the Alarm menu button causes the alarm hour hand to be displayed in red, and the alarm time to be display...
You are riding your motorcycle against psychotic humans and robots. Avoid crashing into all bikes, trails and walls. Points are awarded for excessive speed and making others crash near you or into your trail. You can jump over trails and other cycles.
The demograph demo graphs actual U.S. census data in three dimensions over time. Two sets of data are available: Population Distribution or Per Capita Income by state.
distort demonstrates how texture mapping can be used to produce real time image distortion effects. This is achieved by mapping a high resolution texture onto a large array of polygons. The imgfile argument is used to indicate the name of an alternate image file. The default image, /usr/demos/General_Demos/distort/data/distort.rgb, is a picture of a dog. Use the left mouse button to select one of the following distortion effects:...
This is SGI DOOM v1.9, the Silicon Graphics version of the popular PC game DOOM. This is the shareware version (first episode) of the game. If you're not familiar with DOOM on the PCs, there is a seperate README file in the /usr/demos/General_Demos/doom directory that describes in lurid detail DOOM for PCs. While much of it remains relevant to SGI systems, installation and operating system information is not pertinent. First time users are advised to consult the README file to get an idea how t...
Flight is an interactive flight simulator. One large viewport shows the world; several smaller ones simulate instruments. The world is shown from the cockpit of an aircraft or from a control tower. The mouse and keyboard control the aircraft and its environment. If the -h option is selected a "heads-up" display is used instead of the instrument panel. This kind of display is commonly used in the military. It allows for a larger view, which results in a slower update rate. The -O option causes ...
gamcal checks to see if the gamma correction value is correct by comparing the intensity of full on/full off horizontal lines to a region of half-intensity grey. Normally the gamma of the display should be set to 2.4 using the program /usr/sbin/gamma. When the gamma of the display is set correctly, there should be little or no change in brightness in each column of rectangles in the window. In the column on the far left, the horizontal lines alternate full intensity and black. The average bright...
gamma with no arguments prints the current gamma correction value. gamma followed by a floating point argument sets the gamma correction value. This system resource can only be changed by the super user. Positive numbers less than 20.0 are allowable values for gamma. On systems with gamma hardware, the X server should be terminated and restarted. This can be done via kill(1) or, if xdm(1) is used, by changing the terminateServer entry in /usr/lib/X11/xdm/xdm-config to True. Colors in X clients m...
grid draws a 10 by 10 grid. This can be useful for aligning a camera to the display. To exit this program, press any key on the keyboard, or RIGHTMOUSE. PPPPaaaaggggeeee 1111
hist reads an image file specified by the user, then computes and displays the histogram of the image file. The red hash-marks indicate the boundaries of the range of intensities for a given image. The black line starting in the bottom left corner and going up to the top right is the indicator of the distribution function of the histogram. Pressing LEFTMOUSE will print the pixel value currently under the cursor. Page 1 PPPPaaaaggggeeee 1111...
I3DM is an Interactive 3D Modeler. It is provided for the demonstration of basic modeling techniques and to show the power of Silicon Graphics' workstations. There are many modeling programs available on the market, many of which have far more capabilities than I3DM offers, however I3DM is license-free, and is available at no charge. Some of the features include line and curve drawing, surface of revolution, extrusions, texture-mapping (when run on machines that support it), interactive manipul...
ideas ideas is an OpenGL implementation of Ideas In Motion. Ideas in Motion is an experiment in real-time animation. The scene opens on a piece of paper with the Silicon Graphics logo and the words "ideas in motion" on a table lit by a single lamp. The view moves in on the paper and a three dimensional version of the logo grows out of the paper and flies around a bit. The scene ends with everything faded out except the logo and the words. Pressing the left mouse button restarts the animation a...
imgexp expands the range of pixel values in an image. Pixel values less than or equal to min are mapped to 0, while pixel values greater than or equal to max are mapped to 255. If min and max are not provided on the command line, then the minimum and maximum pixel values in the image are used. This can be used to manipulate the contrast of images.
installfoliofonts extracts the specified POSTSCRIPT outline font and its associated Adobe Font Metric (AFM) file from the Adobe Macintosh Font Folio CD-ROM and installs them for use with Adobe POSTSCRIPT software. Consult the documentation for your Adobe POSTSCRIPT system software for instructions on how to make use of the new fonts.
installpcfonts extracts POSTSCRIPT outline fonts and Adobe Font Metric (AFM) files from an Adobe IBM PC font package using the Unix workstation's floppy disk drive. Consult the documentation for your Adobe system software for instructions on how to make use of the new fonts.
Interp makes smooth color ranges. Two color chips and a Gouraud-shaded polygon showing the shade range between them are displayed. To make a color range, start windows for showmap, cedit, and interp. Select the color at the lower (usually darker) end of the shade range and use cedit to set it to the desired value. Select the color at the top of the shade range and edit it as well. Now attach to (select) interp. Point to the lower color (usually on showmap). Press and release the left mouse butto...
The following error message (or something similiar) may appear when exiting out of the demos improperly: XIO: fatal IO error 131 (Connection reset by peer) on X server "localhost:0.0" after 44 requests (44 known processed) with 0 events remaining. Ignore this error message. The system has not been affected in any way. The proper way to exit out of demos is by : 1) typing the ESC key or 2) clicking on the right mouse button and selecting Exit from the menu Page 1 INTRO(6) INTRO(6) For more info...
ipaint reads images from the specified image directory and then allows you to select an image with which to paint, continuously writing the image on to the screen while the left or middle mouse button is held down. Only image files that end in 'rgb' can be selected. The default image directory is /usr/demos/General_Demos/ipaint/data.
istat prints the header information of a list of image files. x/ysize give the image's screen size in pixels; zsize is the number of channels in the image. An RGB image will typically have three channels, while a Monochrome image will use one channel. Min and max are the range of pixel intensity values in the image. Bpp describes how many bytes are stored in each channel of the image; either 1 byte or 2 bytes. Type of image can be NORMAL, DITHERED, SCREEN, or COLORMAP. Storage refers to the way...
Mag copies and enlarges areas of the screen. The mag program demonstrates pixel reading and writing on the IRIS. The area of the screen copied is chosen by the user with the mouse. The power of magnification is an integer value which must be entered into the command line. If no integer is specified, the default value of the power of magnification is 2. Operator control of this demo is strictly with the mouse. Mouse buttons Function left pick area on screen under cursor right mag pop-up menu It i...
Mandel is a program for exploring the Mandelbrot set and displaying Mandelbrot and Julia images. The demo consists of two executables: mandel and mandelzoom. The mandel program does mandelbrot calculations and also displays the resulting images. By default, it does this on a single host. However, mandel is capable of connecting to remote hosts which can contribute to the calculations. For this to happen, the mandelzoom program must exist on the desired remote host(s). mandel can then cause the r...
manwsh is a simple shell script used by the demos to display a man page in a wsh window; for example: wsh -c manwsh 6 insect displays the insect manual page in a new wsh window, and then pauses with the prompt " to continue" before exiting and making the wsh window go away. All arguments passed to manwsh are passed on to the man program; see its manual page for a description of all the possible options. PPPPaaaaggggeeee 1111...
These three commands affect the ``feel'' of the input devices and may be used to customize their behaviour to suit individual preferences. mousewarp sets the mouse warping parameters. min is the smallest raw mouse movement that will be magnified by mult which may be specified as a floating point number. Use "mousewarp 4 9.3" to greatly exaggerate the movement of the cursor whenever the mouse position changes by more than 4 pixels in one refresh period. The default is "mousewarp 4 2.0". If ...
mview Is a demo of rendering methods useful for drawing molecules. Both atoms and bond structures are drawn. mview uses the sphere primitive of the Sphere Library for drawing the atoms. Various graphics features, such as accumulation buffer, line antialiasing, real-time, full scene multisampled antialiasing, and stereo in a window are configurable via a graphical control panel. When invoked without arguments, mview looks for data files in the current directory and in /usr/demos/General_Demos/mvi...
Newton is a real-time simulation of an elastic body. Command-line arguments will be discussed below, after a general explanation of the program. The body is made up of a number of atoms and springs. Atoms are points of mass for which the forces of gravity apply. Between some pairs of atoms, there are springs, which supply additional forces if their current length is different from their initial length. The specific spring equation used is not linear, but behaves close to linear in a narrow vicin...
Pointblank is the successor to BZ(6D). It is a combat game allowing users to play against several players in a networked environment. Much of the game play characteristics of BZ(6D) have been preserved while adding new elements of game play such as three-dimensional terrain, buildings, and flying vehicles.
powerflip is a replacement for the 'flip' demo, which was a replacement for the 'spin' demo. It will read 3D models from the named files, searching first for the model in the current directory and then in the /usr/demos/General_Demos/powerflip/data/ directory. If given a model argument of '-', .I powerflip will try to read a 3D model from standard input. See the YAODL(6d) manual page for a description of the 3D models' file format....
redirect is a simple shell script used inside the demochest program to make demos run from its menu print error messages to the console window. It is not meant to be run interactively. PPPPaaaaggggeeee 1111
scrsave saves a portion of the screen into either an RGB or a Black and White image file. scrsave with no other arguments than the output filename will save the contents of the entire screen to an IRIS image file. By giving additional arguments a smaller region of the screen can be saved. scrsave dump.rgb 0 99 0 99 saves a 100 pixel by 100 pixel square in the lower left hand corner of the screen. When invoked, the -b option will save the screen data as a Black and White (1 byte per pixel deep) i...
seahaven is an X implementation of a solitaire game sometimes known as Seahaven Towers, which I originally saw as a shareware game for the Macintosh. seahaven is a fairly blatent rip-off of that game.
The frame buffer of the IRIS contains values which are translated into RGB values by a color map. showmap displays a square filled with patches of color, one for each color index. On 4D machines with more than 10 bitplanes, the -s option allows the user to initially startup showmap with a 32x32 array grid rather than the default 64x64 size.
snapshot reads an area of the screen specified by the user, and saves it in an image file. To use snapshot, place the snapshot button window someplace other than where you wish to grab. Then, with the input focus attached (i.e. the mouse is inside the snapshot window), hold down a modifier key (shift, ctrl) on the keyboard to maintain the input focus, and move the mouse to one of the four corners of the section of the screen you wish to save. Now press left mouse and continue holding it down whi...
Initially, snoop follows the mouse cursor, magnifying a part of the screen under the cursor and reporting pixel values for the point under the cursor. Snoop operates in several modes; these are controlled from the keyboard, the mouse, and a pop-up menu. If the graphics hardware does not supports RGB mode, some options will not be available. Specifically, only colorindex mode (Cmode) is available and double buffer mode is not used, so reading from the front or back buffers has no meaning. Since d...
Solidview takes data calculated by a finite element analysis program and allows the user to interact with it. In its most basic form, solidview displays polygonal data and allows you to orient a cutting plane through the objects. The appearance of the models will vary depending on which 4D machine solidview is running on; on GT systems, the area outside the cutting plane will be semi-transparent; on systems that cannot do alphablending, the transparent area will be rendered in wireframe. Data ma...
tex_cube is an OpenGL demo which texture maps up to six images onto a cube which may be rotated using the mouse. The luminance of the texture images is mapped to alpha values, giving the sides of the cube a semitransparent appearance. tex_cube accepts images in .rgb format. If no images are specified on the command line, an image is chosen from /usr/demos/General_Demos/tex_cube/data. The cube is rotated by dragging with the mouse. The cube may be given momentum by releasing the mouse button whil...
twilight is a screen background (root window) that looks like the western sky as the sun sets (or perhaps the eastern sky as the sun rises). The screen background is smoothly shaded from deep black to azure to orange, and is topped with random stars and constellations. twilight renders using the GL into an imakebackground window. The range of colors is achieved by drawing two Gouraud shaded rectangles. The stars are simply random patterns of dots, colored so that they blend with the sky color as...
unixfont converts POSTSCRIPT typeface programs (printer fonts) from the special-format files used in Adobe's Apple Macintosh and IBM PC font packages into the format required by Adobe's Unix-based software (POSTSCRIPT interpreters and the TranScript product). The typeface must be licensed for use with the POSTSCRIPT interpreter to which it is to be made available from the Unix system. unixfont can also extract typeface programs and Adobe Font Metric (AFM) files from Macintosh and DOS filesyste...
Vroom is a simulation of slot car racing in a futuristic setting. Vehicles compete against the clock and opponents by racing around any of several race courses. View vroom's on-line help facility for screen-byscreen game instructions. The game is played in two stages. The first stage is the qualifying time trials. During the qualifying run, you are racing against the clock with no other vehicles on the track. The best lap time of the three laps allowed is used to determine the starting position...
Vtc takes an ASCII file representing a vroom(6) race course and outputs an optimized binary file that vroom(6) can read. The first argument is the name of the ASCII file describing the race course as outlined below. The second argument is the name of the desired output file. Note that the output name should end with the .vct extension in order to be recognized by vroom(6).
Xmj is a Mahjong game. Find matching pairs of tiles. Select a tile with the left mouse button. The tile is highlighted in reverse video when it is selected. When a match is made, the player is asked to confirm the match by hitting the left mouse button anywhere in the white background of the game panel. The bell is chimed when an invalid tile is selected or when an incorrect match is attempted. Five buttons to control the game are displayed at the top of the game panel. Help: Highlights next mat...
Each set of curly-braces defines a scope. Names defined inside a scope are local to that scope and over-ride names in higher scopes. Names must be declared before they are referenced. A few more notes about syntax before describing the types more fully. There are two styles of comments allowed in a YAODL file; C-style (beginning with '/*' and ending with '*/' anywhere in the file) and Shell-style (beginning with '#' as the first character on the line and extending to the end of the line. C...
/* * This is a SAMPLE module that registers with ALP and performs * a one-message delay. */ #include #include #include #include #include static mblk_t *dely(); caddr_t delyopen(); /* * Our state structure. Keeps its own address and a pointer. */ struct dstruct { caddr_t d_unique; mblk_t *d_mp; }; /* * The name is "Dely". It has an open routine "delyopen" * and an interface "dely". */ static struct algo delyalgo = { 0, (q...
The following messages can appear on the console: arp: host with ether address %x:%x:%x:%x:%x:%x is using my IP address x.x.x.x ARP has discovered another host on the local network which responds to mapping requests for its own Internet address. arp: ether address is broadcast for IP address x.x.x.x ARP has discovered another host on the local network which maps that host's IP address onto the ethernet broadcast address....
6-port boards can be used for modems or other asynchronous, serial I/O devices. The ports provided by the cdsio board are very similar to the on-board duart ports. Various character echoing and interpreting parameters can be set independently for each port. See termio(7) for details. By opening either the ttyd*, ttym*, or ttyf* device name of a port, different hardware signals are supported. Ttyd* is typically used for direct connect devices such as terminals; ttym* is used for devices that use ...
The cl module provides a raw device interface to XPC (cross partition communication). These devices take advantage of the XPC rendezvous capabilities to allow DMA transfers directly from the source to the destination without any intermediate copying if possible. The DMA operation is done using the BTE which supports transfers of multiple cache lines on cache line boundaries. Therefore, in order to avoid the overhead of the cl driver copying data to an intermediate buffer, the source ...
Multiple opens of the same minor device cannot be done through the clone interface. Executing stat(2) on the filesystem node for a cloned device yields a different result from executing fstat(2) using a file descriptor obtained from opening the node.
On Origin, O2, Octane and Challenge/Onyx systems, the special files /dev/ttyc* provide a character based interface (as opposed to a streams based interface) to the system serial ports. The hardware accessed by each special file is determined by the portno portion of the pathname (see serial(7) for further details). The character based interface is intended to provide a low cost option for applications wishing to do bulk data transfer via the serial ports with no character interpretation. There i...
The db client library fetches name service data out of an db(3B) format database file on the local host. This library is meant to be used only by the nsd(1M) daemon to efficiently access local name service data. The library /var/ns/lib/libns_db.so is opened by the nsd(1M) daemon when db is listed as the protocol for some map in a nsswitch.conf file. The library contains code to fetch data from a local db file and present it as lines from the configuration file from which it came. The nsd daemon ...
The dksc driver supports all disk types that use a SCSI command set. This includes traditional parallel SCSI as well as Fibre Channel Arbitrated Loop and Fibre Channel Fabric devices (devices connected through a Fibre Channel switch). Currently, 8 bit parallel SCSI (also called narrow SCSI) allows up to seven SCSI drives attached per SCSI bus, 16 bit parallel SCSI (also called wide SCSI) allows 15 drives. Fibre Channel Arbitrated Loop (FC-AL) allows up to 125 drives (some implementations limit t...
A.) Snif master file and interfaces The DLPI includes three master files: /var/sysgen/master.d/llc2, /var/sysgen/master.d/xtimer, and /var/sysgen/master.d/snif. You should not need to change the llc2 master file and the xtimer master file. However, the snif master file provides a mapping between the minor number of an interface and its name. The snif master file shipped with the DLPI subsystem has three interfaces pre-defined: one Token Ring interface, one Ethernet interface, and one FDDI interf...
The Digital Media Ring Buffer device is used to manage continuous streams of data between cooperating user processes and between user processes and the kernel. The dmrb driver is intended to be used internally by various digital media libraries and has no direct user or programmer interfaces. PPPPaaaaggggeeee 1111
The Domain Name System (DNS) is an Internet standard name service for hostname to address translation. Queries are made from a client library (termed the resolver(4)) to a server daemon named(1M). The daemon nsd(1M) will make these calls and present the data in a filesystem namespace when the dns keyword exists in the nsswitch.conf configuration file for a domain. This man page documents the behavior of the DNS extension to the nsd daemon. The nsd daemon reads all of the nsswitch.conf configurat...
The Drain protocol provides non-promiscuous capture of packets having unimplemented link-layer protocol types, i.e., packets that the operating system normally receives and drops ``down the drain''. It treats packets as datagrams containing a link-layer header followed by data. Drain uses the Raw address format, interpreting ports as link-layer type codes (in host byte order) to match against unimplemented types in received packets. Multiple sockets may bind to the same port on a network inter...
The ds interface provides user-mode access to the SCSI bus. It supports the programming interfaces described in dslib(3) and below. All of the ds devices support the same general interface. The program calls open, gaining exclusive use of a specified SCSI device (that is, two processes may not both have the same device open at the same time via this driver). Additionally, when the O_EXCL open flag set, exclusive use of the target will be acquired. No other SCSI driver will be able to use the tar...
Each IRIS-4D system uses a DUART to connect the mouse and the keyboard. Most models are also equipped with some number of additional `on-board' serial ports. The Indigo, Indy, Indigo2, O2 and OCTANE have two ports; and the Onyx and the Challenge can be configured with as few as four serial ports and as many as 16. The first of these ports, /dev/ttyd1, is often used for the `serial' or `debugging' console. Other ports are commonly used for serial terminal connections, modems, a dial-and-button...
The special files in /dev/external_int provide access to the external interrupt interface on those machines which have such an interface. This interface allows separate machines to send and receive interrupts over a dedicated wire for purposes of inter-machine synchronization. Using this device, a user process may generate outgoing interrupts to other machines, or receive interrupts from other machines in a variety of ways: the user process may request to block in an ioctl() until an interrupt i...
Various error messages are printed by the kernel when a problem is encountered. The message is preceded by the controller name, for example, et0. Serious errors are flagged with a dagger (-). If they occur repeatedly, contact your product support service for assistance. By default, many non-serious errors will not cause a diagnostic message to be displayed on the console. To enable all driver diag messages, use the command ifconfig xxx debug where xxx is the ethernet network interface name. The ...
Failover creates an infrastructure for the definition and management of multiple paths to a single disk device or lun. This failover infrastructure is used by an SGI logical volume manager (XLV, XVM) to select the path used for access to the logical volume(s) created on the storage device(s). In the presense of i/o errors, the SGI logical volume manager will request from the failover infrastructure a new path to be used for access to the erring logical volumes. This path failover requires the lo...
The files client library parses traditional local name service configuration files such as /etc/passwd and makes the data available through the nsd(1M) filesystem. This library is meant to be used only by the nsd(1M) daemon to efficiently access local name service data. The library /var/ns/lib/libns_files.so is opened by the nsd(1M) daemon when files is listed as the protocol for some map in a nsswitch.conf file. Extended attributes in the nsswitch.conf file can be used to control the behavior o...
fsctl presents a device interface for performing low-level operations on a mounted file system. This driver is used by the file system reorganizer, fsr. WARNING: this driver does NOT copy or otherwise operate on data within file system blocks. This can be done through the raw device interface to the file system. Only the superuser can open /dev/fsctl. Only one process at a time can open this device. The following operations are available as ioctl(2) calls on a file descriptor opened on this devi...
In some multi-screen stereo applications it is desirable to genlock stereo screens together. Care must be taken to ensure that right-eye views are locked together. For some older stereo formats, this may require several attemps; the system may lock the left eye of one screen to the right eye of the other. If this occurs, turn genlock off and try the genlock again. Removing and reconnecting the sync signal from the sync input is not suggested, as this may cause problems with the hardware. Genlock...
In low-latency mode, a suitable genlock signal must be supplied, or the GVO will not function correctly. in low-bandwidth mode, the source channel must have a frame rate that is faster than the GVO field rate (59.94 frames/sec NTSC, 50.00 frames/sec PAL) Page 1 GVO(7) GVO(7)
This driver is for the Hitachi HDG-J series of tablets. It will probably also work on other hitachi tablets capable of running in Hitachi III mode. It operates the tablets in high-resolution mode to provide for smooth drawing. These tablets provide x, y, height, pressure and tilt information. The driver uses hitachi as the X name of the device. (See input(7).) The difference between this drive and the driver called tablet, which is also for Hitachi tablets, is the use of high-resolution operatio...
ICMP is the error and control message protocol used by IP and the Internet protocol family. It may be accessed through a "raw socket" for network monitoring and diagnostic functions. The proto parameter to the socket call to create an ICMP socket is obtained from getprotobyname(3N). ICMP sockets are connectionless, and are normally used with the sendto and recvfrom calls, though the connect(2) call may also be used to fix the destination for future packets (in which case the read(2) or recv(2)...
This is the driver for the Ikon 10088 (and 10088A) parallel interface controller. The controller can support any one of three possible interfaces: Versatec TTL, Versatec differential, or (Tektronixcompatible) Centronics. The Ikon controller board must be jumpered, switched, connected, and terminated differently depending on which interface is being used. If the board is configured for the Centronics interface, bytes written to /dev/cent are output to the parallel port. A printer reset (input pri...
The inode monitor driver is a pseudo device driver which enables a user level program to monitor filesystem activity on a file by file basis. The application program expresses interest in specific files by means of an ioctl request that specifies the pathname of the file and an indication of what types of events are to be monitored. As various actions take place on a file in which interest has been expressed, imon posts events through a queue that may be read via the read system call....
IMPr is a wireless hand-held multimedia computer control device for use when giving presentations. IMP consists of a compact, battery-powered remote infra-red transmitter and a receiver that connects to the computer's serial port. With its unique force-sensitive Control Disc, IMP provides all the functions of a traditional mouse or trackball. IMP has a Manufacturer's Suggested Retail Price of $199. For sales or additional information, contact: Jack Copper ArcanaTech 120 South Whitfield Street ...
The Internet protocol family is a collection of protocols layered atop the Internet Protocol (IP) transport layer, and utilizing the Internet address format. The Internet family provides protocol support for the SOCK_STREAM, SOCK_DGRAM, and SOCK_RAW socket types; the SOCK_RAW interface provides access to the IP protocol.
The calcomp tablet uses a streams module named "calcomp" but reports an X name of "tablet". The Drawing Pad II is 7" by 7" and has a resolution of 1000 points per inch. To scale raw tablet events to screen coordinates (1280x1024) we create /usr/lib/X11/input/config/tablet (name of X device) with the contents: x_init { scalewhich "none" scalex "914/5000" scaley "914/5000" scale0 "914/5000" scale1 "914/5000" } To make the calcomp tablet control the cursor automatically, we would ad...
IP is the network layer protocol used by the Internet protocol family. Options may be set at the IP level when using higher-level protocols that are based on IP (such as TCP and UDP). It may also be accessed through a "raw socket" when developing new protocols, or special purpose applications. There are several IP-level setsockopt(2)/getsockopt(2) options. IP_OPTIONS may be used to provide IP header options to be transmitted in each outgoing packet or to examine the header options on incoming ...
Indy, Indigo2, O2, OCTANE and Onyx2 use a PS/2 style keyboard (detailed in pckeyboard(7)) that uses a different scan code set. This difference may break compatibility for some programs that operate with raw scan codes.
Lightweight Directory Access Protocol (LDAP) is a specification for a client-server protocol to retrieve and manage directory information. Originally intended as a means for clients on lightweight workstations to access X.500 directories, it can be used with any directory system which follows the X.500 data model. The libns_ldap.so shared library contains routines to contact a remote LDAP server daemon, fetch information, and format it so that it is available to local name service routines. This...
The mdbm client library fetches name service data out of an mdbm(3B) format database file on the local host. This library is meant to be used only by the nsd(1M) daemon to efficiently access local name service data. The library /var/ns/lib/libns_mdbm.so is opened by the nsd(1M) daemon when mdbm is listed as the protocol for some map in a nsswitch.conf file. The library contains code to fetch data from a local mdbm file and present it as lines from the configuration file from which it came. The n...
Different drivers and drives support different tape commands, in the form of ioctl's. These operations and their structures are defined in the file /usr/include/sys/mtio.h, which has fairly extensive comments. All drivers support some common definitions of tape status via the MTIOCGET ioctl; in particular, the bits defined for the mt_dposn field of the mtget structure are the same for all the IRIX devices. other fields are driver specific, and the appropriate header files should be consulted fo...
The ndbm client library fetches name service data out of an ndbm(3B) format database file on the local host. This library is meant to be used only by the nsd(1M) daemon to efficiently access local name service data. The library /var/ns/lib/libns_ndbm.so is opened by the nsd(1M) daemon when ndbm is listed as the protocol for some map in a nsswitch.conf file. The library contains code to fetch data from a local ndbm file and present it as lines from the configuration file from which it came. The n...
This section briefly describes the networking facilities available in the system. Documentation in this part of section 7 is broken up into three areas: protocol families (domains), protocols, and network interfaces. Entries describing a protocol family are marked ``7F,'' while entries describing protocol use are marked ``7P.'' Hardware support for network interfaces are found among the standard ``7'' entries. All network protocols are associated with a specific protocol family. A protocol...
The Network Information Services Protocol (NIS) is a simple Sun RPC based protocol to fetch keyed data from a remote host. It is typically used to distribute name service information in medium sized organizations. The data is maintained on a single host (designated the NIS master), and is pushed occasionally to a list of slave servers. Client systems dynamically locate a server and request data given a domain name, map name and key. In Irix the daemon nsd(1M) acts as both the server and client s...
The Network Information Services Protocol (NIS) is a simple Sun RPC based protocol to fetch keyed data from a remote host. It is typically used to distribute name service information in medium sized organizations. The data is maintained on a single host (designated the NIS master), and is pushed occasionally to a list of slave servers. Client systems dynamically locate a server and request data given a domain name, map name and key. In Irix the daemon nsd(1M) acts as both the server and client s...
The vlGetFrontierMSC(3dm) manpage has the following statement under the CAVEATS section: For some VL devices, there is a short initial period (up to ten field times) in the lifetime of a transfer during which no frontier MSC is available. This period begins when the application calls Page 13 O2Video(7) O2Video(7) vlBeginTransfer(3dm) and ends when the device clocks in or out its first media stream sample from the application's VLBuffer. An attempt to call vlGetFrontierMSC(3dm) during this perio...
If the system does not support ULI, the /hw/.../pci/slot/intr vertex will not be present. If a boot prom allocates PCI space and sets up a device's BASE registers, and the values are not page aligned, pciba is unable to provide direct mmap service for those windows, and the corresponding /hw/.../pci/slot/base/bar, /hw/.../pci/slot/mem and /hw/.../pc<...
Some Silicon Graphics systems use a serial keyboard interface (detailed in keyboard(7)) that uses a different scan code set. This difference may break compatibility for some programs that operate with raw scan codes.
All Silicon Graphics systems, except those noted above use the mouse described in mouse(7). Some Silicon Graphics mice (particularly Silicon Graphics PN 9150800) look very similar to the old style Indigo2 mouse (Silicon Graphics PN 9150809) and even use the same 6-pin mini-DIN connector, but are not compatible.
The special file /dev/plp refers to the parallel printer interface on the Indigo, Indy, Indigo2, Challenge/Onyx, O2, OCTANE, Origin200 and Onyx2 products. Special file /dev/plpbi is also available on the Indigo, Indy and Indigo2 platforms and is used to access the parallel printer interface in bidirectional access mode. The plp device supports output to a Centronics-compatible printer connected to the builtin parallel printer port. Normally, /dev/plp is directly accessed only by a print spooling...
The code sequence shown below demonstrates how to allocate pseudo terminals. Pseudo terminals, like all files, must have the correct file permissions to be accessible. The _getpty(3) library function takes care of this problem. #include #include /* * Find a pseudo tty to use and open both sides. * filedes[0] receives the master file descriptor while filedes[1] * receives the slave. The master is opened with O_NDELAY as commonly * needed in daemons such as rlogind and telnetd...
The Raw protocol family is a collection of input decapsulation protocols layered atop the data link protocol of a network interface. The Raw family supports only the SOCK_RAW socket type.
The system provides some packet routing facilities. The kernel maintains a routing information database, which is used in selecting the appropriate network interface when transmitting packets. A user process (or possibly multiple co-operating processes) maintains this database by sending messages over a special kind of socket. This supplants fixed size ioctl(2)'s used in earlier releases. Routing table changes may only be carried out by the super user. The operating system may spontaneously emi...
The STREAMS Administrative Driver provides an interface for applications to perform administrative operations on STREAMS modules and drivers. The interface is provided through ioctl(2) commands. Privileged operations may access the sad driver via /dev/sad/admin. Unprivileged operations may access the sad driver via /dev/sad/user. fildes is an open file descriptor that refers to the <...
The Samba software suite is a collection of programs that implements the Server Message Block (commonly abbreviated as SMB) protocol for UNIX systems. This protocol is sometimes also referred to as the Common Internet File System (CIFS), LanManager or NetBIOS protocol. smbd The smbd daemon provides the file and print services to SMB clients, such as Windows 95/98, Windows NT, Windows for Workgroups or LanManager. The configuration file for this daemon is described in smb.conf nmbd The nmbd daemo...
The scsiha driver is used to pass requests to the scsi host adapter drivers to perform activities that aren't related to SCSI commands issued to individual devices. On parallel SCSI, this includes operations like resetting a SCSI bus and probing for devices. With Fibrechannel, it adds loop initialization, device reset and port bypass. All communication through the scsiha driver is via ioctls. Opens and closes automatically succeed. The ioctl structure is defined in , and is called s...
All Silicon Graphics systems have two or more general purpose serial ports. These ports can be used to connect terminals, printers, modems, other systems, or graphical input devices such as a tablet or dial and button box. Each line can be independently set to run at any of several speeds. Various character echoing and interpreting parameters can also be set. See stty(1) and termio(7) for details on the various modes. Details of the serial ports found on optional add-on boards are given elsewher...
This driver supports 5 1/4" floppy drives in 3 standard formats when used with the freestanding SCSI floppy drive. The standard single and double density dual sided 3 1/2" drive and the 3 1/2" 20.1MB floptical drive is also supported. The driver also supports a large range of special formats by use of the SMFDSETMODE ioctl (defined along with the associated structure in /usr/include/sys/smfd.h). Most of the ioctls for the dksc also apply to this driver, with the exception of the bad block han...
The Snoop protocol provides promiscuous packet capture with filtering. It treats packets as datagrams containing a link-layer header followed by data. Snoop uses the Raw address format, assigning a unique port to a socket bound to port zero, otherwise binding the specified port if it is valid. Valid ports range from SNOOP_MINPORT to SNOOP_MAXPORT. Snoop associates a set of SNOOP_MAXFILTERS packet filters with each network interface. Each filter contains an array of mask bits, a parallel array of...
There are four different types of stereo ports found on various Silicon Graphics systems. The DIN-8 powered serial port connectors, which are found on the Onyx and Crimson models, provide Stereo Sync in addition to serial communication signals for other types of peripherals. The serial signals are not used by external stereo viewing equipment, but the pin-out description of all signals on the DIN-8 is provided here for completeness. In order to support peripherals which draw power from the host ...
STP is a data transfer protocol that uses small control messages to prearrange data movement. Buffers are allocated at the sending and the receiving end before the data transmission, allowing full-rate, noncongesting data flow between the end devices. The control and data may use different physical media, or may share a single physical medium. The rea system calls should be used to transfer data over STP sockets. By the very nature of STP, a send operation on an STP socket must have a correspond...
STREAMS [see intro(2)] ioctl commands are a subset of ioctl(2) system calls which perform a variety of control functions on streams. The arguments command and arg are passed to the file designated by fildes and are interpreted by the stream head. Certain combinations of these arguments may be passed to a module or driver in the stream. fildes is an open file descriptor that refers to a stream. command determines the control function to be performed as described below. arg represents additional i...
The system controller device is used by sysctlrd to communicate with the Onyx and Challenge L/XL system controller. The system controller sequences power, monitors sensors, and drives the LCD front panel. Through this driver, sysctlrd(1M) reads sensor information, displays front panel messages, retrieves log messages, drives the CPU performance meter, and handles alarms.
The TCP protocol provides reliable, flow-controlled, two-way transmission of data. It is a byte-stream protocol used to support the SOCK_STREAM abstraction. TCP uses the standard Internet address format and, in addition, provides a per-host collection of "port addresses". Thus, each address is composed of an Internet address specifying the host and network, with a specific TCP port on the host identifying the peer entity. Sockets utilizing the tcp protocol are either "active" or "passive"....
All of the asynchronous communications ports use the same general interface, no matter what hardware is involved. The user interface to this functionality is via the ioctl calls described below, or the POSIX termios interface described in termios(3t). The remainder of this section discusses the common features of the terminal subsystem which are relevant to both of these interfaces.
The devices known as ticlts, ticots, and ticotsord are ``loopback transport providers,'' that is, stand-alone networks at the transport level. Loopback transport providers are transport providers in every sense except one: only one host (the local machine) is ``connected to'' a loopback network. Loopback transports present a TPI (STREAMS-level) interface to application processes and are intended to be accesse...
Various error messages are printed by the kernel when a problem is encountered. The message is preceded by the controller name, for example, mtr0. If they occur repeatedly, contact your product support service for assistance. Use the mtrconfig(1M) command to determine the software revision number. Counts of Token Ring input and output errors can be displayed with the command netstat -i (see netstat(1M))....
Silicon Graphics systems support the Small Computer System Interface (SCSI) for various tape drives, including QIC24 and QIC150 1/4" cartridges, 9-track, 8 mm video, Ampex DIS/DST series, DLT (digital linear tape), IBM 3590 and 3570, STK 9490 and 9840, STK SD3, Sony GY-10 and GY-2120, and DAT (digital audio tape) tape drives. Not all systems support all tape drives. Since so many different types of devices are supported, and not all their features can be determined directly from the drive, a co...
In the current release of Trusted IRIX, the policies enforced by the trusted networking code are as follows. Transmitted packet labels must fall within the label range of the destination host or network profile in the remote host database. Received packet labels must fall within the label range of the source host or network profile in the remote host database. Delivered data must have a label equal to the label of the receiving process. The uid of the delivered data must be permitted by the sock...
The tape support (TS) system consists of a tape support driver, personality daemons, and a daemon to manage the personality daemons. For information on how to configure tape support, see the ts.config(4) man page. The tape support driver passes all device-dependent tasks, except for I/O processing, to a personality daemon. For optimal performance, I/O requests are processed in the driver. There is a personality daemon for each device type supported by the tape support ...
UDP is a simple, unreliable datagram protocol which is used to support the SOCK_DGRAM abstraction for the Internet protocol family. UDP sockets are connectionless, and are normally used with the sendto and recvfrom calls, though the connect(2) call may also be used to fix the destination for future packets (in which case the recv(2) or rea or write(2) system calls may be used). UDP address formats are identical to those used by TCP. In particular UDP provides a port identifier in addition to the...
The UNIX-domain protocol family is a collection of protocols that provides local (on-machine) interprocess communication through the normal socket(2) mechanisms. The UNIX-domain family supports the SOCK_STREAM and SOCK_DGRAM socket types and uses filesystem pathnames for addressing.
The SGI USB implemtation is a partial implementation, intended to provide support for selected keyboards and mice (see usbinput(7)) for Onyx3. Currently there is no administrative command for individual device control, and there is no support for devices other than keyboard/mouse. Likewise, the usb infrastructure provides no published api for the implentation of new usb drivers. Only controllers conforming to the OpenHCI spec are supported....
In order to minimize changes to application code, the usb keyboard and mouse driver convert usb usage codes to ps2 scan code sequences at the /dev/input[N]/keyboard devices. Likewise ps2 mouse codes are generated at /dev/input[N]/mouse. The entry points /dev/input/keyboard and /dev/input/mouse will always exist. If there is no corresponding physical device (ie. no keyboard and/or mouse with device id 0), the device will operate similar to /dev/null. If an application has the device open in this ...
The usema driver is intended to be used only by the standard library spinlock and semaphore routines. Client programs should use these routines, rather than using usema directly.
The special files associated with the user-level DMA engine support interface provide access to DMA engines via the library udmalib(3X). These files should not be accessed directly by a user. Currently, the only DMA engine supported is under VME on the Challenge/Onyx series. However, as more DMA engines become available for VME and other busses on other platforms, access will be provided through this interface....
VINO supports frame(field) capture that is decimated in both the X and Y directions. Decimation of sizes 1/2th, 1/3rd, 1/4th, 1/5th, 1/6th, 1/7th and 1/8th are supported, though the color quality suffers at the smaller ranges. To compensate for this limitation, the system software initiates a decimation conversion for values 1/4th, 1/6th and 1/8th by doing the first half of the decimation in hardware and the second half of the decimation in software. This affects the software overhead required f...
XLV devices provide access to disk storage as logical volumes. A logical volume is an object that behaves like a disk partition, but its storage can span several physical disk devices. Using XLV, you can concatenate disks together to create larger logical volumes, stripe data across disks to create logical volumes with greater throughput, and plex (or mirror) disks for reliability. In addition, XLV enables you to change the configuration of volumes while the volume is actively being used as a fi...
This program is part of the Samba suite. nmbd is a server that understands and can reply to NetBIOS over IP name service requests, like those produced by SMB/CIFS clients such as Windows 95/98/ME, Windows NT, Windows 2000, and LanManager clients. It also participates in the browsing protocols which make up the Windows "Network Neighborhood" view. SMB/CIFS clients, when they start up, may wish to locate an SMB/CIFS server. That is, they wish to know what IP number a specified host is using. Amo...
This tool is part of the Samba suite. The pdbedit program is used to manage the users accounts stored in the sam database and can be run only by root. The pdbedit tool use the passdb modular interface and is independent from the kind of users database used (currently there are smbpasswd, ldap, nis+ and tdb based and more can be addedd without changing the tool). There are five main ways to use pdbedit: adding a user account, removing a user account, modifing a user account, listing user accounts...
This program is part of the Samba suite. smbd is the server daemon that provides filesharing and printing services to Windows clients. The server provides filespace and printer services to clients using the SMB (or CIFS) protocol. This is compatible with the LanManager protocol, and can service LanManager clients. These include MSCLIENT 3.0 for DOS, Windows for Workgroups, Windows 95/98/ME, Windows NT, Windows 2000, OS/2, DAVE for Macintosh, and smbfs for Linux. An extensive description of the s...
This tool is part of the Samba suite. The smbpasswd program has several different functions, depending on whether it is run by the root user or not. When run as a normal user it allows the user to change the password used for their SMB sessions on any machines that store SMB passwords. By default (when run with no arguments) it will attempt to change the current user's SMB password on the local machine. This is similar to the way the passwd(1) program works. smbpasswd differs from how the passw...
This tool is part of the Samba suite. smbspool is a very small print spooling program that sends a print file to an SMB printer. The command-line arguments are position-dependent for compatibility with the Common UNIX Printing System, but you can use smbspool with any printing system or from a program or script. DEVICE URI smbspool specifies the destination using a Uniform Resource Identifier ("URI") with a method of "smb". This string can take a number of forms: o smb://server/printer o smb...
This tool is part of the Samba suite. swat allows a Samba administrator to configure the complex smb.conf(5) file via a Web browser. In addition, a swat configuration page has help links to all the configurable options in the smb.conf file allowing an administrator to easily look up the effects of any change. swat is run from inetd
This program is part of the Samba suite. winbindd is a daemon that provides a service for the Name Service Switch capability that is present in most modern C libraries. The Name Service Switch allows user and system information to be obtained from different databases services such as NIS or DNS. The exact behaviour can be configured throught the /etc/nsswitch.conf file. Users and groups are allocated as they are resolved to a range of user and group ids specified by the administrator of the Samb...
ApplicationShell is used as the main top-level window for an application. An application should have more than one ApplicationShell only if it implements multiple logical applications. Classes ApplicationShell inherits behavior and resources from Core, Composite, Shell, WMShell, VendorShell, and TopLevelShell. The class pointer is applicationShellWidgetClass. The class name is ApplicationShell. New Resources The following table defines a set of widget resources used by the programmer to specify ...
Composite widgets are intended to be containers for other widgets and can have an arbitrary number of children. Their responsibilities (implemented either directly by the widget class or indirectly by Intrinsics functions) include: o Overall management of children from creation to destruction. o Destruction of descendants when the composite widget is destroyed. o Physical arrangement (geometry management) of a displayable subset of managed children. o Mapping and unmapping of a subset of the man...
Constraint widgets maintain additional state data for each child. For example, client-defined constraints on the child's geometry may be specified. When a constrained composite widget defines constraint resources, all of that widget's children inherit all of those resources as their own. These constraint resources are set and read just the same as any other resources defined for the child. This resource inheritance extends exactly one generation down, which means only the firstgeneration child...
The IRIX system writes out a core image of a terminated process when any of various errors occur. See signal(2) for the list of reasons; the most common are memory violations, illegal instructions, bus errors, and user-generated quit signals. The core image is called core and is written in the process's working directory (provided it can be; normal access controls apply). A process with an effective user ID different from the real user ID does not produce a core image. The format of the core im...
GlxCreateMDraw creates an instance of a GlxMDraw widget and returns the associated widget ID. parent Specifies the parent widget ID name Specifies the name of the created widget arglistSpecifies the argument list argcount Specifies the number of attribute/value pairs in the argument list (arglist) For a complete definition of GlxMDraw and its associated resources, see GlxMDraw(3X).
GlxDraw and GlxMDraw are widgets suitable for GL drawing. They provide a window with the appropriate visual and colormaps needed for GL, based on supplied parameters. GlxDraw and GlxMdraw also provides callbacks for redraw, resize, input, and initialization. GlxDraw is not a part of any widget set, but depends only on Xt. GlxDraw can be used with any widget set. GlxMDraw is identical to GlxDraw except that it is a subclass of the Motif widget class XmPrimitive and has resources and defaults suit...
mksymlinks creates useful symbolic links for Motif 1.2 to replicate the default locations. It is normally run as an exitop (see gendist) during the installation of the Motif 1.2 Execution Only Environment but only if a later version of the Motif EOE is not installed. The only time that this would be required to be run manually would be if both this version and a later version of Motif eoe were installed on the same machine and Motif 1.2.4 was required to be the default environment. root base is ...
The mmkmf command is the normal way to create a Motif specific Makefile from an Imakefile shipped with third-party software. When invoked with no arguments in a directory containing an Imakefile, the imake program is run with arguments appropriate for your system (configured into mmkmf when Motif was built) and generates a Makefile. When invoked with the -a option, mmkmf builds the Makefile in the current directory, and then automatically executes ``make Makefiles'' (in case there are subdirec...
The MrmCloseHierarchy function closes a UID hierarchy previously opened by MrmOpenHierarchyPerDisplay. All files associated with the hierarchy are closed by the Motif Resource Manager (MRM) and all associated memory is returned. hierarchy_id Specifies the ID of a previously opened UID hierarchy. The hierarchy_id was returned in a previous call to MrmOpenHierarchyPerDisplay.
The MrmFetchBitmapLiteral function fetches a bitmap literal from an MRM hierarchy, and converts the bitmap literal to an X pixmap of depth 1. The function returns this pixmap and its width and height. hierarchy_idSpecifies the ID of the UID hierarchy that contains the specified icon literal. The hierarchy_id was returned in a previous call to MrmOpenHierarchyPerDisplay. index Specifies the UIL name of the bitmap literal to fetch. screen Specifies the screen used for the pixmap. The screen argume...
The MrmFetchColorLiteral function fetches a named color literal from a UID file, and converts the color literal to a pixel color value. hierarchy_idSpecifies the ID of the UID hierarchy that contains the specified literal. The hierarchy_id was returned in a previous call to MrmOpenHierarchyPerDisplay. index Specifies the UIL name of the color literal to fetch. You must define this name in UIL as an exported value. display Specifies the display used for the pixmap. The display argument specifies ...
The MrmFetchIconLiteral function fetches an icon literal from an MRM hierarchy, and converts the icon literal to an X pixmap. hierarchy_idSpecifies the ID of the UID hierarchy that contains the specified icon literal. The hierarchy_id was returned in a previous call to MrmOpenHierarchyPerDisplay. index Specifies the UIL name of the icon literal to fetch. screen Specifies the screen used for the pixmap. The screen argument specifies a pointer to the Xlib structure Screen which contains the inform...
The MrmFetchLiteral function reads and returns the value and type of a literal (named value) that is stored as a public resource in a single UID file. This function returns a pointer to the value of the literal. For example, an integer is always returned as a pointer to an integer, and a string is always returned as a pointer to a string. Applications should not use MrmFetchLiteral for fetching icon or color literals. If this is attempted, MrmFetchLiteral returns an error. hierarchy_idSpecifies ...
The MrmFetchSetValues function is similar to XtSetValues, except that the values to be set are defined by the UIL named values that are stored in the UID hierarchy. MrmFetchSetValues fetches the values to be set from literals stored in UID files. hierarchy_idSpecifies the ID of the UID hierarchy that contains the specified literal. The hierarchy_id was returned in a previous call to MrmOpenHierarchyPerDisplay. widget Specifies the widget that is modified. args Specifies an argument list that ide...
The MrmFetchWidget function fetches and creates an indexed application widget and its children. The indexed application widget is any widget that is named in UIL. In fetch operations, the fetched widget's subtree is also fetched and created. This widget must not appear as the child of a widget within its own subtree. MrmFetchWidget does not execute XtManageChild for the newly created widget. hierarchy_idSpecifies the ID of the uid hierarchy that contains the interface definition. The hierarchy_...
The MrmFetchWidgetOverride function is the extended version of MrmFetchWidget. It is identical to MrmFetchWidget, except that it allows the caller to override the widget's name and any arguments that MrmFetchWidget would otherwise retrieve from the UID file or one of the defaulting mechanisms. That is, the override argument list is not limited to those arguments in the UID file. The override arguments apply only to the widget fetched and returned by this function. Its children (subtree) do not ...
The MrmInitialize function must be called to prepare an application to use MRM widget-fetching facilities. You must call this function prior to fetching a widget. However, it is good programming practice to call MrmInitialize prior to performing any MRM operations. MrmInitialize initializes the internal data structures that MRM needs to successfully perform type conversion on arguments and to successfully access widget creation facilities. An application must call MrmInitialize before it uses ot...
This routine is obsolete and exists for compatibility with previous releases. It is replaced by MrmOpenHierarchyPerDisplay. MrmOpenHierarchy is identical to MrmOpenHierarchyPerDisplay except that MrmOpenHierarchy does not take a display argument. num_files Specifies the number of files in the name list. file_names_list Specifies an array of character strings that identify the UID files. ancillary_structures_list A list of operating-system-dependent ancillary structures corresponding to such thin...
MrmOpenHierarchyPerDisplay allows you to specify the list of UID files that MRM searches in subsequent fetch operations. All subsequent fetch operations return the first occurrence of the named item encountered while traversing the UID hierarchy from the first list element (UID file specification) to the last list element. This function also allocates a hierarchy ID and opens all the UID files in the hierarchy. It initializes the optimized search lists in the hierarchy. If MrmOpenHierarchyPerDis...
The MrmRegisterClass function allows MRM to access userdefined widget classes. This function registers the necessary information for MRM to create widgets of this class. You must call MrmRegisterClass prior to fetching any user-defined class widget. MrmRegisterClass saves the information needed to access the widget creation function and to do type conversion of argument lists by using the information in MRM databases. class_code This argument is ignored; it is present for compatibility with prev...
The MrmRegisterNames function registers a vector of names and associated values for access in MRM. The values can be callback functions, pointers to user-defined data, or any other values. The information provided is used to resolve symbolic references occurring in UID files to their run-time values. For callbacks, this information provides the procedure address required by the Motif Toolkit. For names used as identifiers in UIL, this information provides any run-time mapping the application nee...
The MrmRegisterNamesInHierarchy function registers a vector of names and associated values for access in MRM. The values can be callback functions, pointers to user-defined data, or any other values. The information provided is used to resolve symbolic references occurring in UID files to their run-time values.For callbacks, this information provides the procedure address required by the Motif Toolkit. For names used as identifiers in UIL, this information provides any run-time mapping the appli...
The mwm window manager provides functions that facilitate control (by the user and the programmer) of elements of window state such as placement, size, icon/normal display, and input-focus ownership. The stand-alone window manager is not an integral part of CDE and does not support communication with other components in the CDE environment, such as the Style Manager and the Session Manager. Options -display display This option specifies the display to use; see X(1). -xrm resourcestring This opti...
Object is never instantiated. Its sole purpose is as a supporting superclass for other widget classes. Classes The class pointer is objectClass. The class name is Object. New Resources The following table defines a set of widget resources used by the programmer to specify data. The programmer can also set the resource values for the inherited classes to set attributes for this widget. To reference a resource by name or by class in a .Xdefaults file, remove the XmN or XmC prefix and use the remai...
OverrideShell is used for shell windows that completely bypass the window manager, for example, PopupMenu shells. Classes OverrideShell inherits behavior and resources from Core, Composite, and Shell. The class pointer is overrideShellWidgetClass. The class name is OverrideShell. New Resources OverrideShell defines no new resources, but overrides the XmNoverrideRedirect and XmNsaveUnder resources in the Shell class. Inherited Resources OverrideShell inherits behavior and resources from the follo...
RectObj is never instantiated. Its sole purpose is as a supporting superclass for other widget classes. Classes RectObj inherits behavior and a resource from Object. The class pointer is rectObjClass. The class name is RectObj. New Resources The following table defines a set of widget resources used by the programmer to specify data. The programmer can also set the resource values for the inherited classes to set attributes for this widget. To reference a resource by name or by class in a .Xdefa...
The SgArc widget is a special widget that resembles a gadget in that it has no window of its own. It draws in the window of the SgGraph widget, with cooperation of the Graph widget. The Arc widget can only be used with the Graph widget. An arc may be undirected, directed, or bidirected. CLASSES The Arc widget inherits behavior from the Core widget class. Its class pointer is sgArcWidgetClass Its class name is SgArc....
ColorChooser is a dialog widget that provides a friendly and powerful user interface for selecting colors. The ColorChooser provides a color hexagon and color sliders that presents the color range in Hue, Saturation, Value, (HSV) and Red, Green, Blue, (RGB) color spaces. Because of drawing speed considiration, the color hexagon and color sliders are available only if running under GL. For X only configuration there are Scale widget to replace the color sliders and there is no color hexagon. The ...
SgColorChooserGetColor gets the currently selected color of the given ColorChooser widget. widget Specifies the ColorChooser widget ID *red Specifies a pointer to hold the returned red color component in RGB color space. *green Specifies a pointer to hold the returned green color component in RGB color space. *blue Specifies a pointer to hold the returned blue color component in RGB color space. The color components range from 0 (no intensity) to 255 (maximum intensity). This is the same range u...
SgColorChooserSetColor sets the selected color of the given ColorChooser widget. This means that all the components of the ColorChooser, the color hexagon, color sliders, color swatches, and color value text widgets will all reflect the new color. The given color must be in RGB color space. widget Specifies the ColorChooser widget ID. red Specified the red color component in an RGB color space. green Specified the green color component in an RGB color space. blue Specified the blue color compone...
SgColorChooserSetCurrentColor sets the currents selected color of the given ColorChooser widget. This means that all the components of the ColorChooser, the color hexagon, color sliders, color swatches, and color value text widgets will all reflect the new color. The given color must be in RGB color space. The difference between SgColorChooserSetCurrentColor and SgColorChooserSetColor is that SgColorChooserSetCurrentColor does not alter the value of the Stored Color color swatch. widget Specifie...
SgColorChooserSetStoredColor sets the color of the ColorChooser's stored color swatch component. This gives the developers access to set the ColorChooser reference color. Calling SgColorChooserSetStoredColor and SgColorChooserSetCurrentColor with the same color value is equivalent to calling SgColorChooserSetColor. widget Specifies the ColorChooser widget ID. red Specifies the red color component in an RGB color space. green Specifies the green color component in an RGB color space. blue Specif...
SgCreateColorChooser creates an unmanaged ColorChooser. ColorChooser is a dialog widget that provides a friendly and powerful user interface for selecting colors. The ColorChooser provides a color hexagon and color sliders that present the color range in Hue, Saturation, Value, (HSV) and Red, Green, Blue, (RGB) color spaces. Because of drawing speed consideration, the color hexagon and color sliders are available only if running under GL. For X-only configuration, there are Scale widgets to repl...
SgCreateColorChooserDialog is a convenience creation function that creates a DialogShell and an unmanaged ColorChooser child of the DialogShell. ColorChooser is a dialog widget that provides a friendly and powerful user interface for selecting colors. The ColorChooser provides a color hexagon and color sliders that presents the color range in Hue, Saturation, Value, (HSV) and Red, Green, Blue, (RGB) color spaces. Because of drawing speed considiration the color hexagon and color sliders are avai...
SgCreateDropPocket creates an instance of a DropPocket widget and returns the associated widget ID. parent Specifies the parent widget ID name Specifies the name of the created widget arglistSpecifies the argument list argcount Specifies the number of attribute/value pairs in the argument list (arglist) For a complete definition of DropPocket and its associated resources, see SgDropPocket(3X).
SgCreateDynaMenu creates an unmanaged DynaMenu. parent Specifies the parent widget ID name Specifies the name of the created widget arglistSpecifies the argument list argcount Specifies the number of attribute/value pairs in the argument list (arglist) For a complete definition of DynaMenu and its associated resources, see SgDynaMenu(3X).
XmCreateFileSelectionBox creates an unmanaged FileSelectionBox. A FileSelectionBox is used to select a file and includes the following: o A directory menu showing the current directory and the directories above it o A scrolling list of file and directory names o An editable text field for the selected file o Labels for the list and text fields o Three buttons The default button labels are OK, Cancel, and Help. Additional work area children may be added to the FileSelectionBox after creation. Fil...
XmCreateFileSelectionDialog is a convenience creation function that creates a DialogShell and an unmanaged FileSelectionBox child of the DialogShell. A FileSelectionDialog selects a file. It includes the following: o A directory menu showing the current directory and the directories above it o A scrolling list of file and directory names o An editable text field for the selected file o Labels for the list and text fields o Three buttons The default button labels are: OK, Cancel, and Help. Use Xt...
SgCreateFinder creates an unmanaged Finder. A Finder is used to accelerate text selection. o A text field for typing and displaying text. o A history button which remembers previous text field items. o A zoomBar for accelerated selection of text field sections. Finder is designed for quick access to components of the text field's text. The buttons on the zoomBar modify the text field, generally truncating sections after the pressed button. parent Specifies the parent widget ID name Specifies th...
SgCreateVisualDrawingArea creates an instance of a VisualDrawingArea widget and returns the associated widget ID. parent Specifies the parent widget ID name Specifies the name of the created widget arglistSpecifies the argument list argcount Specifies the number of attribute/value pairs in the argument list (arglist) For a complete definition of VisualDrawingArea and its associated resources, see SgVisualDrawingArea(3X)....
Dial is used by an application to allow the user to input or modify a value from within a range of values. A Dial has a rectangular region within which a knob or pointer graphic is displayed. The user can modify the Dial's value by spinning this knob or pointer. Classes Dial inherits behavior and resources from Core and Primitive classes. The class pointer is sgDialWidgetClass. The class name is SgDial. New Resources The following table defines a set of widget resources used by the programmer t...
DropPocket is designed for receiving icons. The user will see the icon in the DropPocket as a visual reminder of the type of the file associated with the DropPocket. The user may drop SGI file icons onto the dropPocket. The DropPocket will determine the name of the icon and return information describing the icon to the application in the callback. The DropPocket background changes color when an droppable icon is above the DropPocket. Once an icon has been dropped on the DropPocket, the icon is d...
The DynaMenu widget is packaged popup menu widget. The DynaMenu supports dynamic changing of menu entries. Pressing mouse button 1 on the DynaMenu pops up its menu. The DynaMenu looks like a PushButton, but cannot be pushed-in. Like a PushButton, it can accept either a label string or a pixmap. Currently, however, you must have access to the private instance record to set the string or pixmap. Classes DynaMenu inherits behavior and resources from Core, Composite, Constraint, and XmManager. The c...
SgDynaMenuAddItem adds an item to the DynaMenu history list at the top position. When the item is inserted into the list, it is compared with the current items. If the new item matches an item on the selected DynaMenu, the item is removed from the old position, so it is not duplicated in the history list. The programmer should call the appropriate free on the String passed to the widget after calling SgDynaMenuAddItem, since the widget creates its own XmString from the str argument. widget Speci...
SgDynaMenuClearHistory deletes all items from the DynaMenu's history list. widget Specifies the ID of the DynaMenu from whose history list the items are deleted For a complete definition of DynaMenu and its associated resources, see SgDynaMenu(3X).
The enhanced XmFileSelectionBox traverses directories, shows files and subdirectories, and selects files. An enhanced XmFileSelectionBox has three main areas: o A Finder widget, consisting of a text field, zoom bar, drop pocket, and history button. o A scrollable list of filenames and subdirectories o A group of Buttons, labeled OK, Filter, Cancel, and Help The user can select a new directory to examine by scrolling through the list of files and directories and selecting the desired directory. T...
XmFileSelectionBoxGetChild is used to access a component within a FileSelectionBox. The parameters given to the function are the FileSelectionBox widget and a value indicating which component to access. widget Specifies the FileSelectionBox widget ID. child Specifies a component within the FileSelectionBox. The enhanced XmFileSelectionBoxGetChild function accepts all the children of the normal XmFileSelectionBoxGetChild function. Certain children, however, are not managed in the enhanced file se...
SgFileSelectionReplaceSuffix is used to replace the suffix of the current filename within a FileSelectionBox. The parameters given to the function are the FileSelectionBox widget, the FTR file type from which to derive the new suffix, and a default suffix to be used if the FTR database does not contain a suffix for the given file type. widget Specifies the FileSelectionBox widget ID. file_type Specifies the FTR file type to be used in determining the new suffix. default_suffix Specifies the suff...
The Finder widget is designed to integrate a drop pocket, a textField, a zoomBar, and a history menu. The zoomBar is a set of buttons above the text field which allows sections of the text to be selected. The history menu allows users to select items previously visited, or to undo operations. The Finder widget should be used for accelerating text selection of long objects such as file names. Pressing on the history button brings up a pulldown menu of choices. Selecting an item in the menu will s...
SgFinderAddHistoryItem adds an item to the Finder history list at the top position. When the item is inserted into the list, it is compared with the current items. If the new item matches an item on the selected Finder, the item is removed from the old position, so it is not duplicated in the history list. widget Specifies the ID of the Finder to which an item is added. str Specifies the item to be added to the Finder. For a complete definition of Finder and its associated resources, see SgFinde...
SgFinderClearHistory deletes all items from the Finder's history list. widget Specifies the ID of the Finder from whose history list the items are deleted For a complete definition of Finder and its associated resources, see SgFinder(3X).
SgFinderGetChild is used to access a widget component within a Finder. The parameters given to the function are the Finder widget and a value indicating which component to access. The Finder widget generally provides the functionality and access to child behavior through other means. Accessing the children of the Finder and modifying their callbacks or resources significantly may cause unpredictable results. It is suggested that applications not modify the state of the Finder children. widget Sp...
SgFinderGetTextString accesses the string value of the Finder widget. The application is responsible for freeing the storage associated with the string by calling XtFree. widget Specifies the Finder widget ID For a complete definition of Finder and its associated resources, see SgFinder(3X).
SgFinderSetTextString sets the string value of the Finder widget. This routine calls the widget's XmNvalueChangedCallback and XmNactivateCallback. widget Specifies the Finder widget ID value Specifies the character pointer to the string value and places the string into the text edit window For a complete definition of Finder and its associated resources, see SgFinder(3X).
The SgGraph widget provides the application developer with the ability to display any group of widgets as a graph, with each widget representing a node. The graph can be disconnected, as well as contain cycles. The arcs used to connect the nodes are instances of an SgArc widget, developed specifically for use with the SgGraph widget. Arcs may be undirected, directed, or bidirected. Note that the SgGraph widget does not understand the semantics of arc direction, ie. for layout and editing purpose...
SgGrid is a container widget with no input semantics of its own. It arranges its children in a two dimensional grid of arbitrary size. Each row and column of this grid may be separately designated as having a fixed size or as having some degree of stretchability. In addition, each child may be resizable in either or both directions, or forced to a fixed size. If a child is a fixed size, and smaller than the cell that contains it, the childs position within the cell is determined by an XmNgravity...
SgIconGadget is an instantiable gadget that displays a labeled pixmap. The SgIconGadget widget does not accept any button or key input, and the help callback is the only callback defined. SgIconGadget also receives enter and leave events. The SgIconGadget is unique in that it can be displayed in colors other than that provided by its parent, a restriction that limits the usefulness of gadgets in many situation. SgIconGadget can contain both text and a pixmap. SgIconGadget text is a compound stri...
This man pages describes new resources added to the Motif Scale widget by SGI. To get these resources you need to #define __sgi in your application. For a description of the XmScale widget non-SGI resources see the XmScale man page. New Resources The following table defines a set of widget resources used by the programmer to specify data. The programmer can also set the resource values for the inherited classes to set attributes for this widget. To reference a resource by name or by class in a ....
SgSpringBox is a container widget with no input semantics of its own. It arranges its children in a single row or column based on a set of spring constraints assigned to each child. The SgSpringBox widget allows layouts similar to those supported by the XmForm widget, but are usually easier to set up. It is also possible to create some layouts that cannot be achieved with the XmForm widget. For example, centering a column of widgets is very easy to do with the SgSpringBox widget, but nearly impo...
This man pages describes new resources added to the Motif Text widget by SGI. To get these resources you need to #define __sgi in your application. For a description of the XmText widget non-SGI resources see the XmText man page. New Resources The following table defines a set of widget resources used by the programmer to specify data. The programmer can also set the resource values for the inherited classes to set attributes for this widget. To reference a resource by name or by class in a .Xde...
This man pages describes new resources added to the Motif Text widget by SGI. To get these resources you need to #define __sgi in your application. For a description of the XmTextField widget non-SGI resources see the XmTextField man page. New Resources The following table defines a set of widget resources used by the programmer to specify data. The programmer can also set the resource values for the inherited classes to set attributes for this widget. To reference a resource by name or by class...
XmTextFieldSetErrorSelection sets the primary selection of the text in the widget using the SgNerrorBackground color to draw the selected text backgroung color. It also sets the insertion cursor position to the last position of the selection and calls the widget's XmNmotionVerifyCallback callbacks. widget Specifies the Text widget ID first Marks the first character position of the text to be selected last Marks the last position of the text to be selected time Specifies the time at which the se...
XmTextSetErrorSelection sets the primary selection of the text in the widget using the SgNerrorBackground color to draw the selected text backgroung color. It also sets the insertion cursor position to the last position of the selection and calls the widget's XmNmotionVerifyCallback callbacks. widget Specifies the Text widget ID first Marks the first character position of the text to be selected last Marks the last position of the text to be selected time Specifies the time at which the selecti...
ThumbWheel is used by an application to allow the user to input or modify a value either from within a range of values or from an unbounded (infinite) range. A ThumbWheel has an elongated rectangular region within which a wheel graphic is displayed. The user can modify the ThumbWheel's value by spinning the wheel. A ThumbWheel can also include a Home Button located outside the wheel region. This button allows the user to set the ThumbWheel's value to a known position. Classes ThumbWheel inheri...
SgThumbWheelGetValue returns the current thumb wheel position value. widget Specifies the ThumbWheel widget ID value_return Returns the current thumb wheel position value For a complete definition of ThumbWheel and its associated resources, see SgThumbWheel(3X).
SgThumbWheelSetValue sets the thumb wheel value within the ThumbWheel widget. It is equivalent to setting XmNvalue resource through XtSetValues, except that it does not clear the window before redrawing, and therefore causes less visual "flicker". widget Specifies the ThumbWheel widget ID. value Specifies the wheel position. This sets the XmNvalue resource. For a complete definition of SgThumbWheel and its associated resources, see SgThumbWheel(3X)....
SgVisualDrawingArea is a subclass of the Motif Drawing Area that allows has a visual resource, allowing the widget to be placed into a visual different than the rest of the application. It is useful for applications that need to use multiple visuals, for example, running one window in 24 bit RGB while the rest of the application is in 8 bit pseudo color. SgVisualDrawingArea also has the ability to create a TrueColor dithered background to more closely match a requested background, and to set the...
SgVisualDrawingAreaInstallColormap installs the colormap of an SgVisualDrawingArea widget. Normally it does this by adding the widget's window to the WM_COLORMAP_WINDOWS property on the shell containing the widget. This causes the window manager to install the colormap whenever the shell has focus. (However, if the shell is marked override_redirect, the widget calls XInstallColormap(1X) directly in addition changing WM_COLORMAP_WINDOWS. Some window managers will reject such a change). There is ...
SgVisualDrawingAreaUninstallColormap installs the colormap of an SgVisualDrawingArea widget. Normally it does this by removing the widget's window from the WM_COLORMAP_WINDOWS property on the shell containing the widget. (However, if the shell is marked override_redirect, the widget calls XUninstallColormap(1X) directly in addition changing WM_COLORMAP_WINDOWS. Some window managers will reject such a change). Normally, this call is used in conjunction with SgVisualDrawingAreaInstallColormap(3X)...
Date: Thu, 22 Sep 94 16:18:16 -0700 Message-Id: <9409222318.AA17072@scalpel.netlabs.com> To: perl5-porters@isu.edu From: Larry Wall Subject: a new module I just wrote Here's one that'll whack your mind a little out. #!/usr/bin/perl use Shell; $foo = echo("howdy", "", "world"); print $foo; $passwd = cat("
TopLevelShell is used for normal top-level windows such as any additional top-level widgets an application needs. Classes TopLevelShell inherits behavior and resources from Core, Composite, Shell, WMShell, and VendorShell. The class pointer is topLevelShellWidgetClass. The class name is TopLevelShell. New Resources The following table defines a set of widget resources used by the programmer to specify data. The programmer can also set the resource values for the inherited classes to set attribut...
TransientShell is used for shell windows that can be manipulated by the window manager but are not allowed to be iconified separately. For example, Dialog boxes make no sense without their associated application. They are iconified by the window manager only if the main application shell is iconified. Classes TransientShell inherits behavior and resources from Core, Composite, Shell, WMShell, and VendorShell. The class pointer is transientShellWidgetClass. The class name is TransientShell. New R...
The uilcommand invokes the UIL compiler. The User Interface Language (UIL) is a specification language for describing the initial state of a user interface for a Motif application. The specification describes the objects (menus, dialog boxes, labels, push buttons, and so on) used in the interface and specifies the routines to be called when the interface changes state as a result of user interaction. file Specifies the file to be compiled through the UIL compiler. options Specifies one or more o...
The uilcommand invokes the UIL compiler. The User Interface Language (UIL) is a specification language for describing the initial state of a user interface for a Motif application. The specification describes the objects (menus, dialog boxes, labels, push buttons, and so on) used in the interface and specifies the routines to be called when the interface changes state as a result of user interaction. file Specifies the file to be compiled through the UIL compiler. options Specifies one or more o...
The uilcommand invokes the UIL compiler. The User Interface Language (UIL) is a specification language for describing the initial state of a user interface for a Motif application. The specification describes the objects (menus, dialog boxes, labels, push buttons, and so on) used in the interface and specifies the routines to be called when the interface changes state as a result of user interaction. file Specifies the file to be compiled through the UIL compiler. options Specifies one or more o...
The UilDumpSymbolTable function dumps the contents of a UIL symbol table pointer to standard output. root_ptr Specifies a pointer to the the symbol table root entry. This value can be taken from the parse_tree_root part of the Uil_compile_desc_type data structure returned by Uil. By following the link from the root entry, you can traverse the entire parse tree. Symbol table entries are in the following format: hex.address symbol.type symbol.data prev.source.position source.position modification....
VendorShell is a Motif widget class used as a supporting superclass for all shell classes that are visible to the window manager and that are not override redirect. It contains resources that describe the MWM-specific look and feel. It also manages the MWM-specific communication needed by all VendorShell subclasses. See the mwm(1X) man page for more information. If an application uses the XmNmwmDecorations, XmNmwmFunctions, or XmNmwmInputMode resource, it should include the file . ...
The 1/Motif manual pages describe translations in terms of virtual bindings, based on those described in the OSF/Motif Style Guide. Mouse events are described in terms of virtual buttons, and key events are described in terms of virtual keys. The term virtual implies that the events as described do not necessarily correspond to a fixed set of X Window System events. Instead, virtual buttons and keys are linked to actual events by means of virtual bindings. Virtual Modifiers Both virtual buttons ...
The widget meta-language facility (WML) is used to generate the components of the user interface language (UIL) compiler that can change depending on the widget set. Using WML you can add support in UIL for new widgets to the 1/Motif widget set or for a totally new widget set.
WMShell is a top-level widget that encapsulates the interaction with the window manager. Classes WMShell inherits behavior and resources from Core, Composite, and Shell classes. The class pointer is wmShellWidgetClass. The class name is WMShell. New Resources The following table defines a set of widget resources used by the programmer to specify data. The programmer can also set the resource values for the inherited classes to set attributes for this widget. To reference a resource by name or by...
XmActivateProtocol activates a protocol. It updates the handlers and the property if the shell is realized. It is sometimes useful to allow a protocol's state information (callback lists, and so on) to persist, even though the client may choose to temporarily resign from the interaction. This is supported by allowing a protocol to be in one of two states: active or inactive. If the protocol is active and the shell is realized, the property contains the protocol Atom. If the protocol is inactive...
XmActivateWMProtocol is a convenience interface. It calls XmActivateProtocol with the property value set to the atom returned by interning WM_PROTOCOLS. shell Specifies the widget with which the protocol property is associated. protocol Specifies the protocol Atom (or an int type cast to Atom). For a complete definition of VendorShell and its associated resources, see VendorShell(3X).
XmAddProtocolCallback adds client callbacks for a protocol. It checks if the protocol is registered, and if it is not, calls XmAddProtocols. It then adds the callback to the internal list. These callbacks are called when the corresponding client message is received. XmAddWMProtocolCallback is a convenience interface. It calls XmAddProtocolCallback with the property value set to the atom returned by interning WM_PROTOCOLS. shell Specifies the widget with which the protocol property is associated....
XmAddProtocols adds the protocols to the protocol manager and allocates the internal tables. XmAddWMProtocols is a convenience interface. It calls XmAddProtocols with the property value set to the atom returned by interning WM_PROTOCOLS. shell Specifies the widget with which the protocol property is associated. property Specifies the protocol property. protocols Specifies the protocol Atoms (or int types cast to Atom). num_protocols Specifies the number of elements in protocols. For a complete d...
This function is obsolete and its behavior is replaced by setting XmNnavigationType to XmEXCLUSIVE_TAB_GROUP. When using the keyboard to traverse through a widget hierarchy, primitive or manager widgets are grouped together into what are known as tab groups. Any manager or primitive widget can be a tab group. Within a tab group, move the focus to the next widget within the tab group by using the arrow keys. To move to another tab group, use KNextField or KPrevField. Tab groups are ordinarily spe...
XmAddWMProtocolCallback is a convenience interface. It calls XmAddProtocolCallback with the property value set to the atom returned by interning WM_PROTOCOLS. shell Specifies the widget with which the protocol property is associated. protocol Specifies the protocol Atom (or an int type cast to Atom). callback Specifies the procedure to call when a protocol message is received. closureSpecifies the client data to be passed to the callback when it is invoked. For a complete definition of VendorShe...
XmAddWMProtocols is a convenience interface. It calls XmAddProtocols with the property value set to the atom returned by interning WM_PROTOCOLS. shell Specifies the widget with which the protocol property is associated. protocols Specifies the protocol Atoms (or int types cast to Atom). num_protocols Specifies the number of elements in protocols. For a complete definition of VendorShell and its associated resources, see VendorShell(3X)....
ArrowButton consists of a directional arrow surrounded by a border shadow. When it is selected, the shadow changes to give the appearance that the ArrowButton has been pressed in. When the ArrowButton is unselected, the shadow reverts to give the appearance that the ArrowButton is released, or out. Classes ArrowButton inherits behavior and resources from Core and XmPrimitive classes. The class pointer is xmArrowButtonWidgetClass. The class name is XmArrowButton. New Resources The following table...
ArrowButtonGadget consists of a directional arrow surrounded by a border shadow. When it is selected, the shadow changes to give the appearance that the ArrowButtonGadget has been pressed in. When it is unselected, the shadow reverts to give the appearance that the button is released, or out. Classes ArrowButtonGadget inherits behavior and resources from Object, RectObj, and XmGadget classes. The class pointer is xmArrowButtonGadgetClass. The class name is XmArrowButtonGadget. New Resources The ...
xmbind is an X Window System client that configures the virtual key bindings for Motif applications. This action is performed by mwm at its startup, so the xmbind client is only needed when mwm is not in use, or when you want to change bindings without restarting mwm. If a file is specified, it's contents are used as the virtual key bindings. If a file is not specified, the file .motifbind in the user's home directory is used. If this file is not found, xmbind loads the default virtual key bin...
BulletinBoard is a composite widget that provides simple geometry management for children widgets. It does not force positioning on its children, but can be set to reject geometry requests that result in overlapping children. BulletinBoard is the base widget for most dialog widgets and is also used as a general container widget. Modal and modeless dialogs are implemented as collections of widgets that include a DialogShell, a BulletinBoard (or subclass) child of the shell, and various dialog com...
CascadeButton links two MenuPanes or a MenuBar to a MenuPane. It is used in menu systems and must have a RowColumn parent with its XmNrowColumnType resource set to XmMENU_BAR, XmMENU_POPUP or XmMENU_PULLDOWN. It is the only widget that can have a Pulldown MenuPane attached to it as a submenu. The submenu is displayed when this widget is activated within a MenuBar, a PopupMenu, or a PulldownMenu. Its visuals can include a label or pixmap and a cascading indicator when it is in a Popup or Pulldown...
CascadeButtonGadget links two MenuPanes, a MenuBar to a MenuPane, or an OptionMenu to a MenuPane. It is used in menu systems and must have a RowColumn parent with its XmNrowColumnType resource set to XmMENU_BAR, XmMENU_POPUP, XmMENU_PULLDOWN, or XmMENU_OPTION. It is the only gadget that can have a Pulldown MenuPane attached to it as a submenu. The submenu is displayed when this gadget is activated within a PopupMenu, a PulldownMenu, or an OptionMenu. Its visuals can include a label or pixmap and...
XmCascadeButtonGadgetHighlight either draws or erases the shadow highlight around the CascadeButtonGadget. cascadeButtonGadget Specifies the CascadeButtonGadget to be highlighted or unhighlighted. highlight Specifies whether to highlight (True) or to unhighlight (False). For a complete definition of CascadeButtonGadget and its associated resources, see XmCascadeButtonGadget(3X).
XmCascadeButtonHighlight either draws or erases the shadow highlight around the CascadeButton or the CascadeButtonGadget. cascadeButton Specifies the CascadeButton or CascadeButtonGadget to be highlighted or unhighlighted. highlight Specifies whether to highlight (True) or to unhighlight (False). For a complete definition of CascadeButton or CascadeButtonGadget and their associated resources, see XmCascadeButton(3X) or XmCascadeButtonGadget(3X)....
XmChangeColor handles all color modifications for the specified widget when a new background pixel value is specified. The function recalculates the foreground, select, and shadow colors based on the new background color and sets the corresponding resources for the widget. If a color calculation procedure has been set by a call to XmSetColorCalculation, XmChangeColor uses that procedure to calculate the new colors. Otherwise, the routine uses a default procedure. widget Specifies the widget ID w...
XmClipboardCancelCopy cancels the copy to clipboard that is in progress and frees up temporary storage. When a copy is to be performed, XmClipboardStartCopy allocates temporary storage for the clipboard data. XmClipboardCopy copies the appropriate data into the the temporary storage. XmClipboardEndCopy copies the data to the clipboard structure and frees up the temporary storage structures. If XmClipboardCancelCopy is called, the XmClipboardEndCopy function does not have to be called. A call to ...
XmClipboardCopy copies a data item to temporary storage. The data item is moved from temporary storage to the clipboard data structure when a call to XmClipboardEndCopy is made. Additional calls to XmClipboardCopy before a call to XmClipboardEndCopy add additional data item formats to the same data item or append data to an existing format. Formats are described in the Inter-Client Communication Conventions Manual (ICCCM) as targets. NOTE: Do not call XmClipboardCopy before a call to XmClipboard...
XmClipboardCopyByName copies the actual data for a data item that was previously passed by name to the clipboard. Data is considered to be passed by name when a call to XmClipboardCopy is made with a NULL buffer parameter. Additional calls to this function append new data to the existing data. display Specifies a pointer to the Display structure that was returned in a previous call to XOpenDisplay or XtDisplay. window Specifies a widget's window ID that relates the application window to the cli...
XmClipboardEndCopy locks the clipboard from access by other applications, places data in the clipboard data structure, and unlocks the clipboard. Data items copied to the clipboard by XmClipboardCopy are not actually entered in the clipboard data structure until the call to XmClipboardEndCopy. This function also frees up temporary storage that was allocated by XmClipboardStartCopy, which must be called before XmClipboardEndCopy. The latter function should not be called if XmClipboardCancelCopy h...
XmClipboardEndRetrieve suspends copying data incrementally from the clipboard. It tells the clipboard routines that the application is through copying an item from the clipboard. Until this function is called, data items can be retrieved incrementally from the clipboard by calling XmClipboardRetrieve. display Specifies a pointer to the Display structure that was returned in a previous call to XOpenDisplay or XtDisplay. window Specifies a widget's window ID that relates the application window to...
XmClipboardInquireCount returns the number of data item formats available for the data item in the clipboard. This function also returns the maximum name-length for all formats in which the data item is stored. display Specifies a pointer to the Display structure that was returned in a previous call to XOpenDisplay or XtDisplay. window Specifies a widget's window ID that relates the application window to the clipboard. The widget's window ID can be obtained by using XtWindow. The same applicat...
XmClipboardInquireFormat returns a specified format name for the data item in the clipboard. If the name must be truncated, the function returns a warning status. display Specifies a pointer to the Display structure that was returned in a previous call to XOpenDisplay or XtDisplay. window Specifies a widget's window ID that relates the application window to the clipboard. The widget's window ID can be obtained by using XtWindow. The same application instance should pass the same window ID to e...
XmClipboardInquireLength returns the length of the data stored under a specified format name for the clipboard data item. If no data is found for the specified format, or if there is no item on the clipboard, this function returns a value of zero. Any format passed by name is assumed to have the length passed in a call to XmClipboardCopy, even though the data has not yet been transferred to the clipboard in that format. display Specifies a pointer to the Display structure that was returned in a ...
XmClipboardInquirePendingItems returns a list of data_id/private_id pairs for the specified format name. A data item is considered pending if the application originally passed it by name, the application has not yet copied the data, and the item has not been deleted from the clipboard. The application is responsible for freeing the memory provided by this function to store the list. To free the memory, call XtFree. This function is used by an application when exiting, to determine if the data th...
XmClipboardLock locks the clipboard from access by another application until XmClipboardUnlock is called. All clipboard functions lock and unlock the clipboard to prevent simultaneous access. This function allows the application to keep the clipboard data from changing between calls to Inquire and other clipboard functions. The application does not need to lock the clipboard between calls to XmClipboardStartCopy and XmClipboardEndCopy or to XmClipboardStartRetrieve and XmClipboardEndRetrieve. If...
XmClipboardRegisterFormat registers a new format. Each format stored on the clipboard should have a length associated with it; this length must be known to the clipboard routines. Formats are known as targets in the Inter-Client Communication Conventions Manual (ICCCM). All of the formats specified by the ICCCM conventions are preregistered. Any other format that the application wants to use must either be 8-bit data or be registered via this routine. Failure to register the length of the data r...
XmClipboardRetrieve retrieves the current data item from clipboard storage. It returns a warning if the clipboard is locked; if there is no data on the clipboard; or if the data needs to be truncated because the buffer length is too short. Between a call to XmClipboardStartRetrieve and a call to XmClipboardEndRetrieve, multiple calls to XmClipboardRetrieve with the same format name result in data being incrementally copied from the clipboard until the data in that format has all been copied. The...
XmClipboardStartCopy sets up storage and data structures to receive clipboard data. An application calls this function during a cut or copy operation. The data item that these structures receive then becomes the next data item in the clipboard. Copying a large piece of data to the clipboard can take a long time. It is possible that, once copied, no application will ever request that data. The Motif Toolkit provides a mechanism so that an application does not need to actually pass data to the cli...
XmClipboardStartRetrieve tells the clipboard routines that the application is ready to start copying an item from the clipboard. The clipboard is locked by this routine and stays locked until XmClipboardEndRetrieve is called. Between a call to XmClipboardStartRetrieve and a call to XmClipboardEndRetrieve, multiple calls to XmClipboardRetrieve with the same format name result in data being incrementally copied from the clipboard until the data in that format has all been copied. The return value ...
XmClipboardUndoCopy deletes the last item placed on the clipboard if the item was placed there by an application with the passed display and window arguments. Any data item deleted from the clipboard by the original call to XmClipboardCopy is restored. If the display or window IDs do not match the last copied item, no action is taken, and this function has no effect. display Specifies a pointer to the Display structure that was returned in a previous call to XOpenDisplay or XtDisplay. window Spe...
XmClipboardUnlock unlocks the clipboard, enabling it to be accessed by other applications. If multiple calls to XmClipboardLock have occurred, the same number of calls to XmClipboardUnlock is necessary to unlock the clipboard, unless remove_all_locks is set to True. display Specifies a pointer to the Display structure that was returned in a previous call to XOpenDisplay or XtDisplay. window Specifies a widget's window ID that relates the application window to the clipboard. The widget's window...
XmClipboardWithdrawFormat indicates that the application no longer supplies a data item to the clipboard that the application had previously passed by name. display Specifies a pointer to the Display structure that was returned in a previous call to XOpenDisplay or XtDisplay. window Specifies a widget's window ID that relates the application window to the clipboard. The widget's window ID can be obtained by using XtWindow. The same application instance should pass the same window ID to each cl...
Command is a special-purpose composite widget for command entry that provides a built-in command-history mechanism. Command includes a command-line text-input field, a command-line prompt, and a command-history list region. One additional WorkArea child may be added to the Command after creation. Whenever a command is entered, it is automatically added to the end of the command-history list and made visible. This does not change the selected item in the list, if there is one. Many of the new res...
XmCommandAppendValue appends the passed XmString to the end of the string displayed in the command area of the Command widget. widget Specifies the Command widget ID commandSpecifies the passed XmString For a complete definition of Command and its associated resources, see XmCommand(3X).
XmCommandError displays an error message in the history area of the Command widget. The XmString error is displayed until the next command entered occurs. widget Specifies the Command widget ID error Specifies the passed XmString For a complete definition of Command and its associated resources, see XmCommand(3X).
XmCommandGetChild is used to access a component within a Command. The parameters given to the function are the Command widget and a value indicating which component to access. widget Specifies the Command widget ID. child Specifies a component within the Command. The following are legal values for this parameter: o XmDIALOG_COMMAND_TEXT o XmDIALOG_PROMPT_LABEL o XmDIALOG_HISTORY_LIST o XmDIALOG_WORK_AREA For a complete definition of Command and its associated resources, see XmCommand(3X)....
XmCommandSetValue replaces the string displayed in the command area of the Command widget with the passed XmString. widget Specifies the Command widget ID commandSpecifies the passed XmString For a complete definition of Command and its associated resources, see XmCommand(3X).
XmConvertUnits converts the value and returns it as the return value from the function. widget Specifies the widget for which the data is to be converted orientation Specifies whether the converter uses the horizontal or vertical screen resolution when performing the conversions. orientation can have values of XmHORIZONTAL or XmVERTICAL. from_unit_type Specifies the current unit type of the supplied value from_value Specifies the value to be converted to_unit_type Converts the value to the unit ...
XmCreateArrowButton creates an instance of an ArrowButton widget and returns the associated widget ID. parent Specifies the parent widget ID name Specifies the name of the created widget arglistSpecifies the argument list argcount Specifies the number of attribute/value pairs in the argument list (arglist) For a complete definition of ArrowButton and its associated resources, see XmArrowButton(3X)....
XmCreateArrowButtonGadget creates an instance of an ArrowButtonGadget widget and returns the associated widget ID. parent Specifies the parent widget ID name Specifies the name of the created widget arglistSpecifies the argument list argcount Specifies the number of attribute/value pairs in the argument list (arglist) For a complete definition of ArrowButtonGadget and its associated resources, see XmArrowButtonGadget(3X)....
XmCreateBulletinBoard creates an instance of a BulletinBoard widget and returns the associated widget ID. parent Specifies the parent widget ID name Specifies the name of the created widget arglistSpecifies the argument list argcount Specifies the number of attribute/value pairs in the argument list (arglist) For a complete definition of BulletinBoard and its associated resources, see XmBulletinBoard(3X)....
XmCreateBulletinBoardDialog is a convenience creation function that creates a DialogShell and an unmanaged BulletinBoard child of the DialogShell. A BulletinBoardDialog is used for interactions not supported by the standard dialog set. This function does not automatically create any labels, buttons, or other dialog components. Such components should be added by the application after the BulletinBoardDialog is created. Use XtManageChild to pop up the BulletinBoardDialog (passing the BulletinBoard...
XmCreateCascadeButton creates an instance of a CascadeButton widget and returns the associated widget ID. parent Specifies the parent widget ID. The parent must be a RowColumn widget. name Specifies the name of the created widget arglistSpecifies the argument list argcount Specifies the number of attribute/value pairs in the argument list (arglist) For a complete definition of CascadeButton and its associated resources, see XmCascadeButton(3X)....
XmCreateCascadeButtonGadget creates an instance of a CascadeButtonGadget and returns the associated widget ID. parent Specifies the parent widget ID. The parent must be a RowColumn widget. name Specifies the name of the created widget arglistSpecifies the argument list argcount Specifies the number of attribute/value pairs in the argument list (arglist) For a complete definition of CascadeButtonGadget and its associated resources, see XmCascadeButtonGadget(3X)....
XmCreateCommand creates an instance of a Command widget and returns the associated widget ID. parent Specifies the parent widget ID name Specifies the name of the created widget arglistSpecifies the argument list argcount Specifies the number of attribute/value pairs in the argument list (arglist) For a complete definition of Command and its associated resources, see XmCommand(3X).
XmCreateDialogShell creates an instance of a DialogShell widget and returns the associated widget ID. parent Specifies the parent widget ID name Specifies the name of the created widget arglistSpecifies the argument list argcount Specifies the number of attribute/value pairs in the argument list (arglist) For a complete definition of DialogShell and its associated resources, see XmDialogShell(3X).
XmCreateDragIcon creates a DragIcon and returns the associated widget ID. widget Specifies the ID of the widget that the function uses to access default values for visual attributes of the DragIcon. This widget may be different than the actual parent of the DragIcon. name Specifies the name of the DragIcon widget. arglistSpecifies the argument list. argcount Specifies the number of attribute/value pairs in the argument list (arglist). For a complete definition of DragIcon and its associated reso...
XmCreateDrawingArea creates an instance of a DrawingArea widget and returns the associated widget ID. parent Specifies the parent widget ID name Specifies the name of the created widget arglistSpecifies the argument list argcount Specifies the number of attribute/value pairs in the argument list (arglist) For a complete definition of DrawingArea and its associated resources, see XmDrawingArea(3X).
XmCreateDrawnButton creates an instance of a DrawnButton widget and returns the associated widget ID. parent Specifies the parent widget ID name Specifies the name of the created widget arglistSpecifies the argument list argcount Specifies the number of attribute/value pairs in the argument list (arglist) For a complete definition of DrawnButton and its associated resources, see XmDrawnButton(3X).
XmCreateErrorDialog is a convenience creation function that creates a DialogShell and an unmanaged MessageBox child of the DialogShell. An ErrorDialog warns the user of an invalid or potentially dangerous condition. It includes a symbol, a message, and three buttons. The default symbol is an octagon with a diagonal slash. The default button labels are OK, Cancel, and Help. Use XtManageChild to pop up the ErrorDialog (passing the MessageBox as the widget parameter); use XtUnmanageChild to pop it ...
XmCreateFileSelectionBox creates an unmanaged FileSelectionBox. A FileSelectionBox is used to select a file and includes the following: o An editable text field for the directory mask o A scrolling list of file names o An editable text field for the selected file o Labels for the list and text fields o Four buttons The default button labels are OK, Filter, Cancel, and Help. Additional work area children may be added to the FileSelectionBox after creation. FileSelectionBox inherits the layout fun...
XmCreateFileSelectionDialog is a convenience creation function that creates a DialogShell and an unmanaged FileSelectionBox child of the DialogShell. A FileSelectionDialog selects a file. It includes the following: o An editable text field for the directory mask o A scrolling list of filenames o An editable text field for the selected file o Labels for the list and text fields o Four buttons The default button labels are: OK, Filter, Cancel, and Help. One additional WorkArea child may be added t...
XmCreateForm creates an instance of a Form widget and returns the associated widget ID. parent Specifies the parent widget ID name Specifies the name of the created widget arglistSpecifies the argument list argcount Specifies the number of attribute/value pairs in the argument list (arglist) For a complete definition of Form and its associated resources, see XmForm(3X).
XmCreateFormDialog is a convenience creation function that creates a DialogShell and an unmanaged Form child of the DialogShell. A FormDialog is used for interactions not supported by the standard dialog set. This function does not automatically create any labels, buttons, or other dialog components. Such components should be added by the application after the FormDialog is created. Use XtManageChild to pop up the FormDialog (passing the Form as the widget parameter); use XtUnmanageChild to pop ...
XmCreateFrame creates an instance of a Frame widget and returns the associated widget ID. parent Specifies the parent widget ID name Specifies the name of the created widget arglistSpecifies the argument list argcount Specifies the number of attribute/value pairs in the argument list (arglist) For a complete definition of Frame and its associated resources, see XmFrame(3X).
XmCreateInformationDialog is a convenience creation function that creates a DialogShell and an unmanaged MessageBox child of the DialogShell. An InformationDialog gives the user information, such as the status of an action. It includes a symbol, a message, and three buttons. The default symbol is a lower case i. The default button labels are OK, Cancel, and Help. Use XtManageChild to pop up the InformationDialog (passing the MessageBox as the widget parameter); use XtUnmanageChild to pop it down...
XmCreateLabel creates an instance of a Label widget and returns the associated widget ID. parent Specifies the parent widget ID name Specifies the name of the created widget arglistSpecifies the argument list argcount Specifies the number of attribute/value pairs in the argument list (arglist) For a complete definition of Label and its associated resources, see XmLabel(3X).
XmCreateLabelGadget creates an instance of a LabelGadget widget and returns the associated widget ID. parent Specifies the parent widget ID name Specifies the name of the created widget arglistSpecifies the argument list argcount Specifies the number of attribute/value pairs in the argument list (arglist) For a complete definition of LabelGadget and its associated resources, see XmLabelGadget(3X).
XmCreateList creates an instance of a List widget and returns the associated widget ID. parent Specifies the parent widget ID name Specifies the name of the created widget arglistSpecifies the argument list argcount Specifies the number of attribute/value pairs in the argument list (arglist) For a complete definition of List and its associated resources, see XmList(3X).
XmCreateMainWindow creates an instance of a MainWindow widget and returns the associated widget ID. parent Specifies the parent widget ID name Specifies the name of the created widget arglistSpecifies the argument list argcount Specifies the number of attribute/value pairs in the argument list (arglist) For a complete definition of MainWindow and its associated resources, see XmMainWindow(3X).
XmCreateMenuBar creates an instance of a RowColumn widget of type XmMENU_BAR and returns the associated widget ID.It is provided as a convenience function for creating RowColumn widgets configured to operate as a MenuBar and is not implemented as a separate widget class. The MenuBar widget is generally used for building a Pulldown menu system. Typically, a MenuBar is created and placed along the top of the application window, and several CascadeButtons are inserted as the children. Each of the C...
XmCreateMenuShell creates an instance of a MenuShell widget and returns the associated widget ID. parent Specifies the parent widget ID name Specifies the name of the created widget arglistSpecifies the argument list argcount Specifies the number of attribute/value pairs in the argument list (arglist) For a complete definition of MenuShell and its associated resources, see XmMenuShell(3X).
XmCreateMessageBox creates an unmanaged MessageBox. A MessageBox is used for common interaction tasks, which include giving information, asking questions, and reporting errors. It includes an optional symbol, a message, and three buttons. By default, there is no symbol. The default button labels are OK, Cancel, and Help. If the parent of the MessageBox is a DialogShell, use XtManageChild to pop up the MessageBox (passing the MessageBox as the widget parameter); use XtUnmanageChild to pop it down...
XmCreateMessageDialog is a convenience creation function that creates a DialogShell and an unmanaged MessageBox child of the DialogShell. A MessageDialog is used for common interaction tasks, which include giving information, asking questions, and reporting errors. It includes a symbol, a message, and three buttons. By default, there is no symbol. The default button labels are OK, Cancel, and Help. Use XtManageChild to pop up the MessageDialog (passing the MessageBox as the widget parameter); us...
XmCreateOptionMenu creates an instance of a RowColumn widget of type XmMENU_OPTION and returns the associated widget ID. It is provided as a convenience function for creating a RowColumn widget configured to operate as an OptionMenu and is not implemented as a separate widget class. The OptionMenu widget is a specialized RowColumn manager composed of a label, a selection area, and a single Pulldown MenuPane. When an application creates an OptionMenu widget, it supplies the label string and the P...
XmCreatePanedWindow creates an instance of a PanedWindow widget and returns the associated widget ID. parent Specifies the parent widget ID name Specifies the name of the created widget arglistSpecifies the argument list argcount Specifies the number of attribute/value pairs in the argument list (arglist) For a complete definition of PanedWindow and its associated resources, see XmPanedWindow(3X).
XmCreatePopupMenu creates an instance of a RowColumn widget of type XmMENU_POPUP and returns the associated widget ID. When using this function to create the Popup MenuPane, a MenuShell widget is automatically created as the parent of the MenuPane. The parent of the MenuShell widget is the widget indicated by the parent parameter. XmCreatePopupMenu is provided as a convenience function for creating RowColumn widgets configured to operate as Popup MenuPanes and is not implemented as a separate wi...
XmCreatePromptDialog is a convenience creation function that creates a DialogShell and an unmanaged SelectionBox child of the DialogShell. A PromptDialog prompts the user for text input. It includes a message, a text input region, and three managed buttons. The default button labels are OK, Cancel, and Help. An additional button, with Apply as the default label, is created unmanaged; it may be explicitly managed if needed. One additional WorkArea child may be added to the SelectionBox after crea...
XmCreatePulldownMenu creates an instance of a RowColumn widget of type XmMENU_PULLDOWN and returns the associated widget ID. When using this function to create the Pulldown MenuPane, a MenuShell widget is automatically created as the parent of the MenuPane. If the widget specified by the parent parameter is a Popup or a Pulldown MenuPane, the MenuShell widget is created as a child of the parent's MenuShell; otherwise, it is created as a child of the specified parent widget. XmCreatePulldownMenu...
XmCreatePushButton creates an instance of a PushButton widget and returns the associated widget ID. parent Specifies the parent widget ID name Specifies the name of the created widget arglistSpecifies the argument list argcount Specifies the number of attribute/value pairs in the argument list (arglist) For a complete definition of PushButton and its associated resources, see XmPushButton(3X).
XmCreatePushButtonGadget creates an instance of a PushButtonGadget widget and returns the associated widget ID. parent Specifies the parent widget ID name Specifies the name of the created widget arglistSpecifies the argument list argcount Specifies the number of attribute/value pairs in the argument list (arglist) For a complete definition of PushButtonGadget and its associated resources, see XmPushButtonGadget(3X)....
XmCreateQuestionDialog is a convenience creation function that creates a DialogShell and an unmanaged MessageBox child of the DialogShell. A QuestionDialog is used to get the answer to a question from the user. It includes a symbol, a message, and three buttons. The default symbol is a question mark. The default button labels are OK, Cancel, and Help. Use XtManageChild to pop up the QuestionDialog (passing the MessageBox as the widget parameter); use XtUnmanageChild to pop it down. parent Specif...
XmCreateRadioBox creates an instance of a RowColumn widget of type XmWORK_AREA and returns the associated widget ID. Typically, this is a composite widget that contains multiple ToggleButtonGadgets. The RadioBox arbitrates and ensures that at most one ToggleButtonGadget is on at any time. Unless the application supplies other values in the arglist, this function provides initial values for several RowColumn resources. It initializes XmNpacking to XmPACK_COLUMN, XmNradioBehavior to True, XmNisHom...
XmCreateRowColumn creates an instance of a RowColumn widget and returns the associated widget ID. If XmNrowColumnType is not specified, then it is created with XmWORK_AREA, which is the default. If this function is used to create a Popup Menu of type XmMENU_POPUP or a Pulldown Menu of type XmMENU_PULLDOWN, a MenuShell widget is not automatically created as the parent of the MenuPane. The application must first create the MenuShell by using either XmCreateMenuShell or the standard toolkit create ...
XmCreateScale creates an instance of a Scale widget and returns the associated widget ID. parent Specifies the parent widget ID name Specifies the name of the created widget arglistSpecifies the argument list argcount Specifies the number of attribute/value pairs in the argument list (arglist) For a complete definition of Scale and its associated resources, see XmScale(3X).
XmCreateScrollBar creates an instance of a ScrollBar widget and returns the associated widget ID. parent Specifies the parent widget ID name Specifies the name of the created widget arglistSpecifies the argument list argcount Specifies the number of attribute/value pairs in the argument list (arglist) For a complete definition of ScrollBar and its associated resources, see XmScrollBar(3X).
XmCreateScrolledList creates an instance of a List widget that is contained within a ScrolledWindow. All ScrolledWindow subarea widgets are automatically created by this function. The ID returned by this function is that of the List widget. Use this ID for all normal List operations, as well as those that are relevant for the ScrolledList widget. All arguments to either the List or the ScrolledWindow widget can be specified at creation time using this function. Changes to initial position and si...
XmCreateScrolledText creates an instance of a Text widget that is contained within a ScrolledWindow. All ScrolledWindow subarea widgets are automatically created by this function. The ID returned by this function is that of the Text widget. Use this ID for all normal Text operations, as well as those that are relevant for the ScrolledText widget. The Text widget defaults to single-line text edit; therefore, no ScrollBars are displayed. The Text resource XmNeditMode must be set to XmMULTI_LINE_ED...
XmCreateScrolledWindow creates an instance of a ScrolledWindow widget and returns the associated widget ID. parent Specifies the parent widget ID name Specifies the name of the created widget arglistSpecifies the argument list argcount Specifies the number of attribute/value pairs in the argument list (arglist) For a complete definition of ScrolledWindow and its associated resources, see XmScrolledWindow(3X)....
XmCreateSelectionBox creates an unmanaged SelectionBox. A SelectionBox is used to get a selection from a list of alternatives from the user and includes the following: o A scrolling list of alternatives o An editable text field for the selected alternative o Labels for the list and text field o Three or four buttons The default button labels are OK, Cancel, and Help. By default an Apply button is also created; if the parent of the SelectionBox is a DialogShell it is managed, and otherwise it is ...
XmCreateSelectionDialog is a convenience creation function that creates a DialogShell and an unmanaged SelectionBox child of the DialogShell. A SelectionDialog offers the user a choice from a list of alternatives and gets a selection. It includes the following: o A scrolling list of alternatives o An editable text field for the selected alternative o Labels for the text field o Four buttons The default button labels are OK, Cancel, Apply, and Help. One additional WorkArea child may be added to t...
XmCreateSeparator creates an instance of a Separator widget and returns the associated widget ID. parent Specifies the parent widget ID name Specifies the name of the created widget arglistSpecifies the argument list argcount Specifies the number of attribute/value pairs in the argument list (arglist) For a complete definition of Separator and its associated resources, see XmSeparator(3X).
XmCreateSeparatorGadget creates an instance of a SeparatorGadget widget and returns the associated widget ID. parent Specifies the parent widget ID name Specifies the name of the created widget arglistSpecifies the argument list argcount Specifies the number of attribute/value pairs in the argument list (arglist) For a complete definition of SeparatorGadget and its associated resources, see XmSeparatorGadget(3X)....
XmCreateSimpleCheckBox creates an instance of a RowColumn widget of type XmWORK_AREA and returns the associated widget ID. This routine creates a CheckBox and its ToggleButtonGadget children. A CheckBox is similar to a RadioBox, except that more than one button can be selected at a time. The name of each button is button_n, where n is an integer from 0 to one minus the number of buttons in the menu. Buttons are named and created in the order in which they are specified in the RowColumn simple me...
XmCreateSimpleMenuBar creates an instance of a RowColumn widget of type XmMENU_BAR and returns the associated widget ID. This routine creates a MenuBar and its CascadeButtonGadget children. The name of each button is button_n, where n is an integer from 0 to one minus the number of buttons in the menu. Buttons are named and created in the order in which they are specified in the RowColumn simple menu creation resources supplied in the argument list. parent Specifies the parent widget ID name Spe...
XmCreateSimpleOptionMenu creates an instance of a RowColumn widget of type XmMENU_OPTION and returns the associated widget ID. This routine creates an Option Menu and its submenu containing PushButtonGadget or CascadeButtonGadget children. The name of each button is button_n, where n is an integer from 0 to one minus the number of buttons in the menu. The name of each separator is separator_n, where n is an integer from 0 to one minus the number of separators in the menu. Buttons and separators ...
XmCreateSimplePopupMenu creates an instance of a RowColumn widget of type XmMENU_POPUP and returns the associated widget ID. This routine creates a Popup MenuPane and its button children. The name of each button is button_n, where n is an integer from 0 to one minus the number of buttons in the menu. The name of each separator is separator_n, where n is an integer from 0 to one minus the number of separators in the menu. The name of each title is label_n, where n is an integer from 0 to one minu...
XmCreateSimplePulldownMenu creates an instance of a RowColumn widget of type XmMENU_PULLDOWN and returns the associated widget ID. This routine creates a Pulldown MenuPane and its button children. The name of each button is button_n, where n is an integer from 0 to one minus the number of buttons in the menu. The name of each separator is separator_n, where n is an integer from 0 to one minus the number of separators in the menu. The name of each title is label_n, where n is an integer from 0 to...
XmCreateSimpleRadioBox creates an instance of a RowColumn widget of type XmWORK_AREA and returns the associated widget ID. This routine creates a Radio Box and its ToggleButtonGadget children. The name of each button is button_n, where n is an integer from 0 to one minus the number of buttons in the menu. Buttons are named and created in the order in which they are specified in the RowColumn simple menu creation resources supplied in the argument list. parent Specifies the parent widget ID name ...
XmCreateTemplateDialog is a convenience creation function that creates a DialogShell and an unmanaged MessageBox child of the DialogShell. The MessageBox widget's XmNdialogType resource is set to XmDIALOG_TEMPLATE. By default, the TemplateDialog widget contains only the separator child. You can build a customized dialog by adding children to the TemplateDialog. You can create the standard MessageBox pushbuttons, Cancel, Help, and OK, by specifying the associated callback and label string resour...
XmCreateText creates an instance of a Text widget and returns the associated widget ID. parent Specifies the parent widget ID name Specifies the name of the created widget arglistSpecifies the argument list argcount Specifies the number of attribute/value pairs in the argument list (arglist) For a complete definition of Text and its associated resources, see XmText(3X).
XmCreateTextField creates an instance of a TextField widget and returns the associated widget ID. parent Specifies the parent widget ID name Specifies the name of the created widget arglistSpecifies the argument list argcount Specifies the number of attribute/value pairs in the argument list (arglist) For a complete definition of TextField and its associated resources, see XmTextField(3X).
XmCreateToggleButton creates an instance of a ToggleButton widget and returns the associated widget ID. parent Specifies the parent widget ID name Specifies the name of the created widget arglistSpecifies the argument list argcount Specifies the number of attribute/value pairs in the argument list (arglist) For a complete definition of ToggleButton and its associated resources, see XmToggleButton(3X)....
XmCreateToggleButtonGadget creates an instance of a ToggleButtonGadget and returns the associated widget ID. parent Specifies the parent widget ID name Specifies the name of the created widget arglistSpecifies the argument list argcount Specifies the number of attribute/value pairs in the argument list (arglist) For a complete definition of ToggleButtonGadget and its associated resources, see XmToggleButtonGadget(3X)....
XmCreateWarningDialog is a convenience creation function that creates a DialogShell and an unmanaged MessageBox child of the DialogShell. A WarningDialog warns users of action consequences and gives them a choice of resolutions. It includes a symbol, a message, and three buttons. The default symbol is an exclamation point. The default button labels are OK, Cancel, and Help. Use XtManageChild to pop up the WarningDialog (passing the MessageBox as the widget parameter); use XtUnmanageChild to pop ...
XmCreateWorkArea creates an instance of a RowColumn widget and returns the associated widget ID. The widget is created with XmNrowColumnType set to XmWORK_AREA. parent Specifies the parent widget ID name Specifies the name of the created widget arglistSpecifies the argument list argcount Specifies the number of attribute/value pairs in the argument list (arglist) For a complete definition of RowColumn and its associated resources, see XmRowColumn(3X)....
XmCreateWorkingDialog is a convenience creation function that creates a DialogShell and an unmanaged MessageBox child of the DialogShell. A WorkingDialog informs users that there is a time-consuming operation in progress and allows them to cancel the operation. It includes a symbol, a message, and three buttons. The default symbol is an hourglass. The default button labels are OK, Cancel, and Help. Use XtManageChild to pop up the WorkingDialog (passing the MessageBox as the widget parameter); us...
XmCvtCTToXmString converts a (char *) string in compound text format to a compound string. The application must call XtAppInitialize before calling this function. Conversion of compound text to compound strings is implementation dependent. text Specifies a string in compound text format to be converted to a compound string.
XmCvtStringToUnitType converts a string to a unit type. Refer to the man pages for XmGadget, XmManager, or XmPrimitive for a description of the valid unit types. Use of this function as a resource converter is obsolete. It has been replaced by a new resource converter that uses the RepType facility. args Specifies a list of additional XrmValue arguments to the converter if additional context is needed to perform the conversion. For example, the string-tofont converter needs the widget's screen ...
XmCvtXmStringToCT converts a compound string to a (char *) string in compound text format. The application must call XtAppInitialize before calling this function. The converter uses the font list tag associated with a given compound string segment to select a compound text format for that segment. A registry defines a mapping between font list tags and compound text encoding formats. The converter uses the following algorithm for each compound string segment: 1. If the compound string segment ta...
XmDeactivateProtocol deactivates a protocol without removing it. It updates the handlers and the property, if the shell is realized. It is sometimes useful to allow a protocol's state information (callback lists, etc.) to persist, even though the client may choose to temporarily resign from the interaction. The main use of this capability is to gray/ungray f.send_msg entries in the Mwm system menu. This is supported by allowing a protocol to be in one of two states: active or inactive. If the p...
XmDeactivateWMProtocol is a convenience interface. It calls XmDeactivateProtocol with the property value set to the atom returned by interning WM_PROTOCOLS. shell Specifies the widget with which the protocol property is associated protocol Specifies the protocol atom (or an int type cast to Atom) For a complete definition of VendorShell and its associated resources, see VendorShell(3X).
XmDestroyPixmap removes pixmaps that are no longer used. Pixmaps are completely freed only when there is no further reference to them. screen Specifies the display screen for which the pixmap was requested pixmap Specifies the pixmap to be destroyed
Modal and modeless dialogs use DialogShell as the Shell parent. DialogShell widgets cannot be iconified. Instead, all secondary DialogShell widgets associated with an ApplicationShell widget are iconified and de-iconified as a group with the primary widget. The client indirectly manipulates DialogShell via the convenience interfaces during creation, and it can directly manipulate its BulletinBoard-derived child. Much of the functionality of DialogShell assumes that its child is a BulletinBoard s...
The XmDisplay object is used by the Motif widgets to store information that is specific to a display. It also allows the toolkit to access certain information on widget hierarchies that would otherwise be unavailable. Each client has one XmDisplay object for each display it accesses. An XmDisplay object is automatically created when the application creates the first shell on a display (usually accomplished by a call to XtAppInitialize or XtAppCreateShell). It is not necessary to create an XmDisp...
XmDragCancel terminates a drag operation and cancels any pending actions of the specified DragContext. This routine can only be called by the initiator client. dragcontext Specifies the ID of the DragContext widget associated with the drag and drop transaction to be terminated For a complete definition of DragContext and its associated resources, see XmDragContext(3X).
DragContexts are special widgets used in drag and drop transactions. A DragContext is implemented as a widget, but a client does not explicitly create a DragContext widget. Instead, a client initiates a drag and drop transaction by calling XmDragStart, and this routine initializes and returns a DragContext widget. There is a unique DragContext for each drag operation. The toolkit frees a DragContext when a transaction is complete; therefore, an application programmer should not explicitly destro...
A DragIcon is a component of the visual used to represent the source data in a drag and drop transaction. During a drag operation, a real or simulated X cursor provides dragover visuals consisting of a static portion that represents the object being dragged, and dynamic cues that provide visual feedback during the drag operation. The visual is attained by blending together various XmDragIcons specified in the XmDragContext associated with the drag operation. The static portion of the drag-over v...
XmDragStart initiates a drag operation. This routine returns the DragContext widget that it initializes for the associated drag transaction. The toolkit is responsible for freeing the DragContext when the drag and drop transaction is complete. widget Specifies the ID of the smallest widget and/or gadget that encloses the source elements selected for a drag operation. event Specifies the XEvent that triggered the drag operation. This event must be a ButtonPress event. arglistSpecifies the argumen...
DrawingArea is an empty widget that is easily adaptable to a variety of purposes. It does no drawing and defines no behavior except for invoking callbacks. Callbacks notify the application when graphics need to be drawn (exposure events or widget resize) and when the widget receives input from the keyboard or mouse. Applications are responsible for defining appearance and behavior as needed in response to DrawingArea callbacks. DrawingArea is also a composite widget and subclass of XmManager tha...
The DrawnButton widget consists of an empty widget window surrounded by a shadow border. It provides the application developer with a graphics area that can have PushButton input semantics. Callback types are defined for widget exposure and widget resize to allow the application to redraw or reposition its graphics. If the DrawnButton widget has a highlight and shadow thickness, the application should not draw in that area. To avoid drawing in the highlight and shadow area, create the graphics c...
A client registers a widget or gadget as a drop site using the XmDropSiteRegister function. In addition, this routine defines the behavior and capabilities of a drop site by specifying appropriate resources. For example, the XmNimportTargets and XmNnumImportTargets resources identify respectively the selection target types and number of types supported by a drop site. The visual animation effects associated with a drop site are also described with DropSite resources. Drop site animation effects ...
XmDropSiteConfigureStackingOrder changes the stacking order of the drop site specified by widget. The stacking order controls the manner in which drag-under effects are clipped by overlapping siblings, regardless of whether they are active. The stack mode is relative either to the entire stack, or to another drop site within the stack. The stack order can be modified only if the drop sites are siblings in both the widget and drop site hierarchy, and the widget parent of the drop sites is registe...
XmDropSiteEndUpdate is used in conjunction with XmDropSiteStartUpdate to process updates to multiple drop sites within the same hierarchy. XmDropSiteStartUpdate and XmDropSiteEndUpdate signal the beginning and the end respectively of a series of calls to XmDropSiteUpdate. Calls to XmDropSiteStartUpdate and XmDropSiteEndUpdate can be recursively stacked. Using these routines optimizes the processing of update information. widget Specifies the ID of any widget within a given hierarchy. The functio...
XmDropSiteQueryStackingOrder obtains the parent, a list of children registered as drop sites, and the number of children registered as drop sites for a given widget. The children are listed in current stacking order, from bottommost (first child) to the top-most (last child). This function allocates memory for the returned data that must be freed by calling XtFree. widget Specifies the widget ID. For this widget, you obtain the list of its children, its parent, and the number of children. parent...
XmDropSiteRegister identifies the specified widget or gadget as a drop site and sets resource values that define the drop site's behavior. The routine assigns default values to any resources that are not specified in the argument list. The toolkit generates a warning message if a drop site is registered with XmNdropSiteActivity set to XmDROP_SITE_ACTIVE and the XmNdropProc resource is NULL. If the drop site is a descendant of a widget that is registered as a drop site, the XmNdropSiteType resou...
XmDropSiteRetrieve extracts values for the given resources from the drop site specified by widget. An initiator can also obtain information about the current drop site by passing the associated DragContext widget as the widget parameter to this routine. The initiator can retrieve all of the drop site resources except XmNdragProc and XmNdropProc using this method. widget Specifies the ID of the widget that encloses the drop site. arglistSpecifies the argument list. argcount Specifies the number o...
XmDropSiteStartUpdate is used in conjunction with XmDropSiteEndUpdate to process updates to multiple drop sites within the same shell widget. XmDropSiteStartUpdate and XmDropSiteEndUpdate signal the beginning and the end respectively of a series of calls to XmDropSiteUpdate. Calls to XmDropSiteStartUpdate and XmDropSiteEndUpdate can be recursively stacked. Using these routines optimizes the processing of update information. widget Specifies the ID of any widget within a given hierarchy. The func...
XmDropSiteUnregister informs the toolkit that the specified widget is no longer a registered drop site. The function frees all associated drop site information. widget Specifies the ID of the widget, registered as a drop site, that is to be unregistered For a complete definition of DropSite and its associated resources, see XmDropSite(3X).
XmDropSiteUpdate modifies drop site resources associated with the specified widget. This routine updates the drop site resources specified in the arglist. widget Specifies the ID of the widget registered as a drop site arglistSpecifies the argument list argcount Specifies the number of attribute/value pairs in the argument list (arglist) For a complete definition of DropSite and its associated resources, see XmDropSite(3X)....
DropTransfer provides a set of resources that identifies the procedures and associated information required by the toolkit in order to process and complete a drop transaction. Clients should not explicitly create a DropTransfer widget. Instead, a client initiates a transfer by calling XmDropTransferStart, which initializes and returns a DropTransfer widget. If this function is called within an XmNdropProc callback, the actual transfers are initiated after the callback returns. Even if no data ne...
XmDropTransferAdd identifies a list of additional drop transfer entries to be processed after a drop transfer is started. drop_transfer Specifies the ID of the DropTransfer widget returned by XmDropTransferStart transfers Specifies the additional drop transfer entries that the receiver wants processed num_transfers Specifies the number of items in the transfers array For a complete definition of DropTransfer and its associated resources, see XmDropTransfer(3X)....
XmDropTransferStart initiates a drop transfer and uses the specified argument list to initialize an XmDropTransfer object. The DropTransfer object can be manipulated with XtSetValues and XtGetValues until the last call to the XmNtransferProc procedure is made. After that point, the result of using the widget pointer is undefined. The DropTransfer object is freed by the toolkit when a transfer is complete. refwidget Specifies the ID of the DragContext widget associated with the transaction arglis...
FileSelectionBox traverses through directories, views the files and subdirectories in them, and then selects files. A FileSelectionBox has five main areas: o A text input field for displaying and editing a directory mask used to select the files to be displayed o A scrollable list of filenames o A scrollable list of subdirectories o A text input field for displaying and editing a filename o A group of PushButtons, labeled OK, Filter, Cancel, and Help Additional children may be added to the FileS...
XmFileSelectionBoxGetChild is used to access a component within a FileSelectionBox. The parameters given to the function are the FileSelectionBox widget and a value indicating which component to access. widget Specifies the FileSelectionBox widget ID. child Specifies a component within the FileSelectionBox. The following are legal values for this parameter: o XmDIALOG_APPLY_BUTTON o XmDIALOG_CANCEL_BUTTON o XmDIALOG_DEFAULT_BUTTON o XmDIALOG_DIR_LIST o XmDIALOG_DIR_LIST_LABEL o XmDIALOG_FILTER_L...
XmFileSelectionDoSearch initiates a directory and file search in a FileSelectionBox widget. For a description of the actions that the FileSelectionBox takes when doing a search, see XmFileSelectionBox(3X). widget Specifies the FileSelectionBox widget ID. dirmaskSpecifies the directory mask used in determining the directories and files displayed in the FileSelectionBox lists. This value is used as the mask member of the input data XmFileSelectionBoxCallbackStruct structure passed to the FileSelec...
XmFontList is the data type for a font list. A font list consists of font list entries, each of which contains a font or a font set (a group of fonts) and is identified with a tag. The font list entry tag is optional; if NULL, the tag is set to XmFONTLIST_DEFAULT_TAG. The value of XmFONTLIST_DEFAULT_TAG is "XmFONTLIST_DEFAULT_TAG_STRING". When a compound string is displayed, the font list element tag of the compound string segment is matched with a font list entry tag in the font list and the ...
XmFontListAdd creates a new font list consisting of the contents of the oldlist and the new font-list element being added. This function deallocates the oldlist after extracting the required information; therefore, do not reference oldlist thereafter. Note: This function is obsolete and exists for compatibility with previous releases. It has been replaced by XmFontListAppendEntry. oldlistSpecifies a pointer to the font list to which an entry will be added. font Specifies a pointer to a font stru...
XmFontListAppendEntry creates a new font list that contains the contents of oldlist. This function copies the contents of the font list entry being added into this new font list. If oldlist is NULL, XmFontListAppendEntry creates a new font list containing only the single entry specified. This function deallocates the original font list after extracting the required information. The caller must free the font list entry by using XmFontListEntryFree. oldlistSpecifies the font list to be added to en...
XmFontListCreate creates a new font list with a single element specified by the provided font and character set. It also allocates the space for the font list. Note: This function is obsolete and exists for compatibility with previous releases. It is replaced by XmFontListAppendEntry. font Specifies a pointer to a font structure for which the new font list is generated. This is the structure returned by the XLib XLoadQueryFont function. charsetSpecifies the character set identifier for the font....
XmFontListEntryCreate creates a font list entry that contains either a font or font set and is identified by a tag. tag Specifies a NULL terminated string for the tag of the font list entry. The tag may be specified as XmFONTLIST_DEFAULT_TAG, which is used to identify the default font list element in a font list. type Specifies whether the font argument is a font structure or a font set. Valid values are XmFONT_IS_FONT and XmFONT_IS_FONTSET. font Specifies either an XFontSet returned by XCreateF...
XmFontListEntryFree recovers memory used by a font list entry. This routine does not free the XFontSet or XFontStruct associated with the font list entry. entry Specifies the font list entry to be freed
XmFontListEntryGetFont retrieves font information for a specified font list entry. If the font list entry contains a font, type_return returns XmFONT_IS_FONT and the function returns a pointer to an XFontStruct. If the font list entry contains a font set, type_return returns XmFONT_IS_FONTSET and the function returns the XFontSet. entry Specifies the font list entry. type_return Specifies a pointer to the type of the font element for the current entry. Valid values are XmFONT_IS_FONT and XmFONT_...
XmFontListEntryGetTag retrieves a copy of the tag of the specified font list entry. This routine allocates memory for the tag string that must be freed by the application. entry Specifies the font list entry
XmFontListEntryLoad loads a font or creates a font set based on the value of the type argument. It creates and returns a font list entry that contains the font or font set and the specified tag. If the value of type is XmFONT_IS_FONT, the function uses the XtCvtStringToFontStruct routine to convert the value of font_name to a font struct. If the value of type is XmFONT_IS_FONTSET, the function uses the XtCvtStringToFontSet converter to create a font set in the current locale. XmFontListEntryLoad...
XmFontListFree recovers memory used by a font list. This routine does not free the XFontSet or XFontStruct associated with the specified font list. list Specifies the font list to be freed
XmFontListFreeFontContext instructs the toolkit that the context is no longer needed and will not be used without reinitialization. contextSpecifies the font list context structure that was allocated by the XmFontListInitFontContext function
XmFontListGetNextFont accesses the character set and font for the next entry of the font list. The application first uses the XmFontListInitFontContext routine to create a font list context. The application then calls XmFontListGetNextFont repeatedly with the same context. Each succeeding call accesses the next element of the font list. When finished, the application calls XmFontListFreeFontContext to free the allocated font list context. This routine allocates memory for the character set strin...
XmFontListInitFontContext establishes a context to allow applications to access the contents of a font list. This context is used when reading the font list entry tag, font, or font set associated with each entry in the font list. A Boolean status is returned to indicate whether or not the font list is valid. contextSpecifies a pointer to the allocated context fontlist Specifies the font list
XmFontListNextEntry returns the next entry in the font list. The application uses the XmFontListInitFontContext routine to create a font list context. The first call to XmFontListNextEntry sets the context to the first entry in the font list. The application then calls XmFontListNextEntry repeatedly with the same context. Each succeeding call accesses the next entry of the font list. When finished, the application calls XmFontListFreeFontContext to free the allocated font list context. contextSp...
XmFontListRemoveEntry creates a new font list that contains the contents of oldlist minus those entries specified in entry. The routine removes any entries from oldlist that match the components (tag, type font/font set) of the specified entry. The function deallocates the original font list after extracting the required information. The caller uses XmFontListEntryFree to recover memory allocated for the specified entry. This routine does not free the XFontSet or XFontStruct associated with the ...
Form is a container widget with no input semantics of its own. Constraints are placed on children of the Form to define attachments for each of the child's four sides. These attachments can be to the Form, to another child widget or gadget, to a relative position within the Form, or to the initial position of the child. The attachments determine the layout behavior of the Form when resizing occurs. The default value for XmNinitialFocus is the value of XmNdefaultButton. Following are some import...
Frame is a very simple manager used to enclose a single work area child in a border drawn by Frame. It uses the Manager class resources for border drawing and performs geometry management so that its size always matches its child's outer size plus the Frame's margins and shadow thickness. Frame is most often used to enclose other managers when the application developer desires the manager to have the same border appearance as the primitive widgets. Frame can also be used to enclose primitive w...
Gadget is a widget class used as a supporting superclass for other gadget classes. It handles shadow-border drawing and highlighting, traversal activation and deactivation, and various callback lists needed by gadgets. The color and pixmap resources defined by XmManager are directly used by gadgets. If XtSetValues is used to change one of the resources for a manager widget, all of the gadget children within the manager also change. Classes Gadget inherits behavior and resources from Object and R...
XmGetAtomName returns the string representation for an atom. It mirrors the Xlib interfaces for atom management but provides client-side caching. When and where caching is provided in Xlib, the routines will become pseudonyms for the Xlib routines. displaySpecifies the connection to the X server atom Specifies the atom for the property name you want returned
XmGetColors takes a screen, a colormap, and a background pixel, and it returns pixel values for foreground, select, and shadow colors. screen Specifies the screen for which these colors should be allocated colormap Specifies the colormap from which these colors should be allocated background Specifies the background on which the colors should be based foreground Specifies a pointer to the returned foreground pixel value. If this argument is NULL no value is allocated or returned for this color. ...
XmGetDestination returns the widget that is the current destination on the specified display. The destination is generally the last editable widget on which a select, edit, insert, or paste operation was performed and is the destination for quick paste and certain clipboard functions. The destination is NULL if the application makes this call before any of the specified operations have been performed on an editable widget. displaySpecifies the display whose destination widget is to be queried...
XmGetDragContext returns the widget ID of the active DragContext associated with a given display and timestamp. A timestamp uniquely identifies which DragContext is active when more than one drag and drop transaction has been initiated on a display. If the specified timestamp matches a timestamp processed between the start and finish of a single drag and drop transaction, the function returns the corresponding DragContext ID. refwidget Specifies the ID of the widget that the routine uses to iden...
XmGetFocusWidget examines the hierarchy that contains the specified widget and returns the ID of the widget that has keyboard focus. The function extracts the widget ID from the associated Shell widget; therefore the specified widget can be located anywhere in the hierarchy. widget Specifies a widget ID within a given hierarchy
XmGetMenuCursor queries the menu cursor currently being used by this client on the specified display and returns the cursor ID. This function returns the menu cursor for the default screen of the display. XmGetMenuCursor is obsolete and exists for compatibility with previous releases. Instead of using this function, call XtGetValues for the XmScreen resource XmNmenuCursor. displaySpecifies the display whose menu cursor is to be queried...
XmGetPixmap uses the parameter data to perform a lookup in the pixmap cache to see if a pixmap has already been generated that matches the data. If one is found, a reference count is incremented and the pixmap is returned. Applications should use XmDestroyPixmap when the pixmap is no longer needed. If a pixmap is not found, image_name is used to perform a lookup in the image cache. If an image is found, it is used to generate the pixmap, which is then cached and returned. If an image is not foun...
XmGetPixmapByDepth uses the parameter data to perform a lookup in the pixmap cache to see if a pixmap has already been generated that matches the data. If one is found, a reference count is incremented and the pixmap is returned. Applications should use XmDestroyPixmap when the pixmap is no longer needed. If a matching pixmap is not found, image_name is used to perform a lookup in the image cache. If an image is found, it is used to generate the pixmap, which is then cached and returned. If an i...
XmGetPostedFromWidget returns the widget from which a menu was posted. For torn-off menus, this function returns the widget from which the menu was originally torn. An application can use this routine during the activate callback to determine the context in which the menu callback should be interpreted. menu Specifies the widget ID of the menu For a complete definition of RowColumn and its associated resources, see XmRowColumn(3X)....
Some Motif widget classes (such as Gadget, Text, and VendorShell) have resources that are not accessible via the functions XtGetResourceList and XtGetConstraintResourceList. In order to retrieve the descriptions of these resources, an application must use XmGetSecondaryResourceData. When a widget class has such resources, this function provides descriptions of the resources in one or more data structures. XmGetSecondaryResourceData takes a widget class argument and returns the number of these da...
XmGetTearOffControl provides the application with the means for obtaining the widget ID of the internally created tearoff control in a tear-off menu. RowColumn creates a tear-off control for a PulldownMenu or PopupMenu when the XmNtearOffModel resource is initialized or set to XmTEAR_OFF_ENABLED. The tear-off control is a widget that appears as the first element in the menu. The user tears off the menu by means of mouse or keyboard events in the tear-off control. The tear-off control has Separat...
XmGetXmDisplay returns the XmDisplay object ID associated with a display. The application can access Display resources by using XtGetValues. displaySpecifies the display for which the XmDisplay object ID is to be returned For a complete definition of Display and its associated resources, see XmDisplay(3X).
XmGetXmScreen returns the XmScreen object ID associated with a screen. The application can access and manipulate Screen resources by using XtGetValues and XtSetValues. screen Specifies the screen for which the XmScreen ID is to be returned For a complete definition of Screen and its associated resources, see XmScreen(3X).
XmInstallImage stores an image in an image cache that can later be used to generate a pixmap. Part of the installation process is to extend the resource converter used to reference these images. The resource converter is given the image name so that the image can be referenced in a .Xdefaults file. Since an image can be referenced by a widget through its pixmap resources, it is up to the application to ensure that the image is installed before the widget is created. image Points to the image str...
XmInternAtom returns an atom for a given name. It mirrors the Xlib interfaces for atom management, but provides client-side caching. When and where caching is provided in Xlib, the routines will become pseudonyms for the Xlib routines. display Specifies the connection to the X server name Specifies the name associated with the atom you want returned only_if_exists Specifies a Boolean value that indicates whether XInternAtom creates the atom...
XmIsMotifWMRunning lets a user know whether the Motif Window Manager is running on a screen that contains a specific widget hierarchy. This function first sees whether the _MOTIF_WM_INFO property is present on the root window of the shell's screen. If it is, its window field is used to query for the presence of the specified window as a child of root. shell Specifies the shell whose screen will be tested for mwm's presence....
XmIsTraversable determines whether the specified widget is eligible to receive focus through keyboard traversal. In general, a widget is eligible to receive focus when all of the following conditions are true: o The widget and its ancestors are not being destroyed, are sensitive, and have a value of True for XmNtraversalOn. o The widget and its ancestors are realized, managed, and (except for gadgets) mapped. o Some part of the widget's rectangular area is unobscured by the widget's ancestors,...
Label is an instantiable widget and is also used as a superclass for other button widgets, such as PushButton and ToggleButton. The Label widget does not accept any button or key input, and the help callback is the only callback defined. Label also receives enter and leave events. Label can contain either text or a pixmap. Label text is a compound string. Refer to the OSF/Motif Programmer's Guide for more information on compound strings. The text can be multilingual, multiline, and/or multifont...
LabelGadget is an instantiable widget and is also used as a superclass for other button gadgets, such as PushButtonGadget and ToggleButtonGadget. LabelGadget can contain either text or a pixmap. LabelGadget text is a compound string. Refer to the OSF/Motif Programmer's Guide for more information on compound strings. The text can be multilingual, multiline, and/or multifont. When a LabelGadget is insensitive, its text is stippled, or the user-supplied insensitive pixmap is displayed. LabelGadget...
List allows a user to select one or more items from a group of choices. Items are selected from the list in a variety of ways, using both the pointer and the keyboard. List operates on an array of compound strings that are defined by the application. Each compound string becomes an item in the List, with the first compound string becoming the item in position 1, the second becoming the item in position 2, and so on. The size of the List is set by specifying the number of items that are visible. ...
XmListAddItem adds an item to the list at the given position. When the item is inserted into the list, it is compared with the current XmNselectedItems list. If the new item matches an item on the selected list, it appears selected. widget Specifies the ID of the List to which an item is added. item Specifies the item to be added to the list. position Specifies the position of the new item in the list. A value of 1 makes the new item the first item in the list; a value of 2 makes it the second i...
XmListAddItems adds the specified items to the list at the given position. The first item_count items of the items array are added to the list. When the items are inserted into the list, they are compared with the current XmNselectedItems list. If any of the new items matches an item on the selected list, it appears selected. widget Specifies the ID of the List to which an item is added. items Specifies a pointer to the items to be added to the list. item_count Specifies the number of items in i...
XmListAddItemsUnselected adds the specified items to the list at the given position. The inserted items remain unselected, even if they currently appear in the XmNselectedItems list. widget Specifies the ID of the List widget to add items to. items Specifies a pointer to the items to be added to the list. item_count Specifies the number of elements in items. This number must be non-negative. position Specifies the position of the first new item in the list. A value of 1 makes the first new item ...
XmListAddItemUnselected adds an item to the list at the given position. The item does not appear selected, even if it matches an item in the current XmNselectedItems list. widget Specifies the ID of the List from whose list an item is added. item Specifies the item to be added to the list. position Specifies the position of the new item in the list. A value of 1 makes the new item the first item in the list; a value of 2 makes it the second item; and so on. A value of 0 makes the new item the la...
XmListDeleteAllItems deletes all items from the list. widget Specifies the ID of the List from whose list the items are deleted For a complete definition of List and its associated resources, see XmList(3X).
XmListDeleteItem deletes the first item in the list that matches item. A warning message appears if the item does not exist. widget Specifies the ID of the List from whose list an item is deleted item Specifies the text of the item to be deleted from the list For a complete definition of List and its associated resources, see XmList(3X).
XmListDeleteItems deletes the specified items from the list. For each element of items, the first item in the list that matches that element is deleted. A warning message appears if any of the items do not exist. widget Specifies the ID of the List from whose list an item is deleted items Specifies a pointer to items to be deleted from the list item_count Specifies the number of elements in items This number must be non-negative. For a complete definition of List and its associated resources, se...
XmListDeleteItemsPos deletes the specified number of items from the list starting at the specified position. widget Specifies the ID of the List from whose list an item is deleted. item_count Specifies the number of items to be deleted. This number must be non-negative. position Specifies the position in the list of the first item to be deleted. A value of 1 indicates that the first deleted item is the first item in the list; a value of 2 indicates that it is the second item; and so on. For a co...
XmListDeletePos deletes an item at a specified position. A warning message appears if the position does not exist. widget Specifies the ID of the List from which an item is to be deleted. position Specifies the position of the item to be deleted. A value of 1 indicates that the first item in the list is deleted; a value of 2 indicates that the second item is deleted; and so on. A value of 0 indicates that the last item in the list is deleted. For a complete definition of List and its associated ...
XmListDeletePositions deletes noncontiguous items from a list. The function deletes all items whose corresponding positions appear in the position_list array. A warning message is displayed if a specified position is invalid; that is, the value is 0, a negative integer, or a number greater than the number of items in the list. widget Specifies the ID of the List widget position_list Specifies an array of the item positions to be deleted. The position of the first item in the list is 1; the posit...
XmListDeselectAllItems unhighlights and removes all items from the selected list. widget Specifies the ID of the List widget from whose list all selected items are deselected For a complete definition of List and its associated resources, see XmList(3X).
XmListDeselectItem unhighlights and removes from the selected list the first item in the list that matches item. widget Specifies the ID of the List from whose list an item is deselected item Specifies the item to be deselected from the list For a complete definition of List and its associated resources, see XmList(3X).
XmListDeselectPos unhighlights the item at the specified position and deletes it from the list of selected items. widget Specifies the ID of the List widget position Specifies the position of the item to be deselected. A value of 1 indicates that the first item in the list is deselected; a value of 2 indicates that the second item is deselected; and so on. A value of 0 indicates that the last item in the list is deselected. For a complete definition of List and its associated resources, see XmLi...
XmListGetKbdItemPos returns the position of the list item at the location cursor. widget Specifies the ID of the List widget For a complete definition of List and its associated resources, see XmList(3X).
XmListGetMatchPos is a Boolean function that returns an array of positions where a specified item is found in a List. widget Specifies the ID of the List widget. item Specifies the item to search for. position_list Returns an array of positions at which the item occurs in the List. The position of the first item in the list is 1; the position of the second item is 2; and so on. When the return value is TRUE, XmListGetMatchPos allocates memory for this array. The caller is responsible for freeing...
XmListGetSelectedPos is a Boolean function that returns an array of the positions of the selected items in a List. widget Specifies the ID of the List widget. position_list Returns an array of the positions of the selected items in the List. The position of the first item in the list is 1; the position of the second item is 2; and so on. When the return value is TRUE, XmListGetSelectedPos allocates memory for this array. The caller is responsible for freeing this memory. position_count Returns t...
XmListItemExists is a Boolean function that checks if a specified item is present in the list. widget Specifies the ID of the List widget item Specifies the item whose presence is checked For a complete definition of List and its associated resources, see XmList(3X).
XmListItemPos returns the position of the first instance of the specified item in a List. widget Specifies the ID of the List widget item Specifies the item whose position is returned For a complete definition of List and its associated resources, see XmList(3X).
XmPosSelected determines if the list item at the specified position is selected or not. widget Specifies the ID of the List widget position Specifies the position of the list item. A value of 1 indicates the first item in the list; a value of 2 indicates the second item; and so on. A value of 0 specifies the last item in the list. For a complete definition of List and its associated resources, see XmList(3X)....
XmListPosToBounds returns the coordinates of an item within a list and the dimensions of its bounding box. The function returns the associated x and y coordinates of the upper left corner of the bounding box relative to the upper left corner of the List widget, as well as the width and the height of the box. The caller can pass a NULL value for the x, y, width, or height parameters to indicate that the return value for that parameter is not requested. widget Specifies the ID of the List widget. ...
XmListReplaceItems replaces each specified item of the list with a corresponding new item. When the items are inserted into the list, they are compared with the current XmNselectedItems list. If any of the new items matches an item on the selected list, it appears selected. widget Specifies the ID of the List widget old_items Specifies the items to be replaced item_count Specifies the number of items in old_items and new_items This number must be non-negative. new_items Specifies the replacement...
XmListReplaceItemsPos replaces the specified number of items of the List with new items, starting at the specified position in the List. When the items are inserted into the list, they are compared with the current XmNselectedItems list. If any of the new items matches an item on the selected list, it appears selected. widget Specifies the ID of the List widget. new_items Specifies the replacement items. item_count Specifies the number of items in new_items and the number of items in the list to...
XmListReplaceItemsPosUnselected replaces the specified number of items in the list with new items, starting at the given position. The replacement items remain unselected, even if they currently appear in the XmNselectedItems list. widget Specifies the ID of the List widget to replace items in. new_items Specifies a pointer to the replacement items. item_count Specifies the number of elements in new_items and the number of items in the list to replace. This number must be non-negative. position ...
XmListReplaceItemsUnselected replaces each specified item in the list with a corresponding new item. The replacement items remain unselected, even if they currently appear in the XmNselectedItems list. widget Specifies the ID of the List widget to replace items in. old_items Specifies a pointer to the list items to be replaced. item_count Specifies the number of elements in old_items and new_items. This number must be non-negative. new_items Specifies a pointer to the replacement items. Every oc...
XmListReplacePositions replaces noncontiguous items in a list. The item at each position specified in position_list is replaced with the corresponding entry in item_list. When the items are inserted into the list, they are compared with the current XmNselectedItems list. Any of the new items that match items on the selected list appears selected. A warning message is displayed if a specified position is invalid; that is, the value is 0, a negative integer, or a number greater than the number of ...
XmListSelectItem highlights and adds to the selected list the first item in the list that matches item. widget Specifies the ID of the List widget from whose list an item is selected item Specifies the item to be selected in the List widget notify Specifies a Boolean value that when True invokes the selection callback for the current mode. From an application interface view, calling this function with notify True is indistinguishable from a userinitiated selection action. For a complete definiti...
XmListSelectPos highlights a List item at the specified position and adds it to the list of selected items. widget Specifies the ID of the List widget. position Specifies the position of the item to be selected. A value of 1 indicates that the first item in the list is selected; a value of 2 indicates that the second item is selected; and so on. A value of 0 indicates that the last item in the list is selected. notify Specifies a Boolean value that when True invokes the selection callback for th...
XmListSetAddMode allows applications control over Add Mode in the extended selection model. widget Specifies the ID of the List widget state Specifies whether to activate or deactivate Add Mode. If state is True, Add Mode is activated. If state is False, Add Mode is deactivated. For a complete definition of List and its associated resources, see XmList(3X).
XmListSetBottomItem makes the first item in the list that matches item the last visible item in the list. widget Specifies the ID of the List widget from whose list an item is made the last visible item Specifies the item For a complete definition of List and its associated resources, see XmList(3X).
XmListSetBottomPos makes the item at the specified position the last visible item in the List. widget Specifies the ID of the List widget. position Specifies the position of the item to be made the last visible item in the list. A value of 1 indicates that the first item in the list is the last visible item; a value of 2 indicates that the second item is the last visible item; and so on. A value of 0 indicates that the last item in the list is the last visible item. For a complete definition of ...
XmListSetHorizPos sets the XmNvalue resource of the horizontal ScrollBar to the specified position and updates the visible portion of the list with the new value if the List widget's XmNlistSizePolicy is set to XmCONSTANT or XmRESIZE_IF_POSSIBLE and the horizontal ScrollBar is currently visible. This is equivalent to moving the horizontal ScrollBar to the specified position. widget Specifies the ID of the List widget position Specifies the horizontal position For a complete definition of List a...
XmListSetItem makes the first item in the list that matches item the first visible item in the list. widget Specifies the ID of the List widget from whose list an item is made the first visible item Specifies the item For a complete definition of List and its associated resources, see XmList(3X).
XmListSetKbdItemPos sets the location cursor at the item specified by position. This function does not determine if the item at the specified position is selected or not. widget Specifies the ID of the List widget. position Specifies the position of the item at which the location cursor is set. A value of 1 indicates the first item in the list; a value of 2 indicates the second item; and so on. A value of 0 sets the location cursor at the last item in the list. For a complete definition of List ...
XmListSetPos makes the item at the given position the first visible position in the List. widget Specifies the ID of the List widget. position Specifies the position of the item to be made the first visible item in the list. A value of 1 indicates that the first item in the list is the first visible item; a value of 2 indicates that the second item is the first visible item; and so on. A value of 0 indicates that the last item in the list is the first visible item. For a complete definition of L...
XmListUpdateSelectedList frees the contents of the current XmNselectedItems list. The routine traverses the XmNitems list and adds each currently selected item to the XmNselectedItems list. For each selected item, there is a corresponding entry in the updated XmNselectedItems list. widget Specifies the ID of the List widget to update For a complete definition of List and its associated resources, see XmList(3X)....
XmListYToPos returns the position of the item at the given y coordinate within the list. widget Specifies the ID of the List widget y Specifies the y coordinate in the list's coordinate system For a complete definition of List and its associated resources, see XmList(3X).
MainWindow provides a standard layout for the primary window of an application. This layout includes a MenuBar, a CommandWindow, a work region, a MessageWindow, and ScrollBars. Any or all of these areas are optional. The work region and ScrollBars in the MainWindow behave identically to the work region and ScrollBars in the ScrolledWindow widget. The user can think of the MainWindow as an extended ScrolledWindow with an optional MenuBar and optional CommandWindow and MessageWindow. In a fully-lo...
XmMainWindowSep1 returns the widget ID of the first Separator widget in the MainWindow. The first Separator widget is located between the MenuBar and the Command widget. This Separator is visible only when XmNshowSeparator is True. widget Specifies the MainWindow widget ID For a complete definition of MainWindow and its associated resources, see XmMainWindow(3X).
XmMainWindowSep2 returns the widget ID of the second Separator widget in the MainWindow. The second Separator widget is located between the Command widget and the ScrolledWindow. This Separator is visible only when XmNshowSeparator is True. widget Specifies the MainWindow widget ID For a complete definition of MainWindow and its associated resources, see XmMainWindow(3X).
XmMainWindowSep3 returns the widget ID of the third Separator widget in the MainWindow. The third Separator widget is located between the message window and the widget above it. This Separator is visible only when XmNshowSeparator is True. widget Specifies the MainWindow widget ID For a complete definition of MainWindow and its associated resources, see XmMainWindow(3X).
XmMainWindowSetAreas identifies which of the valid children for each area (such as the MenuBar and work region) are to be actively managed by MainWindow. This function also sets up or adds the MenuBar, work window, command window, and ScrollBar widgets to the application's main window widget. Each area is optional; therefore, the user can pass NULL to one or more of the following arguments. The window manager provides the title bar. widget Specifies the MainWindow widget ID. menu_bar Specifies ...
Manager is a widget class used as a supporting superclass for other widget classes. It supports the visual resources, graphics contexts, and traversal resources necessary for the graphics and traversal mechanisms. Classes Manager inherits behavior and resources from Core, Composite, and Constraint classes. The class pointer is xmManagerWidgetClass. The class name is XmManager. New Resources The following table defines a set of widget resources used by the programmer to specify data. The programm...
XmMapSegmentEncoding searches the segment encoding registry for an entry that matches the specified font list tag and returns a copy of the associated compound text encoding format. The application is responsible for freeing the storage associated with the returned data by calling XtFree. fontlist_tag Specifies the compound string font list tag
XmMenuPosition positions a Popup MenuPane using the information in the specified event. Unless an application is positioning the MenuPane itself, it must first invoke this function before managing the PopupMenu. The x_root and y_root values in the specified event are used to determine the menu position. menu Specifies the PopupMenu to be positioned event Specifies the event passed to the action procedure which manages the PopupMenu For a complete definition of RowColumn and its associated resour...
The MenuShell widget is a custom OverrideShell widget. An OverrideShell widget bypasses mwm when displaying itself. It is designed specifically to contain Popup or Pulldown MenuPanes. Most application writers never encounter this widget if they use the menu-system convenience functions, XmCreatePopupMenu or XmCreatePulldown Menu, to create a Popup or Pulldown MenuPane. The convenience functions automatically create a MenuShell widget as the parent of the MenuPane. However, if the convenience fun...
MessageBox is a dialog class used for creating simple message dialogs. Convenience dialogs based on MessageBox are provided for several common interaction tasks, which include giving information, asking questions, and reporting errors. A MessageBox dialog is typically transient in nature, displayed for the duration of a single interaction. MessageBox is a subclass of XmBulletinBoard and depends on it for much of its general dialog behavior. The default value for XmNinitialFocus is the value of X...
XmMessageBoxGetChild is used to access a component within a MessageBox. The parameters given to the function are the MessageBox widget and a value indicating which component to access. widget Specifies the MessageBox widget ID. child Specifies a component within the MessageBox. The following are legal values for this parameter: o XmDIALOG_CANCEL_BUTTON o XmDIALOG_DEFAULT_BUTTON o XmDIALOG_HELP_BUTTON o XmDIALOG_MESSAGE_LABEL o XmDIALOG_OK_BUTTON o XmDIALOG_SEPARATOR o XmDIALOG_SYMBOL_LABEL For a...
XmOptionButtonGadget provides the application with the means for obtaining the widget ID for the internally created CascadeButtonGadget. Once the application has obtained the widget ID, it can adjust the visuals for the CascadeButtonGadget, if desired. When an application creates an instance of the OptionMenu widget, the widget creates two internal gadgets. One is a LabelGadget that is used to display RowColumn's XmNlabelString resource. The other is a CascadeButtonGadget that displays the curr...
XmOptionLabelGadget provides the application with the means for obtaining the widget ID for the internally created LabelGadget. Once the application has obtained the widget ID, it can adjust the visuals for the LabelGadget, if desired. When an application creates an instance of the OptionMenu widget, the widget creates two internal gadgets. One is a LabelGadget that is used to display RowColumn's XmNlabelString resource. The other is a CascadeButtonGadget that displays the current selection and...
PanedWindow is a composite widget that lays out children in a vertically tiled format. Children appear in top-to-bottom fashion, with the first child inserted appearing at the top of the PanedWindow and the last child inserted appearing at the bottom. The PanedWindow grows to match the width of its widest child and all other children are forced to this width. The height of the PanedWindow is equal to the sum of the heights of all its children, the spacing between them, and the size of the top an...
Primitive is a widget class used as a supporting superclass for other widget classes. It handles border drawing and highlighting, traversal activation and deactivation, and various callback lists needed by Primitive widgets. Classes Primitive inherits behavior and resources from Core class. The class pointer is xmPrimitiveWidgetClass. The class name is XmPrimitive. New Resources The following table defines a set of widget resources used by the programmer to specify data. The programmer can also ...
XmProcessTraversal determines which component of a hierarchy receives keyboard events when the hierarchy that contains the given widget has keyboard focus. Using XmProcessTraversal to traverse to MenuBars, Pulldown MenuPanes, or Popup MenuPanes is not supported. widget Specifies the widget ID of the widget whose hierarchy is to be traversed. The hierarchy is only traversed up to the top of the shell. If that shell does not currently have the focus, any changes to the element with focus within th...
PushButton issues commands within an application. It consists of a text label or pixmap surrounded by a border shadow. When a PushButton is selected, the shadow changes to give the appearance that it has been pressed in. When a PushButton is unselected, the shadow changes to give the appearance that it is out. The default behavior associated with a PushButton in a menu depends on the type of menu system in which it resides. By default, BSelect controls the behavior of the PushButton. In addition...
PushButtonGadget issues commands within an application. It consists of a text label or pixmap surrounded by a border shadow. When PushButtonGadget is selected, the shadow changes to give the appearance that the PushButtonGadget has been pressed in. When PushButtonGadget is unselected, the shadow changes to give the appearance that the PushButtonGadget is out. The default behavior associated with a PushButtonGadget in a menu depends on the type of menu system in which it resides. By default, BSel...
XmRegisterSegmentEncoding registers a compound text encoding format with the specified font list element tag. The XmCvtXmStringToCT function uses this registry to map the font list tags of compound string segments to compound text encoding formats. Registering a font list tag that already exists in the registry overwrites the original entry. You can unregister a font list tag by passing a NULL value for the ct_encoding parameter. fontlist_tag Specifies the font list element tag to be registered....
XmRemoveProtocolCallback removes a callback from the internal list. XmRemoveWMProtocolCallback is a convenience interface. It calls XmRemoveProtocolCallback with the property value set to the atom returned by interning WM_PROTOCOLS. shell Specifies the widget with which the protocol property is associated property Specifies the protocol property protocol Specifies the protocol atom (or an int cast to Atom) callback Specifies the procedure to call when a protocol message is received closureSpecif...
XmRemoveProtocols removes the protocols from the protocol manager and deallocates the internal tables. If any of the protocols are active, it will update the handlers and update the property if shell is realized. XmRemoveWMProtocols is a convenience interface. It calls XmRemoveProtocols with the property value set to the atom returned by interning WM_PROTOCOLS. shell Specifies the widget with which the protocol property is associated property Specifies the protocol property protocols Specifies t...
This function is obsolete and its behavior is replaced by setting XmNnavigationType to XmNONE. XmRemoveTabGroup removes a widget from the list of tab groups associated with a particular widget hierarchy and sets the widget's XmNnavigationType to XmNONE. tab_group Specifies the widget ID
XmRemoveWMProtocolCallback is a convenience interface. It calls XmRemoveProtocolCallback with the property value set to the atom returned by interning WM_PROTOCOLS. shell Specifies the widget with which the protocol property is associated protocol Specifies the protocol atom (or an int type cast to Atom) callback Specifies the procedure to call when a protocol message is received closureSpecifies the client data to be passed to the callback when it is invoked For a complete definition of VendorS...
XmRemoveWMProtocols is a convenience interface. It calls XmRemoveProtocols with the property value set to the atom returned by interning WM_PROTOCOLS. shell Specifies the widget with which the protocol property is associated protocols Specifies the protocol atoms (or ints cast to Atom) num_protocols Specifies the number of elements in protocols For a complete definition of VendorShell and its associated resources, see VendorShell(3X)....
XmRepTypeAddReverse installs the reverse converter for a previously registered representation type. The reverse converter takes a numerical representation type value and returns its corresponding string value. Certain applications may require this capability to obtain a string value to display on a screen or to build a resource file. The values argument of the XmRepTypeRegister function can be used to register representation types with nonconsecutive values or with duplicate names for the same v...
XmRepTypeGetId searches the registration list for the specified representation type and returns the associated identification number. rep_type Specifies the representation type for which an identification number is requested
XmRepTypeGetNameList generates a null-terminated list of the value names associated with the specified representation type. Each value name is a null-terminated string. This routine allocates memory for the returned data. The application must free this memory using XtFree. rep_type_id Specifies the identification number of the representation type. use_uppercase_format Specifies a Boolean value that controls the format of the name list. If True, each value name is in uppercase characters prefixed...
XmRepTypeGetRecord retrieves information about a particular representation type that is registered with the representation type manager. This routine allocates memory for the returned data. The application must free this memory using XtFree. rep_type_id The identification number of the representation type The representation type entry structure contains the following information: typedef struct { String rep_type_name; ; String *value_value_names; ; unsigned char*values; values; ; unsigned charnu...
XmRepTypeGetRegistered retrieves information about all representation types that are registered with the representation type manager. The registration list is an array of structures, each of which contains information for a representation type entry. The end of the registration list is marked with a representation type entry whose rep_type_name field has a NULL pointer. This routine allocates memory for the returned data. The application must free this memory using XtFree. The representation typ...
XmRepTypeInstallTearOffModelConverter installs the resource converter that allows values for the XmNtearOffModel resource to be specified in resource default files.
XmRepTypeRegister registers a representation type resource with the representation type manager. All features of the representation type management facility become available for the specified representation type. The function installs a forward type converter to convert string values to numerical representation type values. Note that the numerical representation type values have type (unsigned char). When the values argument is NULL, consecutive numerical values are assumed. The order of the str...
XmRepTypeValidValue tests the validity of a numerical value for a given representation type resource. The function generates a default warning message if the value is invalid and the enable_default_warning argument is non-NULL. rep_type_id Specifies the identification number of the representation type. test_value Specifies the numerical value to test. enable_default_warning Specifies the ID of the widget that contains a default warning message. If this parameter is NULL, no default warning messa...
The use of offset records requires two extra global variables per widget class. The variables consist of pointers to arrays of offsets into the widget record and constraint record for each part of the widget structure. The XmResolveAllPartOffsets function allocates the offset records needed by an application to guarantee upwardcompatible access to widget instance and constraint records by applications and widgets. These offset records are used by the widget to access all of the widget's variabl...
The use of offset records requires one extra global variable per widget class. The variable consists of a pointer to an array of offsets into the widget record for each part of the widget structure. The XmResolvePartOffsets function allocates the offset records needed by an application to guarantee upward-compatible access to widget instance records by applications and widgets. These offset records are used by the widget to access all of the widget's variables. A widget needs to take the follow...
The RowColumn widget is a general purpose RowColumn manager capable of containing any widget type as a child. In general, it requires no special knowledge about how its children function and provides nothing beyond support for several different layout styles. However, it can be configured as a menu, in which case, it expects only certain children, and it configures to a particular layout. The menus supported are: MenuBar, Pulldown or Popup MenuPanes, and OptionMenu. The type of layout performed ...
Scale is used by an application to indicate a value from within a range of values, and it allows the user to input or modify a value from the same range. A Scale has an elongated rectangular region similar to a ScrollBar. A slider inside this region indicates the current value along the Scale. The user can also modify the Scale's value by moving the slider within the rectangular region of the Scale. A Scale can also include a label set located outside the Scale region. These can indicate the re...
XmScaleGetValue returns the current slider position value displayed in the scale. widget Specifies the Scale widget ID value_return Returns the current slider position value For a complete definition of Scale and its associated resources, see XmScale(3X).
XmScaleSetValue sets the slider value within the Scale widget. widget Specifies the Scale widget ID. value Specifies the slider position along the scale. This sets the XmNvalue resource. For a complete definition of Scale and its associated resources, see XmScale(3X).
The XmScreen object is used by Motif widgets to store information that is specific to a screen. It also allows the toolkit to store certain information on widget hierarchies that would otherwise be unavailable. Each client has one XmScreen object for each screen that it accesses. An XmScreen object is automatically created when the application creates the first shell on a screen (usually accomplished by a call to XtAppInitialize or XtAppCreateShell). It is not necessary to create an XmScreen obj...
The ScrollBar widget allows the user to view data that is too large to be displayed all at once. ScrollBars are usually located inside a ScrolledWindow and adjacent to the widget that contains the data to be viewed. When the user interacts with the ScrollBar, the data within the other widget scrolls. A ScrollBar consists of two arrows placed at each end of a rectangle. The rectangle is called the scroll region. A smaller rectangle, called the slider, is placed within the scroll region. The data ...
XmScrollBarGetValues returns the the ScrollBar's increment values. The scroll region is overlaid with a slider bar that is adjusted in size and position using the main ScrollBar or set slider function attributes. widget Specifies the ScrollBar widget ID. value_return Returns the ScrollBar's slider position between the XmNminimum and XmNmaximum resources. slider_size_return Returns the size of the slider as a value between zero and the absolute value of XmNmaximum minus XmNminimum. The size of ...
XmSetScrollBarValues changes the ScrollBar's increment values and the slider's size and position. The scroll region is overlaid with a slider bar that is adjusted in size and position using the main ScrollBar or set slider function attributes. widget Specifies the ScrollBar widget ID. value Specifies the ScrollBar's slider position between XmNminimum and XmNmaximum. The resource name associated with this argument is XmNvalue. slider_size Specifies the size of the slider as a value between zer...
The ScrolledWindow widget combines one or two ScrollBar widgets and a viewing area to implement a visible window onto some other (usually larger) data display. The visible part of the window can be scrolled through the larger display by the use of ScrollBars. To use ScrolledWindow, an application first creates a ScrolledWindow widget, any needed ScrollBar widgets, and a widget capable of displaying any desired data as the work area of ScrolledWindow. ScrolledWindow positions the work area widget...
XmScrolledWindowSetAreas adds or changes a window work region and a horizontal or vertical ScrollBar widget to the ScrolledWindow widget for the application. Each widget is optional and may be passed as NULL. widget Specifies the ScrolledWindow widget ID. horizontal_scrollbar Specifies the ScrollBar widget ID for the horizontal ScrollBar to be associated with the ScrolledWindow widget. Set this ID only after creating an instance of the ScrolledWindow widget. The resource name associated with thi...
XmScrollVisible makes an obscured or partially obscured widget or gadget descendant of a ScrolledWindow work area visible. The function repositions the work area and sets the specified margins between the widget and the nearest viewport boundary. The widget's location relative to the viewport determines whether one or both of the margins must be adjusted. This function requires that the XmNscrollingPolicy of the ScrolledWindow widget be set to XmAUTOMATIC. scrollw_widget Specifies the ID of the...
SelectionBox is a general dialog widget that allows the user to select one item from a list. By default a SelectionBox includes the following: o A scrolling list of alternatives o An editable text field for the selected alternative o Labels for the list and text field o Three or four buttons The default button labels are OK, Cancel, and Help. By default an Apply button is also created; if the parent of the SelectionBox is a DialogShell it is managed, and otherwise it is unmanaged. Additional chi...
XmSelectionBoxGetChild is used to access a component within a SelectionBox. The parameters given to the function are the SelectionBox widget and a value indicating which component to access. widget Specifies the SelectionBox widget ID. child Specifies a component within the SelectionBox. The following are legal values for this parameter: o XmDIALOG_APPLY_BUTTON o XmDIALOG_CANCEL_BUTTON o XmDIALOG_DEFAULT_BUTTON o XmDIALOG_HELP_BUTTON o XmDIALOG_LIST o XmDIALOG_LIST_LABEL o XmDIALOG_OK_BUTTON o X...
Separator is a primitive widget that separates items in a display. Several different line drawing styles are provided, as well as horizontal or vertical orientation. The Separator line drawing is automatically centered within the height of the widget for a horizontal orientation and centered within the width of the widget for a vertical orientation. An XtSetValues with a new XmNseparatorType resizes the widget to its minimal height (for horizontal orientation) or its minimal width (for vertical ...
SeparatorGadget separates items in a display. Several line drawing styles are provided, as well as horizontal or vertical orientation. Lines drawn within the SeparatorGadget are automatically centered within the height of the gadget for a horizontal orientation and centered within the width of the gadget for a vertical orientation. An XtSetValues with a new XmNseparatorType resizes the widget to its minimal height (for horizontal orientation) or its minimal width (for vertical orientation) unles...
XmSetColorCalculation sets the procedure to calculate default colors. This procedure is used to calculate the foreground, top shadow, bottom shadow, and select colors on the basis of a given background color. If called with an argument of NULL, it restores the default procedure used to calculate colors. color_proc Specifies the procedure to use for color calculation. Following is a description of the XmColorProc type used by XmSetColorCalculation: void (*color_color_proc) (background_) (backgrou...
XmSetFontUnit provides an external function to initialize font unit values. Applications may want to specify resolution-independent data based on a global font size. See the XmNunitType resource description in the manual pages for XmGadget, XmManager, and XmPrimitive for more information on resolution independence. This function sets the font units for all screens on the display. XmSetFontUnit is obsolete and exists for compatibility with previous releases. Instead of using this function, provid...
XmSetFontUnits provides an external function to initialize font unit values. Applications may want to specify resolution-independent data based on a global font size. This function must be called before any widgets with resolution-independent data are created. See the XmNunitType resource description in the manual pages for XmGadget, XmManager, and XmPrimitive for more information on resolution independence. This function sets the font units for all screens on the display. XmSetFontUnits is obso...
XmSetMenuCursor programmatically modifies the menu cursor for a client; after the cursor has been created by the client, this function registers the cursor with the menu system. After calling this function, the specified cursor is displayed whenever this client displays a Motif menu on the indicated display. The client can then specify different cursors on different displays. This function sets the menu cursor for all screens on the display. XmSetMenuCursor is obsolete and exists for compatibili...
XmSetProtocolHooks is used by shells that want to have pre and post actions executed when a protocol message is received from MWM. Since there is no guaranteed ordering in execution of event handlers or callback lists, this allows the shell to control the flow while leaving the protocol manager structures opaque. XmSetWMProtocolHooks is a convenience interface. It calls XmSetProtocolHooks with the property value set to the atom returned by interning WM_PROTOCOLS. shell Specifies the widget with ...
XmSetWMProtocolHooks is a convenience interface. It calls XmSetProtocolHooks with the property value set to the atom returned by interning WM_PROTOCOLS. shell Specifies the widget with which the protocol property is associated protocol Specifies the protocol atom (or an int cast to Atom) prehook Specifies the procedure to call before calling entries on the client callback-list pre_closure Specifies the client data to be passed to the prehook when it is invoked posthook Specifies the procedure to...
XmString is the data type for a compound string. Compound strings include one or more segments, each of which may contain a font list element tag, string direction, and text component. When a compound string is displayed, the font list element tag and the direction are used to determine how to display the text. Whenever a font list element tag is set to XmFONTLIST_DEFAULT_TAG the text is handled as a locale text segment. Calling XtGetValues for a resource whose type is XmString yields a copy of ...
XmStringBaseline returns the number of pixels between the top of the character box and the baseline of the first line of text in the provided compound string. fontlist Specifies the font list string Specifies the string
XmStringByteCompare returns a Boolean indicating the results of a byte-by-byte comparison of two compound strings. In general, if two compound strings are created with the same (char *) string using XmStringCreateLocalized in the same language environment, the compound strings compare as equal. If two compound strings are created with the same (char *) string and the same font list element tag set other than XmFONTLIST_DEFAULT_TAG using XmStringCreate, the strings compare as equal. In some cases...
XmStringCompare returns a Boolean value indicating the results of a semantically equivalent comparison of two compound strings. Semantically equivalent means that the strings have the same text components, font list element tags, directions, and separators. In general, if two compound strings are created with the same (char *) string using XmStringCreateLocalized in the same language environment, the compound strings compare as equal. If two compound strings are created with the same (char *) st...
XmStringConcat copies s2 to the end of s1 and returns a copy of the resulting compound string. The original strings are preserved. The space for the resulting compound string is allocated within the function. After using this function, free this space by calling XmStringFree. s1 Specifies the compound string to which a copy of s2 is appended s2 Specifies the compound string that is appended to the end of s1...
XmStringCopy makes a copy of a compound string. The space for the resulting compound string is allocated within the function. The application is responsible for managing the allocated space. The memory can be recovered by calling XmStringFree. s1 Specifies the compound string to be copied
XmStringCreate creates a compound string with two components: text and a font list element tag. text Specifies a null-terminated string to be used as the text component of the compound string. tag Specifies the font list element tag to be associated with the given text. The value XmFONTLIST_DEFAULT_TAG identifies a locale text segment.
XmStringCreateLocalized creates a compound string containing the specified text and assigns XmFONTLIST_DEFAULT_TAG as the font list entry tag. An identical compound string would result from the function XmStringCreate called with XmFONTLIST_DEFAULT_TAG explicitly as the font list entry tag. text Specifies a null-terminated string of text encoded in the current locale to be used as the text component of the compound string...
XmStringCreateLtoR creates a compound string with two components: text and a font list element tag. This function imposes the semantic of scanning for \n characters in the text. When one is found, the text up to that point is put into a segment followed by a separator component. No final separator component is appended to the end of the compound string. The direction defaults to left-to-right. This function assumes that the encoding is single octet rather than double octet per character of text...
XmStringCreateSimple creates a compound string with two components: text and a character set. It derives the character set from the current language environment. The routine attempts to derive a character set from the value of the LANG environment variable. If this does not result in a valid character set, the routine uses a vendorspecific default. If the vendor has not specified a different value, this default is ISO8859-1. NOTE: This routine is obsolete and exists for compatibility with previo...
XmStringDirection is the data type for specifying the direction in which the system displays characters of a string, or characters of a segment of a compound string. This is an enumeration with two possible values: XmSTRING_DIRECTION_L_TO_R Specifies left to right display XmSTRING_DIRECTION_R_TO_L Specifies right to left display
XmStringDirectionCreate creates a compound string with a single component, a direction with the given value. direction Specifies the value of the directional component
XmStringDraw draws a compound string in an X Window. If a compound string segment uses a font list entry that defines a font set, the graphic context passed to this routine will have the GC font member left in an undefined state. The underlying XmbStringDraw function called by this routine modifies the font id field of the GC passed into it and does not attempt to restore the font id to the incoming value. If the compound string segment is not drawn using a font set, the graphic context must con...
XmStringDrawImage draws a compound string in an X Window and paints both the foreground and background bits of each character. If a compound string segment uses a font list entry that defines a font set, the graphic context passed to this routine will have the GC font member left in an undefined state. The underlying XmbStringDraw function called by this routine modifies the font id field of the GC passed into it and does not attempt to restore the font id to the incoming value. If the compound ...
XmStringDrawUnderline draws a compound string in an X Window. If the substring identified by underline can be matched in string, the substring will be underlined. Once a match has occurred, no further matches or underlining will be done. If a compound string segment uses a font list entry that defines a font set, the graphic context passed to this routine will have the GC font member left in an undefined state. The underlying XmbStringDraw function called by this routine modifies the font id fie...
XmStringEmpty returns a Boolean value indicating whether any non-zero length text components exist in the provided compound string. It returns True if there are no text segments in the string. If this routine is passed NULL as the string, it returns True. s1 Specifies the compound string
XmStringExtent determines the width and height, in pixels, of the smallest rectangle that will enclose the provided compound string. fontlist Specifies the font list string Specifies the string width Specifies a pointer to the width of the rectangle height Specifies a pointer to the height of the rectangle
XmStringFreeContext instructs the toolkit that the context is no longer needed and will not be used without reinitialization. contextSpecifies the string context structure that was allocated by the XmStringInitContext function
XmStringGetLtoR searches for a text segment in the input compound string that matches the given font list element tag. This function allocates memory for the returned string. The caller should free it with XtFree(3X). string Specifies the compound string. tag Specifies the font list element tag associated with the text. A value of XmFONTLIST_DEFAULT_TAG identifies a locale text segment. text Specifies a pointer to a null terminated string....
XmStringGetNextComponent returns the type and value of the next component in the compound string identified by context. It is a low-level component function. Components are returned one at a time. On return, only some output parameters will be valid; which ones can be determined by examining the return status. In the case of text, tag, and direction components, only one output parameter is valid. If the return status indicates an unknown component was encountered, the font list element tag, leng...
XmStringGetNextSegment fetches the octets in the next segment; repeated calls fetch sequential segments. The text, tag, and direction of the fetched segment are returned each time. A Boolean status is returned to indicate whether a valid segment was successfully parsed. context Specifies the string context structure which was allocated by the XmStringInitContext function. text Specifies a pointer to a null terminated string. tag Specifies a pointer to the font list element tag associated with th...
XmStringHasSubstring indicates whether or not one compound string is contained within another. string Specifies the compound string to be searched substring Specifies the compound string to be searched for
XmStringHeight returns the height, in pixels, of the sum of all the line heights of the given compound string. Separator components delimit lines. fontlist Specifies the font list string Specifies the string
XmStringInitContext maintains a context to allow applications to read out the contents of a compound string segment by segment. This function establishes the context for this read out. This context is used when reading subsequent segments out of the string. A Boolean status is returned to indicate if the input string could be parsed. contextSpecifies a pointer to the allocated context string Specifies the string....
XmStringLength obtains the length of a compound string. It returns the number of bytes in s1 including all tags, direction indicators, and separators. If the compound string has an invalid structure, zero is returned. s1 Specifies the compound string
XmStringLineCount returns the number of separators plus one in the provided compound string. In effect, it counts the lines of text. string Specifies the string.
XmStringNConcat appends a specified number of bytes from s2 to the end of s1, including tags, directional indicators, and separators. It then returns the resulting compound string. The original strings are preserved. The space for the resulting compound string is allocated within the function. The application is responsible for managing the allocated space. The memory can be recovered by calling XmStringFree. s1 Specifies the compound string to which a copy of s2 is appended. s2 Specifies the co...
XmStringNCopy creates a copy of s1 that contains a specified number of bytes, including tags, directional indicators, and separators. It then returns the resulting compound string. The original strings are preserved. The space for the resulting compound string is allocated within the function. The application is responsible for managing the allocated space. The memory can be recovered by calling XmStringFree. s1 Specifies the compound string. num_bytes Specifies the number of bytes of s1 to copy...
XmStringPeekNextComponent examines the next component that would be fetched by XmStringGetNextComponent and returns the component type. contextSpecifies the string context structure that was allocated by the XmStringInitContext function
XmStringSegmentCreate is a high-level function that assembles a compound string consisting of a font list element tag, a direction component, a text component, and an optional separator component. text Specifies a null-terminated string to be used as the text component of the compound string. tag Specifies the font list element tag to be associated with the text. The value XmFONTLIST_DEFAULT_TAG identifies a locale text segment. direction Specifies the direction of the text. separator Specifies ...
XmStringWidth returns the width, in pixels, of the longest sequence of text components in the provided compound string. Separator components are used to delimit sequences of text components. fontlist Specifies the font list string Specifies the string
XmTargetsAreCompatible determines whether the import targets of the destination match any of the export targets of a source. If there is at least one target in common, the function returns True. displaySpecifies the display connection. export_targets Specifies the list of target atoms associated with the source object. This resource identifies the selection targets the source can convert to. num_export_targets Specifies the number of entries in the list of export targets. import_targets Specifie...
Text provides a single-line and multiline text editor for customizing both user and programmatic interfaces. It can be used for single-line string entry, forms entry with verification procedures, and full-window editing. It provides an application with a consistent editing system for textual data. The screen's textual data adjusts to the application writer's needs. Text provides separate callback lists to verify movement of the insert cursor, modification of the text, and changes in input focu...
XmTextClearSelection clears the primary selection in the Text widget. widget Specifies the Text widget ID. time Specifies the server time at which the selection value is desired. This should be the time of the event which triggered this request. One source of a valid time stamp is the function XtLastTimestampProcessed(). For a complete definition of Text and its associated resources, see XmText(3X)....
XmTextCopy copies the primary selected text to the clipboard. widget Specifies the Text widget ID. time Specifies the server time at which the selection value is to be modified. This should be the time of the event which triggered this request. One source of a valid time stamp is the function XtLastTimestampProcessed(). For a complete definition of Text and its associated resources, see XmText(3X)....
XmTextCut copies the primary selected text to the clipboard and then deletes the primary selected text. This routine calls the widget's XmNvalueChangedCallback and verification callbacks, either XmNmodifyVerifyCallback or XmNmodifyVerifyCallbackWcs, or both. If both verification callback lists are registered, the procedures of the XmNmodifyVerifyCallback list are executed first and the resulting data is passed to the XmNmodifyVerifyCallbackWcs callbacks. widget Specifies the Text widget ID. tim...
XmTextDisableRedisplay prevents redisplay of the specified Text widget even though its visual attributes have been modified. The visual appearance of the widget remains unchanged until XmTextEnableRedisplay is called. This allows an application to make multiple changes to the widget without causing intermediate visual updates. widget Specifies the Text widget ID
XmTextEnableRedisplay is used in conjunction with XmTextDisableRedisplay, which suppresses visual update of the Text widget. When XmTextEnableRedisplay is called, it determines if any visual attributes have been set or modified for the specified widget since XmTextDisableRedisplay was called. If so, it forces the widget to update its visual display for all of the intervening changes. Any subsequent changes that affect visual appearance cause the widget to update its visual display. widget Specif...
TextField widget provides a single line text editor for customizing both user and programmatic interfaces. It is used for single-line string entry, and forms entry with verification procedures. It provides an application with a consistent editing system for textual data. TextField widget provides separate callback lists to verify movement of the insert cursor, modification of the text, and changes in input focus. Each of these callbacks provides the verification function with the widget instance...
XmTextFieldClearSelection clears the primary selection in the TextField widget. widget Specifies the TextField widget ID. time Specifies the time at which the selection value is desired. This should be the time of the event which triggered this request. For a complete definition of TextField and its associated resources, see XmTextField(3X).
XmTextFieldCopy copies the primary selected text to the clipboard. widget Specifies the TextField widget ID. time Specifies the time at which the selection value is to be modified. This should be the time of the event which triggered this request. For a complete definition of TextField and its associated resources, see XmTextField(3X).
XmTextFieldCut copies the primary selected text to the clipboard and then deletes the primary selected text. This routine calls the widget's XmNvalueChangedCallback and verification callbacks, either XmNmodifyVerifyCallback or XmNmodifyVerifyCallbackWcs, or both. If both verification callback lists are registered, the procedures of the XmNmodifyVerifyCallback list are executed first and the resulting data is passed to the XmNmodifyVerifyCallbackWcs callbacks. widget Specifies the TextField widg...
XmTextFieldGetBaseline accesses the x position of the first baseline in the TextField widget, relative to the x position of the top of the widget. widget Specifies the TextField widget ID For a complete definition of TextField and its associated resources, see XmTextField(3X).
XmTextFieldGetEditable accesses the edit permission state of the TextField widget. widget Specifies the TextField widget ID For a complete definition of TextField and its associated resources, see XmTextField(3X).
XmTextFieldGetInsertionPosition accesses the insertion cursor position of the TextField widget. widget Specifies the TextField widget ID For a complete definition of TextField and its associated resources, see XmTextField(3X).
XmTextFieldGetLastPosition accesses the position of the last character in the text buffer of the TextField widget. widget Specifies the TextField widget ID For a complete definition of TextField and its associated resources, see XmTextField(3X).
XmTextFieldGetMaxLength accesses the value of the current maximum allowable length of the text string in the TextField widget entered from the keyboard. The maximum allowable length prevents the user from entering a text string larger than this limit. widget Specifies the TextField widget ID For a complete definition of TextField and its associated resources, see XmTextField(3X).
XmTextFieldGetSelection retrieves the value of the primary selection. It returns a NULL pointer if no text is selected in the widget. The application is responsible for freeing the storage associated with the string by calling XtFree. widget Specifies the TextField widget ID For a complete definition of TextField and its associated resources, see XmTextField(3X).
XmTextFieldGetSelectionPosition accesses the left and right position of the primary selection in the text buffer of the TextField widget. widget Specifies the TextField widget ID left Specifies the pointer in which the position of the left boundary of the primary selection is returned. This is an integer number of characters from the beginning of the buffer. The first character position is 0. right Specifies the pointer in which the position of the right boundary of the primary selection is retu...
XmTextFieldGetSelectionWcs retrieves the value of the primary selection, encoded in a wide character format. It returns a NULL pointer if no text is selected in the widget. The application is responsible for freeing the storage associated with the wide character buffer by calling XtFree. widget Specifies the TextField widget ID For a complete definition of TextField and its associated resources, see XmTextField(3X)....
XmTextFieldGetString accesses the string value of the TextField widget. The application is responsible for freeing the storage associated with the string by calling XtFree. widget Specifies the TextField widget ID For a complete definition of TextField and its associated resources, see XmTextField(3X).
XmTextFieldGetStringWcs retrieves a copy of the wide character string value of the TextField widget. The application is responsible for freeing the storage associated with the string by calling XtFree. widget Specifies the TextField widget ID For a complete definition of TextField and its associated resources, see XmTextField(3X).
XmTextFieldGetSubstring retrieves a copy of a portion of the internal text buffer of a TextField widget. The function copies a specified number of characters from a given start position in the internal text buffer into a buffer provided by the application. A NULL terminator is placed at the end of the copied data. The size of the required buffer depends on the maximum number of bytes per character (MB_CUR_MAX) for the current locale. MB_CUR_MAX is a macro defined in stdlib.h. The buffer should b...
XmTextFieldGetSubstringWcs retrieves a copy of a portion of the internal text buffer of a TextField widget that is stored in a wide character format. The function copies a specified number of characters from a given start position in the internal text buffer into a buffer provided by the application. A NULL terminator is placed at the end of the copied data. widget Specifies the TextField widget ID. start Specifies the beginning character position from which the data will be retrieved. This is a...
XmTextFieldInsert inserts a character string into the text string in the TextField widget. The character positions begin at zero and are numbered sequentially from the beginning of the text. For example, to insert a string after the fourth character, the position parameter must be 4. This routine calls the widget's XmNvalueChangedCallback and verification callbacks, either XmNmodifyVerifyCallback or XmNmodifyVerifyCallbackWcs, or both. If both verification callback lists are registered, the pro...
XmTextFieldInsertWcs inserts a wide character string into the TextField widget at a specified location. The character positions begin at zero and are numbered sequentially from the beginning of the text. For example, to insert a string after the fourth character, the position parameter must be 4. This routine calls the widget's XmNvalueChangedCallback and verification callbacks, either XmNmodifyVerifyCallback or XmNmodifyVerifyCallbackWcs, or both. If both verification callback lists are regist...
XmTextFieldPaste inserts the clipboard selection at the insertion cursor of the destination widget. If XmNpendingDelete is True and the insertion cursor is inside the current selection, the clipboard selection replaces the selected text. This routine calls the widget's XmNvalueChangedCallback and verification callbacks, either XmNmodifyVerifyCallback or XmNmodifyVerifyCallbackWcs, or both. If both verification callback lists are registered, the procedures of the XmNmodifyVerifyCallback list are...
XmTextFieldPosToXY accesses the x and y position, relative to the upper left corner of the TextField widget, of a given character position in the text buffer. widget Specifies the TextField widget ID position Specifies the character position in the text for which the x and y position is accessed. This is an integer number of characters from the beginning of the buffer. The first character position is 0. x Specifies the pointer in which the x position, relative to the upper left corner of the wid...
XmTextFieldRemove deletes the primary selected text. If there is a selection, this routine also calls the widget's XmNvalueChangedCallback and verification callbacks, either XmNmodifyVerifyCallback or XmNmodifyVerifyCallbackWcs, or both. If both verification callback lists are registered, the procedures of the XmNmodifyVerifyCallback list are executed first and the resulting data is passed to the XmNmodifyVerifyCallbackWcs callbacks. widget Specifies the TextField widget ID. For a complete defi...
XmTextFieldReplace replaces part of the text string in the TextField widget. The character positions begin at zero and are numbered sequentially from the beginning of the text. An example text replacement would be to replace the second and third characters in the text string. To accomplish this, the parameter from_pos must be 1 and to_pos must be 3. To insert a string after the fourth character, both parameters, from_pos and to_pos, must be 4. This routine calls the widget's XmNvalueChangedCall...
XmTextFieldReplaceWcs replaces part of the wide character string in the TextField widget. The character positions begin at zero and are numbered sequentially from the beginning of the text. An example text replacement would be to replace the second and third characters in the text string. To accomplish this, the parameter from_pos must be 1 and to_pos must be 3. To insert a string after the fourth character, both parameters, from_pos and to_pos, must be 4. This routine calls the widget's XmNval...
XmTextFieldSetAddMode controls whether or not the TextField widget is in Add Mode. When the widget is in Add Mode, the insert cursor can be moved without disturbing the primary selection. widget Specifies the TextField widget ID state Specifies whether or not the widget is in Add Mode. A value of True turns on Add Mode; a value of False turns off Add Mode. For a complete definition of TextField and its associated resources, see XmTextField(3X)....
XmTextFieldSetEditable sets the edit permission state of the TextField widget. When set to True, the text string can be edited. widget Specifies the TextField widget ID editable Specifies a Boolean value that when True allows text string edits For a complete definition of TextField and its associated resources, see XmTextField(3X).
XmTextFieldSetHighlight highlights text between the two specified character positions. The mode parameter determines the type of highlighting. Highlighting text merely changes the visual appearance of the text; it does not set the selection. widget Specifies the TextField widget ID left Specifies the position of the left boundary of text to be highlighted. This is an integer number of characters from the beginning of the text buffer. The first character position is 0. right Specifies the positio...
XmTextFieldSetInsertionPosition sets the insertion cursor position of the TextField widget. This routine also calls the widget's XmNmotionVerifyCallback callbacks if the insertion cursor position changes. widget Specifies the TextField widget ID position Specifies the position of the insert cursor. This is an integer number of characters from the beginning of the text buffer. The first character position is 0. For a complete definition of TextField and its associated resources, see XmTextField(...
XmTextFieldSetMaxLength sets the value of the current maximum allowable length of the text string in the TextField widget. The maximum allowable length prevents the user from entering a text string from the keyboard that is larger than this limit. Strings that are entered using the XmNvalue (or XmNvalueWcs) resource, or the XmTextFieldSetString (or XmTextFieldSetStringWcs) function ignore this resource. widget Specifies the TextField widget ID max_length Specifies the maximum allowable length of...
XmTextFieldSetSelection sets the primary selection of the text in the widget. It also sets the insertion cursor position to the last position of the selection and calls the widget's XmNmotionVerifyCallback callbacks. widget Specifies the TextField widget ID first Marks the first character position of the text to be selected last Marks the last position of the text to be selected time Specifies the time at which the selection value is desired. This should be the same as the time of the event tha...
XmTextFieldSetString sets the string value of the TextField widget. This routine calls the widget's XmNvalueChangedCallback and verification callbacks, either XmNmodifyVerifyCallback or XmNmodifyVerifyCallbackWcs, or both. If both verification callback lists are registered, the procedures of the XmNmodifyVerifyCallback list are executed first and the resulting data is passed to the XmNmodifyVerifyCallbackWcs callbacks. It also sets the insertion cursor position to the beginning of the string an...
XmTextFieldSetStringWcs sets the wide character string value of the TextField widget. This routine calls the widget's XmNvalueChangedCallback and verification callbacks, either XmNmodifyVerifyCallback or XmNmodifyVerifyCallbackWcs, or both. If both verification callback lists are registered, the procedures of the XmNmodifyVerifyCallback list are executed first and the resulting data is passed to the XmNmodifyVerifyCallbackWcs callbacks. It also sets the insertion cursor position to the beginnin...
XmTextFieldShowPosition forces text at the specified position to be displayed. If the XmNautoShowCursorPosition resource is True, the application should also set the insert cursor to this position. widget Specifies the TextField widget ID position Specifies the character position to be displayed. This is an integer number of characters from the beginning of the text buffer. The first character position is 0. For a complete definition of TextField and its associated resources, see XmTextField(3X)...
XmTextFieldXYToPos accesses the character position nearest to the specified x and y position, relative to the upper left corner of the TextField widget. widget Specifies the TextField widget ID x Specifies the x position, relative to the upper left corner of the widget. y Specifies the y position, relative to the upper left corner of the widget. For a complete definition of TextField and its associated resources, see XmTextField(3X)....
XmTextFindString locates the beginning position of a specified text string. This routine searches forward or backward for the first occurrence of the string starting from the given start position. If it finds a match, the function returns the position of the first character of the string in position. widget Specifies the Text widget ID. start Specifies the character position from which the search proceeds. This is an integer number of characters from the beginning of the text buffer. The first c...
XmTextFindStringWcs locates the beginning position of a specified wide character text string. This routine searches forward or backward for the first occurrence of the string, starting from the given start position. If a match is found, the function returns the position of the first character of the string in position. widget Specifies the Text widget ID. start Specifies the character position from which the search proceeds. This is an integer number of characters from the beginning of the text ...
XmTextGetBaseline accesses the x position of the first baseline in the Text widget, relative to the x position of the top of the widget. widget Specifies the Text widget ID For a complete definition of Text and its associated resources, see XmText(3X).
XmTextGetEditable accesses the edit permission state of the Text widget. widget Specifies the Text widget ID For a complete definition of Text and its associated resources, see XmText(3X).
XmTextGetInsertionPosition accesses the insertion cursor position of the Text widget. widget Specifies the Text widget ID For a complete definition of Text and its associated resources, see XmText(3X).
XmTextGetLastPosition accesses the last position in the text buffer of the Text widget. This is an integer number of characters from the beginning of the buffer, and represents the position following which text that is added to the end of the buffer is placed. The first character position is 0. The last character position is equal to the number of characters in the text buffer. widget Specifies the Text widget ID For a complete definition of Text and its associated resources, see XmText(3X)....
XmTextGetMaxLength accesses the value of the current maximum allowable length of the text string in the Text widget entered from the keyboard. The maximum allowable length prevents the user from entering a text string larger than this limit. widget Specifies the Text widget ID For a complete definition of Text and its associated resources, see XmText(3X).
XmTextGetSelection retrieves the value of the primary selection. It returns a NULL pointer if no text is selected in the widget. The application is responsible for freeing the storage associated with the string by calling XtFree. widget Specifies the Text widget ID For a complete definition of Text and its associated resources, see XmText(3X).
XmTextGetSelectionPosition accesses the left and right position of the primary selection in the text buffer of the Text widget. widget Specifies the Text widget ID left Specifies the pointer in which the position of the left boundary of the primary selection is returned. This is an integer number of characters from the beginning of the buffer. The first character position is 0. right Specifies the pointer in which the position of the right boundary of the primary selection is returned. This is a...
XmTextGetSelectionWcs retrieves the value of the primary selection that is encoded in a wide character format. It returns a NULL pointer if no text is selected in the widget. The application is responsible for freeing the storage associated with the wide character buffer by calling XtFree. widget Specifies the Text widget ID For a complete definition of Text and its associated resources, see XmText(3X)....
XmTextGetSource accesses the source of the Text widget. Text widgets can share sources of text so that editing in one widget is reflected in another. This function accesses the source of one widget so that it can be made the source of another widget, using the function XmTextSetSource(3X). Setting a new text source destroys the old text source if no other Text widgets are using that source. To replace a text source but keep it for later use, create an unmanaged Text widget and set its source to ...
XmTextGetString accesses the string value of the Text widget. The application is responsible for freeing the storage associated with the string by calling XtFree. widget Specifies the Text widget ID For a complete definition of Text and its associated resources, see XmText(3X).
XmTextGetStringWcs retrieves a copy of the wide character string value of the Text widget. The application is responsible for freeing the storage associated with the string by calling XtFree. widget Specifies the Text widget ID For a complete definition of Text and its associated resources, see XmText(3X).
XmTextGetSubstring retrieves a copy of a portion of the internal text buffer of a Text widget. The function copies a specified number of characters from a given start position in the internal text buffer into a buffer provided by the application. A NULL terminator is placed at the end of the copied data. The size of the required buffer depends on the maximum number of bytes per character (MB_CUR_MAX) for the current locale. MB_CUR_MAX is a macro defined in stdlib.h. The buffer should be large en...
XmTextGetSubstringWcs retrieves a copy of a portion of the internal text buffer of a Text widget that is stored in a wide character format. The function copies a specified number of characters from a given start position in the internal text buffer into a buffer provided by the application. A NULL terminator is placed at the end of the copied data. widget Specifies the Text widget ID. start Specifies the beginning character position from which the data will be retrieved. This is an integer numbe...
XmTextGetTopCharacter accesses the position of the text at the top of the Text widget. widget Specifies the Text widget ID For a complete definition of Text and its associated resources, see XmText(3X).
XmTextInsert inserts a character string into the text string in the Text widget. The character positions begin at zero and are numbered sequentially from the beginning of the text. For example, to insert a string after the fourth character, the parameter position must be 4. This routine calls the widget's XmNvalueChangedCallback and verification callbacks, either XmNmodifyVerifyCallback or XmNmodifyVerifyCallbackWcs, or both. If both verification callback lists are registered, the procedures of...
XmTextInsertWcs inserts a wide character string into the Text widget at a specified location. The character positions begin at zero and are numbered sequentially from the beginning of the text. For example, to insert a string after the fourth character, the position parameter must be 4. This routine calls the widget's XmNvalueChangedCallback and verification callbacks, either XmNmodifyVerifyCallback or XmNmodifyVerifyCallbackWcs, or both. If both verification callback lists are registered, the ...
XmTextPaste inserts the clipboard selection at the insertion cursor of the destination widget. If XmNpendingDelete is True and the insertion cursor is inside the current selection, the clipboard selection replaces the selected text. This routine calls the widget's XmNvalueChangedCallback and verification callbacks, either XmNmodifyVerifyCallback or XmNmodifyVerifyCallbackWcs, or both. If both verification callback lists are registered, the procedures of the XmNmodifyVerifyCallback list are exec...
XmTextPosition is the data type for a character position within a text string. The text position is an integer representing the number of characters from the beginning of the string. The first character position in the string is 0.
XmTextPosToXY accesses the x and y position, relative to the upper left corner of the Text widget, of a given character position in the text buffer. widget Specifies the Text widget ID position Specifies the character position in the text for which the x and y position is accessed. This is an integer number of characters from the beginning of the buffer. The first character position is 0. x Specifies the pointer in which the x position, relative to the upper left corner of the widget, is returne...
XmTextRemove deletes the primary selected text. If there is a selection, this routine also calls the widget's XmNvalueChangedCallback and verification callbacks, either XmNmodifyVerifyCallback or XmNmodifyVerifyCallbackWcs, or both. If both verification callback lists are registered, the procedures of the XmNmodifyVerifyCallback list are executed first and the resulting data is passed to the XmNmodifyVerifyCallbackWcs callbacks. widget Specifies the Text widget ID. For a complete definition of ...
XmTextReplace replaces part of the text string in the Text widget. The character positions begin at zero and are numbered sequentially from the beginning of the text. An example text replacement would be to replace the second and third characters in the text string. To accomplish this, the parameter from_pos must be 1 and to_pos must be 3. To insert a string after the fourth character, both parameters, from_pos and to_pos, must be 4. This routine calls the widget's XmNvalueChangedCallback and v...
XmTextReplaceWcs replaces part of the wide character string in the Text widget. The character positions begin at zero and are numbered sequentially from the beginning of the text. An example text replacement would be to replace the second and third characters in the text string. To accomplish this, the from_pos parameter must be 1 and the to_pos parameter must be 3. To insert a string after the fourth character, both the from_pos and to_pos parameters must be 4. This routine calls the widget's ...
XmTextScroll scrolls text in a Text widget. widget Specifies the Text widget ID lines Specifies the number of lines of text to scroll. A positive value causes text to scroll upward; a negative value causes text to scroll downward. For a complete definition of Text and its associated resources, see XmText(3X).
XmTextSetAddMode controls whether or not the Text widget is in Add Mode. When the widget is in Add Mode, the insert cursor can be moved without disturbing the primary selection. widget Specifies the Text widget ID state Specifies whether or not the widget is in Add Mode. A value of True turns on Add Mode; a value of False turns off Add Mode. For a complete definition of Text and its associated resources, see XmText(3X)....
XmTextSetEditable sets the edit permission state of the Text widget. When set to True, the text string can be edited. widget Specifies the Text widget ID editable Specifies a Boolean value that when True allows text string edits For a complete definition of Text and its associated resources, see XmText(3X).
XmTextSetHighlight highlights text between the two specified character positions. The mode parameter determines the type of highlighting. Highlighting text merely changes the visual appearance of the text; it does not set the selection. widget Specifies the Text widget ID left Specifies the position of the left boundary of text to be highlighted. This is an integer number of characters from the beginning of the text buffer. The first character position is 0. right Specifies the position of the r...
XmTextSetInsertionPosition sets the insertion cursor position of the Text widget. This routine also calls the widget's XmNmotionVerifyCallback callbacks if the insertion cursor position changes. widget Specifies the Text widget ID position Specifies the position of the insertion cursor. This is an integer number of characters from the beginning of the text buffer. The first character position is 0. For a complete definition of Text and its associated resources, see XmText(3X)....
XmTextSetMaxLength sets the value of the current maximum allowable length of the text string in the Text widget. The maximum allowable length prevents the user from entering a text string from the keyboard that is larger than this limit. Strings that are entered using the XmNvalue (or XmNvalueWcs) resource, or the XmTextSetString (or XmTextSetStringWcs) function ignore this resource. widget Specifies the Text widget ID max_length Specifies the maximum allowable length of the text string For a co...
XmTextSetSelection sets the primary selection of the text in the widget. It also sets the insertion cursor position to the last position of the selection and calls the widget's XmNmotionVerifyCallback callbacks. widget Specifies the Text widget ID first Marks the first character position of the text to be selected last Marks the last position of the text to be selected time Specifies the time at which the selection value is desired. This should be the same as the time of the event that triggere...
XmTextSetSource sets the source of the Text widget. Text widgets can share sources of text so that editing in one widget is reflected in another. This function sets the source of one widget so that it can share the source of another widget. Setting a new text source destroys the old text source if no other Text widgets are using that source. To replace a text source but keep it for later use, create an unmanaged Text widget and set its source to the text source you want to keep. widget Specifies...
XmTextSetString sets the string value of the Text widget. This routine calls the widget's XmNvalueChangedCallback and verification callbacks, either XmNmodifyVerifyCallback or XmNmodifyVerifyCallbackWcs, or both. If both verification callback lists are registered, the procedures of the XmNmodifyVerifyCallback list are executed first and the resulting data is passed to the XmNmodifyVerifyCallbackWcs callbacks. It also sets the insertion cursor position to the beginning of the string and calls th...
XmTextSetStringWcs sets the wide character string value of the Text widget. This routine calls the widget's XmNvalueChangedCallback and verification callbacks, either XmNmodifyVerifyCallback or XmNmodifyVerifyCallbackWcs, or both. If both verification callback lists are registered, the procedures of the XmNmodifyVerifyCallback list are executed first and the resulting data is passed to the XmNmodifyVerifyCallbackWcs callbacks. It also sets the insertion cursor position to the beginning of the s...
XmTextSetTopCharacter sets the position of the text at the top of the Text widget. If the XmNeditMode is XmMULTI_LINE_EDIT, the line of text that contains top_character is displayed at the top of the widget without shifting the text left or right. widget Specifies the Text widget ID top_character Specifies the position in the text to display at the top of the widget. This is an integer number of characters from the beginning of the text buffer. The first character position is 0. For a complete d...
XmTextShowPosition forces text at the specified position to be displayed. If the XmNautoShowCursorPosition resource is True, the application should also set the insert cursor to this position. widget Specifies the Text widget ID position Specifies the character position to be displayed. This is an integer number of characters from the beginning of the text buffer. The first character position is 0. For a complete definition of Text and its associated resources, see XmText(3X)....
XmTextXYToPos accesses the character position nearest to the specified x and y position, relative to the upper left corner of the Text widget. widget Specifies the Text widget ID x Specifies the x position, relative to the upper left corner of the widget. y Specifies the y position, relative to the upper left corner of the widget. For a complete definition of Text and its associated resources, see XmText(3X)....
ToggleButton sets nontransitory state data within an application. Usually this widget consists of an indicator (square or diamond) with either text or a pixmap on one side of it. However, it can also consist of just text or a pixmap without the indicator. The toggle graphics display a 1-of-many or N-of-many selection state. When a toggle indicator is displayed, a square indicator shows an N-of-many selection state and a diamond indicator shows a 1-of-many selection state. ToggleButton implies a ...
ToggleButtonGadget sets nontransitory state data within an application. Usually this gadget consists of an indicator (square or diamond-shaped) with either text or a pixmap on one side of it. However, it can also consist of just text or a pixmap without the indicator. The toggle graphics display a 1-of-many or N-of-many selection state. When a toggle indicator is displayed, a square indicator shows an N-of-many selection state and a diamond-shaped indicator shows a 1-of-many selection state. Tog...
XmToggleButtonGadgetGetState obtains the state of a ToggleButtonGadget. widget Specifies the ToggleButtonGadget ID For a complete definition of ToggleButtonGadget and its associated resources, see XmToggleButtonGadget(3X).
XmToggleButtonGadgetSetState sets or changes the ToggleButtonGadget's current state. widget Specifies the ToggleButtonGadget widget ID. state Specifies a Boolean value that indicates whether the ToggleButtonGadget state is selected or unselected. If True, the button state is selected; if False, the button state is unselected. notify Indicates whether XmNvalueChangedCallback is called; it can be either True or False. The XmNvalueChangedCallback is only called when this function changes the state...
XmToggleButtonGetState obtains the state of a ToggleButton. widget Specifies the ToggleButton widget ID For a complete definition of ToggleButton and its associated resources, see XmToggleButton(3X).
XmToggleButtonSetState sets or changes the ToggleButton's current state. widget Specifies the ToggleButton widget ID. state Specifies a Boolean value that indicates whether the ToggleButton state is selected or unselected. If True, the button state is selected; if False, the button state is unselected. notify Indicates whether XmNvalueChangedCallback is called; it can be either True or False. The XmNvalueChangedCallback is only called when this function changes the state of the ToggleButton. Wh...
XmTrackingEvent provides a modal interface for selection of a component. It is intended to support context help. The function grabs the pointer and discards succeeding events until BSelect is released or a key is pressed and then released. The function then returns the widget or gadget that contains the pointer when BSelect is released or a key is released. widget Specifies the widget ID of a widget to use as the basis of the modal interaction. That is, the widget within which the interaction mu...
XmTrackingLocate provides a modal interface for selection of a component. It is intended to support context help. The function grabs the pointer and discards succeeding events until BSelect is released or a key is pressed and then released. The function then returns the widget or gadget that contains the pointer when BSelect is released or a key is released. This function is obsolete and exists for compatibility with previous releases. It has been replaced by XmTrackingEvent. widget Specifies th...
XmTranslateKey is the default XtKeyProc translation procedure for Motif applications. The function takes a keycode and modifiers and returns the corresponding keysym. XmTranslateKey serves two main purposes: new translators with expanded functionality can call it to get the default Motif keycode-to-keysym translation in addition to whatever they add, and so that the default translator can be reinstalled. This function enables keysyms defined by the Motif virtual bindings to be used when an appli...
XmUpdateDisplay provides the application with a mechanism for forcing all pending exposure events to be removed from the input queue and processed immediately. When a user selects a button within a MenuPane, the MenuPanes are unposted and then any activation callbacks registered by the application are invoked. If one of the callbacks performs a time-consuming action, the portion of the application window that was covered by the MenuPanes will not have been redrawn; normal exposure processing doe...
XmVaCreateSimpleCheckBox creates an instance of a RowColumn widget of type XmWORK_AREA and returns the associated widget ID. This routine uses the ANSI C variable-length argument list (varargs) calling convention. This routine creates a CheckBox and its ToggleButtonGadget children. A CheckBox is similar to a RadioBox, except that more than one button can be selected at a time. The name of each button is button_n, where n is an integer from 0 to one minus the number of buttons in the menu. Button...
XmVaCreateSimpleMenuBar creates an instance of a RowColumn widget of type XmMENU_BAR and returns the associated widget ID. This routine uses the ANSI C variable-length argument list (varargs) calling convention. This routine creates a MenuBar and its CascadeButtonGadget children. The name of each button is button_n, where n is an integer from 0 to one minus the number of buttons in the menu. Buttons are named and created in the order in which they are specified in the variable portion of the arg...
XmVaCreateSimpleOptionMenu creates an instance of a RowColumn widget of type XmMENU_OPTION and returns the associated widget ID. This routine uses the ANSI C variable-length argument list (varargs) calling convention. This routine creates an OptionMenu and its Pulldown submenu containing PushButtonGadget or CascadeButtonGadget children. The name of each button is button_n, where n is an integer from 0 to one minus the number of buttons in the menu. The name of each separator is separator_n, wher...
XmVaCreateSimplePopupMenu creates an instance of a RowColumn widget of type XmMENU_POPUP and returns the associated widget ID. This routine uses the ANSI C variable-length argument list (varargs) calling convention. This routine creates a Popup MenuPane and its button children. The name of each button is button_n, where n is an integer from 0 to one minus the number of buttons in the menu. The name of each separator is separator_n, where n is an integer from 0 to one minus the number of separato...
XmVaCreateSimplePulldownMenu creates an instance of a RowColumn widget of type XmMENU_PULLDOWN and returns the associated widget ID. This routine uses the ANSI C variable-length argument list (varargs) calling convention. This routine creates a Pulldown MenuPane and its button children. The name of each button is button_n, where n is an integer from 0 to one minus the number of buttons in the menu. The name of each separator is separator_n, where n is an integer from 0 to one minus the number of...
XmVaCreateSimpleRadioBox creates an instance of a RowColumn widget of type XmWORK_AREA and returns the associated widget ID. This routine uses the ANSI C variable-length argument list (varargs) calling convention. This routine creates a RadioBox and its ToggleButtonGadget children. The name of each button is button_n, where n is an integer from 0 to one minus the number of buttons in the menu. parent Specifies the parent widget ID. name Specifies the name of the created widget. button_set Specif...
XmWidgetGetBaselines returns an array that contains one or more baseline values associated with the specified widget. The baseline of any given line of text is a vertical offset in pixels from the origin of the widget's bounding box to the given baseline. This routine allocates memory for the returned data. The application must free this memory using XtFree. widget Specifies the ID of the widget for which baseline values are requested baselines Returns an array that contains the value of each b...
XmWidgetGetDisplayRect returns the width, height and the x and y coordinates of the upper left corner of the display rectangle of the specified widget. The display rectangle is the smallest rectangle that encloses either a string or a pixmap. If the widget contains a string, the return values specify the x and y coordinates of the upper left corner of the display rectangle relative to the origin of the widget and the width and height in pixels. In the case of a pixmap, the return values specify ...